<?xml version='1.0' encoding='UTF-8' ?>
<rss version='2.0'>
<channel>
<title>Ransom Feed | RSS Complete USA</title>
<link>https://ransomfeed.it/</link>
<description>Ransomware victims RSS<img referrerpolicy="no-referrer-when-downgrade" src="https://matomo.ransomfeed.it/matomo.php?idsite=1&amp;rec=1" style="border:0" alt="" /></description>
<language>en-us</language>
<item xmlns:dc='ns:1'>
<title>Beyond-Measure--Associates-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31908</link>
<guid>28ca2a3ef786a75109a9e2af23c1a4f7</guid>
<pubDate>Sat, 02 May 2026 10:25:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Beyond-Measure--Associates-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38999af7eaaf6b3ddb3d8ec9a189854da82770fd4690e973eaeedbb11ceda7aa</i><br /><br />Threat actor <b>description</b>: <i>Church Design, Engineering, Financial & Construction Services</i><br />Target victim <b>website</b>: <i>churchdesign.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cytek-Biosciences</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31906</link>
<guid>6107f0a7614917c3c78a74ebe45f00ca</guid>
<pubDate>Sat, 02 May 2026 08:54:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cmdorganization</b> claims attack for <b>Cytek-Biosciences</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>28ab2589fe35d1fbc61c189db44d9d735608081848ffbdd6e0dc6b346c33dd67</i><br /><br />Threat actor <b>description</b>: <i>A biotechnology firm that develops and supplies advanced, cost-effective flow cytometry instruments and related services used worldwide by researchers and clinicians. Its compact systems and streamlined workflows enable high-throughput, single-cell analysis for applications such as cancer immunology, leukemia and lymphoma diagnosis, and transplant monitoring. Distinguished by offering high-end capabilities at lower cost, the company accelerates scientific discovery through technical innovation, exceptional customer support, and a commitment to ethical practices and community engagement. Headquartered in Fremont, California, it has been publicly traded on NASDAQ since 2021. We have 7.36 TB of downloaded data.</i><br />Target victim <b>website</b>: <i>cytekbio.com</i>]]></description>
<category>cmdorganization</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zampell</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31905</link>
<guid>bd41a065d4640c9dd3c1e06ce9c820dc</guid>
<pubDate>Sat, 02 May 2026 08:53:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cmdorganization</b> claims attack for <b>Zampell</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>418b112f15b9de980fdb4df925b78ba74d699ee4ac55f0a270bd062ff1b776da</i><br /><br />Threat actor <b>description</b>: <i>Zampell Ltd is a leading provider of refractory services, offering comprehensive solutions from design to ongoing maintenance. They cater to various industries, including power generation, biomass, fossil fuel, and petrochemicals, ensuring safety and efficiency in their operations. The company specializes in both standard and bespoke refractory products, delivering tailored services to meet client needs. With a commitment to quality and safety, Zampell aims to exceed customer expectations in all aspects of their service.</i><br />Target victim <b>website</b>: <i>www.zampell.com</i>]]></description>
<category>cmdorganization</category>
</item>
<item xmlns:dc='ns:1'>
<title>Minidoka-Memorial-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31904</link>
<guid>42aa61c7ccfa95dc4db4d894530def8a</guid>
<pubDate>Sat, 02 May 2026 08:48:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackwater</b> claims attack for <b>Minidoka-Memorial-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1fe9e3e2506542d2e36ce2fab2aff99541c7b04fe34a505a2ebc675378e6d57f</i><br /><br />Threat actor <b>description</b>: <i>Data will be published after 7 days.</i><br />Target victim <b>website</b>: <i>minidokamemorial.org</i>]]></description>
<category>blackwater</category>
</item>
<item xmlns:dc='ns:1'>
<title>Compass-Housing-Alliance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31901</link>
<guid>ea2486be22140cf8214932e344a07215</guid>
<pubDate>Sat, 02 May 2026 08:47:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackwater</b> claims attack for <b>Compass-Housing-Alliance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cf393b14dda1c93dc4e4aea96b3ce3c9ee4fff60147821bb82cce9954eb80cd7</i><br /><br />Threat actor <b>description</b>: <i>Compass Housing Alliance is dedicated to developing and providing essential services, shelter, and affordable housing to ensure that everyone in the community has a safe place to call home.</i><br />Target victim <b>website</b>: <i>compasshousingalliance.org</i>]]></description>
<category>blackwater</category>
</item>
<item xmlns:dc='ns:1'>
<title>Site-Design-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31897</link>
<guid>14b14c86550a0d4c618b4764e11d49db</guid>
<pubDate>Sat, 02 May 2026 06:50:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>Site-Design-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ebf53247d6caf9201524e06ea4ccdee5162d4dcfafa7d5e930f59bad1fa3390</i><br /><br />Threat actor <b>description</b>: <i>Site Design Group Ltd. is a Chicago-based firm specializing in landscape architecture and urban design.</i><br />Target victim <b>website</b>: <i>site-design.com</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>TSYS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31895</link>
<guid>4bbc7449ca4ad63ba9e6094180cc65cb</guid>
<pubDate>Sat, 02 May 2026 03:54:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>TSYS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc311e3c26faf3e61b140466ba62614ba979c6ebab2937452b05d78492908549</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] TSYS, or Total System Services, is a US-based payment solutions company headquartered in Columbus, Georgia. It operates in the financial technology and payment processing industry, providing services such as credit and debit card processing, merchant services, and payment management solutions to financial institutions, businesses, and consumers worldwide. TSYS became a subsidiary of Global Payments following a merger in 2019.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Epiq-Global</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31894</link>
<guid>ca50333df78f2f7bd42ac688af0af3e9</guid>
<pubDate>Sat, 02 May 2026 03:54:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Epiq-Global</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ffe7daa39e26de8aa1a6703c62018e1014bfed361c7a10b97573a8024558bd50</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Epiq Global is a US-based legal services company specializing in technology-driven solutions for complex legal matters. It provides services including class action and mass tort administration, bankruptcy case management, eDiscovery, document review, and legal notification. Operating across multiple countries, Epiq serves law firms, corporations, and government entities, helping manage large-scale legal proceedings efficiently.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>northshoreenv.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31893</link>
<guid>67a5bfdf2c0a67f87eb46b3e9a4a7a38</guid>
<pubDate>Sat, 02 May 2026 00:23:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>northshoreenv.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c7f6bffa81382f316eb880df9a1cd4f8c0f43cada7153389e42f912fd6e34aa</i><br /><br />Threat actor <b>description</b>: <i>North Shore Environmental Consultants is a progressive environmental company that provides a wide range of environmental management and consulting services to help clients navigate complex environmental and regulatory challenges. With over 20 years of experience, they offer solutions in areas such as remediation, emergency spill response, air quality, and corporate consulting. Their client base spans various industries across western Canada, and they are recognized for their innovative operational programs and commitment to client satisfaction. North Shore is dedicated to fostering a sustainable future while continuously expanding their expertise and services. Employees: 200 Revenue: $23.5 Million Industry: Business Services Phone Number: (780) 467-3354</i><br />Target victim <b>website</b>: <i>northshoreenv.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Avnet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31889</link>
<guid>6cea18e92877f11b15280b17416ac030</guid>
<pubDate>Fri, 01 May 2026 17:13:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>Avnet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a7d58cea1b86edafb7ef73a38424936d49130048695dd191e7598a5af47c369</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Avnet is a global electronic components distributor and technology solutions provider headquartered in Phoenix, Arizona, USA. Founded in 1921, it operates in the technology and electronics distribution industry, serving manufacturers and designers worldwide. Avnet supplies semiconductors, interconnects, passives, and electromechanical components, while also offering supply chain management, design, and engineering services across North America, Europe, and Asia.</i><br />Target victim <b>website</b>: <i>avnet.com</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lena-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31888</link>
<guid>01e651518630062d985188c1f0dbd83a</guid>
<pubDate>Fri, 01 May 2026 17:11:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>Lena-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79eeff4e9e0427c4444776f179f3695e90d23c6813590cf90708c6ee9ee0489e</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>lena.io</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Woundtech</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31887</link>
<guid>3445ee86ba8817378a8577a75444f5d7</guid>
<pubDate>Fri, 01 May 2026 17:11:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>Woundtech</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7fc042efd10e2b20c05462be84130d884410d599e325c58e1696e355f063d187</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Woundtech is a US-based healthcare company specializing in advanced wound care management services. It provides in-home and facility-based wound care treatment to patients, primarily serving Medicare and Medicaid populations. The company employs clinicians who deliver specialized wound care directly to patients in skilled nursing facilities and home settings, focusing on chronic and complex wound treatment across the United States.</i><br />Target victim <b>website</b>: <i>woundtech.net</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>LexisNexis</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31885</link>
<guid>6b1e4ccdd469e7c0f4411a468b7910f7</guid>
<pubDate>Fri, 01 May 2026 17:09:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>LexisNexis</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e5c6bdb75054a1eb47d6331077ccf4b301dc8e8200e1ab8ec56f6434727e2c45</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] LexisNexis is a global information and analytics company headquartered in the United States. It operates in the legal, regulatory, and business intelligence industries, providing research tools, data analytics, and risk management solutions. Its platforms are widely used by legal professionals, law enforcement, and enterprises to access vast databases of legal documents, news, public records, and compliance information.</i><br />Target victim <b>website</b>: <i>lexisnexis.com</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>MCO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31884</link>
<guid>2f2025ae2e57e71843298d80bed5cfde</guid>
<pubDate>Fri, 01 May 2026 17:08:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>MCO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e738266b452f0aaa092e213583ba33927a5f83d6d3c427180c7139d26cf6302f</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A

The acronym "MCO" is too ambiguous to identify a specific company with confidence. Multiple organizations share this abbreviation across different industries and countries. Please provide additional context such as the full company name, industry, or country of operation to allow for an accurate and reliable description.</i><br />Target victim <b>website</b>: <i>mycomplianceoffice.com</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>ReFocus-AI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31883</link>
<guid>a100e66d10d9f367ba4dcc5917657159</guid>
<pubDate>Fri, 01 May 2026 17:06:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>ReFocus-AI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8eefef75047dd351df76b75749851c214a81368503fac5df95e8dddb5f6db58</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>refocusai.com</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hatica</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31882</link>
<guid>60b4471e1fb1e8e0d266d97071669ccb</guid>
<pubDate>Fri, 01 May 2026 17:06:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>Hatica</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>90ddb7cb5d113094d1dc418569a2512ee894687a07ba7d18c6ca43a2db7d28fe</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Hatica is an engineering analytics platform founded in India that helps software development teams improve productivity and well-being. It aggregates data from tools like GitHub, Jira, and Slack to provide insights into developer workflows, sprint performance, and team health metrics. Operating in the developer productivity and engineering management industry, Hatica serves engineering leaders seeking data-driven decisions to reduce burnout and optimize delivery.</i><br />Target victim <b>website</b>: <i>hatica.io</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>SMTA-Sherwood-Mutual-Telephone-Association</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31865</link>
<guid>c4211b6fddf7ddf821087989ae514550</guid>
<pubDate>Fri, 01 May 2026 16:56:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>SMTA-Sherwood-Mutual-Telephone-Association</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4899e4e4b60b8924c44898f6ad163ab84b75ebc611e3873621a328a5ad6d0003</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Peyton-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31867</link>
<guid>a65b920e6ce1070509a476e3b48aa56f</guid>
<pubDate>Fri, 01 May 2026 16:56:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Peyton-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>307b5d6e823513cf12524b9b8b973ac24ba7369bdf34551b96a6ec665038a791</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Accurate-Nursing-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31868</link>
<guid>c732e4cb57268226f297e389d8382baf</guid>
<pubDate>Fri, 01 May 2026 16:56:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Accurate-Nursing-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad27d4e0dc1c29493b39d9e717ee55cfd4b772199aace4eb6cd9fb9383161965</i><br /><br />Threat actor <b>description</b>: <i>Healthcare Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nordstern-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31880</link>
<guid>c0b9b187cfd326a101efae8da2a1936e</guid>
<pubDate>Fri, 01 May 2026 16:51:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>Nordstern-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc6dcc5170252c001306866d0f8ba41bcc5c174c42d299a50df8c26dc781ad29</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>nordsterntech.com</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>ParkEngage</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31879</link>
<guid>b7c45703742d291cecb044204f548f8d</guid>
<pubDate>Fri, 01 May 2026 16:51:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>ParkEngage</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ae01a894fc8e58081b7f99bc46c9d56aa8e1d315d8efd7fd5d8c001a2744017</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] ParkEngage is a US-based technology company specializing in smart parking solutions. It provides cloud-based software platforms that help parking operators manage reservations, payments, and customer engagement. Its services cater to airports, hospitals, universities, and commercial facilities. The company focuses on enhancing the parking experience through digital tools including mobile apps, contactless payments, and data analytics to optimize parking operations and revenue management.</i><br />Target victim <b>website</b>: <i>parkengage.com</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Saleskido</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31878</link>
<guid>9d57a1e06a731e1b2377de6781e881b1</guid>
<pubDate>Fri, 01 May 2026 16:50:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>Saleskido</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>75bf2ac57126b97479f200fa38ea149e5ca9aae70c800be8e230126462a6f49d</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>saleskido.com</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>wyomingcountyny.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31863</link>
<guid>80a3f634893bdf5d63c679e5f99182b2</guid>
<pubDate>Fri, 01 May 2026 13:35:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>wyomingcountyny.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dfd06f35947645e8a0de536eb663cc47e6f8ac591d54db6822535eb8719e65e9</i><br /><br />Threat actor <b>description</b>: <i>Wyoming County provides various government services to its residents, including job opportunities, economic development initiatives, and electronic forms for managing county affairs. The county actively organizes community events, such as pop-up f</i><br />Target victim <b>website</b>: <i>wyomingcountyny.gov</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>sequoiadental.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31862</link>
<guid>92699ee8e81849b1817a5d73d3bf8e02</guid>
<pubDate>Fri, 01 May 2026 13:34:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>sequoiadental.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3fd9143086dd7a1706f67c09690322898c74222f72c0bff95fd77e8c5ed8040</i><br /><br />Threat actor <b>description</b>: <i>Sequoia Dental Office provides a wide range of dental services including general, cosmetic, orthodontic, and restorative dentistry. Located in Visalia, CA, they are dedicated to patient comfort and use advanced technology to enhance care, offering</i><br />Target victim <b>website</b>: <i>sequoiadental.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>townofnorwell.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31861</link>
<guid>b96c50b7b132bacf5adba4adca9a4f10</guid>
<pubDate>Fri, 01 May 2026 13:34:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>townofnorwell.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>07dbee19aaf55fc29d13ee0f2646289506818c0a58d639eea1aceece1f14feb0</i><br /><br />Threat actor <b>description</b>: <i>The Town of Norwell MA offers a variety of municipal services including animal control, building permits, health clinics, and recreational programs. It serves the residents of Norwell by ensuring public safety, facilitating community events, and p</i><br />Target victim <b>website</b>: <i>townofnorwell.net</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>curedentalbeltontx.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31860</link>
<guid>e8d0467189fccf2dff63796aa47202fc</guid>
<pubDate>Fri, 01 May 2026 13:34:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>curedentalbeltontx.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06256cdd024c13d5693a6fd2e3a0ee2352190da7757f2bf417b7f8a448538508</i><br /><br />Threat actor <b>description</b>: <i>Cure Dental is a company that operates in the Dental Offices industry. It employs 10to19 people and has 1Mto5M of revenue. The company is headquartered in Belton, Texas.</i><br />Target victim <b>website</b>: <i>curedentalbeltontx.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>austinplasticandreconstructivesurgery.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31859</link>
<guid>4585ad1e2cbe41891c011a3e0e73e1d4</guid>
<pubDate>Fri, 01 May 2026 13:34:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>austinplasticandreconstructivesurgery.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d910c2459a8293862b857af4bfed15d7c8ae2687818a9162b30333c84fbe3e0</i><br /><br />Threat actor <b>description</b>: <i>Austin Plastic Reconstructive Surgery, led by Board-Certified Plastic Surgeon Dr. Christine Fisher, specializes in breast reconstruction and a variety of cosmetic surgery procedures. The clinic caters to individuals seeking to enhance their beauty</i><br />Target victim <b>website</b>: <i>austinplasticandreconstructivesurgery.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>hsjlawyers.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31858</link>
<guid>27adbf7fc9dd2c144f5cee93569fe2c1</guid>
<pubDate>Fri, 01 May 2026 13:33:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>hsjlawyers.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aada07bd47a9a2f9067febda6a4fb50648968842f892fb5834ea778ac66e34c4</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1971, HSJ Lawyers is a prominent law firm located in Prince George, British Columbia, serving the legal needs of clients throughout Northern BC. With a team of 15 lawyers and 25 staff members, the firm specializes in various areas inclu</i><br />Target victim <b>website</b>: <i>hsjlawyers.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>Winona-County</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31849</link>
<guid>4021e2f19e21f8263b768cc19dd8ba70</guid>
<pubDate>Fri, 01 May 2026 10:51:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Winona-County</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b319cc3acbbf9714f37d2ed786ab0e68b6ca68bf37223ec4a2d8cfbfc0de1a00</i><br /><br />Threat actor <b>description</b>: <i>Winona County is located in the Mississippi River blufflands of southeastern Minnesota. They have been negligent regarding security and the data they store, which has resulted in a breach and the public disclosure of all the confidential data they held. As a result, we are now able to offer you a large database containing resident records, tax and budget documents, police records, and data from other institutions.</i><br />Target victim <b>website</b>: <i>winonacounty.gov</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Roger-D.-Mason-II-P.A.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31848</link>
<guid>4882ab9f0909835c444fb6d4ce6d56f0</guid>
<pubDate>Fri, 01 May 2026 10:07:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Roger-D.-Mason-II-P.A.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c0d2990289740575ea75f58e7575e5825773e8cb51cdae040100011913ed3b5</i><br /><br />Threat actor <b>description</b>: <i>Florida Auto Dealership Fraud Attorney</i><br />Target victim <b>website</b>: <i>flautolawyer.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mesquite-Plumbing-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31846</link>
<guid>0ac9a79e4aa15b44845b6b553cfcddbd</guid>
<pubDate>Fri, 01 May 2026 10:06:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Mesquite-Plumbing-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>27ac7e9c4d62915c881e6cc9613c5c28d702946e53b1bd7e9bf9606471de2967</i><br /><br />Threat actor <b>description</b>: <i>Plumbing Experts</i><br />Target victim <b>website</b>: <i>mesquiteplumbing.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fox-Broermann-Pediatric-Dentistry-of-Tulsa</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31845</link>
<guid>a3ad705733dff104469abefd400c670c</guid>
<pubDate>Fri, 01 May 2026 10:06:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Fox-Broermann-Pediatric-Dentistry-of-Tulsa</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e33a2b6bc6a84114e27b02d059a97fb4e27e4dbe3bcefdd4197a70f661e3f68f</i><br /><br />Threat actor <b>description</b>: <i>Pediatric dentistry of Tulsa</i><br />Target victim <b>website</b>: <i>foxbroermann.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>flbgroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31844</link>
<guid>1a08d68b5124c82c0131d4e61c85dd8a</guid>
<pubDate>Fri, 01 May 2026 09:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>flbgroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc528625ad9a1e2355325bc4c3732184158d0da117f7729cb805e7ff8e53eddc</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>flbgroup.com</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Country-Club-of-Darien</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31834</link>
<guid>27230ac1c8d9d2828e1ff531bec85d37</guid>
<pubDate>Fri, 01 May 2026 09:51:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>The-Country-Club-of-Darien</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1066177cc8722c93920cc02c584ea43e64f8c84acce500888ab55396de3813f</i><br /><br />Threat actor <b>description</b>: <i>- Sales / agent / commercial operations- Industrial / manufacturing / tooling business data- Research & development / technical project data- Business admin / office operations- Software / digital assets / branding</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Colorado-Dental-Wellness-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31833</link>
<guid>0bff2aa05a6d99cad062133e6c589de1</guid>
<pubDate>Fri, 01 May 2026 01:21:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Colorado-Dental-Wellness-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>65d1ded481ce91f7affe0442a1faeee24b2e15ff001e48d88a5ad661f8410aae</i><br /><br />Threat actor <b>description</b>: <i>Clients’ medical data breach.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carrera-Casting-Corp.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31826</link>
<guid>7e0a4d112e3f40b8f6decb2a7c365f91</guid>
<pubDate>Thu, 30 Apr 2026 23:11:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacknevas</b> claims attack for <b>Carrera-Casting-Corp.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b6e2d9e56b94c2eb27f6433b71da36329c1f81a8fdb0e8fb619a3e1b971cc79</i><br /><br />Threat actor <b>description</b>: <i>• 3 terabytes of corporate data for free. Download it now while it's still available.• Please wait 2 -3 days while files are uploaded to the site.• Brief Overview of Carrera Casting• Carrera Casting is one of the premier jewelry manufacturing and casting companies, located in the heart of New York City. It provides a full range of services for jewelry designers, brands, and retailers.• Core Activities:• Precious Metal Casting: Working with gold of various karats and colors, silver, platinum, and palladium.• 3D Printing and CAD: Converting digital 3D models (CAD) into high-precision wax or resin prototypes for subsequent casting.• Mold Making: Creating high-quality rubber and silicone molds for jewelry mass production and reproduction.• Finishing and Preparation: Basic processing and finishing of cast pieces prior to final polishing and stone setting.• Company Features:• The company is known for its strict quality control, commitment to client design confidentiality, and use of cutting-edge technologies. It is a reliable partner for both emerging independent jewelers and major global brands, offering scalable solutions for jewelry manufacturing.</i><br />Target victim <b>website</b>: <i>arreracasting.com</i>]]></description>
<category>blacknevas</category>
</item>
<item xmlns:dc='ns:1'>
<title>TOWERPOINT-WEALTH-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31824</link>
<guid>d4d9dd228996e12e46d286639eccd3e1</guid>
<pubDate>Thu, 30 Apr 2026 22:27:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>TOWERPOINT-WEALTH-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b71900e177cff797785d2603dc3828d3d5d3e1a306409e5594809f1067da264b</i><br /><br />Threat actor <b>description</b>: <i>Salesforce records containing PII and other internal corporate data have been compromised. This is a final warning to reach out by 4 May 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 1 May 2026 | Warning: FINAL WARNING</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Follett-Software-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31823</link>
<guid>3124f20ae7f8b97d325e86b1acfb7d3c</guid>
<pubDate>Thu, 30 Apr 2026 22:27:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Follett-Software-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>64e4f0510d2742a38c917c674f63c0b40a4b2579217b01d7dc51dba927187e4e</i><br /><br />Threat actor <b>description</b>: <i>Over 4M Salesforce records containing PII and other internal corporate data have been compromised. This is a final warning to reach out by 4 May 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 1 May 2026 | Warning: FINAL WARNING</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zinkan--Barker-Development</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31814</link>
<guid>6bbd49be0c3cea3467da28178487f9db</guid>
<pubDate>Thu, 30 Apr 2026 19:55:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Zinkan--Barker-Development</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52f360e9f8730041b56407ce85c90fd7723282a0d1243b071cc0163dfb49550d</i><br /><br />Threat actor <b>description</b>: <i>Real Estate</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Switch-Enterprises</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31817</link>
<guid>f1ada790ce8f26ed12d4f2070b44bc81</guid>
<pubDate>Thu, 30 Apr 2026 18:55:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-Switch-Enterprises</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3233062892bfb829be397fe36de263a9d83fede00c87369967e85a4985363bda</i><br /><br />Threat actor <b>description</b>: <i>Advertising & Marketing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sees-Candies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31818</link>
<guid>ba224f2bcea2cdd76611b651c3c78069</guid>
<pubDate>Thu, 30 Apr 2026 18:55:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Sees-Candies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b2b48c2bba4841b4d837f042f2686d5f15e25f7326290eeebdd6ac5ac8660662</i><br /><br />Threat actor <b>description</b>: <i>Food & Beverage</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jayeff-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31819</link>
<guid>a570d1a9488ae63742a5d82c946a44ea</guid>
<pubDate>Thu, 30 Apr 2026 18:55:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Jayeff-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a95b5fde8f1e1e56a95b520eacdf9ea7ce1f0523ba42d837b34494c12929048</i><br /><br />Threat actor <b>description</b>: <i>Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Progressive-Oral-Surgery--Implantology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31820</link>
<guid>2c86a217e06d86e3db130723abd90fff</guid>
<pubDate>Thu, 30 Apr 2026 17:25:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Progressive-Oral-Surgery--Implantology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7fa85b45ea35f8a2b106d75f0cdd752bd91774aaa3c0fd3ef5f911650fdd15f</i><br /><br />Threat actor <b>description</b>: <i>Data is not available now.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Liberty-Mutual-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31813</link>
<guid>73618455b2f727ad8fe055241b6b06bd</guid>
<pubDate>Thu, 30 Apr 2026 16:53:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Liberty-Mutual-Insurance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8792ff3392f7414251cf83a38060b6aa3d12a050170cd2912b23c66c2247fce9</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Liberty Mutual Insurance is a leading American insurance company headquartered in Boston, Massachusetts. Founded in 1912, it operates in the property and casualty insurance industry, offering products such as auto, home, life, and commercial insurance. The company serves individuals and businesses across the United States and internationally, making it one of the largest global insurers by premium revenue.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>ATF-Aerospace</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31810</link>
<guid>a7d3154ed40d4dbebf306630991b11a7</guid>
<pubDate>Thu, 30 Apr 2026 13:50:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>ATF-Aerospace</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52180d59e86bb9518f7d10cc472e3d531d8a1338b95156fb649b61cedc9cfb2b</i><br /><br />Threat actor <b>description</b>: <i>ATF Aerospace specializes in aerospace manufacturing and distribution, offering high-quality me
chanical and electrical components sourced from leading manufacturers. Their manufacturing capa
bilities focus on CNC milling and lathe operations, emphasizing short runs and quick turnaround
projects.

We will upload 45gb of corporate data soon. Detailed employee personal documents (passports, SS
Ns, DLs and so on), client information (BOEING files again and other confidential projects and 
specification), contracts and agreements, insurance files, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Morae</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31805</link>
<guid>a4cfa38878b278bbe2f6f5172474f86b</guid>
<pubDate>Thu, 30 Apr 2026 02:51:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Morae</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>767e1a1eaaf503d85590a3a1f3b049d980aafa9287a93b8cb2f8aaa9360e9311</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Morae is a US-based professional services company specializing in legal, compliance, and technology consulting. It serves law firms, corporate legal departments, and financial institutions by providing managed services, litigation support, contract lifecycle management, and legal operations solutions. The company combines legal expertise with advanced technology to help clients improve efficiency, reduce costs, and manage risk across their legal and compliance functions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arban--Carosi</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31804</link>
<guid>70e57e78fd611128e6e6212c59c28b59</guid>
<pubDate>Thu, 30 Apr 2026 01:23:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Arban--Carosi</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0800798b74f1daebb348c4ffb75b00f5bfbb1923f689b1bf55e3ea9ec601b198</i><br /><br />Threat actor <b>description</b>: <i>Arban Carosi: 1TB customer and company data leaked due to negligence.       * * Full employee base: Including names, positions, personal and work email addresses, phone numbers.     * * Financial Documentation: Contracts, Invoices, Revenue Data     * * Customer base: Customer contact details, project details     * * Internal correspondence: Service emails and documents disclosing internal processes and company plans.   !! In the screenshots, you can see that we have accessed detailed plans of various buildings, including U.S. Army buildings!!  We will publish all the data in a week and everyone can use it for their own purposes.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vortex-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31800</link>
<guid>907426606e10139de6617963c3e73cff</guid>
<pubDate>Thu, 30 Apr 2026 00:57:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Vortex-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>059da878137e6ff54d6fe8f0fc1335e15aaa1a749aae287f990c05c3299e9482</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Vortex Companies is a US-based infrastructure rehabilitation firm specializing in trenchless technology solutions for underground pipe and sewer systems. Operating in the water and wastewater industry, the company provides services including pipe lining, manhole rehabilitation, and structural repair. It serves municipalities and utilities across North America, helping extend the life of aging infrastructure without extensive excavation.</i><br />Target victim <b>website</b>: <i>vortexcompanies.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Del-Monte-Foods</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31796</link>
<guid>45e7200bd1dbaf868c1b69de0dec23b9</guid>
<pubDate>Thu, 30 Apr 2026 00:55:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Del-Monte-Foods</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e90848fd2a8825a1b443d33a18b2f56701a37712e36174282c727fbd721b1916</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Del Monte Foods is a leading American food company headquartered in Walnut Creek, California. It operates in the packaged food industry, producing and distributing canned fruits, vegetables, tomatoes, and broths under well-known consumer brands. The company supplies products to retail grocery chains, foodservice operators, and industrial customers across the United States and international markets.</i><br />Target victim <b>website</b>: <i>delmontefoods.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>UFP-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31793</link>
<guid>738d7deb467d69ea5d6c8aacb9613245</guid>
<pubDate>Thu, 30 Apr 2026 00:55:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>UFP-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f8a7438d97261c9684a760724ced0f8c1716c3623a4558e81074b345bb337c3</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] UFP Technologies is a US-based company specializing in the design and manufacturing of highly engineered custom packaging, components, and specialty products. Operating in the advanced materials and manufacturing industry, it serves sectors including medical, automotive, aerospace, and consumer goods. The company uses materials such as foam, plastics, and composites to create protective and functional solutions for its clients.</i><br />Target victim <b>website</b>: <i>ufpt.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Peachtree-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31789</link>
<guid>0493033a1c9575336529c17abf994b52</guid>
<pubDate>Thu, 30 Apr 2026 00:54:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Peachtree-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed7077f735d647390d7329bcf355e9fe2c022aa9c4bc5612553fbbbe6bc26491</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Peachtree Group is a US-based hospitality-focused investment and management firm headquartered in Atlanta, Georgia. The company operates across real estate private equity, credit, and hotel management, specializing in acquiring, developing, and managing hotel properties. It serves institutional and private investors and is active across the United States hospitality and commercial real estate sectors.</i><br />Target victim <b>website</b>: <i>peachtreegroup.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eyemart-Express</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31786</link>
<guid>499cb2ee42a8be29ad10e4afa28e0af8</guid>
<pubDate>Thu, 30 Apr 2026 00:42:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Eyemart-Express</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1e18a29cfd1e6d7851f18fc5b1bfba4491b3bfd84c435bc4cee8308ff706679</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Eyemart Express is a United States-based retail optical chain specializing in prescription eyeglasses and contact lenses. Founded in 1990 and headquartered in Farmers Branch, Texas, the company operates hundreds of stores across the country. It offers eye exams, frames, and lenses with an emphasis on fast turnaround times. Eyemart Express competes in the optical retail industry alongside brands like LensCrafters and Visionworks.</i><br />Target victim <b>website</b>: <i>eyemartexpress.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kichler-Lighting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31783</link>
<guid>79d60d2defe0e8a228ed1fd7fab86e23</guid>
<pubDate>Thu, 30 Apr 2026 00:39:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Kichler-Lighting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dfb68bb9e8dbd65c5c81ee747c6d3e712e41de8bb95d74232d03b3499884e23a</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Kichler Lighting is an American company headquartered in Garland, Texas, specializing in the design and distribution of decorative lighting fixtures, ceiling fans, and landscape lighting products. Founded in 1938, it operates within the residential and commercial lighting industry, offering a wide range of indoor and outdoor lighting solutions. Kichler sells its products through wholesale distributors and retail partners across the United States and internationally.</i><br />Target victim <b>website</b>: <i>kichler.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Powell-Electronics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31782</link>
<guid>660bc121513a9d5442e97c5cef85786e</guid>
<pubDate>Thu, 30 Apr 2026 00:38:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Powell-Electronics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ef18b24363127230ce2646e9f499e9523ffe859e53acb266e8fa75ca5279a6d</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Powell Electronics is a US-based authorized distributor of electronic components and assemblies. Founded in 1946 and headquartered in Camp Hill, Pennsylvania, the company serves aerospace, defense, industrial, and commercial markets. It supplies connectors, cables, electromechanical components, and custom assemblies from leading manufacturers, offering supply chain solutions, engineering support, and value-added services to customers across North America.</i><br />Target victim <b>website</b>: <i>powell.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Central-National-Gottesman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31781</link>
<guid>7d6ff84af104d3d7a8e3b9f86dc7a030</guid>
<pubDate>Thu, 30 Apr 2026 00:36:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Central-National-Gottesman</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>68abf3b02a7be66d8344a762e81710f26789cc7bdb61a4d0b6c2ba3559d69fdf</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Central National Gottesman is a privately held global pulp and paper merchant headquartered in Purchase, New York, USA. Founded in 1886, the company distributes printing and writing papers, packaging materials, pulp, and tissue products. It operates across multiple continents, serving publishers, printers, and converters. It is one of the largest independent paper distribution companies in the world.</i><br />Target victim <b>website</b>: <i>cng-inc.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Florida-East-Coast-Railway</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31780</link>
<guid>0801dafc88d3117e0db830a42ddf944c</guid>
<pubDate>Thu, 30 Apr 2026 00:35:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Florida-East-Coast-Railway</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f21a20bc7bc93ddb88d53eaa589f65f4082d7436d6a71c3918f6a489962f241e</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Florida East Coast Railway is a regional freight railroad operating in the United States, primarily serving the state of Florida. Founded in the 1890s by Henry Flagler, it runs approximately 351 miles of track along Florida's eastern corridor from Jacksonville to Miami. The company transports intermodal containers, vehicles, and various commodities, playing a key role in Florida's freight logistics and supply chain infrastructure.</i><br />Target victim <b>website</b>: <i>fecrwy.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Blanchard</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31779</link>
<guid>a39878ae282a18ea051ad89e7875a272</guid>
<pubDate>Thu, 30 Apr 2026 00:34:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Blanchard</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>86f28fc1f8907084cc0e54639d90250993cd0e136f60eac976d62aa1052f1f49</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Blanchard is a US-based professional development and leadership training company founded by Ken Blanchard, co-author of "The One Minute Manager." Operating in the corporate training and consulting industry, it offers leadership development programs, coaching services, and organizational effectiveness solutions to businesses worldwide. Headquartered in Escondido, California, the company serves clients across various sectors globally.</i><br />Target victim <b>website</b>: <i>blanchard.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grace-Design-Studios</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31778</link>
<guid>7f1b9e870ce469ea8f20e0a89bbc9ef8</guid>
<pubDate>Thu, 30 Apr 2026 00:33:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Grace-Design-Studios</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>185dee0ff0e77e17921e558a68fa9c50645251f069b42bc8961041b25fdb5837</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>grace-design.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>TESSCO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31777</link>
<guid>9a5a511ca4f18a61719b12acf46f14c0</guid>
<pubDate>Thu, 30 Apr 2026 00:32:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>TESSCO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7481a6c3ab00154d9a1a920aa158dbac627075e7a27a27cbef03581d882f423b</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] TESSCO Technologies is a United States-based company operating in the wireless technology distribution industry. Founded in 1982 and headquartered in Hunt Valley, Maryland, TESSCO serves as a value-added distributor and solutions provider for wireless networking products, infrastructure equipment, and mobile devices. The company supplies carriers, contractors, system integrators, and government agencies with products from leading manufacturers across the telecommunications sector.</i><br />Target victim <b>website</b>: <i>tessco.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Englewood-Lab</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31776</link>
<guid>1c0708af4331df1a35dfbdaf8e252d6e</guid>
<pubDate>Thu, 30 Apr 2026 00:31:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Englewood-Lab</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12e0273f84137cfd8e469b4cbacbe682c1e9e7dcc451c440c486fe6f2555b2ee</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Englewood Lab is a contract development and manufacturing organization (CDMO) based in the United States, operating out of Englewood, New Jersey. The company specializes in the development and manufacturing of topical, sterile, and liquid pharmaceutical products. It serves clients in the pharmaceutical and personal care industries, offering formulation development, stability testing, and regulatory support services.</i><br />Target victim <b>website</b>: <i>englewoodlab.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lc-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31775</link>
<guid>b3df435f52be5287d9ace3b28e2dcac9</guid>
<pubDate>Thu, 30 Apr 2026 00:30:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Lc-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f2f5a2a3a457f0c3b9701d50ca0d7bd717778d70888391eb09cd4878120a8eb6</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] LC Industries is a nonprofit organization based in the United States that provides employment and training opportunities for people who are blind or visually impaired. Operating primarily in North Carolina, it manufactures and supplies a range of products including military and government goods, fulfilling contracts through the AbilityOne Program, which connects nonprofit agencies with federal procurement opportunities.</i><br />Target victim <b>website</b>: <i>lcindustries.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>SCS-Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31774</link>
<guid>2ab0ebde9cc0cd85fc47ce045d440caf</guid>
<pubDate>Thu, 30 Apr 2026 00:29:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>SCS-Engineers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e44b3c4246f4a6d8f55fd1882f9a1bd0607fc6b312c6fdce7512156918350b7a</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] SCS Engineers is a United States-based environmental consulting and engineering firm. Founded in 1970, the company specializes in solid waste management, landfill design and operations, environmental remediation, and sustainability services. It serves municipal, industrial, and government clients across the country, offering technical solutions related to waste infrastructure, gas collection systems, and environmental compliance.</i><br />Target victim <b>website</b>: <i>scsengineers.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Epcon-Communities</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31773</link>
<guid>1f910e9557e4fa6c8f9156e96a02d40a</guid>
<pubDate>Thu, 30 Apr 2026 00:28:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Epcon-Communities</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>73c30884a045fd3435beb0b401f9af0588dc2ca07d8af8d0a14917414c415c7c</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Epcon Communities is a US-based homebuilding and franchise company founded in 1986 and headquartered in Dublin, Ohio. It specializes in developing and selling single-story, low-maintenance homes primarily targeting active adults aged 55 and older. Operating in the residential real estate and construction industry, Epcon also franchises its community development model to builders across the United States.</i><br />Target victim <b>website</b>: <i>epconcommunities.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Data-Exchange-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31772</link>
<guid>e8305639398f2f0c3d9cf3af2dd09aeb</guid>
<pubDate>Thu, 30 Apr 2026 00:27:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Data-Exchange-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>94e9c971b65ca40226b5d91a256eef2a4a9042dc626cd8479daeb72a05b08efb</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>dex.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>SunSource</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31771</link>
<guid>9d5d697ea9ea179f7633708d5478c28f</guid>
<pubDate>Thu, 30 Apr 2026 00:26:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>SunSource</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e02228968b64bf8f3773b6387abab9d1a948d2dc98b36ffebae6825131914bff</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] SunSource is a US-based industrial distribution company specializing in the supply of fluid power, fluid process, and motion control components and systems. It serves a wide range of industries including manufacturing, agriculture, and construction. The company provides products such as hydraulics, pneumatics, and related technical services, helping businesses maintain and optimize their industrial equipment and operations.</i><br />Target victim <b>website</b>: <i>www.sun-source.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Color-Communications-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31764</link>
<guid>42751fb669b1fe8b899c5a70deb061d8</guid>
<pubDate>Wed, 29 Apr 2026 23:51:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>secpo</b> claims attack for <b>Color-Communications-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>652d72f8a5127bbfceb122b5b0f8799aafc9f201449faba0c70a93808653d179</i><br /><br />Threat actor <b>description</b>: <i>The exposed dataset includes over 200,000 unique files containing sensitive information on more than 4,500 individuals and over 5,500 organizations...</i><br />Target victim <b>website</b>: <i>ccicolor.com</i>]]></description>
<category>secpo</category>
</item>
<item xmlns:dc='ns:1'>
<title>Iowa-Spring-Manufacturing--Sales</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31763</link>
<guid>e834628a514af2290509181bf4348c6d</guid>
<pubDate>Wed, 29 Apr 2026 23:23:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Iowa-Spring-Manufacturing--Sales</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>727ca76913809c4005afe5de03b47b78b8365dec9921d987b814efe6478c0c28</i><br /><br />Threat actor <b>description</b>: <i>Iowa Spring 
 
 is a well-established manufacturer specializing in a variety of springs, including those for overhead garage doors, mechanical applications, and agricultural equipment. Founded in 1977 and based in Adel, Iowa, the company has built a strong reputation for quality and reliability in the spring manufacturing industry.
 
 2112 Greene Street
 P.O. Box 130
 Adel, IA 50003, US
 
 www.iowaspring.com
 
 Leaked data: 49,4Gb 
 Accounting, product development and testing, laboratory defect analysis, supply logistics, contracts, NDA, financial indicators, corporate information, and much more</i><br />Target victim <b>website</b>: <i>iowaspring.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Karl-Chevrolet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31762</link>
<guid>ae4b023d09c50fbd267176ede23a3fa7</guid>
<pubDate>Wed, 29 Apr 2026 22:00:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Karl-Chevrolet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f5f204c1d1a158f50d105552a7da0b3db6bf94adee67970f560aba4e64bb784a</i><br /><br />Threat actor <b>description</b>: <i>Karl Chevrolet, Inc. operates a Chevrolet car dealership. It offers new and used cars, commercial vehicles, SUVs, trucks, and vans. The company also provides automotive parts and accessories, such as brake pads, oil filters, and others; and services, which include vehicle maintenance, repair, inspection, and other services. It also allows customers to order parts online.</i><br />Target victim <b>website</b>: <i>www.karlchevrolet.com</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bentley-Capital-Ventures</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31761</link>
<guid>b667279b6400b4c05f3b5c4241e8bf7f</guid>
<pubDate>Wed, 29 Apr 2026 21:59:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>radar</b> claims attack for <b>Bentley-Capital-Ventures</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>565d0f881d5e2adec5d3cc26589ceff60e1318b6877bd2541ba4fd3d36ee1608</i><br /><br />Threat actor <b>description</b>: <i>https://www.linkedin.com/company/bentley-capital-ventures
We started  Bentley Capital Ventures in 2012 to facilitate small business owners across the country in the process of obtaining capital.  We know a simple trip to the local bank doesnt always provide the results many are looking for and as business owners ourselves we know how challenging it can be to obtain capital when you dont fit within the guidelines of the traditional banking world.

At Bentley Capital we use the relationships we have built over the last 25 years in both the consumer and commercial banking markets to provide our clients with the very best options available for their specific situation.

Whether you have perfect or less than perfect credit our goal will always be to provide you with options that promote growth and properity for your business.</i><br />Target victim <b>website</b>: <i>bentleycapitalventures.com</i>]]></description>
<category>radar</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advanta-Genetics-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31758</link>
<guid>decff3a1f694fccd108d4ce07b2587b5</guid>
<pubDate>Wed, 29 Apr 2026 21:37:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>aurora</b> claims attack for <b>Advanta-Genetics-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1a719e68510bf201bd59ec98df948a5eb0ed8355bff3bd7eb1090f036243254</i><br /><br />Threat actor <b>description</b>: <i>[health] Advanta Genetics LLC — a respected CLIA/CAP-accredited clinical toxicology and molecular diagnostics laborator. The exposed material includes: Tens of thousands of real patient lives — including highly sensitive chronic opioid therapy charts flagged by the Texas Medical Board and elderly Medicare audit records. Provider identities and prescribing power — SSNs, DEA numbers, and state licenses from 20+ states that can be turned into black-market "script pads". Gold-standard identity theft kits — W-2s, I-9s with passport scans, and full employee packages for 50+ staff. 102 complete QuickBooks company files exposing every vendor, payroll run, bank link, and financial secret across the Advanta/RedLeaf/OSPRI empire. High-value trade secrets — OSPRI Biopath investment decks, valuation models, FDA pre-submission packets, and the proprietary "The Brain" AI diagnostic architecture. Explosive privileged attorney-client memos on active regulatory battles (Texas Medical Board Remedial Plan #19-153 and a federal NORA subpoena). Active Directory domain controller data (NTDS.dit and SAM hives).</i><br />Target victim <b>website</b>: <i>aalabs.com</i>]]></description>
<category>aurora</category>
</item>
<item xmlns:dc='ns:1'>
<title>Law-Offices-of-Michael-A.-Freedman-P.A.-maflaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31755</link>
<guid>4ecb8876b622f561d9d13161071f518c</guid>
<pubDate>Wed, 29 Apr 2026 21:35:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>aurora</b> claims attack for <b>Law-Offices-of-Michael-A.-Freedman-P.A.-maflaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ccae79ff2f69b86f92875aade4b1ea4e43c4615198787600903509dde72493c</i><br /><br />Threat actor <b>description</b>: <i>[law] Law Offices of Michael A. Freedman, P.A. (maflaw.com). The exfiltrated corpus is 579 GB used / 143 GB at root level / 196,701 files / 19,231 directories, dated as recently as a year-2026-in-progress client matter.

What this means for a plaintiffs' PI firm of ~25 staff:

656 client-matter folders organised across eight yearly parents from June 2019 through 2026-in-progress. Per-client medical records, HIPAA authorisations, police reports, settlement releases, IOLTA distribution sheets, retainer agreements, and treating-provider correspondence.
Two staff Outlook archives at 2.1 GB each, plus a 505 MB Outlook backup, plus 27 enumerated .pst files — years of attorney–client privileged correspondence, settlement strategy, opposing-counsel comms.
The complete Sage ACT. Pro v18 contact universe — the live database plus eight historical ZIP backups going back to 2013 plus a 9.3 MB plaintext export (ACT!-Contacts.txt) that any text editor can open. Estimated 5,000–12,000 contacts.
The firm's master credential vault in a Word document called Woodywoody78!.docx (the filename is itself the vault password). Plaintext credentials for M&T Bank multi-identity business + commercial accounts (with electronic-payment-approval authority), Bank of America, Paychex, QuickBooks, and the firm's federal EIN. Plus the senior partner's phone-unlock PIN.
A staff browser-exported password CSV (32 plaintext credentials) including the M365 tenant, the Slack tenant, hospital portals (MedStar, GBMC, Allstate secure mail), MoveDocs, ChartRequest, MSHC Legal portal — plus residual credentials from prior employers SLF Law and Bailey Law, creating cross-firm contamination liability.
The Universal Licensing / Freedman Consulting invention-promotion operation — a second line of business under the same EIN, with hundreds of inventor folders. Per-inventor unpublished invention disclosures, “Internet Presentation of Invention” decks, NDAs, Exclusive Patent License Agreement drafts, patent-art renderings, and per-managed-mailbox client-company passwords. 
A criminal-defense sub-practice (“SLF criminal” out of Janice's working folder) with retainer agreements and per-client court documents, carrying 6th-Amendment-attorney–client uplift on the privileged-track scoring.
An Axon evidence.com MPIA-released body-worn-camera package (449 MB total; a 448 MB clip from the 2020-12-20 Park Baltimore incident).</i><br />Target victim <b>website</b>: <i>maflaw.com</i>]]></description>
<category>aurora</category>
</item>
<item xmlns:dc='ns:1'>
<title>Atlas-Metal-Industries-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31754</link>
<guid>0207ceaa30eeb7df0c51ed30959480ec</guid>
<pubDate>Wed, 29 Apr 2026 21:35:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>aurora</b> claims attack for <b>Atlas-Metal-Industries-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f38ee012b560f6a27ddcdf3075aaec18f8e8c61645ae53d683af54bbf5cb455f</i><br /><br />Threat actor <b>description</b>: <i>[food, metal] Atlas Metal Industries Inc. — a privately held commercial-foodservice-equipment manufacturer headquartered in Miami, Florida.

The dataset is a complete Microsoft Dynamics GP environment: production databases, payroll records, system credentials, Autodesk Vault product-design backups, CNC fabrication programs, and all supporting infrastructure configuration. The exfiltration occurred on or about April 8, 2026; the attack was identified April 22, 2026.

The exposed material includes:

    15.8 GB of payroll-records database (PYREC) — full Employee Master with SSNs, DOBs, addresses, direct-deposit bank routing numbers, salary, W-4 tax data, garnishments, and check history dating to at least 2018.
    30+ SQL Server login accounts with password hashes in a sp_help_revlogin dump — named employees, system admins (DYNSA, sa), service accounts, and Active Directory domain accounts.
    74 GB of Autodesk Vault Professional backup — complete product-design history from 2019 through 2026, covering every product line Atlas Metal manufactures.
    Hundreds of CNC fabrication programs — laser-cutter and Amada punch-press G-code for the full catalogue of sheet-metal components.
    A base64-encoded SQL credential for the TimeClock Plus timekeeping system, stored in plaintext XML.
    8 SQL Server databases with full backup chains — ATLAS (primary), PYREC (payroll), DYNAMICS (system), TEST (18 GB dev clone), TWO, AMIT, plus system databases (master, msdb, DynamicsGPSecurity).</i><br />Target victim <b>website</b>: <i>atlasfoodserv.com</i>]]></description>
<category>aurora</category>
</item>
<item xmlns:dc='ns:1'>
<title>Costa-Solutions-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31753</link>
<guid>56fe38b77cb4f52e8f2770e874f57875</guid>
<pubDate>Wed, 29 Apr 2026 21:35:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>aurora</b> claims attack for <b>Costa-Solutions-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>21fbe7230b2f36501ab4dee782a10be1fd439a28fa0ef2a9ebdebacd0561e92d</i><br /><br />Threat actor <b>description</b>: <i>[warehouse] Costa Solutions, LLC — a privately held managed-labor and warehousing company headquartered in San Antonio, Texas, with ~$140M annual revenue and 200–1,000 employees.

The file server contained the complete operational, financial, legal, and human resources infrastructure of the company:

3,000–8,000+ individuals' personal data — current employees, former employees (12 years of records), independent contractors, employee dependents, and job applicants. SSNs on W-2s, W-4s, 1099s, I-9s, background checks. Bank account and routing numbers on 200+ direct deposit forms.
Medical and injury records — 150+ employee injury/medical files from 2013–2026, FMLA medical certifications, drug test results (random, reasonable suspicion, post-incident, promotional), and workers' compensation claims for 23+ named individuals.
CEO's entire file system — Josh Wean's Documents folder (5.3 GB) including P&L statements, a 17-subfolder "Confidential" directory, legal correspondence, strategic plans, a C-12 peer advisory group archive, and a $RECYCLE.BIN with 60+ deleted items.
Client contracts and competitive intelligence — pricing, SLAs, and contract terms for HEB, CVS, Sysco, Amazon, McLane, Labatt, Valvoline. Competitor pricing intelligence. RFP bid documents with cost models.
Active legal case files — litigation records (2021–2022), HR internal investigation notes (2018–2021), arbitration files, active investigations marked "DO NOT DELETE" — all subject to attorney-client privilege.
Infrastructure secrets — an HEB production server TLS certificate, a Cisco AnyConnect VPN installer, and the CEO's Remote Desktop connection file.
Corporate financials — multi-year budgets, valuation & sale documents (indicating possible M&A activity), PPP loan forgiveness records, Form 5500 ERISA filings, and annual reporting.</i><br />Target victim <b>website</b>: <i>costasolutions.com</i>]]></description>
<category>aurora</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bayou-Title-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31752</link>
<guid>4371a529ba9a419a1dc903bcd8856251</guid>
<pubDate>Wed, 29 Apr 2026 21:34:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>aurora</b> claims attack for <b>Bayou-Title-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0205491ff52497df3d511d8cd992285d644580c55357f2c19db850bb0c6af916</i><br /><br />Threat actor <b>description</b>: <i>[insurance] Bayou Title, Inc. — the largest title insurance agent and closing/settlement services provider in Louisiana, with 19 full-service locations statewide.

The exfiltrated data spans 20+ years of operations (2004–2026) and includes:

70,000–100,000+ Social Security numbers paired with names, addresses, and sale proceeds from 1099-S real-estate closing worksheets covering all 19 offices across three tax years (2018–2020), plus W-2 and 1099-MISC filings.
Complete employee payroll databases — 10+ instances of Sage 50 EMPLOYEE.DAT files containing SSNs, bank account numbers, routing numbers, pay rates, tax withholding, and direct deposit details for current and former employees.
103 GB of title abstracts — ~34,000+ PDFs documenting ownership chains, liens, and mortgages for properties across Louisiana.
44 GB of GreenFolders DMS transaction packages (2012, 2013, 2019) — complete closing file archives containing HUD-1 settlement statements, identity verification documents, SSN cards, and tax records. Filenames contain encoded tags (ssn, hud, soc, tax).
Plaintext credentials for government portals — a file literally named Lafayette Assessors lcmenard Password4321.url, plus a PDF containing Orleans Parish system login credentials.
Attorney-client privileged documents — wills, attorney engagement letters, and legal opinions prepared by licensed Louisiana attorneys.</i><br />Target victim <b>website</b>: <i>bayoutitle.com</i>]]></description>
<category>aurora</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eduporium</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31747</link>
<guid>3066b11b58eb7fb925b67d25c54e3234</guid>
<pubDate>Wed, 29 Apr 2026 19:55:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Eduporium</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>190800a1c011e724e9b72cd358a67444d01b56c27a80b3ae452dda48cb73f287</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Probity-Contracting-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31748</link>
<guid>144679b5d1ddb8650c3155c645a1d976</guid>
<pubDate>Wed, 29 Apr 2026 19:55:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Probity-Contracting-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc6bb6e7e013507fb7e6abdc5e74547bef9e24ba2bf0cdb0e4709cdb3a5586ee</i><br /><br />Threat actor <b>description</b>: <i>Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Metro-ILA-Funds</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31749</link>
<guid>4295cd213a56a1c6ec066caf5dd08f16</guid>
<pubDate>Wed, 29 Apr 2026 19:55:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Metro-ILA-Funds</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce0a1b79713ec1f9e67ed76313b4830c37c4e1f3441f3301b6ae1d87eafe40fb</i><br /><br />Threat actor <b>description</b>: <i>Insurance</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>stllc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31743</link>
<guid>59b6525364c77d1e6f9c79c53e387954</guid>
<pubDate>Wed, 29 Apr 2026 10:32:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>stllc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0520082af8a0475d5acd9b6d6911926bd240f59270f23b1aacd612139f46495b</i><br /><br />Threat actor <b>description</b>: <i>Welcome to St. Luke Lutheran Community St. Luke Lutheran Community is a not-for-profit, continuing...</i><br />Target victim <b>website</b>: <i>stllc.org</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>rainforestclean.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31738</link>
<guid>dbaebce9c842f6aa7482517597c75c8c</guid>
<pubDate>Wed, 29 Apr 2026 10:09:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>m3rx</b> claims attack for <b>rainforestclean.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f50728ec93640d5ca8341cf1fcdfb7c89444d919e9e44db1e1dbfde3edc44e9a</i><br /><br />Threat actor <b>description</b>: <i>Rainforest Carwash and Oil Change, along with it’s owner, enjoys giving back to our local community. Hopefully you are inspired to help after seeing the ways in which we try to help others. Stolen: 259gb 77k files</i><br />Target victim <b>website</b>: <i>rainforestclean.com</i>]]></description>
<category>m3rx</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpswww.fulcrumre.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31734</link>
<guid>effa3b908aaa9f8744b980829a6bfd15</guid>
<pubDate>Wed, 29 Apr 2026 02:23:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>httpswww.fulcrumre.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2624000b9d0697a2c75c098e7aa0deeab6591c3f3d6afb8ef02a9862db149c8b</i><br /><br />Threat actor <b>description</b>: <i>2tb data all company data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>nbd3pl.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31732</link>
<guid>407688b935e4079fecd2b2daefb6432e</guid>
<pubDate>Wed, 29 Apr 2026 00:22:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>nbd3pl.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>78da6e95ee46e433a61c2da1b393c0d490abc104747e81c0d2f82f86f35d37a8</i><br /><br />Threat actor <b>description</b>: <i>North Bay Distribution has been in the warehousing, order fulfillment, and shipping industry for more than 30 years. They are a full service outsourcing logistics service provider. They are based in northern California's City of Vacaville. The proximity of their facility provides streamlined deliveries from the Port of Oakland for goods manufactured and arriving from the Pacific Rim</i><br />Target victim <b>website</b>: <i>nbd3pl.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>cadencepetroleum.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31730</link>
<guid>306ee6a27d95b01dd69ee72920cf25ed</guid>
<pubDate>Tue, 28 Apr 2026 20:51:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>cadencepetroleum.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ab47fb118b99fa27aef1f6db70e77d24d5699c10d82d089c40e4ce5a8a7867b</i><br /><br />Threat actor <b>description</b>: <i>Company management has 48 hours to reach an agreement with us. If no agreement is reached, the files—totaling 400 GB—will be published.

Our objective is to provide our customers with the best products and services. Cadence Petroleum and our suppliers stand behind the products we offer. Regardle…</i><br />Target victim <b>website</b>: <i>www.zoominfo.com/c/cadence-petroleum-group/476578914|</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nephrology-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31729</link>
<guid>2325577fcece567803aff8703a899116</guid>
<pubDate>Tue, 28 Apr 2026 20:25:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Nephrology-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bdd582a3ffc7fd61131d94c4bf85f39678f2c4b6cbbdbced918c88aaa82bad14</i><br /><br />Threat actor <b>description</b>: <i>Nephrology Associates, PA is a leading central Arkansas nephrology practice with seven highly trained physicians across seven locations. They provide compassionate kidney care, accept all insurances, and aim to create a welcoming environment for patients.</i><br />Target victim <b>website</b>: <i>www.arnapa.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Basch--Keegan</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31724</link>
<guid>045723a2e194ae8b07890dace311b402</guid>
<pubDate>Tue, 28 Apr 2026 19:54:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Basch--Keegan</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04dc432059295e32e5667769cee15a3cf6d59bcc02f284e9a0ff14446dbf64e5</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>KarmaData</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31726</link>
<guid>0f7a529e4a851625fee72161a84b4ca1</guid>
<pubDate>Tue, 28 Apr 2026 19:54:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>KarmaData</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b5c653ead4aaff95fedc38e1129fbafeaee5aeb9a0012839a282242910378eec</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>INJURYLAWYERS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31722</link>
<guid>27e34e1093ba7e24075b9f5b25dcf5a7</guid>
<pubDate>Tue, 28 Apr 2026 14:39:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>INJURYLAWYERS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a345134aeb76fb1259b28b56032389b60a8af1fdba09920529da9207ef96295f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.durable-tech.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31717</link>
<guid>1dbdb6a977dd83e68f9078c05da938c6</guid>
<pubDate>Tue, 28 Apr 2026 09:41:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>www.durable-tech.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b43e7e1578c15621ae1ca00c07785536c683837525027916de1ea26a2c3257ef</i><br /><br />Threat actor <b>description</b>: <i>Durable Mecco is a small company (1-10 employees) operating in the HR & Staffing industry, located at 176 Thorn Hill Rd, Warrendale, Pennsylvania, 15086. This entity is distinct from "Durable Technologies," which focuses on industrial marking equipment.</i><br />Target victim <b>website</b>: <i>www.durable-tech.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vimeo-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31716</link>
<guid>3d1ed124d48ac4f12106b32decf840b0</guid>
<pubDate>Tue, 28 Apr 2026 05:38:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Vimeo-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>435fc106f5766671d53c12474f0f4b98708d661eba1cf427fa7f28462dd852c9</i><br /><br />Threat actor <b>description</b>: <i>Your Snowflake and Bigquery instances data was compromised thanks to Anodot.com. Pay or Leak. This is a final warning to reach out by 30 Apr 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 28 Apr 2026 | Warning: FINAL WARNING PAY OR LEAK</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Super-AI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31715</link>
<guid>4c24085bb62faf1e7e113767f837802d</guid>
<pubDate>Tue, 28 Apr 2026 04:12:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Super-AI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36cb8516e57efdc7d17d4111f7c579d415407da7a43cff9d714fe10d453a21e5</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>sumacinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31714</link>
<guid>4635d9474a5ef94cd03d40e385f4b177</guid>
<pubDate>Tue, 28 Apr 2026 03:26:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>sumacinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b62dc48929cd018938f15baf643fee1294f347acc26a62c4bd1521ce61c5b70e</i><br /><br />Threat actor <b>description</b>: <i>all client data 2tb</i><br />Target victim <b>website</b>: <i>sumacinc.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lifeline-PCS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31712</link>
<guid>872def1eaad20180f042ac8764629220</guid>
<pubDate>Mon, 27 Apr 2026 22:53:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Lifeline-PCS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb5f2e924603d680ad8f8e67b004e3b147e5305e517135af965956222b27c295</i><br /><br />Threat actor <b>description</b>: <i>0</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Birtcher-Anderson--Davis</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31710</link>
<guid>c070bfe7f385b5bdda1dcd920c4965a6</guid>
<pubDate>Mon, 27 Apr 2026 21:52:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Birtcher-Anderson--Davis</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>069fd3e918853fcea8e00d079438753a56c58ef60323a49b30c342b0bb9283a8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Floyd-Skeren-Manukian-Langevin-LLP-Information</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31709</link>
<guid>b96a8bcf64591ca8e9c43f114de1daba</guid>
<pubDate>Mon, 27 Apr 2026 18:38:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Floyd-Skeren-Manukian-Langevin-LLP-Information</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd1756132e6fdd7242c9378bb9401a893e89cf84a3d97fca100c151c8a4485d2</i><br /><br />Threat actor <b>description</b>: <i>Floyd Skeren Manukian Langevin, LLP is a multi-service law firm with ten offices throughout California…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>jgpetrucci.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31702</link>
<guid>ac3811a6c6bb180aa7db3e94fdab42cc</guid>
<pubDate>Mon, 27 Apr 2026 16:51:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>jgpetrucci.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a698caa8b43ed7752cc9d269e9ecf687ae6ec9cb5cd553afe02ac28950f7d1e6</i><br /><br />Threat actor <b>description</b>: <i>J.G. Petrucci Company, Inc. is a real estate development and construction company in the United S...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>ibswebsite.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31685</link>
<guid>f65c00c041bab77ab44874be15c53276</guid>
<pubDate>Mon, 27 Apr 2026 15:51:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>ibswebsite.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d1556a04f6783639e890500240ad81b8d6bb0dbbe9ff92e9cf35320b6a005b4f</i><br /><br />Threat actor <b>description</b>: <i>The company helps commercial organizations invest in technology solutions for their businesses by offering technology consulting,
as well as the design and inte...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>delonhampton.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31686</link>
<guid>1f034ade6c58fc442a66e4b2b71abbf8</guid>
<pubDate>Mon, 27 Apr 2026 15:51:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>delonhampton.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c03949c9ca0f1c023dd72d19ae1fa7d6ba492ecf76fd52532ef907fa669354e4</i><br /><br />Threat actor <b>description</b>: <i>An engineering and consulting firm specializing in civil and structural engineering, program management, and construction, delivering complex infrastructure pro...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>aotco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31687</link>
<guid>14f97b191b6fa0838c21882579b1e65a</guid>
<pubDate>Mon, 27 Apr 2026 15:51:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>aotco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>547f9db4159e02d7f7d2b3e608b1df5b55a4a66436292696347e6686d1425715</i><br /><br />Threat actor <b>description</b>: <i>AOTCO specializes in metal finishing solutions, offering a wide range of services, including electroplating, anodizing, and passivation,
and has over 45 years o...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>wmsopko.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31688</link>
<guid>7d1fb6b4eec12bee96b88020c7afadb8</guid>
<pubDate>Mon, 27 Apr 2026 15:51:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>wmsopko.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c260d31e80835044d03281beb46ea2ff83ad93fb96e23093f041382add25186b</i><br /><br />Threat actor <b>description</b>: <i>Wm. Sopko & Sons Co. supplies and distributes the full line of Dumore automatic self-feeding drilling and threading equipment</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>andrewtjohnson.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31689</link>
<guid>4538579b59251aec5bda1a4dce588ba4</guid>
<pubDate>Mon, 27 Apr 2026 15:51:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>andrewtjohnson.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e3bfae404f6e8ccfc424ab9d482794a272744f87e901da9790fdfb3e5f466ff</i><br /><br />Threat actor <b>description</b>: <i>The company is a leading provider of printing and reprographic services, offering image processing, printing, graphic design for exhibitions, copying, offset pr...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>fatbrands.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31690</link>
<guid>f33c64866907e92c0fe0ed10fcb56c9f</guid>
<pubDate>Mon, 27 Apr 2026 15:51:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>fatbrands.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2e49a298ed1c3c0732f880fad136108dacc2b91938e4f5333f8308a335f98603</i><br /><br />Threat actor <b>description</b>: <i>FAT Brands is a leading global franchising company that strategically acquires, promotes, and develops quick-service, fast-casual, 
and casual dining concepts a...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>mopec.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31691</link>
<guid>3218b56a27cc5d3acdac4a6b99195f75</guid>
<pubDate>Mon, 27 Apr 2026 15:51:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>mopec.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>09d01f576a5f0b76ae0053f56c0cc89111bca5c5bd2a776957de657cb171b408</i><br /><br />Threat actor <b>description</b>: <i>Mopec supplies American-made medical equipment and laboratory products for pathological, histological, autopsy, and morgue services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>avalonflooring.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31692</link>
<guid>cb2934ae5683eff802277d627c0ed3d3</guid>
<pubDate>Mon, 27 Apr 2026 15:51:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>avalonflooring.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8f62cfb2b4dc65c971d64290125195d9eeca749b497b2a07dc9c7ff3d44be13</i><br /><br />Threat actor <b>description</b>: <i>Avalon Flooring, founded in 1958 and located in Cherry Hill, New Jersey,
specializes in installing flooring in both residential and commercial spaces.
In additi...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>rosehillgardens.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31694</link>
<guid>afcf99a084ec63c94f1cf5094ba2b133</guid>
<pubDate>Mon, 27 Apr 2026 15:51:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>rosehillgardens.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8aab7f602bf113457c861de2b2a6da6874fb39777a08ebdceb0c77a62b4c2a8</i><br /><br />Threat actor <b>description</b>: <i>Rosehill Gardens is a professional landscaping company based in Kansas City, employing over 150 specialists in landscape design, maintenance, irrigation, lighti...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>massdevelopment.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31695</link>
<guid>36ab35b3020f5896ae18fc41567b76a1</guid>
<pubDate>Mon, 27 Apr 2026 15:51:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>massdevelopment.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24feb4b1d9d3938427ce90f67ea7b33c93d4c0ed06f4ff5337f67fd660ab12d4</i><br /><br />Threat actor <b>description</b>: <i>MassDevelopment, a state agency for finance and development, partners with businesses, 
nonprofit organizations, financial institutions, and local communities t...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>ldisolutions.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31683</link>
<guid>cd6539b09d112a53ba4098fe605df806</guid>
<pubDate>Mon, 27 Apr 2026 12:49:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>ldisolutions.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8cd356bccd1407b59c7d3ab6e91793b2cefbeaa0474981ca89cace11e2b31381</i><br /><br />Threat actor <b>description</b>: <i>Pneutronics, a division of Parker Hannifin Corporation's Instrumentation group, is a New Hampshire-based designer and manufacturer of pneumatic and electronic control systems serving diverse industrial markets. Founded in 1977 with the mission of combining pneumatics and electronics into modular package control solutions, Pneutronics has evolved from its initial focus on semiconductor equipment subsystems to become a trusted component supplier across kidney dialysis, patient monitoring, gas chromatography, automotive paint spray, and semiconductor equipment applications. Located in Hollis, New Hampshire, approximately one hour north of Boston, the company operates as part of Fortune 500 Parker Hannifin Corporation, headquartered in Cleveland, Ohio, providing access to world-class resources and global distribution capabilities.  Employees: 50 Revenue: $5 Million Industry: Industrial Machinery & Equipment  Phone Number: (866) 332-0700</i><br />Target victim <b>website</b>: <i>ldisolutions.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>MTCI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31676</link>
<guid>7974a38b2a42268066c03442b2cc922b</guid>
<pubDate>Mon, 27 Apr 2026 07:38:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>MTCI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>949fe514cdc98979390f2420c0f4d69d1266241c83905df417ee361a57214b42</i><br /><br />Threat actor <b>description</b>: <i> MTCI  Telecommunications and IT Consulting . Specializes in VoIP, structured cabling, network protection, and cloud services.  They highlight being an independent consultant (vendor-agnostic) and offer 24/7/365 support . They have won the Cincinnati US Regional Chamber of Commerce Small Business of the Year award.  11260 Chester Road, Cincinnati, Ohio, USA mtci.com  Leaked data: 320 Gb  company projects (including special projects of devices with drawings, air bridges, Wi-Fi bank and many other projects), information about employees with personal data, insurance, medical secrets; corporate information with guidance documents and correspondence with counterparties; finance; employee Video surveillance Files</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>reddycardiology.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31675</link>
<guid>f7652e68e0da3f415d7a0cb66da9c510</guid>
<pubDate>Mon, 27 Apr 2026 07:38:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>reddycardiology.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>88390be8ed5deffa0e6c3759aa0ae21409f6b12768f3abadde1dfcb7501df700</i><br /><br />Threat actor <b>description</b>: <i>Reddy Cardiology provides comprehensive cardiovascular care and diabetes management services in Sugar Land, TX. The clinic specializes in the prevention and treatment of heart disease, high blood pressure, and diabetes, utilizing state-of-the-art technology and personalized treatment plans. Their intended clients include adult patients referred by primary physicians for various cardiac symptoms and those seeking preventive care. Reddy Cardiology also offers a unique diet plan, the Reddy Diet, aimed at promoting heart health and managing diabetes. Employees: 50 Revenue: $5 Million Industry: Hospitals & Physicians Clinics Phone Number: (281) 491-0044</i><br />Target victim <b>website</b>: <i>reddycardiology.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>A--A-Building-Material</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31670</link>
<guid>031f41342d850a9c4e0997d626ffe73c</guid>
<pubDate>Sun, 26 Apr 2026 19:56:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>A--A-Building-Material</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4516b1c49818427da816103e9b5fbd6f12eb54782fd9411bf5a61f6ae3b2c506</i><br /><br />Threat actor <b>description</b>: <i>Home Improvement & Hardware Retail</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Walman-Optical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31664</link>
<guid>3484575740e7d74362f6a1ab0ac89a50</guid>
<pubDate>Sun, 26 Apr 2026 16:15:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Walman-Optical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e97395d1328a60673af8058e74a743606b0e48f537e9966de494d76953cbb18f</i><br /><br />Threat actor <b>description</b>: <i>Walman Optical who is owned by well-known Company EssilorLuxottica is a U.S.-based optical company founded in 1915 and headquartered in Minneapolis, Minnesota. It is a leading manufacturer and distributor of ophthalmic products, including prescription lenses, frames, and optical equipment. The company primarily serves eye care professionals such as optometrists and ophthalmologists by providing advanced lens technologies, coatings, and laboratory services. With multiple locations and production facilities across the United States, Walman Optical has built a strong reputation in the vision care industry. As part of EssilorLuxottica, the company benefits from global resources, innovation, and an expanded market presence. 
The company headquarters is located in 801 12th Avenue North, Minneapolis, Minnesota 55411, United States with 1K - 5K Employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>bladex.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31663</link>
<guid>47c95199b010148056eda6ac6f961c63</guid>
<pubDate>Sun, 26 Apr 2026 09:55:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>bladex.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a98eb4c40ac2c332770595e141390839afd7d5ae3cc209b4fdcf8be96e0a9611</i><br /><br />Threat actor <b>description</b>: <i>Bladex, a multinational bank originally established by the central banks of Latin-American and Carib...</i><br />Target victim <b>website</b>: <i>bladex.com</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>CHECKMARX</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31660</link>
<guid>d279b7b85cdc6930ed48a94c79f7a92d</guid>
<pubDate>Sat, 25 Apr 2026 21:11:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lapsus$</b> claims attack for <b>CHECKMARX</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a90be54023228a5102bed05400e6d88166bd2511a3ba6e94156dfeea16381e3</i><br /><br />Threat actor <b>description</b>: <i>Source Code, Employee DB, API Keys, MongoDB/MySQL Creds</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lapsus$</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chase-Cooper-Limited-RiskLogix-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31658</link>
<guid>29aaf96073ec131b599f9b6cee22199e</guid>
<pubDate>Sat, 25 Apr 2026 16:56:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Chase-Cooper-Limited-RiskLogix-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9320c7525ecc64a1fde74748942303c1fb2a43df9352b2f01655ddf714beb0b6</i><br /><br />Threat actor <b>description</b>: <i>Software</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>LA-Woodworks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31644</link>
<guid>1441f32b14b8433d109f166d7668c4ce</guid>
<pubDate>Sat, 25 Apr 2026 15:56:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>LA-Woodworks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1dd89dc7ddf93705b85973d9f82dcf255f3f3ef5ca32fc3f6921fd159d82290</i><br /><br />Threat actor <b>description</b>: <i>Furniture</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Buckley-Powder</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31645</link>
<guid>4ebcff140cef36926eddf245293c8f5b</guid>
<pubDate>Sat, 25 Apr 2026 15:56:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Buckley-Powder</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa6444cdd2741b17fd402ba8c0eec7a1ac54cc0141ccaacd92c855f5dab99908</i><br /><br />Threat actor <b>description</b>: <i>Manufacturing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dillon-Family-Medicine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31648</link>
<guid>d54c1acef541c844cc5d47d6a25cb029</guid>
<pubDate>Sat, 25 Apr 2026 14:57:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Dillon-Family-Medicine</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6495c0558f8baedf9f53f8faa78f2e40e36bc560b6068412bdee7ef347c37683</i><br /><br />Threat actor <b>description</b>: <i>0</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>KEMBA-Indianapolis-Credit-Union</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31657</link>
<guid>42bf85e14dc95c0ad727255443108b73</guid>
<pubDate>Sat, 25 Apr 2026 14:47:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>KEMBA-Indianapolis-Credit-Union</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a29bb8de9fc322dbf08a29eb616a65cfcaf16d083970680a5d6e8ab6e9e8d47</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.mykemba.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>First-County-FCU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31655</link>
<guid>0f09698017af107026ad0b0be011fa73</guid>
<pubDate>Sat, 25 Apr 2026 14:47:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>First-County-FCU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ce79e2d35da18769c71e5727c3bf35dde12066b7c7641a6afa81ff58c7c6cd8</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.firstcountyfcu.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chelten-House</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31654</link>
<guid>26079c271736e881b2c523644f8de690</guid>
<pubDate>Sat, 25 Apr 2026 14:46:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Chelten-House</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>83df1290a01f680f0c5954242b051437f85b6d6f2a1edede13760e0b32a308cb</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.cheltenhouse.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mid-Florida-Dermatology--Plastic-Surgery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31651</link>
<guid>7829e6d847f0b9d897d940aa3f3b7b46</guid>
<pubDate>Sat, 25 Apr 2026 14:45:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Mid-Florida-Dermatology--Plastic-Surgery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7997f25789c5c1835c15781cd1a369d83867e0710aa79ca68075f95b96e74ea2</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.midflmed.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Swansea-Ambulance-Corps</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31650</link>
<guid>05205552655b321c2b5eb6c76daeea63</guid>
<pubDate>Sat, 25 Apr 2026 13:35:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Swansea-Ambulance-Corps</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>32e2f8f6dfab8ff4faa88ba4aff45c1b958bd5889f555bd497b4169ee76d823f</i><br /><br />Threat actor <b>description</b>: <i>Data is not available now.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Progressive-Propane</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31638</link>
<guid>3ad980cc442688dcd2cb1052725e2683</guid>
<pubDate>Fri, 24 Apr 2026 19:56:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Progressive-Propane</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0101e93b8b91997919d7d90e36962e3cb4ae9176f81ec9af73953729f83952ab</i><br /><br />Threat actor <b>description</b>: <i>Electricity, Oil & Gas</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Priests-for-Life</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31639</link>
<guid>66f870cbf6b7ef5d6d1c8a3d4671e775</guid>
<pubDate>Fri, 24 Apr 2026 18:56:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Priests-for-Life</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>49649700e681ef44f2253d993b93da27ae62df2921be91bcfb8d2b9efddfb682</i><br /><br />Threat actor <b>description</b>: <i>Non-Profit & Charitable Organizations</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Flipo-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31640</link>
<guid>00b0b4deb1406b3141a6de7c3950a424</guid>
<pubDate>Fri, 24 Apr 2026 18:56:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Flipo-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22c5cecbb6a880ab5348518d959761b82fb55364438dd33dd2410ea6fb6251ee</i><br /><br />Threat actor <b>description</b>: <i>Retail · Pennsylvania</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>METO-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31634</link>
<guid>d01d080783ec584fbcdeda594b17b442</guid>
<pubDate>Fri, 24 Apr 2026 15:11:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>METO-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee1d96a796c729a7c3b847321a00976a9f05140b217cd1705f8e6a50aef39f7b</i><br /><br />Threat actor <b>description</b>: <i>METO Systems designs and manufactures stainless-steel industrial material‑handling equipment for regulated industries. Products include lifts, blenders, transporters, and docking systems, they offer installation, training, customization, and support.</i><br />Target victim <b>website</b>: <i>www.metosystems.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>tlctrialteam.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31633</link>
<guid>0dd552b30e0889e7fffcc386e3508484</guid>
<pubDate>Fri, 24 Apr 2026 15:08:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>tlctrialteam.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c08e26a93cbe3406fc36ea779ce25b2e6580d6b6dc9853cc0b151714a1c51792</i><br /><br />Threat actor <b>description</b>: <i>TLC Trial Team is a personal injury law firm based in Winter Haven, Florida. The firm handles accident and injury-related cases.</i><br />Target victim <b>website</b>: <i>tlctrialteam.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rockville-Fuel--Feed</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31632</link>
<guid>a2ee868039973701dbacf41a3c5af4ba</guid>
<pubDate>Fri, 24 Apr 2026 13:28:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Rockville-Fuel--Feed</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c60d681826565b4a172a3a6b3b75bf5c070cace44405823489ba355480d853d1</i><br /><br />Threat actor <b>description</b>: <i>Rockville Fuel & Feed Co., Inc. is a premier supplier of ready mix concrete serving the Marylan
d suburbs of Washington DC. With multiple plants across five major counties and a fleet of over
65 trucks, the company caters to construction projects of all sizes, ensuring timely and relia
ble delivery.

We will upload corporate data soon. Employee personal documents (passports, DLs (over 100), med
ical and financial information), client information, contracts and agreements, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Udemy-Inc.-udemy.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31628</link>
<guid>6c982c9657a6661e773e6cc2b48250aa</guid>
<pubDate>Fri, 24 Apr 2026 07:59:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Udemy-Inc.-udemy.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d8709c54c32faadf2429bc74626f916d1c1e884d64978719b38e47d281ed5368</i><br /><br />Threat actor <b>description</b>: <i>Over 1.4M records containing PII and other internal corporate data have been compromised. Pay or Leak. This is a final warning to reach out by 27 Apr 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 24 Apr 2026 | Warning: FINAL WARNING PAY OR LEAK</i><br />Target victim <b>website</b>: <i>udemy.com</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>ADT-Inc.-adt.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31627</link>
<guid>8ecb8ebb08e20837963e95b2d8eded47</guid>
<pubDate>Fri, 24 Apr 2026 07:58:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>ADT-Inc.-adt.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>348a1e1684299b16bba7a05cb9ad54b132fa8caf1ab5b6b025de405a74316aa0</i><br /><br />Threat actor <b>description</b>: <i>Over 10M records containing PII and other internal corporate data have been compromised. Pay or Leak. This is a final warning to reach out by 27 Apr 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 24 Apri 2026 | Warning: FINAL WARNING PAY OR LEAK</i><br />Target victim <b>website</b>: <i>adt.com</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chartwell-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31626</link>
<guid>51e04cd4e55e7e415bf24de9e1b0f3ff</guid>
<pubDate>Thu, 23 Apr 2026 20:18:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Chartwell-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48224849d44aebd7c385c3b8bccb95df39e13e011528e970fa8a92bc1c2a9bd7</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Chartwell Law is a United States-based law firm specializing in insurance defense litigation. Operating primarily across multiple states, the firm represents insurance companies, self-insured entities, and businesses in matters including workers compensation, general liability, professional liability, and coverage disputes. It is known for providing legal counsel and courtroom representation within the broader insurance and legal services industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mothers-Market--Kitchen</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31625</link>
<guid>8ad2f16f1cfd0d6443a089c0624042b4</guid>
<pubDate>Thu, 23 Apr 2026 20:18:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>Mothers-Market--Kitchen</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d940c8190f04c138cf029fc83a35f0ab59eb3969b5adc30118caf07c946f6ef9</i><br /><br />Threat actor <b>description</b>: <i>Mother's has gained a reputation for having a wide selection for specialized diets, top quality local and organic produce, the county's largest selection of supplements.The data archive contains personal data of employees: ssn+dob+name+home address+phone</i><br />Target victim <b>website</b>: <i>mothersmarket.com</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>B-to-B-Visions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31616</link>
<guid>fd982f3faf6faa7b8049fcb713afb2b7</guid>
<pubDate>Thu, 23 Apr 2026 19:51:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>B-to-B-Visions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>90b72bc2b7de5faf940b72c55f0b8f8535de98d57d7f6d99c23fc45ff3de47b3</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-FAFS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31618</link>
<guid>ec04a75ca6302d347df2f803efe8c5bd</guid>
<pubDate>Thu, 23 Apr 2026 19:51:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-FAFS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9e38127da1e69faa84bbcdb290921eced6c95c66e6a2e74e9542564c2b27ea7</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Napoleon-Ohio</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31624</link>
<guid>493c8b3821e768713a4d1c5b1e7f5ad4</guid>
<pubDate>Thu, 23 Apr 2026 18:06:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>City-of-Napoleon-Ohio</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>297db35b92cfe762bbf6a189b5c983dc38e2bf5d0db9ad2de72023976ba9b2a5</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.napoleonohio.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alkegen</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31615</link>
<guid>3a68abc388606a36771c8c8b8bf64129</guid>
<pubDate>Thu, 23 Apr 2026 15:57:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Alkegen</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>09a5f6c2fe3a68c10f6809f5cd9d3dbf925335683ee2e4d1bc51c094824b1c3d</i><br /><br />Threat actor <b>description</b>: <i>Alkegen creates high performance specialty materials used in adva
nced applications including electric vehicles, energy storage, fi
ltration, fire protection and high-temperature insulation, among 
many others.

We will upload 57gb of corporate data soon. Employee personal doc
uments (passports, DLs, contacts, addresses, medical information 
and so on), client personal information, lots of confidential fil
es, projects, contracts and agreements, detailed financials, NDAs
, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Virginia-Health-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31611</link>
<guid>30de3848a3d427de6774066e0b9b09bc</guid>
<pubDate>Thu, 23 Apr 2026 12:53:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Virginia-Health-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>916d0c5fdb21f42deec278f80597a87b21f69a28eaa44b3be9b286ba994d9e7e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Precision-Coating</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31608</link>
<guid>4f2bed48f31aa4f70b89c5e87a60e3e9</guid>
<pubDate>Thu, 23 Apr 2026 09:57:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Precision-Coating</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f09e86b13e15fcf4401b5cd6535489e6d0f42ea366c2502ea93574e16cb86449</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A

There are multiple companies operating under the name "Precision Coating" across various industries and countries, and without additional context such as location or sector, I cannot reliably identify a specific organization to provide an accurate and factual description without risking confusion or misinformation.</i><br />Target victim <b>website</b>: <i>precisioncoating.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Integer-Holdings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31607</link>
<guid>a71f9f47d27e10623154025319152a82</guid>
<pubDate>Thu, 23 Apr 2026 09:56:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Integer-Holdings</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5861980b43c9589f07070fa0b0984f4c68cee4a0601eba3ab3cea926bb6a4e0</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Integer Holdings is a US-based medical device manufacturer headquartered in Frisco, Texas. The company specializes in producing advanced technologies for the medical, non-medical, and portable medical markets, including batteries, power systems, and implantable components. It serves original equipment manufacturers across cardiac, neuromodulation, and vascular sectors, making it a key supplier in the global medical device industry.</i><br />Target victim <b>website</b>: <i>integer.net</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aptim</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31604</link>
<guid>7e64ef4e0d891aed100893d4ba43bb15</guid>
<pubDate>Thu, 23 Apr 2026 09:54:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Aptim</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>62d3d395006ab7e87afd40d6b212d617e965bf3b6423d81617327137be00f8e5</i><br /><br />Threat actor <b>description</b>: <i>$krb5pa$23$APTIM.COM$APTIM.COM$$9936cd67a6d3d8560aaa25bb4a7a03b0bb8dfbbdbac8fed06e9262c41dce5ee567d0f7b52928d3626e43c0a7cfac4fb1a9b90887
$krb5pa$23$aptim.com$aptim.com$f7a8e75a2c6d3610fe9f4b34bec2a...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>SmartSystems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31603</link>
<guid>913c130aa3a3e9780ee459eadf80c05c</guid>
<pubDate>Thu, 23 Apr 2026 06:28:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>SmartSystems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1988557ae972b9c75fb4bece45d536f6b4983ba2decac7e23223e27727288921</i><br /><br />Threat actor <b>description</b>: <i>iesmartsystems.com zoominfo.com/c/smart-systems/139592895 Technology integrator since 2000 — Founded in Houston, Texas by Gary and Doug Colvin, i.e. Smart Systems has over 25 years of experience delivering design-build technology solutions for commercial clients.Core services: A/V, Cabling & Security — The company specializes in audio/video systems, structured cabling (fiber optic, voice, network), security systems (video surveillance, access control), wireless networks, and video conferencing solutions.Strong client loyalty — More than 90% of their business comes from repeat customers, ranging from small municipalities to large publicly-traded corporations; they serve universities, oil & gas campuses, banks, and more across Texas.Award-winning company — i.e. Smart Systems is a four-time Houston Business Journal Fast Tech 50 award recipient, with ~94 employees and revenue of approximately $18.7 million.</i><br />Target victim <b>website</b>: <i>iesmartsystems.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tractial</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31599</link>
<guid>5342cfbc5928c7c95d2b1843f4ae9531</guid>
<pubDate>Thu, 23 Apr 2026 02:59:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Tractial</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dfa6d5b03c465ffad6a0a155834f3b25fd496ff28ad40472ee226f0fe19aefa1</i><br /><br />Threat actor <b>description</b>: <i>A small but substantial data breach at a fintech company.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Marnell-Financial-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31598</link>
<guid>d5fc93640233c90c41c729d8b185bd56</guid>
<pubDate>Thu, 23 Apr 2026 02:58:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Marnell-Financial-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cfc59e32d2980709708a2c01f8d872888baf60cd25eed949073399ce376dc220</i><br /><br />Threat actor <b>description</b>: <i>Data breach at financial company.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>trugreen.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31597</link>
<guid>63fe372a44401791d215daa2eedb8b7c</guid>
<pubDate>Wed, 22 Apr 2026 22:50:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>trugreen.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee2d6c99ec9d8b9f72cef9931d91c30da8610b25d4b266114195206d4b40b567</i><br /><br />Threat actor <b>description</b>: <i>TruGreen is the nation's leading lawn care provider offering neighborhoods across the country tailored lawn, tree and shrub care along with protection against mosquitoes and other pests. As a company rooted in scientific expertise with a customer-centered approach, TruGreen helps homeowners achieve an outdoor living space that brings them pride. Employees: 10k+ Revenue: $2.9 Billion Industry: Consumer Services Phone Number: (833) 830-2305</i><br />Target victim <b>website</b>: <i>trugreen.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>teamster773.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31596</link>
<guid>7570fece02991134d0785190d9e5a4eb</guid>
<pubDate>Wed, 22 Apr 2026 22:50:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>teamster773.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1b05f2e62d742e79ccfe78708436696265d998d295a9441852cd29c66d002be</i><br /><br />Threat actor <b>description</b>: <i>Teamsters Local 773 is a union dedicated to building unity and power for working people in the Greater Lehigh Valley. They focus on educating and engaging members, organizing unorganized workers, and mobilizing them to stand in solidarity. The union advocates for strong contracts, better pay, job security, and dignity in the workplace, empowering employees to effect positive changes in their work environments. With over a century of experience, Teamsters Local 773 provides support and resources to ensure that every member has the opportunity to thrive. Employees: 50 Revenue: $5 Million Industry: Membership Organizations Phone Number: (610) 434-4451</i><br />Target victim <b>website</b>: <i>teamster773.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jackson-Lewis</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31595</link>
<guid>196f47aa4d2237535c1c559def28e60f</guid>
<pubDate>Wed, 22 Apr 2026 22:40:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Jackson-Lewis</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ef0d06c7d24759fde8f4cb689f02cd82b2ee34698f914d686bb4c89ab9a61125</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Jackson Lewis P.C. is a United States-based law firm specializing exclusively in workplace law and employment-related legal services. Founded in 1958 and headquartered in New York, the firm operates across numerous offices throughout the country. It advises employers on labor relations, workplace safety, litigation, immigration, and employee benefits, serving clients across a wide range of industries nationwide.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>INCYTE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31591</link>
<guid>680fd12be44eee12aee2a2e023438a5d</guid>
<pubDate>Wed, 22 Apr 2026 21:55:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>INCYTE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab033df56a873c42bec4501078bc33e8978f60651480fbf67d5a7a1d7e40aee5</i><br /><br />Threat actor <b>description</b>: <i>Incyte Corporation, a biopharmaceutical company, focuses on the discovery, development, and commercialization of various therapeutics in the United States. The ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>alexandergroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31593</link>
<guid>14b5caec7ac6a9609e748d56a17c174b</guid>
<pubDate>Wed, 22 Apr 2026 21:28:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>alexandergroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b9d3ecb8821ed4bdc06403814978d41f17b4ca0badf70572f432d7fdcdeec2b7</i><br /><br />Threat actor <b>description</b>: <i>The company is disregarding its customers' data. If a deal is not reached within 48 hours, the files will be made public.

The Alexander Group is a revenue growth and sales management consulting company. It is headquartered in Scottsdale, Arizona</i><br />Target victim <b>website</b>: <i>www.zoominfo.com/c/the-alexander-group-inc/3639791</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>krwlawyers.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31592</link>
<guid>cc7146d26842552ef3ae620e96a796ec</guid>
<pubDate>Wed, 22 Apr 2026 19:52:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>krwlawyers.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b358a536d1f7daf1985ce788722884d49212e627504beb1db64039d5c65462c</i><br /><br />Threat actor <b>description</b>: <i>At KRW Lawyers, we understand the profound impacts that an unexpected accident can have on your physical, emotional, and financial well-being. Our personal injury and mass tort lawyers are dedicated to holding negligent parties accountable and recovering a comprehensive settlement for all your current and future care needs.   With decades of experience and over $1 Billion recovered, you can trust our attorneys to represent your best interests in and out of the courtroom. Our firm is proud to have its members recognized by Super Lawyers and Martindale-Hubbell, underscoring our impressive record of results and commitment to excellence, integrity, and service.</i><br />Target victim <b>website</b>: <i>krwlawyers.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>S4K-Entertainment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31590</link>
<guid>a5937eff64a8a3846e8e578938ba5629</guid>
<pubDate>Wed, 22 Apr 2026 16:39:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>S4K-Entertainment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>84f595b45c3a9a394026c21bfd18344bbb4a11ecc65316441263182f297812c1</i><br /><br />Threat actor <b>description</b>: <i>S4K Entertainment is producing a series of Shakespeare 4 Kidz mov
ies for theatrical release.

We will upload 28gb of corporate data soon. Employee information 
(passports, DLs and so on), contracts and agreements, projects, f
inancials, NDAs, partners and client data and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kubiak-Melton--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31589</link>
<guid>e25499084e50b281cfc663be51ad40ef</guid>
<pubDate>Wed, 22 Apr 2026 16:39:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Kubiak-Melton--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48b2304728f000f259a3ba5a2f4df2170c64ff54a5f7aa8749fac535baeb8b5e</i><br /><br />Threat actor <b>description</b>: <i>Kubiak & Melton, LLC provides audit, tax and bookkeeping services
. We prepare monthly financial statements, governmental complianc
e forms, payroll, and tax returns.

We will upload 12gb of corporate data soon. Client personal infor
mation (passports, DLs, birth and death certs, SSNs, addresses, p
hones, CC statements and much more), client financial information
, financials, NDAs, numerous internal confidential files, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Galliher-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31581</link>
<guid>a714b6bada5e4ad469abf003c9d2c3d8</guid>
<pubDate>Wed, 22 Apr 2026 11:55:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>The-Galliher-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc395e4743232876ad7cd6bb46937d44c55b286ae99cbadd304f71687d08b638</i><br /><br />Threat actor <b>description</b>: <i>The Galliher Law Firm, established in 1974, specializes in personal injury law, providing dedicated legal representation to clients in Las Vegas and surrounding...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rutan--Tucker-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31580</link>
<guid>7c7994618ab9ec08e3e913145fcbab5e</guid>
<pubDate>Tue, 21 Apr 2026 23:18:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Rutan--Tucker-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a45f8ac9cc4956026418aa9416bb1ef909d17d30ecb2fdb9d8365e38fb6c8820</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1909 and headquartered in Costa Mesa, California, Rutan & Tucker, LLP. is a law firm. The F…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>K2-Electric-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31579</link>
<guid>e2ffe6e3efad872631508762c767e73b</guid>
<pubDate>Tue, 21 Apr 2026 20:34:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>K2-Electric-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e734712a74256ab1d8285cd75af0fcde2ea1b09d2ae5d85311015e192fbf4af4</i><br /><br />Threat actor <b>description</b>: <i>Commercial and industrial electrical contractor.</i><br />Target victim <b>website</b>: <i>k2elec.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>PTS-Office-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31575</link>
<guid>ee36a2060ec0721650bf82c39619ab88</guid>
<pubDate>Tue, 21 Apr 2026 19:56:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>PTS-Office-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24a420404c064c46b5e7d80ab9296a3251b806d2b2a3a6a3d27c8d6918a3eec6</i><br /><br />Threat actor <b>description</b>: <i>Retail · Pennsylvania</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Heartland-Steel-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31577</link>
<guid>ce65aa143183d7336a8e77d192e7e44e</guid>
<pubDate>Tue, 21 Apr 2026 18:14:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Heartland-Steel-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>13222eec190965218e49dcc86c19c2961766be14737f87873c79ae7850b86d61</i><br /><br />Threat actor <b>description</b>: <i>Building Materials</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ferguson-Timar</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31565</link>
<guid>cdcd90c0088d9a4cb0f2bae4a4480a8d</guid>
<pubDate>Tue, 21 Apr 2026 17:55:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Ferguson-Timar</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbb50033cd5817506e96d7979dff7d3483f1e79ca94bd65256d4fd5e56e05b47</i><br /><br />Threat actor <b>description</b>: <i>Finance</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Safety-Engineering-Laboratories</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31566</link>
<guid>cfbc4c656854352ff0ed6f6975d35c4c</guid>
<pubDate>Tue, 21 Apr 2026 16:55:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Safety-Engineering-Laboratories</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f8856f427c151bf6a7928948c759f7b42e498e27a4bcff48bb30201a86063fb8</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ruskcountywi.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31567</link>
<guid>9f5a7b69549df5b26dcb95a74bae98eb</guid>
<pubDate>Tue, 21 Apr 2026 16:55:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>ruskcountywi.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aeae8d5fa80b1a03b516978a0f421bb167a68cfafd968912c2a9ec4bcbcb4739</i><br /><br />Threat actor <b>description</b>: <i>Government</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Salimetrics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31571</link>
<guid>71395be63174d9842f3e2b0c3520ed5e</guid>
<pubDate>Tue, 21 Apr 2026 15:49:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Salimetrics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7311157e65b689d737b0c649fe35a3993e62f694a324c4909c45b1c6d63309f7</i><br /><br />Threat actor <b>description</b>: <i>Salimetrics specializes in salivary bioscience, offering industry
-standard saliva collection methods, salivary assay kits, and tes
ting services for reliable results. Their products cater to resea
rchers and clinicians involved in biobehavioral research and diag
nostics, providing tools for sample collection and analysis. 

We will upload corporate data soon. Employee information, patient
s information (blood tests and other health information), financi
als, internal confidential files and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alva-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31570</link>
<guid>1c8dcf919f8a604f3a488b0e4b0f1420</guid>
<pubDate>Tue, 21 Apr 2026 15:49:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Alva-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bad3792abd4f2fe409fc3fe98e3e651f77ba74f2d6f16cdd117947942c4135fd</i><br /><br />Threat actor <b>description</b>: <i>Alva Manufacturing specializes in CNC precision machining, focusi
ng on milling and multi-axis turning for high-tech industries suc
h as defense and space. They utilize state-of-the-art automated m
achining centers and advanced measuring technology, including Hex
agon CMM and Keyence systems.

We will upload corporate data soon. Employee information (passpor
ts, SSNs, addresses, phones, photos and so on), projects (BOEING 
and Lockheed Martin files and so on), financials, lots of NDAs an
d so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>MAC-Construction--Excavating</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31564</link>
<guid>e69cf84ed41fbe71985972c027190b49</guid>
<pubDate>Tue, 21 Apr 2026 14:20:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>MAC-Construction--Excavating</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e26a893a1a91072d84bb21af06131d35eccb8c023836c2c5d2f64f76e4535f80</i><br /><br />Threat actor <b>description</b>: <i>MAC is a diversified construction company with integrated divisio
ns working closely together to provide a wide variety of quality 
construction and excavation services, quality workmanship - produ
ced by quality people. 

We will upload 30gb of corporate data soon. DB data (Salary / Inc
ome 2490386 rows, Physical Address 223606 rows,Online Account 123
070 rows, Phone / Fax 111784 rows, Bank / Financial 73100 rows, I
P / Device 5923 rows, Password / Secret 1783 rows, Tax ID 1686 ro
ws, Name (Person) 1074 rows, Email 967 rows, Photo / Biometric 13
7 rows, FR - Contact 100 rows, Property 28 rows, Employment 18 ro
ws, SSN / National ID 8 rows) and a lot of other internal files.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arctic-Home-Living</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31562</link>
<guid>4b1905cff5bc8b47ae1c9d92e2c759df</guid>
<pubDate>Tue, 21 Apr 2026 12:49:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Arctic-Home-Living</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5752df38a92037c39f1cb847e2be31f50f7c7385d9ff9d67ab5d28a47c6c6bf3</i><br /><br />Threat actor <b>description</b>: <i>Arctic Home is Alaska's locally owned hot tub dealer with over 25
years of experience, specializing in premium hot tubs, spas, sau
nas, and cold plunges designed for the unique Alaskan environment
.

We will upload corporate data soon. Employee information (scanned
passports, DLs, I9s, SSNs, credit cards information and so on), 
customer data, agreements, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Samuel-I.-White-PC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31558</link>
<guid>20c26296a2b1def8331cd4c4a604dd41</guid>
<pubDate>Tue, 21 Apr 2026 03:51:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Samuel-I.-White-PC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f795a52aa1b723b4e6c4b7e330ae067f327d082fee21e624986e77ee8ad986f</i><br /><br />Threat actor <b>description</b>: <i>Significant breach at a law firm.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Be-Juice</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31546</link>
<guid>c695c406dd17d2fc9dbfe917adaf9e33</guid>
<pubDate>Mon, 20 Apr 2026 20:56:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Be-Juice</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d886ccdaa2f265f3a8f3a810bdd67b504d2cd8b2af28fded2424e5a4a4db9c5</i><br /><br />Threat actor <b>description</b>: <i>Grocery Retail</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>rheem</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31554</link>
<guid>f427810d6c49d16a865d20c29ac11e61</guid>
<pubDate>Mon, 20 Apr 2026 20:36:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>rheem</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57cf47c3500b90905430934fd6c9d6700f7efb51e482920f4cc4f9946729a6e3</i><br /><br />Threat actor <b>description</b>: <i>Rheem Manufacturing Company   1100 Abernathy Road, Suite 1700 Atlanta, GA 30328, United States www.rheem.com  is a well-established manufacturer specializing in heating, cooling, and water heating products. Founded in 1925, the company has its headquarters in Atlanta, Georgia, and has grown to become a global leader in its industry. Company Overview. Rheem produces a wide range of products, including residential and commercial water heaters, boilers, air conditioning units, and heating, ventilation, and air conditioning (HVAC) equipment. The company is particularly noted for its commitment to energy efficiency, offering numerous ENERGY STAR® certified products.   Leaked data: 320 GB (479,856 Files, 76,897 Folders) includes developments: technical documentation, drawings, test reports and other technical information, employee data containing personal information, corporate information, contracts and agreements (including non-disclosure agreements), financial information and metrics, and much more.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Commscope</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31552</link>
<guid>4c7e17f10bce99f0c3df0f414eb9165c</guid>
<pubDate>Mon, 20 Apr 2026 20:30:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Commscope</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>abdbabe6da9fc78fb54665fc68d8aac5a4412ba85d5b825a5c2f96128d7269a8</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] CommScope is an American telecommunications infrastructure company headquartered in Hickory, North Carolina. It designs and manufactures network infrastructure solutions including cables, connectivity systems, wireless equipment, and data center infrastructure. The company serves telecommunications providers, enterprises, and government clients worldwide. Founded in 1976, CommScope operates globally across the broadband, wireless, and enterprise networking industries.</i><br />Target victim <b>website</b>: <i>Commscope.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>SEL-Safety-Engineering-Laboratory</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31544</link>
<guid>0628fc4708a87a5ad6fa86481d86836b</guid>
<pubDate>Mon, 20 Apr 2026 19:54:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>SEL-Safety-Engineering-Laboratory</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c6fab8bcd3542e68e7b5721ecdf99df76e7441d77418d79d7b94ba50c122b37f</i><br /><br />Threat actor <b>description</b>: <i>Software</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Go-Solution</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31543</link>
<guid>5cfcbafd768519bce51371aae5cac8fb</guid>
<pubDate>Mon, 20 Apr 2026 17:44:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-Go-Solution</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>001eab12d7945993de732265aa78d00cd19e2ac2199da246888b6d946317cad4</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>imbriefamilylaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31540</link>
<guid>b16a06a5ea94028944a81ad5bbdbb8ca</guid>
<pubDate>Mon, 20 Apr 2026 14:39:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>krybit</b> claims attack for <b>imbriefamilylaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d757dabe290020eaaa47af89ee0ea64d6394f640b250e3c9a9c9cb08cd772dc6</i><br /><br />Threat actor <b>description</b>: <i>The attorneys at the Imbrie Law Firm practice primarily in the following counties: Brazos, Robertson, Burleson, Lee, Gri...</i><br />Target victim <b>website</b>: <i>imbriefamilylaw.com</i>]]></description>
<category>krybit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nutrabio</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31534</link>
<guid>f5680c1280b1c59b6bf77b0f5b3d92d6</guid>
<pubDate>Mon, 20 Apr 2026 02:34:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Nutrabio</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30c4e06f4ac3f6d25e214b65246cf9a767eca54bb5257768c0fb28928cb0421a</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] NutraBio is a US-based dietary supplement manufacturer founded in 1996 and headquartered in Middlesex, New Jersey. The company operates in the health and wellness industry, producing sports nutrition products including protein powders, pre-workouts, vitamins, and recovery supplements. NutraBio is known for its commitment to transparency, using fully disclosed labels and manufacturing products in an FDA-registered, cGMP-certified facility.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Citizens-Bank</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31530</link>
<guid>855574f497fe975ae99d6b7d5353c0e8</guid>
<pubDate>Mon, 20 Apr 2026 02:32:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Citizens-Bank</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6de7233f272222aa89df9d97aaa3b6c983b8ffff8e02fe12070328e6bbf49386</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Citizens Bank is a major American retail and commercial bank headquartered in Providence, Rhode Island. Operating within the financial services industry, it offers a wide range of products including personal and business banking, loans, mortgages, credit cards, and wealth management services. It serves millions of customers across the United States through branches, ATMs, and digital banking platforms.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Frost-Bank</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31529</link>
<guid>7d3d99bab1c841a23a2d7b50ebd7b7bb</guid>
<pubDate>Mon, 20 Apr 2026 02:32:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Frost-Bank</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6171cb97c88843cbdf26266e90a2ee96676824eaeeb7956615cfefe4931bac5</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Frost Bank is a Texas-based financial institution and a subsidiary of Cullen/Frost Bankers, Inc. Founded in 1868 and headquartered in San Antonio, it operates across major Texas cities offering personal and commercial banking, wealth management, insurance, and investment services. As one of the largest independent banks in Texas, it serves individuals, businesses, and institutions within the United States financial services industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pitney-Bowes-Inc.-pb.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31526</link>
<guid>357eef2143cfb46c8d49017ebd7689b5</guid>
<pubDate>Sun, 19 Apr 2026 18:06:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Pitney-Bowes-Inc.-pb.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a720471705f49ea790d62ac5839dfad92524d12d3c0f850deba4924cde403edb</i><br /><br />Threat actor <b>description</b>: <i>Over 25M Salesforce records containing PII have been compromised. Pay or Leak. This is a final warning to reach out by 21 Apr 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 18 Apr 2026 | Warning: FINAL WARNING PAY OR LEAK</i><br />Target victim <b>website</b>: <i>pb.com</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>7-Eleven-Inc.-7-eleven.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31525</link>
<guid>92b5eb942a693af473d741b2c487fdd5</guid>
<pubDate>Sun, 19 Apr 2026 18:06:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>7-Eleven-Inc.-7-eleven.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b87d2062b4b04bbbc11cd22319da9a5356f14db6a37a8241dab26980fed07a5</i><br /><br />Threat actor <b>description</b>: <i>Over 600k Salesforce records containing PII and other internal corporate data have been compromised. Pay or Leak. This is a final warning to reach out by 21 Apr 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 18 Apr 2026 | Warning: FINAL WARNING PAY OR LEAK</i><br />Target victim <b>website</b>: <i>7-eleven.com</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carnival-Corporation--plc-carnivalcorp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31524</link>
<guid>ce20169db964e41ea7518836aab50628</guid>
<pubDate>Sun, 19 Apr 2026 18:06:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Carnival-Corporation--plc-carnivalcorp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c16f736b1ca85bdb8a88ceddf44ad87b464e577161718edcd9069a89b78e638c</i><br /><br />Threat actor <b>description</b>: <i>Over 8.7M records containing PII and other terabytes of internal corporate data have been compromised. Pay or Leak. This is a final warning to reach out by 21 Apr 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 18 Apr 2026 | Warning: FINAL WARNING PAY OR LEAK</i><br />Target victim <b>website</b>: <i>carnivalcorp.com</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alert-360-Opco-Inc.-alert360.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31522</link>
<guid>0bf1ace74c80d5a941676918831d37e9</guid>
<pubDate>Sun, 19 Apr 2026 18:05:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Alert-360-Opco-Inc.-alert360.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57e0384a6545334f15e81c3432813ac66f2ba9774f5082393fe279a7f0477638</i><br /><br />Threat actor <b>description</b>: <i>Over 2.5M records containing PII and other internal corporate data have been compromised. Please read the chatlog of the negociation by cliking the Download button below to see why this data was leaked. | Size: 10GB+ (compressed) | Updated: 18 Apr 2026 | SHA256: 9c5c8225f27a23f1a03526bfd15dad02b5976797664a92bdd53b23f5f9ef3fe3</i><br />Target victim <b>website</b>: <i>alert360.com</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Marton-Agency</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31499</link>
<guid>34d9646a6c7d6c0de3ece3de6f06a91f</guid>
<pubDate>Sun, 19 Apr 2026 16:59:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>The-Marton-Agency</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0deb64ea329476ab926184690e74fb68639e30335a94e6e6a037d4175d17a4d3</i><br /><br />Threat actor <b>description</b>: <i>martonagency.com The Marton Agency, Inc. is a New York-based international theatre rights agency founded in 1953 by Elisabeth Marton, currently run by her niece Tonda Marton since 1992, and headquartered at 307 West 82nd Street, Manhattan. The agency handles foreign-language rights for American plays and musicals, helping theaters and producers worldwide acquire production rights to US theatrical works. It operates through a global network of associate agents in each country and serves both overseas producers and foreign literary agents as a full-service rights licensing agency</i><br />Target victim <b>website</b>: <i>martonagency.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Great-Cookie</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31498</link>
<guid>3fc6ae40bfc04ae4123761055e639bc2</guid>
<pubDate>Sun, 19 Apr 2026 14:55:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-Great-Cookie</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>28fa2ab82da07d41167ef430e0dcdd4cc3e00a973541aeb7e5cd6c0d449a1f9f</i><br /><br />Threat actor <b>description</b>: <i>Food & Beverage</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Henley</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31497</link>
<guid>1dcfee25dedf7c8e7e25a9b588299f84</guid>
<pubDate>Sun, 19 Apr 2026 13:55:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Henley</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7465dfe4803fb18700c761f9364d97f76fc03e89cb36e8dc312f8ad233a7ca2b</i><br /><br />Threat actor <b>description</b>: <i>Finance</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>HS-Technology-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31491</link>
<guid>25d80b451b5c76cf01048f4b1d367e35</guid>
<pubDate>Sat, 18 Apr 2026 19:55:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>HS-Technology-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ae6102a532b7490b749598096439e6e5bf5f6085372f5bd231f148ee103b764d</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Evict-them-for-me</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31490</link>
<guid>1894ea678da89602948e674a85fbfe09</guid>
<pubDate>Sat, 18 Apr 2026 15:31:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Evict-them-for-me</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e42c692d901edea171207db7ffb6ea23f1e854d8d7a7987ce4051845d8dd5cf</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>evictthemforme.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Winnitex-Americas-Limited</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31487</link>
<guid>20906d510c44acb485fbf89daca562ac</guid>
<pubDate>Fri, 17 Apr 2026 19:13:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Winnitex-Americas-Limited</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e64e369d1d8680a02cb9c867f97229c2fae9db2f818f2558a1ec9aba1a88a217</i><br /><br />Threat actor <b>description</b>: <i>Winnitex (Americas) Limited is primarily engaged in the trading of textile products, including yarns, garment fabrics, and finished textile goods. The company sources textiles from related parties and external suppliers and sells them to customers both within its corporate group and on the open market. Through its wholly-owned subsidiary in Mainland China, Zhejiang Qing Mao Weaving, Dyeing & Printing Co., Ltd., it also participates in the manufacturing, dyeing, and printing of garment fabrics. In 2024, the company reported HK$ 740 million in revenue from textile sales.</i><br />Target victim <b>website</b>: <i>www.winnitex.com</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Millennium-Dental-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31481</link>
<guid>5a897c4ac62db0e169de0b47ae9c2842</guid>
<pubDate>Fri, 17 Apr 2026 16:34:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>termite</b> claims attack for <b>Millennium-Dental-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b52f1bd8dd6e0a3971a0cc48887bffd96bd42fe75f66c077ec9ebb8e676fdad3</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1994 and Headquartered in Cerritos, California. Millennium Dental Technologies, Inc manufactures and distributes dental products. It offers PerioLase MVP-7, a laser designed especially for laser periodontal therapy that performs soft and hard tissue laser procedures.
</i><br />Target victim <b>website</b>: <i>www.lanap.com</i>]]></description>
<category>termite</category>
</item>
<item xmlns:dc='ns:1'>
<title>bbalawgroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31480</link>
<guid>87688e644bd630526fedd4f22613cef9</guid>
<pubDate>Fri, 17 Apr 2026 16:29:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>bbalawgroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5bf4530a8ef158c9d59812d74b086d71fe04c27dd6527c59c5c21ea6036b3315</i><br /><br />Threat actor <b>description</b>: <i>Also referred to as BBA Immigration, is a boutique U.S. legal practice headquartered in Houston, Texas, specialising in immigration law …</i><br />Target victim <b>website</b>: <i>bbalawgroup.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>thruwayplumbingservice.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31474</link>
<guid>a33b40c5c94f754663bba65e02fae22b</guid>
<pubDate>Fri, 17 Apr 2026 16:25:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>thruwayplumbingservice.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6af074d40b7adb4269b000382e02cb781d476ef4d832dfdab0bdebce5e0862de</i><br /><br />Threat actor <b>description</b>: <i>The business provides standard residential and commercial plumbing services, including: - Leak detection and pipe repair - Drain cleaning and …</i><br />Target victim <b>website</b>: <i>thruwayplumbingservice.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fagen-Friedman--Fulfrost-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31470</link>
<guid>1504d56c70e614417b8d1aec1090fec5</guid>
<pubDate>Fri, 17 Apr 2026 15:33:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Fagen-Friedman--Fulfrost-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>41fbd8f02465c01273423b4391ff56dd6d68a5bddb3307aaa6882cc6ec1a9de0</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Fagen Friedman & Fulfrost LLP is a California-based law firm specializing in education law. The firm provides legal services exclusively to public educational agencies, including K-12 school districts, community colleges, and county offices of education throughout California. Its practice areas include labor and employment, special education, student matters, governance, and litigation. The firm operates entirely within the United States.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>treelawoffice.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31469</link>
<guid>54a96ac32645d07ae686344a55414be1</guid>
<pubDate>Fri, 17 Apr 2026 14:48:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>treelawoffice.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bcba6026337592b9ad22e9ffee42493b2dc1c14b9f3b92b793743d4a72a947c9</i><br /><br />Threat actor <b>description</b>: <i>Tree Law is a Social Security Disability law firm with 25 years of experience, dedicated to representing claimants in their pursuit of Social Security disability benefits. The firm specializes in assisting disabled individuals who are unable to work, guiding them through the entire Social Security process from initial applications to federal court. With a proven track record of helping thousands of clients, Tree Law aims to provide financial and medical benefits to those in need. Their services are available in Yakima and Tri-Cities, WA. Employees: 50 Revenue: $5 Million Industry: Law Firms & Legal Services Phone Number: (509) 452-1700</i><br />Target victim <b>website</b>: <i>treelawoffice.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>bgcsnv.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31468</link>
<guid>90a562851e9222030339fcf2960c15e9</guid>
<pubDate>Fri, 17 Apr 2026 14:47:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>bgcsnv.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>28b9b85c63b2428f6aa34d31bd3bb372fbf97271e39a9838c67186c95833834d</i><br /><br />Threat actor <b>description</b>: <i>Boys & Girls Club of Southern Nevada provides a safe and engaging environment for youth through various programs, including early childhood learning, summer camps, and mental health services. With 13 clubhouses across the region, they aim to support children in achieving their potential regardless of their background. The organization encourages community involvement and offers opportunities for volunteering and sponsorship. Their mission is to create a positive impact on the lives of young people in Southern Nevada. Employees: 200 Revenue: 15.3 Million Industry: Membership Organizations Phone Number: (702) 367-2582</i><br />Target victim <b>website</b>: <i>bgcsnv.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Law-Offices-of-JamesC-Shields</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31466</link>
<guid>a7b8e43297034e90611ce98d9b6efcfe</guid>
<pubDate>Fri, 17 Apr 2026 14:32:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Law-Offices-of-JamesC-Shields</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>685171ed363178a0f2cb599d4021ed23d9e4702829c1bb5f18136a7399d0f8cc</i><br /><br />Threat actor <b>description</b>: <i>The Law Offices of James C. Shields specializes in bankruptcy, es
tate planning, and probate services, providing tailored legal sol
utions to clients in Southern California. With over 15 years of e
xperience, the firm has assisted thousands in navigating financia
l difficulties and planning for the future.

We will upload corporate data soon. Personal data of clients (pas
sports, DLs, SSNs, death/birth certificates, financials and other
docs), detailed financials, court files, investigations, police 
reports, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>R-Roese-Contracting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31464</link>
<guid>49030e99dc6676fa7a0ae152ce0c68c7</guid>
<pubDate>Fri, 17 Apr 2026 14:32:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>R-Roese-Contracting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c56a661397af02336702c477aea0a3ba004511f8ddc21d455cdc6c5a64481c6</i><br /><br />Threat actor <b>description</b>: <i>R. Roese Contracting Company Inc. is a leading provider of underg
round and aerial construction services, specializing in telecommu
nications, water and sewer, electric, and gas transmission and di
stribution.

We will upload 61gb of corporate data soon. Personal data of empl
oyees (passports, phones, emails and so on), financials, client d
ata, lots of project files, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Harris-Beach-Murtha</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31453</link>
<guid>e1d96dd51f6c61a48b3af39333626766</guid>
<pubDate>Wed, 15 Apr 2026 22:25:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Harris-Beach-Murtha</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a902152d8f3e648bc3e5bc7f047e3bf691db91189c7009ab91a9527423087f2</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Harris Beach Murtha is a full-service law firm operating in the United States, primarily in the northeastern region. Formed through the merger of Harris Beach and Murtha Cullina, the firm provides legal services across areas including corporate law, litigation, real estate, healthcare, and public finance. It serves clients ranging from businesses and municipalities to nonprofits and individuals across Connecticut, New York, and nearby states.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clearwater-Marine-Aquarium</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31451</link>
<guid>9c7441bc759cf5c713a4c14044747778</guid>
<pubDate>Wed, 15 Apr 2026 20:26:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Clearwater-Marine-Aquarium</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fedaac869689eeeb81b5cfad7018bc23907b98460d6a26d213672ea7952813fc</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.cmaquarium.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>SPGLOBAL-LiteLLMTrivy-campaign-TeamPCP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31449</link>
<guid>f36c95070399e5d69f5ae982b8b664f6</guid>
<pubDate>Wed, 15 Apr 2026 19:08:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>vect</b> claims attack for <b>SPGLOBAL-LiteLLMTrivy-campaign-TeamPCP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6202fe042f4fa5e4a5978f836353c1da0f153d9dbdc17f3d53247ac69efbd56</i><br /><br />Threat actor <b>description</b>: <i>Status: STATUS: NEGOTIATING | Sector: Business Services | Internal projects, secrets, api keys etc DATA SIZE: 250GB | Deadline: 8d 8h</i><br />Target victim <b>website</b>: <i>www.spglobal.com/en</i>]]></description>
<category>vect</category>
</item>
<item xmlns:dc='ns:1'>
<title>Truckload-Carriers-Association</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31440</link>
<guid>31429ccef08e1dfc4839ba23a3d2443a</guid>
<pubDate>Wed, 15 Apr 2026 14:58:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Truckload-Carriers-Association</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>66e54378cc5337937195b7c69fce6effa9eeb19d629d40ce85d7fa39ce7043ff</i><br /><br />Threat actor <b>description</b>: <i>Truckload Carriers Association is a national trade association fo
cused on the truckload segment of the motor carrier industry.

We will upload 21gb of corporate data soon. Personal data of empl
oyees, detailed financials, contracts and agreements, customer an
d partner files, projects, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vluznet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31436</link>
<guid>8abb69b3d54bf7e21e4aff5f1047801e</guid>
<pubDate>Wed, 15 Apr 2026 13:42:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Vluznet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe194d2954a893f33f5a2b11efa5f82ce986611c312486fe324a7b5ef6129188</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>vluznet.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Epoch-Times</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31435</link>
<guid>7f982c526e15dfa8be4c3eaa864c56ee</guid>
<pubDate>Wed, 15 Apr 2026 13:41:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Epoch-Times</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>262690727c0b6c3d5efde254f5ee78db4e614b2afabf42f69fdd9764dcac15fe</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Epoch Times is an American media company founded in 2000 by Chinese-American Falun Gong practitioners. It operates newspapers, websites, and video content across multiple countries, publishing in numerous languages. The company covers news, politics, health, and culture, but has drawn scrutiny from researchers and platforms for spreading misinformation and promoting far-right narratives. It is headquartered in New York, USA.</i><br />Target victim <b>website</b>: <i>epochtimes.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wayne-Brothers-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31432</link>
<guid>9802a535bbdbcec203871db6d9595586</guid>
<pubDate>Wed, 15 Apr 2026 13:40:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Wayne-Brothers-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bbdb49d92aa0514206739267526be2b2299a5fd44ffe582e15190dfc7cf34326</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>waynebrothers.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Questivity</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31431</link>
<guid>5242ef6f489fc9c35ba357927f91a59f</guid>
<pubDate>Wed, 15 Apr 2026 13:39:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Questivity</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9d4573d04af94168d2a95895cf439832e2325fe7b1fe7e7513696ee694e90896</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>questivity.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Millenium-Packaging</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31430</link>
<guid>8c4e1000e86191ffd2a27a253c0aad82</guid>
<pubDate>Wed, 15 Apr 2026 13:38:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Millenium-Packaging</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e391356d36a36e9dcc2c66133ad13b4e9256db41f2e6a5e6db5b5ba82eb28ebd</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>mil-pkg.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Astreya</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31425</link>
<guid>d79f7940be5afa4e3fa70cd73295878f</guid>
<pubDate>Wed, 15 Apr 2026 13:35:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Astreya</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6a16ebfe8129176acaf92be6ad1a58b7ab9998ce2026f935f3a2a661f37b3d4</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Astreya is a US-based IT managed services company headquartered in Sunnyvale, California. It provides technology workforce solutions, IT support, infrastructure management, and digital workplace services to large enterprises. Operating primarily in the information technology services industry, Astreya partners with major technology firms globally, delivering staffing and managed IT services across multiple countries while maintaining its core operations in the United States.</i><br />Target victim <b>website</b>: <i>astreya.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cognizant</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31424</link>
<guid>e0c79d99ee375ed5ae7f77eb0e469957</guid>
<pubDate>Wed, 15 Apr 2026 13:34:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Cognizant</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7bb88d61f35c8f7eeac4b35caad95f891f191d82f60e86f13f1d3e75e418e5e</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Cognizant is a multinational information technology and professional services company headquartered in Teaneck, New Jersey, USA. It operates in the IT services and consulting industry, offering digital transformation, technology, and business process outsourcing services. Founded in 1994, Cognizant serves clients across healthcare, financial services, manufacturing, and retail sectors globally, with major delivery centers in India.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fletcher-Chrysler-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31420</link>
<guid>a637b51c944078205e237f8694399ddc</guid>
<pubDate>Wed, 15 Apr 2026 12:03:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Fletcher-Chrysler-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ff553941ce9a295bc05e6ef28595706958ebecc06bcebd2810d79c6ef2b7b8a</i><br /><br />Threat actor <b>description</b>: <i>Fletcher Chrysler Dodge Jeep Ram is a dealership located in Frank
lin, IN, offering a wide selection of new and used Chrysler, Dodg
e, Jeep, and Ram vehicles. They serve clients in Franklin, Indian
apolis, Shelbyville, and surrounding areas, providing assistance 
in vehicle purchasing, financing options, and automotive services
.

We will upload 28gb of corporate data soon. Personal data of empl
oyees (passports, DLs, SSNs and others), financials, contracts an
d agreements, client files, and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Curtis-Design-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31418</link>
<guid>c219b83bdbd3fc9bf4fa8526d4368ea1</guid>
<pubDate>Wed, 15 Apr 2026 10:43:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Curtis-Design-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2961c17c78626c0cffa2a35b260a11a8551f63cead5fc8255547099e9b19a435</i><br /><br />Threat actor <b>description</b>: <i>Curtis Design Group specializes in home architecture and design, creating beautiful and livable spaces tailored to the needs of families and developers. They focus on understanding client dreams and site specifics to produce detailed blueprints that reflect those visions. The company emphasizes a collaborative approach, ensuring clients are delighted with the final designs before working with builders. Their services extend beyond Utah, aiming to create homes that endure and bring joy for generations.</i><br />Target victim <b>website</b>: <i>curtisdesigngroup.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Flash-Charm-INC---IDERA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31415</link>
<guid>fd80c4b06025c38f9d6958ebe4f14532</guid>
<pubDate>Tue, 14 Apr 2026 21:35:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Flash-Charm-INC---IDERA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e71ae1dc5cc591f1d4ace5d9536b0391dbe869d12fe428ed3d557d57d948e28</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Flash Charm Inc is a software company associated with Idera, Inc., a US-based technology firm headquartered in Houston, Texas. Idera develops and provides database management, developer tools, and test management software solutions. Its products support database administrators and developers across multiple platforms. Flash Charm Inc appears to operate as a subsidiary or affiliated entity within Idera's broader portfolio of software brands serving enterprise IT markets.</i><br />Target victim <b>website</b>: <i>idera.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gastroenterology--Hepatology-of-CNY</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31412</link>
<guid>63d01849974fcec145c71b5ebb80e184</guid>
<pubDate>Tue, 14 Apr 2026 20:06:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>exitium</b> claims attack for <b>Gastroenterology--Hepatology-of-CNY</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8f832738966d019660397ff62a7babc4763da8e1ec802bda15e8f22430adbee</i><br /><br />Threat actor <b>description</b>: <i>Website: gandhofcny.com
Zoominfo: https://www.zoominfo.com/c/gastroenterology--hepatology-of-cny-pc/346091487

Data sample, whole internal data will be sold if they wouldn't pay ransom.

Also Digestive Disease Center of CNY, LLC (ddcofcny.com)

GI practice + AAAHC-accredited endoscopy center. Syracuse, New York, USA.

Full database for sale — 167,303 patients, 124,761 SSN, 49,798 with sensitive diagnoses:
- 167,303 patients — 124,761 with SSN, 166,402 (99%) with address, 164,296 (98%) with phone, 85,318 (51%) with email
- 1,093,863 diagnoses (ICD-10), 1,547,142 medications, 186,246 pathology specimens with narrative reports
- Sensitive (dx + meds): 49,798 patients — 44,861 with SSN. Mental health: 43,902 | Substance/Alcohol: 5,111 | STIs: 2,779 | Cancer: 2,708 | Hepatitis C: 1,906
- Includes notable individuals (politicians, businesspeople, public figures)</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>exitium</category>
</item>
<item xmlns:dc='ns:1'>
<title>D-Troy-Logistics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31410</link>
<guid>5994cf5ebd61f4806932d5f226cb64d0</guid>
<pubDate>Tue, 14 Apr 2026 17:35:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>D-Troy-Logistics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6f380ad5e0398784ef16cb566af3dd508b643f30a3331c0291fd7368ff5ebf7</i><br /><br />Threat actor <b>description</b>: <i>- Internal Documents- Employee Data</i><br />Target victim <b>website</b>: <i>www.dtroylogistics.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>imadesign.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31388</link>
<guid>1f8ac4a305f85a4b617655db27206fe1</guid>
<pubDate>Tue, 14 Apr 2026 15:52:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>imadesign.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a469011751187f2fa10257e8cfbeb157fe30d85c858e86ba2be1511af7de2055</i><br /><br />Threat actor <b>description</b>: <i>IMA Design Group, Inc. specializes in master planning, development services, and landscape architecture, with a particular focus on creating exceptional spaces ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>novafp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31390</link>
<guid>452dee7ed3aac40e980602f275eec5e5</guid>
<pubDate>Tue, 14 Apr 2026 15:52:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>novafp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7319390202bd5920e9ca8af34094636c814c23cf9fdf68fcd435cddbd79fb69f</i><br /><br />Threat actor <b>description</b>: <i>Nova Fire Protection Inc. specializes in sprinkler fire suppression systems, 
offering design, installation, repair, inspection, and testing services to homeown...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>ppiplastics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31391</link>
<guid>4b997c95a3cd22f4f5a45903bc4f319a</guid>
<pubDate>Tue, 14 Apr 2026 15:52:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>ppiplastics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57a84508ebe371a18aafee386da8029fb78bb2b637b03d574a91dc47552d3303</i><br /><br />Threat actor <b>description</b>: <i>Preproduction Plastics Inc. is a company specializing in structural foam injection molding and gas-assisted injection molding.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>je-nyc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31392</link>
<guid>b1a535724274b293f9623a791919c16e</guid>
<pubDate>Tue, 14 Apr 2026 15:52:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>je-nyc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8701e2e88ac570c4ef249673d3a7b69a8c4d28cd1b11cb715620b25c80a6e511</i><br /><br />Threat actor <b>description</b>: <i>Jacmel Enterprise Inc. offers a wide range of IT services, including Microsoft Dynamics solutions, project services such as data cabling and server configurati...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>breslinbuilders.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31393</link>
<guid>0c394f0bd80e37fa0d8873166e556457</guid>
<pubDate>Tue, 14 Apr 2026 15:52:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>breslinbuilders.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e5674ebdfe619067ace3dca495a210f417527646ac738932a6a98ecf2b70fc0</i><br /><br />Threat actor <b>description</b>: <i>Breslin Builders is a general contractor specializing in design and construction, based in Las Vegas, Nevada, and serving the Las Vegas Valley and Southern Neva...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>tulsachamber.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31394</link>
<guid>0f4a21d571adbe663374dbe676987dbc</guid>
<pubDate>Tue, 14 Apr 2026 15:52:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>tulsachamber.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2cc6d6a514edb6dc4a3a6cf9d168336e61d5437c2efe4816a8840abcdbdce9d9</i><br /><br />Threat actor <b>description</b>: <i>The Talsi Regional Chamber of Commerce is committed to serving as a leading business-oriented organization and improving the quality of life in the community by...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>milliondollarbabyco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31395</link>
<guid>5f2397a240ce3565d4d3b82b0db2fc65</guid>
<pubDate>Tue, 14 Apr 2026 14:52:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>milliondollarbabyco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d601cc74b74d887d84a2788ea6677d26d3878f09819dc30736008907c1bf7094</i><br /><br />Threat actor <b>description</b>: <i>Million Dollar Baby Co. was founded in 1990 and is a proudly family-owned business based in Los Angeles. Since then, MDB has grown to include seven distinct chi...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>graphicinfo.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31396</link>
<guid>47e7fdb0ab1113aaef1f5029de4792b0</guid>
<pubDate>Tue, 14 Apr 2026 14:52:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>graphicinfo.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de946ef96699aea508098ede086491bc081e1985eb880dfe53477947d16196e6</i><br /><br />Threat actor <b>description</b>: <i>Graphic Information Systems Inc. specializes in the custom production of barcode labels, product number/identification labels, and warehouse signage, serving bu...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>gtlcompany.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31397</link>
<guid>344da4009ef2bab9620f67c8e3a337b5</guid>
<pubDate>Tue, 14 Apr 2026 14:52:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>gtlcompany.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1e39f5519a7c5b4aa811dfb1c86946a3a4dd94e8e4d622ab9a34dafca02070d</i><br /><br />Threat actor <b>description</b>: <i>Gloyer-Taylor Laboratories, Inc. (GTL) is a high-tech company specializing in providing revolutionary technologies for the aerospace industry. Its product portf...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>ServiceMaster-Clean-services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31399</link>
<guid>75179ec48bcbbdd4fbd025a4db2dc3b8</guid>
<pubDate>Tue, 14 Apr 2026 14:07:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>ServiceMaster-Clean-services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>86f0b780a5ee059382ca3fd030a9dd290f7368056c83111a93fb67bd8f97fe54</i><br /><br />Threat actor <b>description</b>: <i>ServiceMaster Services, Inc. is a privately owned and operated co
mmercial contract cleaning company. Founded in 1974, ServiceMaste
r specializes on servicing office buildings and other large facil
ities. It is headquartered in Memphis, Tennessee.

We will upload corporate data soon. Personal data of employees (p
assports, 20  DLs, SSNs and others), financials, contracts and ag
reements, client files, and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>R-L-Larson-Excavating</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31386</link>
<guid>4e6bdf8e5aed24d7a26d7318e0c87417</guid>
<pubDate>Tue, 14 Apr 2026 12:49:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>R-L-Larson-Excavating</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25834a8f7701350e86ec9afc2166169f5ebeec1ca78a92b23d901b8e79f25620</i><br /><br />Threat actor <b>description</b>: <i>R. L. Larson Excavating Inc., is an excavating contractor based i
n St. Cloud, MN. 

We will upload 30gb of corporate data soon. Personal data of empl
oyees (DLs, w9 forms and others), financials, drawings and specif
ications, contracts and agreements, projects, and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>decaturdiagnosticlab.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31379</link>
<guid>02ff9da844ffbab5c01c0cd06386b958</guid>
<pubDate>Tue, 14 Apr 2026 10:45:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>decaturdiagnosticlab.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>92d04df70e798ad05d9bfaabe777ae576522a9c4580b3a54265b22853388ffa9</i><br /><br />Threat actor <b>description</b>: <i>Located inside the Med-Surg Complex; Decatur Diagnostic Lab is a privately owned lab servicing the D...</i><br />Target victim <b>website</b>: <i>decaturdiagnosticlab.net</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>PsychPlus</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31378</link>
<guid>4fa0a0925c9527b40fb2353fc03e2bf0</guid>
<pubDate>Tue, 14 Apr 2026 10:29:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>PsychPlus</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87ffc3bd53f959d83023b442551df02285eec38368e466a2fc78fe353c4a7ab6</i><br /><br />Threat actor <b>description</b>: <i>psychplus.com zoominfo.com/c/psychplus/1319245304 PsychPlus is a Houston-based mental health company founded in 2019–2020, offering virtual and in-person care via licensed psychiatrists and therapists. It focuses on accessibility by accepting 99% of commercial insurances (including Medicare/Medicaid), providing same/next-day appointments, and enabling 24/7 online booking through its app and EHR platform, with over 200 providers and plans to expand into 20 new U.S. markets in 2025</i><br />Target victim <b>website</b>: <i>psychplus.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Harlem-Stage</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31372</link>
<guid>2990a21222c7eeb833f2fdf82aacf400</guid>
<pubDate>Tue, 14 Apr 2026 10:27:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Harlem-Stage</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22a1b9e86813ffe1e2ec7ce9ef52d1ab37f3ffd692ee822f65e681ccd85ec9d8</i><br /><br />Threat actor <b>description</b>: <i>harlemstage.org zoominfo.com/c/harlem-stage/109888723 Founded in 1983, Harlem Stage is a New York-based performing arts organization dedicated to empowering artists of the Global Majority — amplifying stories that have been whispered, silenced, or erased. Operating under the motto "Harlem is our home; the world is our stage," it supports dance, music, theater, film, and visual arts through commissions, festivals, education programs, and global partnerships.</i><br />Target victim <b>website</b>: <i>harlemstage.org</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Double-C-Farm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31370</link>
<guid>d73e1b0064831ecbe5d9d9b80b93e05d</guid>
<pubDate>Tue, 14 Apr 2026 10:26:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Double-C-Farm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dfa1a390309423eba00b4ab97ac73b7ea23f02dbd61e808569a63d393c0d4723</i><br /><br />Threat actor <b>description</b>: <i>doublecfarm.net zoominfo.com/c/double-c-farm-llc/356570449 Double C Farm is a private equestrian facility in Montgomery County, Maryland, near Sugarloaf Mountain, owned and operated by Cridder Halle. It features an Extreme Mountain Trail Obstacle Course with 30+ obstacles (bridges, balance beams, water obstacles, trenches) and offers Ranch Riding clinics, group/private lessons, and schooling shows for all skill levels — approved by the East Coast Ranch Riding Association (ECRRA).</i><br />Target victim <b>website</b>: <i>doublecfarm.net</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>JM-Bozeman-Enterprises</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31361</link>
<guid>e6e9d37a0f6a79c25564cade197a8e3c</guid>
<pubDate>Tue, 14 Apr 2026 05:58:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>secpo</b> claims attack for <b>JM-Bozeman-Enterprises</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>857a4473fee56aa8bd47fc451c07ee5d0d58483af80fec53b515ebc2f9ea1fa0</i><br /><br />Threat actor <b>description</b>: <i>The exposed dataset includes over 100,000 unique files (192,993 with duplicates) containing sensitive information on more than 4,000 individuals and over 4,500 organizations</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>secpo</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mike-Brandner-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31358</link>
<guid>8072e512102b794c08f3479a856c0796</guid>
<pubDate>Tue, 14 Apr 2026 05:57:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>secpo</b> claims attack for <b>Mike-Brandner-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f825537e4c0de3ce458759ea5a9d906b4fca76121034da3da54f6193be4b22ab</i><br /><br />Threat actor <b>description</b>: <i>The total volume of extracted data amounts to approximately 489 GB (459,391 files total). The files contain references to more than 4,000 unique individuals...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>secpo</category>
</item>
<item xmlns:dc='ns:1'>
<title>cwwcontractors.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31354</link>
<guid>97652673df105b7ad2ba940585e53500</guid>
<pubDate>Tue, 14 Apr 2026 01:50:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>cwwcontractors.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04451190a42bde68c1e99bb5b6cc86d7e007ff0ba647269024a72cd25f7e877e</i><br /><br />Threat actor <b>description</b>: <i>CW&W Contractors is a leading civil construction contractor specializing in infr...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jersey-Fabrication-Group-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31355</link>
<guid>105dce1d1aed88877f7b1097e978f99e</guid>
<pubDate>Tue, 14 Apr 2026 00:52:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Jersey-Fabrication-Group-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>21552b16ddc44b8a6d931f61a6bb9abd00af1489d3db424322eed08bebb6faef</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>sentrydynamics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31342</link>
<guid>723b06b9337aafbd3b995b1cd5da5e72</guid>
<pubDate>Mon, 13 Apr 2026 21:52:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>sentrydynamics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8079c98da9e551262dc375291e4a6cd17b3976dc402d23388e65c7154593dc4</i><br /><br />Threat actor <b>description</b>: <i>Sentry Dynamics, Inc. provides a powerful integrated suite of data solutions tai...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Beaver-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31350</link>
<guid>2d02a252e43e9717a88413651fdddf4c</guid>
<pubDate>Mon, 13 Apr 2026 21:41:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lamashtu</b> claims attack for <b>Beaver-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>44e876eb5eed0994301b43f1a80b76bb66aa861b14d0e60040b7eeba10ca9da1</i><br /><br />Threat actor <b>description</b>: <i>Beaver Engineering, Inc. is a Nashville-based geotechnical engineering firm founded in 1968, specializing in construction observation, materials testing, and sinkhole investigation throughout the southeastern United States.</i><br />Target victim <b>website</b>: <i>beaverengineering.com</i>]]></description>
<category>lamashtu</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pullen-Moving</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31345</link>
<guid>14c15aaec95f9b40f00007e6336d3e08</guid>
<pubDate>Mon, 13 Apr 2026 21:02:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>Pullen-Moving</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bad70260bcc4890ca7960d942ae62a3ef8939c7a220ee02656da828e663a5ab0</i><br /><br />Threat actor <b>description</b>: <i>Pullen Moving Company owns and operates two warehouses for storing household goods, office furniture, and industrial equipment in Woodbridge, VA as well as a fleet of vehicles for local, long distance, and international moving. We are proud members of the American Trucking</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Colorado-Pulmonary-Intensivists</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31344</link>
<guid>886551d6661c7e64f03ecdc16f7eae8b</guid>
<pubDate>Mon, 13 Apr 2026 20:08:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Colorado-Pulmonary-Intensivists</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>373534c72f23cc1cb8ca3e8a8dc583ebe4def9221c7af6d47b82de11f91e75f8</i><br /><br />Threat actor <b>description</b>: <i>Specializes in services related to pulmonology and critical care, including outpatient pulmonary care and sleep medicine</i><br />Target victim <b>website</b>: <i>cpimedicine.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>PGDIS.PAPETIQUE-PRO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31335</link>
<guid>6dfbdd2796f306866bd7fa91b79f2339</guid>
<pubDate>Mon, 13 Apr 2026 19:51:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>PGDIS.PAPETIQUE-PRO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a730af703e9ff8c560e48b401d1746370fc10172b3cebcfb3e2488ecedc4f93</i><br /><br />Threat actor <b>description</b>: <i>Retail · Pennsylvania</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Basalt-Dentistry</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31338</link>
<guid>f512bcc142683f9185ea27c41855ed64</guid>
<pubDate>Mon, 13 Apr 2026 19:51:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Basalt-Dentistry</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3b97df27e66b811a39e012d55b14a6bee9230cd09819c47c0609b6333b523d56</i><br /><br />Threat actor <b>description</b>: <i>Healthcare Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Colonial-Presbyterian-Church</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31343</link>
<guid>4ecca9950b8e48cca47014655c2c4789</guid>
<pubDate>Mon, 13 Apr 2026 19:36:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>Colonial-Presbyterian-Church</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3b34ad77e3eb2f629564a7ca9c18fcfc6e5fee3cade77f8a0340e7bda45d0e93</i><br /><br />Threat actor <b>description</b>: <i>We are a community of believers who seek to be the Light of Christ in a hurting culture so that the lost are found, the broken are made whole, the fatherless find hope and our city is blessed.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Northeast-Missouri-Rural-Telephone</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31341</link>
<guid>0c0e943e54b33403a001386b2c3da054</guid>
<pubDate>Mon, 13 Apr 2026 18:15:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Northeast-Missouri-Rural-Telephone</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d0cff9f3e1d61cdb0be13ed0883ed51d2b95afb1c5e7d5107ecffc1d290353e5</i><br /><br />Threat actor <b>description</b>: <i>NEMR provides high-speed and reliable internet services tailored for various customer needs, including residential and business clients. They offer multiple broadband plans, such as Gigzilla for heavy data usage and Surfer for smaller households, ensuring options for every type of user. Alongside internet services, NEMR also provides phone and TV services, establishing itself as a comprehensive provider of communication solutions. Their commitment to service quality makes them an ideal choice for consumers in Northeast Missouri seeking fast connectivity. 
The company headquarters is located in 718 S West St, Green City, MO 63545, USA. 11-50 Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>DeMera-DeMera-Cameron</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31332</link>
<guid>65903d6bc9979bfb4817643c0e12b11e</guid>
<pubDate>Mon, 13 Apr 2026 14:49:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>DeMera-DeMera-Cameron</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f43c11ccfbaeda051b3f22aa662ee339e7afbb8f78ef0ae50226f254aab829dd</i><br /><br />Threat actor <b>description</b>: <i>DDC CPA is a trusted CPA firm based in Fresno, specializing in co
rporate tax services and audit advisory for businesses across var
ious industries. With over 80 years of experience, they provide a
comprehensive range of accounting services including bookkeeping
, tax planning, and financial forecasting.

We will upload 260gb of corporate data soon. A bit of personal da
ta, financials, client financials (international ones), contracts
and agreements, corporate confidential documents, NDAs and so on
.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>phb.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31324</link>
<guid>5b347a27844fa303dd8c02b7da1c9206</guid>
<pubDate>Mon, 13 Apr 2026 12:53:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>phb.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b836de154c636d20bfd118cc00ed22eed589941c168372b5b83f9053bca57b10</i><br /><br />Threat actor <b>description</b>: <i>PHB Inc. is an industrial company in the United States that manufactures equipment and metal stru...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>edtg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31325</link>
<guid>b8a8ace231fae55cbad834ad5b66e3d6</guid>
<pubDate>Mon, 13 Apr 2026 12:53:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>edtg.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c8445d20f8567d17f99f5354902c2d2adda5bdab9a0978cfba3519654b4b75f</i><br /><br />Threat actor <b>description</b>: <i>The Eldorado Trading Group is a company that operates in the Banking industry. It employs 10to19 people and has 1Mto5M of revenue. The company is headquartered ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Travel-of-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31326</link>
<guid>13019fc8997b04326425e0c525115724</guid>
<pubDate>Mon, 13 Apr 2026 12:53:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Travel-of-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>62c7083d34bd078b7265fb9c3d978ea9e595eb9d3ef31d4988c1f36560acc213</i><br /><br />Threat actor <b>description</b>: <i>Travel of America specializes in luxury ocean, river, and expedition cruises, as well as hotels, resorts, guided tours, and custom land arrangements for both in...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Transaction-Packing-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31323</link>
<guid>fc7acef4b85e5816052c710a655dbc47</guid>
<pubDate>Mon, 13 Apr 2026 10:33:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Transaction-Packing-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b779029148fa4a2a3da5156548ff912413fcd1cc3b33b27c10a04a537fd336c5</i><br /><br />Threat actor <b>description</b>: <i>Transaction Packing, Inc. (TPI) specializes in freight handling services, including receiving, packing, crating, locating, and shipping cargo. They focus on providing durable and dependable packaging solutions to ensure safe and timely transportation of goods. TPI operates multiple facilities in the Houston area, allowing for expedited transit of shipments. The company emphasizes strong customer partnerships and dedicated account management to enhance service quality.</i><br />Target victim <b>website</b>: <i>www.transactionpacking.com</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Affordable-Oil</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31316</link>
<guid>ef4fc148f9ea60330eb0df54b1349a2d</guid>
<pubDate>Sun, 12 Apr 2026 23:54:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Affordable-Oil</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e144c266bacd054e65b82c42818782b494ca7826554619871e19666b5b37d95e</i><br /><br />Threat actor <b>description</b>: <i>The goal of Affordable Oil is in our name. We strive to provide the best heating oil delivery service at the lowest cost. Our friendly office staff is here Mond...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Helzberg</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31319</link>
<guid>365aa6ebdc3dbf28e7b9ea1c1b4d2908</guid>
<pubDate>Sun, 12 Apr 2026 22:24:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Helzberg</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>43eb6b3eb3d1b6f79cc2288c75c0b178afa40208b71da9047d97aa84597317de</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Helzberg Diamonds is a American retail jewelry company headquartered in North Kansas City, Missouri. Founded in 1915, it operates a chain of jewelry stores across the United States, selling diamonds, engagement rings, wedding bands, and fine jewelry. The company is a subsidiary of Berkshire Hathaway, having been acquired in 1995. Helzberg operates hundreds of retail locations in shopping malls and centers nationwide.</i><br />Target victim <b>website</b>: <i>Helzberg</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ralph-Lauren</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31318</link>
<guid>81bfe052679288bbb4558009aab788f9</guid>
<pubDate>Sun, 12 Apr 2026 22:24:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Ralph-Lauren</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b61def8eeefa593549ce3698c7e5aa7e394ff990e7bf297abd55b2e051189a6</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Ralph Lauren Corporation is an American fashion and lifestyle company headquartered in New York City. Founded in 1967 by designer Ralph Lauren, it designs, markets, and distributes luxury apparel, accessories, home furnishings, and fragrances. Operating globally across North America, Europe, and Asia, its portfolio includes brands such as Polo Ralph Lauren, Ralph Lauren Purple Label, and Lauren Ralph Lauren.</i><br />Target victim <b>website</b>: <i>www.ralphlauren.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carters</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31317</link>
<guid>01cc9bcfcd567d83304a3843b7169ba1</guid>
<pubDate>Sun, 12 Apr 2026 22:23:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Carters</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc8eab938b2c1a5a2b54e4873698f8c3757df4c18640f285364a003f2fdf3d45</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Carter's is a leading American children's apparel brand headquartered in Atlanta, Georgia. Founded in 1865, the company designs, sources, and markets clothing, accessories, and related products for babies and young children. It operates through multiple retail channels including its own stores, e-commerce platforms, and wholesale partnerships. Carter's also owns the OshKosh B'gosh brand and sells products across the United States, Canada, and internationally.</i><br />Target victim <b>website</b>: <i>carters.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rockstar-Games</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31312</link>
<guid>5464028132750fc3d9705f63c4804a09</guid>
<pubDate>Sun, 12 Apr 2026 02:10:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Rockstar-Games</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a744698893a09a31b39a56b58d8be0ebf13a0b594b335d22bda7239fa095ccb1</i><br /><br />Threat actor <b>description</b>: <i>Your Snowflake instances metrics data was compromised thanks to Anodot.com. Pay or leak. This is a final warning to reach out by 14 Apr 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 11 Apr 2026 | Warning: FINAL WARNING PAY OR LEAK</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Marcus--Millichap-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31310</link>
<guid>68f049a23ab109c6a0f6989bb9a02994</guid>
<pubDate>Sun, 12 Apr 2026 02:10:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Marcus--Millichap-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9ba58ebe6b589bd8fb4c8dbec38ebab2c16b89f220f50105d87124e675b6ec4</i><br /><br />Threat actor <b>description</b>: <i>Over 30M Salesforce records containing PII and other internal corporate data have been compromised. Pay or leak. This is a final warning to reach out by 14 Apr 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 11 Apr 2026 | Warning: FINAL WARNING PAY OR LEAK</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kemper-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31309</link>
<guid>60d9dfb17fc8bdbb3de0a14aed009ce6</guid>
<pubDate>Sun, 12 Apr 2026 02:10:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Kemper-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2562f0752e5070a4ad123d6056c0c258c006d416fc706a546cf8e7a8286066fe</i><br /><br />Threat actor <b>description</b>: <i>Over 13M Salesforce records containing PII and other internal corporate data have been compromised. Pay or leak. This is a final warning to reach out by 14 Apr 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 11 Apr 2026 | Warning: FINAL WARNING PAY OR LEAK</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ryan-LLC.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31308</link>
<guid>1e273c3efad61af89a37f8403b84efd4</guid>
<pubDate>Sun, 12 Apr 2026 02:10:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Ryan-LLC.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25503c77abb289c76b374bccb4cfa10e7cc05a62f6e74c81f75fd9d6ebb67cdb</i><br /><br />Threat actor <b>description</b>: <i>Over 4.8M Salesforce records containing PII and other internal corporate data have been compromised. Pay or leak. This is a final warning to reach out by 14 Apr 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 11 Apr 2026 | Warning: FINAL WARNING PAY OR LEAK</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>McGraw-Hill-Inc.-mheducation.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31307</link>
<guid>66b0cd925d80e64555a2babbb2ccddc2</guid>
<pubDate>Sun, 12 Apr 2026 02:10:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>McGraw-Hill-Inc.-mheducation.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a865a68aa7d0c1bd634e3484fe0dc86ff437b8cc16de98c232efc319ab391f7</i><br /><br />Threat actor <b>description</b>: <i>Over 45M Salesforce records containing PII data have been compromised. Pay or leak. This is a final warning to reach out by 14 Apr 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 11 Apr 2026 | Warning: FINAL WARNING PAY OR LEAK</i><br />Target victim <b>website</b>: <i>mheducation.com</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>National-Railroad-Passenger-Corporation-amtrak.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31306</link>
<guid>5f4d36824abbbe0b96729728d035a7ae</guid>
<pubDate>Sun, 12 Apr 2026 02:09:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>National-Railroad-Passenger-Corporation-amtrak.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8c9d606c51789d845b605517ecf382bda347df0bdb3d53926fd07229549cfb03</i><br /><br />Threat actor <b>description</b>: <i>Over 9.4M Salesforce records containing PII and other internal corporate data have been compromised. Pay or leak. This is a final warning to reach out by 14 Apr 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 11 Apr 2026 | Warning: FINAL WARNING PAY OR LEAK</i><br />Target victim <b>website</b>: <i>amtrak.com</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>morgancountyga.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31303</link>
<guid>2fd888270070d2f794ec95b2075f8a29</guid>
<pubDate>Sat, 11 Apr 2026 23:58:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>morgancountyga.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>222fd1498590584af9aba7578046d50535aec61a49066b84878ebd97c7213093</i><br /><br />Threat actor <b>description</b>: <i>Morgan County offers a range of government services and community resources, including public safety through the Fire Rescue and Sheriff's Office, as well as a Public Transit System. The county actively engages with residents by providing updates on meetings, events, and community initiatives. It features recreational facilities, such as a Recreation Complex, aimed at enhancing community well-being. The intended clients include local residents, visitors, and anyone needing access to county services. Employees: 50 Revenue: $23 Million Industry: Government   Phone Number: (706) 342-1507</i><br />Target victim <b>website</b>: <i>morgancountyga.gov</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sahara-Air-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31302</link>
<guid>2cf7926aeec52fbe4f1a6ae2a1770329</guid>
<pubDate>Sat, 11 Apr 2026 16:59:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Sahara-Air-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>836a2bd59607e6cb6fa5e77267b32eac71563df3e8385286b8b0791b52822ffa</i><br /><br />Threat actor <b>description</b>: <i>- Confidential Technical Drawings- Documents- Customer invoices- Shipment Histories</i><br />Target victim <b>website</b>: <i>saharahenderson.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.campbell.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31300</link>
<guid>c7602768a214451d3d91346fed37176b</guid>
<pubDate>Sat, 11 Apr 2026 02:17:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>www.campbell.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>939799d408a151c0e5ebdc3af8da77249e04ba59702337a569b9a90ca0890eac</i><br /><br />Threat actor <b>description</b>: <i>In the university data leak, there will be incidents related to teachers' pedophilia, sexual abuse of students by other students, drug use, personal data, military recruitment of students, and other things   500gb</i><br />Target victim <b>website</b>: <i>www.campbell.edu</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>wright-ryan.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31296</link>
<guid>754da7dc2ed681cb2084a83124fc63cf</guid>
<pubDate>Fri, 10 Apr 2026 18:38:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>wright-ryan.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>16903140594923e5e410ff3a89cc52acb1d95f58f4a53d8ff1d29915e3cf52c4</i><br /><br />Threat actor <b>description</b>: <i>600gb  project nda personal client contract  all corp data</i><br />Target victim <b>website</b>: <i>wright-ryan.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Turbo-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31294</link>
<guid>889b262e03e28a9f19e72f08ab1ec3f0</guid>
<pubDate>Fri, 10 Apr 2026 13:57:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Turbo-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c6c552885c77f5ae6a5dd47377afced64090ccd29f55ccec03d0be23b05a2a0</i><br /><br />Threat actor <b>description</b>: <i>Turbo International was founded in 1989 as one of the first manuf
acturers of turbocharger component parts in North America. Origin
ally focused on producing compressor wheels and balancing service
s for local rebuilders, the company quickly expanded its product 
line to include all major turbocharger components and service kit
s.

We will upload 48gb of corporate data soon. Employee personal doc
uments (passports, DLs, 29 forms, addresses, phones, emails and o
ther information), client information, financials, contracts and 
agreements, corporate confidential documents, NDAs and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arkansas-Oral--Maxillofacial-Surgeons</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31293</link>
<guid>692f4a795f36e4289fd2626f6dca152c</guid>
<pubDate>Fri, 10 Apr 2026 13:21:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Arkansas-Oral--Maxillofacial-Surgeons</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f87f2afb563dc7a1a203332cc41947e288a009cdbb30da7672903b95205a0d1e</i><br /><br />Threat actor <b>description</b>: <i>Offers a wide range of services in the field of maxillofacial surgery</i><br />Target victim <b>website</b>: <i>arsurgeons.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Colonial-Presbyterian-Church</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31292</link>
<guid>d64991fabf71644c5859e7a54ff1e716</guid>
<pubDate>Fri, 10 Apr 2026 13:20:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Colonial-Presbyterian-Church</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a04d2df0421fd3f03d449746e8c0394cdd9ce436e7c5e0b320bf27fe60fadf75</i><br /><br />Threat actor <b>description</b>: <i>Colonial Presbyterian Church operates two campuses in Overland Park and South Kansas City</i><br />Target victim <b>website</b>: <i>colonialkc.org</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Netgain-Networks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31291</link>
<guid>d0ceaba6d228fd9ad99831d5df783c7c</guid>
<pubDate>Fri, 10 Apr 2026 12:32:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Netgain-Networks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1029bbea023e0162f373568f933ac866a2752b3f70ead42a0031cca2a0921c51</i><br /><br />Threat actor <b>description</b>: <i>Netgain Networks, Inc. is an information technology service compa
ny that focuses on computing, networking, and application needs o
f small/midsize businesses and branch offices of large corporatio
ns in Southern California.

We will upload corporate data soon. Employee personal documents (
passports and other HR files), client health information, financi
als, a lot of project information, contracts and agreements and s
o on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alvi-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31290</link>
<guid>da6227556cac5e27703ef56a6015cb50</guid>
<pubDate>Fri, 10 Apr 2026 09:28:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>Alvi-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3951eae21c12afe54a387633b88729e1367900b064f611159f0bc73f1b6b6e2</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1979, Alvi Associates, Inc. specializes in integrated engineering services for infrastructure projects, including structural, water resources, transportation, and geotechnical engineering.</i><br />Target victim <b>website</b>: <i>alviassociates.com</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Goulston--Storrs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31288</link>
<guid>1146d96286ade57a9fa715376dae4c20</guid>
<pubDate>Fri, 10 Apr 2026 00:58:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Goulston--Storrs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2899684e11a30ccbd376da8197a2b4dbcd590a05dd47bc6bcad0b1b3b3f8c146</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Goulston & Storrs is a full-service law firm headquartered in Boston, Massachusetts, USA, with additional offices in New York, Washington DC, and Beijing. The firm operates in the legal services industry, advising clients on real estate, corporate transactions, litigation, and finance matters. It serves a diverse range of clients including businesses, institutions, and individuals, with particular strength in commercial real estate law.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kannarr-Eye-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31287</link>
<guid>0982d54d18a026163f76888c0d226166</guid>
<pubDate>Fri, 10 Apr 2026 00:33:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Kannarr-Eye-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b83abeb385480f7c5d2042de6ef0b4b79f1ce22ad0ffaa95f389c05a856f554</i><br /><br />Threat actor <b>description</b>: <i>Kannarr Eye Care is a full-service optometry provider located in Pittsburg, Kansas, dedicated to improving lives through advanced eye care. They offer a wide range of services including eye exams, contact lens fittings, cataract surgery, and treatment for ocular diseases. The clinic serves patients in the four-state area, ensuring personalized attention and professional care. Kannarr Eye Care also provides vision financing options and works with various insurance providers to promote good eye health.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chalmers--Kubeck</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31281</link>
<guid>9c87b4fa747d4b5675c82f561eb9cd4c</guid>
<pubDate>Thu, 09 Apr 2026 21:57:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Chalmers--Kubeck</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57446b0f85c28c6f2bc101b215ef3e4e119237eee291415aeda6b38e2fea919e</i><br /><br />Threat actor <b>description</b>: <i>Industrial Machinery & Equipment</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Guerin-Glass</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31282</link>
<guid>add4f684a678d13d0ce8b389da309842</guid>
<pubDate>Thu, 09 Apr 2026 21:57:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Guerin-Glass</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4c028375bde0063ab121796f5249efb24dbddb69ec661139047c071f1b8a4ad1</i><br /><br />Threat actor <b>description</b>: <i>Architecture, Engineering & Design</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cox-Castle--Nicholson-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31285</link>
<guid>e2edf8a3b6635786b076e998ffdd1052</guid>
<pubDate>Thu, 09 Apr 2026 21:18:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Cox-Castle--Nicholson-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6e1ddad5699caec027269444b3d6032b431a0409fbdce434d18dbc0ae9dd9b5e</i><br /><br />Threat actor <b>description</b>: <i>Cox, Castle & Nicholson is a leading law firm specializing in real estate and related services, with o…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>South-Florida-Injury-Centers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31284</link>
<guid>dd17ee9e2355df4f69fd072a5bd3334d</guid>
<pubDate>Thu, 09 Apr 2026 20:42:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>South-Florida-Injury-Centers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dec5bbd519b150818cf6bfffcd56288e1f5e04a171e3b72cd985e8f3ebcbcccf</i><br /><br />Threat actor <b>description</b>: <i>South Florida Injury Centers was founded in 2000 by Dr. Brian Wilner, DC, a graduate of Life University College of Chiropractic. In his 24 years of experience with personal injury and auto accident cases, he has treated and managed conditions of the musculoskeletal system as well as Traumatic Brain Injuries. Conditions treated in the office include whiplash, herniated discs, torticollis, cervical strains, headaches, sciatica, and general low back pain.  We pride ourselves in providing both South Florida and the Treasure Coast with great service in Chiropractic care.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sonn-Law-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31272</link>
<guid>dafe0a22bfe43bc5f925ad398d6f90c2</guid>
<pubDate>Thu, 09 Apr 2026 19:54:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Sonn-Law-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4482580f330bda681dd69a149026bfdb946be1ce0aede8b4398516b8590ccf0d</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alamo-Heights-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31274</link>
<guid>bbb747080230bd2ed4070dfdf6d846f4</guid>
<pubDate>Thu, 09 Apr 2026 18:54:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Alamo-Heights-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b61fc296dad01f2e7f8d273a6d802d41777a79018b5a9c5b15dcd31cfa18103</i><br /><br />Threat actor <b>description</b>: <i>Education</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Siegel-Lewitter-Malkani</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31280</link>
<guid>dacb8cf07e5031179a2da26abd616327</guid>
<pubDate>Thu, 09 Apr 2026 16:54:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Siegel-Lewitter-Malkani</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3653831e114f6362da0ca40fb6f8af669f7fdbad9b5dc1f2095398e6686c79b3</i><br /><br />Threat actor <b>description</b>: <i>A highly respected law firm in the San Francisco Bay Area, specializing in employment law</i><br />Target victim <b>website</b>: <i>sl-employmentlaw.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Family-Psychological-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31279</link>
<guid>53787d42c3aacb84dd97baa865a42eab</guid>
<pubDate>Thu, 09 Apr 2026 16:53:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Family-Psychological-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>02ef386df15e1e6d26ea90156c8a41ffb04a0133a0e80564a45a9d325fa2c355</i><br /><br />Threat actor <b>description</b>: <i>Provides mental health services</i><br />Target victim <b>website</b>: <i>kcifpa.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Powell-Powell--Powell-P.A.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31278</link>
<guid>57cb680116490a4c6c0bb57a8fa476f1</guid>
<pubDate>Thu, 09 Apr 2026 16:53:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Powell-Powell--Powell-P.A.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>05c966db490b9b65e5e0005fa0c1aa31bda67a27fa676676a59cfb9f90663d27</i><br /><br />Threat actor <b>description</b>: <i>A law firm specializing in personal injury cases</i><br />Target victim <b>website</b>: <i>powelllawfirm.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-McLamb-Group-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31277</link>
<guid>9957d0d6c13e2cb00518c92af0df3b96</guid>
<pubDate>Thu, 09 Apr 2026 16:52:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>The-McLamb-Group-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12819fffe305fd2c637bf1aaa5b39e8340643c702a747338a8675396dbd1bd5e</i><br /><br />Threat actor <b>description</b>: <i>Specializ in warehousing and fulfillment, direct mail services, inventory management, printing and graphic design, and builder services</i><br />Target victim <b>website</b>: <i>themclambgroup.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>United-Medical-Doctors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31271</link>
<guid>0ab605102670807b661d9a1a4e618745</guid>
<pubDate>Thu, 09 Apr 2026 16:16:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>United-Medical-Doctors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8088062201697f06cf254977af10878313db55f234a85cb8830a3122a2ca2fda</i><br /><br />Threat actor <b>description</b>: <i>United Medical Doctors (UMD) is an independent multi‑specialty medical‑surgical group with 70+ Southern California locations and 40+ specialties. They focus on high‑quality, compassionate care, patient satisfaction, process improvement, outpatient surgery, clinical research.</i><br />Target victim <b>website</b>: <i>www.unitedmd.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>ImageMaster</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31266</link>
<guid>5909e98016c8d94baefc6def4f5b785e</guid>
<pubDate>Thu, 09 Apr 2026 14:30:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>ImageMaster</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3eb91b85016b7eba67b89e08936eefafdf14ac297c16e286a1f2e137cd726ea1</i><br /><br />Threat actor <b>description</b>: <i>ImageMaster, LLC is a leading provider of official statement docu
ments and roadshow services tailored for the municipal bond marke
t. They utilize advanced technology and a unique quality assuranc
e process to ensure accurate and secure document preparation and 
distribution.

We will upload 49gb of corporate data soon. Employee personal fil
es, clients information, projects, financials, contracts and agre
ements, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>MN-Health-Insurance-Network</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31265</link>
<guid>fa68a633df6169bb2bf730da98faff59</guid>
<pubDate>Thu, 09 Apr 2026 14:30:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>MN-Health-Insurance-Network</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ccdadfeae2fb89ca4416e103d5b69ac2a5c10732ad4b9917700dc865cf71371</i><br /><br />Threat actor <b>description</b>: <i>Minnesota Health Insurance Network specializes in providing a wid
e range of health insurance products, including individual and fa
mily plans, group and small business plans, Medicare plans, denta
l and vision insurance, and short-term health insurance.

We will upload 23gb of corporate data soon. Client and employee p
ersonal information (passports, addresses, phones, emails and so 
on), projects, financials, contracts and agreements and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shingle--Gibb-Automation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31264</link>
<guid>56909640f93a509bda9494a0178e091e</guid>
<pubDate>Thu, 09 Apr 2026 13:03:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Shingle--Gibb-Automation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a422aecce50ee6ded4f28852f483415589fc369f93e5fddfabe7570e4b53f40</i><br /><br />Threat actor <b>description</b>: <i>Shingle & Gibb Automation follows a time-honored commitment of pr
oviding the finest Industrial Automation & Networking, Motion Con
trol, Machine Safety and Power Transmission products from world l
eading manufacturers, including Siemens, Banner Engineering, Turc
k and Rittal.

We will upload 25gb of corporate data soon. Employee files (passp
orts, DLs and other files), HR files, detailed financials, client
information, NDAs, internal confidential files, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Newman--Marquez</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31262</link>
<guid>face3ee8cd23d4e678783e668802b7a6</guid>
<pubDate>Thu, 09 Apr 2026 13:02:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Newman--Marquez</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e0ac08e44655ef8022f6f6eb879481de443b59b136809954b816db6a8e50437</i><br /><br />Threat actor <b>description</b>: <i>Sehlmann Fensterbau GmbH specializes in wooden and wood-metal win
dows in the Hamburg metropolitan area. They offer optimal window 
solutions for innovative new constructions and stylish renovation
s, providing services from consultation and planning to productio
n and installation.

We will upload 95gb of corporate data soon. Employee personal fil
es, large amount of client personal files (passports, DLs, death 
certs, visas, credit cards and other files), financials, court fi
les, police reports, hearings, lawsuits and other files, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Signature-Healthcare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31260</link>
<guid>08115ea8e8a940675023870ddead8842</guid>
<pubDate>Thu, 09 Apr 2026 11:22:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Signature-Healthcare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>23040d1f382d99fdc3c248db07a7cfab0f84343ff9e95efb39728d2a570db85f</i><br /><br />Threat actor <b>description</b>: <i>Will there be a release? Keep an eye on the timer.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>A-Roettgers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31257</link>
<guid>ee091bf8c15bf02e47ba4b69d587fd03</guid>
<pubDate>Thu, 09 Apr 2026 00:55:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>A-Roettgers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fca7af0085dc3a2a40fa4c041daf7730cb1d1e9ae28dd147cafaf4818e55dc81</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>nepgroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31247</link>
<guid>092e9c75b6d721231d7a3b23bfbc88fd</guid>
<pubDate>Wed, 08 Apr 2026 18:46:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ALP-001</b> claims attack for <b>nepgroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a4a8fa195cd9a45981559f84e079d207205ce0af43ca3f7e6a5d6242f03062cd</i><br /><br />Threat actor <b>description</b>: <i>Country: USA Revenue: $2.1 Billion Storage: 70GB Description: NEP Group, founded in 1984 and headquartered in Pittsburgh, Pennsylvania, offers outside broadcast, studio production, audio and lighting, host broadcast support, and media management services ** WE UPLOADED 10GB As Samples ** ** You Can Download Samples From Leak Page **
Deadline: 2026-04-18 17:22:11</i><br />Target victim <b>website</b>: <i>nepgroup.com</i>]]></description>
<category>ALP-001</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sajet-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31244</link>
<guid>eba9940b6dcffe49a14de9a4899ab466</guid>
<pubDate>Wed, 08 Apr 2026 17:35:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>linkc</b> claims attack for <b>Sajet-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96b2fe085d4bc15c91a1fa9fbf9ac1dac3f66617d98b18069eea94978cf84cab</i><br /><br />Threat actor <b>description</b>: <i>700mb of blueprints including Amazon LEO (satellite) Project Kuiper scheme, Airbus, Boeing engines and metal alloy technologies.  Enjoy. 

https://amber-wooden-prawn-35.mypinata.cloud/ipfs/bafybeic5m7e3dvlunitnv6vxzbcvqqgm4pybgc3ykn3jo62jipshf6bjve</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>linkc</category>
</item>
<item xmlns:dc='ns:1'>
<title>StrongLink</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31243</link>
<guid>fa4c202fbc0421c1d4e317cbbbcac5a2</guid>
<pubDate>Wed, 08 Apr 2026 17:35:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>linkc</b> claims attack for <b>StrongLink</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3069744b639cc5c7001cc75ff70892cc487c35deac71a5a11c2634169bf425c</i><br /><br />Threat actor <b>description</b>: <i>DOWNLOAD SAMPLE: https://amber-wooden-prawn-35.mypinata.cloud/ipfs/bafybeian2lxaye6gwvi2kztzfpyr2lokzfngai3d4zjmtgqhhv74ixsvi4</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>linkc</category>
</item>
<item xmlns:dc='ns:1'>
<title>Network-Technology-Services-of-New-Jersey</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31242</link>
<guid>19ddc61af8f213d2c43c17204efab297</guid>
<pubDate>Wed, 08 Apr 2026 17:35:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>linkc</b> claims attack for <b>Network-Technology-Services-of-New-Jersey</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f546cdf7c87fbd6779cdcfead88135e24666771c7493d30a901968d0b404e92</i><br /><br />Threat actor <b>description</b>: <i>Whole datacenter is encrypted. Waiting for you in chat.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>linkc</category>
</item>
<item xmlns:dc='ns:1'>
<title>Scholle-IPN---1.7-TB-Data</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31238</link>
<guid>4c4aa2205676a162ba900d37ea48e67d</guid>
<pubDate>Wed, 08 Apr 2026 17:18:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Scholle-IPN---1.7-TB-Data</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>27be8277d0743caebdb1e9bbf4d23dfd73e31f363faf240b67c16ad2f2d3dcd1</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Scholle IPN is a global packaging manufacturer headquartered in the United States. The company specializes in flexible packaging solutions, including bag-in-box systems, spouted pouches, and aseptic packaging. It serves industries such as food and beverage, chemicals, and industrial markets. Scholle IPN operates manufacturing facilities across multiple countries and is recognized for its innovations in liquid and semi-liquid product packaging.</i><br />Target victim <b>website</b>: <i>scholleipn.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Idera---1.5-TB-data</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31237</link>
<guid>2ca2f2883873b256532b5e0cba354cff</guid>
<pubDate>Wed, 08 Apr 2026 17:17:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Idera---1.5-TB-data</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0262eb54a4fe7d9b7fb2ad79b55a75fe65fe6356f1eaa75310d2b883eced2122</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Idera is a US-based software company specializing in database management, developer tools, and test management solutions. It serves IT professionals and enterprises across industries, offering products for database performance monitoring, administration, and DevOps workflows. Its portfolio includes tools supporting SQL Server, MySQL, and other platforms. Idera operates globally with headquarters in Houston, Texas.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Deaconess-Health-System</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31192</link>
<guid>f230c4cd39d680d4cde59248861bdf9d</guid>
<pubDate>Wed, 08 Apr 2026 16:40:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Deaconess-Health-System</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>496dbf8bbda79ffcbc00fb3ef10ab33e5c4054cd1c811234fa79c0c4d1405fb4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eric-Davis-Dental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31228</link>
<guid>e5654b80531b9a7338900193f90fbba5</guid>
<pubDate>Wed, 08 Apr 2026 16:28:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>gunra</b> claims attack for <b>Eric-Davis-Dental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6fe5f51350f77965a92f1176baad7f1b2895e651763c16826a80a2b89c8fe571</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Eric Davis Dental is a dental practice based in the United States. The company operates in the healthcare and dental services industry, providing a range of oral health services to patients. These typically include general dentistry, cosmetic dental procedures, and preventive care. As a private dental practice, it serves local communities and focuses on patient-centered care and dental wellness.</i><br />Target victim <b>website</b>: <i>ericdavisdental.com</i>]]></description>
<category>gunra</category>
</item>
<item xmlns:dc='ns:1'>
<title>Metropolitan-Pediatrics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31207</link>
<guid>3ee84a1d752ef2d6bf779aa019023863</guid>
<pubDate>Wed, 08 Apr 2026 15:32:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Metropolitan-Pediatrics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6ad8e46d327769494cd7539a4c95021339310080e8f5e5454eba7e4ea3f6eac</i><br /><br />Threat actor <b>description</b>: <i>metropeds.com zoominfo.com/c/metropolitan-pediatrics/51350701 Metropolitan Pediatrics is an independent pediatrician practice with a 51-year history of providing quality care to Metropolitan Pediatrics's community. Metropolitan Pediatrics's pediatricians are all trained to manage and prevent health problems in infants, children, teens and young adults in the most friendly and cost effective manner possible</i><br />Target victim <b>website</b>: <i>metropeds.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Structures-Stucco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31204</link>
<guid>7850e0be9549edeb7b9746e02e4229ae</guid>
<pubDate>Wed, 08 Apr 2026 15:31:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Structures-Stucco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26c06039c6298f521829f18954fe9b9c9d03eff8c458f8e99b317155aff6b453</i><br /><br />Threat actor <b>description</b>: <i>structuresstucco.com zoominfo.com/c/structures-stucco-llc/398264895 Structures Stucco, LLC is a stucco subcontractor based in Phoenix, Arizona, specializing in multi-family homes, single-family homes, and commercial buildings. The company is committed to providing quality work, honest service, and great value, ensuring customer satisfaction through top-quality stucco services. They offer written quotes with accurate estimates of time and budget before starting any project. Structures Stucco prioritizes delivering quality jobs without compromising affordability or speed of implementation</i><br />Target victim <b>website</b>: <i>structuresstucco.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>DGS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31195</link>
<guid>16a153a27394122922a55fb102f602e3</guid>
<pubDate>Wed, 08 Apr 2026 15:27:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>DGS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc7850eed980a6256d227816e2937bba57beee716d2bdb32c977aa0738a35ef8</i><br /><br />Threat actor <b>description</b>: <i>dgsts.com DGS Technical Services is a structural steel and mechanical engineering firm that has been providing comprehensive design, detailing, and 3D modeling services since 2004. Based in Elgin, Illinois, they serve a variety of industrial and commercial clients, including those in the semiconductor and vending machine industries.</i><br />Target victim <b>website</b>: <i>dgsts.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>EMCO-Holding</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31194</link>
<guid>b6622e4ef1a8d811316fe50fd2975faf</guid>
<pubDate>Wed, 08 Apr 2026 15:27:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>EMCO-Holding</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d2196aa2379a1970e4eeef4a7dfa762b0a923b578e6c28c5b8f0aae48f01fe0</i><br /><br />Threat actor <b>description</b>: <i>emcoholding.com Grupo EMCO Holding is a conglomerate of prestigious companies operating in different areas, guided by a philosophy of excellence and responsibility, with significant investments in Central America. In recent years, the group has diversified and has strongly positioned itself in fields such as the airport sector, cargo terminals, steel production, and steel manufacturing, and is currently developing energy generation projects. Thanks to its major projects, rapid growth, and investments, Grupo EMCO has established itself as one of the most important, strongest, and most prestigious groups in Central America.</i><br />Target victim <b>website</b>: <i>emcoholding.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>pacificwestinjury.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31180</link>
<guid>869984f8baf167efc8123bf85fc1ccb4</guid>
<pubDate>Tue, 07 Apr 2026 22:08:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>pacificwestinjury.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ad11d3b891c3586f7e1e648d493ae852e557a62934e525a7405b4494021d1f7</i><br /><br />Threat actor <b>description</b>: <i>Pacific West Injury Law opened its doors with the singular mission of providing its clients with the best possible representation when handling personal injury cases.</i><br />Target victim <b>website</b>: <i>pacificwestinjury.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Noble-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31179</link>
<guid>a3577dabfbc7a0e6685b1a3b68a0ac84</guid>
<pubDate>Tue, 07 Apr 2026 20:39:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Noble-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60772e3329a1f4ebcbd00795040a8c3a1fa00cdf9554ac3c1e78cf435d39b9a3</i><br /><br />Threat actor <b>description</b>: <i>Noble Casing, Inc., founded in 2009, provides casing running and conductor drilling services in the Rocky Mountain region, emphasizing safety, training and equipment upkeep. Subsidiaries Noble Drilling and Noble Trucking support production and rig moves.</i><br />Target victim <b>website</b>: <i>www.nobleoilfieldservices.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.smithdollar.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31178</link>
<guid>c230257fc8994f9835dc50c0b267db0e</guid>
<pubDate>Tue, 07 Apr 2026 16:38:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>www.smithdollar.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>813c767c3a5f3742664fb37438a9223c5e2a5cbda035350979acbbfbf030953e</i><br /><br />Threat actor <b>description</b>: <i>Smith Dollar is a Santa Rosa law firm that provides comprehensive legal services to businesses and individuals throughout Northern California. The firm specializes in various practice areas including construction law, employment and labor law, business law, personal injury, real estate law, and estate planning. With a team of experienced attorneys, Smith Dollar is dedicated to offering strategic legal counsel and representation tailored to the needs of its clients, which range from contractors and business owners to individuals facing legal challenges. Established in 2005, the firm prides itself on its commitment to excellence and client-oriented service.</i><br />Target victim <b>website</b>: <i>www.smithdollar.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>CMD-Outsourcing-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31177</link>
<guid>58e473658c4b6757ec8379817d35e6fa</guid>
<pubDate>Tue, 07 Apr 2026 15:48:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>CMD-Outsourcing-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3183618243575044b9670c0d7b9cab7c4286258064be1d60b71dd38159432750</i><br /><br />Threat actor <b>description</b>: <i>CMD Outsourcing Solutions specializes in multi-channel customer s
ervice solutions tailored for higher education institutions, exte
nding support to departments such as Financial Aid, Admissions, B
ursar, Registrar, and Housing.

We will upload corporate data soon. Scanned employee documents (p
assports, DLs, SSNs, medical files and so on), financial files, N
DAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Research--Planning-Consultants</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31176</link>
<guid>127449db06658be5e1bc1cd51bde8b78</guid>
<pubDate>Tue, 07 Apr 2026 15:48:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Research--Planning-Consultants</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18d788f97f0d460df8a7e2cf944d9e7ef83c96c8c64aa44da4523cb91c1f4439</i><br /><br />Threat actor <b>description</b>: <i>Research & Planning Consultants, L.P. specializes in providing ex
pert analysis and consulting services in personal injury and comm
ercial litigation.

We will upload 33gb of corporate data soon. Projects, financials,
client and employee information, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>AnchorsGordon</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31175</link>
<guid>5796f99c5d3c7bac8c90cc042869a7ea</guid>
<pubDate>Tue, 07 Apr 2026 14:26:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>AnchorsGordon</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1bdd7675faa5bfe18a7910f3f96697b4f908c728e8c0347dba3938cac51a156</i><br /><br />Threat actor <b>description</b>: <i>AnchorsGordon is a law firm based in Northwest Florida with decades of experience in various legal fields. They specialize in complex business and commercial litigation, business and corporate law, real estate litigation, community association law, alternate dispute resolution, government affairs, and labor and employment law. The firm aims to serve a diverse clientele, providing expert legal services tailored to their needs. With a team of experienced attorneys, AnchorsGordon is recognized as a leader in the legal community of Northwest Florida</i><br />Target victim <b>website</b>: <i>anchorsgordon.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bit-Wizards</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31174</link>
<guid>ae71f3fbfec5315779741343d709648c</guid>
<pubDate>Tue, 07 Apr 2026 14:25:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Bit-Wizards</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d82aaaca7ff3be0442b071079708a949786d3a20fcd579aac509b2215c58ec65</i><br /><br />Threat actor <b>description</b>: <i>Bit-Wizards is a technology company that develops an application, builds a brand, or move to the cloud. This company is headquartered in Florida</i><br />Target victim <b>website</b>: <i>bitwizards.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Star-Fuels</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31173</link>
<guid>85c19375f0c12c6793bf66b4e2666dc4</guid>
<pubDate>Tue, 07 Apr 2026 14:18:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Star-Fuels</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0429a644b92914260428909bdf975dfcc4a5b200dd61438b1a7a2c5d0c50188d</i><br /><br />Threat actor <b>description</b>: <i>Data breach at a small fuel company.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Accent-Dental-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31172</link>
<guid>3e06c5b828dcafa030c827d58b2cc858</guid>
<pubDate>Tue, 07 Apr 2026 14:17:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Accent-Dental-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>84b9090babd3b0c826c2d2df06d2f93b69a841559af1083c311d496251696e62</i><br /><br />Threat actor <b>description</b>: <i>Accent Dental Center On Forum is a general dentistry practice loc
ated in Columbia, MO, dedicated to providing high-quality and aff
ordable dental care. The center offers a range of services includ
ing exams, cleanings, cosmetic dentistry, dental implants, and tr
eatments for TMJ and oral facial pain.

We will upload corporate data soon. Detailed patients (name, DOB,
passport numbers, medical information, addresses and so on (more
than 1000 ppl)), employee personal documents, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>School-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31170</link>
<guid>93a819cbd635bd1505ef0f804c21cc2a</guid>
<pubDate>Tue, 07 Apr 2026 12:47:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>School-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f7358300cb7c46ac264006a95976bb715e11f2594e3abf3b5102e82b39d6dd9</i><br /><br />Threat actor <b>description</b>: <i>School Health was founded in 1957. This company provides the reta
iling of health and wellness supplies to K-12 schools. Their head
quarters are located in rolling Meadows, Illinois.

We will upload 15gb of corporate data soon. Financials, a bit of 
HR files, drawings, projects, customer info, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Adrian-Jules</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31169</link>
<guid>13a0e2e9d803e8072b0d637d16f5fdb9</guid>
<pubDate>Tue, 07 Apr 2026 12:47:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Adrian-Jules</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2df53fba12c61f489d4beaebd44b26d6a83d6ddd2b5d02ccf72dbf566b3626a5</i><br /><br />Threat actor <b>description</b>: <i>Adrian Jules Ltd. specializes in the design, manufacturing, and w
holesaling of custom clothing made in America, focusing on bespok
e garments crafted by hand. The company offers a range of men's c
lothing styles and provides a private label service for those loo
king to create their own luxury clothing brand.

We will upload 15gb of corporate data soon. HR files (employee em
ails, phones and so on), financials (personal financial statement
s, payment details, credit cards and so on), drawings, projects, 
detailed customer info (addresses, contacts, even height, weight 
and so on), NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>ARC-Dialysis-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31168</link>
<guid>5a1c75edbbb57641d5479f233810a798</guid>
<pubDate>Tue, 07 Apr 2026 12:09:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>ARC-Dialysis-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2404d134967e2e4a518b4fbfb82783b52dfff517dea7183920a40e3c7be2ad32</i><br /><br />Threat actor <b>description</b>: <i>Independent dialysis service provider</i><br />Target victim <b>website</b>: <i>arcdialysis.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>academyhealth.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31165</link>
<guid>a0fb781fa35dbce6299c291eb39e0022</guid>
<pubDate>Mon, 06 Apr 2026 21:16:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>academyhealth.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5d57b5ed0285086bd011df4c02b08ccd916cec59485067fcfd06a87244ba2d41</i><br /><br />Threat actor <b>description</b>: <i>Is a U.S.-based nonprofit professional organization headquartered in Washington, D.C., dedicated to advancing the fields of health services research and …</i><br />Target victim <b>website</b>: <i>academyhealth.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crystal-Point</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31164</link>
<guid>f925a12c1605eac85a75144b0043c343</guid>
<pubDate>Mon, 06 Apr 2026 19:43:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Crystal-Point</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed42c6d18961db285a05a3cadd530dfa6541d4b5b59ae6220be9535397371bd3</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.crystalpoint.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Morphosis</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31163</link>
<guid>6392877325fd73711329e5df268cc96e</guid>
<pubDate>Mon, 06 Apr 2026 19:42:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Morphosis</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5ccff39b13aff69a3b3e1c76635099d2cc6511f346cc7170a903b5fd5abe60f3</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.morphosis.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aqua-Serv-Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31162</link>
<guid>cc6a03346a8c24eacf57bdf97c1f9c9e</guid>
<pubDate>Mon, 06 Apr 2026 16:25:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Aqua-Serv-Engineers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bae3e23b8dfded69fd7c3621882f648678e8ccbaa045e4d1069c8e1c60d4953e</i><br /><br />Threat actor <b>description</b>: <i>Aqua-Serv Engineers, Inc. is one of the largest independent regio
nal industrial water treatment companies in the United States, he
adquartered in Fontana, California. They provide a wide range of 
water treatment products and services to various industries, incl
uding healthcare, government, food and beverage, and hospitality.

We will upload 17gb of corporate data soon. Employee personal doc
uments (passports, driver licenses and other docs), drawings and 
specifications, client information, detailed financials, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>AKM-Consulting-Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31159</link>
<guid>bfd6bb38a2386fbab71d56ecdb552b42</guid>
<pubDate>Mon, 06 Apr 2026 14:53:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>AKM-Consulting-Engineers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>64dbc8452eadc9d209e91126bb9ae7440aaf41bf7ad636121a858b5de2c9327d</i><br /><br />Threat actor <b>description</b>: <i>AKM Consulting Engineers specializes in providing expert engineer
ing solutions for public agencies, focusing on water and wastewat
er systems, infrastructure, and flood control projects.

We will upload 17gb of corporate data soon. HR files, drawings an
d specifications, client docs, detailed financials, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>douglasstruckbodies.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31136</link>
<guid>e988d81b705df34d7735e84bdd0220f9</guid>
<pubDate>Mon, 06 Apr 2026 13:59:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>douglasstruckbodies.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2d4fbd2133e82759d88fe8e4a01051f24304cda27c309f54361a40e97e2783fb</i><br /><br />Threat actor <b>description</b>: <i>Douglass Truck Bodies specializes in the manufacturing and design of standard and custom truck bodie...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carmelo-Candy-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31128</link>
<guid>e348c1b446fae14bfcf5ae20ee4c23f0</guid>
<pubDate>Mon, 06 Apr 2026 07:00:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Carmelo-Candy-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da21b249a9a21d08482459db093192b84a715c243066d25afee3b66cc0638bfb</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>www.shop.caramelo-candy.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>VirtaHealth</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31119</link>
<guid>498b71407ed107b5a3f83951be5b4df4</guid>
<pubDate>Sun, 05 Apr 2026 06:14:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lapsus$</b> claims attack for <b>VirtaHealth</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>292901f28b82ed1c78ec6940b962b7f1865c69e2fe76a4fd8bb959c019d69c7e</i><br /><br />Threat actor <b>description</b>: <i>Healthcare research</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lapsus$</category>
</item>
<item xmlns:dc='ns:1'>
<title>GCA-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31114</link>
<guid>608e170b60b7fd6f11914a4ec9dfedbd</guid>
<pubDate>Sat, 04 Apr 2026 22:47:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>GCA-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a05c590700bfb8c88693e8c6e6735ce1dbe4f3d8bae4984b51318614298ac6c</i><br /><br />Threat actor <b>description</b>: <i>gcagroupllc.com zoominfo.com/c/gca-group-llc/539618075 GCA Group LLC (Global Capital Advisors Group LLC) is an international business development and capital formation advisory firm focused on start-ups, early-stage businesses, alternative asset managers, and philanthropic organizations worldwide. Their services include capital introductions, marketing, brand management, new product development plans, and event coordination and logistics. The company is privately held, headquartered in Houston, Texas, with approximately 6 employees and annual revenues of around $7.2 million</i><br />Target victim <b>website</b>: <i>gcagroupllc.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>jrk.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31103</link>
<guid>cef65a145c54dbe0f1ea8ad16a331421</guid>
<pubDate>Sat, 04 Apr 2026 22:43:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>jrk.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>906ce6e1777a5a14d60425827eb0075926ce4c8e1eb61c394abf8c5e4501328f</i><br /><br />Threat actor <b>description</b>: <i>A leading real estate investment and property management company specializing in multifamily and commercial assets. The data includes a breach involving 111,000 Social Security numbers from the company jrk.com.

Responsibility for the publication will lie with both the company itself and the insurance providers servicing it - mash.com (the intermediary) and the primary insurer beazley.com - which fails to properly value its clients’ data and is deliberately ignoring communications in an attempt to avoid payment, thereby putting the company at risk.</i><br />Target victim <b>website</b>: <i>jrk.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sokolin</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31100</link>
<guid>77c33d0fb152118e33778d34ae8a0473</guid>
<pubDate>Sat, 04 Apr 2026 19:57:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Sokolin</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24410a51b0f91f9805119d438ecc0fea8787ad80c77fa1d24cd07b23d9b40ec6</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.sokolin.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>EMCO-Electric-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31095</link>
<guid>3c12c84af346626dc2f1b77e52bb301e</guid>
<pubDate>Sat, 04 Apr 2026 16:54:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>EMCO-Electric-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>433f9d7551a0891d422ea481ab2ea182f6f9dbd0a67724cb92669e262673f339</i><br /><br />Threat actor <b>description</b>: <i>Electrical Resource International specializes in manufacturing a wide range of electrical installation products, including conduit, fittings, and accessories. With over 40 years of experience, they cater to various industries such as food and beverage, pharmaceuticals, and water treatment. Their product offerings include stainless steel fittings, liquid-tight connectors, and metal framing channels, designed to meet strict sanitary and corrosive requirements. The company aims to serve clients in residential, commercial, and industrial sectors, providing reliable solutions for electrical system needs. - corp you have 10 days to contact and get in touch for recover.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>Community-Connections</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31091</link>
<guid>c36214df5bdf67eaf55e6620f468b0ec</guid>
<pubDate>Sat, 04 Apr 2026 01:16:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Community-Connections</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>481a3d5ecddb7456714ef8ca1b767914301126428939a3ed23b7c82bc50dcc75</i><br /><br />Threat actor <b>description</b>: <i>Community Connections operates as a non-profit behavioral health organization dedicated to serving vulnerable populations including women, men, youth, and children who face systemic barriers to healthcare access. The organization addresses critical gaps in mental health and substance use treatment by providing comprehensive services tailored to the specific needs of marginalized communities. The organization delivers an integrated continuum of care that combines behavioral health treatment, residential support services, and primary health care coordination. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advanced-Vehicle-Assemblies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31090</link>
<guid>58117c3bd751aef482be0d07b465f6a5</guid>
<pubDate>Sat, 04 Apr 2026 00:25:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Advanced-Vehicle-Assemblies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1caf58bcd5a469af5cff602f24284dae7ec0a2145a98a04fbc322609b8bc3ee3</i><br /><br />Threat actor <b>description</b>: <i>- Banking & Financial Systems- Accounting & Tax Records- Customer & Sales Data- Engineering & Manufacturing IP</i><br />Target victim <b>website</b>: <i>www.avabuilt.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>coronapa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31089</link>
<guid>c73edcecd97f8e999b5cd937d5e6827e</guid>
<pubDate>Fri, 03 Apr 2026 23:48:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>coronapa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f2694f7a61a7f485b0404895e10d6a24ba18c8bf0dbd03b0c753b7e931ec7bd9</i><br /><br />Threat actor <b>description</b>: <i>Corona Law Firm is a proud excellent client service and skillful representation. Established in 1997,  well-known in the Florida legal community.</i><br />Target victim <b>website</b>: <i>coronapa.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Harman-Fitness</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31083</link>
<guid>b6843321325fae220b98267172f2f0ba</guid>
<pubDate>Fri, 03 Apr 2026 20:21:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>netrunner</b> claims attack for <b>Harman-Fitness</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7336a30b97b25b9daacda424f786f2bf5ab5e016badbaf7751b8429cf691ffe7</i><br /><br />Threat actor <b>description</b>: <i>Harman Fitness is a multi-unit franchise operator and management company that owns and runs dozens of Crunch Fitness clubs across the U.S. — operating Crunch locations under franchise agreements with over 40 gyms nationwide</i><br />Target victim <b>website</b>: <i>crunchfitness.com</i>]]></description>
<category>netrunner</category>
</item>
<item xmlns:dc='ns:1'>
<title>Westamerica-Communications</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31073</link>
<guid>683768cf9ad8eecfd2e847498002cd29</guid>
<pubDate>Fri, 03 Apr 2026 17:53:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Westamerica-Communications</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46b4c13d5a1d44e8c260df9221922bed84f57078da89519afc49a074344a4ea7</i><br /><br />Threat actor <b>description</b>: <i>Westamerica Communications services include commercial lithographic and digital printing, direct mailing and online marketing, strategy and branding, distribution and fulfillment.We will upload over 70gb of corporate data soon. Employee personal information (DLs and so on), customer files, detailed financials, payment details, projects, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Charles-River-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31074</link>
<guid>004acbc8eefec9fe0629b15f52b94bcf</guid>
<pubDate>Fri, 03 Apr 2026 17:53:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Charles-River-Insurance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b2170434d25235dc608bbd2a67e9e62dca4d8c8f89dcf626fd084b649855f1d0</i><br /><br />Threat actor <b>description</b>: <i>Charles River Insurance is an independent insurance agency headquartered in the state of Massachusetts that focuses on delivering personalized risk management and insurance solutions to individuals and businesses.We will upload 63gb of corporate data soon. Detailed employee andcustomer personal information (passport, DLs, SSNs, addresses, phones, emails and so on), detailed financials, payment details, projects, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Community-College-of-Beaver-County</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31076</link>
<guid>0d4c864bca956a5d20efbe942d6cf993</guid>
<pubDate>Fri, 03 Apr 2026 16:20:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Community-College-of-Beaver-County</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c719eb2d3c8ebcb8c829e3f7254c698f792b02478c759eb853dd7c717f7f311</i><br /><br />Threat actor <b>description</b>: <i>The college serves a diverse student body, including recent high school graduates, adult learners, and those seeking career advancement. By focusing heavily on workforce development but neglecting its security, the college compromised hundreds of records containing personal and confidential information, as well as financial documents, projects, and contracts, which were subsequently leaked to the public.</i><br />Target victim <b>website</b>: <i>https:ccbc.edu</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Woodland-Trade</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31075</link>
<guid>e80a5fcb147d23edaed26cc0c74f47ab</guid>
<pubDate>Fri, 03 Apr 2026 16:03:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Woodland-Trade</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f21a53fcf7327ae2503a7301abc960b0c4e2158e1624e3d19b79d677fd2e4be7</i><br /><br />Threat actor <b>description</b>: <i>Woodland Trade Company is a full-service tool design and manufact
uring firm based in Tacoma, Washington, specializing in tool desi
gn and fabrication using composites, metals, and 3D printed hardw
are. The company serves a diverse range of industries including a
erospace, automotive, marine, medical, and space, and is recogniz
ed for its engineering design, CNC machining, and additive manufa
cturing capabilities.

We will upload 13gb of corporate data soon. Detailed employee inf
ormation (passport, DLs, SSNs, addresses, phones, emails and so o
n), financials, payment details, credit card information, project
s, drawings and specification contracts with government facilitie
s and big names like BOEING and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Vintage-Home-Briggs-Plumbing-Products-Genco-Manufacturing-American-Vintage-Hom</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31071</link>
<guid>6705d77f2d837e528fb0edd21579e9c0</guid>
<pubDate>Fri, 03 Apr 2026 15:47:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>American-Vintage-Home-Briggs-Plumbing-Products-Genco-Manufacturing-American-Vintage-Hom</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>089d3cb1c9a6fa63317315e0bf9cc7eb6ee81e7ad2006519bef12242da19155e</i><br /><br />Threat actor <b>description</b>: <i>We obtained about 11gb of data of the following companies:American Vintage Home specializes in heating, air conditioning, and plumbing services tailored for vintage homes in the Chicago North Shore area. Their expert technicians focus on preserving the charm of older homes while providing modern HVAC solutions, including high-velocity and ductless systems.Briggs Plumbing Products, Inc. manufactures and markets enameled steel products, vitreous china, and faucets for residential, hospitality, and commercial applications. Founded in 1908 and headquartered in Goose Creek, SC.Genco Manufacturing specializes in high-quality, American-made utility truck beds, offering a range of products including the Genco Royal Utility Truck Bed and Genco Sporting Flatbed Body.American Vintage Home specializes in heating, air conditioning, and plumbing services tailored for vintage homes in the Chicago North Shore area.Associates of Clifton Park offers a range of insurance products including long-term care insurance, Medicare supplements, life insurance, and group disability insurance. You will find personal employee personal data, HR files, medical information, client information, project files, confidential files, accounting and financials, contracts and agreements and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Vintage-Home-Briggs-Plumbing-Products-Genco-Manufacturing-American-Vintage-Hom...</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31072</link>
<guid>9e106e26d5ec709ce1b63d12c5447791</guid>
<pubDate>Fri, 03 Apr 2026 13:06:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>American-Vintage-Home-Briggs-Plumbing-Products-Genco-Manufacturing-American-Vintage-Hom...</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c6ca9c4c3209ddb8f15e1b137b87cfb31bab61284613c3c424f6d85c6e85664</i><br /><br />Threat actor <b>description</b>: <i>We obtained about 11gb of data of the following companies:

American Vintage Home specializes in heating, air conditioning, a
nd plumbing services tailored for vintage homes in the Chicago No
rth Shore area. Their expert technicians focus on preserving the 
charm of older homes while providing modern HVAC solutions, inclu
ding high-velocity and ductless systems.

Briggs Plumbing Products, Inc. manufactures and markets enameled 
steel products, vitreous china, and faucets for residential, hosp
itality, and commercial applications. Founded in 1908 and headqua
rtered in Goose Creek, SC.

Genco Manufacturing specializes in high-quality, American-made ut
ility truck beds, offering a range of products including the Genc
o Royal Utility Truck Bed and Genco Sporting Flatbed Body.

American Vintage Home specializes in heating, air conditioning, a
nd plumbing services tailored for vintage homes in the Chicago No
rth Shore area.

Associates of Clifton Park offers a range of insurance products i
ncluding long-term care insurance, Medicare supplements, life ins
urance, and group disability insurance. 

You will find personal employee personal data, HR files, medical 
information, client information, project files, confidential file
s, accounting and financials, contracts and agreements and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southeastern-Conference-of-Seventh-day-Adventists</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31070</link>
<guid>1c05021910bd1385d5bb4ea2ae8fe585</guid>
<pubDate>Fri, 03 Apr 2026 12:48:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Southeastern-Conference-of-Seventh-day-Adventists</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>697da0fb19544022897988cb45d39ea6d886a9a4c13b2b12fe4d27b3af18ea1b</i><br /><br />Threat actor <b>description</b>: <i>Data is not available now.</i><br />Target victim <b>website</b>: <i>www.secsda.org</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Siena-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31068</link>
<guid>03abddc67647f4283654c0503482e74b</guid>
<pubDate>Fri, 03 Apr 2026 12:47:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Siena-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f79f67f26171ada972e6aa2841c9f91a5014f8c4bd43d52bfdc2f8c2deb13595</i><br /><br />Threat actor <b>description</b>: <i>- QBOOK Data- Project Records- Employee Information- Finance Records- Technical Data- Suppliers Information- Bid Documents</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Neptune-Mechanical-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31066</link>
<guid>9e5238f97bcf5cbfe605cdbed7f4e26d</guid>
<pubDate>Fri, 03 Apr 2026 12:47:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Neptune-Mechanical-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ca42b02ee22a2dc5079554bc17992d4ae47fc29eebd598ae3f677811066c2b2</i><br /><br />Threat actor <b>description</b>: <i>- Banking & Financial Systems- Accounting & Tax Records- Payroll & Employee Financial Data- HR & Employee Personal Data- Real Estate & Tenant Data</i><br />Target victim <b>website</b>: <i>callneptune.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>roodtrucking.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31062</link>
<guid>5b648f859eb8adc0121e6a1bf7f6aa98</guid>
<pubDate>Fri, 03 Apr 2026 12:14:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>roodtrucking.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e63755d1e4d226c947567100866ab68214d5dfa7119cf9609c372b0155b02fe</i><br /><br />Threat actor <b>description</b>: <i>Employees: 20 Revenue: $5 Million Industry: Transportation and Warehousing</i><br />Target victim <b>website</b>: <i>roodtrucking.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Asmar-Schor--McKenna</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31057</link>
<guid>b8d1200c2569eb9ce9c29e1698dbc84e</guid>
<pubDate>Fri, 03 Apr 2026 06:30:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Asmar-Schor--McKenna</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a57b49b9d17fe75cd74916e544c69b741789bbdc35434d98773ea40375693d8</i><br /><br />Threat actor <b>description</b>: <i>Asmar, Schor & McKenna is a leading construction law firm specializing in construction law, government contracts, commercial real estate transactions, and corporate law. Their clients range from Fortune 100 companies to national and international contractors, subcontractors, homebuilders, and design professionals. The firm provides legal guidance for projects on regional, national, and international scales, handling matters in courts and tribunals across the United States and globally. They are recognized for their expertise and have received numerous accolades, including rankings in Chambers USA and Best Lawyers.</i><br />Target victim <b>website</b>: <i>asm-law.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Faulkner-County-Sheriffs-Office</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31053</link>
<guid>dc238c9533597a8cc2a9738ebde4bfcb</guid>
<pubDate>Fri, 03 Apr 2026 00:44:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Faulkner-County-Sheriffs-Office</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6ab10bc28f43e4bcbe22f2710226910a58c025624801792a4362a9d3b313977</i><br /><br />Threat actor <b>description</b>: <i>Government</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wolf-Technology-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31054</link>
<guid>7c0d5fe6c602bc990fb88b539bc3a45e</guid>
<pubDate>Thu, 02 Apr 2026 23:15:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>Wolf-Technology-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b638775e87285dc884524cae886e2e32e4bc7efcdcaae89673f68d4064c5ba03</i><br /><br />Threat actor <b>description</b>: <i>Wolf Technology Group specializes in providing cost-effective IT solutions and services for small businesses, helping them manage their technology needs without the expense of in-house support. Their offerings include Broadband, Infrastructure, VoIP, and managed IT services tailored to individual client requirements. The company focuses on enhancing business performance through improved IT systems and ensuring business continuity with expert support. With a team of certified IT professionals, they provide personalized strategies to optimize technology infrastructure while saving time and money - corp you have 10 days to contact us or everything will be leaked and no recover and will take actions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>cesimaging.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31037</link>
<guid>6f39194d3df14d057e8ba796fcae6942</guid>
<pubDate>Thu, 02 Apr 2026 15:38:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>cesimaging.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6791ac5a99a9a858eedc73a70da152f13706f98e2b31313bfada8fb7e99bfe3</i><br /><br />Threat actor <b>description</b>: <i>The company is an authorized dealer for Canon, Sharp, Oce, KIP America, and HP</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Center-for-Hearing--Speech</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31046</link>
<guid>eb8348943495b531aad669701d56f569</guid>
<pubDate>Thu, 02 Apr 2026 14:23:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>The-Center-for-Hearing--Speech</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b4a1bed51d5b12321902aaad1ef867d4030ee4106b70fb7f1ca9655c0009a8c</i><br /><br />Threat actor <b>description</b>: <i>The Hearing and Speech Center provides comprehensive services in hearing diagnostics, speech therapy, and screening for people of all ages.
However, it is not responsible for the security of your personal data; as a result of their negligence, a large amount of personal data belonging to clients and employees, as well as their confidential information, projects, and incident reports, was leaked online.</i><br />Target victim <b>website</b>: <i>https:thecenterforhearingandspeech.localsearch.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>acmealliance.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31044</link>
<guid>e72aceb00e6097c55a790d4e7ae23a9c</guid>
<pubDate>Thu, 02 Apr 2026 14:05:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>acmealliance.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>40922b2ba2da4289dd771ca545545b73db944b39ac1c6ac31a9eda4cbe4700ef</i><br /><br />Threat actor <b>description</b>: <i>It is a global manufacturer specializing in the custom production of die-cast components for various industries, including the automotive, marine, and agricultural sectors.</i><br />Target victim <b>website</b>: <i>www.acmealliance.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>northstarmetal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31043</link>
<guid>c8167cf7f61157655b7248284b413b6f</guid>
<pubDate>Thu, 02 Apr 2026 14:04:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>northstarmetal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>281890d6d8de46cbb7c87da33d709d4fc6e3bb1b124c31aa98144efcb11f83d1</i><br /><br />Threat actor <b>description</b>: <i>Northstar Metal Products is a manufacturer of metal products. Services: CNC machining, laser cutting, robotic welding, powder coating, and prototyping. Industries: telecommunications, manufacturing, transportation, energy, healthcare, and home goods.</i><br />Target victim <b>website</b>: <i>northstarmetal.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>kleankanteen.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31042</link>
<guid>fca68f4dff3920d202186d63f9048dfa</guid>
<pubDate>Thu, 02 Apr 2026 14:03:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>kleankanteen.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>926f76d00ac842a696ca2a9f8418b64c5f7fcd1683abb33ea6c2fd6d66f7d2c2</i><br /><br />Threat actor <b>description</b>: <i>Klean Kanteen was founded in 2004. The company manufactures reusable stainless steel water bottles. The company's headquarters are located in Chico, California.</i><br />Target victim <b>website</b>: <i>kleankanteen.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>greenwayfence.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31033</link>
<guid>9fdf913312884f2e344898dfdda3409f</guid>
<pubDate>Thu, 02 Apr 2026 12:33:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>greenwayfence.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6255dec14131657140eaaf3a0541f1f0a8f08c5686a8438be9fa89b0f8525ccd</i><br /><br />Threat actor <b>description</b>: <i>A wholesale supplier of fencing and railings serving both private homeowners and contractors throughout the East Coast. They offer a wide range of 
custom fencing materials, including vinyl and aluminum options, as well as decking and specialty products.</i><br />Target victim <b>website</b>: <i>greenwayfence.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>congoleum.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31032</link>
<guid>1ff4dc549f35ef8cbdcb51f0dc4972a8</guid>
<pubDate>Thu, 02 Apr 2026 12:32:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>congoleum.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d5ece0d1c6269e4ab56592a03424fd06f75198cd6a0e9dc3c51338b81f9fe0c5</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1886 and headquartered in Mercerville, New Jersey, Congoleum develops and manufactures flooring for residential and commercial spaces.</i><br />Target victim <b>website</b>: <i>congoleum.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>atpkg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31031</link>
<guid>8c711b2a61cccea42c643ce986dc203a</guid>
<pubDate>Thu, 02 Apr 2026 12:32:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>atpkg.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e18ea78d128f87e0ec4b53e3138578a0d7caafe7d651c0b96b293ac3aa32479</i><br /><br />Threat actor <b>description</b>: <i>At AT Packaging, employees play a key role—dedication, a commitment to quality, and team spirit are at the core of the company’s business philosophy. If you are a dynamic, customer-focused individual, there may be a career opportunity for you at AT Packaging.
The following positions are available: Warehouse Operations — the company’s operations must be based on an organized and efficient warehouse to ensure high-quality customer service.</i><br />Target victim <b>website</b>: <i>www.atpkg.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>TouchSource</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31028</link>
<guid>f40ef5fc5d2ac8911c6a5362f89a06ab</guid>
<pubDate>Thu, 02 Apr 2026 09:15:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>TouchSource</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9090af053a71198cb735adf891c6424cc95f7e597078a2a531b4f169f03c778</i><br /><br />Threat actor <b>description</b>: <i>TouchSource delivers simple solutions for smart spaces that engage people. Our captivating digital displays and IoT-connected directory solutions improve the experience of tenants, visitors, and shoppers. We create intelligent digital experiences in residential, business, retail, healthcare, and public spaces with relevant, engaging content that moves people where it matters. Our digital signage solutions in the TouchSource ActiveSpaces portfolio are simple to deploy, easy to use and low effort to maintain. 
The company headquarters is located in 1370 Miners Drive, Suite 103, Lafayette, Colorado 80026, USA.
11-50 Employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Neurologic-Associates-Of-Central-Brevard</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31026</link>
<guid>e5f733249a6f0dc11a6b1d4568c786da</guid>
<pubDate>Wed, 01 Apr 2026 22:31:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Neurologic-Associates-Of-Central-Brevard</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9033b8b48445564c331bd27e12f83ba1d2d0cc84d14c8519f0b715e2b7beef67</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.neurologicassociatesofbrevard.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Elara-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31021</link>
<guid>7c019f69abfc6be1b8a91b27e41d2f77</guid>
<pubDate>Wed, 01 Apr 2026 21:33:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Elara-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>31fd307655028332a43592da8320639c49f42f2d4ed4582a7f42a95988452b5a</i><br /><br />Threat actor <b>description</b>: <i>Elara Engineering is a full-service Mechanical, Electrical, Plumbing, Fire Protection, and Technology consulting engineering firm based in Chicago, Illinois. With 25 years of experience, the company specializes in the design, costing, delivery, and oversight of building and utility systems, offering both pre-design and post-construction services. Their clients include educational institutions, municipal entities, and residential developers, focusing on sustainable and innovative engineering solutions. Elara Engineering is committed to reducing energy consumption and carbon footprints through its projects and embraces diversity within its workforce</i><br />Target victim <b>website</b>: <i>elaraeng.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>blossmangas.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31019</link>
<guid>28a1faa9dd2f69eeef4279da40dcdfe0</guid>
<pubDate>Wed, 01 Apr 2026 19:30:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>blossmangas.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>69b7757e222215230106cbdf7db526829c099db28eeab8b5b95794f0da49891f</i><br /><br />Threat actor <b>description</b>: <i>Blossman Gas, founded in 1951 and located in Ocean Springs, Mississippi, is a family-owned business that provides a wide range of services in the  liquefied pet...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lincoln-Property-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31020</link>
<guid>5f59e50d07465cc328132f91bc67f486</guid>
<pubDate>Wed, 01 Apr 2026 18:33:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Lincoln-Property-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b773453ee64f070d51ccb25aceeb937046ead2ff7ef6ccdfcfe139c8e1d2efb0</i><br /><br />Threat actor <b>description</b>: <i>    Lincoln Property Company  www.lpc.com  Total data in the leak: : 800GB  Leaked data: - Clients: Rockhill Capital & Investments, FOCUS FINANCIAL PARTNERS, LLC, IMA Financial Group, Provident Partners RE, Deutsche Bank AG, Government…. - Data Classification: confidential - Special data: Contracts, NDAs, CONFIDENTIAL Closed Deals,Personal data,  INVESTMENTs, Projects, Drawing... - Financial data: financial planning documents, accounting, CONFIDENTIAL INVESTMENT   MEMORANDUMs, Fin. Audits 2021-2026, investors information and VERY IMPORTANT information!    </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>State-Road-and-Tollway-Authority</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31014</link>
<guid>6b8df87e67318f5c70bf4ffad3485829</guid>
<pubDate>Wed, 01 Apr 2026 17:24:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>State-Road-and-Tollway-Authority</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc290f967e99b10a3032a5752331fca2c7606b47c2b6450430ea945848aa7434</i><br /><br />Threat actor <b>description</b>: <i>Government</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Swagelok</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31015</link>
<guid>d7df9a10a3bb2c94ef6f35d90282702f</guid>
<pubDate>Wed, 01 Apr 2026 17:24:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Swagelok</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>afef334ecc56495f1d58510be45bd49756e4f0585810ad71da750b179e59fbbb</i><br /><br />Threat actor <b>description</b>: <i>Swagelok is a worldwide leader in industrial fluid system manufacturing and support. Since the introduction of the revolutionary, leak-tight Swagelok® tube fitting in 1947, they have applied a passion for making high-quality products and an unwavering focus onmeeting customer needs to help a wide range of industries safely, efficiently, and reliably move liquids and gases in demanding applications.We will upload 90gb of corporate data soon. Employee passports, and other personal information, detailed client information (financials, agreements with Nikon, Kawasaki, Mitsubishi and others), projects, HR files, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Builtrite</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31018</link>
<guid>fd04261dba31ac3aca7bed16b57444b8</guid>
<pubDate>Wed, 01 Apr 2026 16:48:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Builtrite</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cf4b67afe4584fee7206ce839d480e015fe4d01e31294653bece13266ef4da88</i><br /><br />Threat actor <b>description</b>: <i>Northshore Manufacturing offers 3 main product lines that are mar
keted under the Builtrite Brand. The company also produce compone
nts for several O.E.M.'s and tackle custom projects within the co
mpany's realm of expertise.

We will upload 40gb of corporate data soon. Detailed employee pas
sports, DLs (13 persons), SSNs and other personal information, fi
nancials, violations, police records, NDA, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Plunkett-Cooney</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31017</link>
<guid>e321abd135c19b6d4cee4da276d4970e</guid>
<pubDate>Wed, 01 Apr 2026 16:45:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Plunkett-Cooney</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b373419e576e01a5a413358160091e996a4b10300ff8f969c2d7a552174d1958</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1913 and headquartered in Bloomfield Hills, Michigan. Plunkett Cooney is a law firm with of…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alamo-Heights-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31008</link>
<guid>0972350bc45d5d235a2e01d7a1a5b43c</guid>
<pubDate>Wed, 01 Apr 2026 15:52:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Alamo-Heights-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>462a054cf907a7e52ad56e61492509b70c0ec001e665a617f4c157691b8896d6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>First-Trinity-Financial</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31009</link>
<guid>27c8efa32c0738c9d83b37d1882d97ea</guid>
<pubDate>Wed, 01 Apr 2026 15:51:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>First-Trinity-Financial</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c45a71532865f17e436d559e936c7e89a47e425c0a1e634793c68ce43d22c95a</i><br /><br />Threat actor <b>description</b>: <i>FTFC is an insurance holding company based in Tulsa, Oklahoma. FTFC operates two life insurance companies, Trinity Life Insurance Company (TLIC), Tulsa, Oklahom...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tange--Mann--Garza</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31010</link>
<guid>4d5392d91f16d558eef803211e81f4f2</guid>
<pubDate>Wed, 01 Apr 2026 15:51:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Tange--Mann--Garza</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b683fba83bc708a0e83380379d4bc6375283dd71d49ec5e6e868bca3066f3c9f</i><br /><br />Threat actor <b>description</b>: <i>Tange , Mann & Garza is a full-service accounting firm offering abroad range of services for individuals, business owners, executives, and independent professionals. We will upload 40gb of corporate data soon. Employee passports DLand so on, detailed client information (financials, agreements and so on), NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Starr-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31016</link>
<guid>46093577f6da15ca5de89e2752b62b6a</guid>
<pubDate>Wed, 01 Apr 2026 15:20:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Starr-Insurance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4c39746725fd12e7f0be2b608f2713be173a22293659c899128810506a29d46f</i><br /><br />Threat actor <b>description</b>: <i>Starr Insurance Inc. is an independent insurance agency based in 
Chambersburg, Pennsylvania, offering a wide range of insurance pr
oducts including car, home, business, and commercial insurance. T
he agency serves over 18,000 individuals and businesses across Pe
nnsylvania and neighboring states, providing clients with tailore
d coverage options from a selection of reputable insurance carrie
rs.

We will upload 15gb of corporate data soon. Employee passports, D
Ls, SSNs and other personal information, financials, customers' i
nformation, NDA, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alliance-Roofing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31012</link>
<guid>f81b2a1d75d01e35b2ac8c0f6a8ec78b</guid>
<pubDate>Wed, 01 Apr 2026 13:41:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Alliance-Roofing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b83f6bb4bc4d8e381303082203fa28200813bb76bc915a7d4b92069969507544</i><br /><br />Threat actor <b>description</b>: <i>Alliance Roofing Company Inc is a national leader in commercial r
oofing and waterproofing services with more than 27 years of indu
stry experience. Founded in 1986 and established in San Jose, the
company has expanded its geographic footprint to serve the Centr
al Valley and Northern California region, including Sacramento, R
eno, and Modesto, providing comprehensive roofing and waterproofi
ng solutions to corporate enterprises, small businesses, and prop
erty owners across diverse market segments.

We will upload 170gb of corporate data soon. Employee passports, 
DL, phones, addresses and so on, detailed client information (fin
ancials, agreements and so on), projects, drawings and specificat
ions, NDA, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Publishers-Clearing-House</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31006</link>
<guid>446ce3c52d4376f1e86faa0c9edd702d</guid>
<pubDate>Wed, 01 Apr 2026 10:37:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Publishers-Clearing-House</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9caf32d5a31bd4c714dc37b723c145690ee354aed4cf22d67d20631a9d59ab9</i><br /><br />Threat actor <b>description</b>: <i>The fall of a sweepstakes giant.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cox-Design--Metal-Fabrication</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30980</link>
<guid>b54f0f8b3b75a8b7486c9adedf28f361</guid>
<pubDate>Tue, 31 Mar 2026 15:59:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Cox-Design--Metal-Fabrication</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e31d958429b4efa3f4cb1ae262cffa2b03c84e2bc131cdf47697a9d4d5797b27</i><br /><br />Threat actor <b>description</b>: <i>Cox Design and Metal Fabrication, Inc. specializes in custom metal design and fabrication, offering a wide range of services including aluminum fabrication, architectural steel design, and customfood trucks.We will upload 20gb of corporate data soon. Employee personal document, financials, projects, contracts and agreements, NDA, projects, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dean-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30981</link>
<guid>3d2515739e79e2d0700e7b6b75f6b2a1</guid>
<pubDate>Tue, 31 Mar 2026 15:59:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Dean-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d47ae156b4c42fdba5f3893e6fda9fe36ba12e0cf35813a56bcafbf37ed40de4</i><br /><br />Threat actor <b>description</b>: <i>Dean Supply specializes in providing a comprehensive range of restaurant supplies and equipment, including kitchenware, dining essentials, and janitorial products. We will upload 15gb of corporate data soon. Employee medical information and other docs, NDAs, financials, projects, contracts andagreements, projects, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Excel-Healthcare-Receivable-Management-Consulting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30982</link>
<guid>d70f093b1afc45db0022c13d1acba36e</guid>
<pubDate>Tue, 31 Mar 2026 15:59:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Excel-Healthcare-Receivable-Management-Consulting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e21d781df302a9ef10c9b445d2973e3446db84dee76352850ac302c8dcb028a5</i><br /><br />Threat actor <b>description</b>: <i>Excel Healthcare is a specialized firm focusing on revenue cycle management and consulting services for healthcare professionals, including hospitals and medical practices of all sizes. They offer comprehensive services such as accounts receivable management, insurance follow-up, denial auditing, and consulting on workflow optimization to enhance cash flow and operational efficiency.We will upload 54gb of corporate data soon. Employee and customerpersonal information, project information, lots of contracts andagreements, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Catalyst-Learning-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30993</link>
<guid>9aade22d3f397b10afdf6efcb920dea9</guid>
<pubDate>Tue, 31 Mar 2026 15:27:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Catalyst-Learning-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f5aa687e3b4e4094aa33e07ecf484d381c1ef8c00f0a29201d458b7aba9b4d13</i><br /><br />Threat actor <b>description</b>: <i>Specializes in healthcare training and employee development, aiming to empower staff for better patient outcomes and organizational success.</i><br />Target victim <b>website</b>: <i>catalystlearning.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>BR-Sheet-Metal</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30992</link>
<guid>d62c2838344637ce8ad67f74ed98c45a</guid>
<pubDate>Tue, 31 Mar 2026 15:26:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>BR-Sheet-Metal</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2c7ced452c713dcd788c8a6e5a63ba06c318543579c96f79ef36ee35fe0cb98</i><br /><br />Threat actor <b>description</b>: <i>Specializes in industrial construction projects, offering design, fabrication, and installation services for pneumatic, mechanical conveying, and filtration systems</i><br />Target victim <b>website</b>: <i>brsheetmetal.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Raphael-Ortho</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30991</link>
<guid>f7b49030b84b97848504c5f439564b69</guid>
<pubDate>Tue, 31 Mar 2026 15:25:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Raphael-Ortho</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ba6dd44eec6c2b348fcd34069ed6cdf09291172924172d1f2db13a67a6c3e22</i><br /><br />Threat actor <b>description</b>: <i>A Dental Practice Management Company.</i><br />Target victim <b>website</b>: <i>morethanstraightteeth.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Green-Giftz</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30990</link>
<guid>83672563a735a0e086c45ca392adf13f</guid>
<pubDate>Tue, 31 Mar 2026 15:25:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Green-Giftz</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d32011655e2630601e8b23b3036483398a73d67b1c16767bcbee6dfda6451db4</i><br /><br />Threat actor <b>description</b>: <i>A certified branded merchandise agency based.</i><br />Target victim <b>website</b>: <i>greengiftz.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>MC-Rx</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30988</link>
<guid>781875806d0ec961e50faa879b057e97</guid>
<pubDate>Tue, 31 Mar 2026 15:24:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>MC-Rx</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>71f0c469d994bcaae43c696346f97f45592e38c1bd7d4c5a9ebea24937f335cb</i><br /><br />Threat actor <b>description</b>: <i>Formerly MC-21 and ProCare PBM</i><br />Target victim <b>website</b>: <i>mc-rx.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Modern-Advanced-Print-Solutions-MAPS-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30987</link>
<guid>bbe0c3bf910dea29774c3926f51b7f91</guid>
<pubDate>Tue, 31 Mar 2026 15:23:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Modern-Advanced-Print-Solutions-MAPS-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>99116a9b43e84013ce311ae0e2648450527322a8c8f42fcee71c90f9fdf76777</i><br /><br />Threat actor <b>description</b>: <i>Modern Advanced Print Solutions (MAPS, Inc.).</i><br />Target victim <b>website</b>: <i>mapsweb.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Secure-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30986</link>
<guid>4b8d760a3ddf003fc8fd3cc36b5b87c4</guid>
<pubDate>Tue, 31 Mar 2026 15:22:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Secure-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6699bf8e287865e3f223f9b304ff9c83d7e2c9282645e27fc25178d252fabb48</i><br /><br />Threat actor <b>description</b>: <i>Provides administrative, care management, and healthy lifestyle services to employers with self-funded, group health care plans</i><br />Target victim <b>website</b>: <i>shpg.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>delapazlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30984</link>
<guid>9379824b37bdf1d40d517e0a8e4ea024</guid>
<pubDate>Tue, 31 Mar 2026 13:59:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>delapazlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c41f945ecbde45f961b4f5241527cf01c3957d4b6d85f5a372a6073ff9f275c</i><br /><br />Threat actor <b>description</b>: <i>When you work with the Law Office of Michael R. De La Paz, the only thing you have to worry about is recovering from your injuries. Mr. De La Paz will go to bat for you with the insurance companies and fight them in court to get you the compensation you deserve.</i><br />Target victim <b>website</b>: <i>delapazlaw.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chickasaw-Holding</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30976</link>
<guid>aa16b1e36967dda0f92705a0a1beb710</guid>
<pubDate>Tue, 31 Mar 2026 12:58:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Chickasaw-Holding</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81fe8aec95b4f8a1c19dec0a40f0b7359ea4869c6bc1c17dbde4e64b7108b387</i><br /><br />Threat actor <b>description</b>: <i>Accounting Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpswww.lagoonpark.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30978</link>
<guid>b5403b2d202b8fe1db69b68b2c0c5e2b</guid>
<pubDate>Tue, 31 Mar 2026 12:15:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>httpswww.lagoonpark.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f471f56910f9a81d3b3de25c80ad26230534cf4ea5d3321d7435a374d9da826f</i><br /><br />Threat actor <b>description</b>: <i>Lagoon Amusement Park
, located in Farmington, Utah, is a historic family-owned park operating since 1886. It features a combination of roller coasters (includ... - TOTAL QUANTITY 6 TB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>MerchNOW</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30977</link>
<guid>84e126c81be5b857ebddb2619860007c</guid>
<pubDate>Tue, 31 Mar 2026 12:05:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>MerchNOW</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff8bab271ccfb9196a76839b3ea0b4746a033821349ba34896eb89c40957f4b4</i><br /><br />Threat actor <b>description</b>: <i>MerchNow is a music merchandising company with over 20 years of e
xperience, specializing in a wide range of products including mus
ic, apparel, accessories, and custom merchandise for bands. They 
offer services such as screen printing, record pressing, embroide
ry, and fulfillment to help artists create unique merchandise.

We will upload corporate data soon. Great amount of employee pers
onal documents (passports, DLs, SSNs and other scanned docs), fin
ancials, contracts and agreements, client files, NDA, projects, e
tc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>San-Felipe-Del-Rio-CISD-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30974</link>
<guid>ba1ded3b4a24fb934f53571fb56151d6</guid>
<pubDate>Tue, 31 Mar 2026 11:58:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>San-Felipe-Del-Rio-CISD-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>411ab5ad707ba31b36089545b78baf1a0ac8e7e5a777973415b7f895b5aacd70</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Q-Lab</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30975</link>
<guid>bd082db9d2511ac2195e984d6eee33b8</guid>
<pubDate>Tue, 31 Mar 2026 11:58:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Q-Lab</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>405314718d661f8e9017d740d66dac76dd1130c8dd9c266addf7dd0cf0dfa478</i><br /><br />Threat actor <b>description</b>: <i>Manufacturing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hallmark-Cards-Inc.--Hallmark-Plus</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30972</link>
<guid>b1f3af7a68db79361a5e30b972f50ae1</guid>
<pubDate>Tue, 31 Mar 2026 02:16:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Hallmark-Cards-Inc.--Hallmark-Plus</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>972fb782170e570bff3c59b091010007ce0fde3943ee0887fa8a9802d5b7f735</i><br /><br />Threat actor <b>description</b>: <i>Over 7.9M Salesforce records containing PII and other internal corporate data have been compromised. This is a final warning to reach out by 2 Apr 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 31 Mar 2026 | Warning: FINAL WARNING</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>JT-ATFP-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30969</link>
<guid>e624ee446bd5711b139afe335485a2d8</guid>
<pubDate>Tue, 31 Mar 2026 02:08:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>JT-ATFP-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2e60d5e5c35ba59e8446f50093a42256da141f71447bbd257efbcbed216567ba</i><br /><br />Threat actor <b>description</b>: <i>- Classified Contracts- Employee Information- ATFP Projects- Vulnerability Assessment Docs- FOUO Files- DOD Projects</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>domingogarcia.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30966</link>
<guid>7b6f112e7e54968fd8c34d5727e4996d</guid>
<pubDate>Mon, 30 Mar 2026 22:42:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>domingogarcia.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>88b123e87429a7dd61010a83e9a3b78f967e1425580530465d4cf75cd38da009</i><br /><br />Threat actor <b>description</b>: <i>Domingo Garcia’s has been representing accident victims for over 35 years! One of Domingo’s first legal victory happened in 1995 when a jury awarded his client, a car-accident victim, $1,100,000. As the years passed Domingo has surrounded himself with highest skilled and qualified legal team who have recovered millions for victims of injury and wrongful death.</i><br />Target victim <b>website</b>: <i>domingogarcia.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>millersteelelaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30965</link>
<guid>ce916a6c3a313e568546f66654ee5ee1</guid>
<pubDate>Mon, 30 Mar 2026 21:13:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>millersteelelaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1d4a42b03cf2f8ca8ab18bd525557f990e363e361ede96a6b66f3782743d99a</i><br /><br />Threat actor <b>description</b>: <i>At Miller & Steele Law Firm, we believe in protecting and fighting for those who have been affected by the negligence of others. David Miller started this firm in 1978 to fight for those who could not fight their own battle. When he was a young man, he saw a family member involved in a lawsuit who was poorly represented by a bad lawyer which resulted in a poor outcome.</i><br />Target victim <b>website</b>: <i>millersteelelaw.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Straight-Line-Logistics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30964</link>
<guid>3946286620b2e1ed380a77193fb7add7</guid>
<pubDate>Mon, 30 Mar 2026 21:10:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Straight-Line-Logistics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1237c9faf3656d3809efa9cab5b3aa1276d2ff07a56a2b53f92e6b0d83567ce</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Straight Line Logistics is a Houston based company, specializing in transportation and logistics solutions. They offer a wide range of services, including truckload freight, intermodal transportation, warehousing, and supply chain management. Their team of experienced professionals focuses on providing efficient, reliable, and cost-effective solutions to their clients' logistic needs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Net-Solace</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30962</link>
<guid>3de36aabe0a47900e74f4a55a03db1fc</guid>
<pubDate>Mon, 30 Mar 2026 21:06:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Net-Solace</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>35fbe47d9d7eb836edbd00a8e75425663c6ec5bd5533afd33ec56d7a07cdaa94</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Net Solace is a technology solutions company that specializes in providing support and software development services. They offer a multitude of services including IT consulting, software development, project management, and network design. The company aims to provide affordable technological solutions to businesses of all sizes. They have expertise in various information technologies and aim to provide peace of mind for clients with their IT needs.</i><br />Target victim <b>website</b>: <i>netsolace.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Silver-Peak</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30957</link>
<guid>01ee2e65c1b26551bda7abb393ac860c</guid>
<pubDate>Mon, 30 Mar 2026 21:02:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Silver-Peak</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be00009397cceebd0f9ba5a52af80b406550320827c5831895d8484902e2fdd1</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Silver Peak is a global software-defined Wide Area Network (SD-WAN) solutions provider. The company develops advanced technologies that route data traffic and help reduce the cost of network hardware. Founded in 2004 and headquartered in Santa Clara, California, Silver Peak serves thousands of customers worldwide, improving their data and application performance across wide area networks.</i><br />Target victim <b>website</b>: <i>silverpeak.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Buffalo-Neuroimaging-Analysis-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30956</link>
<guid>4e62ef3e34c3922e68f90b9358f8be0b</guid>
<pubDate>Mon, 30 Mar 2026 21:02:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Buffalo-Neuroimaging-Analysis-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a44fd1c9ba1732d83b001130f5b7cde6f3b365a604479725d0b1ee84d1f86c6c</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Buffalo Neuroimaging Analysis Center, based in Buffalo, New York, is a pioneer in the application of neuroimaging methods in clinical trials for neurological diseases. It focuses on MRI and MRI-related research, collecting and analyzing results from numerous clinical trials to help develop treatments for diseases such as multiple sclerosis, Alzheimer's, and Parkinson's.</i><br />Target victim <b>website</b>: <i>bnac.net</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>barrypgoldberg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30953</link>
<guid>ed5b3698e25bc1b85b239a4cea69f48b</guid>
<pubDate>Mon, 30 Mar 2026 19:39:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>barrypgoldberg.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>39fef1ef2172725efe19c631683d2632377e1743d7d4ea2bb5aa318ed987d289</i><br /><br />Threat actor <b>description</b>: <i>Barry P. Goldberg is truly committed to client satisfaction. We strive to obtain the largest possible result the law will allow and at the same time maximizing our clients’ net amount. We will take your phone calls whenever possible, return all communication promptly and answer each and every question. At Barry P, Goldberg, A Professional Law Corporation, we strive to handle our cases aggressively, ethically and “transparently” for our clients.</i><br />Target victim <b>website</b>: <i>barrypgoldberg.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jones-Day</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30952</link>
<guid>1354b98ee215d7231701d300a7b4451c</guid>
<pubDate>Mon, 30 Mar 2026 19:24:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Jones-Day</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89be37ec2cd86ef20a534ae6a350df1294dd4cd0cb60900cb527c20444d768da</i><br /><br />Threat actor <b>description</b>: <i>Jones Day founded in 1893 and headquartered in Cleveland Ohio, is a global law firm with locations acr…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Weber-Kracht--Chellew</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30948</link>
<guid>a41b7c188df8001c036825089b562709</guid>
<pubDate>Mon, 30 Mar 2026 18:51:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Weber-Kracht--Chellew</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9fe954ab8c9df45bb298f35e4abf153398b2f5de84526cdf865f4d89ffe6782</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.wkclaw.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dock-Pros</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30945</link>
<guid>bdba92535c1d9e8d4c4bf739243bb546</guid>
<pubDate>Mon, 30 Mar 2026 18:49:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Dock-Pros</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1fe4156c36e91c99fb3e0a2fd9b89542187d80a8aba3e746033e39cb83ea80ac</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.dockprosinc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ampex-Data-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30944</link>
<guid>f72522e7430464a9c1ad922562815c1a</guid>
<pubDate>Mon, 30 Mar 2026 18:49:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Ampex-Data-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>69adc01cd4483dae167877af89e5300ad40bac1adff7826c4977888a8ac87904</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ampex.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Valley-Plating-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30943</link>
<guid>f9ed45b93dd4614775806adf05661bfe</guid>
<pubDate>Mon, 30 Mar 2026 18:48:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Valley-Plating-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8aad55e6626dde03b7de235043d27d76fb0ba729ad29b635ec23fb06aeb8ff1c</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.valleyplatinginc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Parkway-Reality-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30938</link>
<guid>db525c87bd3c69102f83450fbf2c684c</guid>
<pubDate>Mon, 30 Mar 2026 17:34:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Parkway-Reality-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63cbb8295a086958be537954581fa743fed3175fa5e24c91e795a6f3684b6fb2</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>Parkway Reality Group</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dow</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30932</link>
<guid>fdb8081426eb791cab369832567f7715</guid>
<pubDate>Mon, 30 Mar 2026 16:00:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Dow</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e9b7ec3c9e8a9b36be446a9585fb385be9ece3b6574af5ea2c27a776effac69f</i><br /><br />Threat actor <b>description</b>: <i>Manufacturing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wm-Erath--Son</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30933</link>
<guid>8ed16b12adc574bb06ec2cb2f5479952</guid>
<pubDate>Mon, 30 Mar 2026 16:00:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Wm-Erath--Son</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>699a630811c9e64abaf6baae6616f0eea333ebdda6e59f1ccda444247bb56c96</i><br /><br />Threat actor <b>description</b>: <i>Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Richard-J.-Hackerman-P.A.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30935</link>
<guid>00fae5fc28cb7bd60be9ab6609b9bbf7</guid>
<pubDate>Mon, 30 Mar 2026 15:11:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Richard-J.-Hackerman-P.A.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2dcb3e758f9f96b49cad701f0c090ee2410e1a99d729018f7fb60e5b886ff8ce</i><br /><br />Threat actor <b>description</b>: <i>Tax Attorney and Bankruptcy Lawyer in Baltimore</i><br />Target victim <b>website</b>: <i>richardhackerman.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wyatt-Insurance-Agency</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30934</link>
<guid>a64f23737e72f85b8fc0eb8ad5b36458</guid>
<pubDate>Mon, 30 Mar 2026 15:11:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Wyatt-Insurance-Agency</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d213c98c0dfcece397993c4ed5031adc16d46392723b37c4162b803e7e8b8cd4</i><br /><br />Threat actor <b>description</b>: <i>Auto Insurance, Home Insurance, Renters Insurance, Motorcycle Insurance</i><br />Target victim <b>website</b>: <i>wyattinsuranceca.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Summit-Tax-Advisory</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30927</link>
<guid>2da833ec155de138b47062d56c60fbd8</guid>
<pubDate>Mon, 30 Mar 2026 14:36:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Summit-Tax-Advisory</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d2d16de50c0430a1c16b53b2bd842e24bd14717580fdc3d3b8ffa39f2bb7658</i><br /><br />Threat actor <b>description</b>: <i>Accounting Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Office-Peeps-Nappies-Food-Service-Janome-America-IT-Supporten-A-1-Pools.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30931</link>
<guid>ba5d35769aa3568f9333a89fa8796938</guid>
<pubDate>Mon, 30 Mar 2026 14:21:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Office-Peeps-Nappies-Food-Service-Janome-America-IT-Supporten-A-1-Pools.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>08f77d385791d3d07dee38de45b0f57fb9c80f6db5022ec7b88e5b01d310f83c</i><br /><br />Threat actor <b>description</b>: <i>We obtained about 13gb of data of the following companies:

Office Peeps offers a wide range of over 50,000 office supplies, 
including general office supplies, ink and toner, coffee and brea
kroom items, and janitorial supplies.

Nappie's Foods is a family-owned food service provider and restau
rant supply expert based in Pittsburgh. The company emphasizes qu
ality, service, and loyalty, aiming to maintain superior customer
service while operating with a friendly, family-owned mentality.

Janome America is the largest subsidiary of Janome Sewing Machine
Company of Japan, which produces nearly two million sewing machi
nes annually as well as a line of related sewing products and emb
roidery software.

IT-Supporten provides tailored IT solutions for both private and 
business markets, ensuring optimal results for each client. They 
are a comprehensive supplier of IT equipment, offering competitiv
e pricing and a range of services including consultation and oper
ational agreements.

A-1 Pools is a family-owned business based in Wisconsin, speciali
zing in above-ground pools, hot tubs, swim spas, and saunas. They
serve clients in Waukesha County, Washington County, and Milwauk
ee County, offering high-quality products and exceptional custome
r service.

You will find personal employee personal data, lots of HR files, 
medical information, client information, numerous project files, 
confidential files, accounting and financials and other internal 
operational files.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Miles-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30930</link>
<guid>9bb9377f105d4c666ac02b8d1b5d9d59</guid>
<pubDate>Mon, 30 Mar 2026 13:44:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Miles-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2d140d9ddc6b626c1bb8b692e4e762bfbabb450eb70dcf8d8ea2b598ac9766de</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.mileselectric.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Motleys-Asset-Disposition-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30929</link>
<guid>ecdf4779a8c72e348171c5a7523c067e</guid>
<pubDate>Mon, 30 Mar 2026 12:53:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Motleys-Asset-Disposition-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bafeb7e043000895fee7a75cc9ce8d9d34c6486b93dc9de96ff3d3b8393444b0</i><br /><br />Threat actor <b>description</b>: <i>Based in Richmond, VA, Motleys Asset Disposition Group offers sal
es, appraisal and acquisition services. The company offers real e
state services, auction services, appraisals and more.

We will upload 11gb of corporate data soon. Employee personal doc
uments (passports, DLs, SSNs and so on), project files, detailed 
financials, contracts and agreements, client and partner files, N
DA, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Conveyors-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30921</link>
<guid>295fd4bf7e3292b97e341d8eb21b82ea</guid>
<pubDate>Mon, 30 Mar 2026 02:33:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Conveyors-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1b2f9759bf9271e29d7a442b4ce004897bb993d434341dadde78214015e94fc</i><br /><br />Threat actor <b>description</b>: <i>Conveyors, Inc. is a family-owned manufacturer of bulk material handling equipment, established in 1974, with over 40 years of experience in the industry. The company offers a wide range of products including screw conveyors, bucket elevators, and drag conveyors, designed to efficiently handle bulk materials. Their intended clients span various industries such as commercial, industrial, oil & gas, and governmental sectors. With a commitment to quality and superior service, Conveyors, Inc. aims to exceed customer expectations in every project.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Greenology-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30917</link>
<guid>7f272b86ea4f734837b281ad960be2f7</guid>
<pubDate>Sun, 29 Mar 2026 17:29:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Greenology-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b027083116bbb2077572192b1e3d3ccdee9c7acd9c51afe7149489de28ce76a</i><br /><br />Threat actor <b>description</b>: <i>Since 2008, Greenology Products has been on a mission to create household and personal care products that do not harm our environment or human health. Our motto is Good, Clean, Honest.  We create a superlative customer-centric experience by producing household and personal care products that deliver performance, delight the senses, and solve everyday needs while using plant-based and responsible ingredients and materials that do not hard people, pets, or our precious planet.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Doctor.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30916</link>
<guid>e37d9170a3efe711ce2a5eb3df2253dd</guid>
<pubDate>Sun, 29 Mar 2026 15:40:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Doctor.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d7f47622435903c79244d5d18d8cfee576bf067c6c37d8e56a2cea5d1cdb426</i><br /><br />Threat actor <b>description</b>: <i>0</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>kob.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30910</link>
<guid>69c89914e702d2abe840bd751f5b59c5</guid>
<pubDate>Sun, 29 Mar 2026 01:38:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ALP-001</b> claims attack for <b>kob.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f5fd2901353690599d2213fda38333bd3a68e0d7c4b135eec45cf9d0978388b</i><br /><br />Threat actor <b>description</b>: <i>Country: USA Revenue: $22 Million Storage: 1.127TB Description: KON (KOB 4, Eyewitness News 4 is your best source for Albuquerque news, Santa Fe news and New Mexico news, weather and sports.
Deadline: 2026-04-02 23:23:40</i><br />Target victim <b>website</b>: <i>kob.com</i>]]></description>
<category>ALP-001</category>
</item>
<item xmlns:dc='ns:1'>
<title>Florida-Therapy-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30906</link>
<guid>c4f48c98a227f6dd2cdbd6a30dac6082</guid>
<pubDate>Sat, 28 Mar 2026 20:17:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Florida-Therapy-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e1a5ea651a6365c975cd077f2285e413ef0b4968999f2c4dfe0f1ef30b67978</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Florida Therapy Services is a mental health organization based in Florida, USA. It provides psychiatric services, psychotherapy, and substance abuse counseling, among other services for children, adolescents, adults, and families. The organization specializes in home, school, community, and office-based treatment, aiming to support individuals struggling with various mental health issues.</i><br />Target victim <b>website</b>: <i>flatherapy.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Don-Nan</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30904</link>
<guid>d1e40981bafcf2c263607fbc27e7a34e</guid>
<pubDate>Sat, 28 Mar 2026 18:56:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payload</b> claims attack for <b>Don-Nan</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1ec599a5f35b5ccc1c6f02057a66d0ef9f85c1263e678f82e5b6dd5a5243675</i><br /><br />Threat actor <b>description</b>: <i>Q2 Artificial Lift Services specializes in the sales, service, engineering, and manufacturing of down hole rod pumps, positioning itself as a leader in artificial lift technology. The company operates from a state-of-the-art 118,000 sq. ft. facility and boasts over 40 service and repair locations across Canada and the USA. Q2 offers a comprehensive range of products, including API pumps, specialty tubing, and production tools, combined with supportive engineering and technical services. Their commitment to quality and innovation enables them to provide tailored solutions that maximize productivity for their clients in the oilfield sector.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>payload</category>
</item>
<item xmlns:dc='ns:1'>
<title>kdmpop.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30896</link>
<guid>4b3da53a463251707e72fcb84e48b6ed</guid>
<pubDate>Fri, 27 Mar 2026 21:05:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>kdmpop.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>51d66c74e8bd9a7d6c5b6d10fe3836a35f1f5d92dea91473a880db51c5968315</i><br /><br />Threat actor <b>description</b>: <i>KDM P.O.P. Solutions Group, headquartered in Cincinnati, Ohio, with additional facilities in Cincinnati, Nashville, Atlanta and Cleveland, has been in business since 1970. KDM specializes in custom, innovative retail solutions at the point of purchase: P.O.P. print solutions</i><br />Target victim <b>website</b>: <i>www.kdmpop.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>meridenct.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30895</link>
<guid>80baf0c8e70acc8c0a70d5befedf754f</guid>
<pubDate>Fri, 27 Mar 2026 19:52:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>meridenct.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8cf62a3907e1ea5c8b1582a63959d7df7e57a26d4bf7089025219553325dc460</i><br /><br />Threat actor <b>description</b>: <i>Meriden 2020 provides a variety of government, business, recreational, educational, and transportation resources for residents and visitors of Meriden, Connecticut (CT). Employees: 200 Revenue: $23 Million Industry: Government Phone Number: (203) 630-4000</i><br />Target victim <b>website</b>: <i>meridenct.gov</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sheraton-Hotel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30893</link>
<guid>aa37b70bbe5a37d659bf67dee2ca9492</guid>
<pubDate>Fri, 27 Mar 2026 19:34:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Sheraton-Hotel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>060a318492ebd5a6c4197e5786fdf9da4449ddb28bcdae20761e39d2433fff7a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>GeoMechanics-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30889</link>
<guid>fd537f53e8f93d331a3cf6a0f5f1e748</guid>
<pubDate>Fri, 27 Mar 2026 16:33:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>GeoMechanics-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a7dd7b507c76f7883abac8cde81a436b4f5f7b9d18a007a498d5a814e9819b9</i><br /><br />Threat actor <b>description</b>: <i>GeoMechanics Technologies, formerly called Terralog Technologies 
USA, was founded in 1994 by Dr. Michael S. Bruno. It originally o
perated as the US subsidiary of Terralog Technologies Inc in Cana
da. The new name, adopted August 1, 2012, reflects our primary an
d expanding focus on Advanced Geomechanics from the wellbore to t
he reservoir scale.

We will upload corporate data soon. Employee personal documents (
passports, driver licenses, SSNs and so on), project files, medic
al information, financials, contracts and agreements (Bentley and
others), client files, NDAs.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Edward-Beiner</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30885</link>
<guid>4a9afaeb2472f426769ee7fe737f82ff</guid>
<pubDate>Fri, 27 Mar 2026 15:59:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Edward-Beiner</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4efaa7e437a67c16bae5379a5a33b398d3691e0c590a341ec7252f876283f42b</i><br /><br />Threat actor <b>description</b>: <i>Edward Beiner specializes in designer sunglasses and luxury eyewear, offering a blend of fashion and vision. Their product range includes sunglasses and eyeglas...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Quality-Carton-and-Converting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30887</link>
<guid>863ba2e194ab526fbb9c54d80873abcd</guid>
<pubDate>Fri, 27 Mar 2026 15:59:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Quality-Carton-and-Converting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34927496da0b7e61720bca1f6b58cec79675985cc2675e1c741f952bca1573a0</i><br /><br />Threat actor <b>description</b>: <i>Quality Carton and Converting, LLC. specializes in food and beverage paperboard packaging, offering both in-stock items and customfolding carton solutions. Their product range includes various types of bakery and donut boxes, pizza boxes, cupcake inserts, andutility trays.We will upload corporate data soon. Employee personal documents (credit cards, DLs and so on), HR files, project files, financialsdocs, payment details, contracts and agreements, client files, confidential files, NDAs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sheladia-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30888</link>
<guid>38db417df0ff3f93630307983ebb21f8</guid>
<pubDate>Fri, 27 Mar 2026 15:59:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Sheladia-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9f05bae8c395aba6267769e5451dc4593709034f50c4497a4c07bd804856a06</i><br /><br />Threat actor <b>description</b>: <i>Sheladia Associates, Inc. is a multidisciplinary consulting firm specializing in architectural, engineering, and development consulting services. Established in 1974, the company focuses on infrastructure projects in sectors such as transportation, water supply, sanitation, and energy across various regions including Asia, Africa, and the Americas.We will upload corporate data soon. Big amount of employee personal documents (passports, driver licenses, credit cards, immigration docs and so on), project files, medical information, financials, contracts and agreements, client files, internal confidential files, NDAs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>ACR1.COM-Commercial-Roofing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30884</link>
<guid>3fbe25e98c055443d115ff2eda3e76a7</guid>
<pubDate>Fri, 27 Mar 2026 13:50:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>ACR1.COM-Commercial-Roofing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b94f1e1fe99b94008f61828658d28dd616a39181c0da5646bf3894e4189c495</i><br /><br />Threat actor <b>description</b>: <i>Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Big-Thumb</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30876</link>
<guid>f4a5d99730ab736c45838ef0ed2fcd37</guid>
<pubDate>Fri, 27 Mar 2026 10:15:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Big-Thumb</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>92e71dd21492d4891354442b65644bbcf03c1bdedabedea9dec4f86cabd7a779</i><br /><br />Threat actor <b>description</b>: <i>BigThumb IT Consultants provides a range of IT solutions including managed real-time professional support and cybersecurity services tailored to meet individual business needs. They focus on helping organizations manage their IT across mobile devices, ensuring optimal pricing and plans through dedicated account management. The company emphasizes the importance of agility in business, enabling clients to adapt to market shifts and growth opportunities with a digital workspace. Their security experts specialize in compliance with PCI, HIPAA, and GLBA, addressing the increasing threats of cyber attacks for businesses of all sizes. 
The company headquarters is located in 6235 Enterprise Ct, Dublin, OH 43016-3293, United States.
201-500 Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Schlam-Stone--Dolan-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30878</link>
<guid>1c931a87157b62c0e7412bcb263eb6ac</guid>
<pubDate>Fri, 27 Mar 2026 08:53:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Schlam-Stone--Dolan-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>78d420875eb4c81b05935246d92ad375c29bee2a49c36b5164b344df8fe5fe5a</i><br /><br />Threat actor <b>description</b>: <i>Data breach at a law firm representing clients ranging from government institutions to Fortune 500 companies.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>carlysle.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30870</link>
<guid>e8d6b501bfa2981bd4c4a7a2eb822b28</guid>
<pubDate>Thu, 26 Mar 2026 23:47:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payload</b> claims attack for <b>carlysle.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a0fe02bdcd29737abd621ae4a11993f16553cb77e92ab613a0ac719b7764f128</i><br /><br />Threat actor <b>description</b>: <i>Carlysle.net belongs to Carlysle Engineering, Inc., an engineering firm based in Boston. The company specializes in designing, installing, and maintaining fire protection systems such as sprinklers. They also provide building inspections and consulting services to ensure compliance with safety and insurance requirements.</i><br />Target victim <b>website</b>: <i>carlysle.net</i>]]></description>
<category>payload</category>
</item>
<item xmlns:dc='ns:1'>
<title>njpcs.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30866</link>
<guid>a55ab2526717b7d51f169efdb32d0b41</guid>
<pubDate>Thu, 26 Mar 2026 22:39:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>njpcs.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38813de073d5ba024b0dedcb6fefede253af72b304eb6c4514ad9250222623b6</i><br /><br />Threat actor <b>description</b>: <i>NJ Pain Care Specialists is a leading interventional pain management practice lo...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Durable-Superior-Casters</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30868</link>
<guid>e5b565ee90394bde9f504d9c6ef027d1</guid>
<pubDate>Thu, 26 Mar 2026 21:36:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Durable-Superior-Casters</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7664837aa4f1b9af25dd65a324475642dcfd5aa66d92c46752445ebce4f8e221</i><br /><br />Threat actor <b>description</b>: <i>Durable Superior Casters, Inc. was established in 1991. In a relatively short period of time Durable USA has become the finest manufacturer and importer of casters and wheels in North America. We provide "Quality without Compromise" at very competitive prices and prompt shipment from an inventory in excess of 20 million dollars. We also attribute our success to our loyal customers, experienced and knowledgeable staff, and innovative leadership. We offer one of the broadest caster and wheel selections in the world. In addition to our ongoing new product development program we offer custom built casters for manufacturers that have a large unique or special requirement. Our corporate headquarters, largest US assembly plant with onsite Testing Lab and Engineering Department is in Arlington, Texas. Our assembly plant in Ohio helps to service our customers in New England and the upper Midwest</i><br />Target victim <b>website</b>: <i>durablesuperior.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>ludlums.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30865</link>
<guid>51d7eab534fbc97552ecb39280168cc5</guid>
<pubDate>Thu, 26 Mar 2026 20:16:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>ludlums.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>90dc18bd22a0759397aaeff24d39b1cfad08c372545123fc6566732ddc03fc75</i><br /><br />Threat actor <b>description</b>: <i>Ludlum Measurements, Inc.
(LMI), founded in 1962 in Sweetwater, Texas, designs, manufactures, and supplies radiation detection and measurement equipment used w... - We have 5 TB data including full source codes, client data, and more. </i><br />Target victim <b>website</b>: <i>ludlums.com</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>TPIS-Industrial-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30864</link>
<guid>518a0d4fdd28c9875618b3d7833831e2</guid>
<pubDate>Thu, 26 Mar 2026 19:25:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>TPIS-Industrial-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd9d49b167c6f42a3e10d3253619dad31b81ff73637980f2f1b4d9ab0539396a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.teamtpis.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bedrosians-Tile--Stone</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30851</link>
<guid>b89bd6465f1baed1810a82e1d5138f52</guid>
<pubDate>Thu, 26 Mar 2026 18:38:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Bedrosians-Tile--Stone</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c2daf1a527e9d5207f3f3d4a5fadd95a85c2f1f0564234bdddbefc243b94b68</i><br /><br />Threat actor <b>description</b>: <i>Home Improvement & Hardware Retail</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Washoe-Tribe</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30853</link>
<guid>27ac0ca86e06d1822d546ed038ea33ae</guid>
<pubDate>Thu, 26 Mar 2026 18:38:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Washoe-Tribe</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1b1d9175ababa7061e079eae439570ed1e5d75b38dac72d5438aaf6bc2f3b5f</i><br /><br />Threat actor <b>description</b>: <i>0</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kaemmerlen-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30858</link>
<guid>252a3893179658de41f437d975468205</guid>
<pubDate>Thu, 26 Mar 2026 17:37:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Kaemmerlen-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>99c8620a6f33768c8ef5cdad8d16ba119783c6e3d2ca2cb1da8ebce6c95c4ad1</i><br /><br />Threat actor <b>description</b>: <i>Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.davidhelfandlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30863</link>
<guid>443615ca6b28402752eb646cc6f51ae7</guid>
<pubDate>Thu, 26 Mar 2026 17:17:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>www.davidhelfandlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd63713191d8cdc8d062219e302330fb4da849d258dcff8be8807ceb2b35d28e</i><br /><br />Threat actor <b>description</b>: <i>David A. Helfand, P.A. is admitted to practice in all the state courts of the state of Florida as well as the U.S. District Court in the Southern District of Florida. Mr. Helfand graduated from St. John’s University in 1989 and from Nova Southeastern University Law School in 1992. He formed the Law Offices of David A. Helfand, P.A. in 1998. He is a member of the Miami-Dade County Bar Association and the Association of Trial Lawyers of America.</i><br />Target victim <b>website</b>: <i>www.davidhelfandlaw.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Goodwill</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30848</link>
<guid>1b80bd6703c274cdb50d8d1fd2a020ab</guid>
<pubDate>Thu, 26 Mar 2026 11:09:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Goodwill</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb03dc484e5ed0db081f3b54ae71660901a6b4a09e55748da170b667164d324c</i><br /><br />Threat actor <b>description</b>: <i>Goodwill Industries of North Central Pennsylvania is dedicated to turning donations into jobs, providing employment for more than 700 people across 15 counties in Pennsylvania and one county in New York.
However, they have been extremely negligent and irresponsible regarding security, resulting in the compromise and online leak of hundreds of pieces of personal data belonging to employees and partners, as well as financial documents.</i><br />Target victim <b>website</b>: <i>https:goodwillinc.org</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Monmouth-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30845</link>
<guid>6dd2f7fb9018bfcd8c3be1f8e65224ae</guid>
<pubDate>Thu, 26 Mar 2026 10:13:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Monmouth-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f79edbeeedfe64c9023613d17c8dc859689bb501eb55287690ccd903dac2333</i><br /><br />Threat actor <b>description</b>: <i>Private university in West Long Branch, New Jersey</i><br />Target victim <b>website</b>: <i>monmouth.edu</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>pridesol.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30841</link>
<guid>d501091236ae1875a06c4fa666166697</guid>
<pubDate>Thu, 26 Mar 2026 08:26:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>pridesol.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8464e5d0edcc98fc1e84b148804f534fd3e39df724366da6713f11c7e57e5ba1</i><br /><br />Threat actor <b>description</b>: <i>Pride Solvents & Chemical Co. is an authorized distributor of the largest and most reputable global manufacturers of chemical products and solvents.
This list includes companies such as Dow, Exxon, BASF, Sasol, ADM, Penreco, P&G, and Stepan—just to name a few.
With an advanced production facility, a fully equipped analytical laboratory, extensive warehouse inventory, and a modern transportation fleet, the company is able to provide an unmatched level of service to customers across all industries—from the state of Maine to Virginia, and westward as far as Ohio.</i><br />Target victim <b>website</b>: <i>pridesol.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>ZenBusiness-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30837</link>
<guid>fc75bd9622425bbc421653770069faf5</guid>
<pubDate>Thu, 26 Mar 2026 04:54:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>ZenBusiness-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a90fc4ceb400bc17609f39731c4a251ac686e7ff54a93eaa675b7dd0ed69de01</i><br /><br />Threat actor <b>description</b>: <i>Several terabytes from Snowflake, Mixpanel, Salesforce, and ect. have been compromised. This is a final warning to reach out by 30 Mar 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 26 Mar 2026 | Warning: FINAL WARNING</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>pulpdent.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30835</link>
<guid>5f8de67cee1da1d3e613285a57f69f4f</guid>
<pubDate>Wed, 25 Mar 2026 19:10:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>pulpdent.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c204267fe7afa54aa39fddc7940d0cdc451fd1c877856afd83991af6680d2fb9</i><br /><br />Threat actor <b>description</b>: <i>PULPDENT® Corporation is a family-owned dental research, manufacturing company and leader in bioactive and biomimetic dental materials. ACTIVA BioACTIVE, developed by Pulpdent, is a bioactive restorative material that behaves much like natural teeth and helps stimulate the formation of apatite, chemically bonds to teeth and helps protect against decay. For over 70 years, Pulpdent has been committed to product innovation, clinical education and patient-centered care. Employees: 100 Revenue: $20.1 Million Industry: Retail    Phone Number: +(617) 926-6666</i><br />Target victim <b>website</b>: <i>pulpdent.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Live-Casino</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30834</link>
<guid>eb47593d2d06ea177c0fdb7013b1707b</guid>
<pubDate>Wed, 25 Mar 2026 17:15:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Live-Casino</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2d8a1503254e78c9d651fcef0a2199b2704bbc6b0f574fd644493201cd9a1f03</i><br /><br />Threat actor <b>description</b>: <i>Live! Casino is a premier gaming and entertainment company located in Greensburg, Pennsylvania. Opened in 2020, the property was developed and is operated by The Cordish Companies, a privately held, family-owned real estate and entertainment firm founded in 1910. The casino operates under the nationally recognized “Live!” brand, which integrates gaming, dining, and live entertainment into a single destination experience. The facility features hundreds of slot machines, table games, a poker room, and a sportsbook, alongside several restaurants and event spaces. It serves as a major regional entertainment hub, supporting tourism, employment, and economic growth in western Pennsylvania. 
The company headquarters is located in 7002 Arundel Mills Cir #7777, Hanover, MD 21076, USA.
1K - 5K Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eastex-Environmental-Laboratory</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30831</link>
<guid>a389e350f007b3dc1ae27b920d1cacf8</guid>
<pubDate>Wed, 25 Mar 2026 15:35:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Eastex-Environmental-Laboratory</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc41536ff9276002108d42e7cbc3029dfeb2b2e8c88af7286f721f1fdab369e6</i><br /><br />Threat actor <b>description</b>: <i>- Experimental Reports- Internal Documents- Financial & HR Documents</i><br />Target victim <b>website</b>: <i>www.eastexlabs.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>PWNA-Plains</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30819</link>
<guid>4bf6d29c0783b2ae052eb3f684995821</guid>
<pubDate>Tue, 24 Mar 2026 22:48:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>PWNA-Plains</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8161c14cb1cf432e02807ec42ed5408c5d5b5dde12b95f91efa1d24f9d51c126</i><br /><br />Threat actor <b>description</b>: <i>Partnership With Native Americans is a 501 (c)(3) nonprofit organization committed to championing hope for a brighter future for Native Americans living on remote, isolated and impoverished reservations</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>cerboniservices.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30817</link>
<guid>6a1fbf6a6315721b9e8931e69112c21e</guid>
<pubDate>Tue, 24 Mar 2026 19:53:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>cerboniservices.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da628e2f841f0686fac75493745734d06db642d871bda22a08c5bc8565612a41</i><br /><br />Threat actor <b>description</b>: <i>Cerboni specializes in providing expert bookkeeping, tax, and CFO services tailored for the restaurant and hospitality industries, while also serving a diverse range of sectors including retail, healthcare, and construction. The company focuses on optimizing profitability, strengthening financial controls, and driving sustainable growth for its clients. With a commitment to delivering clear financial insights and strategic support, Cerboni partners with businesses to enhance their operational efficiency and long-term success. Their comprehensive services include payroll management, inventory control, tax compliance, and IRS audit support.</i><br />Target victim <b>website</b>: <i>cerboniservices.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>jenningsk12.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30816</link>
<guid>78cfc36b921a50fba024eca72d6a458e</guid>
<pubDate>Tue, 24 Mar 2026 19:52:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>jenningsk12.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>10745fa7fd8ee8a81e3290b930b990e3e582aca50e6eaf2d36f641a4d1198a21</i><br /><br />Threat actor <b>description</b>: <i>The Jennings School District strives to provide students with learning experiences and opportunities that prepare the company's students for college and careers and for the 21st century. The company is a community of learners committed to excellence in education. The company want students to plan and prepare for life after Jennings High School. The company want Jennings students to leave the Jennings School District with the opportunity to take college classes, earned college credit, or have taken career and technical education classes that allow them to start working in their desired career field after graduation. The company is developing community partnerships that will benefit Jennings students and the Jennings community. Please take the time to explore the College and Career link and resources available. It is an honor to serve the families and students of the Jennings School District. CLICK HERE to visit the College and Career Advising page. Employees: 500 Revenue: $28.5 Million Industry: Education   Phone Number: +(314) 653-8000</i><br />Target victim <b>website</b>: <i>jenningsk12.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aroostook-Mental-Health-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30807</link>
<guid>81190ee016c56828c2f2c3f2cd94db77</guid>
<pubDate>Tue, 24 Mar 2026 19:40:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Aroostook-Mental-Health-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b1cbbb0b63253fa3570f08f9df6c3a6d23193df6430e252b648971aa5949ff6</i><br /><br />Threat actor <b>description</b>: <i>0</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>All-Real-Estate-Title-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30815</link>
<guid>4d991fb80216eb56bab6d06f6f292a0e</guid>
<pubDate>Tue, 24 Mar 2026 19:27:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>All-Real-Estate-Title-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>65f8820337c95721d601779bf5e048efbacca6024823b0f0d62a25c108dcb7a4</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.aretsifl.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Roxiticus-Golf-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30814</link>
<guid>f186e7fae622a7798ce7f1bccac9a247</guid>
<pubDate>Tue, 24 Mar 2026 19:26:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Roxiticus-Golf-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fb67e1f19c70862a5fe81e5fb9e775fcd212d054240807bcd5b340714ef5378c</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.roxiticus.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pinnacle</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30813</link>
<guid>9f07f48cb91caf26dc0e4d76caac2826</guid>
<pubDate>Tue, 24 Mar 2026 19:26:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Pinnacle</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81ec58e0a2e07193427fbb73963001dfeaa7a4633c5700bd9b975afaaa7585a4</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.pinnacle.tax</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ascent-Asset-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30812</link>
<guid>5c1917d0afc16d36b7b2471ae6a664ad</guid>
<pubDate>Tue, 24 Mar 2026 19:25:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Ascent-Asset-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb32cf0f0228cc83eec70404d65c16214911761ab31ff83b8d5eb793c8e50fc9</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ascentasset.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Capital-Wholesale-Drug</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30811</link>
<guid>b54732be9ea48e497ad2813b4cb8930f</guid>
<pubDate>Tue, 24 Mar 2026 19:25:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Capital-Wholesale-Drug</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89ec930600708389e89d3c1e48d663b70f7d03daa526ae0a22e80f5a5aeb0c7e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.capital-drug.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Block-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30810</link>
<guid>4b34cc1bf1623b6d6532ed63ff6ae276</guid>
<pubDate>Tue, 24 Mar 2026 19:24:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Block-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d6a8b0a940232f7816ffe1510caa9bde39b307ac12eb773caa213422e6d9fbb2</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.blockeng.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Window--Door-Design-Center-of-Florida</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30809</link>
<guid>33b2260650d881180c21b62b4de5f3d2</guid>
<pubDate>Tue, 24 Mar 2026 19:23:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Window--Door-Design-Center-of-Florida</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>684054c17460e2e75c7e30c03f7af39ef8c4975c3a4aea80af3ad34661583392</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.wddcfl.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Concord-Components-Wefapress-Environment-Masters-FairmontHot-Springs-ResortRoad-Americ</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30804</link>
<guid>ed0ec47d9ace176c75820740b17aa553</guid>
<pubDate>Tue, 24 Mar 2026 15:38:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Concord-Components-Wefapress-Environment-Masters-FairmontHot-Springs-ResortRoad-Americ</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8a5dc57922e1b04554f58e366330a0c57e65a7eb8b6246984b05de31cc653043</i><br /><br />Threat actor <b>description</b>: <i>We obtained about 17gb of data of the following companies:JConcord Components, Inc. was founded in 1995 in Concord, Nebraska as a retail catalog company, supplying hard-to-find electronic components. Wefapress is a leading manufacturer of plastic products, specializing in high-quality semi-finished products, custom plastic parts, and various profiles and guides. At Environment Masters, the company prides ourselves on delivering honest, reliable service. If the company tell you, you'll be better off with Crystal Springs HVAC repair, you can believe what the company say.Fairmont Hot Springs Resort, home to Canada's largest natural mineral hot springs, is a year-round destination nestled in the heart of the British Columbia Rocky Mountains and the stunning Columbia Valley.Road America, located in Elkhart Lake, Wisconsin, is one of the world's fastest permanent road racing tracks, offering a variety of motorsport events and experiences. The company provides a rangeof services including driving schools, karting, and various racing events such as the MotoAmerica Superbikes and the INDYCAR Grand Prix. You will find personal employee personal data (hundreds of SSNs and so on), medical information, client information, numerous project files, confidential files, accounting and financials and other internal operational files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mooers-Immigration</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30805</link>
<guid>3340d90f2875506693f0c0a8e693be86</guid>
<pubDate>Tue, 24 Mar 2026 15:35:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Mooers-Immigration</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b0776eff1ce6b640cd2edddf88b489a9ae6b843454b50ce8aac6a4991ff0163</i><br /><br />Threat actor <b>description</b>: <i>Mooers Immigration is dedicated to the practice of immigration an
d nationality law, offering services such as employment-based and
family-based immigration, naturalization, and strategic complian
ce planning. The firm focuses on delivering cost-effective soluti
ons to help individuals and families achieve their American dream
s and navigate complex immigration processes.

We will upload 138gb of corporate data soon. Lots of client docum
ents (passports (LIONEL MESSI, LUCIANO ACOSTA passports and visas
and other interesting documents), DLs, SSNs, visas, credit cards
and so on), financials, confidential docs, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>M3-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30803</link>
<guid>74b4db7ecf4ff1770156d20fd45a7a6e</guid>
<pubDate>Tue, 24 Mar 2026 14:07:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>M3-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>169e798e47f916a29749fc8572dec19b5387e4fb598f30f34be960807fafc467</i><br /><br />Threat actor <b>description</b>: <i>Founded in Lansing more than 11 years ago by Dowling, M3 Group prides itself on being the only local agency that offers the most comprehensive array of integrated branding, marketing and advertising services in the mid-Michigan region. M3 Group has grown into one of the largest and most respected agencies in the area. For more than a decade, M3 Group has built and refined strong brands through integrated marketing strategies that keep the client's goals and its bottom line in mind. M3 Group's award-winning staff works across traditional and nontraditional platforms, offering an array of market research and consulting, media planning and buying, website development, social and digital media marketing, public relations and promotions, video and audio production, corporate brand development, and graphic design. Take your brand to the next level by visiting M3Group.biz</i><br />Target victim <b>website</b>: <i>m3group.biz</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>French-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30802</link>
<guid>0ee7cdb0c30e70bdb04b5c35d009d541</guid>
<pubDate>Tue, 24 Mar 2026 13:59:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>French-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>70553a5a7b3dbb1c6b62a2e65678712a486d3c2d60b09e4c7c183d6588d8f4d3</i><br /><br />Threat actor <b>description</b>: <i>French Engineering offers a range of services in Traffic Engineer
ing, Water Resources Engineering, and Sustainable Planning and De
sign Consulting in Pennsylvania, West Virginia, and Maryland. The
ir services include traffic data collection, traffic signal desig
n, roadway safety audits, and transportation impact studies, aime
d at supporting new commercial, industrial, and residential devel
opments.

We will upload 72gb of corporate data soon. Employee documents (p
assports, DLs, addresses, phones, emails, medical records, credit
cards), financials, confidential docs, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gustavo-Preston</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30801</link>
<guid>0718aac22ecc8481c33c38f79ba7f5bb</guid>
<pubDate>Tue, 24 Mar 2026 13:59:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Gustavo-Preston</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5ca9d3f0c40b483a635a595e6de23921c0e2dbf66a731ab7995842a791f17c92</i><br /><br />Threat actor <b>description</b>: <i>Gustavo Preston Company specializes in designing, selling, and se
rvicing commercial pump solutions, including water boosters, wast
ewater pumps, and circulator pumps. They offer a range of product
s such as packaged pumping systems, elevator pumps, and commercia
l water heaters, along with comprehensive pump equipment services
like maintenance and repairs.

We will upload 31gb of corporate data soon. Employee documents (p
assports, DLs, addresses, phones, emails, medical records, credit
cards), financials, client information, confidential docs, NDAs,
etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Russells-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30800</link>
<guid>0b668d973688aeb13be05aab06902066</guid>
<pubDate>Tue, 24 Mar 2026 12:58:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-Russells-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f7485a1adf48cbd4e61f5dd97de31295520c2056bd3a7a55b49374f90a8eb4a</i><br /><br />Threat actor <b>description</b>: <i>The Russell's Law Firm specializes in personal injury, wrongful d
eath, criminal defense, and DUI cases, offering expert legal repr
esentation for their clients. They aim to support individuals who
have been harmed due to negligence or charged with crimes, empha
sizing that everyone deserves fair treatment under the law.

We will upload 15gb of corporate data soon. We took a lot of pers
onal data of their clients (passports, DLs, SSNs, death\birth cer
ts, addresses, phones, emails, medical records, and so on), polic
e reports, court docs, lots of confidential files, financials, et
c.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Atlas-Ocean-Voyages</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30795</link>
<guid>80f2ef940c5fbde8721e90963c00c8c0</guid>
<pubDate>Mon, 23 Mar 2026 16:53:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Atlas-Ocean-Voyages</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>721d1125d198cebc563e1a336ceacdc81ab8a977147e548b5c3c27e9857d7ac0</i><br /><br />Threat actor <b>description</b>: <i>Atlas Ocean Voyages offers year-round all-inclusive expedition cruises for under 200 guests, led by expert guides and caring crew. Luxurious yachts sail pole‑to‑pole to pristine, hard‑to‑reach destinations for nature, culture, and culinary exploration.</i><br />Target victim <b>website</b>: <i>www.atlasoceanvoyages.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nafco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30790</link>
<guid>621396ff1c6baf6578a381d65f2773ad</guid>
<pubDate>Mon, 23 Mar 2026 16:40:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Nafco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c60fe10c7f387e9bcae5b67943ddc90743ffc882310a06278830dd3a7c07436</i><br /><br />Threat actor <b>description</b>: <i>NAFCO Fish is an industry innovator specializing in responsibly sourced seafood, providing high-quality products and services to brick-and-mortar stores, meal kit companies, and e-commerce food retailers. With over 30 years of experience, they offer a full range of seafood products including frozen, fresh, live, salted, andsmoked options, all processed with a focus on safety and quality. We will upload 150gb of corporate data soon. Employee personal information (passports, IDs, medical information), financials, contracts, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Marion-Military-Institute</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30783</link>
<guid>417cce83a9373223e4aae3b833114354</guid>
<pubDate>Mon, 23 Mar 2026 14:40:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Marion-Military-Institute</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b714b12fd45dc98ba578694f30ec62242a8f56eb0f21c39744039873e25a9937</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Schmiede</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30784</link>
<guid>0a19bcfcc6385bfbdda771533cd7f694</guid>
<pubDate>Mon, 23 Mar 2026 14:40:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Schmiede</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f0c2aeb10394970a75f6499d7bd266def1e53b47815aa2ad134860340d0d76bd</i><br /><br />Threat actor <b>description</b>: <i>Schmiede Corporation specializes in high-precision contract machining, focusing on complex and difficult-to-machine components with tight tolerances. The company offers a range of services including rebuilding, retrofitting, remanufacturing, and the productionof specialty machines, fixtures, and gages.We will upload corporate data soon. Employee personal information, projects, contracts, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Distritech</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30786</link>
<guid>5f0d57632c4ac1fac07a1fc7b2c449fb</guid>
<pubDate>Mon, 23 Mar 2026 14:35:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Distritech</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6fd64b229f7b0efab4b9a46f814af87a9e91c7c2e6a8d888194bc68a7ed3e8bc</i><br /><br />Threat actor <b>description</b>: <i>distritech.com zoominfo.com/c/distritech-llc/358799326 DISTRITECH LLC offers a wide range of consumer electronics and accessories, including audio and video equipment, computers, cameras, mobility devices, gaming products, wearables, smart home solutions, and home living items. The company targets technology enthusiasts and everyday consumers seeking high-quality electronic products and personalized service. With a commitment to providing updated inventories and quick warranty support, DISTRITECH emphasizes exceptional customer experience and market insights. Additionally, they provide options for vendor registration and a range of weekly deals, making technology accessible and affordable to their clients</i><br />Target victim <b>website</b>: <i>distritech.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dixon-Electrical-Systems--Contracting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30782</link>
<guid>4bf5d7d2a1bc51d753fecf97244464a2</guid>
<pubDate>Mon, 23 Mar 2026 12:32:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Dixon-Electrical-Systems--Contracting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ca648210f28432af71cc78494c0f2573d4736391eb2a765ecaf679da308376f</i><br /><br />Threat actor <b>description</b>: <i>Dixon Electrical is a one-stop, full service electrical contracti
ng firm that installs industrial work, as well as any size commer
cial project. The company provides preventative maintenance, incl
uding Infrared Thermography, and install all levels of telecommun
ications, fiber, CATV, sound, Information Transport Systems (ITS)
, security, fire alarm and Building Automation Systems (BAS), as 
well as service work.

We will upload corporate data soon. Detailed employee personal in
formation (passports, DLs, credit cards details for more than 100
employees and so on), financials, contracts and agreements, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>JDV-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30778</link>
<guid>5d7b0538ea08741711041a1e67526b11</guid>
<pubDate>Mon, 23 Mar 2026 01:01:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>JDV-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f451f32f16a5c121db9472349674a799bf669a21400d4040e26556f2facbdea</i><br /><br />Threat actor <b>description</b>: <i>JDV Products, Inc. specializes in providing a wide range of tools and equipment for wire wrapping, including wire wrap guns, wrap tools, and wire handling solutions. The company also features a selection of gas-powered tools and fiber optic tools, ensuring comprehensive support for electrical projects.  We have 700GB of data at our disposal, in a week we will publish everything.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ameriprise-Financial-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30777</link>
<guid>9e9b3b34947bc8343f4f63f6e53ac7c4</guid>
<pubDate>Sun, 22 Mar 2026 21:09:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Ameriprise-Financial-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6bd722075878da0dba21ffaecda9ff8e22c5b5fdb1ac648c858e82a8124806e</i><br /><br />Threat actor <b>description</b>: <i>Salesforce records containing PII and over 200GB compressed Sharepoint internal corporate data have been compromised. This is a final warning to reach out by 25 Mar 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 23 Mar 2026 | Warning: FINAL WARNING</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Infinite-Campus-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30776</link>
<guid>f1a90e1c055459c26e3280c607f8fe5e</guid>
<pubDate>Sun, 22 Mar 2026 21:08:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Infinite-Campus-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>925cd163bc45e8d4451a168dd91dc1185a314c96aecfad44f1df80f232156de6</i><br /><br />Threat actor <b>description</b>: <i>Salesforce records containing PII and other internal corporate data have been compromised. This is a final warning to reach out by 25 Mar 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 23 Mar 2026 | Warning: FINAL WARNING</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southern-Commercial-Real-Estate</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30773</link>
<guid>63fb561c81923bcdbb86140a1801305d</guid>
<pubDate>Sun, 22 Mar 2026 19:42:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Southern-Commercial-Real-Estate</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3088dcd26fa7c1e81eba749ff0e551a0ab32a75b45b92d99c86aa329c2737624</i><br /><br />Threat actor <b>description</b>: <i>Real Estate</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southwire</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30774</link>
<guid>da58e2e4f4f6251d74b3a3fa11339e21</guid>
<pubDate>Sun, 22 Mar 2026 19:42:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Southwire</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e423382207e051cddd8cbdb0b23f651fc2380db6332273344ebc130c98360586</i><br /><br />Threat actor <b>description</b>: <i>Manufacturing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>nPower-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30769</link>
<guid>6f31b4d25c2e143714d8f7d78bde7deb</guid>
<pubDate>Sun, 22 Mar 2026 18:42:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>nPower-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e66ea9f0fd5f1c8952757be995523615469a359e109df6d369105c1fa06e31b4</i><br /><br />Threat actor <b>description</b>: <i>Software</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Elite-Limousine-Plus</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30770</link>
<guid>20818537cc5cb1fe3dd50baf7c362808</guid>
<pubDate>Sun, 22 Mar 2026 18:42:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Elite-Limousine-Plus</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb51776db14e50c6d1205b40b5dddfc3cc08f103fc62f0dba81e3778d96994ba</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Phelps-Dunbar</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30771</link>
<guid>9e550bb1034a12dea7d970c623dbd9e6</guid>
<pubDate>Sun, 22 Mar 2026 17:19:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Phelps-Dunbar</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d4f4c4e05b292b81ca8f77a5a20985a83def9e9db8b11d8b8606bc043156cf79</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1853 and headquartered in New Orleans, Louisiana, Phelps Dunbar is a law firm practicing in…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cannavative-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30767</link>
<guid>8b65e7a34bd7f333588177e3580aa7a9</guid>
<pubDate>Sun, 22 Mar 2026 15:01:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Cannavative-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f382933d768632f9179a5abd8119b8eada564aa7660fe22c31a1cbb5f2213a6</i><br /><br />Threat actor <b>description</b>: <i>- QuickBook Files- METRC DB-Employeement & Clients Documents</i><br />Target victim <b>website</b>: <i>www.cannavativegroup.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>breastcare.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30748</link>
<guid>c81779aa7f1a0eafd914ba5aea36416c</guid>
<pubDate>Sat, 21 Mar 2026 21:14:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>breastcare.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5dbf8705d852ff436019d4018de3c8a7e8ef30fb2404268d85a8aaec76e1a19a</i><br /><br />Threat actor <b>description</b>: <i>Dr. John G. West is a pioneering general surgeon who established Orange County&#039;s first breast c...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>irco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30737</link>
<guid>67a4b0f54d720a47e18a5c99ba191a06</guid>
<pubDate>Sat, 21 Mar 2026 18:05:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ALP-001</b> claims attack for <b>irco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1c40abcb8906a58bc7efff1b7513a05f0cb3fe44f12cd79360fb36b6c38c1d8</i><br /><br />Threat actor <b>description</b>: <i>Country: USA Revenue: $7.7 Billion Storage: 5.9 TB Ready: 5.9 TB
Deadline: 2026-03-29 17:41:30</i><br />Target victim <b>website</b>: <i>irco.com</i>]]></description>
<category>ALP-001</category>
</item>
<item xmlns:dc='ns:1'>
<title>Millerfoto</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30731</link>
<guid>b16f0d705b8c4fff87d26abff7c6d17a</guid>
<pubDate>Sat, 21 Mar 2026 16:37:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Millerfoto</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9d33c0063add87d44a34a8b18ad1f3a6aa5e35d909e53688f927395023df0ef8</i><br /><br />Threat actor <b>description</b>: <i>Consumer Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Edifice-Design--Architecture</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30721</link>
<guid>ad6ef80344efaf6f632432640463941a</guid>
<pubDate>Fri, 20 Mar 2026 20:41:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Edifice-Design--Architecture</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81e27ddc3edb0010493c8dd0d3599e54c5bfd92346c149beff9d1b431dc0c7ff</i><br /><br />Threat actor <b>description</b>: <i>We shape our buildings, and afterward our buildings shape us - Winston Churchill At Edifice, we believe architecture and design have a unique physical, spiritua...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Farese-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30722</link>
<guid>00becd45cce07f2cc996fc254f2fcfc0</guid>
<pubDate>Fri, 20 Mar 2026 20:41:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>The-Farese-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cfeb8f553d30f328b7ad74b75bb2ded6c8e833a1a4920f14eda67f0c7ad41d79</i><br /><br />Threat actor <b>description</b>: <i>The Farese Group specializes in retirement income planning, investment management, and financial planning, focusing on the distribution phase of retirement. Wit...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Savvy-Hawk</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30711</link>
<guid>5b768a6943e0867ed0a8825406908b91</guid>
<pubDate>Fri, 20 Mar 2026 16:41:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Savvy-Hawk</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e49279c8fe84c116b964c86ca8dc05d515af93bc15fb614d3f9929c8081f91e</i><br /><br />Threat actor <b>description</b>: <i>Savvy Hawk is a Miami-based IT service provider that specializes in business-focused communication solutions for small to enterprise-level clients. They offer services such as custom cloud solutions, data backup and recovery, and VoIP telephone services, all designed to enhance productivity and business continuity.We will upload 941gb of corporate data soon. Detailed employee personal information (passports, DLs, SSNs, medical records and so on), HR files, client's credit cards and other information, financials, contracts and agreements, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>wardencc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30713</link>
<guid>0898bae5662b8c4a9cd8ea2db1fa7ee4</guid>
<pubDate>Fri, 20 Mar 2026 16:41:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>wardencc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b281364a3242e99610669f1e81faffd9715fd91824c03de3c30c8732ad825014</i><br /><br />Threat actor <b>description</b>: <i>Warden Construction is a general contractor based in Jacksonville, Florida, specializing in design-build, construction management, renovation, and new construct...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>odayequipment.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30714</link>
<guid>7b3678e568c812fa368f74671eaac799</guid>
<pubDate>Fri, 20 Mar 2026 16:41:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>odayequipment.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee8fb68bab7291a7b66a985e7d0c93b65e3292fbd48bc70dde0a20a114b40a16</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1935, ODay Equipment specializes in supplying and maintaining equipment for the oil and gas industry, serving customers in the U.S. Midwest.The compa...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>sopower.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30716</link>
<guid>fee6e6bfe55024e4ae92983d776ecd56</guid>
<pubDate>Fri, 20 Mar 2026 15:40:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>sopower.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f8a29baf060554e70bb8c400c9ad3bd67dc169d66e6526aa971807355c5f0832</i><br /><br />Threat actor <b>description</b>: <i>industrial electrical service provider located in Baton Rouge, LA. Founded in 1994, it specializes in electrical testing, commissioning, maintenance, switchgear...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>centreconcrete.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30718</link>
<guid>5a7acc9324aeef65925024a66800c015</guid>
<pubDate>Fri, 20 Mar 2026 15:40:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>centreconcrete.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6dcebe6a8fdc7233cf99f8d928a62c2fcf1eb74de9929955b0b53e2f3aa04456</i><br /><br />Threat actor <b>description</b>: <i>Centre Concrete has been a leader in the production and delivery of ready-mix concrete in central Pennsylvania since 1956, operating seven production sites. The...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Matthews-Real-Estate-Investment-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30698</link>
<guid>5d599fc8f46d75efc30d93e0c500bf6f</guid>
<pubDate>Fri, 20 Mar 2026 11:42:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Matthews-Real-Estate-Investment-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d58d8287c05ce49fdd38b6eba5ce0404eb155875e84d5a279122c8a030a8cc0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Winmate-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30699</link>
<guid>34ce78b239697c8e7bacce545b6bdd02</guid>
<pubDate>Fri, 20 Mar 2026 11:42:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Winmate-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d990150f2a4c9e929bf0633da276249abe865d2e88f7dbb4c79540bfe819069f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Finance-of-America-Companies-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30701</link>
<guid>56bc2ffafe5268122fb8c00807dea91f</guid>
<pubDate>Fri, 20 Mar 2026 11:42:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Finance-of-America-Companies-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6b65cba5dfbfa43b63875d22f9c0863fb1d0ce28d2d2096d7ac48e63ff43294</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Los-Angeles-LA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30702</link>
<guid>c0bf581dc5c2abecaf2385d8845f0c91</guid>
<pubDate>Fri, 20 Mar 2026 11:42:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>City-of-Los-Angeles-LA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bbb3bf6acfd195b352ea1ab32f39ccdf16bc2bf0c9bd54f84f3eca55c6cda0d1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Town-of-Blacksburg</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30703</link>
<guid>86113dc59e768c1d1a462f18a5d458a0</guid>
<pubDate>Fri, 20 Mar 2026 11:42:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Town-of-Blacksburg</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0d803bd56cef1f76a0298e351eb395018e3f14632dced21f855f38344a8a5980</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pearce-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30704</link>
<guid>95d40515d78b92d75f485224d51a7ea6</guid>
<pubDate>Fri, 20 Mar 2026 11:42:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Pearce-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>120f246bf576c582b773076c16349db3ba90e37cf035b92ffdd34c1df00b1a3e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Oriska-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30706</link>
<guid>af6e8730844faa627625a6c3fa98f0fc</guid>
<pubDate>Fri, 20 Mar 2026 11:09:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Oriska-Insurance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7502dcd0dc743b85d7f78149d5f84915de968f5e321a0160188f1b8fa1857704</i><br /><br />Threat actor <b>description</b>: <i>Oriska Insurance specializes in providing surety bonding, workers compensation, health insurance, and disability insurance tailored for small and minority-owned businesses. The company positions itself as a single source solution for multi-policy requirements, ensuring competitive pricing and comprehensive protection. With a commitment to reliability, Oriska Insurance has a track record of never failing to pay a claim or abandoning an employer. Their services are designed to help clients meet job requirements while staying within budget and legal constraints</i><br />Target victim <b>website</b>: <i>www.oriskainsurance.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Berkadia-Commercial-Mortgage-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30695</link>
<guid>5ed9dcf3d3d3dd8712866e81ddeaa03d</guid>
<pubDate>Fri, 20 Mar 2026 05:50:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Berkadia-Commercial-Mortgage-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c555ae073d05fcca6f11ba0383cdddc4f92d4f4fe19a4fe04eb5d0bb493ebca5</i><br /><br />Threat actor <b>description</b>: <i>Over 5M Salesforce records containing PII and other internal corporate data have been compromised. This is a final warning to reach out by 22 Mar 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 19 Mar 2026 | Warning: FINAL WARNING</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mercedes-Benz-of-Arlington</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30693</link>
<guid>eca85870ec8b6d70a888d143988d8a4b</guid>
<pubDate>Fri, 20 Mar 2026 00:46:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Mercedes-Benz-of-Arlington</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9bed772bdfca492f59518f72866e3db337c99fff22bb2f33ec1e6583854a7eb5</i><br /><br />Threat actor <b>description</b>: <i>Mercedes-Benz of Arlington is a premier dealership specializing in new and pre-owned Mercedes-Benz vehicles, offering a wide selection of luxury cars, SUVs, and...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Accolend</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30689</link>
<guid>98d27eaef365d1710da5106ffbabf73c</guid>
<pubDate>Thu, 19 Mar 2026 20:45:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Accolend</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>938bb8719e74c5b7c5d9bcacfb774c139efece1298faeffdad8f7b7f1ff8a5a2</i><br /><br />Threat actor <b>description</b>: <i>Finance</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>vatractor.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30687</link>
<guid>bd689c29167187a5b0a27f7be2c915b5</guid>
<pubDate>Thu, 19 Mar 2026 18:42:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>vatractor.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8a2aa05906b168f96d52ab3bcac2bd2d0e83e0789be08057c1bdfe5d6c91a210</i><br /><br />Threat actor <b>description</b>: <i>Virginia Maryland Tractor specializes in John Deere equipment,  offering a wide selection of new and used machinery, financing options, parts, and service.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Angus-Young-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30686</link>
<guid>b3d2a9a2985c5a32c669cc33c885e6c8</guid>
<pubDate>Thu, 19 Mar 2026 16:49:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Angus-Young-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a9d501c1bd173f6a91f2060a283ee5b978351566b2b3b6398014dfd1de8e6ac</i><br /><br />Threat actor <b>description</b>: <i>Angus-Young is a full-service architectural, landscape architectu
re, engineering, and interior design firm that offers high-qualit
y design solutions, construction documentation, bid management, a
nd construction services. With over 60 years of experience, the f
irm collaborates on a diverse range of project types, ensuring in
formed decisions and integrated designs.

We will upload 50gb of corporate data soon. Employee personal inf
ormation (w9 forms, docs scans), HR data, financials, a bit of cl
ient data, contracts and agreements, projects, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Decorative-Paving</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30683</link>
<guid>8b56c8b87edf9345d07cf9c20f418a1f</guid>
<pubDate>Thu, 19 Mar 2026 16:41:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-Decorative-Paving</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e4531f5a2ec7670933f3dbbc45a86798267c2b35c115dc74a7aa137f43d54f42</i><br /><br />Threat actor <b>description</b>: <i>Decorative Paving Company specializes in the manufacturing, installation, and distribution of high-quality paving systems. With over twenty years of experience, the company has established a strong international reputation for excellence in its services.We will upload 20gb of corporate data soon. Employee personal information (passports, DLs and other HR files), projects, financials and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Career-Adventures</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30684</link>
<guid>07c42ce3e98e0db4ff14b35b32d870a8</guid>
<pubDate>Thu, 19 Mar 2026 16:41:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Career-Adventures</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>82610fb4c443d6b7855c2595e43ef0cfaadc149d71f43ad9038a1e0732c5fe8b</i><br /><br />Threat actor <b>description</b>: <i>Career Adventures, Inc is a leading employment agency in Shreveport and Bossier City, Louisiana, specializing in temporary and full-time staffing solutions for start-up manufacturing facilities. With over 30 years of experience, they provide tailored programs that enhance employee performance and reduce turnover.We will upload 8gb of corporate data soon. Employee personal information (passports, DLs and so on), lots of HR data, financials, a bit of client data, projects, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Onyx-Graphics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30676</link>
<guid>c56aa2102f060ad7471fbefe5e296c92</guid>
<pubDate>Thu, 19 Mar 2026 12:58:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Onyx-Graphics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e93b975a1295797605cf29d1457b7d60430382479335069573565c5841f1661</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Onyx Graphics is a technology company that specializes in developing software solutions for wide and grand-format digital color printers. Founded in 1989, the company's core products include Onyx production and RIP software that optimize output and provide end-to-end control for print applications. The company serves a global market through an extensive network of authorized resellers.</i><br />Target victim <b>website</b>: <i>onyxgfx.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Petra-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30672</link>
<guid>2e904afa80a8ca949f187f64ff2d15b2</guid>
<pubDate>Thu, 19 Mar 2026 12:55:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Petra-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6523c8a1be6a636916d4bda8fcaa522d0cb0c0ed7ddbf5bc82f402b4bea1e7c3</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Petra Industries is a leading wholesale distributor of consumer electronics, custom installation products, mobile audio/video accessories, and appliance connection supplies. Founded in 1985, it is based in Edmond, Oklahoma. Petra's goal is to provide the best ordering process, the best customer service, and the best delivery system to customers nationwide.</i><br />Target victim <b>website</b>: <i>petra.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Amerinational-Management-Services-AMS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30669</link>
<guid>9a3f34a2d6ad7dcd61c116f52e398d81</guid>
<pubDate>Thu, 19 Mar 2026 00:20:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Amerinational-Management-Services-AMS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b5359b794d6308e8e234233fb4a91287347ab481fca155359490aecf46611f86</i><br /><br />Threat actor <b>description</b>: <i>Amerinational Management Services, Inc. specializes in providing comprehensive business solutions for martial arts schools, including marketing, software, and tuition management services. Their offerings encompass ATLAS Martial Arts Software, lead funnel websites, merchant accounts, and after school/summer camp programs. The company targets martial arts school owners looking to enhance their business operations and profitability. With over 40 years of experience, AMS is dedicated to helping martial arts professionals achieve their goals through effective management and marketing tools.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Construction-Equipment-Parts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30664</link>
<guid>253491938bb22e1044113ffca7e322ee</guid>
<pubDate>Wed, 18 Mar 2026 20:43:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Construction-Equipment-Parts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5f90fa8c35ef8dffd99c5010ec83bdf172fef2c8968ba7f0ac8a485ca98941a</i><br /><br />Threat actor <b>description</b>: <i>Construction Equipment Parts, LLC is a dismantler specializing in heavy equipment parts for various brands, including wheel loaders, excavators, and articulated...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>DynexRivett</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30665</link>
<guid>eaac424dcec03df14c2f5f946c128de4</guid>
<pubDate>Wed, 18 Mar 2026 19:42:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>DynexRivett</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3746273cec739afbab6648005c4b75bb142f8673bb97c39773eebd24abd1e85</i><br /><br />Threat actor <b>description</b>: <i>Dynex/Rivett Inc. specializes in high-pressure hydraulic components and systems, including piston pumps, power units, motors, and valves, designed for demanding...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Delta-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30668</link>
<guid>47026a9738cc32d4dab7475daa0c050d</guid>
<pubDate>Wed, 18 Mar 2026 19:16:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Delta-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>287dd868acd473aa7c42ee51a448aaad5f1bbaa08f72028e8f7da8166608c5a7</i><br /><br />Threat actor <b>description</b>: <i>Delta Manufacturing specializes in custom electric heating elements. They serve a variety of industries, including aerospace, medical, food, and chemical, ensuring fast turnaround of custom orders. However, they failed to prioritize security, resulting in the compromise of customer and employee data and contracts, as well as the exposure of all accounting records and invoices.</i><br />Target victim <b>website</b>: <i>deltamfg.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Conrad-Capital-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30661</link>
<guid>cf37368a5897a76478650a7eea56cfc1</guid>
<pubDate>Wed, 18 Mar 2026 18:44:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Conrad-Capital-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a989a45740b87e01549407d4c01066de7ff36c22b2ab146af14d1b1b6c2876be</i><br /><br />Threat actor <b>description</b>: <i>(including customers personal information and financial data) Conrad Capital Management (CCM) is an independent Registered Investment Advisory firm that provide...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>loopcap.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30662</link>
<guid>1f3a4f7715b9fd855595b4836101ec30</guid>
<pubDate>Wed, 18 Mar 2026 17:32:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>loopcap.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c3c5b46ea9a1e5126414c42c902883ee323438c1ba64ac04ffa4ff78517a993</i><br /><br />Threat actor <b>description</b>: <i>We provided the management of Loop Capital with ample time and opportunity to protect their clients, their employees, and their shareholders. However, the company chose a path of total ignorance, opting for silence and bureaucratic delays instead of accountability.

For an investment firm of this ca…</i><br />Target victim <b>website</b>: <i>www.zoominfo.com/c/loop-capital-holdings-llc/70616391</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Valley-Family-Health-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30660</link>
<guid>9b35d1de15050fd1b8e1be886fe6f22b</guid>
<pubDate>Wed, 18 Mar 2026 16:16:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Valley-Family-Health-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33bc7a590615ad5575e95c85a57d9de5d0106413e51efd510c38e04b24a745db</i><br /><br />Threat actor <b>description</b>: <i>Valley Family Health Care is a Community Health Center offering medical, dental, behavioral health, and nutrition services. With 12 locations (including a mobile unit), they accept major insurances and provide income-based sliding fees to ensure accessible care.</i><br />Target victim <b>website</b>: <i>www.vfhc.org</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>BTX-Global-Logistics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30657</link>
<guid>b2e65e738c327d1a8c3c27092d00b6c1</guid>
<pubDate>Wed, 18 Mar 2026 15:45:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>BTX-Global-Logistics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42a2d1f18523d93a6011980b50cff5e7b058976bad73ffc8e55f70e2d7e32a7d</i><br /><br />Threat actor <b>description</b>: <i>Freight & Logistics Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Elite-Flower</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30649</link>
<guid>58589b2f5ef1c0bbfdcd09c6fb0b47b7</guid>
<pubDate>Wed, 18 Mar 2026 14:44:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Elite-Flower</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>846d03b1f848a3105bcdccc1289d6449aae634dabb924a8013794633b496a028</i><br /><br />Threat actor <b>description</b>: <i>Retail · Pennsylvania</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jacobs--Sons</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30650</link>
<guid>33f68c58d409a7d8a1524d062a44b5d8</guid>
<pubDate>Wed, 18 Mar 2026 14:44:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Jacobs--Sons</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c732fddeec3f533ff6d7425acc39265fbfa1c03113510bc6b13f08a83ce39d0</i><br /><br />Threat actor <b>description</b>: <i>Retail · Pennsylvania</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sievert-Electric-Service-and-Sales</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30651</link>
<guid>7663416bc80da19bd0bb21d16003b0f0</guid>
<pubDate>Wed, 18 Mar 2026 14:44:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Sievert-Electric-Service-and-Sales</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>087607d2ce1a3e70aa314eed912db9fe416e6c6fcdf40eaf0ec3bb07d9a642bc</i><br /><br />Threat actor <b>description</b>: <i>Industrial Machinery & Equipment</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>L-H-Lacy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30653</link>
<guid>2d69a2b7a27852c89b6bcafc83d1ec72</guid>
<pubDate>Wed, 18 Mar 2026 14:43:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>L-H-Lacy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24c11b1f145c8cfa93ea068ffa01da54fb080b00a4d0dfd1f579eb2f2ff1ad11</i><br /><br />Threat actor <b>description</b>: <i>Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rainbow-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30655</link>
<guid>0f7521a9b9e2084f08cf6adf4cdd8c21</guid>
<pubDate>Wed, 18 Mar 2026 14:43:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Rainbow-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e4ea036dfb5de4c1a08c87cd480d51f44f4a7f17510d6da0d574cf4ab4ac4ae</i><br /><br />Threat actor <b>description</b>: <i>Rainbow Technology specializes in providing a wide range of products and services tailored for the utility and industrial markets,including safety items and specialty products. Their offerings include adhesives, sealants, cleaning supplies, personal protection equipment, and tools, aimed at delivering superior performance and value for money.We will upload corporate data soon. Employee passports and DLs and other information, HR files, financials, client information, credit card information, contracts and agreements, and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Texollini</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30648</link>
<guid>80f36a558ab7295d37bc67fbb7737963</guid>
<pubDate>Wed, 18 Mar 2026 12:50:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Texollini</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79bff9f0919c69c190010fba5ba4a8626f386588edd7ea0b433b10ac0421d9ed</i><br /><br />Threat actor <b>description</b>: <i>Texollini is a textile manufacturer that combines fashion and tec
hnology to create innovative materials and advanced performance t
extiles. They offer a wide range of products including activewear
, athleisure wear, swimwear, and intimate apparel, catering to va
rious markets. 

We will upload 20gb of corporate data soon. Employee passports an
d DLs, medical records, HR forms, financial files, a bit of clien
t files, contracts and agreements, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Interpack-Northwest</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30639</link>
<guid>78d7ed505d7e3ea21b2479fa7c1503d8</guid>
<pubDate>Wed, 18 Mar 2026 00:52:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Interpack-Northwest</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b20578d8429e786c21dbcb320381ee3d44b77d8a3ea94e233fcef25b89447a8e</i><br /><br />Threat actor <b>description</b>: <i>Interpack Northwest Frozen Foods operates from Bainbridge Island, Washington, serving a diverse clientele ranging from small local businesses to large multinational corporations across North America and beyond. The company specializes in supplying frozen fruit, puree, and juice concentrates to various industries, including beverage, bakery, confectionary, jam/preserves, wine, marinades/toppings, snack foods, and dairy & ice cream. Interpack emphasizes the importance of connecting customers with suppliers, fostering open and cooperative communication between buyers and independent packers. This unique approach distinguishes Interpack as a broker in the frozen food market.</i><br />Target victim <b>website</b>: <i>www.interpacknorthwest.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wood-Smith-Henning--Berman-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30638</link>
<guid>71dd874ff78e42aa8050469380bea669</guid>
<pubDate>Wed, 18 Mar 2026 00:17:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Wood-Smith-Henning--Berman-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7236a9591ea9371eaadb1d520788b565115d9e5cc1869344db96fecf75a2c422</i><br /><br />Threat actor <b>description</b>: <i>Wood Smith Henning & Berman (WSHB) is renowned globally for our exceptional trial results and expertis…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fannin-CAD</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30637</link>
<guid>7fbaa471e85a13aada114a4b1065215a</guid>
<pubDate>Tue, 17 Mar 2026 23:01:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>exitium</b> claims attack for <b>Fannin-CAD</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>64535726e90e78c4701a920504fd41f6d5eb30876e5689a3635f17eb0c7be124</i><br /><br />Threat actor <b>description</b>: <i>Zoominfo: https://www.zoominfo.com/pic/fannin-central-appraisal-district/1117264519

Exfiltrated: 400 GB of data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>exitium</category>
</item>
<item xmlns:dc='ns:1'>
<title>---</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30634</link>
<guid>cb4342a6105501a33df7163f7c84bf26</guid>
<pubDate>Tue, 17 Mar 2026 22:38:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>---</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>43af6034fcc0d9a049bc02c8aafa320ac582f3d4c6f1efedec1a6479c8746188</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services · South Carolina, United States</i><br />Target victim <b>website</b>: <i>.</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>brookercg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30633</link>
<guid>4297ef5f39f4aeb86d80ec9744cd2990</guid>
<pubDate>Tue, 17 Mar 2026 20:22:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>brookercg.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8729fb32050ae13dd0a4600831e8dbe8ea22b763c237cc9995517ead36b8154</i><br /><br />Threat actor <b>description</b>: <i>Is a privately held general contracting and construction management company headquartered in Chattanooga, Tennessee, United States. The firm specializes in …</i><br />Target victim <b>website</b>: <i>brookercg.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>briwaycarriers.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30631</link>
<guid>682729665dc6ec09884880147d77fa1f</guid>
<pubDate>Tue, 17 Mar 2026 20:21:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>briwaycarriers.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>39fde2ae15ef2267671cd798178505d84342949c8400b7b8fd33989a1c4557f1</i><br /><br />Threat actor <b>description</b>: <i>Ontario-based transportation company specializing in specialized freight, including a dedicated glass division and agricultural services. They offer global supply chain …</i><br />Target victim <b>website</b>: <i>briwaycarriers.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>mattandsteve.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30630</link>
<guid>d7f79e4ae177cbfeb8cacea78283c327</guid>
<pubDate>Tue, 17 Mar 2026 20:20:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>mattandsteve.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>145a68dc9f492aaea6a90070e3fd324e836091336d62787be34ccc3f4c9c1934</i><br /><br />Threat actor <b>description</b>: <i>Is a Canadian food manufacturer based in Mississauga, Ontario, founded in 2000 by Matthew Larochelle and Steve McVicker. Known for …</i><br />Target victim <b>website</b>: <i>mattandsteve.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eco-Sound-Builders</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30628</link>
<guid>f9148ba9f7fe304fd171caff200636ab</guid>
<pubDate>Tue, 17 Mar 2026 18:52:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Eco-Sound-Builders</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30ea643a6cf676f2b2eb11185aeea0b1c7293033d843adf7bc543db219b38cbe</i><br /><br />Threat actor <b>description</b>: <i>EcoSound Builders, LLC specializes in crafting high-performance custom homes, focusing on both new constructions and renovations to enhance environmental responsibility. With decades of experience and a commitment to quality craftsmanship, they collaborate with clients to create sustainable homes that meet modern standards. Their services include building net-zero homes and historic remodels, utilizing traditional building principles alongside innovative conservation practices. The company aims to deliver exceptional results that ensure long-lasting performance and client satisfaction.</i><br />Target victim <b>website</b>: <i>www.ecosoundbuilders.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>McAfee-Tool--Die</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30627</link>
<guid>a59aff30810b066bbe31d1fae79596af</guid>
<pubDate>Tue, 17 Mar 2026 18:52:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>McAfee-Tool--Die</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eed07bdcf8fe5f43de1a345f2632a8070e1232c51d1bd7025c6188aef251c552</i><br /><br />Threat actor <b>description</b>: <i>McAfee Tool & Die, Inc. is a company specializing in the manufacturing of precision components through tool and die processes. They offer a variety of services including engineering, CNC machining, laser cutting, wire EDM, and stamping production. McAfee values customer relationships and aims to ensure project success through their comprehensive service offerings and technical expertise. Their intended clients are businesses seeking reliable and high-quality manufacturing solutions in various industries.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Teco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30626</link>
<guid>8385583a61497aa5d15857e068482a65</guid>
<pubDate>Tue, 17 Mar 2026 18:51:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Teco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>587bce10a020372f0b3f326e8303471cab5d451fbddadf7e1d2278d94c61b84b</i><br /><br />Threat actor <b>description</b>: <i>Teco HVAC, LLC is a full-service HVAC and plumbing company serving the Baltimore-Washington and Northern Virginia areas. They are dedicated to providing high-quality service and customer satisfaction, specializing in heating, cooling, and plumbing solutions. The company emphasizes quick and reliable service, ensuring that clients receive prompt assistance for their HVAC and plumbing needs. With a commitment to integrity, quality, and trust, Teco HVAC has been a trusted provider in the region since 2002.</i><br />Target victim <b>website</b>: <i>www.teco.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Knights-Site-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30625</link>
<guid>50f0a48e0c1f60f822f218c3e419d1a4</guid>
<pubDate>Tue, 17 Mar 2026 17:15:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Knights-Site-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8286a13e8981198cd7127c0d1530c5ccaef0209bcea25501604621e086140d9d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.knightsservices.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gsolutionz</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30624</link>
<guid>76b71cfebcc527cb7357246d9c4ff726</guid>
<pubDate>Tue, 17 Mar 2026 17:15:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Gsolutionz</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f62e75d49719eadf851a29b276828224d427c9a390cf733606bbcbc53da464ad</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.gsolutionz.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shwapno</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30616</link>
<guid>dd813fde7c3bf5f3b947d7d401d8fba4</guid>
<pubDate>Tue, 17 Mar 2026 16:44:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Shwapno</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d1a8e37ccca847616d9edf14ea8da7908ea9153c05e6d82aff249902b2e3e0de</i><br /><br />Threat actor <b>description</b>: <i>Retail · Pennsylvania</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bonanza-Casino</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30620</link>
<guid>8505785391a374b0d4f3b0e05b8f42c2</guid>
<pubDate>Tue, 17 Mar 2026 15:15:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Bonanza-Casino</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5999725464499d7daf9b58f11f04ca44f5d73b23872c156fd5c2816c49e9e30d</i><br /><br />Threat actor <b>description</b>: <i>Bonanza Casino is a vibrant entertainment venue in Reno that offers gaming, dining, and community-focused events. It features award-winning restaurants such as Cactus Creek Prime Steakhouse and Branding Iron Cafe, serving a variety of cuisines. The casino is dedicated to supporting local initiatives, including scholarships for students and fundraising for prostate cancer research. With a commitment to creating a fun and friendly atmosphere, Bonanza Casino aims to provide exceptional experiences for its guests. 
The company headquarters is located in 4720 North Virginia Street, Reno, Nevada 89506, United States.
51-200 Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>bestgraphics.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30612</link>
<guid>0b90a0b15fcbc6b66311f9ef1fed6c89</guid>
<pubDate>Tue, 17 Mar 2026 14:43:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>bestgraphics.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1299c75726baea0fddf602a4286127856fa4923762b61222c87d1eb855d57e3</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1977, Best Graphics Group offers a full range of equipment for printing, bookbinding, finishing, and packaging</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Solutions-Extreme-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30614</link>
<guid>cd6aef0440b5fb73723ba5d5819a5e84</guid>
<pubDate>Tue, 17 Mar 2026 13:44:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>Solutions-Extreme-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56b79da3e408eca979628b3d7f2820f16dcb23ac9c50481bbc06852d2ae060c6</i><br /><br />Threat actor <b>description</b>: <i>Solutions Extreme is an IT services company that provides cloud computing, managed services, and business continuity solutions to help businesses maintain reliable operations and protect against data loss.</i><br />Target victim <b>website</b>: <i>solutionsextreme.com</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Passaic-County</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30613</link>
<guid>21c6d7a1fc87615fa44ae7657a773566</guid>
<pubDate>Tue, 17 Mar 2026 13:15:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Passaic-County</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d1e4a3652e2f8c67f24e42a6226d970342486c309a99984ed12d0efa9a4ebf21</i><br /><br />Threat actor <b>description</b>: <i>Passaic County was created out of parts of Essex and Bergen Counties with the same legislation that created Atlantic County in 1837. Passaic County borders New York State on the north and is surrounded on the other sides by Sussex, Morris, Essex and Bergen counties in New Jersey. Passaic County has 186 square miles of land area, making it the 18th in size among New Jerseys counties. On the basis of population, it ranks as the 9th most populous county in New Jersey. The 2020 Decennial Census estimated the population of Passaic County to be 524,118. Passaic County is shaped like a bent hourglass with the area above the neck running generally north and south and the portion below, east to west. The upper half of Passaic County is characterized by large lakes and watershed areas with low-density development. The lower half of Passaic County contains more than 85% of the population in a third of the area. Passaic County has 16 municipalities. 
The company headquarters is located in 401 Grand Street, Paterson, NJ 07505, United States.
1K - 5K Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cape-May-County</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30609</link>
<guid>32153e1da6193298c513fbac96c77241</guid>
<pubDate>Tue, 17 Mar 2026 12:15:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Cape-May-County</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18d2701bba4fbc88d2fc95069cde8a7022267af7cb339ab7de817eaa096bc03b</i><br /><br />Threat actor <b>description</b>: <i>Cape May County Government is the official governing body of Cape May County, located in New Jersey. It is responsible for managing public services, infrastructure, and administrative operations for county residents and businesses. The government oversees departments such as public safety, corrections, health and human services, public works, and emergency management. It also manages county facilities, parks, transportation systems, and social service programs. Led by elected commissioners and constitutional officers, the organization works to ensure community development, regulatory compliance, and fiscal responsibility while supporting economic growth, tourism, and quality of life across the county. 
The company headquarters is located in 4 Moore Road, Cape May Court House, New Jersey 08210, USA.
51-200 Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lehigh-Carbon-Community-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30610</link>
<guid>b757aa8b4d5f403e9c6c0a50a8cef71f</guid>
<pubDate>Tue, 17 Mar 2026 12:15:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Lehigh-Carbon-Community-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2e646ed61e4475240413fa306fdff69f262158ad261061ea450fb2f444faa9a9</i><br /><br />Threat actor <b>description</b>: <i>Lehigh Carbon Community College provides affordable, quality education through both online and in-person formats across multiple campuses in Lehigh and Carbon Counties. The college offers over 90 programs, including associate degrees, workforce certificates, ESL, and GED courses, catering to a diverse range of academic and professional goals. LCCC aims to support students in achieving their educational aspirations and career development, with resources for financial aid and transfer opportunities to four-year institutions. The intended clients include local residents seeking higher education, workforce training, and English language learning support. 
The company headquarters is located in 4525 Education Park Drive, Schnecksville, PA 18078, United States.
201-500 Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Noll-and-Tam-Architects</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30605</link>
<guid>eb6ee4b36cdf23e8167e10a47e340fed</guid>
<pubDate>Tue, 17 Mar 2026 00:20:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>termite</b> claims attack for <b>Noll-and-Tam-Architects</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25f2c0bd2cf1d3d7ed8db69a8febe24ad18a4620520f695f6c0d3a13744503a8</i><br /><br />Threat actor <b>description</b>: <i>Noll &amp;amp; Tam Architects specializes in creating innovative architectural designs that serve the common good. Their projects range from community centers and libraries to veterinary hospitals and educational facilities, emphasizing sustainability and empathy in their approach.
</i><br />Target victim <b>website</b>: <i>www.nollandtam.com</i>]]></description>
<category>termite</category>
</item>
<item xmlns:dc='ns:1'>
<title>Von-Weise-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30604</link>
<guid>7c9d8efa5f0fc84385730c20b6a569e3</guid>
<pubDate>Mon, 16 Mar 2026 22:45:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Von-Weise-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87d2375b3ef61098f30654a1eefea2c48e80c887ed57b938a5e4c9c4a4dd7941</i><br /><br />Threat actor <b>description</b>: <i>Architecture, Engineering & Design</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>mcquaidinjurylaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30602</link>
<guid>0c2b52a946ce2657e1af75ee6cb84898</guid>
<pubDate>Mon, 16 Mar 2026 20:35:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>mcquaidinjurylaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b34cc1450e7113ffcae820b6cc079d02618de29f301ce140a32071d2863c71c</i><br /><br />Threat actor <b>description</b>: <i>Get justice with McQuaid Injury Law. No fees until we win your case in Denver and Phoenix. Your recovery is our priority.</i><br />Target victim <b>website</b>: <i>mcquaidinjurylaw.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Singleton-Schreiber</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30601</link>
<guid>755945a59ff256394631b079277ab8bc</guid>
<pubDate>Mon, 16 Mar 2026 20:23:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Singleton-Schreiber</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b940c44632001ca07e40f31255cc39e588b8b536afe6c31b0d71d71555a205e</i><br /><br />Threat actor <b>description</b>: <i>This page contains attorney advertising. Singleton Schreiber fight for regular people who have been ha…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>PINNACLE-TAX-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30599</link>
<guid>33bd495470ddcf80911ca403ad6e3dd6</guid>
<pubDate>Mon, 16 Mar 2026 18:42:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>PINNACLE-TAX-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0571800ff07fa7a43eb3a07e4118e2b137ae0f06c1e2779b4d0d79ffba6cd2d6</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>frazercenter.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30600</link>
<guid>8cbf1695be0572428dbb70f41f833783</guid>
<pubDate>Mon, 16 Mar 2026 17:34:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>frazercenter.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d83e495608c012f41044bd8384f0f8ab05aa8cead5964d26efc013135a5940d7</i><br /><br />Threat actor <b>description</b>: <i>Frazer Center is a non-profit organization dedicated to supporting children and adults with developmental disabilities. Their services include a Child Development Program for children aged six weeks to five years and an Adult Program that offers individualized programming for those with intellectual disabilities. The center aims to foster learning, social opportunities, and lasting friendships for all participants. Located in Atlanta, Georgia, they welcome donations and volunteers to support their mission. Employees: 200 Revenue: $9.7 Million Industry: Education Phone Number: (404) 377-3836</i><br />Target victim <b>website</b>: <i>frazercenter.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tax--Accounting-Plus</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30597</link>
<guid>ca66c4195dbebc6f59ceaf0e10629664</guid>
<pubDate>Mon, 16 Mar 2026 16:41:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Tax--Accounting-Plus</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06c17539dc84e724aac925aee9e86450cf09c01d53b5f7f256396b12cfb0558e</i><br /><br />Threat actor <b>description</b>: <i>Tax & Accounting Plus, Inc. offers a range of personal and professional tax and accounting services with a focus on a low-pressureapproach. The firm prides itself on its high client-retention rate and the quality of its services. They provide various resources, including financial calculators and tax-related guides, to assist clients.We will upload 85gb of corporate data soon. Great amount of clients' and employees personal documents (scanned passports, DLs, SSNs, medical records and so on), contracts and agreements, detailedfinancials, NDAs, partners files and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Steve-Quick-Jeweler</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30598</link>
<guid>6fb41c898918ad5a0df0e50f3790f057</guid>
<pubDate>Mon, 16 Mar 2026 15:53:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Steve-Quick-Jeweler</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4901b95cd99de9bdc0cf4772fa04896b65f7c99fb77e909e2fe9e465c5045867</i><br /><br />Threat actor <b>description</b>: <i>Steve Quick Jeweler is a Chicagoland-based jeweler that has been 
offering unique, handcrafted jewelry since 1986. They specialize 
in engagement rings, wedding bands, and a variety of other jewelr
y pieces, ensuring a personalized shopping experience for their c
ustomers.

We will upload corporate data soon. HR files, financials, client 
files, contracts, NDAs, partners files and and other business fil
es.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Broadway-National</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30596</link>
<guid>ad627bf5fd6966693e97a7349d85589c</guid>
<pubDate>Mon, 16 Mar 2026 14:28:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Broadway-National</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3abd4056a95099c133eef345c8285d520815a2785779b6a79386cdb982b9ffc</i><br /><br />Threat actor <b>description</b>: <i>Broadway National is a service provider for big box retailers, re
staurants, and bank industries. They are located in Hauppauge, Ne
w York.

We will upload corporate data soon. Lots of HR files and employee
information, clients information, financials, contracts and agre
ements, drawings, projects, NDA and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Caribbean-Medical-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30594</link>
<guid>397dcbbb8a93272b66300d4126b4f9e9</guid>
<pubDate>Mon, 16 Mar 2026 13:51:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Caribbean-Medical-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8c9a5a9492689d5c941eaf9700c6d0ace84353458a665a06fc2a4e3fb47ecba4</i><br /><br />Threat actor <b>description</b>: <i>www.caribbeanmedicalcenter.com https://www.zoominfo.com/c/caribbean-medical-center/402918703 Hospital Caribbean Medical Center provides emergency services and inpatient care, catering to pediatric, adult, and geriatric patients. The emergency room operates 24/7, ensuring continuous medical coverage tailored to patient needs. The facility offers a range of specialized services, including internal medicine, infectious diseases, cardiology, radiology, obstetrics and gynecology, pediatrics, and surgery. With a commitment to exceptional medical care, the center emphasizes quality and patient satisfaction. Last chance before full data disclosure.</i><br />Target victim <b>website</b>: <i>www.caribbeanmedicalcenter.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ruhnau-Clarke</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30584</link>
<guid>d82815d548d98ff14d95120eef2e6a3c</guid>
<pubDate>Mon, 16 Mar 2026 12:43:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Ruhnau-Clarke</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0217f5a553aea8d9be74861a7fdf8c1e355cad585f6403f1c5dc9206cadb4d34</i><br /><br />Threat actor <b>description</b>: <i>Architecture, Engineering & Design</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Executive-Aviation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30580</link>
<guid>607f81b73375b618f549c6c8692c4e88</guid>
<pubDate>Sun, 15 Mar 2026 19:42:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Executive-Aviation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6bf2e67debe69ea0fd56369a8484ccd2a6a9f94430fb3d12a2318a318d2d8e2b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.executive-aviation.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Evaluate-a-Norstella-company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30579</link>
<guid>918b71f2ac42210cfae2f82b777c1f27</guid>
<pubDate>Sun, 15 Mar 2026 17:38:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Evaluate-a-Norstella-company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eabfcd23ddc593be0b325a5f9dcd77c2faeffcbdf62ca35396b752c46d2445fe</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aura-Group-Inc.-aura.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30575</link>
<guid>315b1acf4b02f647bee12e61eff66c05</guid>
<pubDate>Sun, 15 Mar 2026 09:23:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Aura-Group-Inc.-aura.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9acf2951eede900647585302cc52f20deb9d13898cecd9a873d2825fe3b0280</i><br /><br />Threat actor <b>description</b>: <i>Over 2M records containing PII and other internal corporate data have been compromised. The company failed to reach an agreement with us despite all the chances and offers we made. They don't care. | Size: 12GB (compressed) | Updated: 15 Mar 2026 | SHA256: 0d5bf85c7865b023266adc95a7449dd1bff6b208b4634976441ce5ee650894d0</i><br />Target victim <b>website</b>: <i>aura.com</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Private-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30574</link>
<guid>7c693e489c92c0c82ad4c5c7dca411d8</guid>
<pubDate>Sun, 15 Mar 2026 09:19:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Private-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33468a5250d150b38d4e854ac817d4ecfd11a4712c1fc2b29860d27517432d58</i><br /><br />Threat actor <b>description</b>: <i>New Jersey Private University</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>ILLUMINA---Data-uploaded</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30572</link>
<guid>cb1e16cc03588ff5bf4dd506f5f54cc1</guid>
<pubDate>Sun, 15 Mar 2026 02:10:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>ILLUMINA---Data-uploaded</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca857a883b709b838aae161dedb8029e3e03021880eb9d932152f5b659d1fe7f</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Illumina Inc. is a leading global genomics company, focused on the development of innovative sequencing and array technologies. With their high-throughput sequencing and genotyping services, Illumina enables researchers from various fields to understand genetic variation and function effectively. The data uploaded by the company relates to these genetic studies and research outcomes.</i><br />Target victim <b>website</b>: <i>illumina.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Augenomics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30570</link>
<guid>e265b71426b39bb25ccf6eca0a578a03</guid>
<pubDate>Sun, 15 Mar 2026 02:08:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Augenomics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04643f8200728f2ef2f811142d256dce287dfa02154a762687baf0f1d93b8a39</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "Augenomics" is a pioneering healthcare technology company. It uses Artificial Intelligence (AI) and genomics to transform how diseases are diagnosed and managed. Its advanced predictive models disentangle complex bio-information, enabling personalized therapeutic strategies and improving patient outcomes.</i><br />Target victim <b>website</b>: <i>autogenomics.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>nChroma-Bio</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30569</link>
<guid>2c61f304e5c71379e0af1cd15197a96e</guid>
<pubDate>Sun, 15 Mar 2026 02:08:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>nChroma-Bio</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d0c15096c0b94697242500c3957a2e7a61b042b69967c56bd39a57824af675c5</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] nChroma Bio is a biotechnology company that specializes in metabolomics and synthetic biology. They use innovative technology to engineer microbes for the production of valuable chemical products in various markets, such as pharmaceuticals, food additives, and biofuels. Their goal is to develop sustainable, cost-effective methods to produce these chemicals, while minimizing environmental impact.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Geno-Bank</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30568</link>
<guid>7f29f58980570546b1ae814455bdcc31</guid>
<pubDate>Sun, 15 Mar 2026 02:08:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Geno-Bank</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a064abb4632bae4d9e80c4ebd72742f2474418d03375776b78c323e5032eed1</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] GenoBank.io is a company that provides a secure platform for DNA data storage and transfer, prioritizing privacy and user control. Their blockchain-based system aims to build trust among customers while enabling them to access personalized medical, ancestry, or lifestyle recommendations.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Neochromosome</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30567</link>
<guid>fa1dcf25e93feabd8335f5d20bff7172</guid>
<pubDate>Sun, 15 Mar 2026 02:07:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Neochromosome</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a87d933e448bc36888ed28e5471c16088d4945a182f2b5b1a773793653556f11</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Neochromosome is a bio-tech startup and a synthetic biology company based in San Francisco, California. Their primary focus is on designing and constructing synthetic chromosomes, which could find applications in various industries. The company utilizes machine learning to design synthetic chromosomes, with a vision of building transformative synthetic biology systems that can solve global challenges.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tyler-Media</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30558</link>
<guid>cfc654d4f929d2d23ed18e061daa90f6</guid>
<pubDate>Sat, 14 Mar 2026 20:37:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payload</b> claims attack for <b>Tyler-Media</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>50a31d664d3f187058a309f30abd3ad476fab4a0f920a357d87f3398352c9cad</i><br /><br />Threat actor <b>description</b>: <i>Tyler Media is a comprehensive media company in Oklahoma, offering a variety of services that include radio, television, and outdoor advertising. With several radio stations and partnerships with prominent television networks, they cater to a diverse audience, showcasing both English and Spanish content. Their key clients range from local businesses to larger organizations seeking effective marketing solutions and brand awareness.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>payload</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trinity-Catholic-High-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30554</link>
<guid>f811fcdc741bd7a5403aabf55e041d1e</guid>
<pubDate>Sat, 14 Mar 2026 12:31:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Trinity-Catholic-High-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f8297b112c2039d1401101ea7abd59b3cd8da3c0962830d61626816c710f010</i><br /><br />Threat actor <b>description</b>: <i>Trinity Catholic High School offers a full array of co-curricular activities and sports programs. Our athletic programs include football, cheerleading, cross country, golf, swimming, tennis, weight lifting, basketball, volleyball, baseball, bowling, girls flag football, softball, lacrosse and track and field. Our State Championships include: football, women's soccer, baseball, wrestling and track.</i><br />Target victim <b>website</b>: <i>www.trinitycatholichs.org</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mid-America-Export-Experts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30551</link>
<guid>614a24f6c582e220ada177041bab94fa</guid>
<pubDate>Sat, 14 Mar 2026 07:13:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>Mid-America-Export-Experts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f639355b8c09bca4a9a7f7f1bf8dd9d6cac102db7fd0875f9257967ce9d24aa</i><br /><br />Threat actor <b>description</b>: <i>Mid-America experts is an organizations that provide support to organizations exporting goods in the MidWest USA. They work with many transportation and logistics providers with strong presence in the Midwest.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>Duffys-Sports-Grill</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30548</link>
<guid>a2cb4cbee5d6634c4c73ab1e333b3772</guid>
<pubDate>Sat, 14 Mar 2026 06:41:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Duffys-Sports-Grill</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0eb139b2cfa9495c86fa4b6739326886960d5cf154c4bd0e8da8e4860f48fc3c</i><br /><br />Threat actor <b>description</b>: <i>Hospitality</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.integer.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30546</link>
<guid>37107d39373c202221d6672722f514cf</guid>
<pubDate>Fri, 13 Mar 2026 18:41:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>www.integer.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>359c1ca3d8da0d76def414fe87ef158a6308181b9a5c8640d9be16b7c01c9197</i><br /><br />Threat actor <b>description</b>: <i>Integer® Holdings Corporation (NYSE:ITGR) is one of the largest medical device outsource (MDO) manufacturers in the world serving the cardiac, neuromodulation, vascular and portable medical markets. The company provides innovative, high-quality technologies and manufacturing to Medical Device OEMs to enhance the lives of patients worldwide. In addition, it develops batteries for high-end niche applications in energy, military, and environmental markets. Greatbatch Medical®, Lake Region Medical® and Electrochem® comprise the companys brands. Our story is one filled with 80 years of industry-changing innovations and exemplary manufacturing. Its a legacy we are proud of as we continue to provide customers with unparalleled expertise, innovation and manufacturing excellence. We are guided by our values of Innovation, Collaboration, Inclusion, Candor, Integrity and Customer.</i><br />Target victim <b>website</b>: <i>www.integer.net</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>KLA-Laboratories</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30544</link>
<guid>9fee6abfcc2bc7fed8f66f3fbb5c4d07</guid>
<pubDate>Fri, 13 Mar 2026 18:32:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>KLA-Laboratories</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>55a6f72d76cb8ea83d6d28dedcd83df98007735502a572326b3c832a9f7a155c</i><br /><br />Threat actor <b>description</b>: <i>How a single data breach exposed contracts, credentials, and critical infrastructure details.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alarmco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30539</link>
<guid>5b16eb4fe129666677e683ee4594ae38</guid>
<pubDate>Fri, 13 Mar 2026 16:41:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Alarmco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5d370491bc1dcb8972581bc6f95bf3c37a93b3bd1e9a4e8acbfed76f9d2a6ec1</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>FMRS-Health-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30541</link>
<guid>43900cc8434685fe6937a619d4246be5</guid>
<pubDate>Fri, 13 Mar 2026 15:43:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>FMRS-Health-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79f1d33ddba61746cfb065ad15b1ffb03728227c5f927a42e4d90a4207780c3e</i><br /><br />Threat actor <b>description</b>: <i>0</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wills-Point-Chevrolet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30542</link>
<guid>79c512312810d47d64a72e7b7a97789d</guid>
<pubDate>Fri, 13 Mar 2026 15:33:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Wills-Point-Chevrolet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>192b6efa29b6ea016dc782ac337a473f6620b0fc751060291557576b9c4fc056</i><br /><br />Threat actor <b>description</b>: <i>Wills Point Chevrolet is a dealership located in Wills Point, Tex
as, serving clients from Forney, Mineola, and Terrell. They offer
a wide selection of new and pre-owned Chevrolet vehicles, includ
ing electric models, along with financing options and certified s
ervice.

We will upload corporate data soon. Lots of scanned personal empl
oyee docs (passports, Dls, w9 forms, bank statements and other do
cs), financials, various agreements and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Millard-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30538</link>
<guid>a768922976dd05cd372dde028932ad91</guid>
<pubDate>Fri, 13 Mar 2026 14:44:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Millard-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4aa728b5a1fe4e0e335f70fc3e7e0fc3dd5d5610b686f52b5a152ec5041c5c89</i><br /><br />Threat actor <b>description</b>: <i>Industrial Machinery & Equipment</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>atrium.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30514</link>
<guid>a874ab8ce08044d1637a5be4d8b096f9</guid>
<pubDate>Fri, 13 Mar 2026 12:23:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>atrium.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>112c5aaf49f99fe43b218c6ac69442bba65a2bd9297dc94f7a568416a99a1ab0</i><br /><br />Threat actor <b>description</b>: <i>Since 1946 Atrium Windows and Doors has produced tens of millions of exceptional products throughout...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>elmwoodhomecare.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30523</link>
<guid>d613ca9ece1fec54ec026f15b9a000b2</guid>
<pubDate>Fri, 13 Mar 2026 12:23:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>elmwoodhomecare.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>256a713791974a49b36a44d270ce06a23953f64741b2749488191da338964f7b</i><br /><br />Threat actor <b>description</b>: <i>Elmwood Healthcare is a Medicare certified, nationally accredited home-based care organization opera...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>townoforangeva.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30524</link>
<guid>a1d053a71264ae005d047b2a7a14efae</guid>
<pubDate>Fri, 13 Mar 2026 12:23:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>townoforangeva.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c4eb6145323f2c0b251905af17105fca1094fa29447052309d8c6927f75132f1</i><br /><br />Threat actor <b>description</b>: <i>The Town of Orange, Virginia, is the seat of Orange County and serves as its business center, offeri...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>pkmsteel.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30525</link>
<guid>fffe9f664c2ddba4a37bcd35936c7422</guid>
<pubDate>Fri, 13 Mar 2026 12:23:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>pkmsteel.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8844b019d4087ef69ade8ba32dd1d9e2b729ae0c150fcd97062cefd023ed2173</i><br /><br />Threat actor <b>description</b>: <i>PKM Steel Service, Inc. is a global producer of heavy and intermediate structural steel, specializin...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>ikron.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30528</link>
<guid>bf3b50067c565f050a653d29f443ccf8</guid>
<pubDate>Fri, 13 Mar 2026 12:23:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>ikron.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>59282675a21e94050465255fb0261dd221490de9a873b93e8077699b1bb12034</i><br /><br />Threat actor <b>description</b>: <i>IKRON (Integration of Knowledge and Resources for Occupational Needs) was founded in 1969 as the Uni...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>webster-schools.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30529</link>
<guid>402b557b7f364abc0ac961e1dda262cd</guid>
<pubDate>Fri, 13 Mar 2026 12:23:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>webster-schools.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0461e6b7ff6a933585fd2f66ef1d3df20dca36d3e187ff6829d637f46158cb5</i><br /><br />Threat actor <b>description</b>: <i>Webster Public Schools is a company that employs 250 to 499 people and has 10M to 25M of revenue. Th...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>alcornschools.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30533</link>
<guid>f624e6558a372d9cdd49406b1a8eaf6c</guid>
<pubDate>Fri, 13 Mar 2026 12:23:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>alcornschools.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>35488276366e54b2547b654e9e4eb1ab30f542de033089126a84c4067a2afb96</i><br /><br />Threat actor <b>description</b>: <i>Alcorn School District is dedicated to fostering a safe and positive learning environment that promo...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>frasierlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30534</link>
<guid>cb6e4ab9086bdc74d116e31e79f4eb9c</guid>
<pubDate>Fri, 13 Mar 2026 12:23:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>frasierlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45f4a0b8555f1b22619f125488d97825ca67e4bceb6ea4af722764fa448b6035</i><br /><br />Threat actor <b>description</b>: <i>Frasier, Frasier & Hickman, LLP is a law firm based in Tulsa, Oklahoma, founded in 1952, dedicated t...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>cognitivehealthit.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30535</link>
<guid>97beec5643d7199a4c74875b33aebb31</guid>
<pubDate>Fri, 13 Mar 2026 12:23:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>cognitivehealthit.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>468012d919ea1beee04417aecfad9a5027b00c00012294ad726048c04634ccaf</i><br /><br />Threat actor <b>description</b>: <i>CognitiveHealth Technologies develops and deploys iCAN, a platform purpose-built for healthcare by e...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>phoenixlabs.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30511</link>
<guid>febb75eccd1101d84a2aa5eb87859ce0</guid>
<pubDate>Fri, 13 Mar 2026 09:43:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>phoenixlabs.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8b5fd9c73dfde116c7380847cdb59ae958d3066c3a8129e443ac392bd36ff03</i><br /><br />Threat actor <b>description</b>: <i>Phoenix Environmental Laboratories specializes in high-quality analysis of soil, water, air, sediment, and solids, complying with EPA, state environmental prote...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>St-Fabian-Catholic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30505</link>
<guid>0b5f533ccd0dc1c08ef24364cc70a0eb</guid>
<pubDate>Thu, 12 Mar 2026 22:12:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>St-Fabian-Catholic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>003f643d38645ed0e5016a899d37e08354173cd06c83f8b9b1e72c6ae48a8600</i><br /><br />Threat actor <b>description</b>: <i>stfabian.org zoominfo.com/c/st-fabian-catholic-church--school/152879338 St. Fabian Catholic Church and School in Farmington Hills, MI offers a range of religious services and educational programs. Their services include various sacraments such as Baptism, Confirmation, and Eucharist, along with community involvement through worship and youth ministries. They aim to provide a welcoming environment for parishioners and students, encouraging participation and growth within the church community. The intended clients are families and individuals seeking spiritual guidance and quality education in a Catholic setting</i><br />Target victim <b>website</b>: <i>stfabian.org</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Syed-Professional-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30503</link>
<guid>b899aa15c56fee62bcea0903b59b18fe</guid>
<pubDate>Thu, 12 Mar 2026 19:42:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Syed-Professional-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9d49ef60e21345b3bd8ee9e26e94217633e49b8b03cc3dd3c486244f2a9707e0</i><br /><br />Threat actor <b>description</b>: <i>Accounting Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>TDS-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30496</link>
<guid>471c96afb06d58297ee23ae23d6e18fd</guid>
<pubDate>Thu, 12 Mar 2026 18:41:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>TDS-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>532c89a63d51280f5a87960c30336e10cd0e49bdcb74487dc8702dd2e7b52a00</i><br /><br />Threat actor <b>description</b>: <i>Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Silvon-Software</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30497</link>
<guid>c74305e736bb51926e0f568d7ae72545</guid>
<pubDate>Thu, 12 Mar 2026 18:41:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Silvon-Software</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d3c855d61517fcb002278eae616279238fab74b16aeec71e387e9d1a9b3ec47</i><br /><br />Threat actor <b>description</b>: <i>Software</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Financial-Brokerage</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30498</link>
<guid>4504a21322621ea6e8b2af2f6564e81a</guid>
<pubDate>Thu, 12 Mar 2026 17:43:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Financial-Brokerage</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>343bd753ed7eaccbd9dc6cddf0b7b4854bd5bf3308834c597a264c0d8d2bf8de</i><br /><br />Threat actor <b>description</b>: <i>Financial Brokerage Inc. collaborates with top insurance carriersto provide a variety of financial products including Life Insurance, Fixed Annuities, Long Term Care, Disability Insurance, and Medicare Supplement plans. The company targets insurance agents and brokers looking to enhance their product offerings and client services.We will upload corporate data soon. Employee personal documents, detailed personal information of hundreds clients and companies, confidential financial and other docs of their clients, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Circle-Floors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30501</link>
<guid>443fbc49b4ab9988d64065d7e2fddf1a</guid>
<pubDate>Thu, 12 Mar 2026 17:37:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Circle-Floors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>61a8156bebfbfa3aebd12587e2888f66a2fc0e9e96483e78d27a5b82f58a39f0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.circlefloors.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eagle-Industrial-Equipment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30500</link>
<guid>62081c7c52ec30c556d6c558896983ee</guid>
<pubDate>Thu, 12 Mar 2026 17:36:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Eagle-Industrial-Equipment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>839bd68be43e55185e6cb3e721c003a1a48cbfc669cb2b92052ec4b890572968</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.eagleie.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>flad.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30499</link>
<guid>2a305437dff38f3b83f52900567a91ed</guid>
<pubDate>Thu, 12 Mar 2026 16:52:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>flad.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>08514bbcb9cf27a3d86fe1eadeeadbdb15a133f991b4eb38fbe081c99d318fc1</i><br /><br />Threat actor <b>description</b>: <i>We are announcing a major security breach and data exfiltration from Flad Architects, a leading national firm specializing in high-stakes science and technology infrastructure.

Total volume of exfiltrated data: Over 2.2 TB

The leaked archive includes critical and sensitive information across the f…</i><br />Target victim <b>website</b>: <i>flad.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Extreme-Trailers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30493</link>
<guid>7dd9884b559f0344c9254ce81e001ae4</guid>
<pubDate>Thu, 12 Mar 2026 16:42:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Extreme-Trailers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>92f8c0b68a12d970b45e10075941cae07af589ed1768a717c4e367db492107f4</i><br /><br />Threat actor <b>description</b>: <i>Extreme Trailers, LLC is located in Dover, Ohio and is a leader in innovative design and high-quality manufacturing of equipment for the flatbed trailer market. Established in 2016 in Dover, Ohio, the company manufactures a diverse range of products, including: an innovative, patent-pending design trademarked as the X-Lite flatbed trailer, aluminum drop deck trailers, aluminum and customdesigns.We will upload 15gb of corporate data soon. Lots of employee scanned docs (passports, DLs, SSNs, w9, i9 forms, medical informationfor a few dozens of people), project docs contracts and agreements, a bit of client information and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>University-of-Mississippi-Medical-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30489</link>
<guid>c70370bf064170a05f1e3e95de3ea26f</guid>
<pubDate>Thu, 12 Mar 2026 13:47:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>University-of-Mississippi-Medical-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>44e2201930adb20609e3ffda2b5f2329bd55a1c26c9bcced9aab8b8b92778d93</i><br /><br />Threat actor <b>description</b>: <i>The University of Mississippi School of Medicine (UMSOM) is the medical school of the University of Mississippi in the U.S. state of Mississippi. The UMSOM was created in 1903 on the Oxford campus. In 1955, it was moved from the Oxford campus to the state capital of Jackson and was expanded to include the third and fourth years of training. The University of Mississippi Medical Center, the health sciences campus of the University of Mississippi, houses the School of Medicine. As of 2006, there were 413 students enrolled in UMSOM. This includes students enrolled in the four-year M.D. program as well as students enrolled in the seven-year M.D./Ph.D program. 
The company headquarters is located in 2500 North State Street, Jackson, Mississippi 39216, United States.
5K - 10K Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>AbelZeta</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30483</link>
<guid>fb22fb2b63ebd0f8261cbfc4809cd152</guid>
<pubDate>Thu, 12 Mar 2026 06:40:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>AbelZeta</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1edf494474fe46deb447c53a7ad8366577116bbce030c4d8164e610f2e4bef2</i><br /><br />Threat actor <b>description</b>: <i>AbelZeta Pharma is a global cell therapy leader focused on discovering, developing and manufacturing therapeutics to address unmet medical needs across hematologic malignancies, inflammatory and immunological diseases and solid tumors.Partners: AstraZeneca, Janssen (J&J), NovartisInvestors: HSG, Yunfeng Capital, GIC, TF Capital, CICC Capital, Sailing Capital, Dangdai Group, AstraZeneca-CICC Fund170,000+ different files670+ separate archives with experiments on various candidates All studies: CAR032, CAR39, CAR66, CAR168, TIL, CD, Tcell, etc. There are a huge number of files and studies, all of which are confidential and valuable for competitive research. https://www.abelzeta.com/</i><br />Target victim <b>website</b>: <i>www.abelzeta.com</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aura-Group-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30481</link>
<guid>1e3e117ae63d39e67bf9f008bb122a6f</guid>
<pubDate>Thu, 12 Mar 2026 00:04:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Aura-Group-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e67b8183d1d242c21e6a5127f7cb29bf5f2b2189f7f5e2b895194096f2c1b649</i><br /><br />Threat actor <b>description</b>: <i>Over 2M records containing PII and other internal corporate data have been compromised. This is a final warning to reach out by 14 Mar 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 12 Mar 2026 | Warning: FINAL WARNING</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stryker-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30476</link>
<guid>b53c87a7be4dc51411e59867566d1c71</guid>
<pubDate>Wed, 11 Mar 2026 20:14:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>handala</b> claims attack for <b>Stryker-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>296488dac801eef2ae9269afa8e5636669d1e233dc904e3550bb336fa2b10326</i><br /><br />Threat actor <b>description</b>: <i>We announce to the world that, in retaliation for the brutal attack on the Minab school and in response to ongoing cyber assaults against the infrastructure of the Axis of Resistance, our major cyber operation has been executed with complete success. The Zionist-rooted corporation, Stryker, one of the key arms of the global Zionist lobby…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>handala</category>
</item>
<item xmlns:dc='ns:1'>
<title>Staples</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30472</link>
<guid>4da79a45c5e5c96760be4d8673c0aefd</guid>
<pubDate>Wed, 11 Mar 2026 20:07:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Staples</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1de5ba03534447e8a59e611aed4c9614517a1c1180602f542a561a77d8084b1</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Staples, Inc. is an American office retail company primarily involved in the sale of office supplies and related products through retail channels and business-to-business (B2B) oriented delivery operations. Its offerings include promo products, IT consulting, office furniture, printing services, and more. Its headquarters are located in Framingham, Massachusetts.</i><br />Target victim <b>website</b>: <i>staples.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>JJR-Engineering--Fabrication</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30470</link>
<guid>bd50f363001990ee1fe5d798702b1d5b</guid>
<pubDate>Wed, 11 Mar 2026 19:13:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>JJR-Engineering--Fabrication</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3128f2d652e8e052a58d3e66b8e92d00ffb38db766126883339a7eea922a7506</i><br /><br />Threat actor <b>description</b>: <i>Data is not available now.</i><br />Target victim <b>website</b>: <i>jjrfabrication.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alef-Realty-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30467</link>
<guid>41ba1eaf157e7afc806e65229667f255</guid>
<pubDate>Wed, 11 Mar 2026 18:39:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Alef-Realty-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f90248044925a407c97255357fce472130d5f32f06ea6ab00b3fff373c967c1</i><br /><br />Threat actor <b>description</b>: <i>Real Estate</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>seclore.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30469</link>
<guid>08d18210f962e39780ba7f1e45d51c7c</guid>
<pubDate>Wed, 11 Mar 2026 18:37:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>seclore.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>01cce3c4f872b727815d3fb7811cffff63f2943eafd57ac7d13503b99713fc94</i><br /><br />Threat actor <b>description</b>: <i>At Seclore, we believe that cybersecurity should revolve around what matters most—your data. Traditional security perimeters are no longer enough in today’s hyp... - TOTAL QUANTITY 1.3 TB


</i><br />Target victim <b>website</b>: <i>seclore.com</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>D3-Embedded</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30468</link>
<guid>e3ccd20199b9c2d6faa5eb83259a84cd</guid>
<pubDate>Wed, 11 Mar 2026 17:41:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>D3-Embedded</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>03827ce1289e79dd34ecc22cb2692a6b093a3e62b788a649b9add679b326c7b1</i><br /><br />Threat actor <b>description</b>: <i>D3 Embedded is a U.S.-based company specializing in the development of end-to-end solutions for performance-critical embedded systems, integrating sensors, connectivity, embedded processing, and AI. Their product offerings include camera modules, radar sensors, and various boards and cards designed for applications in robotics and autonomous machines.We will upload 415gb of corporate data soon. Lots of projects andrelated documents, agreements, licenses and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Big-Brothers-Big-Sisters</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30466</link>
<guid>1895037c0fa55110b0e0e20d2e68a0d7</guid>
<pubDate>Wed, 11 Mar 2026 16:21:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Big-Brothers-Big-Sisters</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9fff70d0f75bf9cdcd95890cac0698a46629ebb23c0860903896231001957b10</i><br /><br />Threat actor <b>description</b>: <i>- Students List- Background Check Records- Internal Documents</i><br />Target victim <b>website</b>: <i>www.bbbs.org</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chartre-Consulting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30445</link>
<guid>e642e53491d96d64124a4d5800c43b5f</guid>
<pubDate>Wed, 11 Mar 2026 16:18:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Chartre-Consulting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>61ea572407f71f9fb8dd5aa95e8a5090293649ed5a742fb02686c9fcf618edf6</i><br /><br />Threat actor <b>description</b>: <i>Chartre Consulting is a U.S.–based professional services and management consulting company headquartered in Oxford, Mississippi. Founded in the early 1990s, the firm operates within the business services sector and provides consultancy related to corporate management, development projects, and real-estate-related activities. The company advises organizations on operational planning, project development, and business improvement while also being connected to construction and property development work, including commercial and residential projects. Chartre Consulting serves private clients and businesses seeking guidance on management decisions, organizational strategy, and development initiatives. The company is privately owned and employs a small-to-mid-sized workforce, generating multi-million-dollar annual revenue from its consulting and development services. 
The company headquarters is located in 2330 University Ave, Suite C, Oxford, MS 38655, United States.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>ToolpartsPro</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30446</link>
<guid>f26b5ed6b73a60f4883462d0e2779207</guid>
<pubDate>Wed, 11 Mar 2026 16:18:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>ToolpartsPro</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>94ea6afa45ec822d0a39e96229f19657c3d4f5150b8be7733248ec7b124f1241</i><br /><br />Threat actor <b>description</b>: <i>ToolpartsPro specializes in providing a vast inventory of genuine OEM power tool parts, replacement parts, and accessories for various brands including DeWalt, Makita, and Milwaukee. The company caters to both DIY enthusiasts and professional tradesmen, ensuring they have access to high-quality parts at competitive prices. With a commitment to customer satisfaction, ToolpartsPro offers expert diagnosis and repair services for faulty tools. Their user-friendly online platform enhances the shopping experience, featuring a comprehensive parts finder and regular promotions. 
The company headquarters is located in 2117 Industrial Ct, Vista, CA 92081-7957, United States.
51-200 Employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Internation-Planning-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30448</link>
<guid>72215f7896ee90dfda83e7803a3c08db</guid>
<pubDate>Wed, 11 Mar 2026 16:18:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Internation-Planning-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d5b1207cf9ff21a782f78badcc5c58289d9ff5ec8ee8b0ff8d17f350da027a70</i><br /><br />Threat actor <b>description</b>: <i>IPG has served clients residing in multiple Asian countries including China, Guam, Hong Kong, Indonesia, Japan, Macau, Malaysia, Singapore, Taiwan, Thailand and Vietnam, for over 10 years. International Planning Group Ltd is a registered member of the Hong Kong Confederation of Insurance Brokers. IPG Financial Services, PTE, located in Singapore (a subsidiary of International Planning Group, Ltd.) is licensed under the Financial Advisers' Act and regulated by the Monetary Authority of Singapore. IPG Asia has developed strategic partnerships with local and global private banks to assist in providing their clients with appropriate wealth structuring and transfer planning strategies and solutions. With over 40 employees operating out of the company's Singapore and Hong Kong offices, IPG has 10 local, highly trained and professional sales producers, support staff including field underwriting personnel and product specialists and local senior management to oversee the company's Asia operations. IPG has placed more than $9 billion of life insurance coverage in Asia and has more than 450 clients residing in the region. Because IPG has several years experience in the market, fully staffed regional offices and the support of the Home office in Boston Massachusetts, the company understands the tax and regulatory environment for each individual jurisdiction in which the company operates. As such, the company has developed specific strategies to meet the needs of the company's Asian clients, provide access to the world's life insurance capacity through IPG's open architecture philosophy and operate under strict protocols to provide best in class access to life insurance solutions for the high net worth market. 
The company headquarters is located in 62 Walnut Street, First Floor, Wellesley, MA 02481, United States.
201-500 Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shaft-Drillers-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30449</link>
<guid>e9433fc14b27c2c907dad393b9c2626d</guid>
<pubDate>Wed, 11 Mar 2026 16:18:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Shaft-Drillers-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7239c5201aafb8396cd2dc97b6203bd05bdedd7dd7afe3f9011267e637f66c0d</i><br /><br />Threat actor <b>description</b>: <i>Shaft Drillers International is a U.S.-based construction and drilling services company headquartered in Mt. Morris, Pennsylvania. It is a leader in specialized geotechnical construction, large-diameter shaft drilling, and complex infrastructure projects, offering solutions in ground stabilization, deep foundations, dam construction and rehabilitation, and water resource development. The company operates through a network of subsidiaries that provide a broad range of services including drilling, earthwork, structural support systems, soil stabilization, and well services. Known for innovative technology and experienced teams, Shaft Drillers International serves civil, mining, energy, and industrial sectors with durable, cost-effective construction solutions. 
The company headquarters is located in 130 Meadow Ridge Road, Mount Morris, PA 15349, United States.
501-1,000 Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Acme</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30450</link>
<guid>e9b0945085eb3961bc04529c0f09e15c</guid>
<pubDate>Wed, 11 Mar 2026 16:18:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Acme</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af3e60ed56a23255e0f11e8ab76544255a77fb74ba9a0f036053c0a40291de8e</i><br /><br />Threat actor <b>description</b>: <i>Acme Truck Line, Inc. (from www.acmetruck.com) is a U.S. transportation and freight carrier specializing in hauling equipment, materials, and supplies across the country. Founded in 1960, this employee-owned trucking company serves a wide range of industries — especially the oil and gas sector — with services including expedited freight, heavy haul, drive-away, 3PL logistics, and more. Its fleet operates more than 1,500 trucks across 40 service markets in over 15 states, running 24/7 to ensure safe, on-time deliveries. Acme emphasizes safety, integrity, and personalized customer service through its full-service terminals and certified drivers. 
The company headquarters is located in 200 Westbank Expressway, Gretna, Louisiana 70053, United States.
1K - 5K Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Frauenshuh</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30451</link>
<guid>3af7e700968700884b9da655b280a267</guid>
<pubDate>Wed, 11 Mar 2026 16:18:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Frauenshuh</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a297f01b05dbb98a84904affc4ca57a5e4dc2b855e1f1c969f0feba2fb5b7a2</i><br /><br />Threat actor <b>description</b>: <i>Frauenshuh Commercial Real Estate has been a leader in the commercial real estate sector for over forty years, offering a wide range of services including corporate real estate solutions, development, and healthcare real estate solutions. The company prides itself on building long-term relationships and utilizing innovative tools to provide comprehensive real estate services. Their expertise extends to leasing and sales brokerage, project management, and property and asset management. Frauenshuh aims to create enduring value for its clients through professionalism and financial depth. 
The company headquarters is located in 7101 W 78th St, Suite 100, Minneapolis, MN 55439.
51-200 Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Priderock-Capital-Partners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30454</link>
<guid>2649b36f54ee6080dd7e2c057585bce6</guid>
<pubDate>Wed, 11 Mar 2026 16:15:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Priderock-Capital-Partners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5d29275d393a358d9d11d52d2ccec24bc38d44ca6fe9520b46c21bc1bb0159f</i><br /><br />Threat actor <b>description</b>: <i>Priderock Capital Partners is a private multi-family asset management and development firm. Priderock's principals have over 100 years of experience in acquiring, developing, financing, managing and renovating apartment communities across the continental U.S.We will upload 110gb of corporate data soon. Employee files (passport numbers, DL number, scanned w9 and i9 forms and other personal information), financials, clients and partners files, lots of contracts and agreements, reports and violation docs so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>thethibeauxfirm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30463</link>
<guid>dfa13c18f92edfde61bf8b57d4539351</guid>
<pubDate>Wed, 11 Mar 2026 15:42:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>thethibeauxfirm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd94716507a23c9b4d1c17ef6a54d6526435bbc72075fdfaf2810cfabcbc03ab</i><br /><br />Threat actor <b>description</b>: <i>At The Thibeaux Firm, our top priority is you. We are a Lafayette, Louisiana-based personal injury law firm committed to high-quality representation, outstanding client support, and the pursuit of maximum compensation for accident victims.  Omar Thibeaux started our law firm on the belief that advocacy means more than just negotiating a settlement from those responsible for your accident. It also involves listening to you, understanding your problems, keeping in frequent contact with you, and never losing sight of what your case is worth. Our goal is to get the most return on your accident claim — and to never charge excessive fees in doing so.  Whether you’ve been in an accident in Lafayette, New Orleans, Baton Rouge, or anywhere else in the Pelican State, you’re never another claim number to us. You’re part of our community and our family.</i><br />Target victim <b>website</b>: <i>thethibeauxfirm.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kentucky-Injury</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30462</link>
<guid>6be412e46a02d4bd7115c929f91a36cd</guid>
<pubDate>Wed, 11 Mar 2026 15:41:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Kentucky-Injury</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6e076bdb93e611192447c785b4981bfc8b16f1821807fb5a1a598bfc310d9f64</i><br /><br />Threat actor <b>description</b>: <i>When you're dealing with an injury, you need more than just legal representation — you need someone who truly understands what you're going through and will stand by your side. That’s where I come in.   I'm John Byrnes, a Louisville-based personal injury lawyer dedicated to helping people across Kentucky when they’ve been hurt due to someone else’s negligence. With over 25 years of legal experience and a passion for serving my community, I focus exclusively on personal injury law so I can give every client the time, attention, and strong advocacy they deserve.   Whether you were injured in a car accident, harmed by a defective product, or suffered due to medical malpractice, my goal is to help you recover the maximum compensation and care you need to move forward.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Special-Shapes-Refractory</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30455</link>
<guid>5596a1c3cefe922da3cfd3244c02133a</guid>
<pubDate>Wed, 11 Mar 2026 15:38:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Special-Shapes-Refractory</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>23f10e73d88ce508f2ed81690d4102e3473b9d3439c073ec81318fbfef9571b3</i><br /><br />Threat actor <b>description</b>: <i>Manufacturing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Powers-HVAC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30456</link>
<guid>f6b50ff60e962a4d29e02759470b2d79</guid>
<pubDate>Wed, 11 Mar 2026 15:38:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Powers-HVAC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79e665c2c580d6189c6bf95f73ec8fbf3bae7e9ad51c84b0396b4212381792b6</i><br /><br />Threat actor <b>description</b>: <i>Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jadtec-Security-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30457</link>
<guid>e58e99e7d2a26e1f5a2143e49351536a</guid>
<pubDate>Wed, 11 Mar 2026 15:38:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Jadtec-Security-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24cf091129afb3d88c772903c8bf683afc4c3e004a6fdc6c91879cf8e5f5f35e</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Omega-Optical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30458</link>
<guid>5fbcf70d27063b784f44cac35923997b</guid>
<pubDate>Wed, 11 Mar 2026 15:38:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Omega-Optical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>40a1b1bf727aca95590dc2f51d058ddc505219ed94180732aa1e339da519fb5c</i><br /><br />Threat actor <b>description</b>: <i>Manufacturing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Robinson-Nursery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30460</link>
<guid>28b1723af782c5ebb1f6522d19c6df31</guid>
<pubDate>Wed, 11 Mar 2026 15:31:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Robinson-Nursery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>28540c993733c361e416828d4cb0290a0327c8e1be37e55ebb06b8c60e16adb9</i><br /><br />Threat actor <b>description</b>: <i>Robinson Nursery sells wholesale bare root trees & shrubs as well
as container trees. The company offers over 300 different variet
ies of shade trees, ornamental trees and shrubs. The company grow
plants that are hardy for zones 3 through 9. As a licensed growe
r of many named cultivars the company is able to offer a great se
lection of some of the most asked for varieties of trees and shru
bs.

We will upload corporate data soon. Employee files (scanned passp
orts, DLs, SSNs and so on), financials, clients and partners file
s, contracts and agreements, projects, recipes and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Murrays-Cheese</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30459</link>
<guid>897c1eac194eb7db41acc4c73d04bf9e</guid>
<pubDate>Wed, 11 Mar 2026 15:31:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Murrays-Cheese</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>238ab46124c62dfb0b150e4b20189800ba6282ee53d54e847db582f77f463fe4</i><br /><br />Threat actor <b>description</b>: <i>Murray's Cheese, founded in 1940 in Greenwich Village, is the old
est cheese shop in New York City. The company specializes in reta
il grocery with a focus on premium cheese products. Murray's has 
earned recognition for its quality offerings and has expanded to 
multiple locations. The business operates both B2B and B2C models
, providing specialty cheese and related products to consumers an
d businesses alike.

We will upload corporate data soon. Very detailed employee (more 
than 300 employees) information (passports, DOB, DLs, and so on),
financials, clients files, contracts and agreements, projects, i
nternal confidential files and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Peak-Toolworks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30438</link>
<guid>29524de15c2dd7ad71bcec153fcb3717</guid>
<pubDate>Wed, 11 Mar 2026 14:38:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Peak-Toolworks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>90fd731ee223d367e8676f8a582f1482c5ae5aaa43653d6b2da6f4436e30d3b7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Yuma-Sun</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30440</link>
<guid>549561a1b1b3127d0849484c0c7d4462</guid>
<pubDate>Wed, 11 Mar 2026 14:38:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Yuma-Sun</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac65290dde3e92b067facf44272b1a664c37b17363ae168bf3303148b4f6d2dc</i><br /><br />Threat actor <b>description</b>: <i>Advertising & Marketing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Composition-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30441</link>
<guid>9061cb6ece930b623c92d43061cca24e</guid>
<pubDate>Wed, 11 Mar 2026 14:38:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Composition-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1d22b430fac68dae35fab657855dc3057a5a2a1a39c79ffd929c68ec951d3d5</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Elliott-Lewis</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30434</link>
<guid>9e29fd3777fb2934d59a9522b5bfa87b</guid>
<pubDate>Wed, 11 Mar 2026 10:14:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Elliott-Lewis</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>140752dc3020b41820aa699472be52b4c88e5a394cd0420802aebb72490e320c</i><br /><br />Threat actor <b>description</b>: <i>Since 1905, Elliott-Lewis Corporate has provided comprehensive solutions for maintenance, repair and operations, engineering, design, installation, and energy consumption. In addition, Elliott-Lewis' Facilities Management team provides individual on-site operations management but does not provide security to its customers, resulting in a large database of confidential contracts and projects, as well as personal customer and employee data.</i><br />Target victim <b>website</b>: <i>https:elliottlewis.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>L.-S.-King-and-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30423</link>
<guid>ae9f22c1a98cf769e89facdc1cd7dec9</guid>
<pubDate>Tue, 10 Mar 2026 23:24:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>L.-S.-King-and-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed72c3fa7cc55c8e47fd0f12fdd299583dddca4813353549037e87c4a4343a64</i><br /><br />Threat actor <b>description</b>: <i>www.cpageorgia.com - accounting firm data breach. Small dataset, big consequences.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>csi-ri.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30421</link>
<guid>dfd5301dee688bb803b008e9db07b715</guid>
<pubDate>Tue, 10 Mar 2026 16:00:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>csi-ri.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9fbd366e8eabe7e1dbf2ed9fb91f65bb49a47d747ab104f0997f584a769e1907</i><br /><br />Threat actor <b>description</b>: <i>Contractors Supply stocks and distributes only top quality products and materials that conform to the latest DOT, ASTM, and Federal Specifications. In addition, the company only partner with manufacturers and representatives who stand behind their products and prove to be invaluable resources in product selection, technical service, price and availability. Contractors Supply prides itself on partnering with contractors, architects, engineers as well as with the company's manufacturers to continually solve problems and provide solutions to the company's customers' needs. The company strives to share the company's expertise with the company's customers to generate successful results and solutions in all phases of construction. Contractors Supply's goal is to continue to be the company's customers' First Choice supplier by: - Stocking a wide variety of quality material, supplies, and equipment - Delivering the items you need, when and where you need them - Providing accurate and factual  Employees: 50  Revenue: $5 Million Industry: Industrial Machinery & Equipment Phone Number: (203) 553-4300</i><br />Target victim <b>website</b>: <i>csi-ri.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Exhibit-Network</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30417</link>
<guid>24e87062155973c97360089add8e19d7</guid>
<pubDate>Tue, 10 Mar 2026 14:41:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Exhibit-Network</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ddd1c37482e2e418b9bfce0905e436435cc35459ec3050bb79149dd1f82279e</i><br /><br />Threat actor <b>description</b>: <i>From the company's headquarters in Houston, Exhibit Network handl
es all the details involved in your custom trade show display, lo
gistics, and show services, allowing you to focus on the big pict
ure. The company offers extensive expertise at competitive prices
.

We will upload almost 50gb of corporate data soon. Employee files
(passports and some other scanned documents), financials, client
s' files, contracts and agreements, NDAs and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>netCOMPONENTS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30414</link>
<guid>6789a028871524be3a84e0c3490b4177</guid>
<pubDate>Tue, 10 Mar 2026 14:39:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>netCOMPONENTS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d5c7be8364bff9f8c7ed6619cf8833778d1471c3dcd47b6d73d645777ff622de</i><br /><br />Threat actor <b>description</b>: <i>netCOMPONENTS is a market leader in sourcing services for the global electronic components industry, connecting buyers and suppliers in a vendor-neutral environment. The platform offers extensivefeatures for purchasing agents and procurement professionals, including part searches, supplier quality ratings, and multilingualmessaging systems.We will upload corporate data soon. Detailed employee files (passports, DLs, a bit of medical files), clients' files, financials, NDAs and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advanced-Animations</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30411</link>
<guid>8bb30d678ae46c02570c83038ef64980</guid>
<pubDate>Tue, 10 Mar 2026 11:41:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Advanced-Animations</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>85f47f452c1c11573b5deeeb0e5b61131acd8e98d65fd881f3e3b1944000cf61</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.advancedanimations.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>A-Fast-Tile--Coping</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30410</link>
<guid>b75f4cd91723baa6327b03ddf0b8ebf6</guid>
<pubDate>Tue, 10 Mar 2026 11:41:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>A-Fast-Tile--Coping</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba64c3dc0eb3c19bb00fc7e564aa34d5b3094305461ba45b1f1a2211258f43bf</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.afaststone.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>RetireRight-Financial-Planning</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30409</link>
<guid>b6a243747ce4d20eaf2cf025e7176662</guid>
<pubDate>Tue, 10 Mar 2026 11:40:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>RetireRight-Financial-Planning</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6bc899dfafd6bccdd6593498367b8db4c812cc924893b98c93874816412a0d6</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.retirerightfp.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Taylor-County-Property-Appraisers-Office</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30405</link>
<guid>e6c439226a0bde3e060ac5ce39b7d0f2</guid>
<pubDate>Tue, 10 Mar 2026 03:25:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Taylor-County-Property-Appraisers-Office</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>449e87895ac2cd58180c3f0fe845f7ff3671141b6c7c35cf043ea5b67a083420</i><br /><br />Threat actor <b>description</b>: <i>Data is not available now.</i><br />Target victim <b>website</b>: <i>qpublic.net/fl/taylor</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>First-Priority-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30404</link>
<guid>e1b0e6b958ea38f4dae5f9d24730ef05</guid>
<pubDate>Tue, 10 Mar 2026 02:48:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>First-Priority-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ece378254213ad863fb80e351f298d97498d20e76fc42022c8d5d9e44d19650a</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] First Priority Group is a diversified manufacturer, dealer, up-fitter, and service provider of emergency and specialty vehicles. The company provides ambulance remounts, emergency vehicle parts, and services. It also designs and manufactures vehicle command centers for the law enforcement and public safety sectors. Based in New Jersey, it has been serving customers across the USA since 1998.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wagon-Mound-Public-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30399</link>
<guid>080ed12b1c4e12ed722a00592a033080</guid>
<pubDate>Mon, 09 Mar 2026 22:15:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Wagon-Mound-Public-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6dec616027edda0b6b156355f888f1b58393c3771500c541a17159b93cfb1b0d</i><br /><br />Threat actor <b>description</b>: <i>Wagon Mound Public Schools provides education to students in the Wagon Mound area, providing resources and support for both elementary and middle schools. However, they neglected to address the security of their materials, resulting in the compromise of all their personal data, including the school's blueprints. We present to your attention a 80 GB of data, which includes staff and student information, their phone numbers, residence addresses, and passport numbers.</i><br />Target victim <b>website</b>: <i>wm.k12.nm.us</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>RWB-Consulting-Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30395</link>
<guid>ec4b2e408e41a86f2fd70cc17c564994</guid>
<pubDate>Mon, 09 Mar 2026 21:40:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>RWB-Consulting-Engineers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>732259a2c4722ea250740014f98b218a31e1247d2139a281fa4d4aa4eb02ae1b</i><br /><br />Threat actor <b>description</b>: <i>Architecture, Engineering & Design</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vertex-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30397</link>
<guid>2b26cd1908760b63ea7268209d1750db</guid>
<pubDate>Mon, 09 Mar 2026 21:18:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Vertex-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>029be70fedb0d021569a359b7ae8bd37c81b3290a7e5271dbf85fd7eaff78085</i><br /><br />Threat actor <b>description</b>: <i>Over 2M records containing PII and other internal corporate data have been compromised. This is a final warning to reach out by 12 Mar 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 10 Mar 2026 | Warning: FINAL WARNING</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>altaortho.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30394</link>
<guid>6ead95f03fc10ada537a2c9a21098d16</guid>
<pubDate>Mon, 09 Mar 2026 20:37:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>altaortho.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bfda67adbfe6b58cd67769c84971a402460aa084415ce3b0dac13e299b5ca92d</i><br /><br />Threat actor <b>description</b>: <i>Alta Orthopaedics specializes in orthopaedic surgery, pain management, and sports medicine, serving clients in Santa Barbara, Solvang, Oxnard, and Santa Maria, CA. They offer a range of services including treatment for ACL injuries, meniscus tears, elbow tendon pathology, rotator cuff disease, fractures, and various types of surgical procedures. The practice boasts a convenient online booking system and a focus on patient education and care, as reflected in positive customer testimonials. Their team of specialists includes physicians and physician assistants experienced in various orthopaedic disciplines. Employees: 50 Revenue: $8.9 Million Industry: Hospitals & Physicians Clinics Phone Number: (805) 688-8821 </i><br />Target victim <b>website</b>: <i>altaortho.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>tupeloeye.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30393</link>
<guid>5557b67c89b4ff20c165303cfa98a81a</guid>
<pubDate>Mon, 09 Mar 2026 20:36:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>tupeloeye.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9fa62d287cf2cc5b983c39d67f3b54339b7934eb1320ce9e07d677e495e30779</i><br /><br />Threat actor <b>description</b>: <i>It is home to Tupelo Eye Clinic (Joseph J. Chappell, M.D., William C. Brawner, M.D., and Lee H. Walker, M.D.) and Tupelo Eye Center Optical Shop. Located at 610 Brunson Drive, is the home of the Tupelo Eye Clinic & the Tupelo Eye Center Optical Shop. Our Services Employees: 50 Revenue: $5 Million Industry: Hospitals & Physicians Clinics Phone Number: (662) 844-7211 </i><br />Target victim <b>website</b>: <i>tupeloeye.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>arbd.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30392</link>
<guid>63e8e9536fbbf4d06828cb7958a93d58</guid>
<pubDate>Mon, 09 Mar 2026 20:36:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>arbd.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8a8636b933e13b89889a1395c1604469f642eac0766bc1376566bdab1ee943b</i><br /><br />Threat actor <b>description</b>: <i>Abramson Brown & Dugan is a leading law firm in New Hampshire specializing in medical malpractice and personal injury cases. With a reputation for securing the highest number of settlements in the state, they cater to clients who have suffered injuries due to medical negligence or accidents. Their team of experienced attorneys is committed to providing compassionate support during what can be a traumatic time for their clients. The firm also emphasizes their mission to restore trust and advocate fiercely for those affected by serious legal matters. Employees: 20 Revenue: $5 Million Industry: Law Firms & Legal Services  Phone Number: (603) 627-1819</i><br />Target victim <b>website</b>: <i>arbd.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Comprehensive-Orthopaedics-and-Musculoskeletal-Care-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30391</link>
<guid>c3be0a55f6361e9a215d06fe83166945</guid>
<pubDate>Mon, 09 Mar 2026 20:30:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>crypto24</b> claims attack for <b>Comprehensive-Orthopaedics-and-Musculoskeletal-Care-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>756a2d9987f1d5a760567ae20d67bdb99440f48f0e18995b290f9ba8b66f4a1d</i><br /><br />Threat actor <b>description</b>: <i>HIPAA personal information for over 100,000 people...</i><br />Target victim <b>website</b>: <i>comprehensiveorthopaedics.com</i>]]></description>
<category>crypto24</category>
</item>
<item xmlns:dc='ns:1'>
<title>Infinity-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30384</link>
<guid>b9b42240909f825c24ca520d8d28255e</guid>
<pubDate>Mon, 09 Mar 2026 19:25:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Infinity-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f2c30d1cc198a2e74e40b94ede979a9da4958ddb447aff27f508badb074b02b0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.infinity-tx.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Serrano-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30383</link>
<guid>20c0b09862be4732462010cf42039ae5</guid>
<pubDate>Mon, 09 Mar 2026 19:24:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Serrano-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3a9ebed435c234cbc6fefa30a9a2276d431b8194f95b70fd5828aec1b4b38e4</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.serrano-ind.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Helen-Kaminski</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30382</link>
<guid>f4b2ff812230c43a7977b366e1fcc6f1</guid>
<pubDate>Mon, 09 Mar 2026 19:23:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Helen-Kaminski</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>23d77af77134befd24887596ed6505d7678d15dd061ce2b6e4a60abdd95c540c</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.helenkaminski.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Byard-F-Brogan</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30381</link>
<guid>72e0a400c7b6e0beb7f2992c5378b3f6</guid>
<pubDate>Mon, 09 Mar 2026 19:23:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Byard-F-Brogan</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5fe8a94bdb8c801010841bc711e54b369c9170cfd76b84615653635d99d5a17</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.bfbrogan.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Facilities-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30380</link>
<guid>e4950445cc79fe6c0144a2372626ef1a</guid>
<pubDate>Mon, 09 Mar 2026 19:22:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Facilities-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c9dbd0690d30201ef6f8ea1d1f38e20ed67abed4f89856e0bd84536fe8700de</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.facilitiesusa.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southern-Concrete-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30379</link>
<guid>2d818880a4d72c14f185cbef3fc6061a</guid>
<pubDate>Mon, 09 Mar 2026 19:22:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Southern-Concrete-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>982468dd57e21aabf93715a0cd4f88fa4156c432d01934462a3ca328a2759470</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.southern-concrete.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>nch.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30375</link>
<guid>f5d0adbd21d9afa3d701967462202f4b</guid>
<pubDate>Mon, 09 Mar 2026 18:45:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>nch.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b8d6fb9b0c5632a746720dd7032dcab5957867c16bf2825413a80e2a507926b</i><br /><br />Threat actor <b>description</b>: <i>Your leading global experts in industrial solutions.

At NCH Corporation, we don’t just sell products—we deliver solutions that keep businesses moving. For ov... - More than 7.3TB of data has been downloaded.</i><br />Target victim <b>website</b>: <i>nch.com</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>Peninsular-Electric-Distributors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30373</link>
<guid>047471c151b6f90ac3a4ffeaddadf03c</guid>
<pubDate>Mon, 09 Mar 2026 15:39:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Peninsular-Electric-Distributors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f23816ded812a5cb3d24f277f8c4155427b86d31ca0d56bc3ad261be45c57112</i><br /><br />Threat actor <b>description</b>: <i>Peninsular Electric offers a wide range of products including electrical equipment, heavy construction machinery, cleaning supplies, and safety gear. Their services cater to various sectors such as residential, commercial, and industrial clients.We will upload 60gb of corporate data soon. Employee files, customer information, financials, confidential agreements, projects and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fiberglass-Hawaii</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30370</link>
<guid>2418c4e3de622a573d9233ad9ab707a3</guid>
<pubDate>Mon, 09 Mar 2026 14:38:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Fiberglass-Hawaii</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d96941cb487cdaea87c521607ffe08e14e076a04393ee358d85bfc0e43918e57</i><br /><br />Threat actor <b>description</b>: <i>Fiberglass Hawaii specializes in high-quality products tailored for the marine and surf industries. Their offerings include fiberglass, resin, blanks, tools, and various accessories.We will upload corporate data soon. Customer information, financials, projects and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Colliers-International-Idaho</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30372</link>
<guid>2e8b0ad62c8a9f3c5af58a346076e638</guid>
<pubDate>Mon, 09 Mar 2026 13:40:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Colliers-International-Idaho</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b68c2e96439bc4f9b6d52ce33d1e53a74332b06c41600bd2c09c39ccef07a586</i><br /><br />Threat actor <b>description</b>: <i>Colliers Idaho specializes in commercial real estate, offering a variety of properties for sale or lease throughout Idaho. Their portfolio includes options for retail, office, medical, and industrial spaces, catering to diverse client needs.We will upload 42gb of corporate data soon. Employee passports, DLs, SSNs, w9 forms, medical information. Financials, projects, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sagent-Pharmaceuticals</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30363</link>
<guid>6eef686c3fc818179f5be661698fb8e7</guid>
<pubDate>Sun, 08 Mar 2026 11:40:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Sagent-Pharmaceuticals</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8de70ccc799a75d5f60c024066f1ed60d3eea55fe8a201ee27ec1a8d1c7e676</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Artemedica</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30358</link>
<guid>14fe29ea31af2e4d7daa0dfa803df05c</guid>
<pubDate>Sat, 07 Mar 2026 18:39:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Artemedica</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d4f53eb05e795b1e90756c56bfd988ad8e197cbd09559d4ee3488280582c401f</i><br /><br />Threat actor <b>description</b>: <i>0</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kuzco-Lighting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30359</link>
<guid>1633b2e8d8d39ecaf5fd05fd16b4ffd0</guid>
<pubDate>Sat, 07 Mar 2026 18:39:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Kuzco-Lighting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>44d6e33d8a416265aa5fce14a9de0839b2d9d0fe8e2d34416e5f703ed2c92372</i><br /><br />Threat actor <b>description</b>: <i>Home Improvement & Hardware Retail</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brothers-Produce</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30360</link>
<guid>8d9a15b55c2ac9becb69a52624396966</guid>
<pubDate>Sat, 07 Mar 2026 17:39:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Brothers-Produce</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b40e1bbfa7e9bd1662553365b03657480b293b9fa525f988744ccfde9dc5a44</i><br /><br />Threat actor <b>description</b>: <i>Grocery Retail</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stalwart-Development-Group-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30356</link>
<guid>2c573a074732c9dad456e1e9f9ffc238</guid>
<pubDate>Sat, 07 Mar 2026 13:40:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Stalwart-Development-Group-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fdd9918cff87eec331310ceb335270902b9f9f8b1120892d6ea43a7cebd7f50a</i><br /><br />Threat actor <b>description</b>: <i>Data is not available now.</i><br />Target victim <b>website</b>: <i>www.stalwartdg.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>crescentenergyco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30355</link>
<guid>e35ca2aa785ca87355449938e1450f9b</guid>
<pubDate>Sat, 07 Mar 2026 13:02:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>crescentenergyco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>446c9d4916495a437f42fd6b710a330d9aba92d28fe556b290e255a86aaf873d</i><br /><br />Threat actor <b>description</b>: <i>Crescent is a growth-oriented U.S. independent energy company engaged in the acquisition, development and operation of oil and natural gas properties. Crescents portfolio of low-decline, cash-flow oriented assets comprises both mid-cycle unconventional and conventional assets with a long reserve lif…</i><br />Target victim <b>website</b>: <i>www.zoominfo.com/c/crescent-energy/560087910</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sileno-Companies-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30354</link>
<guid>5231f53ee04409d2d652039077794382</guid>
<pubDate>Sat, 07 Mar 2026 12:36:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>tengu</b> claims attack for <b>Sileno-Companies-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fdcd1088741c7eaecd0f80040bb1147c100d0841f3929f047355c90acea07d18</i><br /><br />Threat actor <b>description</b>: <i>Sileno Companies Inc. A US company primarily operating in the hospitality and real estate sectors, its activities include: Hotel operation Property management Management of hotels' restaurants and bars Hospitality project development 22.9TB was encrypted in 14 hours on 3/5/2026 More than 67.07 GB was extracted</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>tengu</category>
</item>
<item xmlns:dc='ns:1'>
<title>Griswold-Controls</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30353</link>
<guid>6a12f449790ed7be96d77aa4c7d9c1c1</guid>
<pubDate>Sat, 07 Mar 2026 11:45:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Griswold-Controls</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6fa7a0412676b97c9d806bc50bc7089f9aa70ce94163109ad332789674f200d</i><br /><br />Threat actor <b>description</b>: <i>A leader in flow control technology and valves, specializing in HVAC and irrigation applications</i><br />Target victim <b>website</b>: <i>griswoldcontrols.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>NADAP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30352</link>
<guid>650bbf5d3ffa2b7d9b8b36d62d667ced</guid>
<pubDate>Sat, 07 Mar 2026 11:45:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>NADAP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b204281c54872c7c81952f88ae14720d50cc990cecace1005cd1b46f4d4a4bb6</i><br /><br />Threat actor <b>description</b>: <i>A non-profit organization</i><br />Target victim <b>website</b>: <i>nadap.org</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Hart</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30351</link>
<guid>768b2f133c3ea3ca2db797f5aa593417</guid>
<pubDate>Sat, 07 Mar 2026 11:44:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>City-of-Hart</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f0ffec7004947b54921f1d6d01fe6977bf85e2baf7c331cfb2b7478e94552be</i><br /><br />Threat actor <b>description</b>: <i>A City of Hart local municipal organization</i><br />Target victim <b>website</b>: <i>cityofhart.org</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brighton-Eye</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30350</link>
<guid>133b5f08ade8b354bfd42b98c629ef05</guid>
<pubDate>Sat, 07 Mar 2026 11:43:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Brighton-Eye</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fef67758513edd0bb9e750935e730cf7eff625e93f0d0ba9050a23a228cfe824</i><br /><br />Threat actor <b>description</b>: <i>An eye care center in Brooklyn, NY</i><br />Target victim <b>website</b>: <i>brightoneye.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cornerstone-Financial-Advisors-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30349</link>
<guid>5646dfcf5046a6c1b4014ee53d9d614d</guid>
<pubDate>Sat, 07 Mar 2026 11:43:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Cornerstone-Financial-Advisors-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>90f7c15e9d22070a17bc96029eb0ebcc8bfd96f0c617a2a5a6a6bdf66cb67c46</i><br /><br />Threat actor <b>description</b>: <i>A full service CPA firm</i><br />Target victim <b>website</b>: <i>cfa-oc.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sanders-Legal-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30348</link>
<guid>423aa9774a2b7131b0061979ecb645e8</guid>
<pubDate>Sat, 07 Mar 2026 11:42:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Sanders-Legal-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f6c59f87126d75cabbcdff6de1ba4cefbe3a4bf7617215e2ebad249658b4f14</i><br /><br />Threat actor <b>description</b>: <i>A law firm based in Atlanta, Georgia</i><br />Target victim <b>website</b>: <i>sanderslegalgroup.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>OneSource-Medical-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30347</link>
<guid>311ce497f79478c471790cb0067b2863</guid>
<pubDate>Sat, 07 Mar 2026 11:41:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>OneSource-Medical-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26b27902cca99442f7dd0e4ee224682480d2e30cce1fc7b93451b8921d174068</i><br /><br />Threat actor <b>description</b>: <i>A provider of RCM and billing services</i><br />Target victim <b>website</b>: <i>onesourcemg.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sierra-Management-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30346</link>
<guid>a7f3d45a6782bc654321c0a9bc92ca66</guid>
<pubDate>Sat, 07 Mar 2026 11:41:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Sierra-Management-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de043da5d20f8ca85aed53f44535f9f8c1739f8be75430bb783b73fd458b1f60</i><br /><br />Threat actor <b>description</b>: <i>Provides comprehensive medical practice management</i><br />Target victim <b>website</b>: <i>sierramanagementgroup.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>AFDL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30340</link>
<guid>25a81df4364d32613794af6c800db478</guid>
<pubDate>Sat, 07 Mar 2026 08:42:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>AFDL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>49e9c2a8f3cdb8025ecaf58e86eb94e08662a5b91db03bab70e06965fafc4710</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Johnson-Vollmerhausen--Gates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30344</link>
<guid>c94ac72ea12ea1943136f2bc64719600</guid>
<pubDate>Sat, 07 Mar 2026 08:27:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>Johnson-Vollmerhausen--Gates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6ebeb8b64454b7e1c5bfddb8f609c41dbd99aa771c72134175cdd9b308ecf9e</i><br /><br />Threat actor <b>description</b>: <i>Johnson Vollmerhausen & Gates provides professional accounting, tax, and advisory services tailored to the needs of both individuals and businesses.</i><br />Target victim <b>website</b>: <i>jvgasheville.com</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ladue-Family-Dental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30341</link>
<guid>b1655d34c2c61209de20e71d9a2dc66f</guid>
<pubDate>Sat, 07 Mar 2026 07:01:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Ladue-Family-Dental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f237af1df38aea841911ffb37f83bf1e49e27aff4f22624094d9019573d3a2da</i><br /><br />Threat actor <b>description</b>: <i>A major leak of smiles.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>CPG-Documentation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30339</link>
<guid>8135d1bf28501f18186f9152e28c1b3f</guid>
<pubDate>Sat, 07 Mar 2026 03:14:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>CPG-Documentation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5515d7700656941da9332852a9588dce3e51e3f74ce20a24268c6d694209bbaf</i><br /><br />Threat actor <b>description</b>: <i>Data is not available now.</i><br />Target victim <b>website</b>: <i>cpgcanhelp.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Northern-Family-Farms</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30338</link>
<guid>3636844381b63509f2790081f79bf3c8</guid>
<pubDate>Sat, 07 Mar 2026 02:41:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Northern-Family-Farms</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c11a3da220ba56306a3962d1e55ed6dd24fa6dfbd8e499a3ebcadcda59e5ccd5</i><br /><br />Threat actor <b>description</b>: <i>Northern Family Farms, located in Merrillan, WI, has been a trusted wholesale supplier of Christmas trees and nursery plants since 1955. They offer a variety of products including Fraser Fir, Balsam Fir, White Pine, and numerous types of nursery plants such as fruits, topiaries, and shrubs. The company serves distributors and businesses across the country, ensuring top-quality plants for retail and landscaping needs. With a commitment to customer satisfaction, they invite potential clients to tour their facilities in West Central Wisconsin.</i><br />Target victim <b>website</b>: <i>www.northernfamilyfarms.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>11th-Street-Veterinary-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30336</link>
<guid>cb389d202584d0ca7193967cf2bf06eb</guid>
<pubDate>Sat, 07 Mar 2026 01:47:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>11th-Street-Veterinary-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec60e5919e49d274b50090b9160385bb457c034b4610abce55f7f4dcf41dc83f</i><br /><br />Threat actor <b>description</b>: <i>Data is not available now.</i><br />Target victim <b>website</b>: <i>www.11thstvet.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Huntington</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30335</link>
<guid>7f88a31a9369d5c49af25c4e84ea29d8</guid>
<pubDate>Sat, 07 Mar 2026 00:25:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>termite</b> claims attack for <b>City-of-Huntington</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1be3877f051dccb9ad05dbfb277c405bd16a73eb21e1a1e27afc42ef764e3466</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1871, the City of Huntington is located in western West Virginia. It is the county seat of Cabell County and also stretches into Wayne County.
</i><br />Target victim <b>website</b>: <i>www.cityofhuntington.com</i>]]></description>
<category>termite</category>
</item>
<item xmlns:dc='ns:1'>
<title>T-a-Solberg</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30333</link>
<guid>a3c3404f520cf86e3fe5b0ac321d8df4</guid>
<pubDate>Fri, 06 Mar 2026 21:19:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>T-a-Solberg</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a19d4bef1c7676cac81e106694676e489c267fbd6d0ba8f151b5b8e83f53ee3</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.tasolberg.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Don-E-Bower</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30332</link>
<guid>4f7edff394522f1aca11501d3f332477</guid>
<pubDate>Fri, 06 Mar 2026 21:18:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Don-E-Bower</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>748d9e3055213148a87fa136f5af083adf5d6c2610795d7ff2f031bd0d209660</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.donebowerinc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Design-To-Print</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30331</link>
<guid>7757f31d887b1ef82d67308fc850bf5a</guid>
<pubDate>Fri, 06 Mar 2026 21:17:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Design-To-Print</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ef892c45a51a27abf6d37201d4531c89cda6049befcd541f0d23f45fbb97cc8</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.designtoprint.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>DFW-Aero-Mechanix</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30329</link>
<guid>76cb2624c9d093d029a3a43ae55148f1</guid>
<pubDate>Fri, 06 Mar 2026 21:16:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>DFW-Aero-Mechanix</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8480fb2b5ef435b115ccb38a03c7a5c551a7bcb86d0c7dcf2a0eb7d6c62308d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.dfwaero.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Garland-Williams--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30328</link>
<guid>3569ced5d21506feef9e1ce0cd9e0178</guid>
<pubDate>Fri, 06 Mar 2026 21:16:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Garland-Williams--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fada1813549ae6da9d3449e18803518f740a6521699de240455d60b6ff2ddc3a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.garlandwilliamscpa.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>nelsonworldwide.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30326</link>
<guid>94e02ee38fd8f58b976ade80c5aeab54</guid>
<pubDate>Fri, 06 Mar 2026 20:34:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>nelsonworldwide.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8dad6ee2451298ff014d10c3e667499874d7670653ca9738477c9c9c3251e48</i><br /><br />Threat actor <b>description</b>: <i>NELSON Worldwide is an award-winning firm delivering architecture, interior design, graphic design, and brand strategy services that transform all dimensions of the human experience, providing our clients with strategic and creative solutions that positively impact their lives and the environments w…</i><br />Target victim <b>website</b>: <i>www.nelsonworldwide.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nephrology-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30325</link>
<guid>37db35cc291fceddcf807acffb973a7e</guid>
<pubDate>Fri, 06 Mar 2026 20:01:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Nephrology-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8056e13aab05bdc92809019097c7ce77a39f9fa1c0529e0b6f487565c983af01</i><br /><br />Threat actor <b>description</b>: <i>nephkc.com  zoominfo.com/c/nephrology-associates/469726875 Nephrology Associates prides itself on providing the highest quality of care for patients with kidney disorders in the Kansas City area</i><br />Target victim <b>website</b>: <i>nephkc.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>H--L-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30320</link>
<guid>52cf16b573a97bddb9aea03cf5710746</guid>
<pubDate>Fri, 06 Mar 2026 19:41:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>H--L-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>964e9d1f1a860190485e6dc27dea1e9bc161b850326cf6c59bc62d060bc406d7</i><br /><br />Threat actor <b>description</b>: <i>Software</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Graham-County-Electric-Cooperative</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30316</link>
<guid>8fc30966df18b68dc8181947fa6400ea</guid>
<pubDate>Fri, 06 Mar 2026 18:41:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Graham-County-Electric-Cooperative</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8583c3e6865b9b2f73c8f71a2de37db94b9d3a3647e26bb044fbe4fd231ce62f</i><br /><br />Threat actor <b>description</b>: <i>Graham County Electric is committed to provide members with affordable cost effective energy solutions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Delventhal-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30306</link>
<guid>e3423656a3520cb9a9825048b5cb59aa</guid>
<pubDate>Fri, 06 Mar 2026 14:38:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>The-Delventhal-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>495128bd8475a3300d1f622d636d30c0f1950ca7629ad1ed7d8b19b6ab48e181</i><br /><br />Threat actor <b>description</b>: <i>The Delventhal Company offers a wide range of construction and management services including general contracting, construction management, design-build, and rea...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advanced-Rehabilitation-Technology-ART</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30307</link>
<guid>1721075016476163d0405fdfe93667c1</guid>
<pubDate>Fri, 06 Mar 2026 14:38:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Advanced-Rehabilitation-Technology-ART</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f68ee16e4fd882ef853c049cf35407070334dc98445b206177729a3f1ba9e38</i><br /><br />Threat actor <b>description</b>: <i>Advanced Rehabilitation Technology (ART) specializes in state-of-the-art no-dig technology solutions aimed at protecting and extending the life of critical infr...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>RC-Fence-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30310</link>
<guid>11b8d3b78031b222c720affbaf39f9e7</guid>
<pubDate>Fri, 06 Mar 2026 14:37:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>RC-Fence-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e0ac944767c76bc256bb2be3f947b46786cad46d7dd654678ecd9f89ea4a238e</i><br /><br />Threat actor <b>description</b>: <i>R&C Fence, Inc. is a locally owned and operated company that has been providing custom-built fence installation services for both commercial and residential clients since 1970. With an in-house fabrication shop, they are equipped to handle complex fencing projects while ensuring high quality and service excellence. Their experienced staff offers guidance on various fencing materials and installation solutions tailored to client needs. They serve the Fort Wayne area and surrounding regions, including South Bend, Auburn, and Warsaw</i><br />Target victim <b>website</b>: <i>www.randcfence.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Verdugo-Tool--Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30308</link>
<guid>6ef43ab936ea0c3ff156b0e099c783ba</guid>
<pubDate>Fri, 06 Mar 2026 13:39:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Verdugo-Tool--Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8004773b545e15603e190ec73ff0deb3fa1f34714deb431c61315838ef6556fc</i><br /><br />Threat actor <b>description</b>: <i>Verdugo Tool and Engineering specializes in sheet metal stamping parts, serving industries including aerospace, defense, automotive, medical, and commercial for over 50 years. They offer a one-stop shop for all sheet metal needs, providing services such as tool and die design, laser cutting, metal stamping, and various value-added services.We will upload 10gb of corporate data soon. Employee personal documents, HR files, projects, contracts and agreements, confidentiality agreements, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>North-Central-HIDTA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30299</link>
<guid>58836fbe6a74d8fbef6dbce688905c71</guid>
<pubDate>Fri, 06 Mar 2026 12:39:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>North-Central-HIDTA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c33ac4cbc85c0b7dd3a5d959fa739c87522695d25b4247c1b1a0c45130b039dd</i><br /><br />Threat actor <b>description</b>: <i>North Central HIDTA is a federal program aimed at uniting federal, state, local, and tribal law enforcement agencies to combat drug trafficking activities in Mi...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>A-C-Scott-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30303</link>
<guid>fe93fd567b9aafe3cc3372a19309fc6a</guid>
<pubDate>Fri, 06 Mar 2026 11:44:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>A-C-Scott-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8f0267a69729f5837fd500fb996ec7e626245c89a94e65b8f83a1b87e4badc47</i><br /><br />Threat actor <b>description</b>: <i>A.C. Scott Electric Company was established in 1967 by Dexter C. Ricker and Frederik C. Nielsen as a partnership. On May 14, 1968 the company succeeded to incorporate. With the resignation of Dexter C. Ricker in 1984, Frederik C. Nielsen and his wife, Maiken Nielsen obtained 100% ownership of the corporation. From this point forward, A.C. Scott Electric Co., Inc. was operated as a "family-owned" small business enterprise in the State of New Jersey. Frederik and Maiken retired from the day to day operation of the corporation in 1999, relinquishing ownership and operational control to their son, Michael C. Nielsen.</i><br />Target victim <b>website</b>: <i>www.acscottelectric.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>ICS-Electrical-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30302</link>
<guid>ab5a47d41c51bcd432f515088a070b8b</guid>
<pubDate>Fri, 06 Mar 2026 11:43:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>ICS-Electrical-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ebaf617e6608b0ac9260ca050ceb2c77189a9d398868a12a9576526c5a8358c2</i><br /><br />Threat actor <b>description</b>: <i>ICS Electrical Services is a Cincinnati based electrical contracting company that has been specializing in complex industrial installations since 1997.  We provide a unique approach to the many facets of the industrial market that set us apart from the rest.  Our services include full service electrical installations, outage and startup support, PLC system upgrades, instrumentation installation & Calibration, electrical design-build, UL Listed control panel assembly, automation & programming, and maintenance & repairs.</i><br />Target victim <b>website</b>: <i>icselectricalservices.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>C.A.-LINDMAN-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30301</link>
<guid>bc8147ca69573b8a699c18e7ddbcfb48</guid>
<pubDate>Fri, 06 Mar 2026 11:42:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>C.A.-LINDMAN-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81211b36da09c4e8896715fd95b01ebbfe004e9e3c2162a59c78ac52c43b0727</i><br /><br />Threat actor <b>description</b>: <i>Numerous data items, including financial and project details, were leaked from servers located at the company's headquarters in Florida, Maryland, and North Carolina.

C.A. Lindman, Inc., founded in 1990, has grown from a small restoration company with less than 10 employees, into one of the top 20 national firms specializing in exterior concrete and masonry repairs over the last 30 years. The founders, Rob Pusheck and Jeff Procter, have kept Lindman focused on meeting all of their clients’ needs and expectations. The “Lindman Difference” is the company’s motto and delivering this superior service is the company-wide goal every day.</i><br />Target victim <b>website</b>: <i>www.calindman.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Edgar-Agents</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30297</link>
<guid>bdb7179e2db5dca88a7117c1d344a553</guid>
<pubDate>Fri, 06 Mar 2026 09:41:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Edgar-Agents</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>887077b778e2dc37ae817bd1554742bfa1030d060d5d330a153fa23c46d0f049</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>pacepacific.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30296</link>
<guid>ed4e17d67f76e380e297298c8629c38d</guid>
<pubDate>Fri, 06 Mar 2026 07:35:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>pacepacific.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d1027e1f76ed3ce3aedc6660658c99444f276629bf0b16e0e01cc15f279d7782</i><br /><br />Threat actor <b>description</b>: <i>PACE Pacific Corporation is a Native American woman-owned small business that specializes in general contracting services in Arizona and New Mexico. Established in 1991, the company provides ground-up construction services for a diverse range of clients, including state, local, federal, tribal entities, and private developers. PACE offers comprehensive capabilities such as Construction Management, Self-Performing Concrete Division, and Design-Build Services, while maintaining a commitment to quality and a trained professional team. With extensive experience in sectors like education, healthcare, and military facilities, PACE aims to exceed client expectations as both a prime and subcontractor Employees: 200  Revenue: $13.2 Million Industry: Construction Management  Phone Number: (602) 437-8729</i><br />Target victim <b>website</b>: <i>pacepacific.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>CFGI-Management-LLC.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30294</link>
<guid>708f29ec20d162afd5d0f6e9506c3933</guid>
<pubDate>Fri, 06 Mar 2026 03:47:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>CFGI-Management-LLC.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d17186ce2266b2a94d097440f01650bbbc0744bff44d440f0340f4b20eb75c73</i><br /><br />Threat actor <b>description</b>: <i>Over 800k records containing PII and other internal corporate data have been compromised. This is a final warning to reach out by 09 Mar 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 06 Mar 2026 | Warning: FINAL WARNING</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>MedicalGPT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30291</link>
<guid>c9bbba509b7304e3aec72ce594a0bec1</guid>
<pubDate>Fri, 06 Mar 2026 03:10:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>MedicalGPT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>175972a53ea7177cb1fb10e64258bf700aa19edd2a8947cb154adb65e455b777</i><br /><br />Threat actor <b>description</b>: <i>Price ??? Disclosures 0/1</i><br />Target victim <b>website</b>: <i>medicalgpt.info</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>yurdriversnetwork</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30290</link>
<guid>e0f4d7c0453ad5d27b69eba851357a31</guid>
<pubDate>Fri, 06 Mar 2026 03:09:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>yurdriversnetwork</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca3d8cf2e5dcfe44558fa9ec411ebdba3529d1e3e710cb9449304c42330a0986</i><br /><br />Threat actor <b>description</b>: <i>Price ??? Disclosures 0/1</i><br />Target victim <b>website</b>: <i>yurdriversnetwork.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>northstaria.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30289</link>
<guid>216cbd05fb1918ba700506718cd8d915</guid>
<pubDate>Thu, 05 Mar 2026 22:28:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>northstaria.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c2b8ac69b1c69dcfdedd632784f1d0721ba8c78cacbb677388df2ffb51c56e68</i><br /><br />Threat actor <b>description</b>: <i>North Star Insurance Advisors is the leading final expense telesales company in America, dedicated to serving the senior market, agents, and partners. The company offers innovative training, a competitive compensation structure, and limitless growth opportunities for agents and partners. With over 40 years of combined experience, North Star utilizes proprietary technology to assist families with their final expense needs. As a purpose-driven organization, they prioritize people and aim to provide valuable resources to navigate life's challenges. Employees: 200 Revenue: $44.9 Million Industry: Insurance Phone Number: (636) 205-5005</i><br />Target victim <b>website</b>: <i>northstaria.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>parkerlipman.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30288</link>
<guid>bc5e6eabfbafdca716f42c5e69644480</guid>
<pubDate>Thu, 05 Mar 2026 18:59:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>parkerlipman.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1416c2e3f75500213697c3d71f8a982e761183fd815d74ea08166dce84153c1</i><br /><br />Threat actor <b>description</b>: <i>Parker Lipman LLP is a premiere Denver personal injury law firm working for years, protecting the rights of the injured. Call our experienced attorneys for representation in personal injury and accidents.</i><br />Target victim <b>website</b>: <i>parkerlipman.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tennessee-Valley-Electric-Cooperative</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30282</link>
<guid>81dd12121d041b1cff1d0792266b2ce6</guid>
<pubDate>Thu, 05 Mar 2026 18:38:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Tennessee-Valley-Electric-Cooperative</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3cdb7006478d1d3cb06a28838702264108cdd4e51329eda3007c7f6364747cfa</i><br /><br />Threat actor <b>description</b>: <i>Electricity, Oil & Gas</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ELC-Security-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30286</link>
<guid>654146dbdcd94564df622bab7dfaba8b</guid>
<pubDate>Thu, 05 Mar 2026 18:36:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>ELC-Security-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f22e92379845c909d1f9bfcfe60e3355d7a575c5ee2c77de98f2179104674928</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.elcsecurity.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Applied-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30278</link>
<guid>1d7c91037101cce725efa1fe469232a5</guid>
<pubDate>Thu, 05 Mar 2026 16:38:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Applied-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>292ca00e6f6573cca893d545fa6207ed427a6873fc75e8c8114e4efc6a05158d</i><br /><br />Threat actor <b>description</b>: <i>Applied Products, Inc. is a leading supplier of high-performance,pressure-sensitive adhesives for various OEM industries such as HVAC, construction, automotive, and appliance manufacturing.We will upload corporate data soon. Employee passports, DLs, projects, confidential agreements, clients docs, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>K--S-Company-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30273</link>
<guid>5ceda82de78ea91d4c01e536a0673341</guid>
<pubDate>Thu, 05 Mar 2026 14:39:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>K--S-Company-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ff484eac5eeb89d5125cc24051a2f873809455c763e926c7a49bd7239d63cf6</i><br /><br />Threat actor <b>description</b>: <i>Real Estate</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>DesignSourceCT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30275</link>
<guid>5131f6caead4314643b671b624714d94</guid>
<pubDate>Thu, 05 Mar 2026 14:39:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>DesignSourceCT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c36f06707030a3ad8682529f2dfd18ae15f87a507146b8d880960e47b573d547</i><br /><br />Threat actor <b>description</b>: <i>DesignSourceCT is Connecticut's largest and most comprehensive designer showroom, established in 2005, catering to trade professionals and their clients. The showroom offers a thoughtfully curated selection of high-quality home furnishings, including fabric, furniture, flooring, and more from trusted brand names.We will upload corporate data soon. Projects, contracts, clients docs and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>CTI--Coordinators</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30272</link>
<guid>a0318d32cb96f76323313e33d189b3ce</guid>
<pubDate>Thu, 05 Mar 2026 12:41:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>CTI--Coordinators</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f81586f1a944e23ae01a31425e61f8746bf7aafe3e53f34df25c2b870317c08</i><br /><br />Threat actor <b>description</b>: <i>Freight transportation services throughout the United States and province of Ontario Canada</i><br />Target victim <b>website</b>: <i>cticoordinators.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jameson-Pepple-Cantu-PLLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30269</link>
<guid>03de7a07ac1437954fb6ed41b144e18d</guid>
<pubDate>Thu, 05 Mar 2026 08:23:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>tridentlocker</b> claims attack for <b>Jameson-Pepple-Cantu-PLLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c175283ee2618e3c0bcfdc5246540fe1f5ffac2595ba4864f516b82114cd2b3</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Jameson Pepple Cantu PLLC is a boutique law firm located in Houston, Texas. This firm provides a broad range of legal services but specializes in areas related to business such as Corporate Law, Real Estate, Mergers and Acquisitions, and Securities. The team, made up of experienced professionals, prides themselves in their dedicated and personalized approach to each client's legal needs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>tridentlocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>piglerautomation.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30266</link>
<guid>7bc8c88bb24cbfee9378e0af71e171a1</guid>
<pubDate>Thu, 05 Mar 2026 02:13:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>piglerautomation.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>402db62b703fb3bfd0b972d5669e95fab545afd14d087c4bf63083c40c9410f6</i><br /><br />Threat actor <b>description</b>: <i>Pigler Automation specializes in Industrial Automation System Integration, helping clients streamline and modernize their operations to enhance efficiency and productivity. Their services include control system consultation, project planning, and support for various industries such as biopharma, oil and gas, and energy. With over 20 years of experience, their team of certified engineers offers expertise in SCADA design, PLC programming, and system integration. Pigler Automation aims to bridge the gap between legacy systems and cutting-edge automation, ensuring clients can optimize performance and stay ahead of industry challenges. Employees: 50  Revenue: $5 Million Industry: Industrial Machinery & Equipment Phone Number: (866) 871-1456 </i><br />Target victim <b>website</b>: <i>piglerautomation.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Environmental-Air</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30264</link>
<guid>69654c562132cec527c1ac7bf54e2791</guid>
<pubDate>Wed, 04 Mar 2026 20:42:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Environmental-Air</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>27e9259446b8aa860de43efa4d5e93f5f324d1e1315870b1030de29eeb059150</i><br /><br />Threat actor <b>description</b>: <i>Environmental Air, Inc. has been a trusted provider of Sheet Metal Fabrication, Custom Ductwork Fittings, Welding, and HVAC Installation services for over 40 ye...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>saturnmachine.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30263</link>
<guid>2a58c8ee009158220b7b2c03e333db41</guid>
<pubDate>Wed, 04 Mar 2026 18:40:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>saturnmachine.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f68360b79a952a5ce4e7dd15f05403b400dbd841042b3c6d0ccf48a8cd764f5</i><br /><br />Threat actor <b>description</b>: <i>Saturn Machine is a leading designer and manufacturer of equipment for major steel companies in North America, specializing in steel fabrication, machining, laser processing, and sandblasting. The company prides itself on delivering high-quality products and problem-solving solutions, supported by a team of skilled professionals and advanced machinery. With capabilities in mechanical and electrical engineering, hydraulic system design, and welding fabrication, Saturn Machine aims to expand its services to a broader client base. Their commitment to customer satisfaction and excellence in design sets them apart in the steel products manufacturing industry. Employees: 50 Revenue: $6 Million Industry: Industrial Machinery & Equipment Phone Number: (270) 333-2104</i><br />Target victim <b>website</b>: <i>saturnmachine.net</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>CJL-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30256</link>
<guid>76a77077b53444d655fff2a6c350d5ca</guid>
<pubDate>Wed, 04 Mar 2026 18:40:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>CJL-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>724dc7dbb2e0ce551959742198a59e0577201934914bd3e4e79e899881fba9c2</i><br /><br />Threat actor <b>description</b>: <i>Architecture, Engineering & Design</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>MarketGraphics-Research-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30249</link>
<guid>c86027cb65669a6bec290bd22c969f2d</guid>
<pubDate>Wed, 04 Mar 2026 16:40:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>MarketGraphics-Research-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ddb5dca84a69e3403775f20a179d9fb7b7bc454bddd51f043aaa8d4919918798</i><br /><br />Threat actor <b>description</b>: <i>MG Research Markets specializes in providing comprehensive housing market research and analysis services. The company serves a diverse range of clients by delivering accurate and forward-thinkingdata through various interactive tools and GIS services.We will upload 60gb of corporate data soon. Personal files of employees (passport and DL numbers, SSNs and so on), detailed financials, projects, contracts, NDAs, partners and clients contacts and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>lawofficesoferichershler.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30254</link>
<guid>58e36f59f7e532acacf9cb6ef1ab91b9</guid>
<pubDate>Wed, 04 Mar 2026 15:47:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>lawofficesoferichershler.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4c08d380bd578b5e7432ebb796bb70e2abc468c999def21608e9be3eeabd5852</i><br /><br />Threat actor <b>description</b>: <i>The Law Offices of Eric Hershler, APC, in Los Angeles, focuses exclusively on personal injury cases.</i><br />Target victim <b>website</b>: <i>lawofficesoferichershler.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>hopkins-law.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30253</link>
<guid>7e909d0e18cec1ad8ad9076be0b669c2</guid>
<pubDate>Wed, 04 Mar 2026 15:46:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>hopkins-law.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de970a4a486a62410c80455448327d92ed2e5ee2699af0c2db08c6c4f23ef1f2</i><br /><br />Threat actor <b>description</b>: <i>Hopkins Barvié & Hopkins, P.L.L.C. is your trusted Gulf Coast firm for personal injury, business litigation, and family law—fiercely protecting your rights while guiding you with honesty, respect, and genuine care.</i><br />Target victim <b>website</b>: <i>hopkins-law.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>bclawoffices.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30251</link>
<guid>6b1d7eadb42d159909af05a7a6d88989</guid>
<pubDate>Wed, 04 Mar 2026 15:45:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>bclawoffices.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad0c1057e2dbb4700fe11fc35d68512307efc1c46940889046a335d92aa8382f</i><br /><br />Threat actor <b>description</b>: <i>At the Law Offices of Brent W. Caldwell, we help people who have been injured in accidents get the legal support they need during a difficult time. While there are many personal injury firms in California and Nevada, we take pride in being more than just a law office with strong results. We are focused on building real relationships with our clients and treating every case with the attention it deserves.</i><br />Target victim <b>website</b>: <i>bclawoffices.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Reynolds-DeMarco--Boland</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30250</link>
<guid>1951440c60517e1646b22e78584305b1</guid>
<pubDate>Wed, 04 Mar 2026 15:40:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Reynolds-DeMarco--Boland</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8cadc167c7fb333b6be84b3405de4e1e13d2fcf64869d7b2c064cf8dbf5a8bc</i><br /><br />Threat actor <b>description</b>: <i>Reynolds, DeMarco Boland, Ltd. is a general litigation law firm based in Rhode Island, specializing in insurance law, personal injury, civil rights, and numerous other practice areas. The firm primarily represents insurers and their insureds in civil litigation, as well as providing legal advice for first party claims and coverage issues.We will upload over 100gb of corporate data soon. Clients' personal files (w9, i9 forms, passports, DLs, SSNs, medical records), police reports, court files, and other confidential files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Huffman-Insurance-Agency</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30248</link>
<guid>35405f014bb0dbc14cea7766ccd0256e</guid>
<pubDate>Wed, 04 Mar 2026 14:08:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Huffman-Insurance-Agency</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a2d81b0e4b9910e1fcc723ac132ca942a5debc4f3070f5917736666dc2c19e21</i><br /><br />Threat actor <b>description</b>: <i>Huffman Insurance Agency was founded in 1975 and operates in the Richlands, Virginia area with an office in Ashland, Kentucky. Huffman represents a strong network of Independent Agents offering home, car, and business insurance</i><br />Target victim <b>website</b>: <i>www.huffmaninsurancegroup.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Business-Automation-Specialists-of-Minnesota</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30247</link>
<guid>b8321cc2ef02a2823b92d06f2ea3e298</guid>
<pubDate>Wed, 04 Mar 2026 14:00:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Business-Automation-Specialists-of-Minnesota</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca467dbb6c0b4ae28ece483b14397851f35889aa861647afc56acd56a9ef2e42</i><br /><br />Threat actor <b>description</b>: <i>Business Automation Specialists (BASM) is a Microsoft Partner tha
t focuses on providing implementation, consultation, customizatio
n, and support for Microsoft Dynamics 365 Business Central and NA
V.

We will upload 10 gb of corporate data soon. Employee personal fi
les (passports, DLs, medical files), NDAs, contracts and agreemen
ts, financials, projects, clients' files, internal confidential f
iles, and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>HTH-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30246</link>
<guid>a3e2acf65a87adb6db5976ca4f149665</guid>
<pubDate>Wed, 04 Mar 2026 14:00:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>HTH-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06cbaffee268471437935bace6e6a33aedc0a9692b94b5243261fc1f7a9ee2c5</i><br /><br />Threat actor <b>description</b>: <i>HTH Companies Inc. is a leading professional industrial service p
rovider, specializing in scaffold erection, mechanical insulation
, industrial cleaning, industrial maintenance, mechanical work, a
nd painting and coatings.

We will upload over 60gb of corporate data soon. Employee persona
l files (i9, w9, passports, DLs, medical information), NDAs, cont
racts and agreements, projects, financials, confidential files, a
nd so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nicholas--Tangeman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30245</link>
<guid>936a0bd1ac3c96d08aa66bfbc3ed9758</guid>
<pubDate>Wed, 04 Mar 2026 14:00:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Nicholas--Tangeman</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5d6650e0eb9e548d2a419ede1cc98e1b9e3ea452ca1153207615c4a0af338143</i><br /><br />Threat actor <b>description</b>: <i>Nicholas & Tangeman, LLC is a general practice law firm based in 
Laramie, Wyoming, serving clients in Wyoming and Colorado. The fi
rm offers a wide range of legal services including civil litigati
on, criminal law, personal injury, estate planning, and corporate
business planning.

We will upload over 100gb of corporate data soon. Lots of clients
' personal files (passports, DLs, medical record), NDA, police re
ports, court files, and other confidential files.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-City-of-Hesperia-CA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30241</link>
<guid>a0ac90988690d6ab675e7758a92d5828</guid>
<pubDate>Wed, 04 Mar 2026 12:40:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>The-City-of-Hesperia-CA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2e46adefb58c90f66634c525d9f8ff84706f31aa43a31876da701c65f1fa367d</i><br /><br />Threat actor <b>description</b>: <i>Access was gained to files containing state secrets, non-disclosure agreements, contracts with private and public companies, as well as personal data of employees and government officials. Transactions, payment, and tax documents were also obtained.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>ATS-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30239</link>
<guid>12f9ed7d561f5536e2316645dba28c66</guid>
<pubDate>Wed, 04 Mar 2026 11:48:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>ATS-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c96dfcabbb5c8365bbdb6faef41ddce409ddb03a37d6f9a14e933eee319d7e1</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.theatsgroup.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vision-Aero</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30238</link>
<guid>b276f01d37dac0090b04042539a2aaab</guid>
<pubDate>Wed, 04 Mar 2026 11:47:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Vision-Aero</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29e893b2009f4af84b2883ed7ff91198a7bd59cd8700844e43df364c789b31c1</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.vision.aero</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>cwpa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30237</link>
<guid>965052c6a03942b536a3ff2d134d61c1</guid>
<pubDate>Wed, 04 Mar 2026 11:13:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>cwpa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>37698c04516e92b4cd8fce14ed6e2a3cde13575f299426a6c32d5c10256383e7</i><br /><br />Threat actor <b>description</b>: <i>Office Products Retail & Distribution PO Box 11309, Spring, Texas, 77391, United States Phone Number (281) 251-9814 Website www.cwpa.com Revenue <$5 Million  CWPA is a provider of office equipment and furniture, specializing in customized solutions to improve office efficiency for businesses in Spring, TX. They offer a single-source approach for office supplies, managed print services, promotional products, and office ergonomics. Their intended clients include office managers and businesses seeking reliable, efficient ordering processes. CWPA emphasizes personalized customer service and prompt delivery, making them a preferred partner for various office supply needs.</i><br />Target victim <b>website</b>: <i>cwpa.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bravo-Electro-Components</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30232</link>
<guid>9b01ea73aa4de36440a527d52e63870a</guid>
<pubDate>Wed, 04 Mar 2026 09:36:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Bravo-Electro-Components</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d7cc224df154a567323632f088d9de5d3efa2ff5ac6a24519c4d229a9f166ad3</i><br /><br />Threat actor <b>description</b>: <i>Bravo Electro specializes in providing a wide range of power supplies, including AC/DC converters, medical power supplies, and modular power solutions. They also offer various fan products, including DC and AC fans, along with components for custom power solutions. Their target clients include engineers, purchasing agents, and technicians looking for reliable power solutions and expert design support. With a commitment to customer service and competitive pricing, Bravo Electro aims to empower designs with exceptional service and technical expertise</i><br />Target victim <b>website</b>: <i>bravoelectro.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>ICAFe-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30231</link>
<guid>975643d32f495b3ef6409c11fa1dec18</guid>
<pubDate>Wed, 04 Mar 2026 09:28:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>ICAFe-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5ec388da426b01e54c1956c859713eac6073e8feff0eda06dcf3ba9421cc51fd</i><br /><br />Threat actor <b>description</b>: <i>Southwest Air Equipment is a single-source equipment supplier ded
icated to the spray foam industry, offering comprehensive service
s including replacement parts, repairs, and complete spray rig se
tups.

We will upload corporate data soon. Lots of clients files, NDAs, 
contracts and agreements, financials, confidential files, a bit o
f personal information and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Klevorn</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30229</link>
<guid>c105ca8b5f446bfd69de73e75defe1ac</guid>
<pubDate>Wed, 04 Mar 2026 06:41:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Klevorn</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22030a1fefb3e5029a43e61194b9279ca9a34fd3c8776a446a9d51bc96684e07</i><br /><br />Threat actor <b>description</b>: <i>Accounting Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Napolin-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30225</link>
<guid>a45045acdffeec7b92ea019675da48fc</guid>
<pubDate>Wed, 04 Mar 2026 00:42:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Napolin-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f1d27ef5bf0f0f3fa00c26b34151271184c1de5ad7be9d6dc305171adbfd460</i><br /><br />Threat actor <b>description</b>: <i>Alexander D. Napolin is a top-rated, 100% plaintiff-side California personal injury attorney, exclusively advocating for injured individuals – never defending insurance companies or corporations.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Law-Offices-of-Mark-E.-Lewis--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30224</link>
<guid>f9d6b4b6c27bc520071ac934b5845e50</guid>
<pubDate>Wed, 04 Mar 2026 00:41:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Law-Offices-of-Mark-E.-Lewis--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>49fdba302c117ff9d5069cfe27eb1ff3e798416ea0537fc347b75b765d437914</i><br /><br />Threat actor <b>description</b>: <i>At the Law Offices of Brent W. Caldwell, we help people who have been injured in accidents get the legal support they need during a difficult time. While there are many personal injury firms in California and Nevada, we take pride in being more than just a law office with strong results. We are focused on building real relationships with our clients and treating every case with the attention it deserves.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brockman-Injury-Lawyer</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30222</link>
<guid>467fc60274ae2cefade0487f255c3f5d</guid>
<pubDate>Tue, 03 Mar 2026 22:41:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Brockman-Injury-Lawyer</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a594631a45cce285a5201712a66ad76fbc42213e2c39fee5cb67e2fb8bf4bce9</i><br /><br />Threat actor <b>description</b>: <i>The attorneys at Jonathan R. Brockman, P.C. are dedicated to helping victims who have been injured or killed due to the negligence of others. Between them, our attorneys have more than 70 years of experience pursuing personal injury claims on behalf of clients and representing clients in a court of law. They have successfully tried cases in federal court and argued cases in the Georgia Court of Appeals and the Georgia Supreme Court.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hersher-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30221</link>
<guid>6d658d7273dabf3a616e9193db0446d8</guid>
<pubDate>Tue, 03 Mar 2026 22:41:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Hersher-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f3fc86c8908ad3f9dc8b49077a3c4cd753b365fad388f4f4d99624d775f7aa86</i><br /><br />Threat actor <b>description</b>: <i>The Law Offices of Eric Hershler, APC, in Los Angeles, focuses exclusively on personal injury cases.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hopkins-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30220</link>
<guid>8e958e9a4d44b87aeb02e489dc7c48ec</guid>
<pubDate>Tue, 03 Mar 2026 22:41:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Hopkins-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a2b9c5090b198746282c14668f1f783bc87bd4d217980cccf033f158a93064a</i><br /><br />Threat actor <b>description</b>: <i>Hopkins Barvié & Hopkins, P.L.L.C. is your trusted Gulf Coast firm for personal injury, business litigation, and family law—fiercely protecting your rights while guiding you with honesty, respect, and genuine care.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lawrence-Journal---World</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30219</link>
<guid>981d50d64a8d5a7d90aa7eb49927e1b9</guid>
<pubDate>Tue, 03 Mar 2026 22:37:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Lawrence-Journal---World</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b3aa505c3479fbf745d482028f760e14a4b4ba38208b2b0419fe7dbe81299294</i><br /><br />Threat actor <b>description</b>: <i>Lawrence Journal-World is a news organization based in Lawrence, Kansas, providing coverage on diverse topics including news, sports, opinion, and community events. The publication offers a platform for local announcements, classified ads, and job listings, catering primarily to residents and the surrounding community. It also features educational insights and updates relevant to local schools and government activities. Target clients include local residents, businesses, and those interested in Lawrence's happenings.</i><br />Target victim <b>website</b>: <i>ljworld.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Minogue-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30218</link>
<guid>051b614de48247432c8a44200229791d</guid>
<pubDate>Tue, 03 Mar 2026 22:36:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Minogue-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a82507057cd982a7c5ed6368afc2ef1b6b3ecd3fdf99691ef5ea57ab0f3fd17d</i><br /><br />Threat actor <b>description</b>: <i>Minogue Associates, Inc. specializes in comprehensive construction valuation reports and estimates for both commercial and residential properties, as well as consulting services for construction litigation. Established in 1973, the company has extensive experience in damage assessment and estimating services for a wide range of structures, including high-rise buildings, hotels, and schools. Their clients include property owners and insurance companies seeking expert appraisal and dispute resolution services. With a reputation for professionalism and integrity, Minogue Associates handles high-profile assignments involving significant financial exposures.</i><br />Target victim <b>website</b>: <i>minogueassociates.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>GapVax</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30212</link>
<guid>75ef1021ee69eb5414f2103193d4c8dc</guid>
<pubDate>Tue, 03 Mar 2026 20:10:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>GapVax</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0fba206417252cdf94be576f1cafca2c1f96115873d5b4272ad717c0ba44f777</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.gapvax.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Katz-Kantor-Stonestreet--Buckner</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30211</link>
<guid>0fb14adee231d12b0f1465448626e6f7</guid>
<pubDate>Tue, 03 Mar 2026 19:42:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>Katz-Kantor-Stonestreet--Buckner</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f675bbcff209c6c94202a3fb000726508a07a737e05b6809c7466768b4b60f02</i><br /><br />Threat actor <b>description</b>: <i>Katz, Kantor, Stonestreet & Buckner serves all of West Virginia with compassionate and zealous legal representation built on decades of experience. Established in 1931, our firm has been representing clients from Bluefield, Princeton, Beckley, Welch, Lewisburg, Charleston, Morgantown, and all areas in between in West Virginia for over 88 years.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Conklin-Office-Furniture</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30208</link>
<guid>2947f6c206cc56866a88cc47130625d7</guid>
<pubDate>Tue, 03 Mar 2026 19:40:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Conklin-Office-Furniture</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>544fd82ea7b22dcb3b1e4fcb61d439fa08bbcc4bfe1f2b0ea80a89b07a6513ba</i><br /><br />Threat actor <b>description</b>: <i>Furniture</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>JBC-Computers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30209</link>
<guid>0f47d8af9d0abe580c26d8551f4071f1</guid>
<pubDate>Tue, 03 Mar 2026 19:40:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>JBC-Computers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce0ed46dde81cabba623f883d0046c0cc668a37784be8f755589cf37a628ce0e</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.chrishudsonlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30210</link>
<guid>c01afd54a92fec65ed6d29f568cebd48</guid>
<pubDate>Tue, 03 Mar 2026 19:39:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>www.chrishudsonlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>556b9c0379abd7ce9f5bbda13086919f16bc9dfe5197bda7a46d73bacbf01c17</i><br /><br />Threat actor <b>description</b>: <i>At Chris Hudson Law Group, we value the attorney-client relationship and understand that being an injured party in an accident is a stressful and overwhelming experience — things are even worse if there is a permanent disability or if a death occurs. We're here to help you recover and move past this difficult time.</i><br />Target victim <b>website</b>: <i>www.chrishudsonlaw.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Encompass</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30199</link>
<guid>f164ba76f5fba1522bfbb098c4597aa6</guid>
<pubDate>Tue, 03 Mar 2026 16:41:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Encompass</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>39e129e1178c0a067564b6310cc4182ea921e39cd200df854647b7a108630955</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2001 and headquartered in Clarksville, Virginia, Encompass Solutions is a preferred Epicor partner and Value-Added Re-seller (VAR), that delivers mis...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Belmont-Plastic-Surgery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30201</link>
<guid>5e5c6be7a4b64ead7fe95a284e013e18</guid>
<pubDate>Tue, 03 Mar 2026 15:14:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Belmont-Plastic-Surgery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbe1b5a850f9601d5e2023bb97e08afeca4070673a248a16b1b2214617531f2c</i><br /><br />Threat actor <b>description</b>: <i>Belmont Plastic Surgery, led by award-winning surgeon Dr. Jules Feledy, offers comprehensive cosmetic and reconstructive procedures. The practice specializes in breast augmentation, body contouring, and facial rejuvenation, delivering natural-looking.</i><br />Target victim <b>website</b>: <i>www.belmontplasticsurgeryva.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>maisonlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30200</link>
<guid>b453b5a7a737a3fc489fa11aaac1618b</guid>
<pubDate>Tue, 03 Mar 2026 15:11:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>maisonlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7ced33d267930c245f4dec0b5e1134f2d4d02fbf473ccae5a22eb9a95db07559</i><br /><br />Threat actor <b>description</b>: <i>Maison Law provides skilled, experienced, and personalized legal guidance to the voiceless and the injured in the Central Valley.</i><br />Target victim <b>website</b>: <i>maisonlaw.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aaronson-Rappaport-Feinstein--Deutsch</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30195</link>
<guid>f14e3a6ee7be3b52ad152791d821faa5</guid>
<pubDate>Tue, 03 Mar 2026 09:46:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>Aaronson-Rappaport-Feinstein--Deutsch</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9896d0efbd69becf09fa9e3a2e35b62f3bcd9875e60e21a04bcd04bf8e14d9f4</i><br /><br />Threat actor <b>description</b>: <i>Aaronson Rappaport Feinstein and Deutsch, LLP is a New York-based law firm that specializes in providing legal services across various practice areas, including medical malpractice, construction litigation, and product liability.</i><br />Target victim <b>website</b>: <i>arfdlaw.com</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dallas-Regional-Chamber</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30194</link>
<guid>3a9aa4b8be741e21ba9f80b3c3684ce5</guid>
<pubDate>Tue, 03 Mar 2026 09:46:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>Dallas-Regional-Chamber</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>abff07c72c0ad297a7ff49e7a27259e1ac2142237c7a93632be1851e048074e3</i><br /><br />Threat actor <b>description</b>: <i>The Dallas Regional Chamber is a prominent business organization known for its role as the economic growth champion and business voice of the Dallas region.It focuses on priorities such as economic development, education, public policy, and quality of life.</i><br />Target victim <b>website</b>: <i>dallaschamber.org</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>ShopBot-Tools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30193</link>
<guid>de81daf004a31370f811e649f9a6252a</guid>
<pubDate>Tue, 03 Mar 2026 09:45:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>ShopBot-Tools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>926e98e931f1f46e7bf60c03259c30a150ea9a88ef35e50560e1e04d90323c93</i><br /><br />Threat actor <b>description</b>: <i>ShopBot Tools is a leading manufacturer of high-quality CNC routers, designed for machining various materials including wood, plastic, and aluminum.</i><br />Target victim <b>website</b>: <i>shopbottools.com</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Navicore-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30192</link>
<guid>a154ffbcec538a4161a406abf62f5b76</guid>
<pubDate>Tue, 03 Mar 2026 09:45:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>Navicore-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>49ab8758e44fe1f3fcf9c25ccf53d6b125773fe2a3d8fac9af323dcd8adec2be</i><br /><br />Threat actor <b>description</b>: <i>Navicore Solutions strengthens the well-being of individuals and families through education, guidance, advocacy and support.</i><br />Target victim <b>website</b>: <i>navicoresolutions.org</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Professional-Retail-Outlet-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30191</link>
<guid>453129ee88ee891d1b7581e77eafac40</guid>
<pubDate>Tue, 03 Mar 2026 09:44:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>Professional-Retail-Outlet-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a2d8c2a00442d5c277a39d11d0b45ba772ed1f5fec1987fe0cbd3bdff021495f</i><br /><br />Threat actor <b>description</b>: <i>PROS specializes in facilities management and maintenance services for specialty retail chains, boasting 20 years of experience.</i><br />Target victim <b>website</b>: <i>proservicecall.com</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>SR-Compression-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30190</link>
<guid>fe4edcd654c99506f068af26a2c525c5</guid>
<pubDate>Tue, 03 Mar 2026 09:44:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>SR-Compression-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f4b0598f930ebd0277027e4898fe0f79c6fd2e236493c6503bdb961c7bd116c1</i><br /><br />Threat actor <b>description</b>: <i>S&R Compression is an oil & energy company offering compression and vapor recovery services.</i><br />Target victim <b>website</b>: <i>sandrcompression.com</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Emanuelson-Podas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30189</link>
<guid>0623815a789c473725fe584c43c777e9</guid>
<pubDate>Tue, 03 Mar 2026 09:44:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>Emanuelson-Podas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>289783c81f364caa0c7acf0375c95dcaf88fd59221f3fa9f83fe286d14a516c9</i><br /><br />Threat actor <b>description</b>: <i>Emanuelson-Podas, Inc. is a mechanical, electrical, and plumbing engineering firm that specializes in creating innovative building system solutions.</i><br />Target victim <b>website</b>: <i>epinc.com</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Promotion-Management-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30187</link>
<guid>929a74e4471269c813c699a00168c37e</guid>
<pubDate>Tue, 03 Mar 2026 09:43:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>Promotion-Management-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a479b3d720ab0291c8c96c4dbc69b26728643e1de8f25e7e3644c95589d02069</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1983, Promotion Management Center, Inc. (PMC) provides fulfillment services.The company specializes in customer incentives, loyalty rewards, employee recognition awards, rebates and third party logistics (3PL) orders your programs generate.</i><br />Target victim <b>website</b>: <i>pmci.com</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sterling-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30186</link>
<guid>ac67dfce0ec1c3d113cfe8f34fffb366</guid>
<pubDate>Tue, 03 Mar 2026 09:42:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>Sterling-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2867232486718b2b5cc5df52731022ed31d8af14f4bebc433b7d2c9125816f6d</i><br /><br />Threat actor <b>description</b>: <i>Sterling Industries is a North American-based contract manufacturer and assembler of medical devices and sub-components.</i><br />Target victim <b>website</b>: <i>sterlingindustries.com</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Raw-Seafoods</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30185</link>
<guid>9022449a6088c336116c9b5fe457c700</guid>
<pubDate>Tue, 03 Mar 2026 09:42:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>Raw-Seafoods</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4169cac4708c8bd1e396a50c7b926d074a2742d5561d59a9ced9f5b04012e3a9</i><br /><br />Threat actor <b>description</b>: <i>Raw Seafoods, Inc. is a family owned and operated company in Fall River, Massachusetts dedicated to providing our customers with exceptional products, and service.We specialize in fresh and frozen scallops, fish and value-added food solutions.</i><br />Target victim <b>website</b>: <i>rawseafoods.com</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lewis-Drug</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30183</link>
<guid>50a0eaaf3cd93fa86551c7112c259a3a</guid>
<pubDate>Tue, 03 Mar 2026 09:41:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>Lewis-Drug</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b0e0df385e8b4efe16141da1d64508c7c60d26abfc90dbb3c73c87d480c36ed</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1942, Lewis Drug owns and operates a chain of drug and pharmacy stores.It provides prescription and non-prescription drugs.</i><br />Target victim <b>website</b>: <i>lewisdrug.com</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>HomeSite-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30182</link>
<guid>c42af68f28d516c05caf4ef35a6c4b0c</guid>
<pubDate>Tue, 03 Mar 2026 09:41:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>HomeSite-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>244a77058058d0bad501f0c68116c55d6334f7c94a2bcc2265dd239d71a5033d</i><br /><br />Threat actor <b>description</b>: <i>HomeSite Services Inc., a residential, commercial and retail services company, was founded in 2005 with three goals in mind:to perform superior work, offer quality products, and provide our clients with unbeatable service.</i><br />Target victim <b>website</b>: <i>homesiteservices.net</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Revival-Animal-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30181</link>
<guid>e02476ced92efdc385c3fca2c0de05fd</guid>
<pubDate>Tue, 03 Mar 2026 09:41:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>Revival-Animal-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>746cebe04e33f8f71076aaa17359c20e0d6971d0e54589087ce69dd9a0857136</i><br /><br />Threat actor <b>description</b>: <i>Revival Animal Health was founded in 1989 by Dr. Roy Nielsen, Jr., affectionately known as "Doc Roy."Quickly the company expanded from pet vaccines to an extensive line of pet healthcare products.</i><br />Target victim <b>website</b>: <i>revivalanimal.com</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Integral-Analytics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30179</link>
<guid>77161bf6b433fd5a7d8f2b6da38384d9</guid>
<pubDate>Tue, 03 Mar 2026 09:40:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>Integral-Analytics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fb1b413bd7b34a6dad443ed87656be2fb5c0e668d756bb403cdd68afa36f9b1a</i><br /><br />Threat actor <b>description</b>: <i>Integral Analytics specializes in data intelligence solutions for the energy sector, focusing on improving planning and forecasting for utilities, producers, manufacturers, and regulators.Their flagship products include LoadSEER, DSMore, and IDROP, which assist in energy efficiency, demand response, and distributed energy resource management.</i><br />Target victim <b>website</b>: <i>integralanalytics.com</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>IOTA-HOTEL-TBILISI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30178</link>
<guid>135781112da49675bbf837615b1ac977</guid>
<pubDate>Tue, 03 Mar 2026 08:46:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>IOTA-HOTEL-TBILISI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e472eda711cee4b578ab495028c7ee03b22901f3cbf3e35e81390bead2294c47</i><br /><br />Threat actor <b>description</b>: <i>- VIP Lists- Invoices, Passport...- Financial Documents</i><br />Target victim <b>website</b>: <i>iotahotels.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Andal-Law-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30177</link>
<guid>fdacbbcc2ed7e3b738dd9b305a9f0515</guid>
<pubDate>Tue, 03 Mar 2026 05:09:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Andal-Law-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a02be1b8e01f4fa18f3235862e6a23d48dfb1339b2557eb598028b7311752f4a</i><br /><br />Threat actor <b>description</b>: <i>Injury accident law firm data breach: driver IDs and other personal data.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Woflow-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30176</link>
<guid>bc6c8ec976e7e344ee61d0d2bd54838b</guid>
<pubDate>Tue, 03 Mar 2026 04:46:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Woflow-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ad4292843df06c25ddfac687f452a97579f058e29f0d8196b8243b36660f4d5</i><br /><br />Threat actor <b>description</b>: <i>Several hundreds of millions of records containing PII, transaction/order data, other internal corporate data, and a lot more (you don't want us to say publicly) have been compromised. This is a final warning to reach out by 05 Mar 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 03 Mar 2026 | Warning: FINAL WARNING</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bartram-Trail-Surveying</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30174</link>
<guid>3384c1784cc82c0416e1d66d0f38baaf</guid>
<pubDate>Tue, 03 Mar 2026 02:21:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>termite</b> claims attack for <b>Bartram-Trail-Surveying</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac5674e37134cba16e457fc4fb1c0627c380c00f66fea6a2662894545c6d225d</i><br /><br />Threat actor <b>description</b>: <i>Bartram Trail Surveying, Inc. is a Florida licensed land surveying company that specializes in providing accurate and precise land surveying services across the state. Utilizing state-of-the-art technology, including drone surveying, LiDAR, and GIS, they cater to builders, engineers, and clients involved in land development projects. 
</i><br />Target victim <b>website</b>: <i>www.bartramtrail.net</i>]]></description>
<category>termite</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lundeen-Consulting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30171</link>
<guid>c625cd198573c817ebd635325e37cad0</guid>
<pubDate>Mon, 02 Mar 2026 23:37:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Lundeen-Consulting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04d181aacd59925b79f0f9e5eaaa24366809c69bb06a2ff4140d9b3bcc84b6bb</i><br /><br />Threat actor <b>description</b>: <i>Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bayshore-Ford-Truck-Sales</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30173</link>
<guid>9181303866f74e72f4b4b39ffbd6a330</guid>
<pubDate>Mon, 02 Mar 2026 23:37:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Bayshore-Ford-Truck-Sales</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a0332e2673f24633428610153449149b915e6525246003d00dcd4e8bb5e4cbb7</i><br /><br />Threat actor <b>description</b>: <i>Automotive Parts</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>GordonClifford-Realty</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30170</link>
<guid>376557cb7cd4da934b134a58709022a3</guid>
<pubDate>Mon, 02 Mar 2026 21:50:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>GordonClifford-Realty</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad48abe0790676dc332f53e22b603bbbd509843c3a6318b4278eaa9313243eba</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.gordoncliffordmanagement.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Kuker-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30168</link>
<guid>9f365ac1b27ce95a3f99bdcc68420756</guid>
<pubDate>Mon, 02 Mar 2026 21:49:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>The-Kuker-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>484e324deee276875728a983653d3c54f8e438cad3d4fa1b5db79f1d1afea0c1</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ohklegal.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>LRA-Constructors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30167</link>
<guid>865476c5e0cd0523e326757deceaae4a</guid>
<pubDate>Mon, 02 Mar 2026 21:49:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>LRA-Constructors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>614bccf2a88e5393418467575b6b4f057b8bfd629cccccad6e09a6657925cbfe</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.lraconstructors.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cobblestone-Creek-Country-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30166</link>
<guid>fa7d9e789db0b0f053e0229ebc2aed0e</guid>
<pubDate>Mon, 02 Mar 2026 21:48:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Cobblestone-Creek-Country-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>faddbd7f6b89e5db58d8a9ee66266e8d9ecf866ad2a83763ce4509375f68b7b2</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.cobblestonecreekcc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Project-Consulting-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30165</link>
<guid>4b794d8229db8f33a386b3cbba9eeeee</guid>
<pubDate>Mon, 02 Mar 2026 21:47:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Project-Consulting-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e80dd05a4e0f5509f9dd90c552422fad4f4d938fa08e719a819e546be7f924fa</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.projectconsulting.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Go-Professional-Cases</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30164</link>
<guid>a26508d81dd3592b9b8dd27bf8c82e80</guid>
<pubDate>Mon, 02 Mar 2026 21:47:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Go-Professional-Cases</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>95d532de1bfb94123c881284ecb4d29df51541741cfc5160c29786aadbe6f696</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.goprofessionalcases.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>WCC-Technologies-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30163</link>
<guid>e85ca00d008a532279b798033d59a4c7</guid>
<pubDate>Mon, 02 Mar 2026 21:46:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>WCC-Technologies-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e78328988a70f05d056b62fedaf2d96bb8969a8cad02123329ffabc012a49ad</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.wcctechgroup.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Favaro-Lavezzo-Gill-Caretti</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30162</link>
<guid>4727afc79cd3e723f90b611df73a8b8d</guid>
<pubDate>Mon, 02 Mar 2026 21:46:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Favaro-Lavezzo-Gill-Caretti</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff5cd8792a03deae0eb0324cf0b31452d2ae6ed109c9138956c9aafc5bf21a13</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.flgch.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>IDH-Entertainment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30158</link>
<guid>53d57871ab3fc4405f05229e639f166c</guid>
<pubDate>Mon, 02 Mar 2026 20:38:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>IDH-Entertainment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>74a89f4cbcd146174f5de47e1228c4b49624298d0d3614688ac5aa1c7346e69d</i><br /><br />Threat actor <b>description</b>: <i>Advertising & Marketing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpswww.precisioncoating.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30156</link>
<guid>da36dbd22af21eca8661ff099dfb95b3</guid>
<pubDate>Mon, 02 Mar 2026 18:36:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>httpswww.precisioncoating.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e464bda23b82a3e32422b8b6e31c663cfcfe2baef59a601a7c1d65c2ffeae2b</i><br /><br />Threat actor <b>description</b>: <i>All their developments, technologies, patents, data from other companies, please pay attention to the company that bought these technologies for 150 million, everything important was stolen - photo and video components   Founded in 1969, Precision Coating provides high-tolerance coating and specialized metal-finishing services to the medtech industry for applications including vascular, endosurgical, and orthopedic instruments and devices. The GlideLine family of medical device coating finishes is the broadest offering of applied fluoropolymer (PTFE) coatings in the industry, customized to optimize the design, quality, and performance characteristics of high-quality medical products. InfiNiTiCoat is Precision Coating's proprietary low-temp cure process, optimized for coating performance on nitinol devices; specifically optimized to preserve the desired characteristics of nitinol in wire, strip, and tube forms. PCCI has unique process control over challenging nitinol handling, coating, and curing. The MICRALOX® portfolio of chemistries offers superior patented aluminum oxide coatings with a microcrystalline barrier that revolutionizes aluminum anodizing with exceptional barrier properties and corrosion</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bain-Oil-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30155</link>
<guid>ae8970f7d83581427155bc725c003594</guid>
<pubDate>Mon, 02 Mar 2026 18:06:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Bain-Oil-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de53f10b894ce3f328fca35aea61cbc55e8b188bbaf401962dba4d2af71b084c</i><br /><br />Threat actor <b>description</b>: <i>Data is not available now.</i><br />Target victim <b>website</b>: <i>www.bainonline.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>SIMETRI-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30154</link>
<guid>1daf6cfb21ba43954310a6dd338d0416</guid>
<pubDate>Mon, 02 Mar 2026 18:06:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>SIMETRI-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>825256763670bab515869adbca87afdc796abd4aafd23d5d40b7f44c902d7c4a</i><br /><br />Threat actor <b>description</b>: <i>Data is not available now.</i><br />Target victim <b>website</b>: <i>simetri.us</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Martin-Cukjati--Tom-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30153</link>
<guid>42cae009aa36f970c223de2959268e5a</guid>
<pubDate>Mon, 02 Mar 2026 16:31:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Martin-Cukjati--Tom-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e30597b924df26a2e57d7a6925cc6de4466a13f8d747ecd875462b33d2b3280</i><br /><br />Threat actor <b>description</b>: <i>Martin Cukjati & Tom, LLP is a full service law firm with over 75 years of combined legal experience representing people and businesses in high-stakes litigation. The cornerstone of our success is limiting our case load and dedicating ourselves to serving a select few clients, making sure your case receives the attention it deserves. This allows us to focus on our clients, and work towards achieving the best possible outcome.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southold-Town-Senior-ServicesSouthold-Police-Department</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30150</link>
<guid>983379e5eacf56a55f44720792d81bc2</guid>
<pubDate>Mon, 02 Mar 2026 09:42:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Southold-Town-Senior-ServicesSouthold-Police-Department</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>990752be420967ef65f20a3c6228f0c00fb867a7a84e7471c2a937a2c12b0894</i><br /><br />Threat actor <b>description</b>: <i>Southold Town Senior ServicesSouthold Police Department The Town of Southold, New York provides various government services including forms and permits, online payments, and notifications for residents. Southold Police Department is a company that operates in the Local industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Seal-Beach-and-Seal-Beach-Police-Department</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30144</link>
<guid>a70f6138de778744f7b767b618b5d52d</guid>
<pubDate>Sun, 01 Mar 2026 20:44:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>City-of-Seal-Beach-and-Seal-Beach-Police-Department</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd9703d69d9ee25aeb633f76f1340bdfd1e188860b487384b2b39980082e2c83</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.sealbeachca.gov</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Enterprise-Network-Group-of-Indiana</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30135</link>
<guid>a00ba776735f6e27e0619d46a07be9d3</guid>
<pubDate>Sun, 01 Mar 2026 20:42:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Enterprise-Network-Group-of-Indiana</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab7194b869104adb078749ec80230574d93654963ad33beae9831013c58667a5</i><br /><br />Threat actor <b>description</b>: <i>Electronics</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>denmark.k12.wi.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30143</link>
<guid>f9ae0edbbb69c65b4ba6a4df582eb206</guid>
<pubDate>Sun, 01 Mar 2026 20:11:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>denmark.k12.wi.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e34654e0089413ea17c5e5132ab3e8475aa4cd3ed4840d9fb2d349ba197b4da1</i><br /><br />Threat actor <b>description</b>: <i>Denmark High School is a company that employs 100to249 people and has 10Mto25M of revenue. The company is headquartered in Denmark, Wisconsin. Employees: 200  Revenue: $18.2 Million Industry: Education  Phone Number: (920) 863-4200</i><br />Target victim <b>website</b>: <i>denmark.k12.wi.us</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>abramssales.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30142</link>
<guid>b056f5d60446a5d5ca7fba949cae3cfa</guid>
<pubDate>Sun, 01 Mar 2026 20:10:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>abramssales.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8265fdcf5d2bb388897c9959cae5e7a6f4184784dbbd3156124a0adc69582a73</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2001, Abrams Architectural Products, Inc. is a leading distributor, fabricator, and installer of architectural metals, particularly aluminum composite material cladding systems. They collaborate with architects and general contractors to ensure their visions are realized through quality products, expert solutions, and tailored services. Their product offerings include a variety of architectural metal systems for both exterior and interior cladding, catering to projects of various sizes and complexities. With a strong reputation for excellence, they serve a diverse range of clients across the United States, providing top-tier general contracting services in fields such as airports, museums, and medical centers. Employees: 50  Revenue: $5.3 Million Industry: Architecture, Engineering & Design  Phone Number: (770)745-8728</i><br />Target victim <b>website</b>: <i>abramssales.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Special-Shapes-Refractory</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30136</link>
<guid>cb804af641d900ffe033193d2b7c4a84</guid>
<pubDate>Sun, 01 Mar 2026 19:21:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Special-Shapes-Refractory</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f3adb95409148c3b968edc239765afdc16c291b5213bbcdd8a8d0474c1e20d08</i><br /><br />Threat actor <b>description</b>: <i>ssrco.com zoominfo.com/c/special-shapes-refractory-company-inc/1132759207 Special Shapes Refractory Company (SSRC) is a leader in providing high-quality precast shapes and monolithic materials primarily for the glass, steel, and other industrial manufacturers. They focus on minimizing downtime and enhancing equipment reliability through innovative solutions, efficient manufacturing processes, and a commitment to customer service. SSRC caters to a wide range of industrial clients, offering customized refractory solutions and quick lead times. With decades of experience, they emphasize the importance of using pure raw materials to ensure the best product quality and performance</i><br />Target victim <b>website</b>: <i>ssrco.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Riach-Gese-Jacobs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30127</link>
<guid>1157b03c64072655b2490a18963fae1a</guid>
<pubDate>Sun, 01 Mar 2026 11:42:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Riach-Gese-Jacobs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ed0ad916c69c60ba3050bd932f474ba74db301ab61e8ca5d2551e6dfca34728</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Schmuck-Welt</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30110</link>
<guid>2cc0b255c4894762e17aad3059ce2dcb</guid>
<pubDate>Sat, 28 Feb 2026 20:39:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Schmuck-Welt</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2cca09fe3625cda8db695975e2bae18c27fc5213f05031dbe1720a310424c3a0</i><br /><br />Threat actor <b>description</b>: <i>Retail · Pennsylvania</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pro-Plastics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30112</link>
<guid>330bb1faa22252b4be21c91c92a697e9</guid>
<pubDate>Sat, 28 Feb 2026 20:39:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Pro-Plastics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d68d7c2df6c4e4e753bbfaf077aa7e8b4f3d526cc445ff876ab169b1d6c4070e</i><br /><br />Threat actor <b>description</b>: <i>Manufacturing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>North-Andover-Country-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30113</link>
<guid>14b9130e6dbe8185cb68fa211921a335</guid>
<pubDate>Sat, 28 Feb 2026 20:39:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>North-Andover-Country-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cf76db0870e4cc0851a840e06a2588da02f9096f52d0734b2c2463a06432807d</i><br /><br />Threat actor <b>description</b>: <i>Advertising & Marketing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>PriceTable</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30107</link>
<guid>d8591042aaf8c8d8b53b7e43085a0587</guid>
<pubDate>Sat, 28 Feb 2026 14:30:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>PriceTable</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>139acebf6b95bc2803428bf8be3d3b46b542bc9659513053a94e94160cd09514</i><br /><br />Threat actor <b>description</b>: <i>Data is not available now.</i><br />Target victim <b>website</b>: <i>pricetable.io</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>hicare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30106</link>
<guid>737344cccb5f89b59a89a5f20cc3f303</guid>
<pubDate>Sat, 28 Feb 2026 14:30:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>hicare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>005d5f544e2a60e24225772e4f3ed71acf498df47b3e9a06b2307162b0092ff7</i><br /><br />Threat actor <b>description</b>: <i>Data is not available now.</i><br />Target victim <b>website</b>: <i>www.hicare.net</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>GoHighLevel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30105</link>
<guid>25ba6ebb3e470993540ebc62e98a51e2</guid>
<pubDate>Sat, 28 Feb 2026 14:30:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>GoHighLevel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aaaf1b003389b775e6e5144c7f666afe028bda3c3b631b51d6fdf0a67c899cfb</i><br /><br />Threat actor <b>description</b>: <i>Data is not available now.</i><br />Target victim <b>website</b>: <i>www.gohighlevel.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Whipflip</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30104</link>
<guid>7ca595cd7955654b36629c1470763487</guid>
<pubDate>Sat, 28 Feb 2026 12:59:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Whipflip</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>74c9459b6e8218371275ccf83a027e2bb7a8793753891fbdc712442f7ea13257</i><br /><br />Threat actor <b>description</b>: <i>Data is not available now.</i><br />Target victim <b>website</b>: <i>www.whipflip.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aegis-Project-Controls</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30103</link>
<guid>3e95b38ce315f12892dee0121e6fad4a</guid>
<pubDate>Sat, 28 Feb 2026 12:29:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Aegis-Project-Controls</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29d07f12a35ce644bf02796d1052a71812f99e5c22f060781e00df434575e1a0</i><br /><br />Threat actor <b>description</b>: <i>Aegis Project Controls is a construction company providing 4d scheduling, training, and construction scheduling services. 
214GB of files, projects, and documents that threaten US national security. These include projects on military-critical facilities (Space Fence, Nitrocellulose Facility, etc.), biosecurity laboratories (USAMRIID), critical infrastructure facilities, and others. We know you didn't contact the FBI after the attack on your infrastructure, but now the FBI will come to you. We advise you to contact us immediately; your IT department knows how. You have 15 days before this data is made public. 
Dear David J. Hatwell (+1 269-673-8962, +1 360-918-3187, +1 240-331-0437), we promise you public shame and the destruction of your company if you don't pay. Time has begun.</i><br />Target victim <b>website</b>: <i>www.consultaegis.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Skibiel-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30102</link>
<guid>92945505a99aea57f8d9a7fc2f739595</guid>
<pubDate>Sat, 28 Feb 2026 10:05:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Skibiel-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fb61ef502dbd9e1ed44ccf2b5870d8027db7ef910303d25f9b9db8267f9f403b</i><br /><br />Threat actor <b>description</b>: <i>Georgia Work Injury And Personal Injury Lawyers</i><br />Target victim <b>website</b>: <i>skibiellaw.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rockwood-Retirement-Communities</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30094</link>
<guid>69908a3ae9144cf4918985a785114a46</guid>
<pubDate>Fri, 27 Feb 2026 23:16:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>Rockwood-Retirement-Communities</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>675f41d186501c59a01795dd71f6e5e58e2bbe01578f3b58bfff1b880767f727</i><br /><br />Threat actor <b>description</b>: <i>With more than 65 years of mission-driven nonprofit service and two thriving Life Plan communities in Spokane, Washington, Rockwood Retirement is the recognized leader in senior living in the Inland Northwest. Our vision is simple: to create caring retirement communities that enrich the lives of seniors, every day.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Plaza-Home-Mortgage</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30093</link>
<guid>9f5f53f37396a3c5c13d76d62b5edaab</guid>
<pubDate>Fri, 27 Feb 2026 21:18:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Plaza-Home-Mortgage</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>61df6bc02dfbed748b0bdba2b8386f8cfe490f32ca115ef7be12b2822cafffd5</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2000, Plaza Home Mortgage offers conventional fixed-rate, conventional ARM, FHA, and VA loa…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>US.MAD-DOG-CONSTRUCTION</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30092</link>
<guid>4daf3131a3b73237edccfc5c6acbd7ad</guid>
<pubDate>Fri, 27 Feb 2026 17:39:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>US.MAD-DOG-CONSTRUCTION</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1c10fe91fc57bcd94a6265e6fba96792a12349bf2e4a195033003b709647b34</i><br /><br />Threat actor <b>description</b>: <i>Data is not available now.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Two-River-Group-Holdings-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30091</link>
<guid>37654b793d96ed06d8c2bfa60658a502</guid>
<pubDate>Fri, 27 Feb 2026 16:47:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Two-River-Group-Holdings-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c778b6f5bbb078c5e8849da817c5c7aa2e0552c11ae54f32ce3308cb64fd3f8a</i><br /><br />Threat actor <b>description</b>: <i>Two River specializes in founding, building, and incubating companies in the life sciences sector that…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nations-Financial-Group-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30090</link>
<guid>1dc907539dc8fc57e6b3cbf1a276ccce</guid>
<pubDate>Fri, 27 Feb 2026 16:47:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Nations-Financial-Group-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0aed07c208c7126eb3b00a4abd518868c22170a453742f4b4bb814182acd591</i><br /><br />Threat actor <b>description</b>: <i>Above all else, Nations is committed to providing the highest level of support and assistance to its f…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>HEMIC---Hawaii-Employers-Mutual-Insurance-Co</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30089</link>
<guid>0fff885ae427e3adae25dbb31251470c</guid>
<pubDate>Fri, 27 Feb 2026 16:47:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>HEMIC---Hawaii-Employers-Mutual-Insurance-Co</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c20d926d8f568a7eb03c4895cb31518ca93fb128b8102201174f77a410c1f6db</i><br /><br />Threat actor <b>description</b>: <i>HEMIC, founded in 1996 and located in Honolulu, Hawaii, is a company that specializes in worker's comp…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hrp-Hitesh-Cpa</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30087</link>
<guid>e31003304da364867f1dce3be564fb7a</guid>
<pubDate>Fri, 27 Feb 2026 16:40:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Hrp-Hitesh-Cpa</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7dd35710ba325328af65f865a964de9925d25d4c491ac96ae35811a115cd59e</i><br /><br />Threat actor <b>description</b>: <i>HRP HITESH CPA PC specializes in providing cloud-based payroll and accounting services to business clients. The firm leverages advanced technology to automate payroll processes, compliance filing, and payroll taxes, ensuring a user-friendly experience.We will upload corporate data soon. Lots of clients data, financials, forms, a bit of personal information and more.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ace-Ethanol</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30076</link>
<guid>6b18d371703cf5221bc39c1a03a3be64</guid>
<pubDate>Fri, 27 Feb 2026 14:42:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Ace-Ethanol</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>01b00523a0704c4e7883a31df56c237a5d6e8dd33dfc71353b6197861003a046</i><br /><br />Threat actor <b>description</b>: <i>Ace Ethanol LLC serves as a marketing resource for corn producersin northwestern Wisconsin, focusing on the production of ethanol, dried distillers grains, and corn oil. The company aims to contribute to national energy freedom while ensuring improved efficiencies and environmental safety.We will upload 15gb of corporate data soon. Employee files (SSNs,w9 forms and so on), specifications and projects, chemical recipes, financials, lots of HR files, partner's files, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Land-and-Lakes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30082</link>
<guid>28d89ee0086b8d5e875b59d3338f3d3a</guid>
<pubDate>Fri, 27 Feb 2026 14:34:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Land-and-Lakes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f97deb293650ea1d0ef011effa797653b90c56f2f11694533213cef32475438</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.land-and-lakes.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Unisoft-Communications</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30079</link>
<guid>68c20262d2657796f56d2101e46b3e73</guid>
<pubDate>Fri, 27 Feb 2026 13:48:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Unisoft-Communications</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96d7366d9b1fd4d8b45b35949392907cdedbe735ddaa7f5de96faddd58a7a91e</i><br /><br />Threat actor <b>description</b>: <i>Unisoft Communications, Inc. specializes in developing advanced c
ommunication software solutions for the non-standard Property and
Casualty Insurance industry. With over 40 years of experience th
rough its sister company, Unicorp Data Processing, Inc., the comp
any addresses the communication challenges faced by insurance com
panies, premium finance companies, and their agents.

We will upload 31gb of corporate data soon. Employee data, client
s' data, financials, lots of contracts and agreements and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Accelerated-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30077</link>
<guid>a1b2e04c65e8fa74ba1e50a429b828ca</guid>
<pubDate>Fri, 27 Feb 2026 13:08:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Accelerated-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>efcb439a2515dc2e1f20fdf860d90cf5738d27c5039aa2c983fc0130c404b952</i><br /><br />Threat actor <b>description</b>: <i>Allied H.V.A.C. Inc. (Accelerated Services, Inc.) is a full-service HVAC provider specializing in commercial and residential installation, maintenance, and repair. The company delivers year-round comfort and indoor air quality solutions to clients throughout Suffolk and Nassau Counties, Long Island, NY, supported by 24/7 emergency service.</i><br />Target victim <b>website</b>: <i>www.acceleratedhvac.com</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Com-Tec</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30073</link>
<guid>319b2600b8defbf79afcb125d55ff9c7</guid>
<pubDate>Fri, 27 Feb 2026 12:22:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Com-Tec</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1b2ecc02202d96580b2acda2cdffbc6d482541f2a020bf31863019109d7c69a</i><br /><br />Threat actor <b>description</b>: <i>Com-Tec Communications specializes in structured network cabling 
and offers tailored technology solutions for businesses in Orange
County and Lake Forest, California. Their services include telec
om VOIP, surveillance systems, Wi-Fi improvements, network infras
tructure, and audio-visual enhancements to boost productivity and
security.

We will upload 70gb of corporate data soon. Employee files (passp
ort and DL scans, i-9 forms and so on), specifications and projec
ts, financials, confidential files, HR files, client and partner 
files, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Beauty-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30072</link>
<guid>08eac1d7ee7ce0f8c4a4d22ba0c72f03</guid>
<pubDate>Fri, 27 Feb 2026 12:22:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>American-Beauty-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ae4a752eefa44eef41145c9a28a1186ec26bb12865949eec77079584a7004a52</i><br /><br />Threat actor <b>description</b>: <i>American Beauty School, established over 50 years ago, offers div
erse and innovative educational opportunities in cosmetology, nai
l specialty, and esthetics. Located in the Bronx, NYC, the school
has built strong relationships with local salon and spa owners, 
providing hands-on experience and career support for its students
. 

We will upload corporate data soon. Employee files (passport and 
DL scans and so on), financials and other internal files.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lymphedema-Therapy-Specialists</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30071</link>
<guid>5c72c99424191cfd8ec2227b923c03d9</guid>
<pubDate>Fri, 27 Feb 2026 10:58:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Lymphedema-Therapy-Specialists</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6e45e8d875ff0a34f813348bfb17d57274702c3d752ffffcfdc0570d97f5183</i><br /><br />Threat actor <b>description</b>: <i>Lymphedema Therapy Specialists is a private outpatient clinic in Houston, Texas, specializing in the treatment of lymphedema through various therapies including manual lymph drainage, pneumatic compression therapy, and wound care. The clinic aims to assist patients in managing their symptoms by providing educational resources and tailored treatment plans. With experienced professionals on staff, they serve individuals suffering from lymphedema and associated conditions in the Houston area. Their mission is to alleviate suffering and support patients in their healing journey.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Law-Offices-Taenzer--Ettenson-P.C.-tesalaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30070</link>
<guid>48b508b64892bdf1d3a44e6de12e146a</guid>
<pubDate>Fri, 27 Feb 2026 09:31:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Law-Offices-Taenzer--Ettenson-P.C.-tesalaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e5281a57928d41d56f41ba331f1668893f35f9dca02543f6e945c4c3c70b1b8a</i><br /><br />Threat actor <b>description</b>: <i>TAENZER & ETTENSON, P.C. is well-prepared to effectively serve your personal and business legal needs with years of experience in the practice of law. Our accomplished, professional staff will: Provide you with expert legal advice Identify key issues in your case Maintain your confidentiality at all times Extend to you the personal service and attention you deserve We are dedicated to providing you with exceptional legal services.  Laek: 30GB  WE HAS COLLECTED SUCH DATA AS:  - Confidential documents  - Clients Data  - NDA  - Financial data  - Operations  - Corporate data  - Business Agreements  - Development  - Financial databases, all transactions, all clients And a lot of other VERY IMPORTANT information!</i><br />Target victim <b>website</b>: <i>tesalaw.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pathstone-Family-Office-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30066</link>
<guid>69fe9173086cb3761312feb26edacf6e</guid>
<pubDate>Fri, 27 Feb 2026 02:34:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Pathstone-Family-Office-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>908b0a3e62252782c3376f8fe9191a5a334dff748f435e117d6841802d362e34</i><br /><br />Threat actor <b>description</b>: <i>Over 641k records containing PII and other internal corporate data have been compromised. This is a final warning to reach out by 2 Mar 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 27 Feb 2026 | Warning: FINAL WARNING</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ripple-Neuro</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30064</link>
<guid>dde4952e3874b24df8091b3e4b62e501</guid>
<pubDate>Thu, 26 Feb 2026 21:33:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Ripple-Neuro</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>426152c50cd7a2b6a44cc06db9283e11d60b2e47ac984afde9998a3979e80cbc</i><br /><br />Threat actor <b>description</b>: <i>Ripple Neuro builds neuroscience research tools and medical devices for electrophysiology, offering portable wireless processors, implantable tech, and accessories for various models. They serve researchers in BCI, closed-loop stimulation, and wireless signal acquisition.</i><br />Target victim <b>website</b>: <i>www.rippleneuro.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Landmark-Rehab-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30062</link>
<guid>2c9aabda8931c46b74753eb6dd9136dd</guid>
<pubDate>Thu, 26 Feb 2026 20:35:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Landmark-Rehab-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3d55510b57634024e9bd9aeda74bea4c20c8c00c8d8fbfb28c500a2e87d75be</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.landmarkrehabgroup.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>BT-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30061</link>
<guid>d26cf5a5aa1c2999c8339d77fc3eed44</guid>
<pubDate>Thu, 26 Feb 2026 20:34:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>BT-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25f5a9a6bde7906d8fe4224eb03fa958d227fdf4f526a25a47f3c1877bc37eb4</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.btrefservices.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Integrity-Building</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30060</link>
<guid>3821223063bdae6ed4fc1703402ea917</guid>
<pubDate>Thu, 26 Feb 2026 20:33:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Integrity-Building</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53ef31b6029a877a8d566de6ccad1d9094e7d25ec9ec2c190d08a0f928a18e02</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ibcaz.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>ntic.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30053</link>
<guid>245149b06f14727ef0eb8c159cc246d6</guid>
<pubDate>Thu, 26 Feb 2026 17:24:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>ntic.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c5d5a4d38c163c223fca0929c37eb88bb1293fcf2038bc94419e03072b971b9</i><br /><br />Threat actor <b>description</b>: <i>Northern Technologies International Corporation (NTIC) is a specialty chemical company that develops and markets proprietary environmentally beneficial products and services focused on corrosion prevention and protection solutions. The company specializes in innovative rust and corrosion prevention…</i><br />Target victim <b>website</b>: <i>www.zoominfo.com/c/northern-technologies-international-corp/28033941</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Physicians-Clinic-of-Iowa</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30052</link>
<guid>d0ab3eaa2d0af7efe82a485a26fb2705</guid>
<pubDate>Thu, 26 Feb 2026 17:23:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Physicians-Clinic-of-Iowa</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3cbe05750a435f4fce89aaa9f7171665775779b08e91492f6d7779578dee0f17</i><br /><br />Threat actor <b>description</b>: <i>Clinic data breach: another example of negligence in a medical institution.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Thrash-Commercial-Contractors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30046</link>
<guid>e797b9be4cf8c1f1de10c2fba822e99a</guid>
<pubDate>Thu, 26 Feb 2026 16:04:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Thrash-Commercial-Contractors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f187ddfe60727decb4568f8410c6a711d8b974339d30807d1007bd4ff4dcf47</i><br /><br />Threat actor <b>description</b>: <i>Thrash is a Southeast commercial builder offering general contracting, construction management, preconstruction, and design-build. Known for detailed execution, clear communication, and strong client relationships across institutions and states.</i><br />Target victim <b>website</b>: <i>www.thrashco.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carlo-J.-Martina-P.C.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30042</link>
<guid>ee812d04b09fc5eab089f59baa8a6b2c</guid>
<pubDate>Thu, 26 Feb 2026 13:51:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Carlo-J.-Martina-P.C.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>809e128a7353c35f36dfdd4445fa93bdb5789bd2cb820c2bec10e9fb1a67d981</i><br /><br />Threat actor <b>description</b>: <i>Plymouth MI Divorce & Family Law Attorneys</i><br />Target victim <b>website</b>: <i>martinalaw.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Odom-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30041</link>
<guid>a83d567f09e542dbe66a7e1a9430504a</guid>
<pubDate>Thu, 26 Feb 2026 13:51:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>The-Odom-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>795f20d82c3e916ba871390685fc4c1ffa44a51e442d660ff99cc9236ce04158</i><br /><br />Threat actor <b>description</b>: <i>Representing individuals and businesses in matters related to easements, agreements, and zoning, including variances and appeals</i><br />Target victim <b>website</b>: <i>mecklaw.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>thinlinetech.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30039</link>
<guid>eb8957cfa91a0992d3570d7fac93cb8e</guid>
<pubDate>Thu, 26 Feb 2026 13:07:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>thinlinetech.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b298565e916b42636843c6ee25440561c1109dd721a6c6a6ad8d496a990554c2</i><br /><br />Threat actor <b>description</b>: <i>Thinline Technologies offers reliable IT consulting and expert computer and network support services to businesses in the Baltimore metro area.</i><br />Target victim <b>website</b>: <i>thinlinetech.com</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>milespartnership.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30038</link>
<guid>17a5521f02c96ba003e028f278e3ab15</guid>
<pubDate>Thu, 26 Feb 2026 08:32:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>milespartnership.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9336627b5a05b6fba748d8c91cbee7e34d1a2ddd3e3979f6a1a126d90851710a</i><br /><br />Threat actor <b>description</b>: <i>The company was founded in 2005 and is based in Sarasota, Florida. Miles Partnership offers destination marketing, digital marketing, print publishing, data management, mobile marketing, email marketing, and hospitality marketing.</i><br />Target victim <b>website</b>: <i>milespartnership.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Envirogen-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30037</link>
<guid>148d442971558088c915121f85c797b3</guid>
<pubDate>Thu, 26 Feb 2026 03:24:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Envirogen-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e9337f26e66c87518178ca0b57c199d34e64de3665c8302962197bbee0868e1a</i><br /><br />Threat actor <b>description</b>: <i>Major data breach of Engineering firm with high-profile clients.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zaner-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30032</link>
<guid>2f96a08bf9fecb843023a3f94a8ddf9d</guid>
<pubDate>Wed, 25 Feb 2026 15:09:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Zaner-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45d9bc02cade5ddeec410207c8c61b95ed8290f28409a9b7e134161bb0535218</i><br /><br />Threat actor <b>description</b>: <i>Zaner, a family-owned brokerage since 1980, provides global commodities risk-management, advisory, research, and trading tech. Serving futures, metals, currencies, energies and agriculture, they offer hedging, precious metals solutions, competitive pricing.</i><br />Target victim <b>website</b>: <i>www.zaner.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jones-Haber</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30030</link>
<guid>e05baf3e0c3214593c5ee81af5917770</guid>
<pubDate>Wed, 25 Feb 2026 14:30:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>termite</b> claims attack for <b>Jones-Haber</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>01dff60c16d96808af5cfa396c82529cf6a8bbbf1f55091e8846fff1aed00f8b</i><br /><br />Threat actor <b>description</b>: <i>Jones, Haber &amp; Rollings is a multi-service law firm based in Cape Coral, Florida, with over 75 years of combined legal expertise. Established in 1988, the firm provides comprehensive legal counsel across various practice areas throughout the state of Florida. 
</i><br />Target victim <b>website</b>: <i>www.joneshaberlaw.com</i>]]></description>
<category>termite</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Siskiyou-Telephone</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30029</link>
<guid>51e706f8b33d4020dbe481ae37603842</guid>
<pubDate>Wed, 25 Feb 2026 14:29:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>termite</b> claims attack for <b>The-Siskiyou-Telephone</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>962013b7c19df0cb208bb154b740e4e3e3b9cee1340df7cc0b3f5cdaa4a9f2b8</i><br /><br />Threat actor <b>description</b>: <i>Siskiyou Telephone is a rural independent service provider serving Western Siskiyou County, California, since 1896. The company offers high-speed internet packages with speeds up to 1000 Mbps and telephone services, catering to both residential and business clients.</i><br />Target victim <b>website</b>: <i>www.siskiyoutelephone.com</i>]]></description>
<category>termite</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tricolor-Holdings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30017</link>
<guid>53e5fee4b79f57668bd8e85742d9f9cd</guid>
<pubDate>Wed, 25 Feb 2026 05:44:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kittykatkrew</b> claims attack for <b>Tricolor-Holdings</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff4cf92e84c78136481c5243b4b2441d5e55650d71cc3d720bc9b90c9f929591</i><br /><br />Threat actor <b>description</b>: <i>Mission-driven auto lender expanding access to affordable vehicle ownership nationwide. Deadline: 2026-03-03T00:00:00+00:00 Status: Awaiting Contact</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>kittykatkrew</category>
</item>
<item xmlns:dc='ns:1'>
<title>Birmingham-Museum-of-Art</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30016</link>
<guid>ad7030d0d43a7f5903f38cc76af762a5</guid>
<pubDate>Wed, 25 Feb 2026 00:53:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>termite</b> claims attack for <b>Birmingham-Museum-of-Art</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>90af04dcf23310d758100bfd534229a1c3f98a49f738ed388aab8a8e9f5a30ae</i><br /><br />Threat actor <b>description</b>: <i>The Birmingham Museum of Art in Alabama features a vast collection of over 27,000 artworks and offers free admission to visitors. The museum is open from Tuesday to Sunday and hosts various exhibitions and events throughout the year. It serves a diverse audience, including families, students, and art enthusiasts, providing educational resources and opportunities for engagement.
</i><br />Target victim <b>website</b>: <i>www.artsbma.org</i>]]></description>
<category>termite</category>
</item>
<item xmlns:dc='ns:1'>
<title>Triumph-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30013</link>
<guid>987abbb401850a3f9d10dc85a625c0c9</guid>
<pubDate>Tue, 24 Feb 2026 23:14:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Triumph-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f4a51f7abd8f899725de97d9139b1af01a54506396aab5f702316dad25871653</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Triumph Group is an international company specializing in manufacturing and repairing aerospace structures, systems, and components. Their work encompasses commercial, regional, business and military aircraft, as well as their components. Triumph Group has a robust supply chain providing services globally, significantly enhancing the performance of the aerospace industry.</i><br />Target victim <b>website</b>: <i>triumphgroup.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Insight-Hospital-amp-Medical-Center-Chicago</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=30012</link>
<guid>7c365ebfc34003c40033cc47f6116dd1</guid>
<pubDate>Tue, 24 Feb 2026 23:08:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>termite</b> claims attack for <b>Insight-Hospital-amp-Medical-Center-Chicago</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a05995a4c60f7b5defe6fe13001c3c5fd4adb949aa37ca04081cf36bf47b9746</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1852 Mercy Hospital &amp;amp; Medical Center is a member of Trinity Health. They are a teaching hospital headquartered out of Chicago, Illinois
</i><br />Target victim <b>website</b>: <i>insightchicago.com</i>]]></description>
<category>termite</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hudson-Awning</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29981</link>
<guid>45b531e01616fe0a6b2d8d51583b36a7</guid>
<pubDate>Tue, 24 Feb 2026 18:42:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Hudson-Awning</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed615926845c56a294978345b646ade825613588b46022db1a9aca3822261768</i><br /><br />Threat actor <b>description</b>: <i>Hudson Awning has been providing exceptional products and services since 1881, specializing in a wide variety of awnings, including fabric awnings, metal canopi...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Middlesex-Transporters</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29982</link>
<guid>a1e4a9d047858b87c17707c0c4e91657</guid>
<pubDate>Tue, 24 Feb 2026 18:42:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Middlesex-Transporters</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>628ea9fea4bb87cd0af29b4d27eb8242cd0d2716c9fd13a636b0da5d826e851a</i><br /><br />Threat actor <b>description</b>: <i>Middlesex Transporters LLC specializes in non-emergency medical transportation services aimed at providing cost-effective solutions for patients with healthcare...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>CognitiveTPG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29973</link>
<guid>2b98e671fcbb48f8a586538960c8cff2</guid>
<pubDate>Tue, 24 Feb 2026 14:43:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>CognitiveTPG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aba7c6ba2fa03c30156b0debee450cf53115b10cde19328116fd486da01a17a1</i><br /><br />Threat actor <b>description</b>: <i>CognitiveTPG specializes in innovative printing solutions, offering a range of products including label printers, POS printers, and security print solutions. Their intended clients span various industries such as retail, healthcare, banking, hospitality, and manufacturing.We will upload corporate data soon. Passports numbers, DLs, SSNs,addresses, phones and other personal information of employees, partners files, specifications, projects info, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aptean</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29978</link>
<guid>bc475ee878093039d641e94e5345fe25</guid>
<pubDate>Tue, 24 Feb 2026 14:00:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Aptean</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c68722b15233591df66ec87a1286a574e81b7354206a1c6ad688b44ba04bfb66</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Aptean is a leading global provider of industry-specific software solutions. The company targets specific industries such as manufacturing, distribution, and retail to offer ERP, supply chain, and compliance solutions. The company helps businesses to stay at the forefront of their industries by using technology and industry-specific expertise to address unique business challenges.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nebraska-Hearing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29976</link>
<guid>0f8dbc56f1117ef240cbb653bb721a42</guid>
<pubDate>Tue, 24 Feb 2026 13:16:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>Nebraska-Hearing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47e6d5f1b36f289f158abd93c8d93b058cc5690961bf6e1820debce2303fe756</i><br /><br />Threat actor <b>description</b>: <i>Nebraska Hearing Instruments LLC is a Hearing Aid Equipment Supplier in Omaha, Nebraska</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>Employer-Solutions-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29972</link>
<guid>1acd4d26929098c6af011ed1a5d93e9d</guid>
<pubDate>Tue, 24 Feb 2026 12:36:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Employer-Solutions-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c2049e56522c0c5bbac277a870e163a0473432a8171882071cdc25a330fcd958</i><br /><br />Threat actor <b>description</b>: <i>ESSG provides HR, payroll, and compliance solutions designed to s
treamline administrative tasks for businesses. Their services tar
get employers of record seekers, staffing companies, and small to
medium-sized businesses, offering tailored assistance in payroll
management, employee benefits, and compliance regulations.

We will upload almost 80gb of corporate data soon. Passports, Dls
, SSNs and other information of more than 100 ppl, financials, HR
files, client, partners information, NDAs and other confidential
files.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>University-of-Pennsylvania</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29971</link>
<guid>9ac2fc991d780c349fe1e5863e731108</guid>
<pubDate>Tue, 24 Feb 2026 12:13:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>University-of-Pennsylvania</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>712b4b0f1dec73723a74fe1daab681e732ce0c184bbe987c3c6a3bd26745a84d</i><br /><br />Threat actor <b>description</b>: <i>Records: 1.2M Records | Updated: 04 Feb 2026 | Note: Make the right decision, don't be the next headline. | This is the direct result of advisors advising you against paying a ransom. It has the opposite effect. Do NOT provoke us again and pay the ransom when we contact you.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Harvard-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29970</link>
<guid>46c4e6a9d4e1392f1f86747329e15ab0</guid>
<pubDate>Tue, 24 Feb 2026 12:13:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Harvard-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7be3fa95697b869d161d2b9c149fab36f61d81e89816fed659013d45291fc61</i><br /><br />Threat actor <b>description</b>: <i>Size: 1.1GB (compressed) | Updated: 04 Feb 2026 | Note: Make the right decision, don't be the next headline. | This is the direct result of advisors advising you against paying a ransom. It has the opposite effect. Do NOT provoke us again and pay the ransom when we contact you.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Figure-Technology-Solutions-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29969</link>
<guid>07f7b1153c6e600da9abeddc1b03f2c8</guid>
<pubDate>Tue, 24 Feb 2026 12:13:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Figure-Technology-Solutions-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f75737228925db8f0b805615b2b9281f9057be2da740b9fd96b539ef670cf023</i><br /><br />Threat actor <b>description</b>: <i>Size: 2.5GB (compressed) | Updated: 13 Feb 2026 | Note: Pay or be humiliated. | They were given multiple chances to pay the ransom, but they decided to waste time and hide instead.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>CarGurus-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29967</link>
<guid>31716bdf834f7838689285ce155e7a64</guid>
<pubDate>Tue, 24 Feb 2026 12:13:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>CarGurus-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6475873b2bd37c77367db5e959a7b38d620a4289803e36c2edbf3a818cd5a66</i><br /><br />Threat actor <b>description</b>: <i>Size: 6.1GB (compressed) | Updated: 21 Feb 2026</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mercer-Advisors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29966</link>
<guid>798ec5bb849d8c08c6cc22e0ff196b1d</guid>
<pubDate>Tue, 24 Feb 2026 12:13:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Mercer-Advisors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e61318615445b371e35fde0d075d73d7707a7087ccc6edc57a38fd0ebcfd329</i><br /><br />Threat actor <b>description</b>: <i>Updated: 21 Feb 2026</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Beacon-Pointe-Advisors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29965</link>
<guid>e483cc701d962f6b22bfea4b09635652</guid>
<pubDate>Tue, 24 Feb 2026 12:13:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Beacon-Pointe-Advisors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f540ca84728888b7b7c40c1a02aa5711bf8da3eb274bf91907ad0b395eb42f70</i><br /><br />Threat actor <b>description</b>: <i>Size: 60GB (compressed) | Updated: 22 Feb 2026</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>suffolkva.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29962</link>
<guid>2d00ce98adf1abcedcf3cecb0859343a</guid>
<pubDate>Tue, 24 Feb 2026 11:58:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>suffolkva.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9817386adb6fde0c7c82c563f0d1d0806a691a846da603a7baed6131b38c457</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>PoindexterHill</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29958</link>
<guid>8b7496b0d4f85eb60f8c70fc494c9983</guid>
<pubDate>Tue, 24 Feb 2026 08:40:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>PoindexterHill</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f280261558a31aa7401bb8215636d718982967526e8cc426bdd5ddac4980aba</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jac-Vandenberg</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29960</link>
<guid>7b0e861aacb92e74f2ea443d7c626b53</guid>
<pubDate>Tue, 24 Feb 2026 08:35:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Jac-Vandenberg</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c693655cc3f91c817180bfd14d66d583d2c1c1b8369bee2f2bce9144039efac</i><br /><br />Threat actor <b>description</b>: <i>Jac Vandenberg is a company dedicated to providing fresh produce, including citrus, grapes, pome fruits, and stone fruits, sourced responsibly from farm to store. They emphasize food safety, sustainability, and innovation in their operations. The company targets grocery stores across America, aiming to deliver high-quality fruits that cater to consumer preferences.</i><br />Target victim <b>website</b>: <i>jacvandenberg.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Silver-Lake-Medical-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29956</link>
<guid>57e289de16e78690c58902a1eb00c835</guid>
<pubDate>Tue, 24 Feb 2026 05:40:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Silver-Lake-Medical-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af5a0908668a4bfc7ff2286dcc794f03808cff8e909fcf047013cc6a621bbbd7</i><br /><br />Threat actor <b>description</b>: <i>www.silverlakemc.com https://www.zoominfo.com/c/silver-lake-medical-center/8258341 Now known as L.A. Downtown Medical Center (LADMC), Silver Lake Medical Center is an accredited healthcare facility in Los Angeles operating two campuses. The facility provides a range of services, including 24-hour urgent care at its downtown location and specialized behavioral health services at its Rosemead campus.</i><br />Target victim <b>website</b>: <i>www.silverlakemc.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Orrick-Herrington--Sutcliffe</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29954</link>
<guid>68d42d85d6ef70aa12305106ba6abc20</guid>
<pubDate>Mon, 23 Feb 2026 22:46:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Orrick-Herrington--Sutcliffe</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>291cf95e4c77ba6ab4b616acf1a8c559767293ce48b89e447ebcf1c786266da6</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1963 and headquartered in San Francisco, California, Orrick, Herrington & Sutcliffe is a co…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rocky-Mountain-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29952</link>
<guid>0601b74059931609ce1fd8410db6fb14</guid>
<pubDate>Mon, 23 Feb 2026 21:42:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Rocky-Mountain-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1c7b25a5ae7c2527dfd0f24b0296a2a0a6f2ac28932192d08d9bdb6abd15b1a</i><br /><br />Threat actor <b>description</b>: <i>Healthcare Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zelenkofske-Axelrod</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29948</link>
<guid>61b4258564db32b0b663450f8cfa54cc</guid>
<pubDate>Mon, 23 Feb 2026 20:42:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Zelenkofske-Axelrod</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5bba750a2a7c93abf5354bbbc62aedb6b09c90183f918887816f2cd42da2c56</i><br /><br />Threat actor <b>description</b>: <i>Zelenkofske Axelrod, LLC (ZA) is a regional CPA firm based in Pennsylvania, with multiple offices providing auditing, accounting consulting, and tax services pr...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Spire-Payments</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29949</link>
<guid>55b9d07f95df2d8a391673726bf4ef3d</guid>
<pubDate>Mon, 23 Feb 2026 19:40:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Spire-Payments</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c466ada02c9216fca0c2683b7ad3ab42ace13a04676c80186272640f4fd42c96</i><br /><br />Threat actor <b>description</b>: <i>Credit Cards & Transaction Processing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>GENERON</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29950</link>
<guid>84846ca9435252790f0e076d7d5d29df</guid>
<pubDate>Mon, 23 Feb 2026 19:40:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>GENERON</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f4ef9770e55b073cd60da91b551290b941b0242b373630b0d265faa0d4d102fe</i><br /><br />Threat actor <b>description</b>: <i>Industrial Machinery & Equipment</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Accuick</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29951</link>
<guid>2b21de16a5c3b0913227003411b15196</guid>
<pubDate>Mon, 23 Feb 2026 19:01:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cipherforce</b> claims attack for <b>Accuick</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>618339a6ace2efc74abdd1a72b49b7a78fe13e2c1b15ddba47b772faa27b134d</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cipherforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>TWU-Local-100</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29944</link>
<guid>bf811576819a427614cbc193920b16df</guid>
<pubDate>Mon, 23 Feb 2026 16:42:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>TWU-Local-100</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a4b793188306d836a8330a517f726e543629c4cd2cb8a6acc37c778906d9a666</i><br /><br />Threat actor <b>description</b>: <i>Membership Organizations</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>FAMILY-EYECARE-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29945</link>
<guid>003fd8188c1a5913a61bba3db2c670e8</guid>
<pubDate>Mon, 23 Feb 2026 15:44:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>FAMILY-EYECARE-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24e9ab3c6ca8cc7d0df5b104663d9fa86ab5f60bc8809ff930e96aab3c1ca723</i><br /><br />Threat actor <b>description</b>: <i>0</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-City-of-Cocoa</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29943</link>
<guid>5030f1c110959586c7cf489e4a6713b6</guid>
<pubDate>Mon, 23 Feb 2026 14:37:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>The-City-of-Cocoa</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4953040c4de27df65f9e0eac21b93e8614418c50491b44fd782ff0e12eb79ca6</i><br /><br />Threat actor <b>description</b>: <i>The City of Cocoa offers diverse public services aimed at enhancing the quality of life for its community. Their services include water management, economic development programs, and various community engagement initiatives. Intended clients encompass local residents, businesses, and visitors who seek information and support from city departments. The city is also focused on maintaining public safety, health, and environmental stewardship.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>primepak.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29942</link>
<guid>c323092e3dc96ec44049c28c7dd27089</guid>
<pubDate>Mon, 23 Feb 2026 14:37:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>primepak.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e545d14f42bb5c5ba4ffe378d368938ee78d48eab761b623603c9f7e5f41ffe8</i><br /><br />Threat actor <b>description</b>: <i>Primepak is your worldwide specialist in packaging. As a leading manufacturer, importer and distributor since 1972, we provide a wide range of solutions for every application in packaging, plastic bags, poly sheets, tubing and films. Employees: 200  Revenue: $54.3 Million Industry: Manufacturing  Phone Number: (201) 836-5060 </i><br />Target victim <b>website</b>: <i>primepak.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>tektreeinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29939</link>
<guid>c3a05fe072d3d4f009eccce97c41ca71</guid>
<pubDate>Mon, 23 Feb 2026 13:25:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cipherforce</b> claims attack for <b>tektreeinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>93cc2eb3172aed6bc2345b582bee4eaa0eed4a08e9967294505e02477c6061cb</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] TektTree Inc. is a global technology consulting and IT service provider that offers services in software development, IT consulting, and project management. The company is dedicated to helping customers build effective, efficient and collaborative systems. They have a team of experienced professionals who specialize in different sectors such as banking, healthcare, retail, and telecommunications.</i><br />Target victim <b>website</b>: <i>tektreeinc.com</i>]]></description>
<category>cipherforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>hiringsteps.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29938</link>
<guid>87e942236933558e0ea7cd7dee76e9db</guid>
<pubDate>Mon, 23 Feb 2026 13:24:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cipherforce</b> claims attack for <b>hiringsteps.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d7b25e207c72c34fbac6dc1b85e7ef0d33e5b763e04e0a125fa3ecd02752ca89</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "HiringSteps.com" is a robust online cloud-based platform designed to streamline the recruitment processes for businesses of different sizes. The platform allows recruiters to post job openings, source candidates, conduct interviews, check references, and send job offers all in one place. It aims to simplify recruitment by reducing paperwork and improving coordination among employers, recruiters, and candidates.</i><br />Target victim <b>website</b>: <i>hiringsteps.com</i>]]></description>
<category>cipherforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rainier-Clinical-Research-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29935</link>
<guid>7da66e82dc1f8024527341be2df86b9f</guid>
<pubDate>Mon, 23 Feb 2026 01:40:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Rainier-Clinical-Research-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>260c0778b8a6808e603bea9fc09547d016bb344044cea9b75c70f6f578d9214d</i><br /><br />Threat actor <b>description</b>: <i>Rainier Clinical Research Center is a leading research facility specializing in clinical trials for diabetes, medical devices, and high-volume studies, with over 700 studies completed in 30 years.  The center provides a purpose-built 15,000 square-foot research space   We will publish all the information next week.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Atlantic-Design-Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29934</link>
<guid>7998b659c5fdea8653a0ed11b4a89dd2</guid>
<pubDate>Sun, 22 Feb 2026 18:48:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Atlantic-Design-Engineers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34a6a84dacc803a717fc0cab011e2f7bf1dadb4ee35ca0b72bae5df6c1e616d3</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.atlanticcompanies.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>FaulknerLocke</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29933</link>
<guid>adb1341c69f3803a176b96c5584520f4</guid>
<pubDate>Sun, 22 Feb 2026 18:47:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>FaulknerLocke</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f943beae29a0c51f60cfaad8dfac34b224de4dbbb3b1796cec572dbc62339b81</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.faulknerlocke.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hendrick-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29932</link>
<guid>449ddfa2100f691195ad1b10e5bcd846</guid>
<pubDate>Sun, 22 Feb 2026 18:47:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Hendrick-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce71df3b560f698dc913d2b746ce85a5a120ddf727e591b4f595591c22a5003f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.hendrickconstruction.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Young--Associates-Consulting-Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29931</link>
<guid>4cfbfb28ee66aceab7be17065ebdb6e5</guid>
<pubDate>Sun, 22 Feb 2026 18:46:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Young--Associates-Consulting-Engineers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>35f4321d9f0bea83948a1e4f948819713d68b20a0d933e6f506650f55b843289</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.wjyaengineers.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>PenLink</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29930</link>
<guid>db92254e80a05b411642bc6885748637</guid>
<pubDate>Sun, 22 Feb 2026 18:45:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>PenLink</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6078cfa93a1a3ad722766ca620f645ada8072d82537ab524cac2f95442e5229</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.penlink.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gulfstream-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29929</link>
<guid>9cc03ce5c1ea026ca10e9f83572a0200</guid>
<pubDate>Sun, 22 Feb 2026 18:45:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Gulfstream-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>20dc28814a0fc6e5622691ef006b3744a4a20e74f1b4cec9aa8fe59c18fb5436</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.gulfstreamservices.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cumberland-International-Trucks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29927</link>
<guid>694eabca410cc15c81fab9dc514a629e</guid>
<pubDate>Sun, 22 Feb 2026 13:44:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Cumberland-International-Trucks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dac559aa2f81b2dc1f0de0086ed19afd808977845ff79c2b5499c3887b3c6496</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Okanogan-County-Vets</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29919</link>
<guid>a6e541f4abdd89b30649ca4e7f47ec24</guid>
<pubDate>Sun, 22 Feb 2026 07:42:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Okanogan-County-Vets</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a5fca5d70ed0fec7967136f3bd57b1262cbb4c1b89931ec099d663b6bf932e5d</i><br /><br />Threat actor <b>description</b>: <i>Government</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Complete-Thermal-Svc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29922</link>
<guid>cef73ce6eae212e5db48e62f609243e9</guid>
<pubDate>Sun, 22 Feb 2026 07:42:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Complete-Thermal-Svc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fec54ef7ccbf0b138b17786b7d891f7475a7c09e0fc23c28100065893a24fdc4</i><br /><br />Threat actor <b>description</b>: <i>Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>US-Trading</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29924</link>
<guid>8284f7dbed939c962b771ff17d41aeb7</guid>
<pubDate>Sun, 22 Feb 2026 07:42:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>US-Trading</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc44f3480b973477d576cebbda9c2dfe9f0bc0b2d46597a4ce278e2c99821959</i><br /><br />Threat actor <b>description</b>: <i>Manufacturing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>HUGS-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29909</link>
<guid>228205019b79a1a8101b261c10df7ecd</guid>
<pubDate>Sat, 21 Feb 2026 19:17:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>HUGS-Insurance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1be7b9dc557f38c07800a8a8c10df63793d154ce352599047740ceb584f0e5fc</i><br /><br />Threat actor <b>description</b>: <i>hugsinsurance.com zoominfo.com/c/hugs-insurance/1319728881 HUGS INSURANCE BROKER is an online insurance consultant that specializes in helping clients purchase, consult, and compare insurance products. The company prides itself on being a friendly and knowledgeable partner in navigating insurance options for various lifestyles. They offer personalized assistance to ensure clients find the right insurance for their needs. HUGS aims to simplify the insurance process, making it accessible and understandable for all customers</i><br />Target victim <b>website</b>: <i>hugsinsurance.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bluefish-Dental--Orthodontics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29907</link>
<guid>f0f42953e6ac78566f36c5824c795c7f</guid>
<pubDate>Sat, 21 Feb 2026 16:40:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Bluefish-Dental--Orthodontics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b04c31462670e4191ab9dc8ef661eb143533b1d534bbadf0c51e053b6f1c29b1</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.bluefishdental.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>WTSmedia</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29904</link>
<guid>e07c7d69b5b26f6ed17e514e404d77ea</guid>
<pubDate>Sat, 21 Feb 2026 14:41:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>WTSmedia</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5376f8a520e4b14487dba9e6c0263e738a6f946e3b28dacf55b005f88c8cd2aa</i><br /><br />Threat actor <b>description</b>: <i>Electronics</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>onlinedivorcetexas.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29902</link>
<guid>ecc19ff8dfa0fba0aac51c409d06e653</guid>
<pubDate>Sat, 21 Feb 2026 07:12:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>onlinedivorcetexas.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca026c6e609d1a8bff426edbdc0373d841e6ad1e492789655a2c6d89e75791db</i><br /><br />Threat actor <b>description</b>: <i>Price ??? Disclosures 0/1</i><br />Target victim <b>website</b>: <i>example.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>fcc-inc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29882</link>
<guid>cd6c652e6f498d4363bff3c4b63bd685</guid>
<pubDate>Fri, 20 Feb 2026 21:53:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>fcc-inc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c977b23e03a5eaf032a2f6802f26f55060ef2ec7a7db9e7021ceebdfad65b3c8</i><br /><br />Threat actor <b>description</b>: <i>Fremont Contract Carriers, Inc. - FCC - strives to be a low cost carrier, while still providing qual...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>maxusacorp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29886</link>
<guid>0ac18d27cc2284445bc249e8a83462fe</guid>
<pubDate>Fri, 20 Feb 2026 21:53:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>maxusacorp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e999729c0ee24ac96f2c62e96161406d022e1e551db6b6a6454f55c89264fc83</i><br /><br />Threat actor <b>description</b>: <i>The company specializes in developing innovative and durable tools such as rebar tiers, nail guns, a...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>dmxm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29888</link>
<guid>68da88f6136bd6e456811e4a1f941ac0</guid>
<pubDate>Fri, 20 Feb 2026 21:53:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>dmxm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0721e2c6661c857829489234083ea6a85653af774ec78589af0f828e57844205</i><br /><br />Threat actor <b>description</b>: <i>Description: Dynamic Machining & Manufacturing (DM²) is a Swiss-style machining company that special...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>crystalcoastpm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29892</link>
<guid>96a0d70498272acfee21d3dbae846113</guid>
<pubDate>Fri, 20 Feb 2026 21:53:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>crystalcoastpm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d2ccda9576d9688732f53c54ac076afa71a6bf01b3479f2ff56d245c9e1763fb</i><br /><br />Threat actor <b>description</b>: <i>Crystal Coast Pain Management Center specializes in providing a comprehensive range of services for...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>xpressnebs.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29893</link>
<guid>36d3be4cf501c5ad9e07d3e2507b181a</guid>
<pubDate>Fri, 20 Feb 2026 21:53:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>xpressnebs.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2e4184c71ec994093eeb98a0c3360fb689fe74379c9eb188a670b8b5f50da76</i><br /><br />Threat actor <b>description</b>: <i>Xpress Nebs is a JCAHO certified Durable Medical Equipment company that specializes in providing hig...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>wjnklaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29894</link>
<guid>308794a90ec43d779df31a2e865a6f36</guid>
<pubDate>Fri, 20 Feb 2026 21:53:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>wjnklaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d746adcc12132fd8466ed5b5c00bfc1fa3c7ebbd84c232e302bfcd40549df22</i><br /><br />Threat actor <b>description</b>: <i>Westervelt, Johnson, Nicoll & Keller, LLC is a historic law firm based in Peoria, Illinois, with ove...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>smilescare.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29895</link>
<guid>f226f6cf9fdfe5a00262793195a3d228</guid>
<pubDate>Fri, 20 Feb 2026 21:53:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>smilescare.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b61cdfaf0d0fdd2da3310f207d411c6953d8402fda3338cd2376986b623bedf</i><br /><br />Threat actor <b>description</b>: <i>At SmilesCare.com, we are committed to being your trusted source for reliable and easy-to-understand...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>associated.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29897</link>
<guid>31beb41824b307d9f0deb076f8f9ee3b</guid>
<pubDate>Fri, 20 Feb 2026 21:53:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>associated.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96c95de4161151f56d4276a3496b556b81903e3b0ec839b2d21a675f0742950c</i><br /><br />Threat actor <b>description</b>: <i>The Associated: Jewish Federation of Baltimore is dedicated to supporting and nurturing Jewish life...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>Colonial-Van-Lines</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29877</link>
<guid>fecd1185063ed3d28b657ef4816b63f6</guid>
<pubDate>Fri, 20 Feb 2026 18:21:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Colonial-Van-Lines</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>496787191088af831e2a556b531c37b04e8bed2cf28c4feab8a60ad29437981a</i><br /><br />Threat actor <b>description</b>: <i>Colonial Van Lines is a U.S.-based long-distance moving and relocation company headquartered in Pompano Beach, Florida. Founded in 2003, the family-owned company specializes in interstate and cross-country residential, corporate, and military moves. It provides full-service packing, loading, transportation, storage, and unpacking solutions across the 48 continental states. The company operates a nationwide network of agents and a fleet of moving trucks, handling thousands of moves annually. Colonial Van Lines trains its staff through its own training facility and focuses on customer care and customized relocation services. With decades of industry experience, it aims to make moving easier, safer, and more organized for customers. The company headquarters is located in 1441 SW 29th Ave, Pompano Beach, Florida 33069, United States. 51-200 Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>RTC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29878</link>
<guid>db884574bea7de391188651592585c7e</guid>
<pubDate>Fri, 20 Feb 2026 18:20:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>RTC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1c2688c6282c3a110b3bed55aab5f42121007fcdb288eebcbef5f85f2d6f559</i><br /><br />Threat actor <b>description</b>: <i>RTC (rtc.com) is a global retail solutions and merchandising company that helps brands and retailers improve in-store shopping experiences and operational efficiency. The company designs and manufactures retail fixtures, shelf management systems, beverage merchandising displays, and theft-deterrence solutions, while also providing planning, development, rollout, and project management services. RTC works with major international brands to create customized retail environments that increase sales and productivity. With more than 75 years of industry experience, hundreds of employees, and offices and production facilities in multiple countries, RTC focuses on innovation, detail-driven retail design, and long-term client partnerships to support modern retail businesses worldwide. The company headquarters is located in 2800 Golf Road, Rolling Meadows, Illinois 60008, United States. 501-1,000 Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aramsco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29879</link>
<guid>4927e1395ab1d386386a762cad17d7a7</guid>
<pubDate>Fri, 20 Feb 2026 18:20:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Aramsco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79835bc9e28d3bf49007ed2f12fe1a6dc9fee0067d6e04149e734779bc6ce113</i><br /><br />Threat actor <b>description</b>: <i>Aramsco is a U.S.-based distributor of professional cleaning, restoration, surface preparation, and safety products. The company supplies contractors and facility maintenance professionals with equipment, chemicals, tools, and personal protective equipment used in carpet cleaning, water and fire damage restoration, abatement, and construction preparation. In addition to product distribution, Aramsco provides training programs, technical education, disaster support, and equipment services to help businesses operate efficiently. It operates multiple branch locations and an online store serving customers nationwide. By combining industry expertise, support services, and a wide product catalog, Aramsco positions itself as a one-stop source for professional restoration and cleaning industry needs. The company headquarters is located in Five Radnor Corporate Center, 100 Matsonford Road, Suite 510, Radnor, Pennsylvania 19087, United States. 1K - 5K Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Madison-Services-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29880</link>
<guid>974e22cdbdb3734482fd0bcc2dc9bb79</guid>
<pubDate>Fri, 20 Feb 2026 17:39:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Madison-Services-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf84f733d5b422c687b73161d23e374f095e2822e6381576dae01b91ad4bc2e1</i><br /><br />Threat actor <b>description</b>: <i>Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Cherokee-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29874</link>
<guid>55ae21ea938d436617a8bddffede5e3d</guid>
<pubDate>Fri, 20 Feb 2026 16:39:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-Cherokee-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d78c651dda102e4b54832708a835aabfb46204e59183f88e55e4198a75624f58</i><br /><br />Threat actor <b>description</b>: <i>Fabcon manufactures and erects precast concrete wall panels for every type of structure. Projects range from a 10,000 square-foot machine shop to a one-million square foot distribution center, and from a single-story bakery to a 16-story housing facility.We will upload corporate data soon. Employee personal documents (passports, DLs and so on), financials, projects, drawings and specification, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fabcon</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29876</link>
<guid>cf4f35ee546a6d8fe9461b8db8a8200a</guid>
<pubDate>Fri, 20 Feb 2026 15:39:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Fabcon</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a2248974c0c78139874915cb952144ebd4a19818ae1c0db1d263543e9f18ce5</i><br /><br />Threat actor <b>description</b>: <i>Fabcon manufactures and erects precast concrete wall panels for every type of structure. Projects range from a 10,000 square-foot machine shop to a one-million square foot distribution center, and from a single-story bakery to a 16-story housing facility.We will upload almost 190gb of corporate data soon. Client information, employee personal documents (passports, SSNs, DLs and so on), detailed financials, projects (confidential files), NDAs, etc. Kerkstra Precast company data will be disclosed as well.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pearl-Institute-for-Clinical-Research-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29870</link>
<guid>4d612ec00583838471ceff508d9f67c7</guid>
<pubDate>Fri, 20 Feb 2026 11:09:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Pearl-Institute-for-Clinical-Research-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>997cf6c1a894ae25e664ffc5f5c0a7b1cefb5a324227e2cafb0fe8d50610f098</i><br /><br />Threat actor <b>description</b>: <i>Data is not available for now.</i><br />Target victim <b>website</b>: <i>pi-cr.net</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gentegra</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29867</link>
<guid>abdb9f5517daf77fe4714ad0669c9e19</guid>
<pubDate>Fri, 20 Feb 2026 01:16:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Gentegra</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1c011fd7e5ec4ec85f4bdbd41b2607166b215bf120be0c54d93b17468238bf7</i><br /><br />Threat actor <b>description</b>: <i>GenTegra specializes in innovative solutions for the stabilization and shipping of DNA and RNA, focusing on products that ensure sample integrity during transportation. Their offerings include a suite of RNA protection products and forensic DNA storage solutions, catering to clients in life sciences, forensic labs, and biobanking. With technology validated for maintaining the quality of samples at room temperature, GenTegra is recognized for revolutionizing hassle-free sample management and offering superior protection for RNA and DNA. Their products are designed to seamlessly integrate into existing protocols, showcasing compatibility with standard purification kits.</i><br />Target victim <b>website</b>: <i>www.gentegra.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Iblesoft</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29865</link>
<guid>f72e0b9fc085734d1bb6932d3f5b48fd</guid>
<pubDate>Thu, 19 Feb 2026 20:46:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Iblesoft</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a642e9a485882cd90de6e7997cdd08f889a38481c23b89c1b85ee0446e02b93f</i><br /><br />Threat actor <b>description</b>: <i>Iblesoft Inc. is a full service software development, global resource placement and business consulting firm based in Doral, FL. Iblesoft provides state of the art business consulting services and cutting edge technology solutions to companies of all sizes, offering them improved efficiency and profitability.</i><br />Target victim <b>website</b>: <i>www.iblesoft.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Corradino-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29851</link>
<guid>5eac0347e226308d6c55e79d4d4e6eb0</guid>
<pubDate>Thu, 19 Feb 2026 20:41:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-Corradino-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>778d3700505a274e8bc9fcac3558b3c7c1fa570dfa4efcbadcf873514322a39f</i><br /><br />Threat actor <b>description</b>: <i>Architecture, Engineering & Design</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Saltech-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29864</link>
<guid>8a1f74ea8d333ac37a9fe795aa4183e2</guid>
<pubDate>Thu, 19 Feb 2026 19:22:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Saltech-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c5578fcb63cab60bc7a1f7d3d6af1f76ece89e8b7d09dd5a71e2817a29943a6</i><br /><br />Threat actor <b>description</b>: <i>Saltech Systems is a technology company specializing in application development, web design, IT services, and digital marketing, with offices located in Iowa and Texas. They offer a wide range of services including custom website and mobile app development, IT support, cybersecurity, and cloud hosting solutions. Their intended clients include businesses seeking to enhance their online presence and streamline operations through tailored technology strategies. With a commitment to exceptional customer service, Saltech Systems aims to empower clients to thrive in a rapidly evolving digital landscape.</i><br />Target victim <b>website</b>: <i>www.saltechsystems.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Electriduct</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29863</link>
<guid>9c68bf8965e0692b91ef2f048cea8378</guid>
<pubDate>Thu, 19 Feb 2026 19:21:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Electriduct</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7cc0c52250956533ed7f3d9ba6addb72ec1500f86995212a1dd7b0ff82a3ec1</i><br /><br />Threat actor <b>description</b>: <i>Electriduct specializes in cable management solutions, offering a wide range of products including cable protectors, wire management tools, and power distribution equipment. Their extensive catalog features items such as braided sleeving, cable carriers, and traffic safety products, catering to both indoor and outdoor applications. The company targets professionals in various industries who require reliable and efficient cable management solutions. Electriduct is committed to providing high-quality products at competitive prices, with a focus on customer satisfaction and expert support.</i><br />Target victim <b>website</b>: <i>www.electriduct.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Marwood</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29861</link>
<guid>822e5a4c9294866332d5cc0a328596d5</guid>
<pubDate>Thu, 19 Feb 2026 19:17:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Marwood</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>28b1cd6ec7d6081268078819ee45c273e63610b0f14088c222d0461ac1b5c053</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.marwoodltd.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kirbor-Homes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29858</link>
<guid>f6533e79009ff4a7c9f4ad85ed45709e</guid>
<pubDate>Thu, 19 Feb 2026 19:15:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Kirbor-Homes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>114d64e57c2b43e1f968626f3c9329aca67a0878a9dc84875583645297ef3eb5</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.kirbor.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tropic-Tool--Mold</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29857</link>
<guid>fbb52ce1dc9851b47da22ee229dbbda8</guid>
<pubDate>Thu, 19 Feb 2026 19:15:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Tropic-Tool--Mold</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e3c36c161a61b3c0bc5ef4d07cc6ca24970fc978ad97cdfacd637933e69bb1eb</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.tropictoolandmold.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arizona-Lighting-Sales</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29856</link>
<guid>e1dbbe5fa0cc885cabb5d674c14ca7a9</guid>
<pubDate>Thu, 19 Feb 2026 19:14:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Arizona-Lighting-Sales</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1bd01989534e053a6463cab2c292f76654d344e6dd080746cfe6efb4509b2ba</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.arizonalightingsales.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Indianapolis-Car-Exchange</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29855</link>
<guid>6abfefaf79dff3c6a5bcfde47a85749f</guid>
<pubDate>Thu, 19 Feb 2026 19:13:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Indianapolis-Car-Exchange</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>61554d51f7976fd2fdfc30231cb4c1f7ac93be43a2345861ad29e650b28c615c</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.icefriday.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Oklahoma-Auto-Exchange</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29854</link>
<guid>3dc2c2f6a6a75cba6bc726b4545e788c</guid>
<pubDate>Thu, 19 Feb 2026 19:13:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Oklahoma-Auto-Exchange</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2d43dc697ea138f3a5e965f15e9f99d4a71faa9ee4ed6860cd09da65289cebe8</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.okaex.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Auto-Auction-of-New-England</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29853</link>
<guid>5d213468da8857324393c707fb3f6f67</guid>
<pubDate>Thu, 19 Feb 2026 19:12:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Auto-Auction-of-New-England</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c4c8bb9e552bd71681d550e3647b1d99717838afca78fa2ee6988cae9625a16</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.aane.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Spring-Brook-Country-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29852</link>
<guid>97a111b32fdafbaa0de29a40b2df1ffd</guid>
<pubDate>Thu, 19 Feb 2026 19:11:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Spring-Brook-Country-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af78116588294363ae09c4ff1ebf1baef66c20ade2b41372c3cc64142d2a301f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.springbrookcc.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>fivestates.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29850</link>
<guid>f1af9918adf75d2cfe2e87861a72f1f6</guid>
<pubDate>Thu, 19 Feb 2026 18:39:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>fivestates.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6b1c76a4614f6717503eed4b5cf8a0553feb65514e214ef74e51c6144016f43</i><br /><br />Threat actor <b>description</b>: <i>Five States Energy is a private investment firm based in Dallas, Texas, with over 30 years of experience in the energy sector. The company specializes in acquiring producing oil and natural gas properties, primarily focusing on independent, onshore operators and working interest owners across various regions in the U.S. Recently</i><br />Target victim <b>website</b>: <i>fivestates.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kroll-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29848</link>
<guid>6ab2ef9e3a9f4ed96fb1b77191e612d0</guid>
<pubDate>Thu, 19 Feb 2026 17:44:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Kroll-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29c310983e7d2bd0dee0249e7dfbe08b164840fdbdd90d8c281cb37bd4ebdd7d</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.krollcorp.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Telecare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29843</link>
<guid>de556ca8eba0fc417ac22b46cd3d0c84</guid>
<pubDate>Thu, 19 Feb 2026 17:42:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Telecare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42508e60c94a3179b81cdbf1b214d802e83c3dcf8404174cce2f8c6b27c01811</i><br /><br />Threat actor <b>description</b>: <i>Healthcare Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>TCPN-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29847</link>
<guid>48c166e714c21cbdb72f2e85d87fb118</guid>
<pubDate>Thu, 19 Feb 2026 17:41:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>TCPN-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>526a8f38be88055fbeb34f606dc9ef64205a7c0b6ba58c907fdbc3fab23b4adf</i><br /><br />Threat actor <b>description</b>: <i>Data is not available now.</i><br />Target victim <b>website</b>: <i>tcpninc.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>RS-Development-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29845</link>
<guid>f3d283dc9dbbcf9377d91798ac47cf2f</guid>
<pubDate>Thu, 19 Feb 2026 17:40:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>RS-Development-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5baf04820cfe19fec25e7b0a5fdfff64e4a56b247e2157ba1706752713a17e52</i><br /><br />Threat actor <b>description</b>: <i>Data is not available now.</i><br />Target victim <b>website</b>: <i>www.rsdev.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kensington-HPP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29841</link>
<guid>8a95e369d9ff66dd5f5dea5fa7b5ab9a</guid>
<pubDate>Thu, 19 Feb 2026 14:43:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Kensington-HPP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>950c78aa446474e565c91ad8ee5b0fcb3e67b21714736fcedfb1b6b05ad4ae86</i><br /><br />Threat actor <b>description</b>: <i>Building Materials</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>MD-Charts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29842</link>
<guid>18b30c4ac2b116fdb322b3a7f749979e</guid>
<pubDate>Thu, 19 Feb 2026 14:29:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>MD-Charts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a19726d44a20670af047b8742d9b167ee7ba5a82d72cd9d03d8b6ff4b3e76f1f</i><br /><br />Threat actor <b>description</b>: <i>Data is not available now.</i><br />Target victim <b>website</b>: <i>mdchartsehr.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>O.Berk</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29828</link>
<guid>1968e73cfcb43ede6c35cf8ef0f7d1d3</guid>
<pubDate>Wed, 18 Feb 2026 18:40:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>O.Berk</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>258d882caa406d9fe188b34b2da31fd4e2185b2d6b4e6d88c9cfc4faa9eaedd9</i><br /><br />Threat actor <b>description</b>: <i>Manufacturing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Piping--Boiler-Co</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29831</link>
<guid>c1092c40dfa01c731017bd0dd7cf63ef</guid>
<pubDate>Wed, 18 Feb 2026 18:34:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>American-Piping--Boiler-Co</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c760b793a819bb0adc7edf8778af81a97c93ceceb2f59ebce08672295b69269</i><br /><br />Threat actor <b>description</b>: <i>Data is not available now.</i><br />Target victim <b>website</b>: <i>www.apbconstructiongroup.org</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>AA-Global-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29823</link>
<guid>3ffedfdaa29dbf097fb6724d2e890b00</guid>
<pubDate>Wed, 18 Feb 2026 16:38:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>AA-Global-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4dfe8dee4d53ba17c971d8c0bff8f254c72ac97df9a232e4726628fead0d6f4c</i><br /><br />Threat actor <b>description</b>: <i>A&A Global is a trusted partner operators, retailers, and business owners turn to for toys, candy, and creative product solutions that build loyalty, increase foot traffic, and drive real business results.We will upload corporate data soon. Detailed personal files of employees (SSNs, passports, DLs, medical information and other personal files), HR files and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cargo-Largo</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29824</link>
<guid>7e8bc77312d6dfdd73cd283ad31a3444</guid>
<pubDate>Wed, 18 Feb 2026 16:38:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Cargo-Largo</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4173ef5db2682f8fdd17986eab69db4bdc132643facb830a4f11c9edc997c3f</i><br /><br />Threat actor <b>description</b>: <i>Cargo Largo is a discount store located in Independence, MO, offering a wide range of name-brand products including electronics, clothing, furniture, shoes, and hardware at competitive prices.We will upload corporate data soon. Customer information, financials and other internal files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Application-Solution-Providers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29825</link>
<guid>f0e37e9e9b28f94f89e67d28df74c2b4</guid>
<pubDate>Wed, 18 Feb 2026 15:14:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Application-Solution-Providers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>58a44e49d77739205541e30ca7c3cd728a9045cd2055f3a8f63516f2a65b3a2c</i><br /><br />Threat actor <b>description</b>: <i>Application Solution Providers, Inc. delivers cloud-based DaaS and software, plus consulting, development, marketing, support, and training—enabling flexible, remote operations with tailored, customer-focused solutions to boost efficiency.</i><br />Target victim <b>website</b>: <i>www.aspdd.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>DeWalch-Technologies-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29822</link>
<guid>8b42d3eeb4da1f29ee08dedd7855a0ed</guid>
<pubDate>Wed, 18 Feb 2026 14:38:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>DeWalch-Technologies-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f8ed70a1e9c74340af4f42fd5fcd5e5267ab37f64564de92ce287a43e006ffff</i><br /><br />Threat actor <b>description</b>: <i>DeWalch Technologies, Inc. is a vertically integrated engineering and manufacturing company with operations in four key verticals: security, energy, manufacturing, and digital.</i><br />Target victim <b>website</b>: <i>www.dewalch.com</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cedar-Grove-Warehouse</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29821</link>
<guid>4744015f38ee03ef7f62f60a5017907c</guid>
<pubDate>Wed, 18 Feb 2026 13:58:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Cedar-Grove-Warehouse</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a796f6f14aed3cedf1813a9e6e54a0cb8c6113d670f7478bf0555db301f9d5d2</i><br /><br />Threat actor <b>description</b>: <i>Cedar Grove Warehouse is a family-owned logistics and warehousing
company that offers a range of services including dock-to-dock l
ogistics solutions, rail car cross docking, and various storage o
ptions such as refrigerated, freezer, and dry storage. 

We will upload almost 27gb of corporate data soon. Personal files
of employees (SSNs, passports, national IDs and DLs of more than
100 ppl and other personal information), financials, HR files, p
rojects, client files, NDAs and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>First-4-Recruitment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29818</link>
<guid>f5fd4686872b63a5840cc1113450801e</guid>
<pubDate>Wed, 18 Feb 2026 12:34:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>First-4-Recruitment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f201f8eeb69dc979e5f82705209b42034e95073e2aceb89221faf0c01f63b5b</i><br /><br />Threat actor <b>description</b>: <i>First 4 Recruitment is a prominent recruitment agency based in the North West, specializing in the Industrial, Logistics, Construction, and Commercial sectors.</i><br />Target victim <b>website</b>: <i>www.first4-recruitment.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>Daniel-L-Kaler-DDS-PC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29817</link>
<guid>e2ae9d605614017e3ae77dcbc1aaee23</guid>
<pubDate>Wed, 18 Feb 2026 12:34:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Daniel-L-Kaler-DDS-PC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0bdc891244be0a10229e457fca861674318f4c75cea7f5c99c5e944c365f3a8a</i><br /><br />Threat actor <b>description</b>: <i>Daniel L. Kaler, DDS, PC offers unparalleled orthodontic services to children, teens, and adults in Sioux City, Le Mars, IA, and Wayne, NE. The practice is dedicated to creating beautiful, healthy smiles through gentle and effective treatments in a comfortable environment.</i><br />Target victim <b>website</b>: <i>www.drkaler.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>Diversified-Supply-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29816</link>
<guid>fc64004dee3fa6dec3cf0a018f64f1cd</guid>
<pubDate>Wed, 18 Feb 2026 11:40:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Diversified-Supply-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b18fa0401b91f4b6162e5b08ee4ab48b0f4b7c405502e1c32d9408bd96449594</i><br /><br />Threat actor <b>description</b>: <i>Electricity, Oil & Gas</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>IFL-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29814</link>
<guid>32364276cb2f62e1e492f15ca557159c</guid>
<pubDate>Wed, 18 Feb 2026 05:42:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>IFL-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a6fcc7db8d20e731027fa64167b4f595402a8a8ef7c27a94f2dae1da7ddac32</i><br /><br />Threat actor <b>description</b>: <i>Data breach at an Air Transportation Company.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cheyenne--Arapaho-Tribes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29813</link>
<guid>1fd1df658a0a3d7f385185db7c9c5029</guid>
<pubDate>Tue, 17 Feb 2026 21:24:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Cheyenne--Arapaho-Tribes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee86344ea4ad33b18d6e3ba31d825e67e8419baa1fadb28e0387522daa4eb65b</i><br /><br />Threat actor <b>description</b>: <i>Cheyenne & Arapaho Tribes The Cheyenne and Arapaho Tribes are a federally recognized united nation of two distinct peoples-the Tsistsistas (Cheyenne) and Hinono'ei (Arapaho)-with a historic alliance formed in the early 19th century.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wilson-Workflow-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29812</link>
<guid>73fb305c6b3819a3e01c5d351e699abc</guid>
<pubDate>Tue, 17 Feb 2026 21:19:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Wilson-Workflow-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a8657425cdb15ed732fe9f839d6b5b7415c48a09749571aeb575eb0733d70c8</i><br /><br />Threat actor <b>description</b>: <i>Data is not available now.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Midwest-Wheel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29800</link>
<guid>a69017f8746c392b173dc70700fda957</guid>
<pubDate>Tue, 17 Feb 2026 20:43:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Midwest-Wheel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8f5389fd9b7d2e61977a7a000ede7c351cfb5b0fc2055d012f98642a5de8662d</i><br /><br />Threat actor <b>description</b>: <i>Automotive Parts</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Saiful-Bouquet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29801</link>
<guid>73d0e1095870b725152f48157d253034</guid>
<pubDate>Tue, 17 Feb 2026 20:43:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Saiful-Bouquet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f74ef1424609bc1a6e6f1e1a40b2c4669534221e61133031f9736f86bf63fdb</i><br /><br />Threat actor <b>description</b>: <i>Architecture, Engineering & Design</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stockton-Cardiology-Medical-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29808</link>
<guid>874b2add857bd9bcc60635a51eb2b697</guid>
<pubDate>Tue, 17 Feb 2026 19:10:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Stockton-Cardiology-Medical-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25dfacfb6b0a53cd4a361584e3e1fc25894349b3a3b1bb11e5e597f380e659aa</i><br /><br />Threat actor <b>description</b>: <i>A provider of cardiology services.</i><br />Target victim <b>website</b>: <i>stocktoncardiology.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Community-Management-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29807</link>
<guid>8c4b0479f20772cb9b68cf5f161d1e6f</guid>
<pubDate>Tue, 17 Feb 2026 19:10:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Community-Management-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>39faa6bb694abedf27eed48d7fdd8bf3be9ea08b8adc0dd0a92bc1a6f0a80d39</i><br /><br />Threat actor <b>description</b>: <i>Serves residential and master-planned communities, town homes, mixed use and commercial/retail properties.</i><br />Target victim <b>website</b>: <i>cmamanagement.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Robeck-Fluid-Power</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29806</link>
<guid>98a733901e53052474f2320d0a3a9473</guid>
<pubDate>Tue, 17 Feb 2026 19:09:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Robeck-Fluid-Power</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>616e9f329673384e22e3b1eab48d18981c214d8c7049c392557c9a70aec5ae2d</i><br /><br />Threat actor <b>description</b>: <i>A supplier of machinery solutions</i><br />Target victim <b>website</b>: <i>robeckfluidpower.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fong-Ilagan-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29805</link>
<guid>b4525c940c2ee20606f7a6a59f32ab8b</guid>
<pubDate>Tue, 17 Feb 2026 19:08:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Fong-Ilagan-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1cb191a03518fc8ac94adb0b4829b0ec3be4e834a00f9cea21dd3d5f0eb5d9e</i><br /><br />Threat actor <b>description</b>: <i>An immigration law firm from Texas, USA.</i><br />Target victim <b>website</b>: <i>fonglegal.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>OfficeWorks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29804</link>
<guid>8a6b756f8eb9b358f11ece6ddca066f7</guid>
<pubDate>Tue, 17 Feb 2026 19:08:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>OfficeWorks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a5e0ea14f96681bd9cccd92e8f62f8a0c99880c5ac4912470ac25349bbe5bdb</i><br /><br />Threat actor <b>description</b>: <i>An office space consulting firm.</i><br />Target victim <b>website</b>: <i>officeworks.net</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Miller-Johnson-Jones-Antonisse--White</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29803</link>
<guid>7851934f3332c6b7ff9a3e4ed82e532d</guid>
<pubDate>Tue, 17 Feb 2026 19:07:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Miller-Johnson-Jones-Antonisse--White</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee516cb67e84942794f3192ddb108fa9b871c47e37a9e82e5b74b193fdacb4d5</i><br /><br />Threat actor <b>description</b>: <i>A law firm based in Oklahoma City.</i><br />Target victim <b>website</b>: <i>mjjaw.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>gbaco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29794</link>
<guid>457c753860099e09373e202e39292de9</guid>
<pubDate>Tue, 17 Feb 2026 14:40:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>gbaco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>435d19523b4c7e7b76fdee75936c47fda9b74f6a69cf93b94a081f910e7cf6cb</i><br /><br />Threat actor <b>description</b>: <i>GOFF BACKA ALFERA & COMPANY, LLC is a full-service public accounting and consult...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>powersmiller.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29795</link>
<guid>aa713fa341f6786c39b587498449a999</guid>
<pubDate>Tue, 17 Feb 2026 14:40:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>powersmiller.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1630864f9b49348ab8f6ea437ab6b509e1728cb212c99ed66817f21b6926f232</i><br /><br />Threat actor <b>description</b>: <i>Powers Miller Attorneys At Law is a civil litigation firm based in Northern Cali...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29796</link>
<guid>81c83933ca039e756f2b0d69ebaa38ba</guid>
<pubDate>Tue, 17 Feb 2026 13:39:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Brm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1469a9b995e098436c5efa127442a982e4452c41d934a0a527ae0e816fd45210</i><br /><br />Threat actor <b>description</b>: <i>Accounting Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Castle-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29792</link>
<guid>cb99590f7cf124e88bdd3a40b3b1c8bb</guid>
<pubDate>Tue, 17 Feb 2026 12:39:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Castle-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1798a569ad42c6df7f5471536e9c22fe8b391559c030bf405819f2f85ca1ee19</i><br /><br />Threat actor <b>description</b>: <i>Real Estate</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>structuredassetservices.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29793</link>
<guid>dc0e16a46c7bb604bc7fd87037f32787</guid>
<pubDate>Tue, 17 Feb 2026 12:20:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>structuredassetservices.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>68ca4a80161c336f498525ac7e685d1139e3b579cd64f05ecfa74429183e7244</i><br /><br />Threat actor <b>description</b>: <i>About Structured Asset Funding and 123LUMPSUM -- Located in Hallandale Beach, Florida, Structured Asset Funding, LLC and 123LUMPSUM are the leading purchasers of structured settlement payments and annuities. These specialty finance companies apply institutional financing, underwriting and legal expertise to purchase future cash flows from individuals whose life circumstances have changed suddenly and need immediate cash from their structured settlements and insurance annuities</i><br />Target victim <b>website</b>: <i>structuredassetservices.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hiwassee-Builder-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29788</link>
<guid>c6fc35734a1a498915984159907854e9</guid>
<pubDate>Tue, 17 Feb 2026 03:18:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Hiwassee-Builder-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fcfb7001fe7e776e92ac0be2cd917d7ee97c1a00da19c53622893d1828f6556c</i><br /><br />Threat actor <b>description</b>: <i>HIWASSEE BUILDERS SUPPLY is dedicated to delivering a wide range of building products and services with exceptional value and service across East Tennessee and beyond. They offer in-house expertise for project design, estimation, and timely product delivery, catering to both home remodeling and commercial construction needs. With four locations in East Tennessee, they ensure efficient service and support throughout various projects.  Laek: 100GB  WE HAS COLLECTED SUCH DATA AS:  - Confidential documents  - Clients Data  - NDA  - Financial data  - Operations  - Corporate data  - Business Agreements  - Development  - Financial databases, all transactions, all clients And a lot of other VERY IMPORTANT information!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>farbank.com-flywatertravel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29787</link>
<guid>2661d3ecfd1458a72d642c635f4972ce</guid>
<pubDate>Tue, 17 Feb 2026 03:18:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>farbank.com-flywatertravel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1bf43eb7e0d089c72a969c55f707f232b56f6642c306426238b73040775a3430</i><br /><br />Threat actor <b>description</b>: <i>Far Bank Enterprises is an integrated manufacturer and distributor of fly fishing products and services, including fly fishing rods, reels, waders, lines, leaders, tippet, performance outdoor apparel, and travel to the world's finest fly fishing experiences. Far Bank subsidiaries operate under the brand names Sage, Redington, RIO Products, and Fly Water Travel. Fly Water Travel is a leading provider of guided fly fishing trips and vacations, dedicated to delivering exceptional experiences for passionate anglers.  Laek: 100GB  WE HAS COLLECTED SUCH DATA AS:  - Confidential documents  - Clients Data  - NDA  - Financial data  - Operations  - Corporate data  - Business Agreements  - Development  - Financial databases, all transactions, all clients And a lot of other VERY IMPORTANT information!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nebraska-Health-Imaging</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29786</link>
<guid>12b2fce48d921b502cb67aaf23df662f</guid>
<pubDate>Tue, 17 Feb 2026 02:48:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>Nebraska-Health-Imaging</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6fd1dfa38ba95f4f13dc54a5faa9586846e60540f00ea340d94f8fcec988bd28</i><br /><br />Threat actor <b>description</b>: <i>Nebraska Health Imaging is an accredited outpatient diagnostic center in Omaha, NE, offering a comprehensive range of affordable diagnostic and screening radiology services, including MRI, CT, X-rays, and Ultrasound.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>Modoc-Medical-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29774</link>
<guid>ec6019ea251a4e03b08d4135153be64e</guid>
<pubDate>Mon, 16 Feb 2026 17:37:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Modoc-Medical-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eaa68f7709483b61de99844fe4f96c6f555a6893f9ea0712b4abba6dd45f6229</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Williams-Brothers-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29776</link>
<guid>82553a1ebce1e1df751e69b697bd097b</guid>
<pubDate>Mon, 16 Feb 2026 17:37:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Williams-Brothers-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7c55ae32ba1b403b56f5f45341b1a85734cd19676edf5a44b0eab5828dbb8c8</i><br /><br />Threat actor <b>description</b>: <i>Williams Brothers Construction Company, based in Houston, is a leading highway contractor in the United States with over 70 years of experience. They specialize in bridge construction, roadway paving, and handling complex special projects, emphasizing engineering excellence and innovation.We will upload almost 90gb of corporate data soon. Lots of personal files of employees, confidential financials and other files, projects, client files, NDAs and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Abbott-Media-Productions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29779</link>
<guid>28869ca36d89935b7de5d54a513e63e3</guid>
<pubDate>Mon, 16 Feb 2026 17:25:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Abbott-Media-Productions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>62bc95f0f6c8fe120fccb7b8a208c3a6061b8b2eb80d9063169f9e9037236cb0</i><br /><br />Threat actor <b>description</b>: <i>Abbott Media Productions, based in Tucson, Arizona, specializes in 3D animation, technical animation, and a full range of video production services. They provide animation services and interactive applications, incident reenactments, product animation, and motion graphics. Their primary clients include government agencies, defense contractors, and commercial organizations.</i><br />Target victim <b>website</b>: <i>https:abbottanimation.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Marshall--Stevens</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29777</link>
<guid>b5932e1bc9bc30711f71a60a3d5c965c</guid>
<pubDate>Mon, 16 Feb 2026 17:12:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Marshall--Stevens</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7c27cb4f3e79c64c1951a81be1e5f0ac0b45e12e27387e58481f7bb7d51cdfc</i><br /><br />Threat actor <b>description</b>: <i>Marshall & Stevens was established in 1932. The firm has pioneered new concepts to provide realistic c…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>hh2home.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29772</link>
<guid>b9e4d53a5bd0882b7715b90c7c29aea2</guid>
<pubDate>Mon, 16 Feb 2026 14:43:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>hh2home.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b50df51255854a78f3652bfd0a93ea7ebe6cecc0d59712b516f8df117cc90672</i><br /><br />Threat actor <b>description</b>: <i>For 30 years, we have been the preferred wholesale partner for many of your favorite retailers. During this time, we have continued to develop our passion for innovation and creating quality furniture designed to inspire. We believe that real life is beautiful, and nowhere is this more evident than in our homes.</i><br />Target victim <b>website</b>: <i>hh2home.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>faswealthpartners.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29771</link>
<guid>28ec410e2ac9d191d1d1558806bace8c</guid>
<pubDate>Mon, 16 Feb 2026 14:42:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>faswealthpartners.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6c717562599367d5ed784e7a6f2cdcbde15d190cf8c1a20387defe22d14c127</i><br /><br />Threat actor <b>description</b>: <i>FAS Wealth Partners, Inc. is a fee-based financial advisory firm located in Kansas City. The company offers a wide range of services, including asset management, retirement planning, and estate planning. The firm primarily serves high-net-worth individuals, families, retirees, executives, professionals, and business owners, providing customized financial planning and investment management solutions. With a personalized approach, the company helps clients achieve their financial goals and optimize their wealth. 
Founded in 1979, FAS Wealth Partners focuses on building strong relationships with clients through its team of certified financial planners.</i><br />Target victim <b>website</b>: <i>faswealthpartners.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hagen-Rosskopf</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29765</link>
<guid>185982320d79cd9d4bdfa9164f801930</guid>
<pubDate>Mon, 16 Feb 2026 14:38:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Hagen-Rosskopf</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7fce353f0ef96e171ebb4c2fbaa3f0de107f95dbf873484e28ebcad7c741063b</i><br /><br />Threat actor <b>description</b>: <i>A fast paced, boutique law firm that specializes in personal injury with a niche in representing injured cyclists.We will upload corporate data soon. Clients' personal information(passports, DLs, health information and so on), confidential legal files, court docs, police reports, employee files, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>traceenv.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29769</link>
<guid>1b31785397bc74c6ff59451d4f410b71</guid>
<pubDate>Mon, 16 Feb 2026 13:59:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>traceenv.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb1e2316c8be54355bfcaa0ce6493b44de99a5f2923a4506848d9aff44d11908</i><br /><br />Threat actor <b>description</b>: <i>Trace Environmental Systems Inc. is an innovative organization specializing in providing continuous stack emission monitoring systems and data collection solutions that ensure regulatory compliance.The company serves a variety of industries, including ethanol production, power generation, chemical manufacturing, waste-to-energy, wastewater incineration, cogeneration/recovery/university facilities, and refineries.</i><br />Target victim <b>website</b>: <i>traceenv.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>mapsweb.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29768</link>
<guid>56497e4ee7adaa68126174b985b7081c</guid>
<pubDate>Mon, 16 Feb 2026 13:58:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>mapsweb.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9e5801d9345123ac382ff7465e9a0f529b317f621cfdc47a4e265d25e65948d</i><br /><br />Threat actor <b>description</b>: <i>Modern Advanced Print Solutions (MAPS, Inc.) is a leading independent corporation located in Leavenworth, Kansas, specializing in a wide range of products for 
document management and office systems. The company offers innovative print management, asset lifecycle management, and other professional services designed to improve business efficiency.</i><br />Target victim <b>website</b>: <i>mapsweb.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Branagh</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29757</link>
<guid>a49ab7f57366ac88e823ae316a39e6fb</guid>
<pubDate>Sun, 15 Feb 2026 19:38:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Branagh</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>735450b65efc7514a9c58932f79f9d6f153dd5f1ecc0e675d1805ccd2af23a89</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.branaghinc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Adirondack-Networks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29743</link>
<guid>f076abd96d6f1a9ae1b32bde776e9e82</guid>
<pubDate>Sat, 14 Feb 2026 15:09:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Adirondack-Networks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5aefd486db3ffc4f765c675fce214ee5ee552fac8d950dd81ef251b074060c4e</i><br /><br />Threat actor <b>description</b>: <i>Internal Documents.</i><br />Target victim <b>website</b>: <i>adirondacknetworks.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Northeast-Pharmacy-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29717</link>
<guid>021b8947656eb84e4c641506215777c8</guid>
<pubDate>Sat, 14 Feb 2026 12:37:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Northeast-Pharmacy-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3749cedfdc7c341361bbcaa7e26c74fa0889d02815ccfcef8c866a77e08b6c41</i><br /><br />Threat actor <b>description</b>: <i>Northeast Pharmacy Service Corporation (NPSC) is dedicated to supporting independent community pharmacies by providing business development services, individualized support, and strategic advocacy. They offer a range of concierge-level services, including access to dedicated pharmacy consultants, educational resources, and industry insights to help pharmacies thrive.We are going to upload company data soon. You will find financialdata (audit, invoices,financial reports), personal files and customers data.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>MESA-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29727</link>
<guid>f7fb43719fb4947a5d0faa61de9fb232</guid>
<pubDate>Sat, 14 Feb 2026 11:26:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>MESA-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12309ac39e4d85b572c51c6dd4b8b97e24d27b64a68ea8ac0252a4f7a917f7d5</i><br /><br />Threat actor <b>description</b>: <i>MESA Products is a U.S.-based industrial company that supplies cathodic protection materials and corrosion control solutions. The company focuses on preventing rust and structural damage in critical infrastructure such as pipelines and underground metal systems. Its product range includes test stations, connection kits, and monitoring equipment used to measure and maintain corrosion-protection systems. MESA emphasizes safety, reliable manufacturing, and high on-time delivery performance while supporting engineers, utilities, and construction sectors. The company’s mission is to protect people, property, and the environment by extending the life and reliability of essential infrastructure through quality protective technologies and technical support services. 
The company headquarters is located in 4445 S 74th East Ave, Tulsa, Oklahoma 74145, United States.
201-500 Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>hanover-ma.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29725</link>
<guid>c21721f351b4c39bf61f7d9a987615e5</guid>
<pubDate>Sat, 14 Feb 2026 11:14:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>hanover-ma.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>adacd68e11e85ca5c511323697f8940bb0c0d3c9295dea33e337f822a18a5327</i><br /><br />Threat actor <b>description</b>: <i>The mission of the Hanover Police Department is to prevent crime, but instead of doing their job, th...</i><br />Target victim <b>website</b>: <i>hanover-ma.gov</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>cmcconstruct.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29723</link>
<guid>943b303113e117eac269699cdb061768</guid>
<pubDate>Sat, 14 Feb 2026 11:11:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>cmcconstruct.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>471eaf87d6757950fa4a6e78bc5e2494ec63071cc48eb5f816068f4b2d4c7525</i><br /><br />Threat actor <b>description</b>: <i>Chamberlain & McCreery is a general contractor specializing in the construction of custom, energy-ef...</i><br />Target victim <b>website</b>: <i>cmcconstruct.com</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>JC-Resorts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29716</link>
<guid>2963dbc550404970787514aa177006e8</guid>
<pubDate>Sat, 14 Feb 2026 10:38:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>JC-Resorts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7df006b491ececfb401133f3b38c95e25218d9a40a98841b0a41008c84f94aaf</i><br /><br />Threat actor <b>description</b>: <i>Hospitality</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Buff-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29715</link>
<guid>bf9d0c59964a37b03173d7c683153962</guid>
<pubDate>Sat, 14 Feb 2026 06:55:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>Buff-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c36ddd6ccc8fa5a9a458f903b6c14114ea660ce4d13d12c0f054735bf2ed9bd</i><br /><br />Threat actor <b>description</b>: <i>Rosenthal, Kooshoian & Lennon, LLP is a long-established Buffalo, New York law firm with over 70 years of experience representing clients in personal injury, criminal defense, and related matters.  They handle a wide range of cases including construction and vehicle accidents, wrongful death, product liability, and DUI/DWI defense.  The firm is known for personalized legal advocacy, trial experience, and free consultations for many types of cases.  Their attorneys combine courtroom skill with community recognition and professional involvement.- Clients' personal data- Court decisions- Evidence- Police reports, etc. https://bufflaw.com/</i><br />Target victim <b>website</b>: <i>bufflaw.com</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Copier-Careers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29712</link>
<guid>ea90e42eb981294a7fb36b39326d9617</guid>
<pubDate>Fri, 13 Feb 2026 23:08:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Copier-Careers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eb2789bedbc54a7714f485fda04aebeeba9658499c69e7b4ba317073a4399772</i><br /><br />Threat actor <b>description</b>: <i>Copier Careers is a recruiting firm connecting Copier Channel employers with skilled professionals. It focuses on strategic placements—Sales Reps, Managers, and other office equipment roles—to help businesses grow, and provides job seekers a job board.</i><br />Target victim <b>website</b>: <i>www.copiercareers.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Syverson-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29711</link>
<guid>253637b08749bde403df7fcd0b66f731</guid>
<pubDate>Fri, 13 Feb 2026 23:07:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>The-Syverson-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c82dcd705ced14209eec892ae53e0be72211dc863c0e77beb59ba2af4bc51a0a</i><br /><br />Threat actor <b>description</b>: <i>TSG is a retained executive search firm specializing in medical device and life sciences recruiting. They deliver rapid, client and candidate-focused talent acquisition—including diagnostics, clinical research and leadership placement.</i><br />Target victim <b>website</b>: <i>www.thesyversongroup.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Archaeological-Institute-of-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29706</link>
<guid>bb4ea12f999f3e1c0df45ab2983be5df</guid>
<pubDate>Fri, 13 Feb 2026 21:38:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Archaeological-Institute-of-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>497301b394582bd5a5b0f1908e8436a65f6cce17d16f06f994d92a6f6c5fdd3a</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1879, the Archaeological Institute of America (AIA) is the oldest and largest archaeological organization in North America. Today, the AIA has over 200,000 members and 110 local societies in the United States, Canada, and abroad.</i><br />Target victim <b>website</b>: <i>archaeological.org</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>CHASI-A-part-of-Sun-River-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29705</link>
<guid>20a8571b66205bd36a898172ae082c53</guid>
<pubDate>Fri, 13 Feb 2026 21:34:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>CHASI-A-part-of-Sun-River-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b7378470f07b29b671e2f07be4e4a4a5b5f9ecebd5af5f0a473c0ac1ceb33c8</i><br /><br />Threat actor <b>description</b>: <i>An interesting non-profit organization</i><br />Target victim <b>website</b>: <i>chasiny.org</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Heartland-Title-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29704</link>
<guid>c5e04ccb6be7fab8ccb9df005a075cc2</guid>
<pubDate>Fri, 13 Feb 2026 19:10:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Heartland-Title-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f2035781520c820b3cba4a3dd4a2113e497e323104b45e8a3ba89b06332d48df</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.heartlandtitleco.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>UCG-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29703</link>
<guid>1dcad8cc5b82a7ef72f72716b220cf13</guid>
<pubDate>Fri, 13 Feb 2026 19:09:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>UCG-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e8dcf0d3dc9c4c2785661ba43e0fa9a821b63c21ca5cf36ff51f152b626d700</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ucgassociates.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>HMA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29701</link>
<guid>49de010bfd34f149fc319dd839707a36</guid>
<pubDate>Fri, 13 Feb 2026 19:08:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>HMA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>85d9aa7b505b4e2c4decf9648e85aeac5fe273f18572a107cc587ec78d2fdd9e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.hmapr.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lusamerica-Foods</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29700</link>
<guid>04907a4c18ddcbc3155a2e65598a5c7b</guid>
<pubDate>Fri, 13 Feb 2026 19:07:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Lusamerica-Foods</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c9dcc50c65c8c3ba740027918a2ab004fea992e59bee008f1581b766f517176</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.lusamerica.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carrera-Casting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29693</link>
<guid>d7facbd2b01e0596ed7115dbdc49df43</guid>
<pubDate>Fri, 13 Feb 2026 17:38:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Carrera-Casting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8a299a6d2c1b296a89ba91f1460ea2bae15c7dd0ae66cb14e714fa272233b324</i><br /><br />Threat actor <b>description</b>: <i>Accounting Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Michael-L-Larson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29695</link>
<guid>766c626b2cb1532f235d3bd44279f2f9</guid>
<pubDate>Fri, 13 Feb 2026 17:38:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Michael-L-Larson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c6dd10603c91d03d518875886f8aaa3956bad4d2e66b54bc1c3bdcf775ffcb7f</i><br /><br />Threat actor <b>description</b>: <i>Michael Larson & Co., P.C. (MLL Co) specializes in providing tax and client advisory services to businesses operating globally, nationally, and within the greater Portland area. We are going to upload company data soon. You will find financialdata (audit, payment details,financial reports, invoices), employees and customers information (passports, medical information, driver's license ) A bit of personal files and customers data.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-New-Castle</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29691</link>
<guid>97fad65319f26ae8c99e0a47a7ca7d57</guid>
<pubDate>Fri, 13 Feb 2026 16:17:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>City-of-New-Castle</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d7946c6c7788a6a146c93e2aa973bad2bac0c0d4e0783d096265eebf9265ee2</i><br /><br />Threat actor <b>description</b>: <i>newcastlecity.delaware.gov zoominfo.com/c/city-of-new-castle/1205094711 The City of New Castle offers a vibrant, historic community situated along the Delaware River, known for its colonial charm and outdoor recreational spaces. It caters to residents, visitors, and businesses with services such as expedited permitting and reliable utilities. The city promotes a variety of recreational activities, including parks, trails, and community events. With a rich history and preservation efforts</i><br />Target victim <b>website</b>: <i>newcastlecity.delaware.gov</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Smart-Glass</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29689</link>
<guid>3a7666b08689f8259f0f1671eaac81cd</guid>
<pubDate>Fri, 13 Feb 2026 16:15:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Smart-Glass</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5feaa309a20d176d2b329a7d154b7edb8abb8d6b96d901929614a6c42b2d6cc4</i><br /><br />Threat actor <b>description</b>: <i>smartglassco.com zoominfo.com/c/smart-glass/348631137 Smart Glass specializes in innovative glass processing technology and operates a state-of-the-art factory located in El Fayoum, Egypt. Their facility spans 40,000 square meters and is equipped with the latest advanced equipment from leading manufacturers. The company is dedicated to revolutionizing glass processing with their cutting-edge solutions. Smart Glass aims to serve clients in various industries seeking high-quality glass products</i><br />Target victim <b>website</b>: <i>smartglassco.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Marena-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29688</link>
<guid>967d1576e70c8f8649702b974e035744</guid>
<pubDate>Fri, 13 Feb 2026 15:37:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>The-Marena-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97abc40b8c7507c74f448e2e3050ad2f624fa05b2e5651e0a0d7763c72708ecd</i><br /><br />Threat actor <b>description</b>: <i>Contains a set of SQL databases

For the past 30 years, Marena has been dedicated to advancing the effective use of medical-grade compression through research, innovation, design, and manufacturing of garments for long-term wellness benefits. Our mission is to help patients around the world heal in comfort, recover with confidence, and live better.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Elite-Screens-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29687</link>
<guid>79538b5ba48344b080bb6dc46622657f</guid>
<pubDate>Fri, 13 Feb 2026 12:26:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Elite-Screens-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc8771df6abb27740501d333f0689036f6dc343af3c9f4e22cc21e862123e8c2</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2004, Elite Screens Inc. is a US-based projection screen manufacturing company with its world headquarters in California and satellite offices in Australia, China, France, Germany, India, Latvia, Mexico, Japan, and Taiwan. Elite is a certified professional manufacturer of projection screens that specializes in producing retail, commercial and custom integrator sales channels. Elite Screens products are available through authorized distributors, re sellers, retailers and system integrator worldwide.</i><br />Target victim <b>website</b>: <i>elitescreens.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Empire-Express</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29683</link>
<guid>ca1e7c16062816dd5c888af7ea5afa0b</guid>
<pubDate>Fri, 13 Feb 2026 01:38:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Empire-Express</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df29424e475c27eea1a902fe4dc1a00d527745b88de1c2929e2a1f63d9607726</i><br /><br />Threat actor <b>description</b>: <i>Empire Express, Inc. provides trucking transportation services. The company offers transports clothing and apparel, air cargo, home and office products, packagi...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Yelete-Group-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29680</link>
<guid>0caa694ffbe5d4bc7a4f359989388fdb</guid>
<pubDate>Thu, 12 Feb 2026 22:38:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Yelete-Group-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>712fd76a37b3e56ac07ccc2727338d4a5a7fc4de886f0c20521cbcc2f112bc5d</i><br /><br />Threat actor <b>description</b>: <i>Yelete Group, Inc. specializes in wholesale activewear, apparel, and lingerie, offering a wide range of products including leggings, tights, and various clothin...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Halcyon-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29681</link>
<guid>3eec1ed838fd558428398779631b66a5</guid>
<pubDate>Thu, 12 Feb 2026 21:30:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Halcyon-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0faf2c6f864ae09b4758e0e60587549aa2584bfd740dd50125f6d719fa0360a5</i><br /><br />Threat actor <b>description</b>: <i>Halcyon is the industrys first dedicated, adaptive security platform that combines multiple proprietary advanced prevention engines along with AI models focused specifically on stopping ransomware. Halcyon is built by offensive security experts to stop attackers.</i><br />Target victim <b>website</b>: <i>www.halcyontechnologies.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pathway-Reads-and-Data-Analysis</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29676</link>
<guid>dba595edc1e3c2214ed62c128944c932</guid>
<pubDate>Thu, 12 Feb 2026 18:19:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Pathway-Reads-and-Data-Analysis</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>50e96578881feb47519c6d57ab543dc84f0e0f7675e688aba250c40a589d7a9b</i><br /><br />Threat actor <b>description</b>: <i>Pathway Reads and Data Analysis is a company that operates in the
Energy, Utilities & Waste industry. The company is headquartered
in Raymore, Missouri.

We are going to upload company data soon. You will find financial
data (audit, payment details,financial reports), employees and c
ustomers information (emails, phones) NDAs and other documents wi
th personal information. 
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stanley-Autenrieth-Auction-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29672</link>
<guid>5fde161290a4ebf1163b976f2fa03cdd</guid>
<pubDate>Thu, 12 Feb 2026 16:38:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Stanley-Autenrieth-Auction-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>41ca0d0c96015a5cbdaf322398745c9ae383383a97896ff3852676fad5db57f3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Phoenix-Art-Museum</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29673</link>
<guid>0c945a8e12dd7ff713c275c1ad6de9e1</guid>
<pubDate>Thu, 12 Feb 2026 15:08:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Phoenix-Art-Museum</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba5954a0dfd9726b28d5fb35a59303b93bae5fe5a013cfc0d98d3db78cf32832</i><br /><br />Threat actor <b>description</b>: <i>Phoenix Art Museum Phoenix Art Museum is an art museum that showcases art from around the U.S. in Phoenix, Arizona.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Campbell-Rappold--Yurasits</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29668</link>
<guid>4db3b4270aca22aa23c78c4acf712915</guid>
<pubDate>Thu, 12 Feb 2026 09:38:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Campbell-Rappold--Yurasits</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>feddd56a6e6bd805a93d55b7a3d30ed5c83c06280233e02a13401342ba80bd00</i><br /><br />Threat actor <b>description</b>: <i>Accounting Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sakata-Seed-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29670</link>
<guid>c5f03386978cf62ddb7f2f46e9bd5790</guid>
<pubDate>Thu, 12 Feb 2026 09:38:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Sakata-Seed-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96fe0cc79ba2db596ce7d44d5bde21ccfbc68f6b008f12d061bff761c6284cba</i><br /><br />Threat actor <b>description</b>: <i>Home Improvement & Hardware Retail</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Segue-Manufacturing-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29665</link>
<guid>e54eb3dcfb82757f17eafe999d14f97f</guid>
<pubDate>Thu, 12 Feb 2026 07:41:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Segue-Manufacturing-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e474402b7b0abc6279a54e26a0fde2ad02b69f120fbf6e31f917cd9c50097b15</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.segue-mfg.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>auxhomeservices.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29663</link>
<guid>f06d9b059d9be032816e17a6d8a3d430</guid>
<pubDate>Thu, 12 Feb 2026 05:39:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>auxhomeservices.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e060be89329f507e2beb100d2b021ae99049c6a0625299c6a26eaea09bce26c1</i><br /><br />Threat actor <b>description</b>: <i>Aux Home Services is a trusted provider of plumbing, electrical, heating, and air conditioning services in Birmingham, Alabama, along with Jefferson and Shelby counties. They pride themselves on delivering prompt and reliable service, available 24/7, with skilled technicians who respect and clean up after their work. The company emphasizes upfront pricing and quality craftsmanship, ensuring customer satisfaction. Their diverse range of services includes AC and heating installations, plumbing repairs, and electrical systems management. Employees: 50 Revenue: $6.9 Million Industry: Construction Management  Phone Number: (205) 979-0946</i><br />Target victim <b>website</b>: <i>auxhomeservices.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>atchadwick.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29662</link>
<guid>4394baa58b824ad2b3f83ba695cecd6a</guid>
<pubDate>Thu, 12 Feb 2026 05:38:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>atchadwick.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>805dec827771b7bbc095f25aa9fe8c555d4898ad778283f4a77f6ef97ef85e4c</i><br /><br />Threat actor <b>description</b>: <i>A.T. Chadwick is a mechanical contracting firm that offers services in plumbing, heating, air-conditioning, refrigeration, process piping, and field management. The company was founded in 1966 and is headquartered in Bensalem, Pennsylvania. Employees: 500 Revenue: $159.1 Million Industry: Construction Management Phone Number: (215) 245-5800</i><br />Target victim <b>website</b>: <i>atchadwick.net</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Atlantic-Refinishing--Restoration</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29653</link>
<guid>c7567e4dd48114e82ef45702ccbc06c5</guid>
<pubDate>Wed, 11 Feb 2026 22:41:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Atlantic-Refinishing--Restoration</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f8b2f6987239d8aa443d2377dd785dac0594aa51984f9da62769118df17fcc4</i><br /><br />Threat actor <b>description</b>: <i>The data leaked from the company's servers includes all project work(Exp. PENTAGON), employee information,  confidential company agreements and etc. In particul...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Law-Office-of-COX--SANCHEZ</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29660</link>
<guid>3fcee1ea342699e1bf18973b242f9b65</guid>
<pubDate>Wed, 11 Feb 2026 21:57:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Law-Office-of-COX--SANCHEZ</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>32b7319b87f61ccae73e9676aece5b524ae348160dc3b23f8cdf7f79ae3fd6c5</i><br /><br />Threat actor <b>description</b>: <i>The Law Firm of Cox & Sanchez has been committed to serving the residents of the State of Florida with clear, concise, and actionable answers to their legal issue for nearing 40 years. We are budget-conscious, and results driven and treat each client with dignity and respect. We know that listening and understanding your exact and distinct legal problems will lead to most efficient solutions.</i><br />Target victim <b>website</b>: <i>www.coxsanchez.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>Andringa-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29659</link>
<guid>4a204e824b80ebb74ac7895ab81fcabf</guid>
<pubDate>Wed, 11 Feb 2026 21:56:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Andringa-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ebfbf79db7fc09d6750250d7df2d2fa06c10d374cdb9792ffb7331a2f0e79f1c</i><br /><br />Threat actor <b>description</b>: <i>Bob Andringa has been involved in commercial and real estate litigation for the past twenty years. Bob is experienced in the foreclosure and partition areas of law for both Plaintiffs and Defendants. In addition, his office is knowledgeable and proficient in litigating contractual and landlord/tenant disputes</i><br />Target victim <b>website</b>: <i>www.andringalaw.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clark-Foam-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29654</link>
<guid>282b71a86a960e117b12b24d88aff20e</guid>
<pubDate>Wed, 11 Feb 2026 21:15:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Clark-Foam-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de5e28fac934dafa4e0d4ef3635783d870bbe2dfd21af6b3a5f95d2ac4c172c8</i><br /><br />Threat actor <b>description</b>: <i>clarkfoam.net zoominfo.com/c/clark-foam-products-corp/25809475 Clark Foam Products is a specialized foam fabricator with over five decades of experience serving various industries, including aerospace, automotive, medical, and packaging. They offer a diverse range of high-quality foam products such as crosslink foam, polyurethane foam, and filter foam, along with custom fabrication and design services tailored to meet specific client needs. The company is recognized for its innovative cutting</i><br />Target victim <b>website</b>: <i>clarkfoam.net</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.hfplanners.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29652</link>
<guid>a9e1944b39bf72d5222e1e9585e6c08a</guid>
<pubDate>Wed, 11 Feb 2026 20:36:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>www.hfplanners.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22728f3448a94d90610e681f322566142fc5132e4f11e570029c337c4f26b805</i><br /><br />Threat actor <b>description</b>: <i>full data corp</i><br />Target victim <b>website</b>: <i>www.hfplanners.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>R.J.-Zavoral--Sons-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29651</link>
<guid>6daab15a4f57549b7f236d7f0cfca3c8</guid>
<pubDate>Wed, 11 Feb 2026 20:34:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>R.J.-Zavoral--Sons-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0733dd959faf30c054c09366385da65de1413cd009657529e48f5dbb82d92e1d</i><br /><br />Threat actor <b>description</b>: <i>Established in 1951, R.J. Zavoral and Sons, Inc. is a leading earth moving and construction services contractor based in East Grand Forks, MN, specializing in asphalt paving, road and rail construction, site work, and underground utilities. The company serves clients across the Red River Valley, including municipalities, private businesses, and industries, providing solutions for flood mitigation and environmental site management. With a commitment to quality and family values, R.J. Zavoral and Sons employs innovative technologies to ensure efficient project execution and customer satisfaction. Their extensive experience in construction has allowed them to build strong relationships with various clients, further solidifying their reputation in the industry</i><br />Target victim <b>website</b>: <i>www.rjzavoral.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Altak</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29650</link>
<guid>fc363ff03fd6ee72e038e54e555c6153</guid>
<pubDate>Wed, 11 Feb 2026 19:40:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Altak</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5237793437b91ffbc1b2009f14509e7cdb5d8d0924f6b7b5b6658efb41b8bb2c</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.altakinc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Catalanatto--Barnes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29649</link>
<guid>150c1a63c456776f622da0602c807f2a</guid>
<pubDate>Wed, 11 Feb 2026 19:39:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Catalanatto--Barnes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d22a00bd94c0cdb28d46cccfd171867c93609974c90480e29a31acd81a57064e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.bscatcpa.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>On-Point-Defense-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29644</link>
<guid>49f1166a6220873fb19f1905f439850c</guid>
<pubDate>Wed, 11 Feb 2026 18:29:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>On-Point-Defense-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9cd303bdea9398a17f025c405e9177ac2cdd4844881f7fbee4ed239d145295a1</i><br /><br />Threat actor <b>description</b>: <i>Manufacturing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>COIT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29645</link>
<guid>7bff87c59e3fbc5e1ded2fe3ce1d9865</guid>
<pubDate>Wed, 11 Feb 2026 18:29:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>COIT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0169f0e2638ad871b68b48f1a610c135d87678919417a12cf617b0abf56a283d</i><br /><br />Threat actor <b>description</b>: <i>COIT is a full-service specialty Cleaning & Restoration company that can handle all maintenance cleaning needs and unforeseen mishaps requiring professional remediation. We are going to upload company data soon. You will find financialdata (audit, payment details,financial reports), personal files and customers data.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Northbridge</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29647</link>
<guid>f9c1a456675346ff7d0f2b8b1e7b1899</guid>
<pubDate>Wed, 11 Feb 2026 18:11:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Northbridge</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e61edc3c5bf5f648465f51d2eceeed8897ebdd13fce7114f6844839f1b9f67d7</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.northbridgecre.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tsunami-Tsolutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29646</link>
<guid>356cdab4ed0406224c0880771445819a</guid>
<pubDate>Wed, 11 Feb 2026 17:34:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Tsunami-Tsolutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8191abf5bf043876287bd9f3d5190b72b28d66f66fe2cf6efd1e3c9387235a4</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Tsunami Tsolutions is a tech company offering IT services and software solutions to key domains, mainly aviation and manufacturing. Their offerings include data procurement and analysis, MRO, supply chain management, and reliability prediction software. It undertakes and manages its customers' technological tasks, aiding them in strategizing and enhancing their business performance.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aviam-Corporate-Housing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29643</link>
<guid>d8e0a5cf600594ec60296c205af805e7</guid>
<pubDate>Wed, 11 Feb 2026 16:06:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Aviam-Corporate-Housing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>84b3932cc5be4b8013107684c3c02b58f5d08d7f0391cbe6f27f68efdd4d2741</i><br /><br />Threat actor <b>description</b>: <i>Aviam is the nation's premier corporate housing provider, offering furnished, fully equipped accommodations with maid service, 24/7 emergency support, and customizable packages for executives, teams, or interns — more comfort and savings than hotels.</i><br />Target victim <b>website</b>: <i>www.aviam.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Topkin--Partlow</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29642</link>
<guid>d286a917bfa85c1f2c139e704417d295</guid>
<pubDate>Wed, 11 Feb 2026 15:41:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Topkin--Partlow</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0054c7ff1ce6d17c52cd56e97943645ddfd530f7a100995be7678f948c2c30ff</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tower-Insurance-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29641</link>
<guid>e07c2c81c883f095372f10815aaa25ba</guid>
<pubDate>Wed, 11 Feb 2026 14:43:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Tower-Insurance-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4108206446ac305bcc37e45129aac222010bf7325ee881038d09201811db5897</i><br /><br />Threat actor <b>description</b>: <i>Insurance</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Andringa-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29631</link>
<guid>4e18967c55baab1033250c9f8b0016b1</guid>
<pubDate>Wed, 11 Feb 2026 08:41:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Andringa-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19199a89ae80851f53e34997b2b59bd29cbb995c20e18a0a2eac2169f4a48b7b</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cox--Sanchez</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29632</link>
<guid>e5fea2100557ed4a239fa49305613d6b</guid>
<pubDate>Wed, 11 Feb 2026 08:41:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Cox--Sanchez</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>407ab4a3ddbd07b69b1b1c7c50e76dada2119e0db77c86b3c22662c4bec7a192</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>falconmgt.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29639</link>
<guid>3e59bff2aa24cd053805ecbe01cbdf7d</guid>
<pubDate>Wed, 11 Feb 2026 08:29:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>reynolds</b> claims attack for <b>falconmgt.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>afa4f87797f6280445952029c054343ad86cb8d669232df0413f67b420b694d0</i><br /><br />Threat actor <b>description</b>: <i>Falcon Management Corp. was founded in 1991. The company's line of business includes providing financial planning and investment advisory services.</i><br />Target victim <b>website</b>: <i>falconmgt.com</i>]]></description>
<category>reynolds</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hood-River-Dental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29638</link>
<guid>758dd0edb588eb2606f15ffb43391bf1</guid>
<pubDate>Wed, 11 Feb 2026 08:22:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bravox</b> claims attack for <b>Hood-River-Dental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9acf97eaa82c61eef1c5da9aa8919a9cf4e5bec93baf55faadd917ccf03b9ab0</i><br /><br />Threat actor <b>description</b>: <i>A dental clinic offering its clients a wide range of services.</i><br />Target victim <b>website</b>: <i>www.hoodriverdentist.com</i>]]></description>
<category>bravox</category>
</item>
<item xmlns:dc='ns:1'>
<title>WVPCA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29637</link>
<guid>656a03108e4217b836ccd9f58fa18900</guid>
<pubDate>Wed, 11 Feb 2026 08:21:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bravox</b> claims attack for <b>WVPCA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f64826a260e3d2a277245172cbc29fb0d9aff0e17bed894deac41e9ff0e70076</i><br /><br />Threat actor <b>description</b>: <i>An organization that supports and develops a network of community health centers throughout West Virginia.</i><br />Target victim <b>website</b>: <i>www.wvpca.org</i>]]></description>
<category>bravox</category>
</item>
<item xmlns:dc='ns:1'>
<title>SPEC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29636</link>
<guid>8d6a9e37e8c314a0b3fc23a54e5ec105</guid>
<pubDate>Wed, 11 Feb 2026 08:21:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bravox</b> claims attack for <b>SPEC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97883e77a9854949ac833cc48cf47d1befcdd83b354af293de1dabe9490108fe</i><br /><br />Threat actor <b>description</b>: <i>A company operating in the field of radiography.</i><br />Target victim <b>website</b>: <i>spec150.com</i>]]></description>
<category>bravox</category>
</item>
<item xmlns:dc='ns:1'>
<title>FUSION-HILL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29635</link>
<guid>0919fe8239ba5be746ae7a1d44f50a7f</guid>
<pubDate>Wed, 11 Feb 2026 08:20:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bravox</b> claims attack for <b>FUSION-HILL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>65bad56e85a39054485da58c7bc510ff1d6a96af79cef2ead7cdb04296324394</i><br /><br />Threat actor <b>description</b>: <i>A company operating in the broad field of marketing and advertising.</i><br />Target victim <b>website</b>: <i>www.fusionhill.com</i>]]></description>
<category>bravox</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lindenhurst-Fire-Department</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29625</link>
<guid>b03d078b859d32d6b12b3e491acaf978</guid>
<pubDate>Wed, 11 Feb 2026 06:41:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Lindenhurst-Fire-Department</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e4f6f8e2f08700947db4e3b5e9edb625a5fd8a6f1509fca5c05b4c74113012d</i><br /><br />Threat actor <b>description</b>: <i>Government</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mississippi-Market</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29626</link>
<guid>9572d7558e2231f00f8c9a0005101b01</guid>
<pubDate>Wed, 11 Feb 2026 06:41:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Mississippi-Market</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dea24c2fa198ef90659dd30f8e3ce30890fd4dd9fe99fff73789219c8fe8bb4c</i><br /><br />Threat actor <b>description</b>: <i>Consumer Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>BCS-ProSoft</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29623</link>
<guid>c40d81efdade5f24d4d1181392064079</guid>
<pubDate>Wed, 11 Feb 2026 00:26:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>BCS-ProSoft</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9988ed8f5bc0d3be320cc4141e6fb9058e870650d2a9a577aeff7cc1562809c</i><br /><br />Threat actor <b>description</b>: <i>BCS ProSoft is a technology consulting firm that specializes in business management software, particularly offering solutions from Sage, Deltek, and ARM. They provide ERP consulting services, project management, implementation, and support tailored to a range of industries including manufacturing, healthcare, and professional services. With a commitment to understanding their clients' unique needs, they aim to enhance operational efficiency and ensure smooth technology transitions. A notable provider with over 1,500 clients, BCS ProSoft's services are designed to mitigate risks and enhance the value of technology investments</i><br />Target victim <b>website</b>: <i>www.bcsprosoft.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>FISHWINDOWCLEANING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29605</link>
<guid>b18f646fb284fc597d309242de321023</guid>
<pubDate>Tue, 10 Feb 2026 21:12:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>FISHWINDOWCLEANING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04deb516187d09a16afc30ba17126146433c2399be89b08f2d31e1041444a89d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SOLUTIONSINSAFETY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29606</link>
<guid>bda9f65e28426fc1f93c4f5f223cd1bc</guid>
<pubDate>Tue, 10 Feb 2026 21:12:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SOLUTIONSINSAFETY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87d3ba26c1d6f1dc4b0f391497d3fe29f1bca415e213ef81e03efab28a3a5db5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BOYDEN.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29607</link>
<guid>56915424977fb94b0ec40a3f31af89ed</guid>
<pubDate>Tue, 10 Feb 2026 21:12:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BOYDEN.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d997d7ee55a596507165859df9ac22d04ad21192103edec384687698b6c683b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SPOHNASSOCIATES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29609</link>
<guid>8ef3abcafea125f2518236e28761c9da</guid>
<pubDate>Tue, 10 Feb 2026 21:12:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SPOHNASSOCIATES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e835e4d46476ee176c653f557bc74a6abecfb4ba9727a30fd4ba6deed0573f2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GARNERGROUP.NET</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29610</link>
<guid>1a0b9d091283b31708a6e8dec004bd6e</guid>
<pubDate>Tue, 10 Feb 2026 21:12:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GARNERGROUP.NET</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dcc2f3211376b084b72231424595b302342583774c2af477f18153c294a9dc69</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>THEPERPETUAL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29611</link>
<guid>ab6ef074b86ed41809fa9ad6f22bf862</guid>
<pubDate>Tue, 10 Feb 2026 21:12:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>THEPERPETUAL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c348e52935d4c34c7c3721cc97e75506a7e95d57842c88849219e99b6a8f0894</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HYDEPARKUMC.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29613</link>
<guid>e4af65db2a5a17afca8bf5cc475fed0b</guid>
<pubDate>Tue, 10 Feb 2026 21:12:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HYDEPARKUMC.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a5e3009ad38a498e03a8ba264166caa6af4626c9d4543ed63c14789b9a3ac186</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GIACARE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29614</link>
<guid>845ae5f86e478f372a410a0fc2db1d82</guid>
<pubDate>Tue, 10 Feb 2026 21:12:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GIACARE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5fc12f75f1b7e866b891d9f2af2cad60dbd59294cac0a28d7127652aaa71feaa</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GIASPACE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29615</link>
<guid>1700002d4c70cbf14d54658d280cb88e</guid>
<pubDate>Tue, 10 Feb 2026 21:12:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GIASPACE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60a44fb663072ecbb5b47a3be23af1273ceb46d00591ce0ee8405cbba245e44f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ONESUPPORT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29616</link>
<guid>75d52237743d661f8f60a988e9ba5989</guid>
<pubDate>Tue, 10 Feb 2026 21:12:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ONESUPPORT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9fed785ef1f2b125b789d3c6e608f4affd0cc21a6cc6184cf84f45c87cea2565</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HUDSONSUSTAINABLE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29617</link>
<guid>d454766e392ac21320cccd0b55ecba00</guid>
<pubDate>Tue, 10 Feb 2026 21:12:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HUDSONSUSTAINABLE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7484491829c125ce73910a61462b7df86bbdba1f74136dfb43729cd362dfe43</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GOKALLIT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29618</link>
<guid>8357ebc8e1db498622c8933ea5319243</guid>
<pubDate>Tue, 10 Feb 2026 21:12:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GOKALLIT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c35a5470f5e7a170a8dcbb6ae4d76dff9dfa7ef8db3745ce2f9e1a9f2b03b0bb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CHEHARDY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29619</link>
<guid>65f0989f1bb0020cedc498afe707a197</guid>
<pubDate>Tue, 10 Feb 2026 21:12:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CHEHARDY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8079d1484856c557db2faef001338828a414ee6164f310277b54728ff50bd81</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>RBDCONSTRUCTION.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29620</link>
<guid>54e634f071ec5bc3571636aa671d7ca2</guid>
<pubDate>Tue, 10 Feb 2026 21:12:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>RBDCONSTRUCTION.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a812b28c22364aa0108f48f2d8bf5f481b18e9ea5eedfa37fcd367bec8d8a56</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BROADREACHRETAIL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29621</link>
<guid>e0413443ad67ce88208e6159c63b742f</guid>
<pubDate>Tue, 10 Feb 2026 21:12:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BROADREACHRETAIL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47aba7cf52e8c59bf513be1445af1066cbeda0a8bd8a36a8a17b21bf9216578c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Venesco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29601</link>
<guid>493c4b304be1e32548b7ad5d5c22ef6b</guid>
<pubDate>Tue, 10 Feb 2026 19:03:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Venesco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f741dc8b0045d0f0623b364495c14458db1439db16ddeb77b560daeac2d25fe4</i><br /><br />Threat actor <b>description</b>: <i>Venesco specializes in providing premium administrative, healthcare, and professional services primarily for military and civilian clients. Their offerings include management consulting, logistics support, psychological services, and comprehensive training programs tailored to meet the unique needs of various agencies. With a strong focus on delivering quality and innovative solutions, Venesco supports a range of programs including research and development as well as health service initiatives. The company is dedicated to equipping clients with essential knowledge and skills to address critical challenges and achieve mission success.</i><br />Target victim <b>website</b>: <i>www.venesco.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Snyder-Diamonds</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29600</link>
<guid>b09d978ea462060c446ed6833f58735c</guid>
<pubDate>Tue, 10 Feb 2026 19:02:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Snyder-Diamonds</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd197a34b10b45b11b610bcc19e03f2129a2bfac92e3786a57a47bad04167b46</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1949 with locations in Santa Monica, Pasadena and North Hollywood, Snyder Diamond is a progressive, design-forward kitchen and bath showroom steeped in tradition. Our knowledge, service and selection sets us high above the competition. Snyder Diamond is an authorized dealer of such brands as Hansgrohe, Sub Zero Wolf, Miele, Rohl, Fantini, Dornbracht, Kalamazoo Outdoor Gourmet, Victoria + Albert, TopBrewer, Viking and more.</i><br />Target victim <b>website</b>: <i>www.snyderdiamonds.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Halcyontek</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29599</link>
<guid>8d4af5c8b9b40206046d4f2c889eceed</guid>
<pubDate>Tue, 10 Feb 2026 19:02:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Halcyontek</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0763619427e60c953af978aea7a476f63911dd0e9d82b5822406c8c7e89cc3a3</i><br /><br />Threat actor <b>description</b>: <i>Halcyon is the industrys first dedicated, adaptive security platform that combines multiple proprietary advanced prevention engines along with AI models focused specifically on stopping ransomware. Halcyon is built by offensive security experts to stop attackers.</i><br />Target victim <b>website</b>: <i>www.halcyontek.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Milwaukee-Forge</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29598</link>
<guid>e92ae67e4af9da61bbb3690018fa4f1e</guid>
<pubDate>Tue, 10 Feb 2026 18:57:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Milwaukee-Forge</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e75b18733bf8ac0ac37691c0b91b68ac70077522d26f1a6e29144b21d9b6f73</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.milwaukeeforge.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Beasley--Gilkison</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29594</link>
<guid>772c1c73d4ffe88046a3cdb8772e53eb</guid>
<pubDate>Tue, 10 Feb 2026 16:44:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Beasley--Gilkison</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a435824a0e9dbc6d1506cdd1ae598668935432af8c5a3a11587aa55686bd3f40</i><br /><br />Threat actor <b>description</b>: <i>Beasley & Gilkison LLP has provided expert legal services to indi
viduals, businesses, and institutions in East Central Indiana sin
ce the 1890s. With over 120 years of experience, the firm is know
n for its high standards and commitment to the community. 

We are ready to upload more than 32GB data. There are lots of ess
ential corporate documents such as: financial data (audit, paymen
t details, invoices), detailed employees and customers informatio
n (driver's license , medical information, emails, phones) confid
ential information, NDAs and other documents with detailed person
al information.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>PrintForm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29585</link>
<guid>8cc8cb74f22a588e728b78d11696d2fb</guid>
<pubDate>Tue, 10 Feb 2026 16:00:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>PrintForm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>69557105733a33a691764fc20f0117e46e6ca4f3d63e53c952fab6234d0bcb58</i><br /><br />Threat actor <b>description</b>: <i>Our mission is to make it easy for customers to buy custom-designed parts that meet their needs. PrintForm specializes in build-to-order custom-manufactured plastic and metal parts for various markets, including medical, aerospace & defense, automotive, appliances, energy, oil & gas, and consumer products. From a single prototype up to thousands of production parts, virtually any company designing new or improved products with plastic or metal components will benefit from the on-demand solutions PrintForm provides. As a single source for multiple manufacturing processes, PrintForm provides an expert-level service in transitioning customers through the design to manufacturing cycle.  Services include advanced 3D Printing/additive manufacturing processes and more traditional methods like Silicone molding, CNC Machining, Sheet metal, and Injection Molding.- Drawings- Working Projects- Confidential Client Documents https://printform.com/</i><br />Target victim <b>website</b>: <i>printform.com</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grandview-Family-Medicine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29576</link>
<guid>43e8ab73ce9890e4e041d2db5fd36999</guid>
<pubDate>Tue, 10 Feb 2026 14:24:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Grandview-Family-Medicine</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>856eb2ce0367d9aa6aad74c108f2b5c43f8e6e1f805dd5e36ebcb3e059e11357</i><br /><br />Threat actor <b>description</b>: <i>Grandview Family Medicine is a healthcare provider offering a range of services including family medicine, obstetrics, women's health, men's health, and pediatrics. They operate clinics in Provo and Cedar Hills and provide both in-person and telehealth appointments for their patients. The clinic emphasizes comprehensive care, addressing chronic disease management, mental health, urgent visits, and minor procedures. Their intended clients include families and individuals seeking quality healthcare across various age groups. 
The company headquarters is located in 1900 North State Street Provo, Utah 84604 United States.
11-50 Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>SMITHIPSERVICES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29577</link>
<guid>6027b8cfb50835b0349ee47aaac993d5</guid>
<pubDate>Tue, 10 Feb 2026 14:23:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SMITHIPSERVICES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6e22cb56f4c275c4e70c06b7c1554e88b808c6934513138a2c6d61bc8501328b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PROACTIVEMEDICAL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29578</link>
<guid>cf4352a7d775ba25bc66ac22006a13cb</guid>
<pubDate>Tue, 10 Feb 2026 14:23:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PROACTIVEMEDICAL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4894fca8b22d396016f66b97c888dc8ab9cb6fc536601e616bdb1452d761550c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ITARCHITECHS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29579</link>
<guid>37c77fc83549b5204e788fb979887c92</guid>
<pubDate>Tue, 10 Feb 2026 14:22:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ITARCHITECHS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3726da5851c37b1aebafd19a1e75df67118722b4d0f8abfd8d08f5179e714591</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HUDSONEXECUTIVE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29580</link>
<guid>060381704cad174497ca51d13c40b98a</guid>
<pubDate>Tue, 10 Feb 2026 14:22:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HUDSONEXECUTIVE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96afc9a7546f9bcb7dbfbe3756dba6b59a653db859151f5e1526a9dd8bfebb57</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ANSTECHINC.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29581</link>
<guid>109e3ceb0fb7112c1e9e4a3b45e68212</guid>
<pubDate>Tue, 10 Feb 2026 14:22:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ANSTECHINC.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1319886913f214e38302e55fcb71eb8edb9df13301fe005c0fca12907e6e8cf6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>C4-Carroll-County-Cannabis-Co.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29582</link>
<guid>1ad12e2680e7833bf77feaa9bb1f02e6</guid>
<pubDate>Tue, 10 Feb 2026 13:41:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>C4-Carroll-County-Cannabis-Co.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>10e8f338e5ed708197983e0dc728c63a0a7bddd4db72f68a5bddbc818d8e9a73</i><br /><br />Threat actor <b>description</b>: <i>0</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>moultriesheriff.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29575</link>
<guid>1fae41f41823dafacc197c3f5121128e</guid>
<pubDate>Tue, 10 Feb 2026 12:24:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>moultriesheriff.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f2ef50223c2bb68b3364ee61567b4dcd232f53c35dde881df2e89d3659caf03</i><br /><br />Threat actor <b>description</b>: <i>Sheriff's Office. 187-GB sensitive data </i><br />Target victim <b>website</b>: <i>moultriesheriff.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pavlus-Travel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29571</link>
<guid>de8a3ed278e460fbf67355f99a6a865f</guid>
<pubDate>Tue, 10 Feb 2026 06:02:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Pavlus-Travel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df1f24fbedb9ce894ef35ad27cd436ffcf8c1b84603b87181d042b858c3558a9</i><br /><br />Threat actor <b>description</b>: <i>Specializes in luxury sea cruises, river cruises, and guided tours</i><br />Target victim <b>website</b>: <i>pavlus.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Core-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29570</link>
<guid>e0cba95d2999ca566c986fb793e7ecc7</guid>
<pubDate>Tue, 10 Feb 2026 00:48:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Core-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ced466824c16fa02c477435ad2850ea9df15d1ca911d2845254ad2df6d4d7bde</i><br /><br />Threat actor <b>description</b>: <i>Core Supply has been taking business from the competition since 2010. We believe in our aggressive approach and our active partnerships with our customers and suppliers. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>tuftco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29568</link>
<guid>bdbb7b82339a6700741e6dd665b8a993</guid>
<pubDate>Mon, 09 Feb 2026 20:28:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>tuftco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>033a599cc85c29b40ffbdd0b21f49ff2af55728432db4076dee7ec7a920e818b</i><br /><br />Threat actor <b>description</b>: <i>Tuftco is a world-leading manufacturer of tufting machines and equipment, providing comprehensive solutions for carpet mills from tufting to finished carpet Laek: 100GB  WE HAS COLLECTED SUCH DATA AS:  - Confidential documents  - Clients Data  - NDA  - Financial data  - Operations  - Corporate data  - Business Agreements  - Development  - Financial databases, all transactions, all clients And a lot of other VERY IMPORTANT information!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Barrett-Financial-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29567</link>
<guid>cb25605bb7380864f4af64b7d4b493f0</guid>
<pubDate>Mon, 09 Feb 2026 20:18:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Barrett-Financial-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e047d35b76dbd76ee117b154ce9843b1880e848c02d9ad88d4efa3466c33c6b</i><br /><br />Threat actor <b>description</b>: <i>Barrett Financial Group, LLC offers top Local Mortgage Services for Conventional, FHA, VA, Jumbo, and …</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tech-Environmental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29565</link>
<guid>391c5f953a77f6ddf639b5e62bb75c3e</guid>
<pubDate>Mon, 09 Feb 2026 19:40:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Tech-Environmental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7741be5462aa76c40d9a30a7930c0e1ba1f4b43a08096f2f008f7eeb76d6d554</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>iQ-NetSolutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29563</link>
<guid>b13c4b2504158972122bb5cbeda135b2</guid>
<pubDate>Mon, 09 Feb 2026 17:39:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>iQ-NetSolutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eea1f6b989d64386d8978332f23c97e0a94d1cccfaf741a91b97e28fe8cc9c79</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>horizonmedia.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29564</link>
<guid>23a741fa2f45791cd3462521042150b2</guid>
<pubDate>Mon, 09 Feb 2026 17:21:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>horizonmedia.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e9387608e5ba4e4258f47b6d8360bcfa0faa3d602a6e069692007453c5ae0fb2</i><br /><br />Threat actor <b>description</b>: <i>Official Announcement: Horizon Media Data Breach

ULTIMATUM: Horizon Media has 48 hours to reach an agreement. If our terms are not met, a full leak consisting of 3.2 TB of sensitive corporate data will be made public and distributed to global media outlets and regulatory bodies.

The leaked dataset…</i><br />Target victim <b>website</b>: <i>www.zoominfo.com/c/horizon-media-inc/351810076</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Body-By-Fisher</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29558</link>
<guid>08a7a2e472df1185eec3b0c1c0b1ba14</guid>
<pubDate>Mon, 09 Feb 2026 16:41:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Body-By-Fisher</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd9e4501a660e306df530a563c4b53969f01e7ba9753f1daa54d0262247f5f0c</i><br /><br />Threat actor <b>description</b>: <i>Consumer Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Augusta-Housing-Authority</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29560</link>
<guid>e4971735e71b7c924d2f5aef6f5a7334</guid>
<pubDate>Mon, 09 Feb 2026 16:40:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Augusta-Housing-Authority</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24d2549dea821d92fe674037d250010d51296845f7d05fda8a8e27a7b6c404eb</i><br /><br />Threat actor <b>description</b>: <i>Real Estate</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Putnam-Precision-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29557</link>
<guid>0b071c1de69040ddc45603a7fbceac82</guid>
<pubDate>Mon, 09 Feb 2026 13:22:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>crypto24</b> claims attack for <b>Putnam-Precision-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>23b0b1b3ce692111fe7460d3f291d7cb4fa824bb1331c5ce385514c5e5d80fde</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Putnam Precision, Inc. is a prominent manufacturing firm based in the USA, specializing in high-grade custom, precision components. The company primarily services the medical, semi-conductor and aerospace industries. Putnam uses state-of-the-art technology to ensure accuracy & quality in their products, with services including CNC machining, milling, turning, and assembly operations.</i><br />Target victim <b>website</b>: <i>www.putnamprecision.com</i>]]></description>
<category>crypto24</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rutherford-Investment-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29555</link>
<guid>a9bd54659f4a895624ba4a669a7ca977</guid>
<pubDate>Mon, 09 Feb 2026 01:18:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Rutherford-Investment-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac84855c097b6f0619867b3186f9cde79d29b5cecfef6c5713a951afa0184c49</i><br /><br />Threat actor <b>description</b>: <i>Data breach of real estate investment firm: financial and Personalp identification data exposed.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>KlearNow.AI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29554</link>
<guid>bd3e776678a01701f968d3cd4b787d39</guid>
<pubDate>Sun, 08 Feb 2026 20:05:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>KlearNow.AI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e70b3cc163933540127e1cf34a0ac7c2a67369eba831466888b764eb5ae7ef7c</i><br /><br />Threat actor <b>description</b>: <i>www.klearnow.ai https://www.zoominfo.com/c/klearnowai/566144278 3 TB of data: all correspondence for the last two years, a database dump, all source code. We filed CBP declarations for giants such as BASF, Safran, Sumitomo, etc. KlearNow.AI is on a mission to simplify global trade with AI and ML driven products that make logistics clear, cost-effective, and transparent by transforming B2B supply chains with its smart Logistics as a Service (LaaS) platform. The platform eliminates manual data ent</i><br />Target victim <b>website</b>: <i>www.klearnow.ai</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>San-Diego-Eye-Bank</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29553</link>
<guid>38a44c258ac6985bb71726a37252d313</guid>
<pubDate>Sun, 08 Feb 2026 08:36:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>San-Diego-Eye-Bank</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>caef40fb411c5c33fb31f74b3d2cfb689956c9bd70620a53eeac1561e927b4bb</i><br /><br />Threat actor <b>description</b>: <i>San Diego Eye Tissue Bank</i><br />Target victim <b>website</b>: <i>sdeb.org</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Abel-Schillinger</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29549</link>
<guid>af20aa8cc361a5498fb417683dfd8488</guid>
<pubDate>Sun, 08 Feb 2026 02:14:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Abel-Schillinger</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac28e72c196d17bb6ce151674c32accedd1619fa5172d40e38415a627f626532</i><br /><br />Threat actor <b>description</b>: <i>Patent lawyers' data breach; Drafts and intellectual property.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>granmanor.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29522</link>
<guid>dd823d6e1e3a88daf0873b36aa204369</guid>
<pubDate>Sat, 07 Feb 2026 22:41:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>granmanor.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>78aafd7a34122333fbfdaabe8fa03b3ffd5ee85ffd4051d752a3a42b08354a66</i><br /><br />Threat actor <b>description</b>: <i>0</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>zeroenergy.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29523</link>
<guid>b3ca9f305782d831cfe65fdf7b980b51</guid>
<pubDate>Sat, 07 Feb 2026 22:41:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>zeroenergy.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>daac433816cc969f425fd05239c7424e0434dce7393c546b036a2a137f1926db</i><br /><br />Threat actor <b>description</b>: <i>Architecture, Engineering & Design</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>poweron.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29524</link>
<guid>18dc2aa306574480d292c7b0210f7545</guid>
<pubDate>Sat, 07 Feb 2026 22:41:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>poweron.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5333cd6607911e8c6a3ad9c536b2f2d281ed9623b39510638abc69fc85986397</i><br /><br />Threat actor <b>description</b>: <i>Finance</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>abdata.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29526</link>
<guid>3eb4c11722507eae902e13a8f202e947</guid>
<pubDate>Sat, 07 Feb 2026 22:40:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>abdata.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1a317843e90bde6abcbf45a64c87c29fe659f28ebee2fe36c2af4d57924cf49</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Integrated-Fresh-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29544</link>
<guid>d44ea21d9f3f0734cb163b5fe8168cac</guid>
<pubDate>Sat, 07 Feb 2026 21:33:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Integrated-Fresh-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>760705db8c1a25a62800b39c952a1eda27847eea2c3736db4f3f5e31eb29ae0f</i><br /><br />Threat actor <b>description</b>: <i>IFS supplies fresh produce, perishable logistics, warehousing, and custom support to foodservice, retail, and wholesale. With subsidiaries Fresh-Link Produce, Kool Logistics, and Synergy Worldwide, IFS streamlines farm-to-table operations.</i><br />Target victim <b>website</b>: <i>www.integratedfresh.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gruel-Mills-Nims-Pylman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29543</link>
<guid>4fa1b2338942dacb0f7c2a1fbfae628a</guid>
<pubDate>Sat, 07 Feb 2026 21:32:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Gruel-Mills-Nims-Pylman</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab6800d428bf9a45f271bc22e2208978b22517e1605ba3a10c4653cd76a14e29</i><br /><br />Threat actor <b>description</b>: <i>Gruel Mills Nims Pylman PLLC is a Grand Rapids personal injury firm with national reach. With 35 years experience, they represent victims of vehicle-construction accidents, sexual abuse, and medical malpractice, focusing on trust, access, and full compensation.</i><br />Target victim <b>website</b>: <i>www.gmnp.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carlyle-Senior-Care-of-Florence</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29542</link>
<guid>0496c088275cca21054077df4d52bdcd</guid>
<pubDate>Sat, 07 Feb 2026 21:31:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Carlyle-Senior-Care-of-Florence</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7bb1d104d2443ccd807e8ee9f27d7a1a628bde0cea6dfc6b1e84cdaf5077f69d</i><br /><br />Threat actor <b>description</b>: <i>CSC, a respected private nursing home, delivers high-quality skilled nursing, memory care, rehabilitation, medication management, assistance with ADLs, nutritious meals, social programs, and end-of-life care in a supportive, community-driven environment.</i><br />Target victim <b>website</b>: <i>www.carlyleflorence.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Internal-Medicine-of-Milford</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29541</link>
<guid>dd14fcb4232caeda4d922db41d6174df</guid>
<pubDate>Sat, 07 Feb 2026 21:31:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Internal-Medicine-of-Milford</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>11a23fcd98361bb63752fa5e5706929f09d084b8eca31ad7ad6bd9ee3818a0c3</i><br /><br />Threat actor <b>description</b>: <i>Internal Medicine of Milford — a patient-focused practice in Milford, CT offering internal and family medicine: acute care, preventive services, chronic disease management, and in-office testing for individuals and families seeking trusted, high-quality local care.</i><br />Target victim <b>website</b>: <i>www.immct.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rella-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29540</link>
<guid>b851cb30a3604f1a03c679a79b0a443d</guid>
<pubDate>Sat, 07 Feb 2026 21:30:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Rella-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8c883ee35fbd5411b22140c87b4d601b7c671b5b62429e841e0f563d8a96faf9</i><br /><br />Threat actor <b>description</b>: <i>Rella Associates, P.C. provides legal help in Workers Compensation, Social Security Disability, and NYCERS for job injuries and illnesses. Led by Gerarda Rella and Michael Catallo, the Sleepy Hollow firm delivers personalized, aggressive representation and timely client communication.</i><br />Target victim <b>website</b>: <i>www.rella-associates.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Flint-Hills-Dialysis</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29539</link>
<guid>badc93fe6e7962936c7f7d5ad32f69e4</guid>
<pubDate>Sat, 07 Feb 2026 21:29:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Flint-Hills-Dialysis</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a9afa4377c1f0d47d33d0728a6e538daa7f480eb419cf1c0e03252dcb1bb629</i><br /><br />Threat actor <b>description</b>: <i>Flint Hills Dialysis focuses on dialysis and chronic kidney disease management, creating personalized treatment plans to improve patients' lives. With clinics in Manhattan and Marysville, Kansas, their team emphasizes patient education and compassionate care.</i><br />Target victim <b>website</b>: <i>www.fhdks.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southern-Illinois-Dermatology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29538</link>
<guid>8ce629476d3d9bb6519cd146973a27ec</guid>
<pubDate>Sat, 07 Feb 2026 21:28:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Southern-Illinois-Dermatology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1059928fb8b389fd9b40b1b38e4cafc254a2aee619f110a3cd6ea4f50fd589ee</i><br /><br />Threat actor <b>description</b>: <i>Southern Illinois Dermatology, founded in 1996 by Board-Certified Dr. Ted G. Van Acker, has grown from one office to 15 locations. We offer general, surgical, cosmetic dermatology and advanced laser treatments with attentive, professional care.</i><br />Target victim <b>website</b>: <i>www.siderm.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Parts-Life-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29537</link>
<guid>b43a306ca1e27299a57727ff5c0d4998</guid>
<pubDate>Sat, 07 Feb 2026 21:28:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Parts-Life-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a14c3547e29240437169614a98357cda5f1c1a2709300827eb7a1ae784e907ff</i><br /><br />Threat actor <b>description</b>: <i>Parts Life, Inc., is an certified supplier of engineering, manufacturing, and alternate-source DMSMS solutions for military systems. Our reverse engineering and R.O.P.E. services produce source-approved manufacturable data; prototypes tested for form, fit, function.</i><br />Target victim <b>website</b>: <i>www.partslifeinc.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>DeVal-LCS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29536</link>
<guid>246fd89796299b9af42e8093e81cc124</guid>
<pubDate>Sat, 07 Feb 2026 21:27:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>DeVal-LCS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>14ec16d33e02e89707b683dc42c4a65a68ff049e51976a555ba666dfd7b0b296</i><br /><br />Threat actor <b>description</b>: <i>DeVal LCS is a U.S. mechanical and electro-mechanical manufacturer specializing in armament and ground‑support equipment for the DoD. An AS9100D-certified business, DeVal provides build-to-print turnkey manufacturing, precision machining, and assembly.</i><br />Target victim <b>website</b>: <i>www.devallcs.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>SchureMed</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29535</link>
<guid>bde1d613c4e7839d1baac6aea8357e7d</guid>
<pubDate>Sat, 07 Feb 2026 21:26:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>SchureMed</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>40683cfe646ae0ebbb3d70217136d76d56d5acd2f5d9ec1921f6dabdb4e2fe82</i><br /><br />Threat actor <b>description</b>: <i>SchureMed makes surgical patient-positioning equipment that improves safety, comfort, and outcomes. Their range covers orthopedic, laparoscopic, and custom OR solutions, backed by in-house R&D, manufacturing, competitive pricing, and tailored customer service.</i><br />Target victim <b>website</b>: <i>www.schuremed.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Optimum-Health-Institute</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29534</link>
<guid>41c0fb7d37adb58e9cc4b4a82e8a0f46</guid>
<pubDate>Sat, 07 Feb 2026 21:26:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Optimum-Health-Institute</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c542b928d739d0948700820bcfaa89cf70aff9680f9aeb5fdc2dc935aa63f110</i><br /><br />Threat actor <b>description</b>: <i>Optimum Health Institute (OHI) runs faith-based, holistic 3-week wellness retreats in San Diego and Austin. Combining classes, activities, and nutrient-rich meals, OHI supports body, mind, and spirit for stress reduction, fitness, and spiritual growth.</i><br />Target victim <b>website</b>: <i>www.optimumhealth.org</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Anatomic-Clinical-Laboratory-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29533</link>
<guid>8396e81a648b3b78745e1f08579e0bb0</guid>
<pubDate>Sat, 07 Feb 2026 21:25:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Anatomic-Clinical-Laboratory-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81384e6e5587d21618eb9c8b3a8591890d6194f5a55290a0d5dc2821a89d4df0</i><br /><br />Threat actor <b>description</b>: <i>Nashville-based physician-owned pathology group serving Middle Tennessee with high-quality diagnostics care with timely reporting and accessibility for clinicians, subspecialty expertise, timely reports, and community care for uninsured patients</i><br />Target victim <b>website</b>: <i>www.aclapath.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dunn-and-Dunn</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29532</link>
<guid>13bfa3b0c77bec4598bc7fe923d12972</guid>
<pubDate>Sat, 07 Feb 2026 21:24:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Dunn-and-Dunn</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8f5c4ace150fb49f30f190e39ac362b7163b33a8f6e244bff784dd729d6d9c28</i><br /><br />Threat actor <b>description</b>: <i>Dunn and Dunn is a Boston - based law firm established in 1928. They specialize in providing legal counsel and representation to healthcare professionals. Core practice areas include: Medical malpractice defense, Long-term care defense, General liability defense</i><br />Target victim <b>website</b>: <i>www.dunnanddunn.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tri-Cities-Gastroenterology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29531</link>
<guid>256c6f5b61473aaaf1fe73f571b4b28b</guid>
<pubDate>Sat, 07 Feb 2026 21:24:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Tri-Cities-Gastroenterology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7fe2ef317a6eeafffec7bc541f78149f63c0de0f4afa946ab87afb0905c843fd</i><br /><br />Threat actor <b>description</b>: <i>Tri-Cities Gastroenterology provides comprehensive digestive care focused on whole-person wellness, using human and technological resources to ensure patient comfort and timely, reliable information and reports for referring physicians.</i><br />Target victim <b>website</b>: <i>www.digestivewellness.net</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carlton-Scale</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29514</link>
<guid>1e9857752ba7f46d8d36021825e60441</guid>
<pubDate>Sat, 07 Feb 2026 20:04:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Carlton-Scale</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>905089e65b0cea888506b2267ac3c4c3a827af9747576edffb222009dafc7f7e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.carltonscale.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>De-Gruyter-Brill</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29513</link>
<guid>53fa2bb31e7b9c5afebcd5bc6212c09d</guid>
<pubDate>Sat, 07 Feb 2026 20:04:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>De-Gruyter-Brill</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3b9cbab877342b174b0a88ed79b1342aabc6a977c6c8fffc123e3f60ae4bae79</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.degruyterbrill.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>ESS-Metron</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29512</link>
<guid>424ab970cad62b90ca3eee3e832920ba</guid>
<pubDate>Sat, 07 Feb 2026 20:03:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>ESS-Metron</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>40d62b26a726f8c7eade3c4246383507f6b4077c6de1f13ed506958874f3bdd1</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.essmetron.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ilderton-Contracting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29511</link>
<guid>9a46841c7df6435e8df5644f4867a987</guid>
<pubDate>Sat, 07 Feb 2026 20:02:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Ilderton-Contracting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc69f96f08e24fc37eebb1dba74081a3104455f63994f52a0fd6a6cd85133969</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ildertoncontracting.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Blooms-Bus-Lines</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29510</link>
<guid>41d934b57541fa144f6b6b585312a7e3</guid>
<pubDate>Sat, 07 Feb 2026 20:02:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Blooms-Bus-Lines</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d3fa4867353ca6406e6aa6ac6a8126373af59a6d5e6249309e729eb60464c16</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.bloombus.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>RAL-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29509</link>
<guid>e195c8d9639740a0e9118526e45d4389</guid>
<pubDate>Sat, 07 Feb 2026 20:01:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>RAL-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2bedd2d460d92a8bd74f1ec6b5c1c41bd46073bf7c9fe478688a52c619677987</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ralcompanies.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>KaiserAir</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29508</link>
<guid>556db02d592d6762904be04584decfa4</guid>
<pubDate>Sat, 07 Feb 2026 20:00:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>KaiserAir</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b921db138b63d332f6926868c8177bdd66b1558d08ee01829c5403e8b45a03a3</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.kaiserair.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>AMR-PEMCO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29505</link>
<guid>1a79e60cce2641f20b34acb72cd287d7</guid>
<pubDate>Sat, 07 Feb 2026 14:41:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>AMR-PEMCO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd6798f30feb2591920f0e5afe70c448bfeb327cb0939d51ec9fbba33c73a7da</i><br /><br />Threat actor <b>description</b>: <i>Industrial Machinery & Equipment</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>VIPPLLC.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29496</link>
<guid>5cd338743288fdb62b74ee279d51bf93</guid>
<pubDate>Sat, 07 Feb 2026 10:01:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>VIPPLLC.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5dff64811066093a33e9412b7fb7861dd67ca1f6bc980968be10164bea997b06</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CROWDEDISLAND.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29500</link>
<guid>3cdb497dee6acf5f571d685740fc6327</guid>
<pubDate>Sat, 07 Feb 2026 10:01:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CROWDEDISLAND.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d2805dfcc103e6535357b364ea33311a8ba5cf77a62c717e4f3a6bda2cba704c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>NGATTORNEYS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29503</link>
<guid>d9fa461a6fb17006b5dd1a4e3741d829</guid>
<pubDate>Sat, 07 Feb 2026 10:01:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NGATTORNEYS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>adbe40419d56d705617fe8b9afdc239cc9cdfdec773d3fded19a76d4f36b7d66</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Atlas-Air</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29494</link>
<guid>539c294351032d5473dbcfcc619ff021</guid>
<pubDate>Fri, 06 Feb 2026 22:48:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Atlas-Air</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8eaf9605e3dc4f70735d0c8ad7f2f97c43cddd51634911833ca90bbd5773f4d</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Atlas Air Worldwide Holdings Inc. is a cargo and passenger charter airline based in Purchase, NY. Founded in 1992, Atlas Air operates globally with a large and efficient fleet of Boeing 747 aircraft. The company offers a variety of services like outsourced aircraft, crew maintenance, and insurance (ACMI), charter businesses, and dry leasing.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>A</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29493</link>
<guid>47e3711856579ea4c53625d15fcc306d</guid>
<pubDate>Fri, 06 Feb 2026 21:49:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>A</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>93a317b7c9392a47ed4cd349a65cb218ce15316442cac86c534668c53e955ccb</i><br /><br />Threat actor <b>description</b>: <i>A healthcare organization from USA.</i><br />Target victim <b>website</b>: <i>.</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Accountnet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29487</link>
<guid>371f5bb6b80541e62f0ecf7341293e2d</guid>
<pubDate>Fri, 06 Feb 2026 20:05:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Accountnet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1f75108d108eaf8175e3572dae90be81ce0591b5188ea4b79d5253fd08df684</i><br /><br />Threat actor <b>description</b>: <i>Accountnet Inc provides educational webinars, newsletters, quarterly sales events and strong post-sales support</i><br />Target victim <b>website</b>: <i>www.accountnet.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Associated-Endocrinologists</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29486</link>
<guid>74093e762e3747d3965126f98cbe4e57</guid>
<pubDate>Fri, 06 Feb 2026 20:03:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Associated-Endocrinologists</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba9d9df312c7b80a27cda971a5e0217f79892518c8f043707133aa35fc1607f8</i><br /><br />Threat actor <b>description</b>: <i>Associated Endocrinologists is a leading specialized endocrinology center in Michigan, specializing in diseases of the thyroid, parathyroid, pituitary, and adrenal glands, as well as diabetes. With over 40 years of experience, they are one of the largest endocrinology clinics in the Midwest, providing services such as thyroid radiofrequency ablation, ultrasound-guided biopsy, and diabetes patient education. Their team includes board-certified physicians trained at prestigious institutions, ensuring high-quality medical care for patients and the security of their personal data.</i><br />Target victim <b>website</b>: <i>www.endocrinemds.com</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Infinite-Tiers-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29484</link>
<guid>c6c07dc0686f5f5bca5c9794e8c44ffc</guid>
<pubDate>Fri, 06 Feb 2026 18:46:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Infinite-Tiers-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9718c61134edfdd6f2343d571449b6e5a9d9d8044f913a8819a85bdbfee84896</i><br /><br />Threat actor <b>description</b>: <i>itgsoftware.com ITG Software, Inc. is a provider of mission critical integrated business software solutions. Using a rigorous design approach, we build integrated software systems that will have a marked positive effect on the bottom line. Infinite Tiers Group, Inc. has a unique approach to building software systems. This stems from our understanding of the usability and applicability of current technology as well as our vision of what's next. We are committed to providing the highest quality</i><br />Target victim <b>website</b>: <i>itgsoftware.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Logility</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29470</link>
<guid>14515b66c19dfb745f5a2fccc8f1393f</guid>
<pubDate>Fri, 06 Feb 2026 15:26:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Logility</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7609e3cd5bfd435ef0b03d45c03911b1bf9314d12ed74c0567d39fb087fdb8a</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Logility is a global provider of supply chain planning and retail planning solutions. The company's services drive efficiencies, performance, and profitability by providing organizations with the tools to streamline operations. Established in 1972, Logility provides strategic, merchandise, assortment, demand, inventory, replenishment, and supply chain management solutions.</i><br />Target victim <b>website</b>: <i>logility.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Peerson-Audio</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29468</link>
<guid>8606adb6620707257e0d5cb386f095b7</guid>
<pubDate>Fri, 06 Feb 2026 14:42:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Peerson-Audio</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d7d8667c3d3274c3ce67ed5321411d6d31c0a2664a174d59e0e1f730b524a3e4</i><br /><br />Threat actor <b>description</b>: <i>Advantage Product Enterprise specializes in innovative rigging solutions for audio installations, offering products such as the APE Hanger, CHAIN Monkey, U Tube, and Bumper BoostPeerson Audio Incorporated specializes in designing and installing professional audio, video, and lighting systems tailored for a variety of clientele including houses of worship, sporting venues, performing arts venues, government buildings, and businesses.We will upload corporate data of the companies soon. Employee information, HR files, financials, customers info and a bit more.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advent-Aircraft-Systems-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29466</link>
<guid>57ce0427b9e3b1b777b3efcf5684452e</guid>
<pubDate>Fri, 06 Feb 2026 02:49:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Advent-Aircraft-Systems-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b33ec5673da678f1bffc410c0078962c9d322ce10b89d1337fef17ec9ccba6f7</i><br /><br />Threat actor <b>description</b>: <i>Data breach on aerospace developments.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Penn-Fencing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29464</link>
<guid>eacbec704544fb3e45efadf8eedbf9c8</guid>
<pubDate>Fri, 06 Feb 2026 00:12:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Penn-Fencing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5147abf5ad35e93e6fcca94cfe8cb1015d50805b92d98b0d5af62e995fbd60d7</i><br /><br />Threat actor <b>description</b>: <i>Penn Fencing, Inc. specializes in the fabrication and sales of fencing, decking, and railing products, offering a wide variety of options both online and in-store. They provide professional installation services within 150 miles of Pittsburgh, PA, and ship vinyl products across the United States with a lifetime warranty. Their intended clients include residential homeowners looking to enhance their outdoor spaces as well as commercial clients needing security solutions. With a commitment to quality, they focus on vinyl and aluminum materials, ensuring durability and low maintenance for their products.</i><br />Target victim <b>website</b>: <i>www.pennfencing.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpswww.platinumdrywall.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29459</link>
<guid>3f78614f061c508c892c4dfe0abdf27e</guid>
<pubDate>Thu, 05 Feb 2026 22:24:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>httpswww.platinumdrywall.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>262bc8b613def6a5669a5d0c7acc8f23db43f3d4ef20c4d77279a907cdf88115</i><br /><br />Threat actor <b>description</b>: <i>Platinum Drywall has been providing drywall and framing services to commercial construction companies since 2001.  They specialize in metal framing and truss systems and acoustic applications for commercial projects. Their services include: Drywall Installation Acoustic Ceilings Insulation Wall Systems Fire and Soundproofing Joint Compound Finishing Tenant Improvements Metal Stud Framing Metal Roof Trusses Load-Bearing Metal Stud Systems Hollow Metal Door Frames Metal Support Drywall</i><br />Target victim <b>website</b>: <i>www.platinumdrywall.net</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wayco-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29458</link>
<guid>ea30a83f57dabc455488ad906feaf213</guid>
<pubDate>Thu, 05 Feb 2026 21:32:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Wayco-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f85a020269fd14228afa98a9d81a611cb0a18adda9cbb957a6d772a301eaab8</i><br /><br />Threat actor <b>description</b>: <i>Wayco, Inc. is a family-owned company with over 50 years of experience providing full-service paving solutions in northeastern Pennsylvania. Their extensive offerings include asphalt paving, oil chipping, aggregate sales, concrete services, excavating, and utility site work. The company prides itself on its knowledgeable staff, including licensed engineers for project consultation, and is a PA State Certified Contractor with products approved by PennDOT. Wayco, Inc. caters to clients in need of paving and construction services, ensuring high-quality results through a dedicated team.</i><br />Target victim <b>website</b>: <i>www.waycoinc.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Exco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29457</link>
<guid>5f8d8411ff393c9cb54249e010b017b4</guid>
<pubDate>Thu, 05 Feb 2026 21:13:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Exco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9d5c80cc8767ebebcb39f02a56c38db967708b0899c26fb45f602d71f829dde3</i><br /><br />Threat actor <b>description</b>: <i>Exco is a network of accounting, consulting, and audit firms that simplifies entrepreneurship across France and internationally. They offer services in accounting, audit, tax, social management, human resources, and legal advice, ensuring tailored support for businesses in various sectors. With a commitment to responsible growth and expertise in complex financial situations, Exco provides guidance in corporate management, financial transactions, and sustainability. Their multidisciplinary teams work closely with clients to foster business development throughout every stage of a company's lifecycle.</i><br />Target victim <b>website</b>: <i>www.exco.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Western-Slope-Iron--Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29455</link>
<guid>8301f99aa26536037481546bf5543536</guid>
<pubDate>Thu, 05 Feb 2026 20:17:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Western-Slope-Iron--Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1d126a85b51b7d7c2d5716f87280c2cf7b76c1bedd579cdf50bbf4eca18fa04</i><br /><br />Threat actor <b>description</b>: <i>Western Slope Iron & Supply, Inc. is a certified steel fabricator operating since 1974, based in Grand Junction, Colorado. The company specializes in the fabrication of structural and miscellaneous steel for high-end commercial, industrial, residential, and governmental projects throughout the Western United States. Additionally, they serve as a Hilti distributor, offering a variety of steel parts and supplies for diverse applications. Their commitment to customer service and proactive project management has garnered positive feedback from clients across various sectors.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Reilly-Foam-Corp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29454</link>
<guid>29579d096935b2f86a4d4f1be47cb69c</guid>
<pubDate>Thu, 05 Feb 2026 19:41:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Reilly-Foam-Corp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de3458e7aaeb1abb9914f74243bd23d184a37777c9f2889c8f38a2cd4ec02ff2</i><br /><br />Threat actor <b>description</b>: <i>Reilly Foam Corporation manufactures fabricated foam components for several industries & applications</i><br />Target victim <b>website</b>: <i>www.reillyfoam.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>United-Hospital-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29450</link>
<guid>0f450f46df1e06c6737e4ac25603c02a</guid>
<pubDate>Thu, 05 Feb 2026 14:48:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>United-Hospital-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53b35118dc21c72df0f0ba3aca6b26ac59987211e589984b03c934c5a37cadb7</i><br /><br />Threat actor <b>description</b>: <i>Fenco Solutions is a leading American manufacturer specializing i
n laboratory-related products, including lab casework, tables, sa
fety cabinets, fume hoods, and biosafety cabinets. The company of
fers a wide range of services such as lab design, consulting, ins
tallations, renovations, project management, and expedited supply
services.

We will upload 39gb of corporate data soon. Employee information,
w-9 forms, projects, financials, contracts and agreements, custo
mers info, NDA, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>LumioDental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29448</link>
<guid>3c2140d1a64d146fbd15082b3a34130c</guid>
<pubDate>Thu, 05 Feb 2026 14:43:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>LumioDental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8fdaaf3bb3096f1eb51d85eeb9c457cb349918e1471f02f18ce91053d3a5c58e</i><br /><br />Threat actor <b>description</b>: <i>A company that manages a network of dental clinics.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>brooklyn-group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29444</link>
<guid>1d3b870a10ac880f27c0b5b69756e749</guid>
<pubDate>Wed, 04 Feb 2026 23:10:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>brooklyn-group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>574f3dd676339049e13110d862d9b0cafe334e120af5119b3cc94dde89fba208</i><br /><br />Threat actor <b>description</b>: <i>Price ??? Disclosures 0/1</i><br />Target victim <b>website</b>: <i>brooklyngroup.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>ISTS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29442</link>
<guid>91a8884b0dc5d0c47cf772bd1942a5af</guid>
<pubDate>Wed, 04 Feb 2026 20:25:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>ISTS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d81eedb46f1372e3eab96f6d12ca40493a681ce69f450f773f5f78432496ce63</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.applyists.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>CBH-Homes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29441</link>
<guid>29ac0835a14c551405ff79715374bd05</guid>
<pubDate>Wed, 04 Feb 2026 20:25:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>CBH-Homes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8aa7a8aae0782528e8e7463d9e14e6ca552b1795bed3cebea5db6bec780b491</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.cbhhomes.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Woodfield</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29440</link>
<guid>84c87f842d01e3bf469827b469dcacec</guid>
<pubDate>Wed, 04 Feb 2026 20:24:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Woodfield</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7e33eac5bc6ca0a8123d7d8f0f9263d6c64064f98b36e4c0ea9cab34ec8c6849</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.woodfieldinc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Richey-Tax-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29436</link>
<guid>12bf6e4ef656f8d8a5b2ee769c747c77</guid>
<pubDate>Wed, 04 Feb 2026 16:40:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Richey-Tax-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df0ad3d68f82c9988423467ac0f7ee017fcd7a9d9cffd7c9222cae7022e69ad4</i><br /><br />Threat actor <b>description</b>: <i>Richey Tax Solutions LLC, based in Tucson, AZ, specializes in small business consulting, income tax preparation, and retirement and tax planning. The firm is known for its professional, experienced, and affordable services tailored for retirees, business owners, executives, and independent professionals.We will upload 25gb of corporate data soon. They refused to save client's data. SSNs, passports, DLs, death/birth certs, financials information, correspondence and other confidential files, legalfiles, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Royal-Wine-Corp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29338</link>
<guid>7dcb383d6623119ecdde0537f3a7f974</guid>
<pubDate>Wed, 04 Feb 2026 14:39:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Royal-Wine-Corp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5826053e864d01d92617e03444654c7b40f08ab6292efdc3db3cd2d71b16935d</i><br /><br />Threat actor <b>description</b>: <i>Royal Wine Corp is a family-owned company specializing in the production and distribution of high-quality kosher wines, liqueurs, and spirits. The company offers a diverse portfolio, including various brands of wines and spirits, with an emphasis on its Israeli selections. Their target clients include wine and spirit enthusiasts looking for unique and authentic kosher beverages.We will upload 25gb of corporate data soon. Detailed employee personal information (SSNs, passports, DLs, health information, credit cards and so on), clients information (projects, contracts, contacts), financials, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>efulfillment-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29340</link>
<guid>49129551dac6241eb7d1f601f058679b</guid>
<pubDate>Wed, 04 Feb 2026 14:39:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>efulfillment-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af831da3e6d91b1aab066816f72b0bb6f08a9ca0b01a9228f11d419098616151</i><br /><br />Threat actor <b>description</b>: <i>eFulfillment Service (eFS) is a third-party logistics provider (3PL) and provides ecommerce businesses with inventory storage, order processing, shipping, Fulfillment by Merchant (FBM), Fulfillment by Amazon (FBA) Prep and returns service.We will upload corporate data soon. Accounting files, clients' accounting files, detailed financials and other files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>DOnofrio-General-Contractors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29435</link>
<guid>08afe31e80612e5ea99ac4daea3b666b</guid>
<pubDate>Wed, 04 Feb 2026 14:08:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>DOnofrio-General-Contractors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d75cc6dd43bc673255967dc959f7760b511e47c7e75513ba3afe548bc5573d23</i><br /><br />Threat actor <b>description</b>: <i>D'Onofrio General Contractors Corp., based in Brooklyn, N.Y., spe
cializes in heavy infrastructure and marine construction projects
, leveraging decades of industry experience since its founding in
1991. The company serves clients in New York, New Jersey, Pennsy
lvania, and Connecticut, focusing on projects for local utilities
, including the modernization of generation plants and power subs
tations.

We will upload corporate data soon. Employee files (SSNs and othe
rs), projects, financials and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lakeside-Union-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29328</link>
<guid>f40ed67587440c64e5b3881297d5c827</guid>
<pubDate>Wed, 04 Feb 2026 08:01:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Lakeside-Union-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b2dbfbda5ad9e4cdd3dbdc68adbb1ea94170e6cb4adb7b6bdadcf1f84d2fb218</i><br /><br />Threat actor <b>description</b>: <i>Lakeside Union School District</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crystal-Coast-Pain-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29325</link>
<guid>fee801ecfba08d39cd8ebed9fdcbe7e9</guid>
<pubDate>Wed, 04 Feb 2026 01:24:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>Crystal-Coast-Pain-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>840f4b5dd29861be164f42b6f5f6d343c5a9d85ab4ae878dbdcb506a6a33a9ab</i><br /><br />Threat actor <b>description</b>: <i>SSN, medical data, medical cards</i><br />Target victim <b>website</b>: <i>crystalcoastpm.com</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>Western-New-York-Energy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29322</link>
<guid>27523bf027aea782710f6055e2958b7b</guid>
<pubDate>Tue, 03 Feb 2026 19:27:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Western-New-York-Energy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7e3efd8df024b14304ed83fa1f616d55bd6fdef084f597465763c7cf177b4e8</i><br /><br />Threat actor <b>description</b>: <i>Western New York Energy LLC – Major Data Breach Announcement Western New York Energy LLC (wnyenergy.com), a leading regional ethanol producer and renewable energy company based in Medina, New York, has suffered a significant data compromise. Total volume of obtained data: ≈100 GB The leaked archive contains highly sensitive and business-critical materials, including:  Confidential internal documents Client and counterparty data Non-Disclosure Agreements (NDAs) Financial records and reports Operational documentation and procedures Investor-related materials and presentations Corporate governance documents Commercial contracts and business agreements Technical drawings, schematics, and engineering files  …and a substantial amount of other proprietary and strategically important information that is vital to the company’s operations, partnerships, and competitive position. This dataset provides deep insight into the internal workings, financial structure, client relationships, and strategic planning of one of the Northeast’s key ethanol producers. The information is authentic, recent, and untouched.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Forella-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29321</link>
<guid>7d44eb268a656ba8bf731a62eb9156af</guid>
<pubDate>Tue, 03 Feb 2026 16:41:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Forella-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>08012a19b1b974d7b854b331678dbcbf39bd553e1daadc017bd774349a0224d5</i><br /><br />Threat actor <b>description</b>: <i>Forella is a Minority Business Enterprise (MBE) that offers a range of services including cost estimating analyses, CPM P6 schedule management, constructability reviews, and project management. They specialize in expert investigations and dispute resolution, providing construction economics services to their clients.We will upload 457gb of corporate data soon. Detailed employee personal information (SSNs, passports, DLs, health information, credit cards and so on), financials, NDAs, contracts and agreements,confidential projects, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>PTI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29319</link>
<guid>70bbf5f950fcde758686c2635893ca0a</guid>
<pubDate>Tue, 03 Feb 2026 14:48:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>PTI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a0cab9329719523d522d7241dc3876356cc64afd2ba8045b7db1e86a040ee52</i><br /><br />Threat actor <b>description</b>: <i>PTI offers inspection systems for package leak testing, seal inte
grity, and container closure integrity testing (CCIT). Their tech
nologies exclude subjectivity from package testing and use test m
ethods that conform to ASTM standards. The company is based in Ha
wthorne, New York.

We will upload corporate data soon. Financials, personal docs of 
upper management, a bit of projects information and other interna
l files.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Drake-Precision-Dental-Laboratory</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29318</link>
<guid>dedd9d7c6b5c98236fcc72f4b462f277</guid>
<pubDate>Tue, 03 Feb 2026 14:48:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Drake-Precision-Dental-Laboratory</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc35b3775b0cb79f505adbb87b1de2b717795ea28c80d8dc6f23f20a488e2e7d</i><br /><br />Threat actor <b>description</b>: <i>Drake Dental Lab specializes in creating esthetic dental solution
s, offering a range of products including crowns, bridges, dentur
es, implants, clear aligners, and sleep appliances. Since 1956, t
he company has been dedicated to precision and innovation in digi
tal dentistry.

We will upload 39gb of corporate data soon. Employee personal inf
ormation (SSNs and other information of more than 120 employees),
financials, NDAs, contracts and agreements, customers' informati
on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Law-Offices-of-Thomas-J-Skinner-IV</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29317</link>
<guid>8afc0327c6d499ed20c99d2a2502c7b9</guid>
<pubDate>Tue, 03 Feb 2026 13:54:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Law-Offices-of-Thomas-J-Skinner-IV</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>537edf4f75e7c43ba73c4e41d6183f6487b9a6af4325c07345fb665379873c8c</i><br /><br />Threat actor <b>description</b>: <i>What problems does this law firm have besides its shitty logo? Find out in the article.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rosenblum-Schwartz-Fry</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29316</link>
<guid>7500bbe7e791e2d3a19f61cf43b87b99</guid>
<pubDate>Tue, 03 Feb 2026 13:53:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Rosenblum-Schwartz-Fry</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aaa599ac1025f582936ce3c7072fe1109670d117abba79901a0fbaa7e4ddd17e</i><br /><br />Threat actor <b>description</b>: <i>Rosenblum Schwartz & Fry, P.C., provides strong legal representat
ion against misdemeanor and felony criminal charges.

We will upload 1.3tb of corporate data soon. Detailed information
about clients (passports, DLs, SSNs, medical information, financ
ials and so on), employee information, lots of legal files, confi
dential ones, court files, police reports and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Balloons-Everywhere</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29310</link>
<guid>95cb29c65c9f39aee2714e7734c344cc</guid>
<pubDate>Tue, 03 Feb 2026 12:30:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Balloons-Everywhere</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46f2f7bd3e641abeff8b18d30921b5b4bba337e0d5b76211733ade7bd6bb8007</i><br /><br />Threat actor <b>description</b>: <i>Balloons.com is a wholesale distributor specializing in a wide range of balloon products including foil film, latex balloons, and balloon decoration kits. They cater to various themes, occasions, and licensed characters, offering items for both everyday events and special celebrations. Their services target individuals and businesses looking for party supplies, with a focus on DIY balloon decor and promotional products. Additionally, they provide customers with resources and learning tools related to balloon usage and care. 
The company headquarters is located in 16474 Greeno Road, Fairhope, AL 36532-5528, United States.
11-50 Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>South-Hays-Fire-Department</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29311</link>
<guid>4cd32d6e6c24dad2afe99e445b936b66</guid>
<pubDate>Tue, 03 Feb 2026 12:30:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>South-Hays-Fire-Department</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87fa1dca64c93f44b85ad7851a83bddc89c3b925e5d54b4907b1fce3accd4dba</i><br /><br />Threat actor <b>description</b>: <i>Hays County Emergency Services District 3 provides essential fire prevention and emergency services to the South Hays County area. The district focuses on recruiting full-time firefighters and is dedicated to community safety and preparedness. In addition to emergency response, the district promotes public knowledge on fire safety and outdoor burning regulations. Their commitment to accessibility ensures that all community members can engage with their services effectively. 
The company headquarters is located in 3528 Hunter Road, San Marcos, Texas 78666.
11-50 Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Blystone--Bailey</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29309</link>
<guid>6fb2011334a2bf8dca4e120157fab408</guid>
<pubDate>Tue, 03 Feb 2026 04:08:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Blystone--Bailey</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19ae53d604048a8aeee69d9a25a482459050b93a50d1310c4268a5256b98f6e2</i><br /><br />Threat actor <b>description</b>: <i>Blystone & Bailey, CPAs, PC is a Michigan-based CPA firm offering a range of services including audit, tax preparation and planning, payroll, financial planning, bookkeeping, and IT services management.  The firm caters to various industries such as real estate, hospitality, oil, gas and energy, professional services, construction, manufacturing, retail, agriculture, franchising, and government and non-profit sectors.  We have the entire Blystone & Bailey customer base at our disposal. Mail, financial documents, audits and more.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>ENCOMPASS-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29307</link>
<guid>cbe674ba9bc1702bf55e91103db4a022</guid>
<pubDate>Mon, 02 Feb 2026 23:34:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>ENCOMPASS-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8a0aa9233a5bbe1f84a1f9ac088085de501378e4c8dba9544ba170e2669d29f6</i><br /><br />Threat actor <b>description</b>: <i>Finance documents, clients PII</i><br />Target victim <b>website</b>: <i>encompass-inc.com</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>Family-Health-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29306</link>
<guid>e5f1d4219be6d4dafe14bc929d5c2808</guid>
<pubDate>Mon, 02 Feb 2026 22:44:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>termite</b> claims attack for <b>Family-Health-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec992f0f033fbfac56445beca74f866db8f896270bc774d215bc60c40d840219</i><br /><br />Threat actor <b>description</b>: <i>Family Health Centers of Southern Indiana offers quality healthcare services to low-income, underinsured, and uninsured residents in Jeffersonville, New Albany, Corydon, and Clarksville. Their dedicated team of board-certified physicians and nurse practitioners provides a wide range of primary health care services, including a mobile dental unit. The organization emphasizes care for </i><br />Target victim <b>website</b>: <i>www.fhcenters.org</i>]]></description>
<category>termite</category>
</item>
<item xmlns:dc='ns:1'>
<title>Erickson-Thorpe--Swainston</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29303</link>
<guid>26e12e8ce3cf76d35b5ab714143378cd</guid>
<pubDate>Mon, 02 Feb 2026 18:40:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Erickson-Thorpe--Swainston</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>469d52b821cd8111d08a4f13b9fbac1b3adc87580aa08c7d01b9b7befa80188e</i><br /><br />Threat actor <b>description</b>: <i>The law firm of Erickson, Thorpe & Swainston was founded in 1969. Since then, the firm has effectively and successfully represented its clients in state and fed...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Medinah-School-District-11</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29304</link>
<guid>b1ab8aea23da706493a95512b29c7dd7</guid>
<pubDate>Mon, 02 Feb 2026 17:40:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Medinah-School-District-11</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e902df98479009abae8262940ee3410bcd7a5665855d56aaa926d3e61e143ec</i><br /><br />Threat actor <b>description</b>: <i>Education</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>JST-Power-Equipment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29298</link>
<guid>dda8019dec3926428ce2f4b0c9496fad</guid>
<pubDate>Mon, 02 Feb 2026 16:39:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>JST-Power-Equipment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>88e57d8765fdd45fa0229c5c86a8d23efaf3dce8c8207609319b654c5cbbef14</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1993, J.S.T. provides product development of any electric connection systems in products like amusement equipment, audio and visual equipment, household appliances, office equipment, industrial equipment, automobiles, and traffic systems.We will upload 70gb of corporate data soon. Employee information,financials, confidential clients information, large amount of projects files, contracts and agreements, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Exterior-Worlds</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29288</link>
<guid>e87b5193d3e60a52a8e3df82af428e27</guid>
<pubDate>Mon, 02 Feb 2026 14:40:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Exterior-Worlds</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>871fa617ac0476caf73c3ea10eefbbb170959dd1f2a74db7620ef6549964c26c</i><br /><br />Threat actor <b>description</b>: <i>Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Range-Cooperatives</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29290</link>
<guid>7a1eae3489145133fdd9dbd917810547</guid>
<pubDate>Mon, 02 Feb 2026 14:40:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Range-Cooperatives</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c43fabc07eb534ceedc0b852143aa68cc2512e777a31a62725d7a54a8e33720</i><br /><br />Threat actor <b>description</b>: <i>Energy, Utilities & Waste</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Hechtman-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29291</link>
<guid>29e055ad65e83cc5d56f5481d543b67d</guid>
<pubDate>Mon, 02 Feb 2026 14:40:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-Hechtman-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3c5999b0a9d9bd5a68fa9cb1b4867dc497470f00f17ff4837d42e0a324fda2d</i><br /><br />Threat actor <b>description</b>: <i>Accounting Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kilograph</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29292</link>
<guid>dbc6904b9ae5239ad74f90306daae0ad</guid>
<pubDate>Mon, 02 Feb 2026 14:40:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Kilograph</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf13250d3ba3820d2a68361e45b1fe0678b619d49630e85e8a54587dc5d4f72c</i><br /><br />Threat actor <b>description</b>: <i>Kilograph is an award-winning creative agency that specializes inshaping brands, places, and experiences. They utilize strategic storytelling and engaging visuals, combined with innovative technologies, to fulfill their clients' needs.We will upload corporate data soon. Passports, w9 forms and otheremployee documents, clients' personal information (docs, health information), financials, confidentiality agreements, contracts and agreements, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sprokkit</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29286</link>
<guid>3c383a7279bf9f3e124ee4b34fe7bca3</guid>
<pubDate>Mon, 02 Feb 2026 07:46:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Sprokkit</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fecb0bb878fae5a72a4615af1086f2de97568ccadc41e575cba1cd338a415715</i><br /><br />Threat actor <b>description</b>: <i>Advertising & Marketing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stephenson-Ziegenhorn--Bernard</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29287</link>
<guid>ee82b11edbd4f34a1081986fb2ecf895</guid>
<pubDate>Mon, 02 Feb 2026 07:45:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Stephenson-Ziegenhorn--Bernard</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e09d24f87012866afc06eafcae7f8a5bddd9ae101d1310413a6bd64478c0b3c</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Best-Attorneys</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29283</link>
<guid>eb39b5b5c9f53442cdfb5dc8229dfe39</guid>
<pubDate>Mon, 02 Feb 2026 04:54:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Best-Attorneys</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c5c5e69981d1fe28f1b607b514c777f3855a1613d5e40604ccb75cc892a7a1b</i><br /><br />Threat actor <b>description</b>: <i>Eisenberg Lowrance Lundell Lofgren is dedicated to your success. We are contingency fee lawyers specializing in personal injury, immigration, and criminal defense located in South Jordan Utah.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Polycom</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29282</link>
<guid>8194758636bb0e5bab1a445835138b98</guid>
<pubDate>Mon, 02 Feb 2026 02:37:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Polycom</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38eacda85c63b7a6151d026ea9452a73478209683c7a1ac55fed2d812e0f8e90</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Polycom is an American multinational company specializing in creating technology that fosters easy and efficient collaboration for businesses. Polycom's products include communication devices, video conferencing systems, and other related applications and services. The company has a globally spread presence, with its headquarters located in San Jose, California. It was acquired by Plantronics in July 2018.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Iron-Mountain</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29281</link>
<guid>e417e85606b3fc0cdab5f65d721f2ee0</guid>
<pubDate>Mon, 02 Feb 2026 02:37:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Iron-Mountain</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>67b6554811d089a7cf39e71ab7d2d96d0d973d4124f11158808145824fdb8d57</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Iron Mountain Incorporated is a global business specializing in storage and information management services. Founded in 1951, based in Boston, Massachusetts, it helps organizations to store, manage, protect, retrieve information and data. Its offerings include records and information management, data backup and recovery, secure shredding, and data centers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>T--M-Electric-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29277</link>
<guid>67245236ce5a981076ce7feffc35c893</guid>
<pubDate>Sun, 01 Feb 2026 20:32:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>T--M-Electric-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>808225a3fa5d04fbb2ac464d8d78bf000be00facdec63e0495be30a547306c62</i><br /><br />Threat actor <b>description</b>: <i>T&M Electric LLC is a state certified full-service electrical contractor based in northeast Florida, specializing in residential and commercial electrical installations and services. They offer a range of services including new construction, electrical troubleshooting, panel upgrades, generator installations, and LED lighting upgrades. Their commitment to quality service, professionalism, and customer satisfaction distinguishes them in the electrical contracting industry. The company targets homeowners and businesses in northeast Florida, providing reliable and efficient solutions for all electrical needs</i><br />Target victim <b>website</b>: <i>tmelectricinc.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Deatak</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29276</link>
<guid>d0adfd0849265d3738d28df149746e21</guid>
<pubDate>Sun, 01 Feb 2026 19:54:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Deatak</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56f89d084fed8b523bd884a4a5250d525d4eec6cd38fa4d25a86ce5027c89acd</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.deatak.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stellium</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29275</link>
<guid>afb10ddfce75e4a231f083365f04e08f</guid>
<pubDate>Sun, 01 Feb 2026 17:33:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Stellium</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>940f5b766c2cb1740ca576943fb96bbd69aa67f90f903b7a417871d3bd3efba9</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Stellium is a consulting firm focused on services for supply chain management optimization, such as data analytics, lean manufacturing strategies, and innovative technology implementation. They cater to multiple industries, including energy, manufacturing, technology, and healthcare, among others. Their methods revolve around the utilization of advanced data to optimize operations and produce successful business outcomes.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Acu-Trans-Solutions-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29274</link>
<guid>0a9c1911c5cb76cd01bd5fc2870892bd</guid>
<pubDate>Sun, 01 Feb 2026 17:33:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Acu-Trans-Solutions-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c52cd52b3683a7e6e8ca5bb54943fb56b8f76948e2693719fc958f86e8cf2359</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Acu Trans Solutions LLC is a company providing professional translation services across multiple languages. It specializes in sectors such as legal, healthcare, business and government. Their team is made up of certified linguists and translators who deliver accurate and high-quality translations. Besides translation, services also include transcription and interpretation, aiding businesses in their international communication.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>SIGMA-Processing-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29273</link>
<guid>2a912ac127cc3ac74d5255fa9097f3a9</guid>
<pubDate>Sun, 01 Feb 2026 17:32:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>SIGMA-Processing-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e40506ab2c9e6938aa1767dde3380907082423956e3131b1e2fc85105ec9f11c</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Foamtec-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29272</link>
<guid>16fe58fde1b4617fa7148321b3c0c3c9</guid>
<pubDate>Sun, 01 Feb 2026 16:22:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Foamtec-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>128c2a1beb864073744b93748f2cc514afd56c9ac50002e2ae6f256edbc153e5</i><br /><br />Threat actor <b>description</b>: <i>Foamtec International is a global PU foam Manufacturing partner. We deliver quality, specialty foam products for contamination control, medical and specialty markets</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Odyssey-Academy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29271</link>
<guid>1f239457a5b2fb11ddafc392ffd18e1f</guid>
<pubDate>Sun, 01 Feb 2026 15:29:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Odyssey-Academy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>221187a0439d9b734077277dde369e895a55eaf428ea76acb127bb5114e6f50b</i><br /><br />Threat actor <b>description</b>: <i>Odyssey Academy is a free public charter school. This school educates and prepares children for adulthood, but a large amount of data has become publicly available due to the disrespectful and negligent attitude of its staff and administration. As a result, student and staff data and the school's records, including full financial reports and other confidential documentation, have been compromised.</i><br />Target victim <b>website</b>: <i>odyssey-academy.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mullinax-Ford</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29270</link>
<guid>89242c1e4610507f79f8a7b192880778</guid>
<pubDate>Sun, 01 Feb 2026 04:02:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Mullinax-Ford</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c1150ef18b354ee4686ad236293490b050003a4cade8b99ab568fa31169eeaa</i><br /><br />Threat actor <b>description</b>: <i>Located in Apopka, FL, Mullinax Ford is proud to be one of the premier dealerships in the area. From the moment you walk into our showroom, you'll know our commitment to Customer Service is second to none. We strive to make your experience with Mullinax Ford a good one - for the life of your vehicle. Whether you need to Purchase, Finance, or Service a New or Pre-Owned Ford, you've come to the right place</i><br />Target victim <b>website</b>: <i>mullinaxford.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>SoCal-ROC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29268</link>
<guid>f843074d5076212128800b4857d189aa</guid>
<pubDate>Sun, 01 Feb 2026 00:42:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>SoCal-ROC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>72dc7e1054947e27a66b9f4a664d8d26b5994c69997b979f297c2ce668bc8c45</i><br /><br />Threat actor <b>description</b>: <i>Education</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hawk-Law-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29269</link>
<guid>d77f939ce26039cc0a0226aeb635d6dd</guid>
<pubDate>Sun, 01 Feb 2026 00:25:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Hawk-Law-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c5cea73857ea1f25cd7747dcade71ea8ceeeee6a71c410b4ed542fe41372418</i><br /><br />Threat actor <b>description</b>: <i>At Hawk Law Group, our trial attorneys were born and/or raised in the Augusta area. Collectively, our lawyers have more than 71 years of experience and are widely recognized throughout the Central Savannah River Area (CSRA) due to their tremendous successes in and out of the courtroom.  Our lawyers understand the complexities of civil and criminal litigation and realize the importance of our justice system for their clients and families.  </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bar-S-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29245</link>
<guid>53d7f154d6c0738fa10f9402b2e93e96</guid>
<pubDate>Sat, 31 Jan 2026 17:28:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Bar-S-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc2346f61d93b9720c4775a4699cc4ada5c50c3a24efc5ff88eee5fe492da36e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.barsinc.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>NAI-Plotkin</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29244</link>
<guid>af1870edf5b2de354c2b90d442a299d3</guid>
<pubDate>Sat, 31 Jan 2026 17:27:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>NAI-Plotkin</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6710eb268cc6bb28c2d2aabf3ca3da6940d05783c78e7ef397378fb2dd418fd</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.sdplotkin.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Transaction-Packing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29243</link>
<guid>bf6055077ad393192cb34e27b607e4f2</guid>
<pubDate>Sat, 31 Jan 2026 15:59:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Transaction-Packing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d869ef994323c493974c8d1ce5411fa8c5501ce64a26035d5d55358068b03966</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.transactionpacking.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hallauer-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29242</link>
<guid>5262d5a886484791a7c4c9bd5351a2cf</guid>
<pubDate>Sat, 31 Jan 2026 09:19:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Hallauer-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd87bed42607a7f9421d4d59b42a4bd078f5c723d3b301b87ad5e9fcf4762bd8</i><br /><br />Threat actor <b>description</b>: <i>The go-to firm throughout the Hampton Roads region for Criminal Defense, Family Law, Military Law, and Personal Injury matters</i><br />Target victim <b>website</b>: <i>hallauerlaw.net</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dolby-Laboratories</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29238</link>
<guid>b628a477ffe52c257f35814beca57353</guid>
<pubDate>Sat, 31 Jan 2026 05:38:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Dolby-Laboratories</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a543b8f59a49412a0e99d837bba7df1d441baf0d459b1d582f235b9e1e95f26a</i><br /><br />Threat actor <b>description</b>: <i>Dolby Laboratories, Inc. creates audio and imaging technologies that transform entertainment and communications at the cinema, at home, at work, and on mobile devices. The company develops and lice...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wieson-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29237</link>
<guid>311864ecae3eaccf77475c575b178460</guid>
<pubDate>Sat, 31 Jan 2026 02:05:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Wieson-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9b7d5be4b0caf0c7c472cd2128bedbc96e68d03553cf5419d257309db4e015bb</i><br /><br />Threat actor <b>description</b>: <i>www.wieson.com https://www.zoominfo.com/c/wieson-technologies-co-ltd/128565406 Wieson Technologies specializes in the design and manufacturing of connectors and cable assemblies, with a focus on super high-speed technology and wireless communications. Their product range includes interconnect components, wireless components, medical electronics, and automotive electronics. The company serves various industries such as cloud computing, data communication, and medical electronics. Established in 1990, Wieson Technologies aims to provide innovative solutions to clients in need of advanced electronic connectivity</i><br />Target victim <b>website</b>: <i>www.wieson.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Beacon-Mutual-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29235</link>
<guid>8424248303304cda787d00ef2732f8f0</guid>
<pubDate>Sat, 31 Jan 2026 00:31:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Beacon-Mutual-Insurance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f7a70a63717bb61b76903848b70a7b9a50ea403b4571aacb6e910f45e25a5f8</i><br /><br />Threat actor <b>description</b>: <i>MAJOR DATA LEAK – Beacon Mutual Insurance Company EXPOSED: 275 GB (296,228,795,086 bytes) of highly sensitive internal data Beacon Mutual Insurance Company (Warwick, RI) – the primary workers' compensation insurer for Rhode Island businesses (also operating in MA & CT) – has suffered a massive data compromise. The leaked archive contains approximately 275 GB of uncompressed/internal files and includes the following categories of highly confidential information:  Internal corporate documents and correspondence Complete financial statements and reports (2018–2025) Full employee list with personal details Confidential agreements, NDAs, vendor contracts, and partnership documents Detailed claims data: workers' compensation payouts, injury reports, medical records tied to claims Client / policyholder database: business information, insurance policies, payment history Personally identifiable information (PII) of individuals (employees, claimants, insured workers) – names, SSNs, addresses, dates of birth, contact details, etc. Training materials, internal manuals, compliance & safety documentation Multiple system backups and database dumps …and much more internal operational content</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lawsoft</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29234</link>
<guid>54c6997a78e69329bbf97a9256104e4f</guid>
<pubDate>Sat, 31 Jan 2026 00:14:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Lawsoft</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e76334bfe74bbe2a9306ba27364d6fc370046d4f7c9adcc8752dc8c6c847b5ed</i><br /><br />Threat actor <b>description</b>: <i>https://www.zoominfo.com/c/lawsoft-inc/354268207 lawsoftweb.com www.lawsoft-inc.com LawSoft, Inc. specializes in providing scalable and customizable software solutions for law enforcement agencies, including Computer-Aided Dispatch (CAD), Records Management Systems (RMS), and Fire EMS systems. Their products aim to streamline reporting and data integration, boasting a user-friendly design and incorporating legacy system data for a cohesive experience. The company emphasizes strong customer service with 24/7, US-based support and partners closely with clients to cater to their specific needs. LawSoft targets law enforcement agencies seeking efficient, effective technology to enhance their operational capabilities</i><br />Target victim <b>website</b>: <i>www.zoominfo.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hydrometrics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29233</link>
<guid>3713d66bff68568a81cc5bfd409a3703</guid>
<pubDate>Sat, 31 Jan 2026 00:14:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Hydrometrics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c2920b416490ccb2f38f4eb80754a3714ec1edf708d1145d4cee08c381a8e63a</i><br /><br />Threat actor <b>description</b>: <i>www.hydrometrics.com https://www.zoominfo.com/c/hydrometrics-inc/18513967 Hydrometrics, Inc. is a Montana-based company that offers professional scientific and engineering services to industrial, commercial, municipal, and private sectors throughout the United States. With over 40 years of experience, they specialize in civil and environmental engineering, water resources and hydrogeology, mine permitting and compliance, and hazardous waste management. Their interdisciplinary approach ensures client satisfaction through reliable and effective solutions tailored to specific project needs. Hydrometrics is committed to empowering environmental responsibility and delivering dependable results.</i><br />Target victim <b>website</b>: <i>www.hydrometrics.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Abatix</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29231</link>
<guid>d17b9f24d0283dea76343dd18297f806</guid>
<pubDate>Fri, 30 Jan 2026 23:05:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Abatix</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>695dd7901b314def44e1c665529cb5bceb63d43649466d6d5add443247c4a42e</i><br /><br />Threat actor <b>description</b>: <i>https://www.zoominfo.com/c/abatix-corp/99255 www.abatix.com Foundeded in 1983, Abatix is a supplier of products for the general construction, industrial safety, petrochemical, energy, environmental, hospital, fire and water restoration, and disaster response industries supporting customers across the nation and is headquartered in Mesquite, Texas. Established in 1983 and with branch offices in the Atlanta, Baton Rouge, Chicago, Dallas, Houston, Jacksonville, Las Vegas, Los Angeles, Phoenix, San Antonio, San Diego, San Francisco, Sacramento and Seattle areas, Abatix has grown into a nationally recognized supplier of products for the General Construction, Industrial Safety, Petrochemical, Energy, Environmental, Hospital, Fire and Water Restoration, and Disaster Response industries supporting customers across the nation.</i><br />Target victim <b>website</b>: <i>www.zoominfo.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>woodwardoralsurgery.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29230</link>
<guid>4dcc45e9d02ac1b27fe544687d823bac</guid>
<pubDate>Fri, 30 Jan 2026 20:33:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>woodwardoralsurgery.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>90587405cbdd83de1e0cfcf0930f1fdd9b70e4fc7fa8bfd6776441edf2691d10</i><br /><br />Threat actor <b>description</b>: <i>Patient data, med cards</i><br />Target victim <b>website</b>: <i>woodwardoralsurgery.com</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>wjnklaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29228</link>
<guid>de52c3533a78c94f7b3dbc7160f551f6</guid>
<pubDate>Fri, 30 Jan 2026 17:34:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>wjnklaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a3b23ee560f7037c090f415b8dc9328f989430df6932dea16edf1f201abb2a0</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>wjnklaw.com</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>LONGHORNORGANICS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29217</link>
<guid>f6c744ece7e1a36892eba3a5d2938110</guid>
<pubDate>Fri, 30 Jan 2026 16:35:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>LONGHORNORGANICS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>03e1eaf01919e33c1511d7643dc310697cb6433ca8598bdbfded98df1c9492c3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SHACKELFORD.LAW</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29219</link>
<guid>a2667dd894062c9ca2a4602cb4718f52</guid>
<pubDate>Fri, 30 Jan 2026 16:35:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SHACKELFORD.LAW</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5983fbe111308ff2358ecf579ba26adfa4530583a013969ed4d872edb1c67877</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SERVE-CLOUD.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29220</link>
<guid>127eeffce3105803c5cbd2aa9428ef5c</guid>
<pubDate>Fri, 30 Jan 2026 16:35:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SERVE-CLOUD.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b0b688e044f48e8dc62fc7ca13d4a833bb05ab5101802f0a59d82220ec2a7be</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Littlefield-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29205</link>
<guid>9b0bb812b40cb63d352715c0040dbfba</guid>
<pubDate>Fri, 30 Jan 2026 14:39:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Littlefield-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2d8a9b1e676a025de89986797f78dbd3a56723f5ed17c47ab66541dc25ba0cbd</i><br /><br />Threat actor <b>description</b>: <i>Electricity, Oil & Gas</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bryant-Consultants</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29211</link>
<guid>508cb643c0ea0e2f6451bba7aa5cfb64</guid>
<pubDate>Fri, 30 Jan 2026 14:39:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Bryant-Consultants</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>80f6c706352e30a23ee59cf7c88ccb9863d5209a9d9d18983392b98c7e1cc3f6</i><br /><br />Threat actor <b>description</b>: <i>Bryant Home specializes in providing comprehensive engineering solutions for the built world, focusing on geotechnical engineering, building envelope consulting, and hydrological analysis.We will upload 10gb of corporate data soon. Detailed employee personal information (health information,scans of personal documents), detailed financials, credit cards, payments details, contractsand agreements, confidential files, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Northeast-IndustrialManufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29213</link>
<guid>dc14e10c0ecf8029a86d27e74d140539</guid>
<pubDate>Fri, 30 Jan 2026 14:29:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Northeast-IndustrialManufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb34539788616c38b582c3ad2f15addfab56190cfe2cbd5666b1445a85d8ab65</i><br /><br />Threat actor <b>description</b>: <i>Northeast Industrial Manufacturing (NEIM), founded in 1993, speci
alizes in high-quality goods and services tailored to the waste, 
recycling, scrap, oil, and gas industries. Their team boasts exte
nsive expertise, committed to delivering optimal services at comp
etitive prices.

We will upload 10gb of corporate data soon. Detailed employee per
sonal information, detailed financials, credit cards, payments de
tails, confidentiality agreements, NDA, contracts and agreements,
etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rocky-Mountain-Associated-Physicians</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29203</link>
<guid>4ce43eeff8805bee6936a5bcb383edc6</guid>
<pubDate>Fri, 30 Jan 2026 12:11:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Rocky-Mountain-Associated-Physicians</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>129def216fd5504b66c1371017327648c973d2196a4f91829ddc868cb99d1cef</i><br /><br />Threat actor <b>description</b>: <i>Utah’s Leading Bariatric Specialists, surgical & Medical Weight Loss Solutions in Salt Lake City</i><br />Target victim <b>website</b>: <i>utahbariatrics.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Atlantic-National-Trust</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29202</link>
<guid>d023867f3674a2d8514221428c6760ef</guid>
<pubDate>Fri, 30 Jan 2026 12:11:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Atlantic-National-Trust</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e095ebcd75b52daa0b74a08ab92e6c07b7c609e578fdddaaf5eecc793588994d</i><br /><br />Threat actor <b>description</b>: <i>Deals in commercial asset-backed loans, commercial real estate acquisition, secured lending, development and management</i><br />Target victim <b>website</b>: <i>atlanticnationaltrust.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>shorelinenyc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29200</link>
<guid>4dc78ee9d84aeec573c4179447b5f17c</guid>
<pubDate>Fri, 30 Jan 2026 10:41:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>shorelinenyc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c9bb5fb05a1733d777c1b576414482c5a1f0244d56c5f13a83f34eabf73767ee</i><br /><br />Threat actor <b>description</b>: <i>Shoreline builders continuously raises the bar in excellence, quality and safety...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.roschvisionary.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29201</link>
<guid>6774b4304eb6167c263fa777644370aa</guid>
<pubDate>Fri, 30 Jan 2026 10:41:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>www.roschvisionary.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>519c56b462a2affe30812ee3110f34ab25ce84756d7a5537c38fe78d2219924c</i><br /><br />Threat actor <b>description</b>: <i>Rosch Visionary Systems specializes in software solutions designed specifically ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tulsa-International-Airport</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29199</link>
<guid>517cd23ae4375b47d04ef6363a229b13</guid>
<pubDate>Fri, 30 Jan 2026 08:12:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Tulsa-International-Airport</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>965eec8aaaf8000a3a0fb7db6340925f55773b204e269726c364dbfa4130df42</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>flytulsa.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>NGC-Software</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29135</link>
<guid>6e2559b077897e54a426cbdbd0bb05cc</guid>
<pubDate>Thu, 29 Jan 2026 19:33:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>NGC-Software</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>71a44300fa1f3d3c88cb1d3b235a1e29c9706cccdab2731dcba22412bbc7b7cd</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] NGC Software is a leading provider of Product Lifecycle Management (PLM), Supply Chain Management (SCM), Enterprise Resource Planning (ERP) and Shop Floor Control software and services for brands, retailers and consumer products companies. Founded in 1982, the company delivers solutions to help businesses improve their speed, productivity and profitability. Located in Miami, Florida, it serves clients globally.</i><br />Target victim <b>website</b>: <i>ngcsoftware.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crosslists-Data</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29131</link>
<guid>b21da80e55c4e85ed1270e4fafb702c2</guid>
<pubDate>Thu, 29 Jan 2026 16:45:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Crosslists-Data</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>85965ec8fb1c581bf7b1eb17892661a6c6a3ca37b298bb54946771e10709c4f1</i><br /><br />Threat actor <b>description</b>: <i>Crosslists Data specializes in providing high-quality new business data for marketers across the country. Their services include custom segmentation and data acquisition, catering to a diverse clientele that includes publishers and non-profits.We will upload 21gb of corporate data soon. Employee personal information (passports, DLs, address and so on), customers' financial and accounting files, contracts and agreements, confidential files, NDAs and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>anomatic.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29134</link>
<guid>5831e536b6f7828e911b47c0f2525161</guid>
<pubDate>Thu, 29 Jan 2026 16:31:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>anomatic.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33f0902b7a9f53013e74ff38bd6c429aa2311048eaf261f4bbe173981cf93567</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1965 and headquartered in New Albany, Ohio, Anomatic is a full-service manufacturer of anodized aluminum and metalized packaging for the automotive, beauty, personal care, consumer electronics, pharmaceutical, medical devices, and spirits industries worldwide</i><br />Target victim <b>website</b>: <i>www.zoominfo.com/c/anomatic-corp/6852027</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Easypak</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29129</link>
<guid>55f16320eb523947f12d2e94d9630c6e</guid>
<pubDate>Thu, 29 Jan 2026 14:16:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Easypak</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aea5beadcf9c29c2308a0c22eed4d0c9954f5a87394b9a827fb37713bd0c89fb</i><br /><br />Threat actor <b>description</b>: <i>EasyPak is a leading provider of thermoformed packaging solutions
for a wide range of industries and applications globally. We off
er dependable, high-performing plastic packaging for food, consum
er goods, medical, and industrial applications.

We will upload 70gb of corporate data soon. Very detailed employe
es (SSNs of 30  employees and other personal information), custom
ers' SSNs, lot of contracts and agreements, financials, confident
ial files, NDAs and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>BrandingBusiness</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29128</link>
<guid>24f1f625bd45de40d754ee728086e4dc</guid>
<pubDate>Thu, 29 Jan 2026 14:09:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>BrandingBusiness</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f591fa6cdaeded4f1c21a6ed4960564ecf484a49d4169b6aab1bb108303e5b72</i><br /><br />Threat actor <b>description</b>: <i>BrandingBusiness</i><br />Target victim <b>website</b>: <i>brandingbusiness.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Melton-Machine--Control</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29126</link>
<guid>a120cbe81a9c5d6c1f699e15a2691de8</guid>
<pubDate>Thu, 29 Jan 2026 13:32:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Melton-Machine--Control</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ded15b417c7135a0c7ea930f48af026077589cfc4c5f585bba8c67c3a5adec18</i><br /><br />Threat actor <b>description</b>: <i>Melton Machine & Control specializes in factory automation soluti
ons, offering a variety of products including robotic welding sys
tems, automated inspection systems, and collaborative robots. The
company provides tailored automation solutions across diverse in
dustries such as agriculture, manufacturing, and construction.

We will upload corporate data soon. Employees data (DLs, passport
s, SSNs and so on), contracts and agreements, financials, payment
details, clients' passports and other information, HR files, NDA
s and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>MG-Oil</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29125</link>
<guid>00649cd10c9934e5bb72fe5beaf0f283</guid>
<pubDate>Thu, 29 Jan 2026 13:32:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>MG-Oil</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5220ae8c5460db6d9cc7b47b510153e31605eba0b1f8175f4d10c57cd6228f1b</i><br /><br />Threat actor <b>description</b>: <i>M.G. Oil Company offers a diverse range of services including fue
l supply, convenience stores, lube services, and entertainment so
lutions through casinos and automatic vending. They are the large
st provider of video lottery and amusement machines in South Dako
ta and operate 20 convenience store locations focused on excellen
t customer service.

We will upload 35gb of corporate data soon. Detailed personal inf
ormation of almost all employees, financial information about lot
teries, a bit of customer files, confidentiality agreements and o
ther interesting internal data.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hillmann-Consulting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29122</link>
<guid>837e868ffbb3a67451e480e1864e071d</guid>
<pubDate>Thu, 29 Jan 2026 12:53:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Hillmann-Consulting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0677c5106e88cd0c460456b4e90dfeb9bf2e684525a3535572b8d74d7efbfca4</i><br /><br />Threat actor <b>description</b>: <i>Hillmann Consulting is a nationwide construction consulting and d
ue diligence company that specializes in planning, managing, and 
executing construction projects. They offer a wide range of servi
ces including environmental health and safety, due diligence and 
remediation management, energy consulting, and construction servi
ces.

We will upload 116gb of corporate data soon. Employees' data (250
 DLs, passports, SSNs and so on), contracts and agreements, fina
ncials, HR files, confidential files, NDAs and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>MACT-Health-Board</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29121</link>
<guid>394201ad68984c677be221f6d9f263fc</guid>
<pubDate>Thu, 29 Jan 2026 12:46:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>MACT-Health-Board</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb4378b227fc141a4e10b35a19515ffadf218fd1a2273eaa365dc611888732de</i><br /><br />Threat actor <b>description</b>: <i>MACT Health Board</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Community-Property-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29119</link>
<guid>dc74d495021d5eb62f2a0dc42a47442b</guid>
<pubDate>Thu, 29 Jan 2026 12:03:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Community-Property-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2d662f7c597ae02ae9a759dd4fac5d4418bc6913a1aeca03f3970902cc309867</i><br /><br />Threat actor <b>description</b>: <i>CPM rapidly evolved into one of the premier association managemen
t firms in the industry and is on the forefront of innovative and
specialized services. CPM has developed expertise in all areas o
f association management and keeps Board Members updated on law c
hanges. The firm specializing in the management of common interes
t developments including condominiums and planned unit developmen
ts. 

We will upload 67gb of corporate data soon. Large amount of detai
led clients' data, employee personal information (DLs, w-9 forms 
and so on), contracts and agreements, detailed financials (credit
cards, payment details and so on), confidential files and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>consultaegis.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29118</link>
<guid>857cd81e6a7d216eeaf1946a803a7d5e</guid>
<pubDate>Thu, 29 Jan 2026 11:31:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>consultaegis.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9aefe3bd4faadb3ea24b13c2b623ab882e2cca56f879e1e8d2ea57ac583f5183</i><br /><br />Threat actor <b>description</b>: <i>The data contains materials of national security including BIO laboratory facilities blue prints, and infromation regardless US army nitroglycerin supply chain.</i><br />Target victim <b>website</b>: <i>consultaegis.com</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>zallc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29117</link>
<guid>a92df7cbfdddcc938abc806992026a19</guid>
<pubDate>Thu, 29 Jan 2026 11:29:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>zallc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da1916b721409e8f39a7a258ef62fa1e5bf3a30e88b3806ae8c2ec96d9c98236</i><br /><br />Threat actor <b>description</b>: <i>PII data, SSN´s financial and audit reports.</i><br />Target victim <b>website</b>: <i>z*l*c.o*g</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>Weapons-License-Warren-County-Sheriffs-Office</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29113</link>
<guid>a4db53c680ab731e9aa1eba01398bcac</guid>
<pubDate>Thu, 29 Jan 2026 09:41:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Weapons-License-Warren-County-Sheriffs-Office</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e288e3d7cd60c933d2f32bb11adf142f7165ae3f701e2ad2cee945a7f07dc9ac</i><br /><br />Threat actor <b>description</b>: <i>The Warren County Sheriff's Office (Kentucky, USA), led by Sheriff Brett Hightower, is a professional law enforcement agency dedicated to protecting residents and visitors, upholding Kentucky state laws and the U.S. Constitution, and delivering comprehensive public safety services across the county. The office provides a wide range of functions, including proactive crime prevention, rapid incident response, equitable enforcement of ordinances and statutes, civil process execution, tax collection and administration, concealed carry permit issuance, and various community-oriented programs and educational initiatives. Headquartered in Bowling Green, the agency maintains a 24/7 operational commitment to emergency preparedness, integrity-driven community policing, and continuous improvement through citizen engagement and feedback to enhance overall safety and quality of life.</i><br />Target victim <b>website</b>: <i>warrencountykysheriff.com</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>NVHG.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29101</link>
<guid>0c61127c49ea5107f5088e2c93ed743e</guid>
<pubDate>Thu, 29 Jan 2026 08:50:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NVHG.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9346a25a94a55c2df83e5dba14ee5620440a834f6430b263d1b05d2d06d8acc5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>WHEELOCKST.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29102</link>
<guid>d1f6b0f22fb84f1e2ee58c9481de0e5e</guid>
<pubDate>Thu, 29 Jan 2026 08:50:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>WHEELOCKST.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f196b5b9e6bba711f1e563b27566ddaf6c4a43b874ed67f30980b47da0dbfd3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DESKTOPG.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29103</link>
<guid>d6181e24bc01e4a832249fa9a2de8470</guid>
<pubDate>Thu, 29 Jan 2026 08:50:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DESKTOPG.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8d41ac22069eaee23f5732f2586970a94ba52f9a0590af4a229b327ee7fcec15</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>LeMatic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29099</link>
<guid>3540a005ce1b9c61b8c40338a7fa3b56</guid>
<pubDate>Thu, 29 Jan 2026 00:43:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>LeMatic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e0c27272b1112a579f0ffdbde1f8b9de5b1a23812005ad1048caa2a470e37f9</i><br /><br />Threat actor <b>description</b>: <i>LeMatic is a leader in automated baking technology, offering innovations such as the AutoOp® and AutoEye® equipment lines to meet the evolving demands of the baking industry. Their product range includes solutions for slicing, packaging, basket handling, specialty systems, dough imprinting, pan cleaning, and robotics. LeMatic also provides aftermarket services, parts, and upgrades, ensuring customers receive the support they need for high-volume production and cutting-edge technology. Their intended clients include bakeries and industrial food producers looking for reliable and advanced baking solutions.</i><br />Target victim <b>website</b>: <i>www.lematic.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bumble-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29097</link>
<guid>0a9e30ce0e92f1f994081bd5a4ab7817</guid>
<pubDate>Wed, 28 Jan 2026 20:46:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Bumble-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79ab1944ce6aa18fafc6950ef5c81699af57c19e017daa4c48d771c5d61a447f</i><br /><br />Threat actor <b>description</b>: <i>Updated: 29 Jan 2026</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chu--Yang-Dental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29093</link>
<guid>afb385227f5ff1dcd5c746974baf1060</guid>
<pubDate>Wed, 28 Jan 2026 19:41:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Chu--Yang-Dental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db96bac98b8ce6e57abc6c8e0ed884d2df7e545fdd0a60d30d720fbf524dc823</i><br /><br />Threat actor <b>description</b>: <i>Healthcare Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Service-Broadcasting-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29095</link>
<guid>e6bbe250889b758c4007c91144c3fb6a</guid>
<pubDate>Wed, 28 Jan 2026 19:41:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Service-Broadcasting-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b792399894f3334e785963b5d0ca8c4d6dd1451fb3dbb6bf8e4b0a44b7496a6a</i><br /><br />Threat actor <b>description</b>: <i>Advertising & Marketing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>NessCampbell</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29096</link>
<guid>19317b848dbb3dcbfb5684c662fd25ff</guid>
<pubDate>Wed, 28 Jan 2026 19:41:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>NessCampbell</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f3fb0384f151bb64f8693883799c998ffac395ff75ea97b93a1456e16d5bfc5</i><br /><br />Threat actor <b>description</b>: <i>Industrial Machinery & Equipment</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>CMA-Flooring--Design</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29089</link>
<guid>d2cc6063bce8482e2cdf59d6a1885d73</guid>
<pubDate>Wed, 28 Jan 2026 16:47:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>CMA-Flooring--Design</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c255af0cbc5ff9f61813f61d6b2af6198a4a023c0d447ac7ceb281c7ed0854cf</i><br /><br />Threat actor <b>description</b>: <i>CMA Flooring & Design</i><br />Target victim <b>website</b>: <i>cmaflooring.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Family-Partnerships-of-Central-Florida</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29086</link>
<guid>b2a4e73b05f071e8167cb2ff945a2ffa</guid>
<pubDate>Wed, 28 Jan 2026 14:35:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>moneymessage</b> claims attack for <b>Family-Partnerships-of-Central-Florida</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04a4e404f65431c229f4867283e2dffe6d786aa41f6de1180b4985b84d260cb0</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Family Partnerships of Central Florida is a non-profit organization that offers care for children with special needs. The services are aimed at enhancing the quality of life for children and their families by providing medical, emotional, educational, and social support services. They focus on early intervention and work directly with families to customize care plans for each child’s unique needs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>moneymessage</category>
</item>
<item xmlns:dc='ns:1'>
<title>tiw-group.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29083</link>
<guid>80f5c854f86f7ecdd80a84b2973a9b08</guid>
<pubDate>Wed, 28 Jan 2026 11:05:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>tiw-group.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>493e1163656c246a5ed510aabdbd9f4ee09437a1ad112da23b2a26c2f73f5333</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] TIW Group is a specialist software firm with over 30 years of experience in developing solutions for the insurance industry. Their flagship product, ALIS, provides end-to-end solutions for life insurance and annuity processing. Additionally, they provide business process automation, legacy modernization, and risk compliance management services. Their digital solutions help businesses to streamline operations and improve business efficiency.</i><br />Target victim <b>website</b>: <i>tiw-group.com</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>KLMEQUITIES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29063</link>
<guid>13287c195ee2950c927824118a3a42b3</guid>
<pubDate>Wed, 28 Jan 2026 09:13:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>KLMEQUITIES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa2b549939eb7da1428aa82389c72868e601a3fe505aacc35e3afc201e1e0f1e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>NYASPHALT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29064</link>
<guid>3a3fbf606d98da42ecaf1ed523ee083c</guid>
<pubDate>Wed, 28 Jan 2026 09:13:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NYASPHALT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>848ebb57c6e112843ca5a7be39250ef51d12250303e877d0e568aa22d7340487</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>KRIEGMANANDSMITH.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29065</link>
<guid>2562e666dd1a56d065589ec818bda84c</guid>
<pubDate>Wed, 28 Jan 2026 09:13:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>KRIEGMANANDSMITH.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d631d796f34a745decbe846b29c657b6697f205226ebf6b1c5e56b432710c0d9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GALEINTL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29067</link>
<guid>86d4303e4f27966fade0cf152d9ae234</guid>
<pubDate>Wed, 28 Jan 2026 09:13:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GALEINTL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30d8ea0c0e94d83279e3f1982d85c4d2ca1e187b202e4fa665fb9c99e6b81a49</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MCKEEGROUP.NET</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29069</link>
<guid>ec4ecf2f2dc2d3314c1d4cbd433b632b</guid>
<pubDate>Wed, 28 Jan 2026 09:13:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MCKEEGROUP.NET</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1f8a219efcf0c2ea4f518de780f012e35a5771a7ddb27c4b8124180d79f52ff</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ESCALI.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29070</link>
<guid>b76f4e72625e1782dd4758a45cbc1cd6</guid>
<pubDate>Wed, 28 Jan 2026 09:13:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ESCALI.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9744d65642f5bd5d2488d10c9c838c86eb2d9e27d48e82e687a53736010522a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>COBU-ARCH.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29071</link>
<guid>ba9353718aa3b1793b8a23d51e19ef15</guid>
<pubDate>Wed, 28 Jan 2026 09:13:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>COBU-ARCH.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc23bfb0ae85f18650abb405dfa7aee95066af248082709df55f3f9d3628711f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ARKTLA.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29072</link>
<guid>ed5b4ad21f1090dc8bde85374a049f63</guid>
<pubDate>Wed, 28 Jan 2026 09:13:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ARKTLA.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ecee906145d058bc39ea8d8da3ee7d5f10c7f949000954627ac140916566c9bb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>M-B.LAW</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29073</link>
<guid>c8443b6213aa517f2d701ebf845fdae4</guid>
<pubDate>Wed, 28 Jan 2026 09:13:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>M-B.LAW</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b70024906ea462ed764d84d989e65d10874a1560f19526d6e0d9eb2418e0c8dc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>JLK-Rosenberger</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29050</link>
<guid>a30499ad9ae847c32510caccd5d2af71</guid>
<pubDate>Wed, 28 Jan 2026 01:05:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>JLK-Rosenberger</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2fb0a779e37515f0f626b1b03101603af2d06cb5f4f6db0e0dc115c827ce2657</i><br /><br />Threat actor <b>description</b>: <i>JLK Rosenberger LLP, Certified Public Accountants: A full service accounting and business advisory firm with offices in Irvine and Glendale, California and Dallas, Texas.  The firm is recognized as a Top 400 Firm by Inside Public Accounting and one of the largest auditors of insurance entities in the United States as ranked by Aon and AM Best  We have 300GB of data. Internal mail, accounting, company customer information and we will publish all the information next week. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>LGBTQ-Center-Orange-county</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29049</link>
<guid>58be01aa723db6569480940d2c1fde3d</guid>
<pubDate>Wed, 28 Jan 2026 01:05:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>LGBTQ-Center-Orange-county</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e95a78ec35c5e8353dc7afe9828284b7951515fbd58ab41ce71d0d04fb7347a1</i><br /><br />Threat actor <b>description</b>: <i>The LGBTQ Center OC was established as a volunteer organization in 1971 and incorporated in 1975 as a 501(c)(3) non-profit community-based organization. The Center provides services to more than 20,000 individuals annually across a broad spectrum of culture, ethnicity, age, and economic background.  We will publish all the information next week.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>DeRenzis--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29048</link>
<guid>8eeaabfc288f5918418dab1c7d300e4c</guid>
<pubDate>Wed, 28 Jan 2026 01:04:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>DeRenzis--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c9760ebc600f2b70a6f04f4d3871ae16a3eff3aba18cdf11ecc1f3d510693890</i><br /><br />Threat actor <b>description</b>: <i>DeRenzis & Associates, LLP is a specialized accounting firm focusing on agriculture accounting for both dairy and farming sectors.  They offer services including financial statement compilation, income tax preparation, estate planning, and breakeven analysis.   We will publish all the information next week.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Affordable-Housing-Management-Overview-Metrics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29046</link>
<guid>9c2847534128a1e12e08ba1fa9e2c29b</guid>
<pubDate>Wed, 28 Jan 2026 00:07:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Affordable-Housing-Management-Overview-Metrics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46844a3e8223976f470636502c6805d476978354b0da35081f109e52a6f206a5</i><br /><br />Threat actor <b>description</b>: <i>Affordable Housing Management, Inc. (AHM, Inc.) is a nonprofit organization established in 1970 to address the housing needs of individuals in the community who may struggle to access quality housing. The organization is dedicated to developing and managing quality, affordable rental housing that enhances the quality of life and supports economic stability. AHM, Inc. operates multiple communities, providing essential housing options for its citizens. Through its initiatives, the organization aims to contribute significantly to local business growth and overall community welfare.</i><br />Target victim <b>website</b>: <i>affordablehousingmanagementmetrics.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>JP-Research</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29044</link>
<guid>d6cb41a908909feead800375f0e96b04</guid>
<pubDate>Wed, 28 Jan 2026 00:06:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>JP-Research</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c952bfb8f8cabfbce4103b1c50d1ab078b620ff7ca30541e671dfe34d4177ba</i><br /><br />Threat actor <b>description</b>: <i>JP Research, Inc. is a leading US statistical and engineering research firm providing research and a broad range of litigation support services in the fields of automotive and consumer product safety. The company integrates advanced statistics, data analytics and engineering (mechanical, automotive, design, and bioengineering) disciplines to address global safety research problems. In bringing together highly specialized technical fields of expertise, JP Research’s approaches to problem solving frequently set the bar for future research. JP Research founded an international consortium to support a Road Accident Sampling System for India (RASSI), and has established a fully incorporated company, JP Research India, Pvt., Ltd., to pursue automotive safety research, accident data collection and crash investigation in India. Specialties Statistical Modeling,  Probability & Risk Analysis,  Class Action , Comparative Risk Assessment,  Claims, Consumer Complaints Analyses,  Statistical Significance , Failure & Reliability Analysis,  Regression Analysis,  Quality Control Procedures,  Review & Analysis of Police Accident Reports , Forecasting & Time Series Biomechanics and Automotive Engineering Statistical/Economic Evaluation</i><br />Target victim <b>website</b>: <i>www.jpresearch.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>FIAMPACK</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29043</link>
<guid>bfe671b7d65b8143e5a5e13d2415ec2c</guid>
<pubDate>Wed, 28 Jan 2026 00:06:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>FIAMPACK</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>15070ee0a46135ef7e452a096d508366654f399e1ca15c34724c49ced520630f</i><br /><br />Threat actor <b>description</b>: <i>FIAMPACK is a custom contract packager specializing in packaging solutions for the fragrance and cosmetic industries. They excel in combining metal, plastic, and glass materials to create innovative packaging designs. With locations in the USA and Asia, they leverage US engineering expertise alongside Asian manufacturing capabilities. Their experienced team focuses on delivering fast turnaround times for packaging projects.</i><br />Target victim <b>website</b>: <i>www.fiampack.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>anagnosdoor.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29042</link>
<guid>9b2946207cfe91ad1c5c5f4888f39cbb</guid>
<pubDate>Tue, 27 Jan 2026 23:41:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>anagnosdoor.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e114f5b1894a9bfec38ead774bf2eb49602ba71a00a30a196719a03320fc0ba2</i><br /><br />Threat actor <b>description</b>: <i>Anagnos Door Co. specializes in the sale, installation, maintenance, and servicing of commercial overhead doors and related products. Established in 1989, the company is well qualified to serve clients in the competitive construction market of the Chicago area. With a team of IDEA-certified fire door technicians, Anagnos Door Co. ensures high-quality service and expertise. Their primary clients include businesses in need of commercial and industrial door solutions. Employees: 50 Revenue: $8.6 Million Industry: Home Improvement & Hardware Retail Phone Number: (708) 728-9000</i><br />Target victim <b>website</b>: <i>anagnosdoor.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>nbccministries.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29041</link>
<guid>6aaf618580961e7d7d50f1a6aa246fa1</guid>
<pubDate>Tue, 27 Jan 2026 23:40:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>nbccministries.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8fcd86e482cb73af4420898fc56d0e1961924b2320344159bf236bf46732f79</i><br /><br />Threat actor <b>description</b>: <i>New Beginnings Church is a company that operates in the Religious Organizations industry. It employs 5to9 people and has under500K of revenue. The company is headquartered in Matthews, North Carolina. Employees: 25 Revenue: $5 Million Industry: Organizations  Phone Number: (704) 567-2900</i><br />Target victim <b>website</b>: <i>nbccministries.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Callagy-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29040</link>
<guid>8bd6aa50162ebeffc7294b652bc3ea4f</guid>
<pubDate>Tue, 27 Jan 2026 23:40:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Callagy-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>32cf16f402b4c68c2a2c5d4ca3ab7cc4c30073eecb68fa78256a25c191877e8a</i><br /><br />Threat actor <b>description</b>: <i>CALLAGY LAW, P.C. 650 From Road, Suite 240 Paramus, NJ 07652 callagylaw.com  This law firm specializes in various legal areas, including business litigation, personal injury, family law, and healthcare law. The firm is known for its commitment to providing comprehensive legal representation and has been operational since 1997.  Total data in the leak: 355 GB (480,169 Files, 38,388 Folders)  Leaked data: - Clients: companies and individuals - Data Classification: confidential, Private/Proprietary - Special data: Corporate email correspondence, external business correspondence, corporate documents,company policies and regulations,customer contracts and NDAs (Non-Disclosure Agreements),  court hearing materials and litigation case files (litigation documents),customers' personal data and their medical confidentiality (PII,PHI) and other related information.  - Financial data: financial metrics / financial performance data, invoices, payments, and other financial transactions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Match-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29037</link>
<guid>c30eae095af40e4bdefe6e0f1636eea2</guid>
<pubDate>Tue, 27 Jan 2026 22:44:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Match-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be0f14547c4ea10c718922ecaa83611ba01e248b380d2f214f5861b41a28565c</i><br /><br />Threat actor <b>description</b>: <i>Records: 10M Records | Updated: 28 Jan 2026 | Note: Your greed is killing you. | Don't be an idiot like this company. Make the right decision; don't be the next headline. Get off your moral high horse and make the right decision for your stakeholders. PAY OR LEAK otherwise you'll be made an example of.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>newkirklaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29035</link>
<guid>3156231783935e97c9ac263991fe57cc</guid>
<pubDate>Tue, 27 Jan 2026 20:40:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>newkirklaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>01d2d100e319ef20e2413c0f78e02020e2df63c56ff6fb90daa23859a41dd511</i><br /><br />Threat actor <b>description</b>: <i>Newkirk Zwagerman, P.L.C. is a law firm based in Des Moines, specializing in employment law and advocating for employees' rights. They provide legal services to individuals facing discrimination, harassment, and retaliation in the workplace, as well as those involved in executive employment disputes and Title IX actions. The firm serves clients in Iowa and Minnesota, offering personalized legal representation to help employees navigate complex employment issues. With a commitment to fairness and accountability, Newkirk Zwagerman, P.L.C. empowers clients to stand up against larger corporate entities and seek justice</i><br />Target victim <b>website</b>: <i>newkirklaw.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gallagher-Transport-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29031</link>
<guid>3aa5bcc51a5e92cb51f514cc51391d4e</guid>
<pubDate>Tue, 27 Jan 2026 18:16:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Gallagher-Transport-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9769efbacbf75b0bff8c59077a08d0e7b5d554ecf39fede8f0f3ed6147d898c7</i><br /><br />Threat actor <b>description</b>: <i>Gallagher Transport International is a leading customs broker specializing in personalized and compliant freight solutions for importers and exporters. With over 25 years of experience, the company offers a full suite of services, including customs clearance, cargo insurance, and freight forwarding, while ensuring compliance with U.S. regulations. Their dedicated team focuses on proactive communication and personalized service to streamline the shipping process for clients across various industries, including FDA-regulated items, medical equipment, and specialty equipment. Gallagher Transport serves clients nationwide through multiple offices, aiming to make the transportation of goods as efficient and cost-effective as possible.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ashcraft</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29030</link>
<guid>a0674936bd251655ff8e14e18c74b879</guid>
<pubDate>Tue, 27 Jan 2026 18:16:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Ashcraft</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>02e1824cc9ba87bed2baf8febb423cae5a2dfb31cc93936dca5c2bf17369a45e</i><br /><br />Threat actor <b>description</b>: <i>The Ashcraft Company is a HVAC manufacturers' representative based in the Dallas/Fort Worth Metroplex. We specialize in selling custom Heating, Ventilation and Air Conditioning (HVAC) systems and engineered solutions in North Texas.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>QualiChem-Metalworking</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29026</link>
<guid>bdf4880433deb05d33cd59e756e3ae6c</guid>
<pubDate>Tue, 27 Jan 2026 16:37:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>QualiChem-Metalworking</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1973de7233f1073ca4b86eff723badf16be11ae6ee110f97b26b3950b14b7fe1</i><br /><br />Threat actor <b>description</b>: <i>QualiChem, Inc. manufactures some of the most advanced metalworking fluids available in the world.</i><br />Target victim <b>website</b>: <i>qualichem.com</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Connor-Co</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29021</link>
<guid>4a850ecfb32efa4f6e894ed5b631d445</guid>
<pubDate>Tue, 27 Jan 2026 14:43:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>Connor-Co</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6798453dfa8e52d16f2c10fa6622f91d5b08bda0e99b257bd611cf94b2f63d9c</i><br /><br />Threat actor <b>description</b>: <i>TThe company operates in the wholesale trade of engineering materials and equipment..</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Goodmanagement</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29024</link>
<guid>614b785e10cceb93fb854958a5f93d1f</guid>
<pubDate>Tue, 27 Jan 2026 13:07:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Goodmanagement</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f0ddf60b2638e1e33d4a0e678eab7f984c0420050f3e80e51348efba077c0585</i><br /><br />Threat actor <b>description</b>: <i>A professional hospitality management company</i><br />Target victim <b>website</b>: <i>goodmanagement.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Global-Parts--Maintenance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29023</link>
<guid>1fee5d8b6b5230e47fc933334d03ff5b</guid>
<pubDate>Tue, 27 Jan 2026 13:06:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Global-Parts--Maintenance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>802e24d89e5c57232944358b6f8b779e0c5709ba903dd50e526e5d92cae3ec26</i><br /><br />Threat actor <b>description</b>: <i>Tailored procurement solutions and supply chain management</i><br />Target victim <b>website</b>: <i>globalpartsllc.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>IMA-Diligence-Services-A-Division-of-IMA-Financial-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29022</link>
<guid>35f4421c476ab29bd7492717ccb0642c</guid>
<pubDate>Tue, 27 Jan 2026 13:05:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>IMA-Diligence-Services-A-Division-of-IMA-Financial-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>959b3a736d89d46e3e18e4055cac4ccb3a6d310b74f0cf9afde424419db0258e</i><br /><br />Threat actor <b>description</b>: <i>A provider of financial services</i><br />Target victim <b>website</b>: <i>.</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>MMD-Insurance-Law-Advocates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29019</link>
<guid>b9b5c1aceaf0491b0c041bca34418f07</guid>
<pubDate>Tue, 27 Jan 2026 10:39:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>MMD-Insurance-Law-Advocates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6519aa0a11d5bb4c006ec2cb56284491d42dd311c5f60d7230379c65597a37c6</i><br /><br />Threat actor <b>description</b>: <i>Dedicated to representing homeowners, business owners and condominium associations in insurance disputes</i><br />Target victim <b>website</b>: <i>mmdinsurancelawadvocate.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Trevino-Group-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29018</link>
<guid>25557eaf26d046e1e08f4f8dfe82d1c4</guid>
<pubDate>Tue, 27 Jan 2026 08:35:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>The-Trevino-Group-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26738709910915054a869e2b79988690990d8a8d0fafdf817128f6c9ced2e895</i><br /><br />Threat actor <b>description</b>: <i>WE HAS COLLECTED SUCH DATA AS:   - Confidential documents - Clients Data - NDA - Financial data - Operations - Corporate data - Business Agreements - Drawings  And a lot of other VERY IMPORTANT information! </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>OEC-Medical-Systems-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29017</link>
<guid>db649c1d69f2a2d2af63f4c5567e7244</guid>
<pubDate>Tue, 27 Jan 2026 03:11:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>OEC-Medical-Systems-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>086504fc315ebd3cd0a2940e8aa6743f3c85d8410651c2ba80198ff0fca72a6e</i><br /><br />Threat actor <b>description</b>: <i>OEC Medical Systems, Inc</i><br />Target victim <b>website</b>: <i>oremeyeclinic.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Panera-Bread</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29016</link>
<guid>85c8395916ffc2198dd670da1b20d108</guid>
<pubDate>Tue, 27 Jan 2026 00:19:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Panera-Bread</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4c2d73a38063a58b2855c7ec0d0c0dae7313b416bbbb04444e6a713512dbd53e</i><br /><br />Threat actor <b>description</b>: <i>Records: 14M Records | Updated: 27 Jan 2026 | Note: Don't be the next headline. | Don't be an idiot like this company. Make the right decision, don't be the next headline.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>freidarothman.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29015</link>
<guid>5ff4fb7b73fa956e5a0382824f85c96a</guid>
<pubDate>Mon, 26 Jan 2026 23:19:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>freidarothman.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>633a8c8bec8bf143e24a1c87ad1e66ba24148e7e1098ca9e5b251fd36859a587</i><br /><br />Threat actor <b>description</b>: <i>Based jewelry and accessories brand founded and led by designer Freida Rothman, who grew up in Brooklyn and comes from …</i><br />Target victim <b>website</b>: <i>freidarothman.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tele-Plus</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29010</link>
<guid>636e0538092a048a7d49aa0b20e2bff1</guid>
<pubDate>Mon, 26 Jan 2026 19:42:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Tele-Plus</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d47960c683c4163154abc6fb587b5c952c5ec4c2f6f9a4bebd4c3efd567ba8e8</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.telepluscorp.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>FB-Mfg</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29009</link>
<guid>6e4c10382ea6d02e196ebcab34cfbffb</guid>
<pubDate>Mon, 26 Jan 2026 19:41:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>FB-Mfg</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8cfb78e701b3e811d33be6098dda4433e262a4a643b2c84e34af3320bacf153f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.fbmfg.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Sourcing-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29008</link>
<guid>ae7a1abc672c5913a8338992ec6b7e72</guid>
<pubDate>Mon, 26 Jan 2026 19:41:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>The-Sourcing-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22e2e1213ab649261d7a4fa540ea51c4b7e3f1b3e746ca35eebe4c3b7078610a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.thesourcinggroup.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Quantum-Fuel-Systems-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29006</link>
<guid>11a5b5ef81cff76a0a1f3d042f635df3</guid>
<pubDate>Mon, 26 Jan 2026 19:40:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Quantum-Fuel-Systems-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33d13ac46c5b8dc07ae6b8404514715b96f309a8aa54b5707cbbf447b849737f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.qtww.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aquatic-Control</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29005</link>
<guid>3484e1bac36fc0d1f0e86ae3b5aed870</guid>
<pubDate>Mon, 26 Jan 2026 19:39:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Aquatic-Control</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a64ef84dde6f508d29a471b30c20b31040a38aacd0e1acba38bea45f3cfc9c1e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.aquaticcontrol.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Christine-London</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29004</link>
<guid>a5526b5c1e15754a534e9ff97728a32f</guid>
<pubDate>Mon, 26 Jan 2026 19:38:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Christine-London</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b852ed7c12dbcd8c905b79d4acb9be9bc2945578ba6d0041725d5bd3b0d8aa20</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.christinelondonltd.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Routten--Laster-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29003</link>
<guid>7a1e01c1f482effc90f8e7d0e2581aff</guid>
<pubDate>Mon, 26 Jan 2026 19:38:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Routten--Laster-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c4884feab9a4f0d27b6e423d676e66cb21dcbb26c021e8ca93b9096a0f6677c5</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.routtenlasterlaw.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Joyva</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29002</link>
<guid>8d0e8d50eb0bad1727b38382d4fa42ef</guid>
<pubDate>Mon, 26 Jan 2026 19:37:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Joyva</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6d6f4b9288e51d8d95fba6e06a0eb29e73da144dc32ac96aa2205aec788674b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.joyva.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.shrimphouse.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=29001</link>
<guid>1c76fb9381aac8712c2d06e31a05702b</guid>
<pubDate>Mon, 26 Jan 2026 19:05:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>www.shrimphouse.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25ec0cd837d63199627adc3d02beb2a21aba6f5e5131e4c3dbd7c45d35b6babe</i><br /><br />Threat actor <b>description</b>: <i>1tb data </i><br />Target victim <b>website</b>: <i>www.shrimphouse.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Prince--Schmidt-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28998</link>
<guid>a75a8ecb7cea780ca37daff6501c60a2</guid>
<pubDate>Mon, 26 Jan 2026 14:51:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Prince--Schmidt-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e3a7f5cd5e528d7058dabd825258de196e96d21baf593bd956a60af968e3c1d0</i><br /><br />Threat actor <b>description</b>: <i>Prince & Schmidt LLP</i><br />Target victim <b>website</b>: <i>LawForPersonalInjury.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mills-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28972</link>
<guid>80577d9cb5c479e8e8b85252f1bfe005</guid>
<pubDate>Mon, 26 Jan 2026 04:54:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Mills-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>54d3b6e0eff03968a7321b414f582b9b8d407f9429f81b18a3938539c0f2b961</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>WRENLAWFIRM.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28947</link>
<guid>7b905b5bd19b35cf3f9d762aa6acaa45</guid>
<pubDate>Sun, 25 Jan 2026 16:56:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>WRENLAWFIRM.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ddc86437d01ad8d85ea87fba09c6969738e2428c9461e87e004d21c47379651</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>LDHRLAW.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28948</link>
<guid>ef9ffa986fa98b2485fe6b57ac0c6b1b</guid>
<pubDate>Sun, 25 Jan 2026 16:56:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>LDHRLAW.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d11424513ab444c1be9b39a3f2df86a94a66a20834654d0673e28ac1810e96ee</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GENESYSSPINE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28949</link>
<guid>d8eab7a13d4255428253eef1b2e64b0d</guid>
<pubDate>Sun, 25 Jan 2026 16:56:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GENESYSSPINE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eaecfabff4933e01cde3c1f813a3ab28a399e5d184e0401895be1f33f169f7c0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HILTON.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28950</link>
<guid>713a6858eec9a67eeff4b55c6184656a</guid>
<pubDate>Sun, 25 Jan 2026 16:56:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HILTON.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9133cc851594f68819a59b0ad430c879235508ebd4bc080377a92ffe41266e53</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>WEATHER.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28951</link>
<guid>110eed2c630aab0f3fa87d6473926732</guid>
<pubDate>Sun, 25 Jan 2026 16:56:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>WEATHER.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8250c2f05b6e93bdfca173f3ac1403e9092356c7f83ffb3f2d07e4b2d32e2b3f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>RTCCOMPUTERS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28954</link>
<guid>ae0da2b96cb66af397177a53a709860e</guid>
<pubDate>Sun, 25 Jan 2026 16:56:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>RTCCOMPUTERS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9159a67d92f91b818909dcd0c0fbd4b8fb0265c44ff20f5cb5152de6b5450549</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>4DITSOLUTIONS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28961</link>
<guid>091de388b6057d21b628726885c2b0db</guid>
<pubDate>Sun, 25 Jan 2026 16:56:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>4DITSOLUTIONS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf8350a6fea92073056d5fbd9e92fe7b873e7e2fc5c2ba1f8778b1ec357cee92</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>VISTA-TRAINING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28962</link>
<guid>5103ae07e6b7cd584364696695b075de</guid>
<pubDate>Sun, 25 Jan 2026 16:56:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>VISTA-TRAINING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf4d9beaeee6245d698dc80fc56c3e90a3a6a6bbb9a9278bb6e463338f41526a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>WILDRIDGELANDSCAPE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28964</link>
<guid>f9aa778d602c7ba036e50f85deeb7250</guid>
<pubDate>Sun, 25 Jan 2026 16:56:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>WILDRIDGELANDSCAPE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0048fa1a9ef007cfa6fad5418383ea620e8128d408f47fc82fdf4e46aaad9a61</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>INSPYRSOLUTIONS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28966</link>
<guid>0421c02f0fc9cebfa39a613c3c59c3e2</guid>
<pubDate>Sun, 25 Jan 2026 16:56:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>INSPYRSOLUTIONS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fb4c3a9bad8306e40112ef022ea13b9f89bc63e6cb05565ea8a490c1777b8eb6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>EXCELAS1.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28968</link>
<guid>1b3c1623c5c98ad8549b8f62670d1f52</guid>
<pubDate>Sun, 25 Jan 2026 16:56:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>EXCELAS1.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5cd04d2f6ec5d04acdbeffb9759bc550a45b1709fab83c1e2c173a65571ce1bc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cytek-Biosciences</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28989</link>
<guid>1fcf9224f1f09a97ad293c680a215696</guid>
<pubDate>Sun, 25 Jan 2026 12:48:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Cytek-Biosciences</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>74b9a99420087f3d4e2cb8519261bbc578e5408dc6d8421f54fa192819fd65e9</i><br /><br />Threat actor <b>description</b>: <i>Cytek Biosciences Cytek Biosciences is a leading cell analysis solutions company founded in 1992 and headquartered in Fremont, California with global offices across North America, Europe, and Asia.   Sold   0%   																					All data was sold, stay with us, we will upload new Companies later 																			  More</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Successful-Match</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28987</link>
<guid>6acf2725b339ee1695ebf86253f75221</guid>
<pubDate>Sun, 25 Jan 2026 05:19:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>The-Successful-Match</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca47767a67184d0381b8e2e75654f106776610d45da0c71fb996c26168d59021</i><br /><br />Threat actor <b>description</b>: <i>The Successful Match (MD2B)</i><br />Target victim <b>website</b>: <i>thesuccessfulmatch.com/publishing</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shiffler-Equipment-Sales</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28940</link>
<guid>ad1dc188240785dd12c21e40524dbbcd</guid>
<pubDate>Sat, 24 Jan 2026 20:43:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Shiffler-Equipment-Sales</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>977466ee5ac81ae339bd605d76497086cd52d21d329e01a33ec031464c5f321c</i><br /><br />Threat actor <b>description</b>: <i>Furniture</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>D--D-Building</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28942</link>
<guid>938abaff15ddc97965b156b23136c1c9</guid>
<pubDate>Sat, 24 Jan 2026 20:43:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>D--D-Building</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>150e7a8cbc9147392cfc39a340d55c8684458d38b87507a82211d64fdc508e27</i><br /><br />Threat actor <b>description</b>: <i>Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>gsglobalresources.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28980</link>
<guid>4bd5096853abc791756085adf90dfe7f</guid>
<pubDate>Sat, 24 Jan 2026 20:21:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>gsglobalresources.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ebcf7722de5feea78a2d49f8f01f2b208bba78ee4473890e1352ac5a56592cc</i><br /><br />Threat actor <b>description</b>: <i>GS Global Resources (often abbreviated GSGR) is an American industrial engineering and machine-performance solutions company headquartered in Mukwonago, Wisconsin. Founded …</i><br />Target victim <b>website</b>: <i>gsglobalresources.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>trulinemfg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28977</link>
<guid>2c09b237b3fe0a29b7ae5b63cd8632aa</guid>
<pubDate>Sat, 24 Jan 2026 20:19:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>trulinemfg.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9c1b0a2b62e78646be190226d2ba422ab58e4b48c2d27b201c6fb6446ed72b1</i><br /><br />Threat actor <b>description</b>: <i>Tru-Line Manufacturing Company is an American industrial fabrication firm headquartered in Decatur, Alabama that specialises in the metal fabrication of …</i><br />Target victim <b>website</b>: <i>trulinemfg.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>superiordrywall.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28976</link>
<guid>cd65710fc56d8163dfaed043e4129690</guid>
<pubDate>Sat, 24 Jan 2026 20:19:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>superiordrywall.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f03c5034877d5543c330fdab39655132f7c6c73f79e1f52cead570906c081f8b</i><br /><br />Threat actor <b>description</b>: <i>Superior Drywall is an established American commercial drywall contracting company based in Oxnard, California, specialising in a range of interior …</i><br />Target victim <b>website</b>: <i>superiordrywall.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Herzing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28943</link>
<guid>d37b9e2b497aa9312965a132d98279b0</guid>
<pubDate>Sat, 24 Jan 2026 19:43:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Herzing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4bd807f444129e62525c949e38762fcea3fe14b474b3550794082fb54f721f84</i><br /><br />Threat actor <b>description</b>: <i>Manufacturing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.advancedcoolingtech.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28938</link>
<guid>dd0e5d3313b032ce56c959d25e1beee1</guid>
<pubDate>Sat, 24 Jan 2026 08:41:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>www.advancedcoolingtech.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>592dcb9db769c5b063a4fe20e4741765367abe6cf3b63a51bd50a503cf333ed2</i><br /><br />Threat actor <b>description</b>: <i>Advanced Cooling Technologies, Inc is a leading provider of medical cooling solutions, specializing in the distribution of Airsys Medical Chillers in the USA. T...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>IGI-Global</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28934</link>
<guid>437bce6c54114f437f169de31d370f1b</guid>
<pubDate>Fri, 23 Jan 2026 15:42:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>IGI-Global</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45696fef424c5425fc5392876adaa22cdf7d72a4d53f15dc84085320209fcec8</i><br /><br />Threat actor <b>description</b>: <i>IGI Global is an international academic publisher committed to producing the highest quality research and ensuring the timely dissemination of innovative research findings through an expeditious and technologically advanced publishing process.We will upload 220gb of corporate data soon. Employee personal information (passports, DLs, credit card details, health information), financials, contracts and agreements, NDA, confidentiality agreements and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Uinta-Bank</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28930</link>
<guid>b4feeda018954b3a901f25f66e7f911e</guid>
<pubDate>Fri, 23 Jan 2026 00:44:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Uinta-Bank</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b3afb0787548fb3e08c7a1c275e10309f9721a996d4219a0907bfee37eea0b3c</i><br /><br />Threat actor <b>description</b>: <i>Established in 1919, Uinta Bank is a community bank headquartered in Mountain View, Wyoming. Uinta Bank is proud to provide community banking to the individuals...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>ECA-USA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28919</link>
<guid>aabcec3c1485362f5f588135883d37b6</guid>
<pubDate>Thu, 22 Jan 2026 20:08:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ECA-USA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd0292fc6d14281c73b6af0031c1f7f15dd11d9e301bc1e56702a80a891f3e35</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ITROBOTICS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28923</link>
<guid>ad0e9e545bd1d949dcf019ce06a2ae95</guid>
<pubDate>Thu, 22 Jan 2026 20:06:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ITROBOTICS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de37994127bc54dba924219f05adb5215dace7b23c65e8a055188bfd32d3dc61</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MONTALBAARCHITECTS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28924</link>
<guid>71d54f4b09795d02cbc6959c1145e886</guid>
<pubDate>Thu, 22 Jan 2026 20:05:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MONTALBAARCHITECTS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f14ac53fbf7d75cea9ff27138d578570cc194e7aa4bf1a0db71f237145aef61</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>-AERIFY.IO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28926</link>
<guid>e9abec5e32203998211653b45023be1c</guid>
<pubDate>Thu, 22 Jan 2026 20:04:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>-AERIFY.IO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>760ab3518105213ee29dc8185733997c09ae2506ca6ad2e2405e4bd756f11466</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SMITHDALIA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28928</link>
<guid>6e92962008491b24a803ff3b7d61734b</guid>
<pubDate>Thu, 22 Jan 2026 20:03:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SMITHDALIA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8d870ff39c0de75d5cbaeb26d2db2199ae0bbe9244da6d486e0738d839b8ab59</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ELKAIR.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28929</link>
<guid>fbcefc201bbac612e5ff6b96c64e2465</guid>
<pubDate>Thu, 22 Jan 2026 20:02:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ELKAIR.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c701b5cefbd620c0b2e91d871ddf6fc727e1402fc9f3fc1cf9e77abaa725020</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nike-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28913</link>
<guid>9a985e5d14e44dc2c97d12877dd7cd8c</guid>
<pubDate>Thu, 22 Jan 2026 18:43:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Nike-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42dd1ceed496f7070766615ba77fdbdf93c21ceb705b72fe0de0a65c4c0436a6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>EDF-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28915</link>
<guid>5f69e19efaba426d62faeab93c308f5c</guid>
<pubDate>Thu, 22 Jan 2026 17:44:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>EDF-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c6530b80e5274cf6769c36a5b269dc4a98261a7fbce205e1817de3f698584a09</i><br /><br />Threat actor <b>description</b>: <i>Electronics</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Universal-Builders-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28910</link>
<guid>d2a83dc418ee9d6209d8356fca703f13</guid>
<pubDate>Thu, 22 Jan 2026 16:44:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Universal-Builders-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9bd9cc1c45133052b37a37117e3728c4521f5f9cf8f56491c6f40e5fe2143c5</i><br /><br />Threat actor <b>description</b>: <i>Universal Builder Supply (UBS) specializes in innovative scaffolding, hoisting, protection, and access solutions tailored for major construction projects. Since 1931, they have focused on delivering custom-engineered scaffolding and hoisting systems used in prestigious projects worldwide, including the Statue of Liberty andGrand Central Station.We will upload 22gb of corporate data soon. Detailed employee personal information (addresses, SSNs, passport and DL scans, bank account information, credit cards and so on), HR files, financials, project files, projects, NDAs and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Spiros-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28912</link>
<guid>32c12acc9a2efc3fa896bb3ebcd47ee7</guid>
<pubDate>Thu, 22 Jan 2026 15:43:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Spiros-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30ebe963ab2632217f060a90dc8ac9757694c0e203460f701fc1f1688798b685</i><br /><br />Threat actor <b>description</b>: <i>Spiros Industries is a custom manufacturing company specializing in precision springs and wire forms, known for its commitment to quality and expertise. They serve various industries, particularly medical, firearms, and packaging, and offer services including prototyping and specialty packaging.We will upload over 20gb of corporate data soon. Detailed employee personal information (w4 forms, passports, DLs medical information, credit cards and so on), customer files, financial and accounting information, contracts and agreements, NDAs and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Service-Lane-eAdvisor</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28907</link>
<guid>2d95d0882174e6abcf9ebe52b57a61a1</guid>
<pubDate>Thu, 22 Jan 2026 10:24:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Service-Lane-eAdvisor</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c4150e845b78e051d709df9dc05c809cfda62f28bf649351a45a267136088902</i><br /><br />Threat actor <b>description</b>: <i>Service Lane eAdvisor</i><br />Target victim <b>website</b>: <i>sleadvisor.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>OnSight</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28906</link>
<guid>71f7e51efde5fe99cc2d6dbd64e1319c</guid>
<pubDate>Thu, 22 Jan 2026 00:29:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>OnSight</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>530a21e0ce4401c05f988438ec808c11ac745fabeaca7bda3438dc63c788b4ef</i><br /><br />Threat actor <b>description</b>: <i>ONSIGHT is a leading production facilities company, specializing in services to the film and broadcast industries. The suite of services range from equipment rental through to post production and DI finishing. Conveniently based at Shepperton Studios, the camera department supplies high-end digital cameras and 2D or 3D production equipment. The award-winning post production team is located in Soho, London and offers editing systems with 24/7 technical support, a digital lab, and a full 2D or stereoscopic 3D post service. Renowned for innovative technology and groundbreaking 3D, ONSIGHT works closely with key manufacturers and is an official service provider to the premier 3D broadcaster, BSkyB. Recent 3D credits include the BAFTA-winning Flying Monsters 3D With David Attenborough (Atlantic/Sky 3D), Madam Butterfly 3D (a co-productionfrom RealD and the Royal Opera House, produced by Principal Large Format), Flight of the Butterflies in 3D (SK Films), Kingdom of Plants 3D WithDavid Atten</i><br />Target victim <b>website</b>: <i>onsight.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>CE-Electronics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28905</link>
<guid>e2e57ded5b59a2058dd5855564c6b5ea</guid>
<pubDate>Wed, 21 Jan 2026 21:58:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>CE-Electronics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d375f6b5273b45ca049e7d869d7c977a12f234e5b0c106e1487bb16445223d85</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ceelectronics.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cemtech</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28904</link>
<guid>0ebd0b8b51eb0d0062065a7657486c8e</guid>
<pubDate>Wed, 21 Jan 2026 21:57:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Cemtech</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>071e70add9ec0c2ede9cd468e8c196d854ad02b1230d3254587c8d8cfda67b16</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.cemtech-corp.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Midway-Windows-and-Doors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28903</link>
<guid>a007685ecc0ccf820b8ac1d6e77f69fd</guid>
<pubDate>Wed, 21 Jan 2026 21:00:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Midway-Windows-and-Doors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7d14553eb31d3d9563e7d4593a1ee35ada81aebfe4122949af767162755dc67</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.midwaywindows.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bayside-Dental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28899</link>
<guid>bdddf7327677bbfc879f505df7122e2e</guid>
<pubDate>Wed, 21 Jan 2026 19:50:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Bayside-Dental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6a760930da7d32376796b66542456e2256242a0caee7ba474556ef9ce6224be</i><br /><br />Threat actor <b>description</b>: <i>Are you looking for a dentist in Rowlett, TX, 75088 near Mesquite? Bayside Dental offers general, restorative & cosmetic dentistry services.</i><br />Target victim <b>website</b>: <i>www.baysidedental.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>ShuBee</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28898</link>
<guid>95b428e98d2b66a8ab324313cfc45300</guid>
<pubDate>Wed, 21 Jan 2026 19:03:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>ShuBee</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8a2c221a01277c27e3cd8063233d1b1379ff70f2e75e18839c8f7982ef7a7230</i><br /><br />Threat actor <b>description</b>: <i>ShuBee is a company providing care wear to service companies. It offers products such as shoe covers, disposable coveralls, service mats, gloves, and cleanup essentials. The company was established in 2000 and is headquartered in Macon, Georgia.</i><br />Target victim <b>website</b>: <i>www.shubee.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clipper-Petroleum</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28886</link>
<guid>cbc39d6ea03f171f1349ce64dc0529c9</guid>
<pubDate>Wed, 21 Jan 2026 17:44:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Clipper-Petroleum</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8da438b5835d97824cc0a8ddf00968c2de5080c5b33dbc79b5d1d98ce89ed514</i><br /><br />Threat actor <b>description</b>: <i>Clipper Petroleum is a petroleum marketer based in Flowery Branch, Georgia, with over 90 years of experience. The company operatesas a convenience store and fast food retailer while also servingas a wholesale fuel distributor.We will upload over 60gb of corporate data soon. Customer and employee personal documents, internal confidential files, detailed financial and accounting information, contracts and agreements, credit card details, NDAs and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Serometrix-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28896</link>
<guid>10164f723a34e25cd518da38b02af653</guid>
<pubDate>Wed, 21 Jan 2026 15:53:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Serometrix-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>400eeb3dd833239b31c677679218aa56210b20a5660d3d45d29c579821b8286c</i><br /><br />Threat actor <b>description</b>: <i>Serometrix LLC</i><br />Target victim <b>website</b>: <i>serometrix.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Orthopaedic-Specialists-of-Massachusetts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28887</link>
<guid>f0ab8e556d0cbb5c0e4201791cfaeae0</guid>
<pubDate>Wed, 21 Jan 2026 14:18:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Orthopaedic-Specialists-of-Massachusetts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c4dde1b9a66089957808ceebd60369ccba1ae961069b5cab2f0f285f320b9f8b</i><br /><br />Threat actor <b>description</b>: <i>Orthopaedic Specialists of Massachusetts provides superior orthopaedic and sports medicine care through a team of expert surgeons and physicians. Their services include surgical and non-surgical treatments for a variety of orthopaedic issues, such as arthroscopic surgery, joint replacements, and sports medicine. With locations in Norwood, Milton, and Sandwich, MA, they cater to patients of all ages and offer expedited appointments. The practice is dedicated to delivering compassionate care and improving patients' health and quality of life.</i><br />Target victim <b>website</b>: <i>www.orthomass.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>KOROLFINANCIAL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28869</link>
<guid>1164caada87d881437173e9a15f78aa5</guid>
<pubDate>Wed, 21 Jan 2026 14:07:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>KOROLFINANCIAL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45de2b27096603758dfa0b51e01cf79040624b3f2f2aa987699998b60331eef2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MCMATHLAW.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28872</link>
<guid>1a21d8c9bbb99bca627434dbf4b98d01</guid>
<pubDate>Wed, 21 Jan 2026 14:05:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MCMATHLAW.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>287dedd9ad63df45c906e47e22ea22f64c71b410d9d8ec6091d5b1bd19c27fad</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>WORKFORCESOFTWARE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28873</link>
<guid>ccfed80e87ba3e3a64b55176df02a9d5</guid>
<pubDate>Wed, 21 Jan 2026 14:04:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>WORKFORCESOFTWARE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a729b3af0606b8f1a2a559995a1cec395418879dbde5bc0a57094e25d6b70f3f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>KCDWORLDWIDE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28874</link>
<guid>192188b239173a6a0c88762b38d97f65</guid>
<pubDate>Wed, 21 Jan 2026 14:04:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>KCDWORLDWIDE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0123aafbe67314a43b9ac85f7527c9d25cafdf51006cc6993b0e760f8ea76701</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ONYXEQUITIES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28875</link>
<guid>bd74971af53184c9911331d4f7bdb4a0</guid>
<pubDate>Wed, 21 Jan 2026 14:03:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ONYXEQUITIES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd9e9e243cb411bbe1ad4ecfd205332242e5cded933676d979173db940811fd0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jet-care-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28895</link>
<guid>de7e76952411d036ca4b58ffcf37bfe7</guid>
<pubDate>Wed, 21 Jan 2026 13:54:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Jet-care-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ede2f6886f7a852a567ee0469db2794e411cf72deae593d7ece5a7ccffa08f39</i><br /><br />Threat actor <b>description</b>: <i>Jet-care International</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>us-duct.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28877</link>
<guid>4ce2dc45f5dcc0b44e0162f8dc4ea237</guid>
<pubDate>Wed, 21 Jan 2026 13:44:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>us-duct.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b5c19fda958169c8b926bea7f22aad1c61f2c81f1c4056ad907716a0e2e466f</i><br /><br />Threat actor <b>description</b>: <i>US Duct Inc. is an American private company engaged in the design and manufacture of industrial duct...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>INTEGRITEK.NET</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28881</link>
<guid>27b5429c1dcf4774c3ee26cd87e3f0df</guid>
<pubDate>Wed, 21 Jan 2026 13:32:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>INTEGRITEK.NET</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8569ba6c2044fab41d4e0070837e1c4f41f5ce2998094f79c2626f1127b209e4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>automax.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28888</link>
<guid>6cd4d4f7768fc86ca5642be0f600b518</guid>
<pubDate>Wed, 21 Jan 2026 13:26:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>automax.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4fbfa78bc8710dc06826a717060b543c4d37c13262c8b85ed2dca716121a3c0c</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] AutoMax.com is a leading used car dealership group in the US. Known for its wide range of high-quality pre-owned vehicles, AutoMax.com provides affordable options with comprehensive auto inspection and warranty. They offer financing options for all credit situations. The company is committed to delivering excellent customer service through its knowledgeable and friendly staff.</i><br />Target victim <b>website</b>: <i>automax.com</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.saundersandsaunders.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28894</link>
<guid>1ed021a05ef5089233379be996f7bbdd</guid>
<pubDate>Wed, 21 Jan 2026 13:16:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>www.saundersandsaunders.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a527828de7bc935df51897c8045ca35ccd1d7db60a61075b223a7d4de2430932</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>www.saundersandsaunders.com</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>WRP-Asia-Pacific-Sdn-Bhd</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28852</link>
<guid>e1b036022a6aaa7d187caae163216533</guid>
<pubDate>Tue, 20 Jan 2026 19:08:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>WRP-Asia-Pacific-Sdn-Bhd</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b61365a8620402fefe942f64ababf308797bc710f4f8c2d14782d1ad3ef61c68</i><br /><br />Threat actor <b>description</b>: <i>www.wrpworld.com https://www.zoominfo.com/c/wrp-asia-pacific-sdn-bhd/346914589 WRP is one of the world's leading manufacturing and distributing groups producing premium quality gloves for the medical, dental, food and critical environment market. Headquartered in Malaysia, WRP's manufacturing facilities are located in Malaysia and Indonesia. We implement a quality assurance program which is consistent with US FDA's latest Quality System Regulation (QSR) guidelines, and our manufacturing and quality systems are certified to EN ISO 9001 standard. Our products are in full compliance with ASTM standards as well as the European Medical Device Directive 93/42/EEC and, where such is the case, with the national standard transposing harmonized standards EN455 Parts 1, 2 & 3. In order to serve our customers better, we have established a marketing office located in Uniontown, Ohio.</i><br />Target victim <b>website</b>: <i>www.wrpworld.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Release-Marine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28843</link>
<guid>4e17f2a258effb8ae350f8a8062d9a4c</guid>
<pubDate>Tue, 20 Jan 2026 15:58:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Release-Marine</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9958cff5c0af92d71fa0031a917e61bd5a64806307922567eb3b8b0c2ae5a77</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.releasemarine.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Raymundos-Food-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28842</link>
<guid>abd146bcead71b89b0d035473288f07a</guid>
<pubDate>Tue, 20 Jan 2026 15:57:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Raymundos-Food-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>770e2b14e93a0e38f0493b107c6ca460ce3436a33c9dc40d7a2b9d8a5f4f4d3f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.raymundos.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Riverwood-Golf-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28841</link>
<guid>92b5e9dae4200367fc5d494d3af0690e</guid>
<pubDate>Tue, 20 Jan 2026 15:56:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Riverwood-Golf-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48c26d3deb5e94e2e763fc7f6bcd1aba52575d26aec5ab99b75a0a4bdfff49c0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.riverwoodgc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eastern-Ice</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28840</link>
<guid>fe5e746f078fb13928d9558651397be2</guid>
<pubDate>Tue, 20 Jan 2026 15:56:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Eastern-Ice</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>16f24571befba140e54e079439d38d287d25217f773daf2f8ae3c13a089831c9</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.easternice.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ciena</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28839</link>
<guid>b946c734affd9d4de72dd92957bfc9f8</guid>
<pubDate>Tue, 20 Jan 2026 15:23:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Ciena</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6bedfa4e98fee2afbfd920af1bec96e9daf95df65a321469a617c2b0909815e</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Ciena Corporation is a US-based global supplier of telecommunications networking equipment, software, and services. The company's solutions support the delivery of voice, video, and data traffic for many of the world's largest telecom service providers. Its product portfolio includes solutions for optical transport, broadband access, data center connectivity, and software automation. It was founded in 1992 and headquartered in Hanover, Maryland.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>ETC-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28834</link>
<guid>46116d4f0bc6e57e0d8d0ea4274c38f0</guid>
<pubDate>Tue, 20 Jan 2026 14:39:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackshrantac</b> claims attack for <b>ETC-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4b711bac9157aa459a53630ff6bb546889b261b02a47d63226fe85b944edaff6</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "ETC Companies" is an American consulting company that specializes in providing solutions for employee benefits, HR technology, payroll, and risk management. The company aims to deliver customized programs, strategic planning, and relevant insights to help businesses in different fields efficiently manage their staff and employee services. It offers services like compliance reporting, compensation analysis, among others.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackshrantac</category>
</item>
<item xmlns:dc='ns:1'>
<title>TriApex-US-Laboratories</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28823</link>
<guid>263903fbcdfed99b3332d4f0ee123e66</guid>
<pubDate>Tue, 20 Jan 2026 01:23:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>TriApex-US-Laboratories</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f2d473a15398a69527f376961aa3fdd135548802ae0a2fdc268b84c7e2d099d</i><br /><br />Threat actor <b>description</b>: <i>TriApex US Laboratories</i><br />Target victim <b>website</b>: <i>tri-apex.com/info/news/headlines/596.html</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Talleyville-Fire</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28818</link>
<guid>efa41f347fb5bfa798ab738ead1d2045</guid>
<pubDate>Tue, 20 Jan 2026 00:28:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Talleyville-Fire</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c9c73a95dd9a42cefce72d42a9d635be9b2c404d0a78f003c1b15161fe655cd0</i><br /><br />Threat actor <b>description</b>: <i>Talleyville Fire Company is dedicated to providing essential fire, ambulance, and rescue services to approximately 50,000 residents in New Castle County, Delaware. They rely on community support and donations to maintain their equipment and operations to effectively safeguard lives and property. The organization also promotes fire safety through educational programs and actively seeks volunteers to assist in their mission. Notable community events, such as fundraisers and public service activities, further highlight their commitment to the local community.</i><br />Target victim <b>website</b>: <i>www.talleyvillefire.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pivotal-Healthcare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28819</link>
<guid>6452782166334798a0364267bcc94422</guid>
<pubDate>Tue, 20 Jan 2026 00:27:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Pivotal-Healthcare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1421c0668055ed3ef5d939371d6ef0acb93b838a16095cc609492d1eb0283ea2</i><br /><br />Threat actor <b>description</b>: <i>Pivotal Healthcare is a company that operates in the Hospitals & Physicians Clinics industry. It employs 10to19 people and has 500Kto1M of revenue. The company is headquartered in the United States.</i><br />Target victim <b>website</b>: <i>www.pivotalhealthcare.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>abcseamless.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28815</link>
<guid>a89b9b817d1c710e6ef5000032e1c514</guid>
<pubDate>Mon, 19 Jan 2026 19:36:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>abcseamless.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>afbc7882cdf4e197bd1c3d745d415acd47b1c23f8cde69ff14124479ce4d1830</i><br /><br />Threat actor <b>description</b>: <i>ABC Seamless is a U.S.-based home improvement and exterior construction company that specialises in custom on-site manufactured seamless steel siding, …</i><br />Target victim <b>website</b>: <i>abcseamless.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Reeves-Information-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28809</link>
<guid>a60e1e1f6684d5cb9efcb8a6131f8b74</guid>
<pubDate>Mon, 19 Jan 2026 17:54:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Reeves-Information-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c3cc257033ea8669c61cc09963855bf87c77d763148bffcfe9a31093938ae7c</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>ASRock-Rack</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28808</link>
<guid>2a5f614fbd6b69fd6695ae213d63eef0</guid>
<pubDate>Mon, 19 Jan 2026 17:54:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>ASRock-Rack</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>537be278889a63fe393205a53ecffe7f273ecd9d2592c7b19d5e7610a5fd76ea</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] ASRock Rack is a professional server and workstation manufacturer, dealing primarily with cutting-edge technology for data centers and cloud services. Established in 2013, this industry leader provides equipment specifically tailored for HPC, data center, enterprise IT, education, and small-medium businesses. Product range includes server motherboards, server and workstation systems, network appliances, and storage devices.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Durashiloh</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28804</link>
<guid>942e78606ae2c894bc420163d6d27aa3</guid>
<pubDate>Mon, 19 Jan 2026 16:43:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>Durashiloh</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e9ba1f95d12025d1d3dbf4cfda6ffef338865c223f255dd52f90b1ca51e6631d</i><br /><br />Threat actor <b>description</b>: <i>The company specializes in the development, engineering, and manufacturing of various components and systems for the automotive industry and other sectors.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bray-Whaler</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28798</link>
<guid>f5bdd987e82cfcad049b164a59d1fe2f</guid>
<pubDate>Mon, 19 Jan 2026 00:34:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Bray-Whaler</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>55fe6fa95736ac9ce631bc4fb6ce69fcde4d7b007344d72a2ef20640b62a1ec6</i><br /><br />Threat actor <b>description</b>: <i>Bray Whaler Inc operates as a comprehensive construction management firm specializing in complex hospitality and commercial development projects. The company brings together expertise in project oversight, budget management, and quality control to deliver results across diverse property types and scales. Their work spans the full spectrum of hospitality construction, from boutique establishments to large-scale entertainment venues, as well as residential and mixed-use developments that require sophisticated coordination and execution. The firm's approach centers on understanding the unique demands of each project type. Hotel construction demands particular attention to guest experience elements, operational workflows, and timeline precision. Restaurant and club projects require specialized knowledge of kitchen systems, dining layouts, and compliance with health and safety regulations. Casino and entertainment venues present additional complexity through their specialized infrastructure</i><br />Target victim <b>website</b>: <i>www.braywhaler.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Channel-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28799</link>
<guid>96874a5ae20067403f7daa6b787019c4</guid>
<pubDate>Mon, 19 Jan 2026 00:34:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Channel-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>85b43ccf48242f6260dbf947e73540ea029d82a5edda4bfb2839dce63857973b</i><br /><br />Threat actor <b>description</b>: <i>Channel Products specializes in inventing and manufacturing component systems and technologies aimed at enhancing safety, reliability, and efficiency for manufacturers. With over 40 years of experience, the company offers advanced ignition technology, custom engineering solutions, and expert support to a diverse range of manufacturing clients. The organization places a strong emphasis on integrity, reliability, and customer service, making it a trusted partner for those seeking a competitive edge in the market. Channel Products is recognized for its commitment to quality and innovation in the engineering and manufacturing sectors.</i><br />Target victim <b>website</b>: <i>www.channelproducts.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Avalon-Hills</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28800</link>
<guid>cc83ee3e84c79e7fbf27cb415c68bbcf</guid>
<pubDate>Mon, 19 Jan 2026 00:33:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Avalon-Hills</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f615431622a5d7af9ae5bf1abf9b5fa19e252d8c73413ac3235505acae0794ca</i><br /><br />Threat actor <b>description</b>: <i>The Avalon Hills business staff work behind the scenes to help manage all aspects of the program. They route calls, assist with travel plans for clients and families, track all things financial, keep all of the technical machines purring and whatever else it takes to keep a busy program in business! The financial office and utilization review team partners with families to help them access and maximize their insurance benefits. This requires the dedication of families to expand the financial resources available to them for treatment. We help those struggling with an eating disorder recover through a combination of the best, tried-and-true traditional psychotherapies and applied neuroscience, including the latest discoveries about human brain plasticity. Prior to arriving at Avalon Hills, our 21 year-old daughter struggled with a life-threatening eating disorder for over 4 years.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>National-Waste-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28801</link>
<guid>fd675b153ecc803a1bac6aad641085c5</guid>
<pubDate>Mon, 19 Jan 2026 00:33:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>National-Waste-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa51ddc109c941743aec7ae6a54b54738ddd9d347ca1206fc6c9c48780a32a5e</i><br /><br />Threat actor <b>description</b>: <i>National Waste Associates (NWA) is a family-owned waste management consultant that specializes in providing tailored commercial and industrial recycling solutions. They serve various industries including construction, healthcare, retail, and hospitality, by optimizing waste management plans and significantly reducing costs for organizations with multiple locations across the U.S. and Canada. With a focus on sustainability, NWA has been recognized for diverting over 90% of waste from landfills and provides ongoing gap analyses and customized reporting for their clients. Their extensive database of hauler relationships allows them to pair clients with the best vendors for their specific waste management needs.</i><br />Target victim <b>website</b>: <i>www.nationalwasteassociates.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Thunder-Mountain-Harley-Davidson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28795</link>
<guid>e02721e864b2649003bcf15ba4da931a</guid>
<pubDate>Sun, 18 Jan 2026 23:54:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Thunder-Mountain-Harley-Davidson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3c5742ebd7f0fe2c0b8fcd8c428d889fc16a42c8ddb627447e57491fccc83cb</i><br /><br />Threat actor <b>description</b>: <i>A Harley-Davidson dealership</i><br />Target victim <b>website</b>: <i>thundermountainharley.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mid-park-Ink</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28796</link>
<guid>e082709f3e06a243b4722c670f8edcdf</guid>
<pubDate>Sun, 18 Jan 2026 23:53:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Mid-park-Ink</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>851ed9056b2f5df16edbaa25a467cb754b42c6deee6cb17412a3acfaba120b59</i><br /><br />Threat actor <b>description</b>: <i>A construction holding from Kentucky.</i><br />Target victim <b>website</b>: <i>mid-park.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>QFloors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28797</link>
<guid>f93f4793c2783325b8b6e96c21f3ce5e</guid>
<pubDate>Sun, 18 Jan 2026 23:52:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>QFloors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa079187a7ce82cc622fb27a3f33c8d6e190460b389cbe12cd4c5adce7350a31</i><br /><br />Threat actor <b>description</b>: <i>A flooring software provider.</i><br />Target victim <b>website</b>: <i>qfloors.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bikkal--Associates-sblawyers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28788</link>
<guid>33a7dc86f60ef6b8228c9df8a7e68d30</guid>
<pubDate>Sun, 18 Jan 2026 21:07:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Bikkal--Associates-sblawyers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a03a988974807484c63fd070d372b0d6f58129952cfa01b7473ea536730b9209</i><br /><br />Threat actor <b>description</b>: <i>Bikkal & Associates, P.C. is a full-service immigration law firm based in New York, specializing in immigration and nationality law for individuals, families, and employers. With over 40 years of experience, the firm provides comprehensive assistance with various immigration matters, including employment-based immigration, naturalization, and family-based immigration. They are dedicated to protecting the rights of immigrants and offer personalized legal guidance to navigate complex immigration processes. The firm serves clients in New York, the tri-state area, and nationwide.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Title-Guaranty</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28790</link>
<guid>8381d2a3fb8e75c7e5f659371d2cc656</guid>
<pubDate>Sun, 18 Jan 2026 21:06:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Title-Guaranty</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f69690d0742c854fb011781e75283f32ce08df2dce8916435f92f943453c8129</i><br /><br />Threat actor <b>description</b>: <i>Title Guaranty Company of Lewis County is a locally owned title escrow provider located in Chehalis, Washington, servicing clients across the entire state. They offer comprehensive title and real estate settlement services tailored for realtors, consumers, lenders, builders, and commercial clients. The company emphasizes integrity and local knowledge, ensuring personal attention and outstanding service for each transaction. Their mission is to simplify the closing process, making significant transactions easier for their clients.</i><br />Target victim <b>website</b>: <i>www.titleguaranty.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>University-Volkswagen-Mazda</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28786</link>
<guid>a1dd9267e737ca837e80cb0f1bb7118d</guid>
<pubDate>Sun, 18 Jan 2026 19:45:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>University-Volkswagen-Mazda</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a147369b1a023b097f02b7055c5c7b83ed06bce2c9c641234daaeaa76102337</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dreher-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28782</link>
<guid>77b6d3de326a27f5240f743e228e6d60</guid>
<pubDate>Sun, 18 Jan 2026 18:44:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Dreher-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>35b166d5d82ab3fbf942e0cb45663c3167a71344921e126668911671600696cb</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>MKC-Customs-Brokers-International-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28785</link>
<guid>091b26e964b0e771fbcc107aad43186e</guid>
<pubDate>Sun, 18 Jan 2026 13:24:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>MKC-Customs-Brokers-International-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e7adb46eca6a12bcf0c582c9cfaa98ab1e093b792979b93d3e656548769c574</i><br /><br />Threat actor <b>description</b>: <i>International trading has never been as complicated and demanding as it is today. Every shipment, large or small, requires a customs broker who is an absolutely dependable working partner. That's MKC Customs Brokers!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Orthopaedic-Specialists-of-Massachusetts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28775</link>
<guid>b387056cb9e8740f37727d8ca2d0db1c</guid>
<pubDate>Sat, 17 Jan 2026 18:44:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Orthopaedic-Specialists-of-Massachusetts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b7f710e47a8af6b04575b75081b289c4f3f96787532fadc58a825359210c9f9b</i><br /><br />Threat actor <b>description</b>: <i>0</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cary-Pediatric-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28774</link>
<guid>77eecef58086c6f635d85f283792aed4</guid>
<pubDate>Sat, 17 Jan 2026 15:43:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Cary-Pediatric-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d0a46a12932de8f2316cada041396c28bf5f63bcba47fd8e58aaa871d3e0ebb</i><br /><br />Threat actor <b>description</b>: <i>0</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ilumno</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28768</link>
<guid>45204519c15e0b1ce35f9d4b63749226</guid>
<pubDate>Sat, 17 Jan 2026 08:42:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Ilumno</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1610a885ffe5db4abfdc76eaeb2f185c2378241d8cecfd09551eb07a056fb78c</i><br /><br />Threat actor <b>description</b>: <i>Software</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ecsc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28763</link>
<guid>52e56b822322cbc9dc33606cfc3edd1c</guid>
<pubDate>Fri, 16 Jan 2026 17:35:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>ecsc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>174f078ea5095a586691342c2636e62bc6fa8c8a56b41e5fce9a7edc8e0fc5d8</i><br /><br />Threat actor <b>description</b>: <i>Website www.ecsc.org Revenue $11.2 million Industry Electricity, oil and gas Energy, utilities and waste Organizational structure Similar companies Company analytics About South Carolina Electric Cooperatives  Electric Cooperatives of South Carolina, Inc. is a statewide service and trade association representing electric cooperatives throughout the state. It serves 18 consumer-owned electric cooperatives, one wholesale electric cooperative, one transmission cooperative, and one materials cooperative. The association's mission is focused on providing electricity to nearly 2 million South Carolinians through an extensive network of power lines, as well as providing energy efficiency programs and clean energy initiatives. The association advocates for the electrification of rural  areas and provides various resources, including educational programs and assistance in purchasing electric vehicles.</i><br />Target victim <b>website</b>: <i>ecsc.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>La-Macchia-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28761</link>
<guid>d8769c1fdeb8834c6a4808a11fb2716a</guid>
<pubDate>Fri, 16 Jan 2026 15:44:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>La-Macchia-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b4b45edc9d85e74c271009e5caa64bb5d228b37141736ed10599ff6ab6bd32d</i><br /><br />Threat actor <b>description</b>: <i>La Macchia Group is a comprehensive consulting and design-build firm based in Milwaukee, Wisconsin.We will upload 12gb of corporate data soon. Employee passports, driver licenses and other files, HR files, drawings and specifications, projects, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Commenco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28756</link>
<guid>048517851c55e77cf9daf170c6fdd7ab</guid>
<pubDate>Fri, 16 Jan 2026 14:44:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Commenco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30ccf45942d48f678ec3c45bd8387b200b93f55992ef88d6fc9ca4a17d344f3a</i><br /><br />Threat actor <b>description</b>: <i>Commenco specializes in Wireless network infrastructure, Private LTE, wireless devices, equipment installations, system deployments, tower maintenance, and technology support services for commercial, industrial, and government operations.We will upload corporate data soon. Client data, payment details,a bit of personal files, financials, NDAs, numerous contracts and agreements, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>DigiCOURSE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28758</link>
<guid>c841b23266e204fc9271733469516275</guid>
<pubDate>Fri, 16 Jan 2026 13:43:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>DigiCOURSE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>02873e78eb12c22e0124c6ea4db3782db3fc4091853cb2647e2fb34f8361488f</i><br /><br />Threat actor <b>description</b>: <i>DigiCOURSE is a worldwide industry leader specializing in commandand control positioning systems for offshore marine oil and gas exploration. The company offers a range of services including engineering, customized manufacturing, and non-magnetic calibration among others.We will upload corporate data soon. Employee personal information(passport, IDs and so on), client information, detailed financials, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Industrial-Rivet--Fastener-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28759</link>
<guid>355e1a7b56e95137d9649e56cdf4025b</guid>
<pubDate>Fri, 16 Jan 2026 13:43:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Industrial-Rivet--Fastener-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f61294eb6e150cd8adc2c6b828e538050dc2671657e609711f2c0630053a0fa4</i><br /><br />Threat actor <b>description</b>: <i>Industrial Rivet & Fastener Company specializes in a vast range of high-quality rivets and riveting tools, serving distributors and end users in various industries, including automotive.We will upload 36gb of corporate data soon. Employee personal information (SSNs, passports, IDs and so on), HR files, client information, detailed financials, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>JR-Advertising-Specialties</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28752</link>
<guid>57b9c682ed39822cdebb3c80d823794b</guid>
<pubDate>Fri, 16 Jan 2026 09:42:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>JR-Advertising-Specialties</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc9b3345b44b68784c248a9f4b8d710a6503f7c8824842a4b47ab79622d0a7f9</i><br /><br />Threat actor <b>description</b>: <i>JR Advertising Specialties Inc specializes in promotional products and business gifts, offering a vast selection to meet various needs. Their product range incl...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Upper-Township</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28755</link>
<guid>86c26c7eb678214b9749fe1c5364cff2</guid>
<pubDate>Fri, 16 Jan 2026 08:26:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Upper-Township</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96f64169a7b8e15de6379792f9aac0aae0aa0a01d1b090f01b4f9629dcb11555</i><br /><br />Threat actor <b>description</b>: <i>A New Jersey local municipal level organization</i><br />Target victim <b>website</b>: <i>uppertownship.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>cirrusaviation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28751</link>
<guid>7b061988b655fa9f9d4ffc41d1d68160</guid>
<pubDate>Fri, 16 Jan 2026 03:48:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>cirrusaviation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ed8481ee72727ab501ad9226b202c43a6796212af06d17ff09c5fea9ef8cc9b</i><br /><br />Threat actor <b>description</b>: <i>Cirrus Aviation Services is the largest luxury private jet charter service in Las Vegas. Laek: 100GB  WE HAS COLLECTED SUCH DATA AS:  - Confidential documents  - Clients Data  - NDA  - Financial data  - Operations  - Corporate data  - Business Agreements  - Development  - Financial databases, all transactions, all clients And a lot of other VERY IMPORTANT information!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Krez--Flores</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28741</link>
<guid>671ee9fb86338a4643eb6d3f2d00496c</guid>
<pubDate>Thu, 15 Jan 2026 19:42:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Krez--Flores</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc55e997a70cb1be13731a102593491ea2e03cd963be5ce63bcedc5789aabab0</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Texas-State-Utilities</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28742</link>
<guid>9828cb4d004ea22ddad5fb03c84a2379</guid>
<pubDate>Thu, 15 Jan 2026 19:42:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Texas-State-Utilities</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>751fc1cb6c8dbab6423b3bc8e5201c8d92b76fde53e7dc76665535d462dcacd7</i><br /><br />Threat actor <b>description</b>: <i>Electricity, Oil & Gas</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Moen</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28744</link>
<guid>7b75a9a9404959d96c63d1f61ec75550</guid>
<pubDate>Thu, 15 Jan 2026 19:42:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Moen</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c934cdb98c52c98aa4fc19fe1c17ed2d1d7a21bc7fac0053a7a2535a364fc73</i><br /><br />Threat actor <b>description</b>: <i>Building Materials</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gorlick-Kravitz--Listhaus-CogneSense-Netberry-Solutions-Hein-Electric-Supply-Jet-Wast</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28738</link>
<guid>f9c1e83924ec2b3b79247ac16c7c966b</guid>
<pubDate>Thu, 15 Jan 2026 16:42:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Gorlick-Kravitz--Listhaus-CogneSense-Netberry-Solutions-Hein-Electric-Supply-Jet-Wast</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60e29f23e357c35d57916e75b15511d8bf0963d0d42592dbf6ef0134eae37cff</i><br /><br />Threat actor <b>description</b>: <i>We obtained about 22gb of data of the following companies:Gorlick Kravitz & Listhaus PC operates as a specialized labor andERISA law firm serving multiemployer unions, their benefit funds, and union-affiliated organizations. Cognesense provides advanced measurement, monitoring, and controlsolutions for industries with strict regulations. Netberry Solutions offers services of two areas: INTERNET AND NEWTECHNOLOGIES.Hein Electric Supply Company is an independent electrical distributor based in West Allis, Wisconsin, specializing in a wide rangeof electrical products and services. Jet Wastewater Treatment Solutions offers a comprehensive range of chemical supplies to enhance the efficiency of its systems.You will find personal employee personal data, client information, numerous project files, accounting and financials and other internal operational files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Paylogix</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28739</link>
<guid>ecc1d44b677d62d29e0f646131316ca6</guid>
<pubDate>Thu, 15 Jan 2026 15:42:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Paylogix</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ecf4de2917f8c60097d05d8133124c6eb23ac1cee4642b8423a0fa8c7e3af21</i><br /><br />Threat actor <b>description</b>: <i>Paylogix is an insuretech pioneer offering premium technology solutions that streamline the administration of voluntary benefits. Their robust suite of services includes enrollment, premium billing, alternative funding, and a software-as-a-service platform tailored for groups of all sizes.We will upload 185gb of corporate data soon. Employee personal information (complete information about 130 employees including SSNs, passports, DLs and so on), client information, detailed financials, internal confidential files, NDAs and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gorlick-Kravitz--Listhaus-CogneSense-Netberry-Solutions-Hein-Electric-Supply-Jet-Wast...</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28740</link>
<guid>59a57dd9c157d6b95b56dfaebb6a45e3</guid>
<pubDate>Thu, 15 Jan 2026 15:39:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Gorlick-Kravitz--Listhaus-CogneSense-Netberry-Solutions-Hein-Electric-Supply-Jet-Wast...</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>791f2f0916e0ff2e288390c0a18ac69299a1aaa48a883cd83ad0120c9a1ba0f4</i><br /><br />Threat actor <b>description</b>: <i>We obtained about 22gb of data of the following companies:

Gorlick Kravitz & Listhaus PC operates as a specialized labor and
ERISA law firm serving multiemployer unions, their benefit funds
, and union-affiliated organizations. 

Cognesense provides advanced measurement, monitoring, and control
solutions for industries with strict regulations. 

Netberry Solutions offers services of two areas: INTERNET AND NEW
TECHNOLOGIES.

Hein Electric Supply Company is an independent electrical distrib
utor based in West Allis, Wisconsin, specializing in a wide range
of electrical products and services. 

Jet Wastewater Treatment Solutions offers a comprehensive range o
f chemical supplies to enhance the efficiency of its systems.

You will find personal employee personal data, client information
, numerous project files, accounting and financials and other int
ernal operational files.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>McAloon--Friedman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28737</link>
<guid>b34cff5ba1f72525e525dd444eceaa99</guid>
<pubDate>Thu, 15 Jan 2026 14:42:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>McAloon--Friedman</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fb1209a9bc0b404728484c4047225d5b7cf99b0de5e0400b80fa08a1f73d1d7c</i><br /><br />Threat actor <b>description</b>: <i>McAloon & Friedman, headquartered in New York City, New York, is a full-service law firm. They provide legal representation in a variety of healthcare practice areas, including medical malpractice, general liability, personal injury, and product liability.We will upload 627gb of corporate data soon. Enormous number of legal files (hearings, investigation reports, police reports), client files (SSNs, passports, DLs, death\birth certs and so on), employee files, financials and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpstrustarholdingsllc.com-httpsvistlabs.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28736</link>
<guid>7446e64c368d215c1786214f5118b5bc</guid>
<pubDate>Thu, 15 Jan 2026 05:24:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>httpstrustarholdingsllc.com-httpsvistlabs.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f546ef0954c8fa091b1b092a5165ae513ef8dce825d4e076ae83bfc8a7fee9a</i><br /><br />Threat actor <b>description</b>: <i>All company data, development drawings, confidential files, investor company files, all financial transactions, equipment, violations, 1.4 TB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nordstrom-Rack</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28735</link>
<guid>f9dd94e7acd400658ac4fd2817ea4fef</guid>
<pubDate>Thu, 15 Jan 2026 02:49:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>tengu</b> claims attack for <b>Nordstrom-Rack</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea14e20235a1203f00862fce38757da2a6e341193940f773a47bdb67ecaefb7d</i><br /><br />Threat actor <b>description</b>: <i>Nordstrom Rack is a company that operates in the Apparel & Accessories Retail industry. It employs 1to4 people and has 500Kto1M of revenue. The company is headquartered in San Jose, California</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>tengu</category>
</item>
<item xmlns:dc='ns:1'>
<title>Samson-Equipment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28732</link>
<guid>4b84a4fbb709d5887d092b74ee5d6724</guid>
<pubDate>Wed, 14 Jan 2026 23:29:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>tengu</b> claims attack for <b>Samson-Equipment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>15ddb337766c3a1065b7e04fcae2a22d756eb064784b937925b03b08dadf6745</i><br /><br />Threat actor <b>description</b>: <i>Samson Equipment specializes in designing and manufacturing custom weight rooms tailored for schools, colleges, and tactical training professionals. Their product lineup includes a range of durable strength training equipment like power racks, barbells, and accessories, all made to withstand high usage. The company offers personalized services including 3D render consultations to envision the final layout of weight rooms before purchase. With a commitment to exceptional quality, customer service, and a lifetime warranty, Samson Equipment aims to empower athletes and training facilities alike.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>tengu</category>
</item>
<item xmlns:dc='ns:1'>
<title>JJ-White</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28717</link>
<guid>21e04c4536ac1ee11ab991e1dea13c47</guid>
<pubDate>Wed, 14 Jan 2026 21:40:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>JJ-White</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>95e91c6a10bb768bffbcb825f08365def6183bcafbaf3df469e4e51625a4b869</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] JJ White is a multi-divisional construction company based in Philadelphia, Pennsylvania. It specializes in general, mechanical and industrial construction with additional services in HVAC maintenance and service, fire protection, and rigging projects. The company operates across the United States working with industries such as healthcare, pharmaceutical, petrochemical, and manufacturing.</i><br />Target victim <b>website</b>: <i>jjwhiteinc.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Visionwheel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28719</link>
<guid>19f560c0fc2e02c530e64152bb9ec137</guid>
<pubDate>Wed, 14 Jan 2026 21:39:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Visionwheel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e3037ca604286d7dcb71d3951338c201081d196e4f2fac132e424f4889c872c6</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Visionwheel is a prominent manufacturing company that produces high-quality, aesthetically-designed alloy wheels for various vehicles such as cars, light trucks, and SUVs. The company offers a wide range of styles, finishes, and sizes, catering to diverse customer requirements. Visionwheel ensures a rigorous testing process to maintain robust safety standards. It also continually innovates in design to stay abreast in the competitive auto industry.</i><br />Target victim <b>website</b>: <i>visionwheel.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ernest-Maier</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28702</link>
<guid>a188366540b081052eb44432bc73c6a3</guid>
<pubDate>Wed, 14 Jan 2026 18:43:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Ernest-Maier</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b2c41775ab7694c35ca62a7c152a2926d51f06787d795e15e03778532a7accb4</i><br /><br />Threat actor <b>description</b>: <i>Building Materials</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Designers-Mirror-and-Glass</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28703</link>
<guid>45a042358c47c0059ee86d8508dfcbec</guid>
<pubDate>Wed, 14 Jan 2026 18:43:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Designers-Mirror-and-Glass</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f01ed80b5749c0cdd43a6490c2d9db5286d464e68ebdb6a15cd9aaaa2428ff8a</i><br /><br />Threat actor <b>description</b>: <i>Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pathology-Associates-Of-Saint-Thomas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28704</link>
<guid>89bdedf8c38bda669ba5aba697d7703b</guid>
<pubDate>Wed, 14 Jan 2026 18:43:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Pathology-Associates-Of-Saint-Thomas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c787ec96536cee2c5e8b2cfe6bf747c4503da5589d554a5c1256454f53e39d1</i><br /><br />Threat actor <b>description</b>: <i>0</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lunsford-Capital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28705</link>
<guid>82bdd6d74c304d5130239833c88d2f18</guid>
<pubDate>Wed, 14 Jan 2026 18:43:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Lunsford-Capital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca39abf115ccda52abefd469ea2c4d9e6b2be42125a1c684338a02ad531ac0a3</i><br /><br />Threat actor <b>description</b>: <i>Finance</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pre-Con-Builders</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28706</link>
<guid>382c43c484ddee6d1c699d2fd5980d32</guid>
<pubDate>Wed, 14 Jan 2026 17:43:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Pre-Con-Builders</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f5b726fac4bf6df6bd88bc7e72f1f96dd9e21efd469f658d44e8b2f9043253c3</i><br /><br />Threat actor <b>description</b>: <i>Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Radiant-Remodeling</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28707</link>
<guid>a401bed218424c069af5121745e2c46f</guid>
<pubDate>Wed, 14 Jan 2026 17:43:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Radiant-Remodeling</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77689828fa5a26216b286c9e4ced7bc41d64d4f69825e51a93feabd8a1f89d1d</i><br /><br />Threat actor <b>description</b>: <i>Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-National-Auto-Loan-Network</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28712</link>
<guid>023974618d255e24c14b5b47c5282260</guid>
<pubDate>Wed, 14 Jan 2026 17:13:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>The-National-Auto-Loan-Network</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b780af24871f44c1ae39fe0133f7315b0a2a4611f25358cf98ad753728cd47f</i><br /><br />Threat actor <b>description</b>: <i>National Auto Loan Network specializes in auto loan refinancing, having successfully refinanced over 2 billion dollars in auto loans for more than 100,000 customers since its inception in 2010. The company is founded by finance professionals with over 40 years of experience and aims to simplify the refinancing process for clients. They pride themselves on excellent customer service and educating clients about their loans. NALN serves individuals looking to save money on their monthly car payments through effective loan refinancing solutions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rebars--Mesh</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28698</link>
<guid>6e958d69ccac1ad04342b584042c3db5</guid>
<pubDate>Wed, 14 Jan 2026 16:43:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Rebars--Mesh</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f912c7d6c37f72ded3402588b3e3e366d247c50e526921e9497c7511792a86eb</i><br /><br />Threat actor <b>description</b>: <i>Rebars & mesh is an independent WBE-certified reinforcing steel fabricator serving New England and Eastern New York. The company specializes in rebar fabrication, pre-assembly services, and offers a wide range of complementary products such as welded wire meshand bar supports. We will upload 15gb of corporate data soon. Employee personal information (DLs, addresses, emails and so on), client information, financials, agreements, drawings and specifications etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>ImageWorks-Display</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28699</link>
<guid>0d7c463832b871c20405a6c9296b5517</guid>
<pubDate>Wed, 14 Jan 2026 16:43:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>ImageWorks-Display</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1d799e3ed47f69418cc7dd67fa2c6e1ae49a909b926b6318619f18bc2b81474</i><br /><br />Threat actor <b>description</b>: <i>ImageWorks Display & Marketing is a full-service Point-of-Purchase display company. The company specializes in the development andproduction of custom displays, signage, and in-store tobacco displays.We will upload 15gb of corporate data soon. Employee personal information (w9 forms and so on), client information, numerous financials files, agreements and contracts, NDAs and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>TruGolf</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28700</link>
<guid>851e8eaf4988ed55c3d335ea8d5ed61b</guid>
<pubDate>Wed, 14 Jan 2026 15:42:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>TruGolf</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a4297fd3dfa87f51ae25f93a3ee13054a941be2f3c5b3bc2c3833838c078364</i><br /><br />Threat actor <b>description</b>: <i>TruGolf develops and manufactures golf simulation hardware and software for both business and consumer markets. The company specializes in creating immersive virtual golf experiences that accurately replicate course designs and gameplay nuances.We will upload 37gb of corporate data soon. Employee personal information (SSNs, DLs, addresses, emails and so on), client information, financials, contracts and agreements, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fechner-Pump--Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28695</link>
<guid>7c2174131255d8e906a502237185a436</guid>
<pubDate>Wed, 14 Jan 2026 14:43:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Fechner-Pump--Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>490786a533378f276b74eeda7fd4c34bba411dd21e65aea0def0ff5e6c5fdb73</i><br /><br />Threat actor <b>description</b>: <i>Fechner Pump Supply has been serving the oil and gas industry in Oklahoma and southern Kansas for over 33 years, offering a wide range of products and services tailored to both independent producers and large corporations.We will upload 157gb of corporate data soon. Employee personal information (SSN, addresses, phones, emails, scans of personal documents and so on), projects, client information, financials, contracts and agreements, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>H2-Builders</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28696</link>
<guid>ac3d7f8fd40bd1debfff97fc0667e95a</guid>
<pubDate>Wed, 14 Jan 2026 14:43:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>H2-Builders</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>82b6e425e50fcf4ccecafd7897aaaff33f712c1444577ecf26d6f63bf3f96609</i><br /><br />Threat actor <b>description</b>: <i>H2 Builders is a custom home builder located in Bluffton, SC, specializing in luxury home construction in the Lowcountry. With over 25 years of experience, the company has successfully completed more than 500 custom homes, ensuring high-quality craftsmanship and customer satisfaction.We will upload more than 20gb of corporate data soon. Client information, financials, contracts and agreements, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpsacswinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28708</link>
<guid>94397fe878869449f866b64722a0b7c9</guid>
<pubDate>Wed, 14 Jan 2026 13:42:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>httpsacswinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c397711018087ca51ab4e798954c7cbf43fadba9ed13f199b7c1341624c2bfd</i><br /><br />Threat actor <b>description</b>: <i>1.5tb </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hyatt-Place-New-York--Chelsea-Hotel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28697</link>
<guid>46a62c34c7b8b0c0d02f0833df49ec20</guid>
<pubDate>Wed, 14 Jan 2026 11:11:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Hyatt-Place-New-York--Chelsea-Hotel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb987b09cca4efb9bb30505403aaea2092f6befec0cbff5d171d699d0c17495f</i><br /><br />Threat actor <b>description</b>: <i>Hyatt Place New York / Chelsea Hotel</i><br />Target victim <b>website</b>: <i>hyatt.com/hyatt-place/en-US/lgazc-hyatt-place-new-york-chelsea</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpsbellowsmfg.comcompany</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28689</link>
<guid>2a8efa289025a74ce50cae9e92e0edb2</guid>
<pubDate>Tue, 13 Jan 2026 22:46:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>httpsbellowsmfg.comcompany</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f3d39ab65f5c84cc72b26710c031bfc80fba427a918d35b1f8d7f8df728abf6d</i><br /><br />Threat actor <b>description</b>: <i>1.3tb  </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bulk-Handling-Systems-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28679</link>
<guid>f87ce61286012c89c54a93e61a88e761</guid>
<pubDate>Tue, 13 Jan 2026 16:43:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Bulk-Handling-Systems-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>607894c7d89fc3510645bcff809eaff31a154d55e26b0838c26bdbf5d5902ced</i><br /><br />Threat actor <b>description</b>: <i>BHS serves a diverse clientele, including waste management companies, recyclers, and municipalities, helping them navigate changing material streams and energy recovery challenges.NRT is a leader in plastic bottle and flake sorting technology, boasting the largest installed capacity in PET plastic reclamationplants worldwide.We will upload 24gb of corporate data soon. Detailed employee personal information (addresses, phones, emails, scans of personal documents and so on), projects, client information, lots of internal confidential files, financials, credit cards, NDAs and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Itasca-Consulting-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28680</link>
<guid>80154d0cf42299d38de5046efc2429a3</guid>
<pubDate>Tue, 13 Jan 2026 15:42:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Itasca-Consulting-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1941af9510f9c3995dda9523484d4dfec0961c24212a244ee92bc0a0e5f4683</i><br /><br />Threat actor <b>description</b>: <i>Itasca is a global engineering consulting and software firm, working primarily with the geomechanics, hydrogeological and microseismics communities.We will upload 20gb of corporate data soon. Detailed employee personal information (addresses, phones, emails, scans of personal documents and so on), projects, client information, internal confidential files, financials, credit cards, NDAs and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rodneys-Sign-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28676</link>
<guid>39acb542878b92997468cd17aa72399e</guid>
<pubDate>Tue, 13 Jan 2026 03:51:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Rodneys-Sign-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>550f56eb8ca24c2e0eee02fe706282065621bc47676bc7591a222da02d3e5342</i><br /><br />Threat actor <b>description</b>: <i>ASI Raleigh offers a full-service team to support the planning, engineering and implementation of precise execution and superior quality signage projects for North Carolina’s leading brands. Laek: 100GB  WE HAS COLLECTED SUCH DATA AS:  - Confidential documents  - Clients Data  - NDA  - Financial data  - Operations  - Corporate data  - Business Agreements  - Development </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fit-Line-Global</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28672</link>
<guid>6964e9d5cd1aab8c7c72b12b77f2fd20</guid>
<pubDate>Tue, 13 Jan 2026 00:52:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Fit-Line-Global</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>17931b96b4f97e983dcb847c85d3a22a44eb5c19526291adc9f89542288a53fa</i><br /><br />Threat actor <b>description</b>: <i>Fit-Line Global® is a trusted supplier, designer, research and development resource for SEMI-F57-0301 compliant PFA and PVDF components. They employ efficient manufacturing processes to create products that meet the most demanding applications. Fit-Line Global has been a trusted supplier to the semiconductor industry for more than 25 years. Headquartered in California, Fit-Line Global dedicates itself to providing quality products, with the fastest lead time in the industry, at a fair price. The company exclusively produces ultra-high purity PFA and PVDF components to eliminate the possibility of cross-contamination.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cape-Fear-Country-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28673</link>
<guid>5b32eb1adf7d661dfc01777ed24cc7ad</guid>
<pubDate>Tue, 13 Jan 2026 00:52:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Cape-Fear-Country-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc6aeb752a67061dceacbfd08cbb21e3f5621d2a5647fa124075ebe276015e57</i><br /><br />Threat actor <b>description</b>: <i>Cape Fear Country Club is a private members-only country club in North Carolina, founded in 1896. It offers an 18-hole golf course designed by Donald Ross, along with tennis, swimming, fitness amenities, dining services, and a wide range of social and family-oriented activities. The club is known for its long-standing traditions, high service standards, and close-knit community environment.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pilot-automotive</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28670</link>
<guid>e74843b99da8b29775c6aa9080436844</guid>
<pubDate>Tue, 13 Jan 2026 00:20:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Pilot-automotive</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ef225539b6a23ff1346db14da760440de063ebcf318262273554ba86e2c1d780</i><br /><br />Threat actor <b>description</b>: <i>Pilot specializes in a wide range of automotive accessories, including truck, interior, and exterior accessories as well as lighting and replacement parts. They offer products such as step bars, grille covers, and various car care items aimed at enhancing vehicle functionality and aesthetics. Targeting both personal vehicle owners and automotive enthusiasts, their products cater to any driver looking to customize and improve their car or truck. With a commitment to quality, Pilot features well-known brands like Bully Truck Accessories and Voodoo Ride.</i><br />Target victim <b>website</b>: <i>www.pilotautomotive.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>MyVete</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28671</link>
<guid>ececf8310d5c47ae7dbdf1cda6163c72</guid>
<pubDate>Mon, 12 Jan 2026 22:53:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kazu</b> claims attack for <b>MyVete</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce71a7053a22b253655b4c99c8dc57b214714009d91389de750d84093cea3b06</i><br /><br />Threat actor <b>description</b>: <i>MyVete is a veterinary software designed to help animal clinics and veterinary practices manage their operations more efficiently. The platform includes features for managing patient records, appointments, billing, and inventory, all in one system. MyVete allows veterinarians to track medical histories, schedule appointments, and send reminders for vaccinations or follow-up care. The software also includes tools for managing invoicing and payments, allowing clinics to accept payments through multiple methods, including credit cards and insurance claims. With its easy-to-use interface, MyVete streamlines administrative tasks, reducing time spent on paperwork and improving patient care. By providing real-time access to patient data and operational insights, MyVete helps veterinary practices improve efficiency and deliver better care to animals.</i><br />Target victim <b>website</b>: <i>myvete.com</i>]]></description>
<category>kazu</category>
</item>
<item xmlns:dc='ns:1'>
<title>Harrison-Design</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28669</link>
<guid>2210bc8c8682f678d552ff7add41b418</guid>
<pubDate>Mon, 12 Jan 2026 20:43:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Harrison-Design</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3af20ca5e6e4a73545f94e7dba6507ff19ae7327d1334fbfb7ba285acb850d62</i><br /><br />Threat actor <b>description</b>: <i>Harrison Design is an award-winning design firm specializing in architecture, interior design, and landscape architecture. Their services cater to various sectors including residential, multifamily, sacred, and hospitality projects. Laek: 100GB  WE HAS COLLECTED SUCH DATA AS:  - Confidential documents  - Clients Data  - NDA  - Financial data  - Operations  - Corporate data  - Business Agreements  - Development  - Drawings  And a lot of other VERY IMPORTANT information!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Resource-Corporation-of-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28656</link>
<guid>d5eeeb68551631bceacdeeb4e2a9d3c1</guid>
<pubDate>Mon, 12 Jan 2026 20:43:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Resource-Corporation-of-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b596f3837a4f249b5ece53bc329e599828ff242a75414cc0f581714a6bd2745</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Young-Wealth-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28657</link>
<guid>e4b6786bef5f306479ebdcc6fec136b3</guid>
<pubDate>Mon, 12 Jan 2026 20:43:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Young-Wealth-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ab3c62d0d0f7a7b46713a82a2dd496a0f519e5619fe258d2e620df0dd89bd5d</i><br /><br />Threat actor <b>description</b>: <i>Finance</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>klhindustries.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28665</link>
<guid>f2c41f31655fe4735c50168fce9b688f</guid>
<pubDate>Mon, 12 Jan 2026 19:48:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>klhindustries.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f770863730fee4d5e68963aee925246fbfe7925821ac9d3540cdee2aef89f155</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>klhindustries.com</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>G-WAY-Microwave</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28658</link>
<guid>1084a91264d0a5d47eeb3659f9c36935</guid>
<pubDate>Mon, 12 Jan 2026 19:42:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>G-WAY-Microwave</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c161e1a006d9e6a0bea7fb23eb0224eefcbe21c10157451ac16997a87ffed8a</i><br /><br />Threat actor <b>description</b>: <i>Manufacturing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Superior-Water-Conditioning</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28659</link>
<guid>149f6a58b66493adaa38bc178da51e75</guid>
<pubDate>Mon, 12 Jan 2026 19:42:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Superior-Water-Conditioning</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>065916da6a9eed068f1c4a139095574dd15e859c012c6b5b3afba679fee3b463</i><br /><br />Threat actor <b>description</b>: <i>Consumer Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>sealbeachca.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28661</link>
<guid>c79bb048121bbc1d20d79c6b83ef17b5</guid>
<pubDate>Mon, 12 Jan 2026 18:57:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>sealbeachca.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b1638449105ad8bcf35bb9c690f6b7937331f05e6cbd422682d2c10cdecd1bf</i><br /><br />Threat actor <b>description</b>: <i>Datatheft 300gb of data stollen includes gov documents, deeds and much more</i><br />Target victim <b>website</b>: <i>sealbeachca.gov</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>sealbeachpd.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28662</link>
<guid>fdccddea8522e14b9d8a41551d9256fa</guid>
<pubDate>Mon, 12 Jan 2026 18:56:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>sealbeachpd.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c6e79f6495b493edc7fb2b6f5f9ddab18e59d4363b980bc04ed9d7a9198da9d</i><br /><br />Threat actor <b>description</b>: <i>data theft, evidence, officers personal information police reports, DEA open cases information</i><br />Target victim <b>website</b>: <i>sealbeachpd.com</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>Best-Insurance-Agency</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28650</link>
<guid>52d3882d85ec8a840371c62855241ceb</guid>
<pubDate>Mon, 12 Jan 2026 18:41:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Best-Insurance-Agency</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06aa9efeea725ff6562ffedb842399f4419b12ae65ebd0ac5c6f3b3418135200</i><br /><br />Threat actor <b>description</b>: <i>Insurance</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hayden-Safe--Lock</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28651</link>
<guid>14253cc3324fa4766ffbe5f12a7dba10</guid>
<pubDate>Mon, 12 Jan 2026 18:41:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Hayden-Safe--Lock</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dac0b76817adda52ee2bf92ec25f4d37107e207b82020cd59bf2aa7b2508dda0</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Outdoor-Recreation-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28646</link>
<guid>789334de6daa80d83ab4acb6a4bf5ac7</guid>
<pubDate>Mon, 12 Jan 2026 16:42:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-Outdoor-Recreation-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>72c6acc8cfd09738e914a8120ac7a6958b50cb21d84174e49cbdeeca04958444</i><br /><br />Threat actor <b>description</b>: <i>The Outdoor Recreation Group (TORG) is a solutions-driven company, relentless in our drive to meet the needs and exceed the expectations of each and every customer within multiple product categories and industries. We primarily focus on the Camping, Hunting and Fishing markets, with specific specialty in the sewn goods and accessory categories.We will upload corporate data soon. Lots of internal data, partners information, a bit of financial docs, projects, contracts and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rod-Danielson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28655</link>
<guid>974e2945a18e0bfb8e3aa8becac3e65c</guid>
<pubDate>Mon, 12 Jan 2026 15:51:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Rod-Danielson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dabb5cfda15a3be743b669d240a75752346d1956487f2406c0319aa6b6e80ede</i><br /><br />Threat actor <b>description</b>: <i>Rod Danielson serves as a Chapter 13 Trustee in the Central District of California, Riverside Division. The organization provides public services related to Chapter 13 bankruptcy for debtors, creditors, attorneys, and other interested parties. It offers information on various procedures including appearances at hearings and guidance on case management. The intended clients encompass individuals and entities involved in Chapter 13 bankruptcy proceedings in Riverside.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Syrstone</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28648</link>
<guid>b5f73d2f8c5e4aa26041effe5fbdf930</guid>
<pubDate>Mon, 12 Jan 2026 15:42:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Syrstone</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e9fc4d82f21abc5b629943cb13a36214c284a704bf50834d1693d46e641600e8</i><br /><br />Threat actor <b>description</b>: <i>Syrstone, originally known as the Syracuse Stone Company, is a specialized subcontracting firm with over 50 years of experience inthe site and highway construction industry. The company providestop quality and cost-effective subcontract work including granite curbing, grooving grinding, unit paving, and rumble strips.We will upload 58gb of corporate data soon. Detailed employee personal information (SSN, passports, drivers licenses, credit cards, addresses, phones, emails and so on), financials, client information, NDAs, internal confidential docs and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>CSS-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28649</link>
<guid>ae490cce121bcb4989be859bcbda433a</guid>
<pubDate>Mon, 12 Jan 2026 15:42:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>CSS-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df35da9c10ba7f846fd5a73946ba9ab0f831aaea523d7a67ac089252131a655b</i><br /><br />Threat actor <b>description</b>: <i>CsS Services provides end to end eviction management through our service infused technology platform to portfolios throughout the United States.We will upload 45gb of corporate data soon. Employee personal information, customer information, financials, and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Epport-Richman--Robbins-Kalamazoo-Valley-Community-College-BJ-Transportation-FR-Law-G</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28644</link>
<guid>1130d3f4bee922658eb1347e27ff55f3</guid>
<pubDate>Mon, 12 Jan 2026 14:44:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Epport-Richman--Robbins-Kalamazoo-Valley-Community-College-BJ-Transportation-FR-Law-G</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e5fe25b0163aabedbff5022260e41b16895973e08018255df1d6f641cb6444b0</i><br /><br />Threat actor <b>description</b>: <i>We obtained about 10gb of data of the following companies:Epport, Richman & Robbins, LLP is a Los Angeles-based law firm that specializes in complex commercial and banking litigation across California, as well as sophisticated real estate transactions nationwide.TKH Group, PC is an accounting firm based in Otsego, MI, offeringa wide range of services including tax preparation, financial planning, and business consulting.B&J Transportation specializes in airport transfers, business transfers, and event transportation, ensuring clients remain on schedule and together throughout their journey.FR Law Group PLLC is a law firm based in Phoenix, AZ, that specializes in providing legal services from a business perspective.Red River Glazing is a commercial and residential glass company with offices in Fargo and Bismarck, North Dakota.You will find personal employee personal data, client information, numerous project files, accounting and financials and other internal operational files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Epport-Richman--Robbins-Kalamazoo-Valley-Community-College-BJ-Transportation-FR-Law-G...</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28653</link>
<guid>638c1a4f003b46aad4aa5cf3f424d215</guid>
<pubDate>Mon, 12 Jan 2026 13:44:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Epport-Richman--Robbins-Kalamazoo-Valley-Community-College-BJ-Transportation-FR-Law-G...</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de0b6292e43341a28ffd02c7092845e0113fc62ca2db9f9080661e76ab5e15d8</i><br /><br />Threat actor <b>description</b>: <i>We obtained about 10gb of data of the following companies:

Epport, Richman & Robbins, LLP is a Los Angeles-based law firm th
at specializes in complex commercial and banking litigation acros
s California, as well as sophisticated real estate transactions n
ationwide.

TKH Group, PC is an accounting firm based in Otsego, MI, offering
a wide range of services including tax preparation, financial pl
anning, and business consulting.

B&J Transportation specializes in airport transfers, business tra
nsfers, and event transportation, ensuring clients remain on sche
dule and together throughout their journey.

FR Law Group PLLC is a law firm based in Phoenix, AZ, that specia
lizes in providing legal services from a business perspective.

Red River Glazing is a commercial and residential glass company w
ith offices in Fargo and Bismarck, North Dakota.

You will find personal employee personal data, client information
, numerous project files, accounting and financials and other int
ernal operational files.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>FOX-Architects</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28641</link>
<guid>1e5afae270de728fd14f20133233d33a</guid>
<pubDate>Sun, 11 Jan 2026 20:59:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>FOX-Architects</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d47a69d6fc8ad6038914a9d03d6db2ef2529b36f14946ffc4c67df844eb3fd32</i><br /><br />Threat actor <b>description</b>: <i>FOX Architects LLC is an architecture and interior design firm that specializes in transforming workplace environments through strategic design and comprehensive planning. The firm brings together expertise in spatial strategy, building systems, and user-centered design to create functional, innovative work spaces that enhance organizational performance and employee experience. The company's service offerings span the full spectrum of workplace transformation, from detailed zoning research and regulatory compliance analysis to large-scale master planning initiatives. FOX Architects conducts thorough site planning and analysis to evaluate property potential, then executes building renovations that modernize infrastructure while preserving architectural integrity. This integrated approach allows the firm to address both immediate renovation needs and long-term strategic facility goals within a cohesive framework.</i><br />Target victim <b>website</b>: <i>www.fox-architects.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cardiovascular-Medical-Group-of-Southern-California-CVMG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28640</link>
<guid>a12848aeac58ac57e95977f93fec17fd</guid>
<pubDate>Sun, 11 Jan 2026 19:52:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Cardiovascular-Medical-Group-of-Southern-California-CVMG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d8d41434bcfb05e71b0b5e10ea3657bf06c4a013cfcf73b90c474f8d69b4fd67</i><br /><br />Threat actor <b>description</b>: <i>Cardiovascular Medical Group of Southern California provides a comprehensive range of cardiovascular services, including diagnostic testing, disease management, and advanced treatments for patients of all ages. Their board-certified physicians specialize in cardiology and internal medicine, ensuring expert care and a focus on preventing heart disease. The clinic leverages the latest medical technologies to support patient health and offers accessible virtual services such as electronic appointment requests and test results. Their commitment to personalized care is evident in their strong physician-patient relationships and partnerships with renowned medical institutions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ingomar-Church</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28637</link>
<guid>be4b74cc626578c5fbed9a26c481d8cb</guid>
<pubDate>Sun, 11 Jan 2026 19:51:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Ingomar-Church</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>910e7ff5fc969c1221053bedafbe562da7bc082877124356e6d8890926536ee9</i><br /><br />Threat actor <b>description</b>: <i>Ingomar Church offers a variety of worship services and community activities aimed at enhancing spiritual growth. Their programs include traditional and contemporary worship, youth and children's ministries, small group connections, and outreach services. The church invites individuals and families to engage with faith-based teachings and serve the community. Located in Pittsburgh, PA, they provide a nurturing environment for spiritual and personal development.</i><br />Target victim <b>website</b>: <i>www.ingomarchurch.org</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>ITG-Electronics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28638</link>
<guid>41eed75111d927aa8cce63e2757c100d</guid>
<pubDate>Sun, 11 Jan 2026 19:51:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>ITG-Electronics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3c05b79676aa0d5109dd6685a3660ef2fbb3c9de288ebfb8cd18847be07bde4</i><br /><br />Threat actor <b>description</b>: <i>ITG Electronics, Inc. specializes in a vast range of electronic components including power inductors, EMI filters, common mode chokes, and transformers, catering to high-performance applications in various industries. Their products are designed for automotive, industrial, consumer, and medical sectors, offering both standard and custom solutions. With a strong commitment to energy efficiency and compliance with industry standards, ITG provides tailored solutions for power supplies and electronic systems. Their expert sales team is accessible for inquiries and customized product requirements, ensuring specific needs are met efficiently.</i><br />Target victim <b>website</b>: <i>www.itgelectronics.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Granville-Inn</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28639</link>
<guid>54d2d10822ea47f64edaa52fa184dfb0</guid>
<pubDate>Sun, 11 Jan 2026 19:51:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Granville-Inn</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>31e2637247501327fb808f5d83d7eb6505a4f49cbbc506338e27c544ed4d41f4</i><br /><br />Threat actor <b>description</b>: <i>Granville Inn offers elegant accommodations with luxury amenities, a fine dining experience, and versatile meeting spaces. This historic inn, located just outside Columbus, Ohio, features 39 guest rooms and suites that combine old-world charm with modern conveniences. It is highly regarded as a wedding venue, providing picturesque settings and luxurious services for couples. Additionally, Granville Inn caters to business clients with full-service meeting facilities equipped with the latest audio-visual technology.</i><br />Target victim <b>website</b>: <i>www.granvilleinn.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pecan-Tree-Dental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28634</link>
<guid>5c6839e11219ac4b4021d194b43665f7</guid>
<pubDate>Sun, 11 Jan 2026 18:55:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Pecan-Tree-Dental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9d9e5163479d75237e7e69101932759733be9099fda8763a06fd9ee1c4602fc</i><br /><br />Threat actor <b>description</b>: <i>Pecan Tree Dental is a dental practice located in Grand Prairie, TX, dedicated to providing comfortable and personalized dental care for families. They offer a comprehensive range of services including preventive, cosmetic, restorative, and emergency dentistry. The practice is accessible to residents of Grand Prairie and its surrounding communities, accommodating various patient needs with amenities and flexible scheduling. Their mission emphasizes community care, involvement in charitable work, and an insurance-friendly approach to dental health.</i><br />Target victim <b>website</b>: <i>www.pecantreedental.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Youngstown-Pipe--Steel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28635</link>
<guid>5afa3c562f5bf2eff62de390e531c25d</guid>
<pubDate>Sun, 11 Jan 2026 18:55:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Youngstown-Pipe--Steel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e701df2d9645ab99d0defc66345906846db2a797b16448d68bbc1a7cf9fa90fb</i><br /><br />Threat actor <b>description</b>: <i>Youngstown Pipe & Steel, LLC (YPS), located in Campbell, OH, is a steel service center specializing in the value-added processing and distribution of carbon and alloy steel products in an expanding array of shapes and sizes. Our company is comprised of experienced, community-minded associates. We are committed to achieving profitable growth and creating superior value for our customers by safely providing high quality products and services while delivering them on time. YPS was founded in 1979 and acquired by DNV Management Corporation in 2004. Since its acquisition, DNV has expanded product lines, installed a high definition plasma burning table, oxy-fuel burning tables, multiple saws and other equipment for value added processing. We deliver our products utilizing a dedicated fleet of trucks and in 2011, relocated to a 300,000 sq. ft. warehouse. In 2012 DNV Management created DNV Energy to concentrate on the growing product and service demands of the shale oil and gas industry.</i><br />Target victim <b>website</b>: <i>www.youngstownpipeandsteel.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vernon-Sales</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28636</link>
<guid>251fbd782fec91a50eb1b6050f8d7f2b</guid>
<pubDate>Sun, 11 Jan 2026 18:55:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Vernon-Sales</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad347004b673eda46c8d24fc64f6e0909d32924198a149e6e18fbf1095b41d11</i><br /><br />Threat actor <b>description</b>: <i>Vernon Sales is a leading dollar store supplier in the United States. Here you can find everything you need for your dollar store, discount store, 99 cent store, convenience store.</i><br />Target victim <b>website</b>: <i>www.vernonsales.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hog-Slat</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28627</link>
<guid>b67d084d74c3f7c0145f96a0ac4c82a8</guid>
<pubDate>Sun, 11 Jan 2026 17:59:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Hog-Slat</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8df389b77d4f7e7ac4b61fae999056cb2ef211ad3c537f60bd6f359d3e326852</i><br /><br />Threat actor <b>description</b>: <i>https://www.zoominfo.com/c/hog-slat-inc/48483868 https://www.zoominfo.com/c/hog-slat-inc/406568064 Hog Slat, Inc. is the largest contractor and producer of equipment for hog farmers in the United States, employing approximately 1,000 direct employees and an additional 1,400 subcontractors for construction projects. The company specializes in building turnkey facilities for both family farms and large agricultural units across the U.S. and internationally. Hog Slat also sells equipment packages to clients who prefer to construct their own facilities. Their services cater to a wide range of agricultural clients focused on livestock production. Hog Slat was founded in 1969. This company provides the manufacturing and installation of fans for confinement type hog units. Their headquarters are located in Newton Grove, North Carolina.</i><br />Target victim <b>website</b>: <i>www.zoominfo.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pensam-Residential</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28625</link>
<guid>37563f059c2d815bf5fc637cb88e1df3</guid>
<pubDate>Sun, 11 Jan 2026 13:48:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Pensam-Residential</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>788a99c449ec57e92ec1e065d916145ddfc5bf1841b1e28900519de94226d4ff</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.pensamcapital.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advanced-Family-Surgery-Center-Covenant-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28619</link>
<guid>81e2631c91b78268005021e704312097</guid>
<pubDate>Sun, 11 Jan 2026 12:23:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Advanced-Family-Surgery-Center-Covenant-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6d173f7f026e32ee84035e96e7b5517bb79d872da935542a7b543dac238cd4f8</i><br /><br />Threat actor <b>description</b>: <i>A provider of surgical services</i><br />Target victim <b>website</b>: <i>covenanthealth.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cisneros-group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28622</link>
<guid>ac83d3f400e95a5d31e7c59d2743bf73</guid>
<pubDate>Sun, 11 Jan 2026 11:54:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>Cisneros-group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f09e03907fe19db7fad5f2336a03a2cc80fc4cdb42bd56b74aad62af40e13376</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1929, Cisneros is a global media and entertainment enterprise headquartered in Miami, Florida. The company specializes in broadcasting, digital advertising, and real estate development with operations across North and South America, including Mexico. Cisneros offers mobile applications and technology solutions while maintaining a diverse portfolio of media properties and entertainment content. The company combines traditional broadcasting with digital innovation to deliver content and services to both business and consumer markets worldwide - corp you have 7 days to contact and get in touch, sample provided.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>Launie--Marino</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28614</link>
<guid>4f6cb5f6a3723a126aa3cae19027a2f8</guid>
<pubDate>Sat, 10 Jan 2026 20:56:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Launie--Marino</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81e0ae7bc187105e5a232378c418ae84d80956266d0a78ecc5fd47e3350566f9</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.launiemarino.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dennys-5th-Avenue-Bakery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28613</link>
<guid>3a95790514f43839f9aef7a3e9d00d5c</guid>
<pubDate>Sat, 10 Jan 2026 20:55:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Dennys-5th-Avenue-Bakery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9eb4b995c335c9d2e2e6cafe668745c52ef2895455e9368db47f0036133f224</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.dennysbakery.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>WiZiX-Technology-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28612</link>
<guid>6760b957686819cb6636c2319fb4f872</guid>
<pubDate>Sat, 10 Jan 2026 20:54:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>WiZiX-Technology-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aec048f49ea4cf4c51701975cb5d38a96618f9819fcb9cd4b3f1c05deb3bcdba</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.wizixtech.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Foshee-Architecture</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28608</link>
<guid>430b55d1924ca394c90192228f7995df</guid>
<pubDate>Sat, 10 Jan 2026 12:18:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Foshee-Architecture</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57f10227ebe6f07838575c05eb23f3c24e78f85dc5f8cea017a856e23c25f187</i><br /><br />Threat actor <b>description</b>: <i>Foshee Architecture is a Montgomery, Alabama-based architecture firm specializing in comprehensive design services for a variety of sectors including multi-family housing, healthcare facilities, office spaces, retail, and restaurants. Founded by John H. Foshee, the firm utilizes a personalized design process informed by a rich family history in the construction industry. By collaborating with experts in engineering and other disciplines, they provide tailored architectural solutions that prioritize client objectives and budgets. Their extensive experience positions them to effectively manage complex projects while ensuring high standards of functionality and aesthetic appeal.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>publicsafety.ohio.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28607</link>
<guid>bb24c3e3687e57b7db6ec47711b21770</guid>
<pubDate>Sat, 10 Jan 2026 04:04:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>publicsafety.ohio.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2dad58c1420c52365189b8c59f359721193ba900382361549f58eec56ec1c8dc</i><br /><br />Threat actor <b>description</b>: <i>Price ??? Disclosures 0/1</i><br />Target victim <b>website</b>: <i>example.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>CompactInd</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28606</link>
<guid>a54ff7dbb86659426466904cf2b77aa1</guid>
<pubDate>Sat, 10 Jan 2026 03:59:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>CompactInd</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7eaf780c277acde0302235c59623f6b66c3b28006a1b71909540512875ccc550</i><br /><br />Threat actor <b>description</b>: <i>Compact Industries, Inc. is a leading contract manufacturer specializing in dry food products, particularly powdered food items and sugar-based drink mixes. Established in 1963, the company offers custom blending and contract packaging services, catering to a diverse range of clients.  Laek: 100GB  WE HAS COLLECTED SUCH DATA AS:  - Confidential documents  - Clients Data  - NDA  - Financial data  - Operations  - Corporate data  - Business Agreements  - Development   And a lot of other VERY IMPORTANT information</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Vanguard</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28605</link>
<guid>9346d72c6cc9656611d6bb3bb61a0804</guid>
<pubDate>Fri, 09 Jan 2026 23:59:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>osiris</b> claims attack for <b>American-Vanguard</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7273fafebdbb78c0f872c9c2c20d0311d60d172a937a85ed76ed2c673e0ec6ed</i><br /><br />Threat actor <b>description</b>: <i>American Vanguard Corporation is a U.S.-based company specializing in agricultural chemicals, primarily focused on crop protection products like herbicides, insecticides, fungicides, and fumigants. Founded in 1969 and headquartered in Newport Beach, California, the company markets products under its AMVAC brand and other specialized labels, serving global agricultural markets. Through a combination of research and development, strategic acquisitions, and a focus on sustainable practices, American Vanguard aims to enhance crop yields while minimizing environmental impact. It invests in greener alternatives to traditional chemicals and emphasizes innovation in pest control solutions. As a publicly traded company (NYSE: AVD), its financial performance is closely tied to agricultural trends and regulatory changes within the industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>osiris</category>
</item>
<item xmlns:dc='ns:1'>
<title>Swavelle-Group-Wearbest-Sil-Tex-Mills</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28599</link>
<guid>164ecd36bc9fc1781df239d00b004d3b</guid>
<pubDate>Fri, 09 Jan 2026 16:43:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Swavelle-Group-Wearbest-Sil-Tex-Mills</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3258114adb7baf1942c8229b539bc08d84eabb30d58f5e06f0255587d5f88158</i><br /><br />Threat actor <b>description</b>: <i>Swavelle Group Fabric Solutions is a diverse textile supplier that offers a wide array of fabrics suitable for various decorating needs.Wearbest Siltex Mills is a family-run textile manufacturer located in Garfield, New Jersey. The firm serves residential clients and furniture manufacturers.We will upload 165gb of corporate data soon. Detailed personal information of every employee (SSN, passport numbers and scans, DL,birth certificates, addresses, phones, emails and so on), clientdocumentation, projects, NDA, so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>McCraw-Oil</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28601</link>
<guid>b0ada4f4c8f1d05eeb1ce32e241a7c55</guid>
<pubDate>Fri, 09 Jan 2026 15:43:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>McCraw-Oil</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>37a3e8b51a91aa325e206df21e4b2e787283c61fbb95747836d461930b70251b</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1948, McCraw Oil provides gas, diesel, propane, agricultural chemicals and other products to service stations and customers in Texas and Oklahoma. Bonham, Texas.We will upload 40gb of corporate data soon. We will upload employee documents, lots of projects, specifications and drawings, NDA,client information, contracts and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Carlson-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28602</link>
<guid>1b11b526a5870e9a37b9aec669d68131</guid>
<pubDate>Fri, 09 Jan 2026 15:17:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>The-Carlson-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1128210813b2e0ce4302abf92c73c16e16cdbecdb7012a2bb5e253b302a6d9b7</i><br /><br />Threat actor <b>description</b>: <i>Established in 1976, The Carlson Law Firm has built a reputation not only for our formidable presence in courtrooms but for our deep-rooted desire to serve the community. Our foundation rests on the shoulders of our Managing Partner, Craig Carlson. A proud veteran, Craig's values are the compass that has guided our firm's journey, helping us grow from a modest establishment in Killeen, Texas, to a renowned legal powerhouse with 17 locations in Texas, an office in California, and another in Florida.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>stignatiusijamsville.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28598</link>
<guid>48699cb3676ece50d68d3e1ebe2e03d7</guid>
<pubDate>Fri, 09 Jan 2026 12:22:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>stignatiusijamsville.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e4777d06500f149d6374ff17aacef3da9c893b518686db68657ac1b5bf378803</i><br /><br />Threat actor <b>description</b>: <i>St Ignatius of Loyola Catholic Community is a company that operates in the Religious Organizations industry. It employs 10to19 people and has under500K of revenue. The company is headquartered in Ijamsville, Maryland Employees: 20 Revenue: $5 Million Industry: Church Management Phone Number: (301) 695-8845 </i><br />Target victim <b>website</b>: <i>stignatiusijamsville.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>About-Women-Ob-Gyn</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28596</link>
<guid>df236b5b4ec12e88f2cb714b641b8cc4</guid>
<pubDate>Thu, 08 Jan 2026 21:37:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>About-Women-Ob-Gyn</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ccb642acf5512a72821ad833835b16c4a28819a86e2b5f4f0e0f38162684ab11</i><br /><br />Threat actor <b>description</b>: <i>Data Breach at Gynecology Clinic.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Spring-Grove-Area-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28585</link>
<guid>c223c9e3210c1fccaae202a1d1d9abaa</guid>
<pubDate>Thu, 08 Jan 2026 18:44:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Spring-Grove-Area-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c2dffd9e5d9fe1596b3887e059f5a21b235868e29216beea19a6278d070dc968</i><br /><br />Threat actor <b>description</b>: <i>Education</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Retrofit-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28586</link>
<guid>da56d057fe13171851e819d9be266cf5</guid>
<pubDate>Thu, 08 Jan 2026 18:44:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Retrofit-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>632960225783520fbdc02e91dae25f2fe504089c9ee61a420d438876f6c19f24</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>CPJ.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28593</link>
<guid>c57d4c50a6b5969e1244e60155863090</guid>
<pubDate>Thu, 08 Jan 2026 17:47:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CPJ.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe9b6608c49c163468b21a6a63da0a0ac4c9de3c289566093fd2008778b09135</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] CPJ.ORG, or the Committee to Protect Journalists, is a non-profit organization based in New York. Its mission is to promote press freedom worldwide and defend the rights of journalists to report the news without fear of reprisal. It does this by monitoring and documenting violations against press freedom and providing safety guides and other resources for journalists.</i><br />Target victim <b>website</b>: <i>CPJ.ORG</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BORING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28592</link>
<guid>d6df8e50c3cc76ab487e51448cc1c57f</guid>
<pubDate>Thu, 08 Jan 2026 17:46:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BORING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd7709ffe79cceea5c99957d923a4c6647fffb78539100d56e6018f08cb1d4d1</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>BORING.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TriVector-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28587</link>
<guid>ce651728d53387a4dc56052bc6d035dd</guid>
<pubDate>Thu, 08 Jan 2026 17:44:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>TriVector-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cba450f5d7e12546fc6e651ff2bd47f2883c078fdf62813d810506b9347c85c7</i><br /><br />Threat actor <b>description</b>: <i>Manufacturing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpslpollockpr.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28590</link>
<guid>f1543ed948fae345d291eea0a5968985</guid>
<pubDate>Thu, 08 Jan 2026 16:57:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>httpslpollockpr.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6a3dba49f4a2adc850561612a55b23ed05dfd45ec16a279fe20fc79fb7c6b55</i><br /><br />Threat actor <b>description</b>: <i>all data  corp / all client data  </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Morton-Buildings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28578</link>
<guid>040cea6d24ed05b83f0db871f6794b61</guid>
<pubDate>Thu, 08 Jan 2026 16:43:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Morton-Buildings</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dad8c8fac34cee0920bed85c0190b45583ce430bae92ad796443f29ac5c31941</i><br /><br />Threat actor <b>description</b>: <i>Morton Buildings, headquartered in Morton, Illinois, is a companythat specializes in the designs, builds, and constructs of post-frame buildings, including residential, farm and agriculture, equestrian, commercial, office, and community.We will upload more than 100gb of corporate data soon. Employee documents, projects, specifications and drawings, NDA, partner information, contacts and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fedcap</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28588</link>
<guid>9f3fedf17034316a32b96e87686c44d9</guid>
<pubDate>Thu, 08 Jan 2026 15:57:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Fedcap</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47f824b777d46dc73bbeab1ba8ed913e45ec2541d435d7c3c30b2bcc6169e5b0</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1935, Fedcap is a nonprofit organization that creates opportunities for people with barriers to economic well-being. Fedcap's headquarters is in New York City, New York.</i><br />Target victim <b>website</b>: <i>www.fedcap.org</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Anteriad</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28579</link>
<guid>0e495e80390ae6477a619c5067c8b16f</guid>
<pubDate>Thu, 08 Jan 2026 15:43:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Anteriad</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4667eac15fb70e56a36c79ac2601223097f8dc26ba06a6dc544fa26a5447bcb2</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>These-companies-havebeen-hacked.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28580</link>
<guid>b24e8379f02a337976cc22e17ade2786</guid>
<pubDate>Thu, 08 Jan 2026 15:43:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>These-companies-havebeen-hacked.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e4e972046a6376d9e7419a74267163613c46e0cd1409e387ed6ae4ea7d611453</i><br /><br />Threat actor <b>description</b>: <i>We didn't take their data but you can try on your own. If you want details, leave your contacts.Gateway FiberShout! FactoryFilmRiseHuebsch ServicesCrawford Software Consulting</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Udall-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28581</link>
<guid>62c27b26606d99ec99bc79d5de20f9d4</guid>
<pubDate>Thu, 08 Jan 2026 15:43:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Udall-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77e49a6bb6a593d7cef588e8769f1eceb73d809a0054f4428ec3274a9188ff4a</i><br /><br />Threat actor <b>description</b>: <i>Udall Law Firm is a reputable legal practice serving clients throughout Arizona since 1952, with offices located in Tucson and Phoenix. The firm offers a wide range of legal services, including business law, personal injury, estate planning, and real estate law, among others. It is dedicated to providing customized legal solutions and responsive communication to meet the needs of its clients.We will upload 78gb of corporate data soon. Large amount of clients' personal information (passport numbers, SSNs, drivers licenses, death/birth certs, financials and so on), NDA, police incidents, confidentiality agreements and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gordon-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28576</link>
<guid>729d1221683eaf66616b5a8b301522d1</guid>
<pubDate>Thu, 08 Jan 2026 14:44:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Gordon-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a42613b3905fbc47550af9867473469e9f7bb34f6c697c4949313c5414d391e1</i><br /><br />Threat actor <b>description</b>: <i>Gordon Companies Inc. is a family operated & owned business, Gordon Companies include Pool Central, Christmas Central, Daves and Northlight retail stores.We will upload corporate data soon. Employee personal information(passport numbers, SSNs and other scanned documents), client data, financials, NDA and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Applied-LNG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28577</link>
<guid>2def82558a0b5b01ac62b2bc46cfdb76</guid>
<pubDate>Thu, 08 Jan 2026 12:47:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacknevas</b> claims attack for <b>Applied-LNG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b246de70e5544265e1dc89f91e8a814c720e036158b9ae95e35d478c478ebca4</i><br /><br />Threat actor <b>description</b>: <i>file listing https://gofile.io/d/wsV8hlApplied LNG specializes in providing liquefied natural gas (LNG) solutions for various energy needs, including equipment financing, maintenance, and logistics. The company emphasizes the environmental benefits of natural gas, highlighting its clean-burning properties that contribute to reducing greenhouse gas emissions. Founded in 1995, Applied LNG has over 20 years of experience and expertise in the LNG sector, particularly in the motor fuel market and power generation.</i><br />Target victim <b>website</b>: <i>www.appliedlng.com</i>]]></description>
<category>blacknevas</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Structures-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28570</link>
<guid>3b5baa4288a1ba4f0ce32ab6f6350603</guid>
<pubDate>Thu, 08 Jan 2026 01:07:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>The-Structures-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cdff931ffd10443d31515a1bb4b4b7c3b41ab12c2898cebc15e77a137c32ffc2</i><br /><br />Threat actor <b>description</b>: <i>The Structures Group, Inc is a consulting engineering firm specializing in structural engineering, special inspections, and forensic analysis. They offer services including independent review plans and due diligence/risk analysis, catering to a diverse clientele that includes commercial, residential, and institutional projects. Their expertise spans various sectors such as healthcare, education, and justice facilities. The company is committed to delivering high-quality engineering solutions to enhance structural integrity and safety.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Evergreen-Printing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28565</link>
<guid>5f221f5f69bcd62696d967a8e84e450f</guid>
<pubDate>Wed, 07 Jan 2026 17:45:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Evergreen-Printing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a635eeacf407b23321b3eb17130838259af8e3128f070bf8569563bf61e21c7e</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Commercial-Paving</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28562</link>
<guid>cdd7da5c0696e931cef4d22f7b0cb58c</guid>
<pubDate>Wed, 07 Jan 2026 15:43:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Commercial-Paving</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d073fe092f0d6e1877f21889e9107dbed6c5363ea6ba97990dd17198e35656e5</i><br /><br />Threat actor <b>description</b>: <i>Civil Engineering Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wilson-Smith-CochranDickerson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28563</link>
<guid>bf96708cdf085ba206fc100ee802b4bb</guid>
<pubDate>Wed, 07 Jan 2026 15:43:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Wilson-Smith-CochranDickerson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>669363e99c5b75069b5dfef8cdf2e2de8998119dfe017d743b842a6a5957610e</i><br /><br />Threat actor <b>description</b>: <i>Wilson Smith Cochran Dickerson is a law firm specializing in trial and appellate litigation, providing advocacy and advice for clients dealing with business and casualty disputes.We will upload 120gb of corporate data soon. We will upload numerous files with personal information of clients, lots of court files, police reports, court hearings and other confidential legal files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>RJS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28564</link>
<guid>de6fa2e6abc1e244d7dc3534d3c81e2a</guid>
<pubDate>Wed, 07 Jan 2026 15:43:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>RJS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5235523aa46b9b6b0d34ce29e960ca534c97e6cf2a9b706e9643fa2725d9da40</i><br /><br />Threat actor <b>description</b>: <i>RJS Corporation is a global supplier of equipment for the tire manufacturing industry, specializing in products such as tension controllers, creel systems, and specialty tire equipment.We will upload corporate data soon. You will find detailed employee information (SSNs, passport numbers, DLs, addresses and so on), financials, agreements with Goddyear, Bridgestone, Nokia, Yokohama, Michelin, Pirelli and so on, NDAs and other files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Westlake-Christian-Academy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28569</link>
<guid>7bb09a9a59920da2c778f2ad47a9b1f0</guid>
<pubDate>Wed, 07 Jan 2026 14:22:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Westlake-Christian-Academy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c1878cb3480bb28b1114fbdc90ae8dfe8d110348e62180aea08709f4f0bf7e8</i><br /><br />Threat actor <b>description</b>: <i>Westlake Christian Academy is a private Christian school located in Grayslake. Due to security issues, its database, including its entire student list and staff information, was made publicly available. The staff at this institution exhibits extreme indifference and inappropriate behavior toward its students and staff.</i><br />Target victim <b>website</b>: <i>westlakechristianacademy.org</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>RGD-Consulting-Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28568</link>
<guid>5a0ff4520c5b59aae5315322f3927d39</guid>
<pubDate>Wed, 07 Jan 2026 14:21:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>RGD-Consulting-Engineers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0aec9aa2ed724a4bd4ee5b226a5158905a35e2f1cd40d6a66c3891c8fb23ee28</i><br /><br />Threat actor <b>description</b>: <i>RGD Consulting Engineers is a full-service engineering firm specializing in mechanical, electrical, plumbing, and structural design, based in Florida. RGD is focused on providing engineering solutions, exceptional customer service, and cost-effective systems. Serving a variety of markets throughout Florida, the United States, and the Caribbean, RGD collaborates closely with its clients.</i><br />Target victim <b>website</b>: <i>rgdengineers.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>strategic-ts.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28567</link>
<guid>b634a18d05447cdccf5f9012450904f2</guid>
<pubDate>Wed, 07 Jan 2026 14:00:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>tengu</b> claims attack for <b>strategic-ts.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bbd97d37b70e2484faa2ddd7ec872c140ad4b22b9203e8dd1fa9a484626edf36</i><br /><br />Threat actor <b>description</b>: <i>The website https://strategic-ts.com/ belongs to a small US-based IT and technology services company—and serves as the official website for a company called Strategic Technology, which operates in IT services and technical support. This information is based on company data available from professional databases.</i><br />Target victim <b>website</b>: <i>strategic-ts.com</i>]]></description>
<category>tengu</category>
</item>
<item xmlns:dc='ns:1'>
<title>Morgan-Records-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28555</link>
<guid>7a43fa89fbc04c64cd1f481b59db4b45</guid>
<pubDate>Tue, 06 Jan 2026 23:23:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Morgan-Records-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c67252c3f19469f1c701216f6e66e0f90172b8699f77e7bdac732b16840f68e8</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Morgan Records Management is a company specializing in secure document storage, data protection, and document destruction services. They offer solutions for digital transitions, including scanning services, and electronic content management systems. Their focus is on protecting client information, helping businesses save space, reduce risk, and manage data more efficiently. They operate both domestically and internationally.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Apex-Spine-and-Neurosurgery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28552</link>
<guid>d741ff8c24fe26717eb3101e2d8d30c1</guid>
<pubDate>Tue, 06 Jan 2026 21:11:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Apex-Spine-and-Neurosurgery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca6c74e8d88a2926101980e85a8d3f55e3d49c9176d8f0706bad285722742e19</i><br /><br />Threat actor <b>description</b>: <i>Apex Spine and Neurosurgery specializes in the comprehensive neurosurgical treatment of spinal and cranial disorders. The team consists of neurosurgeons who offer treatment options, including minimally invasive spine surgery, tailored to the needs of their patients. They serve patients from across Georgia, particularly Atlanta, and emphasize a patient-centered approach. Their services cover a wide range of conditions, including back pain, brain tumors, and trauma.</i><br />Target victim <b>website</b>: <i>apexspineandneuro.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>USArt</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28547</link>
<guid>6abdec2606bd68762a72dc1a4038d1ff</guid>
<pubDate>Tue, 06 Jan 2026 19:44:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>USArt</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b862d8d3b88d62f702bbc1e9435773a021ca0f70b898aaae87be3c65f70a65a7</i><br /><br />Threat actor <b>description</b>: <i>Hospitality</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Charles-Leonard-Steel-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28551</link>
<guid>254a0aea9ce1d3b9a864f786f4e1f827</guid>
<pubDate>Tue, 06 Jan 2026 19:00:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Charles-Leonard-Steel-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f5b875a5aba3352bdc84d105b818604bf56f53759bd8840ae444d37176bf6641</i><br /><br />Threat actor <b>description</b>: <i>Charles Leonard Steel Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Secorp-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28540</link>
<guid>29c5509d98ea56c71fcf591468c48f4f</guid>
<pubDate>Tue, 06 Jan 2026 14:46:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Secorp-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ffa287701f5c0588d311f4720011201757799ad16e5bf11f32c1a08706fe91e9</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Medical-Asset-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28541</link>
<guid>9670c7ffe205da4e538326c9691fa4f2</guid>
<pubDate>Tue, 06 Jan 2026 14:46:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Medical-Asset-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5bf25be313cacd795b28c624f68b8f6101dfcd2d86488fd308b0b9f9f91ddd3e</i><br /><br />Threat actor <b>description</b>: <i>0</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Health-Bridge-Chiropractic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28542</link>
<guid>09bd2862fe3035ad3223816b439045e3</guid>
<pubDate>Tue, 06 Jan 2026 14:46:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Health-Bridge-Chiropractic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>540c4e962faea1a95e9769a8dad6396d51a87cf31fdef322785861ab6c6c2e60</i><br /><br />Threat actor <b>description</b>: <i>0</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Due-Doyle-Fanning</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28544</link>
<guid>d4c46cea171bad8d235542b789c591f0</guid>
<pubDate>Tue, 06 Jan 2026 11:56:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Due-Doyle-Fanning</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc95c45f345e7ddebfcf51ff53ce8409afd9535b36c2b7d35dafab5a0e3d830d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.duedoyle.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mill-Brothers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28543</link>
<guid>11b53f23ad385f735495083c7327faf9</guid>
<pubDate>Tue, 06 Jan 2026 11:56:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Mill-Brothers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>375d5bdb0c9637e8f2fab3de1f9a9a99f23a6d213e4508092ea03cc2cb4b4204</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.millbrothers.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>CEIVA-Logic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28536</link>
<guid>4c86f3bbcab249f879058d1825887571</guid>
<pubDate>Mon, 05 Jan 2026 17:41:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>CEIVA-Logic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa1af02fc496099679b807fe93ccee2c04c35521bed04c9fa261c151ad5361a1</i><br /><br />Threat actor <b>description</b>: <i>CEIVA is the inventor of the world's first connected digital photo frame, offering a full line of digital frames that automatically receive and display new digital photos every day. Their products allow users to instantly share and showcase digital photos with ease. CEIVA targets customers looking f…</i><br />Target victim <b>website</b>: <i>www.ceiva.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.blackdogsalvage.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28521</link>
<guid>08a1fbda444d0ed569626fdb23520d02</guid>
<pubDate>Mon, 05 Jan 2026 16:48:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>www.blackdogsalvage.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a280978334e1d15b99ccd60eb5aa5cff726d42ba3768eef4d6a4efe35cc2022d</i><br /><br />Threat actor <b>description</b>: <i>Black Dog Salvage specializes in the reclamation, repurposing and resale of arch...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>crawfordorthodontics.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28522</link>
<guid>d70e32743f8e7a78de2f837c5b4d3833</guid>
<pubDate>Mon, 05 Jan 2026 16:48:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>crawfordorthodontics.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb78969bae98cb73353308eb2ef8588ec0d6956ac5f0cae5c50487766b52bdbb</i><br /><br />Threat actor <b>description</b>: <i>Crawford Orthodontics</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.stcharlesprep.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28523</link>
<guid>16cba01e083801067db052ea5cfd254c</guid>
<pubDate>Mon, 05 Jan 2026 16:48:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>www.stcharlesprep.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8bcff3bb0260e4b63601725f09bec810f94c53aa5883ae6945a01bb707a6a129</i><br /><br />Threat actor <b>description</b>: <i>St Charles Preparatory School is a company that operates in the Education indust...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.mscorp.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28525</link>
<guid>75a1f82bf4376a1bcfdc5a0bd08ac34f</guid>
<pubDate>Mon, 05 Jan 2026 16:48:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>www.mscorp.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>71d836c6c7716612fbb939e92d92ecf0ce54bca9c92ed9f18140ba435e30bbe2</i><br /><br />Threat actor <b>description</b>: <i>Marine Systems Corporation (MSCorp) specializes in marine engineering, design, p...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.burdettedental.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28526</link>
<guid>0d620a440d7259218ff725f59419a5a1</guid>
<pubDate>Mon, 05 Jan 2026 16:48:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>www.burdettedental.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3bb2a9cb776dfb0e7c1b2ae5ef12ff58387eb9630aef6fd1b7fe685bcdf593b1</i><br /><br />Threat actor <b>description</b>: <i>Burdette Dental Laboratory, located in Birmingham, Alabama, has over 50 years of...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Posillico</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28531</link>
<guid>34e127b2acf56a344457e1537dce906d</guid>
<pubDate>Mon, 05 Jan 2026 15:44:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Posillico</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6eff8bca43dd0613a5c2c80372a9a9bc746d1c4e3eeb7fdf4048aec419622fcb</i><br /><br />Threat actor <b>description</b>: <i>Posillico is dedicated to setting the standard for excellence in the construction industry relative to: infrastructure, quality oflife, and making a difference by using innovation and solid relationships at all levels.We will upload almost 1TB of corporate data and SQLs soon. We took everything: personal information of employees, projects, contracts and agreements, detailed financials, insurance files and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Lewis-Bear</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28532</link>
<guid>07feb1e17b2da92bd4e1f870eaaa6add</guid>
<pubDate>Mon, 05 Jan 2026 15:44:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-Lewis-Bear</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06dbd226bc7b8fac7cbbc90c5f8a03372bc4345f581f0542748a839c08c4a85b</i><br /><br />Threat actor <b>description</b>: <i>The Lewis Bear Company Established in 1876, as a grocery company,The Lewis Bear Company is the oldest privately held corporation in Florida. In 1995, the grocery division was sold, leaving a focused beer distribution company.We will upload corporate data soon. Employee scanned documents (DLs, passports and other files), HR files, projects, agreements, detailed financials, customer information and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>kiddsservices.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28508</link>
<guid>48033f895a8eb822024e647cc943596d</guid>
<pubDate>Mon, 05 Jan 2026 10:45:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>kiddsservices.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b0dd5d3213eea0ac7a07bad0b8328d6b34e7df444f7dd1c08154e8cbc2871db9</i><br /><br />Threat actor <b>description</b>: <i>Kidds Restoration Services is a family-owned restoration company based in Lynchb...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>miltonfl.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28511</link>
<guid>e73902cc3bc6c3bb0534870f6b8272e4</guid>
<pubDate>Mon, 05 Jan 2026 09:44:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>miltonfl.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>39db208931c0e9d8be3f616f48ecef7ac8300b59695aa007db9646d6c7b73356</i><br /><br />Threat actor <b>description</b>: <i>MILTON-FL.RESTAURANTS800.COM serves up a guide for restaurants in the city of Mi...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Triad-Packaging</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28520</link>
<guid>dafd2bc3a016e34da1c696cb44993a56</guid>
<pubDate>Mon, 05 Jan 2026 09:38:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sicarii</b> claims attack for <b>Triad-Packaging</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38eeb5fb15f6a1a5f8d4d81ed6d48e7dd05c680f8fe7c63a63ca21fabb6c6031</i><br /><br />Threat actor <b>description</b>: <i>חברת Triad Packaging סבלה מהדלפת נתונים גדולה. 102 גיגה-בייט של נתונים רגישים נגנבו כולל מסמכים פנימיים, רישומים פיננסיים, ומידע לקוחות. הנתונים יפורסמו בעוד: קבצים אלה ישמשו כהוכחה לנתונים שהתקבלו. כל הנתונים יפורסמו אם התשלום לא יתקבל בתוך 24 שעות. | Countdown: 18h 15m 02s</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sicarii</category>
</item>
<item xmlns:dc='ns:1'>
<title>madisonareaymca.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28496</link>
<guid>206bde0d66915a51fe13c59741767e9c</guid>
<pubDate>Mon, 05 Jan 2026 08:45:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>madisonareaymca.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d90151ee36f43590a61afb60e4f4259c20059cad229daa4e6879b4b2c1ced1e3</i><br /><br />Threat actor <b>description</b>: <i>The Madison Area YMCA offers a variety of programs and services focusing on yout...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>MM-Auto-Parts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28519</link>
<guid>8595663aca75cac5588e45a0b8602baa</guid>
<pubDate>Mon, 05 Jan 2026 07:37:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>MM-Auto-Parts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd9584d7f643ec85f78fb3c540693f2d977ba9f72fd62587a4df71b60080a8d3</i><br /><br />Threat actor <b>description</b>: <i>M&M Auto Parts, Inc. specializes in providing high-quality auto parts, including over 150,000 parts in stock and ready for delivery. They cater to customers looking for affordable replacement parts, offering savings of up to 70% over new parts. The company also features a wide range of aftermarket and remanufactured products, ensuring a comprehensive selection for various automotive needs. Their intended clients include both individual consumers and businesses seeking reliable and cost-effective auto parts solutions.</i><br />Target victim <b>website</b>: <i>www.mmautoparts.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Harris-Consulting-Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28513</link>
<guid>f379a3ed36544a264646efdfe79a9212</guid>
<pubDate>Mon, 05 Jan 2026 07:36:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Harris-Consulting-Engineers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9bbc5de65e7501a3a3c96c530f7a8938518daf82c70b602499d559eecf4fd01a</i><br /><br />Threat actor <b>description</b>: <i>Harris Consulting Engineers has been perfecting the built environment since 1983, specializing in mechanical, plumbing, electrical, and data technology services. The firm's dedicated team aims to meet the goals and budgets of their clients. They focus on providing high-quality engineering solutions tailored to the construction and renovation industries. Kent Bell, the President and Owner, leads the company in fostering client relationships and delivering on projects.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Krenzer-Marine-Overview-Metrics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28514</link>
<guid>2d15e029e5ab6f925e5cc6447350ad62</guid>
<pubDate>Mon, 05 Jan 2026 07:36:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Krenzer-Marine-Overview-Metrics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>407e19a0f62655254fcc892da756f80d3f60d04edc4513f9a6c2661caac1e061</i><br /><br />Threat actor <b>description</b>: <i>Krenzer Marine is a full-service boat dealer located in Sodus Point and Ithaca, New York, specializing in the sale of new and used boats, boat rentals, and expert service. They offer a wide range of boats including fishing boats, pontoons, and cruisers from top brands like Chaparral, Robalo, and Starcraft. The company caters to clients in the Rochester, Syracuse, Finger Lakes, and Lake Ontario areas, providing comprehensive marina support and parts. Krenzer Marine is committed to meeting customer needs with convenient locations and a focus on quality service.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lares</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28515</link>
<guid>8a8aee6f4d29fa77828d4f011a237ea5</guid>
<pubDate>Mon, 05 Jan 2026 07:36:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Lares</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c49081268067d11a83086e64900a7566db32d1404aecc44ada72ee64a37dc108</i><br /><br />Threat actor <b>description</b>: <i>Lares Corporation specializes in performance equipment and aftermarket parts for vehicles, aimed at automotive enthusiasts and everyday drivers. They offer a wide range of universal fit components including pumps, pulleys, U-joints, and filters. The company provides various resources such as tech tips, articles, and a catalog for customers to enhance their automotive experience. Lares Corporation aims to empower clients in both performance tuning and regular vehicle maintenance.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Boathouse-on-the-Bay</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28516</link>
<guid>9cb7b5ea641f6919eec4a49c7957c6e0</guid>
<pubDate>Mon, 05 Jan 2026 07:35:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>The-Boathouse-on-the-Bay</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46c6971a74d15009cb7108018f56f1ea94158b54c5c0b107d69917db8c5177c3</i><br /><br />Threat actor <b>description</b>: <i>Boathouse on the Bay is an upscale waterfront restaurant located in Long Beach, offering stunning views and a fine dining experience with a focus on premium steak, seafood, sushi, and cocktails. The establishment features live music and hosts various events, including private parties and corporate gatherings, accommodating up to 200 guests. Guests can enjoy a variety of dining options, including weekend brunch and special holiday events. The restaurant is known for its commitment to exceptional service and creating memorable experiences for its clientele.</i><br />Target victim <b>website</b>: <i>www.boathouseonthebay.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Windward-Life-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28517</link>
<guid>ed45799a50e5fe02ff62fc8aacf2e4d5</guid>
<pubDate>Mon, 05 Jan 2026 07:35:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Windward-Life-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1da44dd575a884da9ba437dd469ff9681711dd520f20cef08f4d1cdfb7248f8f</i><br /><br />Threat actor <b>description</b>: <i>Windward Life Care offers premier home care, aging life care management, and home health care services specifically designed for older and disabled adults in San Diego, CA. Their services include personalized Aging Life Care Management, companionship, transportation, personal care, and skilled nursing services. With over 20 years of experience, they focus on enhancing the quality of life for their clients by providing exceptional support and navigating the complexities of health care. Windward Life Care aims to foster independence and safety for their clients within the comfort of their own homes.</i><br />Target victim <b>website</b>: <i>windwardlifecare.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wesley-Heating--Cooling</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28518</link>
<guid>dd04b0cb9dc44609df0f78c4960e9589</guid>
<pubDate>Mon, 05 Jan 2026 07:35:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Wesley-Heating--Cooling</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d163fcba5d15d947c803383695480fb485151efbe80c1f79b7c578f8298a28a6</i><br /><br />Threat actor <b>description</b>: <i>Wesley Heating & Cooling is an HVAC company based in Green Bay, Wisconsin, specializing in heating, cooling, and air conditioning services since 1951. They offer repair, replacement, and maintenance services for various heating and cooling systems, including geothermal heat pumps and ductless mini-splits. Their intended clients include homeowners in Green Bay, Oshkosh, Fond du Lac, and surrounding areas, looking for reliable and efficient HVAC solutions. Wesley Heating & Cooling is committed to customer satisfaction, providing community service, maintenance plans, and financing options for new installations.</i><br />Target victim <b>website</b>: <i>www.wesleyheatingandcooling.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28503</link>
<guid>3bb7e223dd6fe07da16874517cf3fa54</guid>
<pubDate>Mon, 05 Jan 2026 06:28:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>American-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c57b8ad9c032e3819b433fa7ed61eb0504b8314c88883a9a751c79c8a8f41f76</i><br /><br />Threat actor <b>description</b>: <i>American Health provides a comprehensive array of healthcare services including hospital operations, emergency medical services, and smart clinics. The organization is focused on delivering world-class education and training for healthcare professionals such as physicians, nurses, and EMTs through their AH Academy and specialized programs. Their intended clients encompass a wide range of healthcare needs, including home healthcare and support for special needs individuals. With a commitment to quality and patient experience, American Health aims to improve healthcare delivery across various sectors.</i><br />Target victim <b>website</b>: <i>americanhealth.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>GreenValley-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28497</link>
<guid>0704b08c67807572593dba22b536d449</guid>
<pubDate>Mon, 05 Jan 2026 06:27:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>GreenValley-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba04bdd8211019a25515bceea8824814c2d1f314d2421bf61881e33a335c958a</i><br /><br />Threat actor <b>description</b>: <i>GreenValley International Inc (GVI), based in Berkeley, California, is a leading innovator in 3D mapping technologies, offering a diverse range of aerial, terrestrial, and mobile LiDAR survey and mapping hardware systems along with advanced software solutions. Their product lineup includes various laser scanning platforms and the LiDAR360 data processing platform, catering to industries such as forestry, power line inspection, mining, and utilities. GVI specializes in LiDAR and image fusion technology, focusing on achieving precise digital representations of three-dimensional spaces. Committed to innovation, GVI continues to expand its technological capabilities in the LiDAR sector.</i><br />Target victim <b>website</b>: <i>www.greenvalleyinternational.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>NLFX-Professional</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28498</link>
<guid>7425da72a486e6097524b74f9f242765</guid>
<pubDate>Mon, 05 Jan 2026 06:27:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>NLFX-Professional</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5ca2b4526d94a741bae63d94a124a4375da6f4a9f0ab9bb8b4dbc5e27c92359f</i><br /><br />Threat actor <b>description</b>: <i>NLFX Professional is an award-winning leader in the audio, video, and lighting industry, specializing in selling equipment and providing product integration solutions. They offer a wide range of products, including pro audio, lighting systems, video streaming gear, and musical instruments, catering to clients in various sectors such as entertainment and worship. With a focus on customer satisfaction, NLFX provides exceptional technical support, financing options, and expert installation services. They are certified dealers for over 300 top-rated professional manufacturers, ensuring high-quality offerings for their clients.</i><br />Target victim <b>website</b>: <i>www.nlfxpro.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lampire-Biological-Laboratories</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28501</link>
<guid>65378614c4adbc65cc1643a8bd221e59</guid>
<pubDate>Mon, 05 Jan 2026 06:26:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Lampire-Biological-Laboratories</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f4253c0b68227f31394ed2b3327b6402f6381152d87f37feb66609e936ac7d2</i><br /><br />Threat actor <b>description</b>: <i>LAMPIRE Biological Laboratories, a pioneering biotech life science firm specializing in the creation and supply of vital biological reagents for the diagnostic and pharmaceutical industries. Our extensive offerings encompass tailor-made polyclonal and monoclonal antibody development, secondary antibodies, IgGs, BSA, animal blood, tissues, and organs. We also provide both normal and disease-state human serums and plasmas, along with cutting-edge cell media, OMNI C3 cell culture bags, contract manufacturing solutions, and an array of technical support services.</i><br />Target victim <b>website</b>: <i>www.lampire.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pools-by-Bradley</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28502</link>
<guid>a472370cd24972948ca543bcb05a29b2</guid>
<pubDate>Mon, 05 Jan 2026 06:26:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Pools-by-Bradley</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>faaac73142407dc1bf82698ae532199c540f41e2463d6a68160af4729df23b98</i><br /><br />Threat actor <b>description</b>: <i>Pools By Bradley specializes in designing and building custom outdoor pools and spas tailored to individual client needs in Central Florida, particularly in Orlando. Their services include a variety of enhancements such as water features, lighting effects, and entertainment elements to create a unique pool experience. The company caters to a diverse clientele, ranging from families to exercise enthusiasts, ensuring that each pool reflects the client's vision and ambient style. With a focus on quality craftsmanship and exceptional customer service, Pools By Bradley has established a strong reputation in the industry.</i><br />Target victim <b>website</b>: <i>www.poolsbybradley.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>IDeaS.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28493</link>
<guid>3126ed973cbecde2bbffe419f139f456</guid>
<pubDate>Mon, 05 Jan 2026 03:59:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>IDeaS.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5854cecc20e22b5ab89b4ef2c98e7ef0a15cb7ab7b4542d1969565138e7e301b</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] IDeaS is a global technology company specializing in revenue management solutions. They provide innovative software and services for profit optimization, forecasting and pricing to businesses like hotels, parking facilities, and rental agencies. Using advanced analytics, they help clients make data-driven decisions to increase revenue, control costs, and optimize business operations.</i><br />Target victim <b>website</b>: <i>IDeaS.com</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Resource-Corporation-of-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28492</link>
<guid>297e6e1f21723046a8c1115ec1a8b8a7</guid>
<pubDate>Sun, 04 Jan 2026 19:22:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Resource-Corporation-of-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ad65844ce901f0d115ca95eac5013b0146975722271554942dc9d61d6730653</i><br /><br />Threat actor <b>description</b>: <i>Resource Corporation of America specializes in converting hospitals' at-risk dollars into revenue, focusing on third-party eligibility solutions. With over 30 years of experience, they have achieved a 93% certification success rate and have managed more than two billion dollars in patient account charges. Their services are aimed at hospitals navigating complex healthcare policies and regulatory changes. The company stands as a trusted partner for healthcare leaders seeking to optimize revenue amid evolving Medicaid reforms. 
The company headquarters is located in 1120 Marina Bay Dr, Kemah, TX 77565, United States.
201-500 Employees
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cal-Spas-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28490</link>
<guid>9e020ebb181dfd3fb1229c6ceb076a60</guid>
<pubDate>Sun, 04 Jan 2026 13:43:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Cal-Spas-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff71f74ade6f73e6c44d0f46e69c72dce0f1a7f8efca987955574811236ca349</i><br /><br />Threat actor <b>description</b>: <i>Manufacturing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>KwikLedgers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28482</link>
<guid>67da624214ee8e89992ce70459e669a3</guid>
<pubDate>Sun, 04 Jan 2026 05:53:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>direwolf</b> claims attack for <b>KwikLedgers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d60896743fbfeb225232ef911c8b37e1edd2b0c8bf5e7db30aceaa8212c239db</i><br /><br />Threat actor <b>description</b>: <i>Finance</i><br />Target victim <b>website</b>: <i>kwikledgers.com</i>]]></description>
<category>direwolf</category>
</item>
<item xmlns:dc='ns:1'>
<title>Youngblood-Tyler--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28480</link>
<guid>3ec7b0f8bc5bf7eb2a73ea78a115d94a</guid>
<pubDate>Sat, 03 Jan 2026 19:18:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Youngblood-Tyler--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e83dd19602fc9a230b30b780cd866be50eca7239e5ef960f093673085ec92307</i><br /><br />Threat actor <b>description</b>: <i>Youngblood, Tyler & Associates, P.C. is a leading firm specializing in civil engineering, land surveying, site development, and land planning, serving clients in Virginia, North Carolina, and West Virginia for over 50 years. Their comprehensive services include environmental assessments, drainage system design, surveying for residential and commercial projects, and detailed site development planning. The company fosters strong client partnerships throughout all phases of development, addressing needs from land purchasing to zoning and government approvals. With a dedicated team of professionals, they emphasize quality service and tailored solutions for each project.</i><br />Target victim <b>website</b>: <i>www.youngbloodtylerassociates.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Borough-of-Moonachie</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28474</link>
<guid>f50ebce922538b3c57a3e6b7bbb6d628</guid>
<pubDate>Sat, 03 Jan 2026 17:17:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Borough-of-Moonachie</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be0a8872a6e25d2f70112b7b2729e79761fb68ebb8ee312b3969648b2fcaa8c7</i><br /><br />Threat actor <b>description</b>: <i>On April 11, 1910, Moonachie was finally incorporated as a borough. That same year, the Board of Education and the Moonachie Fire Company were organized. Town life in Moonachie, during these days, was centered around family, farms and the church.  Robert L. Craig became the first Mayor. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>mtspokanepediatrics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28475</link>
<guid>4b8fd3f079e7f86de2eb88ff847effee</guid>
<pubDate>Sat, 03 Jan 2026 15:34:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>mtspokanepediatrics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>95aa5125ac2ce10bdad1efc99d74cd1d3a7a4c004304c282aa53ee90216459ef</i><br /><br />Threat actor <b>description</b>: <i>Mt. Spokane Pediatrics offers comprehensive healthcare services for patients from birth through youn...</i><br />Target victim <b>website</b>: <i>mtspokanepediatrics.com</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>UBS-Office</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28470</link>
<guid>5af7c96251ec5ea316631afea1456741</guid>
<pubDate>Fri, 02 Jan 2026 21:44:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>UBS-Office</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cfd801ad4f54579bb2be1555d836d3d2f5c7f96a73510169ae3ed35a489a77de</i><br /><br />Threat actor <b>description</b>: <i>United Business Systems specializes in simplifying the management of hardcopy and digital documents for various industries, with a strong focus on education. Th...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ellison-Educational-Equipment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28462</link>
<guid>001d908c7637618bb0a8af0c8be5cd41</guid>
<pubDate>Fri, 02 Jan 2026 19:44:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Ellison-Educational-Equipment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7ac189f53b3b88565c98adb76d5e30a5daed95496181f928f937ca91bfb8fe7</i><br /><br />Threat actor <b>description</b>: <i>Industrial Machinery & Equipment</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sai-Oral-SurgeryOral</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28456</link>
<guid>d1f8643fbc2b43ef133eec4e483b3565</guid>
<pubDate>Fri, 02 Jan 2026 18:45:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Sai-Oral-SurgeryOral</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>14e93fa1bd6a1b341a0fa406b8dd232ac9faef201a11ba293e3bd98b1f72201d</i><br /><br />Threat actor <b>description</b>: <i>Healthcare Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>McKenzie-SewOn</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28458</link>
<guid>1d0d4779bbefa4ccc9dfb920a110f05a</guid>
<pubDate>Fri, 02 Jan 2026 18:45:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>McKenzie-SewOn</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>133b32e68717940df1154377caaca9ac7f4cc6ffaa8200c9fd4bd4c4f027e030</i><br /><br />Threat actor <b>description</b>: <i>Advertising & Marketing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>j-Global</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28461</link>
<guid>2f9fe1e3d5d2749628ccbd9e7d3f377b</guid>
<pubDate>Fri, 02 Jan 2026 17:44:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>j-Global</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a04020bef39be0346aa9a360f2a2d03792ad588aee0e602d510a073f3b01a5f</i><br /><br />Threat actor <b>description</b>: <i>Industrial Machinery & Equipment</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lakeside-Title-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28469</link>
<guid>6d8470222cb0e9ca1519ab84406ef2b2</guid>
<pubDate>Fri, 02 Jan 2026 13:06:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Lakeside-Title-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f3a04b4b2c4747bba4323515e9394b7f3beb4b8e27d1d06cd19027c8184e8603</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.lakesidetitle.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wardell-Builders</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28468</link>
<guid>1b975b9f0481510eafbbfb055280e433</guid>
<pubDate>Fri, 02 Jan 2026 13:06:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Wardell-Builders</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>996bfca57b77da4522d1a4db31ef9f079d0049b822f5ddde47c8ee6d8033fd3f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.wardellbuilders.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Garner-Foods</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28467</link>
<guid>7363e32af3e3a10f22af512c70068958</guid>
<pubDate>Fri, 02 Jan 2026 13:05:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Garner-Foods</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7261da066970d9b4980713bb5354f227722324680e28fac03ece129abfa63303</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.garnerfoods.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Benise-Dowling--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28465</link>
<guid>3e59327f1a6ccf540d9878cf8c991278</guid>
<pubDate>Fri, 02 Jan 2026 13:04:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Benise-Dowling--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e7dfe7f56165fa86f24885cc5db257433edbbde65377500753ee7b92d506efd</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.benise-dowling.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rockport-Technology-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28455</link>
<guid>1fd6b8f9b13318adc358fca5d1ea1b5b</guid>
<pubDate>Fri, 02 Jan 2026 12:06:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Rockport-Technology-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ebc9f66bcac7c3170a0d18c9bbd43e7e31da2548fd132dd3d4e1cb9755dc34d2</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.rockporttech.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stoughton-Steel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28454</link>
<guid>0334bbbe24552d27a5c4c2dcc41570c3</guid>
<pubDate>Fri, 02 Jan 2026 12:05:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Stoughton-Steel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2eeb6adc76040e04df2015ad2d6f3cfb25ea64e87112a1430d3147d5b4e4c757</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.stoughtonsteel.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Barnes--Jones</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28450</link>
<guid>7fa37b4aadce3de52314aa3ff5c6673d</guid>
<pubDate>Thu, 01 Jan 2026 17:44:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Barnes--Jones</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a65499d4ec33684e9155408e25e9c66a468ea0edd671ad1c56764b5f3ae14a61</i><br /><br />Threat actor <b>description</b>: <i>Barnes & Jones was founded before the turn of the century by two engineers: Walter Barnes, a graduate of The Massachusetts Institute of Technology, and Bill Jon...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Infinite-Computing-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28449</link>
<guid>7faf67c63084cf8345243e912885f1a5</guid>
<pubDate>Wed, 31 Dec 2025 17:01:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Infinite-Computing-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3c4fea5230f835a196510bcadd05de0b35de2bf9733d8b7346d9976d5072293</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.infinite-usa.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>BNZ-Materials</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28445</link>
<guid>4eedf3f92629bc3b1a208cfaacc4b2d2</guid>
<pubDate>Wed, 31 Dec 2025 16:54:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>BNZ-Materials</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>938cbfd77abc3820b4af185bacdcc2d70cbe7cad9fac1344de40c4cd837bb452</i><br /><br />Threat actor <b>description</b>: <i>Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hunneman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28448</link>
<guid>8e14f4de91da22108a5247cc18253a0a</guid>
<pubDate>Wed, 31 Dec 2025 14:57:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Hunneman</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0aee2d61874662c282eb8469774b2d662572e5081fa27804ec41de50f419aff5</i><br /><br />Threat actor <b>description</b>: <i>Hunneman, founded in Boston in 1929, is a real estate firm that offers a full range of real estate brokerage, leasing investment sales, and management services.</i><br />Target victim <b>website</b>: <i>htpps:www.hunnemanre.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Z-Tronix</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28444</link>
<guid>ab1513164c86afa5d30f46b482c3030a</guid>
<pubDate>Wed, 31 Dec 2025 11:43:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Z-Tronix</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd7eab6b1ed4d7ef9d85b5ef2f67d1889919f21ee43f85a4097c41478d95d0cc</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.z-tronix.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Quasar</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28443</link>
<guid>c2db5ca3f8789c124affa4023764635d</guid>
<pubDate>Wed, 31 Dec 2025 11:43:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Quasar</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b2012f849e5e6980bdcb3e72355e988e37071ca0c84ad8c606244655956d178d</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.quasardata.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Burnham-Brown</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28440</link>
<guid>d79af587a459b1a0ae549a11190e0853</guid>
<pubDate>Wed, 31 Dec 2025 10:26:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Burnham-Brown</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5bd525e096979c7a433d61246d16757d5a332e22f94710b138e550541c10cde7</i><br /><br />Threat actor <b>description</b>: <i>Burnham Brown is a law firm based in Oakland, California that provides legal services in various practice areas including retail and hospitality, real estate, business and commercial, as well as employment law. The firm caters to clients across industries such as transportation, logistics, and manufacturing, helping them navigate legal risks and compliance issues. They offer updates and resources on changes in law and industry-related news to inform their clients. Additionally, Burnham Brown conducts events and discussions to engage with the community and provide insights on evolving legal matters.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sedgwick-Government-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28438</link>
<guid>4f3e1a55bdd71769da5e20b374f20f43</guid>
<pubDate>Tue, 30 Dec 2025 22:40:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>tridentlocker</b> claims attack for <b>Sedgwick-Government-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f827a76a698b5c3fdaa04521fbab29666565414991b76c0f693912f238231ff</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Sedgwick Government Solutions is part of Sedgwick, a leading global company specializing in risk and benefits solutions. The company offers expertise in different sectors including, health, property, casualty, disability and productivity. It is recognized for its technology and innovation-driven approach to provide comprehensive risk and benefits solutions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>tridentlocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>OSI-Systems-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28439</link>
<guid>20a79e1ab3a172d48f5f78498616ec4d</guid>
<pubDate>Tue, 30 Dec 2025 22:23:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>OSI-Systems-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c87e834c7b9fa7fed05d47b898edfad8615e9d06ae4da8aeeae6e1ce93be1a8f</i><br /><br />Threat actor <b>description</b>: <i>OSI Systems, Inc.  Total data in the leak: 250GB  Leaked data: - Clients: US Government, US Secret Service, IDSS, GLOBAL AEROSPACE INC, Governments of many countries, Casco Automotive Singapore Pte Ltd, Medtronic, Opengear Inc,  Sick Sdn Bhd, ST JOSEPH HOSPITAL, SSM HEALTH CARE CORPORATION, UPMC HEALTH SYSTEM and many other large clients all over the world! - Data Classification: Secret - Projects: Raven, Canopy, SPARK, Lighthouse and many other projects. All project information: development, laboratory testing, drawings, subcontractors, suppliers. - Financial data: Company structure. Company income and expenses, shareholders information, such as BlackRock, Inc. and many other investors. Nasdaq data. Contracts with customers and suppliers, NDA contracts. And a lot of other VERY IMPORTANT information! </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Midkiff-Muncie--Ross-P.C</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28435</link>
<guid>dec8b1ac1258d33ac95d675366558a27</guid>
<pubDate>Tue, 30 Dec 2025 16:37:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Midkiff-Muncie--Ross-P.C</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f0e509732a9c4f1fd8c836ce0945b57e43fc62b3cff4d34d863d619d45af88a</i><br /><br />Threat actor <b>description</b>: <i>Midkiff, Muncie & Ross, P.C</i><br />Target victim <b>website</b>: <i>midkifflaw.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Falk-Waas-Hernandez-Cortina-Solomon--Bonner-Overview-Metrics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28436</link>
<guid>dd473ece077230d91b9340e3b4e57c11</guid>
<pubDate>Tue, 30 Dec 2025 15:07:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Falk-Waas-Hernandez-Cortina-Solomon--Bonner-Overview-Metrics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc194b0180896c327ec5b29d2b6cb64062f59fbcb28a9a79cebe567f52462a01</i><br /><br />Threat actor <b>description</b>: <i>Falk, Waas, Hernandez, Cortina, Solomon & Bonner Overview Metrics</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fitzpatrickhotels.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28427</link>
<guid>07614251f62899912b42cf137c9b7a3e</guid>
<pubDate>Tue, 30 Dec 2025 11:55:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Fitzpatrickhotels.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f46763fd316dfc27a1d3635e5c6aa1cc8862dd4812ac209a30f17e35e51d90db</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>collinscomputing.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28428</link>
<guid>fdf7a157d555f8ac35f2a820488c342c</guid>
<pubDate>Tue, 30 Dec 2025 11:54:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>collinscomputing.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8b6a2b9923814c039e78d660b16f060d340d96c07d62bf42e61b8513709701b</i><br /><br />Threat actor <b>description</b>: <i>Collins Computing specializes in providing accounting software solutions, focusing on 
Acumatica Cl...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>davidrosenbakerysupply.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28425</link>
<guid>91983ccf17b3200975d9e3d8a09236a8</guid>
<pubDate>Mon, 29 Dec 2025 20:13:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>davidrosenbakerysupply.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b9e3cde421ddecc04cd0c5c1cfe96617297f38b67ea786feaa1df57be39db2f</i><br /><br />Threat actor <b>description</b>: <i>David Rosen Bakery Supply is a long-established wholesale bakery supply and distribution company headquartered in Maspeth, New York, serving commercial …</i><br />Target victim <b>website</b>: <i>davidrosenbakerysupply.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>moorelumber.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28423</link>
<guid>0014fcb3db4c8459d26309b177005b10</guid>
<pubDate>Mon, 29 Dec 2025 20:12:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>moorelumber.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5409eaaa90f45f3502d115469b98cf0d853d0616c649ac294e842d43a1548de2</i><br /><br />Threat actor <b>description</b>: <i>Moore Lumber & Hardware Co. is a U.S. building-materials retailer and hardware supplier based in Ayer, Massachusetts. Founded in the …</i><br />Target victim <b>website</b>: <i>moorelumber.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>sproutnet.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28420</link>
<guid>ebe048f25228d088e0216147377171b2</guid>
<pubDate>Mon, 29 Dec 2025 20:10:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>sproutnet.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8853a3cde2d02c8f181e737cef3600dab647f3a40e2519bdc44eb5238a9f8a60</i><br /><br />Threat actor <b>description</b>: <i>SproutNet — operating under International Specialty Supply — is a U.S. producer and supplier of sprouting seeds, sprouts, natural ingredients …</i><br />Target victim <b>website</b>: <i>sproutnet.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Genoa-Lakes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28417</link>
<guid>7854c8701c5da6d80d602a20133d2bf8</guid>
<pubDate>Mon, 29 Dec 2025 20:05:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Genoa-Lakes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7970da5a7aeedc0f54b549e0f49401be4c0ae8541bebc322392af2eb6c83b778</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.genoalakes.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Esquire-Brands</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28407</link>
<guid>e2701537f72184bb152aa9d26a93ecca</guid>
<pubDate>Mon, 29 Dec 2025 20:04:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Esquire-Brands</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e3e84fc20b172b0f5d5b30b08dfccbe8ed711998031bf6e142ee188e4dacd56c</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.esquirebrands.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>JZ-Russell-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28416</link>
<guid>f9989a9443ac061cf808a80bb8edb46c</guid>
<pubDate>Mon, 29 Dec 2025 20:04:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>JZ-Russell-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e55310f9a01b84653f2401562eed088b3c95db336eebabd027ede13aa75cc1e4</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.jzrussellind.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cr-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28414</link>
<guid>98c9832865e4ab224a1649e8e6e9a2a0</guid>
<pubDate>Mon, 29 Dec 2025 20:03:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Cr-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a47b843022411f385189a69b63485331c5ec985c4cafe5cbfd0984da0c6ae23f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.candrelec.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Burnex</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28403</link>
<guid>a90ab441fabcbbac21aaf1360076bd8d</guid>
<pubDate>Mon, 29 Dec 2025 18:43:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Burnex</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5d21ff9cb2f3e4d77212a3e7096fd0c3e0f4b840f7a43536382dc8f653b22ac6</i><br /><br />Threat actor <b>description</b>: <i>Burnex Corporation is a leading manufacturer of precision metal stampings and wire forms, offering both custom and standard metal parts for various industries s...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>NK-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28404</link>
<guid>9744c8cf184ceb07cf5c2bbce1489eb3</guid>
<pubDate>Mon, 29 Dec 2025 18:43:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>NK-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>17b252256fd9cd58762801818ab64e5bf142c77ee180ef2f9ce39a70c49d545f</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1982, NK Technologies is a current sensing technology manufacturer and distributor headquartered in San Jose, California. Products include sensing sw...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Willowdale-Steeplechase</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28395</link>
<guid>78b9508436357acbab1aabb76e12739f</guid>
<pubDate>Mon, 29 Dec 2025 10:43:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Willowdale-Steeplechase</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c43ffffe65514333cef24ca388cc55b0949c5279259d3abfeb268809d8faca1</i><br /><br />Threat actor <b>description</b>: <i>Non-Profit & Charitable Organizations</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>APC-Home-Health-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28394</link>
<guid>7c3a966d88a80726a95c2e16e56c3997</guid>
<pubDate>Mon, 29 Dec 2025 06:17:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>APC-Home-Health-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6509208384b14b609906d5eb37feca75ab452968fd58a5756333b6fc514742d9</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1982, APC Home Health Services is a home care provider, servicing Harlingen, Texas. Their services allows the elderly to stay in their home and receive medical care for health conditions, receiving assistance with daily tasks or homecare during day or night depending on their need.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>Goodwin-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28385</link>
<guid>900e9a6cea0b0ddfecbfba02cc20b13f</guid>
<pubDate>Sun, 28 Dec 2025 20:52:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Goodwin-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1189e7664e0329fc3c0133c937f4d66ed38b3332dd8ba5fbd3885be53c48abc9</i><br /><br />Threat actor <b>description</b>: <i>Education</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Neurological-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28384</link>
<guid>d7260db1e48d63995af17ebc0390a5a3</guid>
<pubDate>Sun, 28 Dec 2025 16:56:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Neurological-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6e24f510276a0c1110714a4783ab27c1ca5e13346cced3559b97e25a61e9e22</i><br /><br />Threat actor <b>description</b>: <i>Neuro Associates, located in Kirkland, Washington, is a neurology clinic established in 1974 with a team of four highly experienced neurologists. The clinic off...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Intonu.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28388</link>
<guid>b59978537754917c2df87b96ac795ef2</guid>
<pubDate>Sun, 28 Dec 2025 15:48:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>Intonu.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a9d8e9a62907869a47fa584bfdd9e32a97dc31026c35e929fee8bc3a2642025</i><br /><br />Threat actor <b>description</b>: <i>Financial, Hr documents, claims</i><br />Target victim <b>website</b>: <i>Intonu.com</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jennings-SD</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28390</link>
<guid>1792c408f2a894f77fbbeb5f57c210a1</guid>
<pubDate>Sun, 28 Dec 2025 15:45:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>Jennings-SD</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c53c2fda7da9171c9894a6831cab00331f52c62f34b61c3bf62a30aa5d29f1fb</i><br /><br />Threat actor <b>description</b>: <i>Financial data, HR data</i><br />Target victim <b>website</b>: <i>Jennings SD</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>sharinc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28391</link>
<guid>2abbb2e05e3945e87fcae7d3186a03be</guid>
<pubDate>Sun, 28 Dec 2025 15:44:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>sharinc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ec57d49e4522cab94e82ea176fdc281b616c0c05030b38291f0cca9f32f8944</i><br /><br />Threat actor <b>description</b>: <i>Financial, Custommer data</i><br />Target victim <b>website</b>: <i>sharinc.org</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>JBS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28382</link>
<guid>3010a3b06b878fde04e1e207df23bb53</guid>
<pubDate>Sun, 28 Dec 2025 08:00:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>JBS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45b5063529dd284397a1bc81a66a17bf4eb698a72029370b676e14a44a97e775</i><br /><br />Threat actor <b>description</b>: <i>JBS is a regional, public, nonprofit corporation established under Act 310 of the 1967 Alabama Legislature. The region served by the Authority is designated in the State Mental Health Plan as Region M-5, and comprises Jefferson, Blount and St. Clair counties, with a total of more than 800,000 residents. There are three mental health centers which serve the region. It is the responsibility of the Authority to plan, coordinate and develop the system of mental health services for the entire region. The Authority provides consultation regarding program development and funding; coordination of regional programs; delivery of region-wide services; and a consolidated budgeting process to simplify the funding of programs at the local and state level.
company is headquartered in 940 Montclair Rd., Birmingham, AL 35213, USA.
201-500 Employees, The total amount of data leakage is 168.6 GB.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>ryc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28377</link>
<guid>36677a1d815d4528bebf89833d168f56</guid>
<pubDate>Sat, 27 Dec 2025 20:43:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>ryc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b67c9138e86fb4626529ec3334351f8641d7b0c31b201253503051f522cd25c3</i><br /><br />Threat actor <b>description</b>: <i>Raritan Yacht Club (RYC) is a private, member-owned recreational club located in Perth Amboy, New Jersey, with a history dating …</i><br />Target victim <b>website</b>: <i>ryc.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>debralmorrison.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28375</link>
<guid>61204932bccb948357e1a0281de24080</guid>
<pubDate>Sat, 27 Dec 2025 20:42:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>debralmorrison.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1418646c6b02ca94ae34bc9eb2ebd94ad7696402daa3c14395edea2c8893cdf</i><br /><br />Threat actor <b>description</b>: <i>Debra L. Morrison operates a professional coaching, speaking, and financial education practice associated with the domain DebraLMorrison.com, which serves as …</i><br />Target victim <b>website</b>: <i>debralmorrison.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>hmpccpa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28374</link>
<guid>abf57562806a737f3f8456b63b50f5ff</guid>
<pubDate>Sat, 27 Dec 2025 20:41:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>hmpccpa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>05bf3b319ce8cc0654cfb755b2131e852f62b4395a32d5034fa433365b0b248d</i><br /><br />Threat actor <b>description</b>: <i>Harvey & Martin, PLLC is a professional accounting firm based in Massachusetts, United States, with additional offices in Gloucester, MA …</i><br />Target victim <b>website</b>: <i>hmpccpa.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>larosadelmonte.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28370</link>
<guid>414c073ee1379bd7bc7b332159cab1e6</guid>
<pubDate>Sat, 27 Dec 2025 20:39:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>larosadelmonte.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>139b637a055438b666e922beac95b5c910d7bc76aa3d5910808fce1fbaab05b7</i><br /><br />Threat actor <b>description</b>: <i>La Rosa Del Monte is a long-standing family-owned moving and logistics company based in Bronx, New York, with operations extending …</i><br />Target victim <b>website</b>: <i>larosadelmonte.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Georgia-Dermatology--Skin-Cancer-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28307</link>
<guid>22533fb038725070faa56e0d03825120</guid>
<pubDate>Fri, 26 Dec 2025 18:15:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Georgia-Dermatology--Skin-Cancer-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4c4a829375c75d146adc82a8b9fc21e24a2ccf0c56cad3efb67f0068609eda4a</i><br /><br />Threat actor <b>description</b>: <i>0</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ortho-Mattress</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28308</link>
<guid>55dd9b82d52ce59b5faeabc5667d5c01</guid>
<pubDate>Fri, 26 Dec 2025 18:15:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Ortho-Mattress</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>544fd58b09994b3aff65c2560ca79fb6014f4a6d2a6a9fc5cff2f0db3f3a85d2</i><br /><br />Threat actor <b>description</b>: <i>Furniture</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>mc2engineers.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28331</link>
<guid>cfb32325857e9b4e076699ee4c6afaee</guid>
<pubDate>Fri, 26 Dec 2025 15:37:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>mc2engineers.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9474d45b8e7f24d01759b6866005b7e23317532f9fe3133127bbb3ad5091e29</i><br /><br />Threat actor <b>description</b>: <i>MC Squared is a regional engineering consulting firm specializing in geotechnical, environmental, ma...</i><br />Target victim <b>website</b>: <i>mc2engineers.com</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>npiav.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28310</link>
<guid>0237aedd1eafebe97db4611a4328b141</guid>
<pubDate>Fri, 26 Dec 2025 15:21:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>npiav.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57eec1f10e3600b736e7b963a8b688c1e1225cc7c191496b7963ad17fd270a3e</i><br /><br />Threat actor <b>description</b>: <i>NPi Audio Visual Solutions specializes in providing top-notch audio visual rental and staging servic...</i><br />Target victim <b>website</b>: <i>npiav.com</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>itgsolutions.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28313</link>
<guid>83be9a147d7cebfb58df77f586ad919a</guid>
<pubDate>Fri, 26 Dec 2025 15:20:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>itgsolutions.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2793dd3e07d9502f44f6ca3a30da37b4f62f954572fc80f9311afb47e8744ca2</i><br /><br />Threat actor <b>description</b>: <i>Integrated Technology Group (ITG) specializes in providing technology solutions tailored for the edu...</i><br />Target victim <b>website</b>: <i>itgsolutions.com</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>Progressive-Laboratories</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28304</link>
<guid>a0845f6123cde73d218c375817c81083</guid>
<pubDate>Fri, 26 Dec 2025 15:12:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Progressive-Laboratories</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>54f1e8088db83f4f0f164b06c09bb5e10d3e09abb495b913145f2eb4d2ba00bd</i><br /><br />Threat actor <b>description</b>: <i>Progressive Laboratories, Inc. specializes in producing targeted nutritional supplements specifically for healthcare professionals.We will upload corporate data soon. Financials, employees files, projects, contracts and agreements, NDAs and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ruhrpumpen</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28305</link>
<guid>8d57c03206c460f9e9637e46b8337713</guid>
<pubDate>Fri, 26 Dec 2025 15:12:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Ruhrpumpen</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0932ab45e8a1eab16ee00e12a06219aeedf6d06ef6805e141a0c143ebc397b2c</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2000 and headquartered in Tulsa, Oklahoma, Ruhrpumpen Group designs manufactures, and supplies pump and pumping equipment. The Company produces overhung pumps, vertical pumps, hydraulic decoking systems, fire pumps, and other products.We will upload 142gb corporate data soon. SSNs of almost 600 employees and other personal information, detailed financials, projects, contracts and agreements, NDA, numerous project files and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>CSA-Tax--Advisory</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28302</link>
<guid>b806521ac395b5b8474a8e3e81ab50f9</guid>
<pubDate>Fri, 26 Dec 2025 14:48:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>CSA-Tax--Advisory</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1632cfc7f92df56914eabc98c3d7267c09c119959bc1f908f89a1a8f24491b50</i><br /><br />Threat actor <b>description</b>: <i>CSA Tax & Advisory is a licensed accounting firm based in Haverhill, MA, special...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Madera-County-Superintendent-of-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28294</link>
<guid>caeb849de01d6c60e5eefb19f3719471</guid>
<pubDate>Thu, 25 Dec 2025 18:55:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Madera-County-Superintendent-of-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c303744c661d29fd63f97ae5f850043886b08249b13b6deef0fe7b0709446248</i><br /><br />Threat actor <b>description</b>: <i>Education</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>io.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28296</link>
<guid>863077711ff23e3a4cc4ddb915cc02f5</guid>
<pubDate>Thu, 25 Dec 2025 18:50:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>io.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c847ef199ac36f5a4b320053efb92dc00c9492ca0a477836bc060ed08b5fe88</i><br /><br />Threat actor <b>description</b>: <i>Financial, Hr documents, claims</i><br />Target victim <b>website</b>: <i>i**o**.us</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chrysler</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28298</link>
<guid>2e668e3f91f3ea4db52a8d56c556a0d5</guid>
<pubDate>Thu, 25 Dec 2025 17:53:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Chrysler</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1cb2b24b554c8e4da341ad7eba89917db90d03d221ad65386c6392693981d570</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Chrysler is an American automobile manufacturer that was first established in 1925. Known for their range of reliable family cars, luxury sedans, and sporty convertibles, the company has a significant role in the global automotive industry. It was founded by Walter Chrysler, and is currently a subsidiary of Stellantis, resulting from the merger of Fiat Chrysler and Groupe PSA.</i><br />Target victim <b>website</b>: <i>Chrysler.com</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>CYMA-SYSTEMS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28295</link>
<guid>f08f86e95c9d083c89f058285f9ff636</guid>
<pubDate>Thu, 25 Dec 2025 15:24:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>CYMA-SYSTEMS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e827ad23b8779608badaa712ecfb81ef57ef5c2eef6d85e5c6c9210f8ecfde80</i><br /><br />Threat actor <b>description</b>: <i>CYMA Payroll and Accounting Software is designed for volume payroll processing and unique markets that process complex payroll. Through Employee Self-Service, the CYMA payroll software extends to the web allowing maximum flexibility. At its core, CYMA has been producing Accounting Software solutions since 1980 - ready to decrypt and return data + stop leak operation, reach us</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>grade-results</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28290</link>
<guid>6ab025df5539049ffad9e5f29eab084b</guid>
<pubDate>Wed, 24 Dec 2025 23:55:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>grade-results</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3cf40f869236446049606cfe1890ef5473a28fcefe4bffdf48a9673c7675ca2</i><br /><br />Threat actor <b>description</b>: <i>Price ??? Disclosures 0/1</i><br />Target victim <b>website</b>: <i>graderesults.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>eiconnect.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28284</link>
<guid>57ec01697e39d6f606e37cfc93234991</guid>
<pubDate>Wed, 24 Dec 2025 21:20:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>eiconnect.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>391c060e4e4e7afe1816617105c435c1fb6bc14b3354452568d21f278c44005e</i><br /><br />Threat actor <b>description</b>: <i>Electronic Interconnect, often referred to as EI, is a U.S.-based manufacturer and supplier of printed circuit boards (PCBs) headquartered in …</i><br />Target victim <b>website</b>: <i>eiconnect.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>massfd.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28283</link>
<guid>c08876cb72b043bfbd2009cb2f0ecbf5</guid>
<pubDate>Wed, 24 Dec 2025 21:20:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>massfd.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db4fb337840eed6c55aec041ef38ea880b2a3508934d33e458590f52db750383</i><br /><br />Threat actor <b>description</b>: <i>MassFD — as reflected by the domain massfd.org — appears to be the official website of the Massapequa Fire District, …</i><br />Target victim <b>website</b>: <i>massfd.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>cmac-llc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28282</link>
<guid>4af91b65e743af91ae454a32f7717a36</guid>
<pubDate>Wed, 24 Dec 2025 19:26:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>cmac-llc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>efc17ffbe11a3f39ee1b8f757e81beca24129c23ce96ef48caf390f774185be2</i><br /><br />Threat actor <b>description</b>: <i>cMAC LLC is a small, privately-held construction and general contracting firm based in Renton, Washington, serving residential and commercial clients …</i><br />Target victim <b>website</b>: <i>cmac-llc.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Agralite-Electric-Cooperative</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28273</link>
<guid>373590403f80d686f78b18a45ddd22ef</guid>
<pubDate>Wed, 24 Dec 2025 16:36:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Agralite-Electric-Cooperative</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8630be7bd25fd0e1261876cc74bff73e92d553d93e4cf4163c98690f618724e2</i><br /><br />Threat actor <b>description</b>: <i>Alex Rubbish & Recycling provides residential and commercial garbage, recycling, yard waste, and roll-off container services in Alexandria, MN. The company also manages leftover ash/fines, leachate, and organics recycling for the Pope/Douglas Waste to Energy facility. We will upload 136gb of corporate data soon. Detailed personal employee information (name, dob, and other information), client information, NDA and tons of other files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trubee-Wealth-Advisors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28274</link>
<guid>388a513a9cf7a2873844b2d60d57eb8d</guid>
<pubDate>Wed, 24 Dec 2025 16:36:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Trubee-Wealth-Advisors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fccce555a6c417a16536ac3868a21933c1197ca27d9d0f867c0d91da2cdc3e06</i><br /><br />Threat actor <b>description</b>: <i>Trubee Wealth Advisors offers a diverse range of investment services tailored for individuals, small businesses, corporations, andphilanthropic organizations. We will upload 165gb of corporate data soon. Clients and employees information (passports, driver licenses, birth and death certs,w9 forms), accounting, financial statements, benefits, financialanalysis, capital and profit, clearing contract analysis, verification of funds letter, compliance, licensing, HR information, outside brokerage, client DB, confidential client information, NDA and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Watertech-of-America-WorldPoint-ECC-Mastermedia-Garrett-Leather-Guttenberg-Industries.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28275</link>
<guid>f079191821316f4c47d54f841995ae2c</guid>
<pubDate>Wed, 24 Dec 2025 16:36:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Watertech-of-America-WorldPoint-ECC-Mastermedia-Garrett-Leather-Guttenberg-Industries.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe7db00e0c050b1d901232538bc9231d290c496ea9aa7b57c894ebaa55d02f35</i><br /><br />Threat actor <b>description</b>: <i>We obtained more than 12gb of data of the following companies:Watertech of America, Inc. specializes in industrial water treatment services across the Midwest, focusing on boiler water, cooling water, and wastewater treatment. At WorldPoint provides healthcare training services. From curriculum & course materials for American Heart Association (AHA), NAEMT®, AAP, AAOS, and more, to training supplies for CPR & AED training, skill training & simulation, and live rescue. Mastermedia International serves as a trusted voice of faith in the media and entertainment industry, providing pastoral support to the leaders of studios, networks, and production companies. Garrett Leather specializes in high-quality leather products and services, catering to various sectors including automotive, aviation, hospitality, furniture manufacturing, and more.Guttenberg Industries is a full-service custom plastic injection molder, providing high-precision molding and related services globally for almost 50 years. The company specializes in a wide range of capabilities such as in-mold labeling, over-molding, and producing parts of various sizes from small to large.You will find personal employee personal data, client information, numerous project files, accounting and financials and other internal operational files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rafael-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28276</link>
<guid>711dccfb52e41f338d36458ca11cc876</guid>
<pubDate>Wed, 24 Dec 2025 15:57:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Rafael-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee115c0700824c6e99bb891e373e9ce29f11be155a07e3641bfd38d483b00c2d</i><br /><br />Threat actor <b>description</b>: <i>Rafael Construction is a full-service commercial general contractor based in Las Vegas, Nevada, specializing in commercial development with services including ground-up construction, design-build, construction management, and public works projects.We will upload more than 20gb of corporate data soon. Personal employee files (passports, DL, social security numbers ~100), financials, confidential internal files, client information, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Building-Trades</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28277</link>
<guid>46235a3abdd04841af13c4d768f13c21</guid>
<pubDate>Wed, 24 Dec 2025 15:57:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Building-Trades</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7fa4af3e3d7c9f2e439d7c10d2f4b6bf0ed3186609cff8866cbff351b787bc7</i><br /><br />Threat actor <b>description</b>: <i>The Los Angeles/Orange Counties Building and Construction Trades Council represents 48 local unions and district councils, servinga membership of 160,000 skilled workers. They provide rigorous apprenticeship programs, ensuring that members are well-trained for both private and public-sector projects.We will upload 14gb of corporate data soon. Detailed personal information about employees, clients and their families (scans of passports, DLs, complete forms with full personal information, photos and so on), detailed financials, client information, and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>ARO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28258</link>
<guid>61deee96aa0901e6edeb0a4a077ad082</guid>
<pubDate>Wed, 24 Dec 2025 13:54:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>ARO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4160a61cfe1a112e515231e9aa3596ea67bcde0c5cba445b878d6aae65399aea</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Felix-Gonzalez-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28260</link>
<guid>5596542fbe4b92a84e5ff41a01641eee</guid>
<pubDate>Wed, 24 Dec 2025 13:54:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Felix-Gonzalez-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca20694becc88f4ea5c13a37b283255906de7a25f626fe7bf0e6cf721a4e4f88</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Steel-Dynamics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28264</link>
<guid>bc42a91889ffc14111c4eae0557c5259</guid>
<pubDate>Wed, 24 Dec 2025 13:54:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Steel-Dynamics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce316760e7e319d92e19113e44856f40611beb26cd7376da2a8d9515bb09ff8a</i><br /><br />Threat actor <b>description</b>: <i>Steel Dynamics is a leading manufacturer of steel products and provider of metals recycling services operating in the United States and internationally since 1993. The company produces a comprehensive range of steel products including sheet steel, structural beams, rail products, engineered bars, and specialty steel sections. Steel Dynamics also offers metals recycling services, processing both ferrous and nonferrous scrap metals into reusable forms.We are going to upload their corporate data soon. You will find tons of Accounting files, documents, and audits. Upon obtaining this data, you could gain invaluable insights into their company's financial health and strategic direction making.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tri-State-Metal-Roofing-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28255</link>
<guid>7d9b272d3486358dce2f0195fc91c884</guid>
<pubDate>Wed, 24 Dec 2025 12:53:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Tri-State-Metal-Roofing-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5ea1fee9b95e0d756f2417deda5034ed14bdda9411ab6ca29e0ea84c300876d3</i><br /><br />Threat actor <b>description</b>: <i>Tri-State Metal Roofing Supply is Utah's top metal roof supplier offering a variety of roofing and siding materials factory-direct, including standing seam and ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ellison-Educational-Equipment-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28256</link>
<guid>4b1d35d72137cace2f9546ca80eee53f</guid>
<pubDate>Wed, 24 Dec 2025 11:03:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Ellison-Educational-Equipment-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e4a220088167fd6f9beb08fd00acb179ec2f682b2f66fb1313273a2bb0f57a8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>amsino.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28265</link>
<guid>1a7da998ded68c09b6fb68853539e59a</guid>
<pubDate>Wed, 24 Dec 2025 10:17:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>amsino.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6a41c256297a36c04d6a0aee1f8a03b2df4c448ae6db664010f93ef449f8aca</i><br /><br />Threat actor <b>description</b>: <i>Amsinos superior quality and technological advancements have gained the trust of healthcare professionals worldwide. With over 25 years of experience, we are fully aware of what it takes to meet and exceed industry expectations. Our commitment to improving patient care is not only reflected in our p…</i><br />Target victim <b>website</b>: <i>www.zoominfo.com/c/amsino-international-inc/2129982</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>International-Door-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28267</link>
<guid>81aa5aa1989ff76f8f8e5f467814c499</guid>
<pubDate>Wed, 24 Dec 2025 09:51:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>International-Door-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c9f4087f479b1f79029dbd36c37b9b04c9926082a5383a0129f687db577f5d6</i><br /><br />Threat actor <b>description</b>: <i>International Door, Inc</i><br />Target victim <b>website</b>: <i>international-door.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>pellcityschools.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28251</link>
<guid>1dfbac99bfb6d351efe1814d7339e9d9</guid>
<pubDate>Tue, 23 Dec 2025 21:50:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>pellcityschools.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4906cfce26359d37f44dd81e72c31e9d887286e0aaed9542babd35b8041e16e5</i><br /><br />Threat actor <b>description</b>: <i>Pell City Schools is a public K-12 school district based in Pell City, Alabama, serving students from pre-kindergarten through 12th …</i><br />Target victim <b>website</b>: <i>pellcityschools.net</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>SWWC-Service-Cooperative</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28239</link>
<guid>7eb9e62d8ab75192146e99c863a08119</guid>
<pubDate>Tue, 23 Dec 2025 20:01:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>SWWC-Service-Cooperative</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b720a3e58cf18b06a304a409a9f3050ca419f27bacee9ba4e54afda5fc661f8</i><br /><br />Threat actor <b>description</b>: <i>Education</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>CoreHQ</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28240</link>
<guid>0a7428310ebcbb3b8d6760fe98b7158e</guid>
<pubDate>Tue, 23 Dec 2025 20:01:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>CoreHQ</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25a075df84e72e65970d6eac39e888efc234900cd736788635abc79dd30505de</i><br /><br />Threat actor <b>description</b>: <i>Software</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shore-Gardens-Rehabilitation--Nursing-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28241</link>
<guid>c82d64a97a01ac0869fcb90cd22b96c0</guid>
<pubDate>Tue, 23 Dec 2025 20:01:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Shore-Gardens-Rehabilitation--Nursing-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81477fd7df641b5327acb70dfc55ee18d386ee735f6bad82ce72fd8d12aed553</i><br /><br />Threat actor <b>description</b>: <i>Healthcare Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Sonnenschein-Groupe</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28242</link>
<guid>3cc4f07c92a240dd56dcdebf58161f58</guid>
<pubDate>Tue, 23 Dec 2025 20:01:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-Sonnenschein-Groupe</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>59f874d2ae0ee42a279e4c4ae19a56531c4dc748c53baae6489bc12e1240adc5</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jaf-Gifts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28243</link>
<guid>e45f01aa9fb6ae18a5b306a057d7c886</guid>
<pubDate>Tue, 23 Dec 2025 20:01:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Jaf-Gifts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a46e07b6d57458402a3b471dad607143936ce565d66684aba9f8870f758a0c2</i><br /><br />Threat actor <b>description</b>: <i>Accounting Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Accela</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28249</link>
<guid>b229ed523ffbcc8c48d47eb8bcd760c6</guid>
<pubDate>Tue, 23 Dec 2025 17:45:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Accela</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e9b8957606c975758d7a153e52a8a6af1fcae7cefde4e8784fb61e17b528a7e</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Accela is a leading provider of cloud-based productivity and civic engagement applications for government agencies. Their solutions, including permitting, licensing, code enforcement, and public health solutions, are designed to streamline workflow, automate processes, and provide citizen access to various government services. Accela's software platform powers over 2000 governments worldwide.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chatham-Asset-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28230</link>
<guid>b3f7e349cd770760805077c584b137b7</guid>
<pubDate>Tue, 23 Dec 2025 15:53:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Chatham-Asset-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4aa730f42b6d6d3f5d46e44dbc8cfdd6178a66255efd2b3ef10ad518f9d0b4a9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>ruskcountywi.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28232</link>
<guid>476c386f6e35d7cbcf9085354dd035dc</guid>
<pubDate>Tue, 23 Dec 2025 15:53:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>ruskcountywi.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bdf6d07f9d003e50613d3416d48d5e3bbdb589f6cf82f4282665f16068e90337</i><br /><br />Threat actor <b>description</b>: <i>Rusk County, Wisconsin is a community that provides services such as an Airport,...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>ccedarvalleyservices.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28234</link>
<guid>b110ae3636fc62aee44893300d695f99</guid>
<pubDate>Tue, 23 Dec 2025 15:53:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>ccedarvalleyservices.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>37f4e37dad1081f2298ea1ad2dadfad2be20bea1bf590060d25f893af8f6aa04</i><br /><br />Threat actor <b>description</b>: <i>Cedar Valley Services Inc is an employment agency based in Southern Minnesota, o...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.fecrwy.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28235</link>
<guid>408e9a2230d37f5dc50fe7c5a03322c1</guid>
<pubDate>Tue, 23 Dec 2025 15:53:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>www.fecrwy.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a4554316e24935d9cf33b04596beb743290310e3183e7a08edcd5752602ebdec</i><br /><br />Threat actor <b>description</b>: <i>The Florida East Coast Railway freight rail system located along the east coast ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Unified-Assessment-Platform-ExamRoom.AI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28245</link>
<guid>c6bb5b7c76d884e6ee984f5f2132f42f</guid>
<pubDate>Tue, 23 Dec 2025 14:42:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>crypto24</b> claims attack for <b>Unified-Assessment-Platform-ExamRoom.AI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e7f7b5291cb162b84ca7cf43fd1e139762b0f299ef69bde23162793c86b4a60</i><br /><br />Threat actor <b>description</b>: <i>***</i><br />Target victim <b>website</b>: <i>examroom.ai</i>]]></description>
<category>crypto24</category>
</item>
<item xmlns:dc='ns:1'>
<title>Woodglen-Medical-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28228</link>
<guid>90f0b00fd44ae507b39ff6d87e26f2b2</guid>
<pubDate>Tue, 23 Dec 2025 00:17:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Woodglen-Medical-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>272a0ace56c0be92a5cd85ce24303b7510e491ccee1893181d43a7f81a3c1fdc</i><br /><br />Threat actor <b>description</b>: <i>The biggest leak of boobies!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Center-for-Life-Resources-ECI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28225</link>
<guid>66c2f73dac3dd6c9f20921b76563bafe</guid>
<pubDate>Mon, 22 Dec 2025 23:10:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Center-for-Life-Resources-ECI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0bf6dbfb13e0eb1cb4081017beb0bbbdf599d87cce7959e3bd677463178aef4f</i><br /><br />Threat actor <b>description</b>: <i>Center for Life Resources is dedicated to enhancing the quality of life for individuals in Central Texas by providing a range of services including adult and children's mental health support, substance use services, and assistance for individuals with Intellectual and Developmental Disabilities. The organization operates a 24-hour crisis intervention hotline and collaborates with local law enforcement and hospitals to ensure comprehensive care. Their intended clients include individuals facing mental health challenges, families in need of support, and those requiring crisis intervention. With multiple locations across several counties, they aim to serve the diverse needs of their community.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Geometrics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28226</link>
<guid>68ab14b322fecf44196cc1186f167857</guid>
<pubDate>Mon, 22 Dec 2025 23:10:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Geometrics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ae0a305f67d0a6e4da820db5b30e2529f0e406b6b3923fc511c5b800293a689</i><br /><br />Threat actor <b>description</b>: <i>Geometrics is a division of OYO Corporation and headquartered in San Jose, CA. The company is a designer and manufacturer of land, marine and airborne geophysical hardware, sensors and software, covering seismic, magnetic, and electromagnetic technologies. Founded in 1969, Geometrics began operations developing magnetometers.</i><br />Target victim <b>website</b>: <i>www.geometrics.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Total-Air-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28227</link>
<guid>2cfdbddf1acf5da263a3c43ab7b9f371</guid>
<pubDate>Mon, 22 Dec 2025 23:09:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Total-Air-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0b6ef0b876d37c80342d0593bd012fad2ed97da9a5c4d5e683d370bdee8e2da</i><br /><br />Threat actor <b>description</b>: <i>Total Air Solutions has been keeping customers cool, comfortable, and happy since 2003. We provide a full range of residential and commercial HVAC services in the Gulf Coast communities from Longboat Key to Punta Gorda Isles, including new installation, seasonal maintenance, repair, and air filtration. Contact us at 1-888-426-1770 for convenient scheduling, free estimates on new systems, and our "No Lemon Warranty. At Total Air Solutions, we are dedicated to serving your best interests.</i><br />Target victim <b>website</b>: <i>www.totalairsolutions.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hanlon-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28224</link>
<guid>d917e680c14c6fcd74d08c935436f1b5</guid>
<pubDate>Mon, 22 Dec 2025 22:09:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Hanlon-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>006508ac53b86a6bf4392027d59ac711ce1ed2558f848ede6a1d8c2d9795eb73</i><br /><br />Threat actor <b>description</b>: <i>Hanlon Electric Company is a full-service electrical contractor based in Pittsburgh, specializing in minimizing downtime and maximizing electrical efficiencies. They offer a wide range of services including electrical construction, building maintenance, telecommunications, and eco-friendly energy solutions. The company serves various sectors, including commercial, industrial, educational, and medical facilities, and is committed to safety and quality. Established in 1930, Hanlon Electric is dedicated to providing cost-effective solutions tailored to the needs of its clients.</i><br />Target victim <b>website</b>: <i>www.hanlonelectric.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Acme-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28221</link>
<guid>2752a6fc31927efaf4ff9f54b1c769cb</guid>
<pubDate>Mon, 22 Dec 2025 17:58:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Acme-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>55b557241f4d21c9ee7f93f73705aebb66bddcfb7767540ef32effad8866a114</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.acmeelectriccompany.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Scenic-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28220</link>
<guid>1deac92dd0c21ea46585fe693b4330ec</guid>
<pubDate>Mon, 22 Dec 2025 17:57:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Scenic-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab65a5e3b8a6f0e8b8577ec2bdfabd0aa98bd39976b538b25ef63e4a8eb9e119</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.scenicsolutions.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Besco-Electrical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28219</link>
<guid>941510c72491f8137e7f4a306aefe69b</guid>
<pubDate>Mon, 22 Dec 2025 17:55:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Besco-Electrical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bba03fede95b8310bec09ea0405cfb84bd2fb7a691edf361b01f65b93d6dbd3d</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.bescoelectrical.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Swartz-Campbell</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28215</link>
<guid>738c045d6205c050d3d6c57e5e6f2d76</guid>
<pubDate>Mon, 22 Dec 2025 15:53:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Swartz-Campbell</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>11703c750b007a4a777d0dfeae0878a6850360f32d067b5f093dea3919c8d071</i><br /><br />Threat actor <b>description</b>: <i>Swartz Campbell LLC is a law firm with multiple locations across the East Coast specializing in areas including class action, employment, medical malpractice, and divorce. The law firm was founded in 1921 and is headquartered in Philadelphia, Pennsylvania.</i><br />Target victim <b>website</b>: <i>https;www.swartzcampbell.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lugiano-Medical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28213</link>
<guid>e601ac8ec15075e6c6d0831dbd5a9c81</guid>
<pubDate>Mon, 22 Dec 2025 15:10:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Lugiano-Medical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>606fca746ca37ee8d6d41bb0775e29c01f211328650b5d4d60dde4ff751399f5</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.lugianomedical.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>GOOD-Foundation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28196</link>
<guid>8b9845fa0b5ce34fb2de2050a0bb1353</guid>
<pubDate>Mon, 22 Dec 2025 13:26:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>GOOD-Foundation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fee7bfdda05b817df18f1eec7e603d710f85b11e0f1ae6447589e49a8d32a5ec</i><br /><br />Threat actor <b>description</b>: <i>Non-Profit & Charitable Organizations</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hongfa-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28197</link>
<guid>408567fb466fdcc5171cd962e3c83862</guid>
<pubDate>Mon, 22 Dec 2025 13:26:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Hongfa-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8384b97169755881b02e5bbed7f992159dd67aeb4051a87617f4933231a5848</i><br /><br />Threat actor <b>description</b>: <i>Accounting Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eanes-ISD-schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28198</link>
<guid>13efec348e66852991bc20ed97caa574</guid>
<pubDate>Mon, 22 Dec 2025 13:26:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Eanes-ISD-schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b28158c1dd80c21ebcc20ead2b379454b4e12d54ee4e8d31c541a74b52bdeace</i><br /><br />Threat actor <b>description</b>: <i>Education</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cedar-Valley-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28191</link>
<guid>06efc3b2376e4b23e284094112b8ce94</guid>
<pubDate>Mon, 22 Dec 2025 01:27:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Cedar-Valley-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5d576f97128fe147e8f4bf3344292b2b4262e6f81891b5082f284078d093851a</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Empire-Screen-Printing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28192</link>
<guid>95ca43b0dd15e6c2017380002b8b3851</guid>
<pubDate>Mon, 22 Dec 2025 00:26:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Empire-Screen-Printing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9b560c3f26629d018f811c9ad18e36ab11c34d155a662033b88372ebd969c0fd</i><br /><br />Threat actor <b>description</b>: <i>Empire Screen Printing, Inc. provides screen printing. The Company flexography, digital printing, and doming. Empire Screen Printing services customers in the United States.</i><br />Target victim <b>website</b>: <i>www.empirescreenprinting.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>svlawus.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28187</link>
<guid>f52a97aeb3db83504088d414ae36a7b9</guid>
<pubDate>Sun, 21 Dec 2025 12:10:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>svlawus.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea1db79d57e2b5e9d9cd63d0045fffb5962cd94b326a2d0fcd0454154e0d1a8f</i><br /><br />Threat actor <b>description</b>: <i>COMPOSITION OF FIRMS:  >svlawus.com Sanchez Vadillo LLP is a full-service boutique law firm established in 1999, dedicated to providing strategic and efficient legal counsel to individuals, businesses, and financial institutions. The firm specializes in various practice areas including business closings, civil litigation, corporate counsel, family law, immigration, and real estate transactions. With a team of 10 attorneys and 30 staff members, they prioritize professionalism and exceptional client solutions. Their commitment to excellence is reflected in numerous awards, including multiple Top Producer recognitions from Old Republic Title Insurance. Employees: 50 Revenue: $6.3 Million Industry: Law Firms & Legal Services   Phone Number: (305) 436-1410  >eagrealtyinternational.com  EAG Realty International specializes in assisting clients with buying, selling, and leasing real estate properties, including residential and commercial options in the South Florida area and internationally. The company is committed to providing a high degree of service and professionalism, ensuring a smooth and pleasurable experience for its clients. With a team of licensed real estate agents, EAG Realty offers expert guidance in property valuation and market insights. Their clientele includes individual buyers and sellers, as well as international investors seeking property opportunities. Employees: 200 Revenue: $17.7 Million Industry: Real Estate Phone Number: (305) 477-4413  >torresvadillollp.com  Employees: 50 Revenue: $5 Million Industry: Law Firms & Legal Services   Phone Number: (214) 295-8473  >mytitlelogic.com Employees: 50 Revenue: $5 Million Industry: Consumer Services Phone Number: (727) 823-7778</i><br />Target victim <b>website</b>: <i>svlawus.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kucera-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28184</link>
<guid>b137eb4183c4e03586f8ae9257bbf3bc</guid>
<pubDate>Sat, 20 Dec 2025 19:07:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Kucera-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2125f94e6327079d5237b6c80f4e28ef82ef8caae6d87a99a5f0bddb8c95bbfa</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.kucerainternational.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Titan-Motor-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28182</link>
<guid>abffbd61825be76adbbe7bf96233f42b</guid>
<pubDate>Sat, 20 Dec 2025 16:56:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Titan-Motor-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>666892b007739cfc41e5705f0830300604037eac03f4ab1c6cf4404c2d168f3c</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.titanmotorgroup.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dolan-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28181</link>
<guid>f9e6aa5c93154c16fc5fa8382d8b8de6</guid>
<pubDate>Sat, 20 Dec 2025 16:55:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Dolan-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b9a0e0fdd673066fef5e9058032d3bce85f888795fbda4994e9bcf60103212bc</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.dolanconstructioninc.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>IAPMO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28178</link>
<guid>479eaa8e93a42b42d12992f086cfa14f</guid>
<pubDate>Sat, 20 Dec 2025 15:26:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>IAPMO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8fc5d6796ae237983fb8c47e1571df57daf99ac7f40df690926421f6045f4370</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.iapmo.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Homestead-Electrical-Contracting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28173</link>
<guid>d80f8d2f11bbd1a8ab728b02fa3cd66a</guid>
<pubDate>Sat, 20 Dec 2025 12:54:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Homestead-Electrical-Contracting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3a6ff9e5f9d534f210ba42bd7f64b6f14bcfdef13e2d886ae52b45ffd60f40c</i><br /><br />Threat actor <b>description</b>: <i>Homestead Electrical Contracting, LLC has been providing a range of electrical services since 1981, focusing on core values such as honesty, integrity, and teamwork. Their offerings include electrical design and build, high voltage wiring, fire alarm system installation, and maintenance agreements available 24/7. The company caters to a diverse client base, including notable names like Walgreens Corporation and Lake County Water Reclamation District. They strive to maintain strong relationships with their clients while ensuring high-quality service and client satisfaction.</i><br />Target victim <b>website</b>: <i>www.homesteadelectricalcontracting.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Insight</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28175</link>
<guid>e1e266b5bbdb6da994c4f9cb09635d10</guid>
<pubDate>Sat, 20 Dec 2025 12:21:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Insight</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cfd346331b01985fe4eb1100b2213d6063f03457dd783b2a0cc1a4022c236f81</i><br /><br />Threat actor <b>description</b>: <i>Insight is a leading solutions and systems integrator — providing computer hardware, software, cloud solutions and IT services to business, gover...</i><br />Target victim <b>website</b>: <i>insight.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rio-supermarket</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28171</link>
<guid>bf74cbe3722200f6fad86af0b239d900</guid>
<pubDate>Sat, 20 Dec 2025 09:26:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Rio-supermarket</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a21dcf7a84eb8dc2a188f50090fb97b482cd4954937072f8a2516c87ace205d</i><br /><br />Threat actor <b>description</b>: <i>Food & Beverage</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Deibel-Laboratories</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28170</link>
<guid>9390f4d0da32633807f299e76c568ace</guid>
<pubDate>Fri, 19 Dec 2025 23:19:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Deibel-Laboratories</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e81322c9a0beaed1aab8ad125c7e95d96d11c29b5653a11a1e3e4b69f8522ceb</i><br /><br />Threat actor <b>description</b>: <i>Data breach at a U.S. food safety and quality testing laboratory.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Turnamics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28169</link>
<guid>c12bc20ecfdf52bc1f65d6dbebdbee94</guid>
<pubDate>Fri, 19 Dec 2025 22:26:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Turnamics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e77a3b11291edfef7ffc1a66624491de9f22051858f4790d7b199c5c29231b3</i><br /><br />Threat actor <b>description</b>: <i>Turnamics, Inc. is a contract manufacturer based in Asheville, NC, specializing in short to medium production runs of machined parts since 1969. The company has evolved from a small turning shop into a world-class manufacturing operation, employing nearly 75 skilled individuals. Turnamics is committed to quality and utilizes advanced machining techniques to meet diverse manufacturing needs. Their services cater to clients seeking reliable and precise machining solutions.</i><br />Target victim <b>website</b>: <i>www.turnamics.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>North-Star-Asset-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28167</link>
<guid>bbdbf47737d418bdc77c73ef28c50a49</guid>
<pubDate>Fri, 19 Dec 2025 21:46:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>North-Star-Asset-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6b6162863a9432b0d148019cf1379cf012f7f4b372e5647648b7441613e12de</i><br /><br />Threat actor <b>description</b>: <i>North Star Asset Management, Inc. is a prominent independent SEC Registered Investment Advisory firm based in Wisconsin, managing nearly $3 billion in assets. They offer tailored investment management and retirement planning services for families, corporations, and endowments, always prioritizing client interests as fiduciaries. Their team consists of 11 investment professionals, including 9 CFA Charterholders and 2 CFP professionals, boasting over 200 years of combined investment experience. North Star is recognized for its personalized and independent financial advice, charging a fee of 0.6% of managed assets.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>eagrealtyinternational.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28163</link>
<guid>69812e3f04486f27c1b6f6d2820e5c90</guid>
<pubDate>Fri, 19 Dec 2025 19:54:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>eagrealtyinternational.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cea08e5dba09570600660968a23e6e711dbce2d65c0472bf2787833d5a2c2247</i><br /><br />Threat actor <b>description</b>: <i>COMPOSITION OF FIRMS:  >svlawus.com Sanchez Vadillo LLP is a full-service boutique law firm established in 1999, dedicated to providing strategic and efficient legal counsel to individuals, businesses, and financial institutions. The firm specializes in various practice areas including business closings, civil litigation, corporate counsel, family law, immigration, and real estate transactions. With a team of 10 attorneys and 30 staff members, they prioritize professionalism and exceptional client solutions. Their commitment to excellence is reflected in numerous awards, including multiple Top Producer recognitions from Old Republic Title Insurance. Employees: 50 Revenue: $6.3 Million Industry: Law Firms & Legal Services   Phone Number: (305) 436-1410  >eagrealtyinternational.com  EAG Realty International specializes in assisting clients with buying, selling, and leasing real estate properties, including residential and commercial options in the South Florida area and internationally. The company is committed to providing a high degree of service and professionalism, ensuring a smooth and pleasurable experience for its clients. With a team of licensed real estate agents, EAG Realty offers expert guidance in property valuation and market insights. Their clientele includes individual buyers and sellers, as well as international investors seeking property opportunities. Employees: 200 Revenue: $17.7 Million Industry: Real Estate Phone Number: (305) 477-4413  >torresvadillollp.com  Employees: 50 Revenue: $5 Million Industry: Law Firms & Legal Services   Phone Number: (214) 295-8473  >mytitlelogic.com Employees: 50 Revenue: $5 Million Industry: Consumer Services Phone Number: (727) 823-7778</i><br />Target victim <b>website</b>: <i>eagrealtyinternational.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>rogitz.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28162</link>
<guid>89fb52e6ca126344d7c493e22ad1e1f7</guid>
<pubDate>Fri, 19 Dec 2025 18:48:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>rogitz.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>942d00e3868762b6436e7bc6fd8e3810a4fd6c68e8f31ed27d9c41142ff4575b</i><br /><br />Threat actor <b>description</b>: <i>Rogitz & Associates was a small intellectual property law firm based in San Diego, California, specialising in patent prosecution, patent …</i><br />Target victim <b>website</b>: <i>rogitz.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>springersjewelers.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28160</link>
<guid>4e8e25b6b415f4026f6fd44b5ddd7c76</guid>
<pubDate>Fri, 19 Dec 2025 18:47:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>springersjewelers.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff07d40b2958d0b9648999629ed21529199fcb5d1e2d8cad41301649fd69e1cd</i><br /><br />Threat actor <b>description</b>: <i>Springer’s Jewelers is a historic family-owned jewelry retailer based in Portland, Maine, with additional store locations in Bath, Maine and …</i><br />Target victim <b>website</b>: <i>springersjewelers.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>coloradopowerline.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28156</link>
<guid>03bb3e5b97d32f9dd98b94845d9b2650</guid>
<pubDate>Fri, 19 Dec 2025 18:45:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>coloradopowerline.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>02d1b06f6a592ffe659155241521640d9a124f924a6a6abb73239c8862a804ff</i><br /><br />Threat actor <b>description</b>: <i>Colorado Powerline, Inc. (often abbreviated CPI) is a U.S. electrical infrastructure construction company headquartered in Sedalia, Colorado. Founded in 2006, …</i><br />Target victim <b>website</b>: <i>coloradopowerline.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>keystoliteracy.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28133</link>
<guid>25ca7e9577b39f7730394bc4db6b58ab</guid>
<pubDate>Fri, 19 Dec 2025 16:13:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>keystoliteracy.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19886bb0ab2e6b0b85fb6a22f3a652e63d03731ff6ac19232b4d716750045aa8</i><br /><br />Threat actor <b>description</b>: <i>Keys to Literacy is a premier provider of literacy teacher training, curriculum, and ongoing coachin...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>pdcm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28134</link>
<guid>04a1d468059361fc702a1b8574f7c27f</guid>
<pubDate>Fri, 19 Dec 2025 16:13:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>pdcm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d2f492e3a73e1a529f6c067196f49e746328c7344aa1f24de31b568ddc8f4d13</i><br /><br />Threat actor <b>description</b>: <i>We offer a range of insurance types from business and group insurance to individual life and health....</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>tuscon-physicans.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28135</link>
<guid>3f12cc3464d7a80a7706f970dc254bb7</guid>
<pubDate>Fri, 19 Dec 2025 16:13:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>tuscon-physicans.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bdc196df0dcb896dd382aab70db2c235927ec3a50ac063c3be823c4c9b3b3499</i><br /><br />Threat actor <b>description</b>: <i>A community of highly skilled, board certified doctors, specializing in General, Orthopedic, Plastic...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>clarindahealth.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28136</link>
<guid>62e0f0199800c074f93589f48fa8d509</guid>
<pubDate>Fri, 19 Dec 2025 16:13:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>clarindahealth.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7405fc9f012c9f55519aa9963c2789721f8731153462addb5d4f7a4d4db1acea</i><br /><br />Threat actor <b>description</b>: <i>CRHC offers an array of medical and rehabilitative services, including respiratory therapy, physical...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>firstrateak.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28139</link>
<guid>b589775cf387584a460c9a316b24ad74</guid>
<pubDate>Fri, 19 Dec 2025 16:13:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>firstrateak.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a5b3d110db412a2312737aa80eb32ff869574864d3dc3c60dec0cc05267d15d</i><br /><br />Threat actor <b>description</b>: <i>First Rate Financial is a mortgage brokerage focused on industry leading communication, technology,...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>jvdbassoc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28140</link>
<guid>6e6d5361da6fb4a2d24b4ef90f224f46</guid>
<pubDate>Fri, 19 Dec 2025 16:13:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>jvdbassoc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9bc050c14b1c3d904c86ad310ab35f6019ba509783c22adda75948754af5fd58</i><br /><br />Threat actor <b>description</b>: <i>JVDB &amp; Associates Inc is located in Elgin, Illinois, and was founded in 1999. At this location,...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>Global-Miami-JV</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28142</link>
<guid>99a57cbf9929486ac2e6f630447cc6f2</guid>
<pubDate>Fri, 19 Dec 2025 16:11:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Global-Miami-JV</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>37bd072f19ac9f90cc45304d8ed2f84b5893db4ac25d46ce0f56844378febf32</i><br /><br />Threat actor <b>description</b>: <i>Global Miami Joint Venture operates as a franchise organization under the larger Manchu WOK brand. The company operates franchise locations in Miami, Florida, and conducts its business within thenan sector.We will upload corporate data soon. Employees personal documents (passports, DLs and so on), detailed financials, numerous projects, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Susquehanna-Glass</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28143</link>
<guid>80cb2002656131b6ee8c02ab8fe076e0</guid>
<pubDate>Fri, 19 Dec 2025 16:11:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Susquehanna-Glass</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a0936b57f215d5f896a1265db3ae171f0938a39e8a427f99e64ad485ae2e6967</i><br /><br />Threat actor <b>description</b>: <i>Susquehanna Glass is a family-owned and operated business. Today,it flourishes under the leadership of third-generation owner Walt Rowen, the grandson of original partner, Walter Roye.We will upload 35gb of corporate data soon. Detailed personal information of almost 800 people (i-9 forms, scans of passports, DLs, SSNs, drug test ans so on), detailed financials, customer information, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shamrock-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28122</link>
<guid>3948730d3bfbcc822e6cebe4361364ba</guid>
<pubDate>Fri, 19 Dec 2025 14:52:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Shamrock-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c227043ec850401a01d0b56d3d0d929f65b81c2b3d2891e40f37eacdc7827f9e</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1941, Shamrock Technologies is a global provider of micronized polytetrafluoroethylene products. They also offer a line of specialty micronized powders, dispersions, emulsions, and compounds including PTFE, polyethylene, polypropylene, fluoropolymers, custom wax alloys, natural waxes, and other specialty additives. Their products are found in inks and coatings, thermoplastics, greases, elastomers, personal care products, and other specialty applications. 
The company headquarters is located in Newark, New Jersey. 51-200 Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>l.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28125</link>
<guid>f6a0809b7f72d3310dc58ff04b5fadd8</guid>
<pubDate>Fri, 19 Dec 2025 14:52:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>l.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b7c65cdf2899f956530edc15df48a199592e7a60092d403a373d815d504aff80</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Colonial-Metals</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28147</link>
<guid>70ba980356d834b5d3ca215040c64e2f</guid>
<pubDate>Fri, 19 Dec 2025 14:15:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Colonial-Metals</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c6320dbbb085dba42d88ab8da5b1d5a3972f6a604661cdfdef491de5d6854b69</i><br /><br />Threat actor <b>description</b>: <i>Colonial Metals, Inc. is a full-service global supplier specializing in over 600 precious metal-based chemicals and services. The company is dedicated to providing personal and reliable customer service, fostering trust and comfort among its clients. Committed to sustainability, Colonial Metals aims to reduce greenhouse gas emissions by 25% by 2030 through various environmental initiatives. Their product offerings include refining services, analytical capabilities, and custom synthesis for various industrial markets</i><br />Target victim <b>website</b>: <i>colonialmetals.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Flavor-Producers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28144</link>
<guid>945628f89a79f5c21148e6c85b241947</guid>
<pubDate>Fri, 19 Dec 2025 14:05:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Flavor-Producers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>84e01ba3a57fedadd389b3a1a62f26a0cd270d848279c102076f607d212d9902</i><br /><br />Threat actor <b>description</b>: <i>https://flavorproducers.com/ https://www.zoominfo.com/c/flavor-producers-inc/23530808 Flavor Producers is a leading manufacturer specializing in organic, natural, and plant-based flavors and extracts. The company focuses on creating new taste experiences tailored for food, nutrition, and beverage applications, addressing the growing consumer demand for transparency and quality. Through innovative technologies and a versatile portfolio, Flavor Producers offers a variety of flavor profiles to inspire culinary creativity. Their services cater to manufacturers seeking to enhance their products with superior taste solutions. Full customer database and a lot of additional info.</i><br />Target victim <b>website</b>: <i>www.zoominfo.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Genesis-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28132</link>
<guid>2ccc3ed7fd2601e8f77299ddbf89cbcb</guid>
<pubDate>Fri, 19 Dec 2025 12:38:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-Genesis-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>795255c9e559c0762933c55fa601247792609d010e3d95cc74a5d71599119aac</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.genesisworld.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Maison-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28131</link>
<guid>a8d6452ad4feb2545d93de0400874b63</guid>
<pubDate>Fri, 19 Dec 2025 12:37:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Maison-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4b80fdbd3e275e8b4a42fe14337e13eb164a169392f50fa55ffd0b14262c1fd4</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.maisonlaw.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Larry-Pitt--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28130</link>
<guid>f65ee09b9fc46b70d8a901dac2977363</guid>
<pubDate>Fri, 19 Dec 2025 11:31:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Larry-Pitt--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>475c7b40801c6d9b59db310dbd0ec4c59c5accf512890cdbfc4ebcb62f244be2</i><br /><br />Threat actor <b>description</b>: <i>Larry Pitt & Associates</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Josh-Steel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28114</link>
<guid>2791cbf7a6b8b8c08804168ddcf1c172</guid>
<pubDate>Fri, 19 Dec 2025 11:26:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Josh-Steel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a035071c26522db3f1cf6f2217bd197bf192753b48a2cce795ea8caba1b1d68</i><br /><br />Threat actor <b>description</b>: <i>Industrial Machinery & Equipment</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lawsoft</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28126</link>
<guid>d010cdb000ad9085cc4b563736ba8607</guid>
<pubDate>Fri, 19 Dec 2025 10:27:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Lawsoft</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a0b47c936731c94677e738ad6ead68874673dcc447a2088224cb7309cb572bb7</i><br /><br />Threat actor <b>description</b>: <i>LawSoft, Inc. specializes in providing scalable and customizable software solutions for law enforcement agencies, including Computer-Aided Dispatch (CAD), Records Management Systems (RMS), and Fire EMS systems. Their products aim to streamline reporting and data integration, boasting a user-friendly design and incorporating legacy system data for a cohesive experience.</i><br />Target victim <b>website</b>: <i>www.lawsoft-inc.com</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>allenprinting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28127</link>
<guid>4da9e81f4bb667b11e3b1064b10fb2c3</guid>
<pubDate>Fri, 19 Dec 2025 09:40:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>tridentlocker</b> claims attack for <b>allenprinting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f8fb4a50f3cd2fee54d6d7c9defecd929d7c37d7e2ef93deaa55797581999d0</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Allen Printing is a Nashville-based company that offers commercial printing and direct mail services. They have been in business for over 80 years, providing a variety of services including digital printing, offset printing, bindery, and graphic design. Their clientele ranges from local businesses to renowned corporations. They pride themselves on their quality, service, and timely delivery.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>tridentlocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clarksville-ISD</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28112</link>
<guid>a311dd84030f32ea6e0550b09f5869eb</guid>
<pubDate>Thu, 18 Dec 2025 22:27:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Clarksville-ISD</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8c27d6cc54e82c42df4527095034a674dbe83e826cfe3af678cffceafb7b0a0</i><br /><br />Threat actor <b>description</b>: <i>Once again, we see how a certain school organization, Clarksville ISD, was attacked and compromised due to the negligence and irresponsibility of employees with other people's data, that is, other people, as a result of which a large amount of confidential data was compromised, including the SNN of all students for the entire year, as well as all employee data, including SNN, banking transactions, and financial components.</i><br />Target victim <b>website</b>: <i>clarksvilleisd.net</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pacific-Rim-Mechanical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28100</link>
<guid>aa6753f1f7962a29a43ffa397473774f</guid>
<pubDate>Thu, 18 Dec 2025 22:24:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Pacific-Rim-Mechanical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>021134b6389fdcea78132e862631d81ce88d4cbba01f1f712b556ef12791b1a6</i><br /><br />Threat actor <b>description</b>: <i>Pacific Rim Mechanical (PRM) is a Southern California-based mechanical contractor (HVAC, Plumbing, Energy Solutions) serving commercial, industrial, healthcare, and biotech sectors since 1987,  known for high-quality construction, maintenance, and repair services, focusing on integrity,  safety, and long-term client partnerships through expertise and innovation like BIM modeling.  Clients: Sony, SpaceX, THERMA LCC, ASML LCC... Laek: 100GB  WE HAS COLLECTED SUCH DATA AS:   - Confidential documents - Clients Data - NDA - Financial data - Operations - Corporate data - Business Agreements - Development  - Drawings  And a lot of other VERY IMPORTANT information!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Heritage-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28110</link>
<guid>43102e91c7b170ead9cc2f6f0a37f1af</guid>
<pubDate>Thu, 18 Dec 2025 21:31:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Heritage-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>980723c9446c776701c9278b8240ae1dd3694d9a8b8d809aa0d31631efb41de4</i><br /><br />Threat actor <b>description</b>: <i>Heritage Engineering prides ourselves on repeat business by ensuring high customer satisfaction on each and every project. Our team is ready to assist you in any size project. We work closely with each of our clients to ensure that we deliver outstanding service and high quality designs that are completed on time and within budget. If you would like to discuss a project please contact us. We look forward to working with you.</i><br />Target victim <b>website</b>: <i>www.heritageengineering.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>RK-Centers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28111</link>
<guid>eff273b8ff65204546e793d51f41ab68</guid>
<pubDate>Thu, 18 Dec 2025 21:31:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>RK-Centers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f0419b3765b065e544e27f8cdcff75793796d0eb542b272f3ae7035f02129fe8</i><br /><br />Threat actor <b>description</b>: <i>RK Centers is a family-owned real estate development company specializing in the acquisition, development, and operation of prime open-air regional and community shopping centers in New England and South Florida. The company currently manages over 10,000,000 square feet of retail and office space, catering to a diverse clientele. With a focus on grocery-anchored and convenience retail centers, RK Centers aims to enhance community shopping experiences. Their extensive portfolio includes properties across multiple states, including Massachusetts, Florida, and Rhode Island.</i><br />Target victim <b>website</b>: <i>www.rkcenters.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ragland--Jones-LLP.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28101</link>
<guid>9dd3ecb6819c19341cce4399afa2c7dd</guid>
<pubDate>Thu, 18 Dec 2025 21:30:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Ragland--Jones-LLP.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6460db36e499fc4050c03fca1c877386a4b462ca865a54e2f845bc989221f96</i><br /><br />Threat actor <b>description</b>: <i>Providing estate planning, real estate law, business formation, and other legal services in the Harrison area, Ragland Law Firm is ready to provide you with the services you need. Call (870) 741-4490 for more info.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>L-S-GRIM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28102</link>
<guid>f6a81a05f0dc6797d195dfb9aad909bb</guid>
<pubDate>Thu, 18 Dec 2025 21:30:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>L-S-GRIM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7e1c7c8eee19084badff1c5293694fd68bf5ba73d436846775ba20e0709c60a8</i><br /><br />Threat actor <b>description</b>: <i>L.S. Grim Consulting Engineers is a Mid-Atlantic-based engineering services corporation specializing in mechanical, electrical, and plumbing engineering design and consulting. They offer a variety of services including electrical systems, fire protection, and project management, all designed to meet code requirements and support LEED certification. With over 30 years of experience, their team focuses on quality control and effective project management to ensure client satisfaction. Their intended clients include organizations needing comprehensive engineering solutions and facilities management.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>South-Shore-Tool--Die</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28103</link>
<guid>cc0d9865e5284b52347fc0417b99b0c8</guid>
<pubDate>Thu, 18 Dec 2025 21:30:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>South-Shore-Tool--Die</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>119eabda0820914020ddc9a22c1dd6778dd06fbcd87e3b3568716ce1f91c0d5b</i><br /><br />Threat actor <b>description</b>: <i>South Shore Tool and Die specializes in precision machining services across various industries, including food processing machinery, machine tools, and plastic and blow molding machine builders. They also cater to sectors such as printing press manufacturing, pump manufacturing, off-road construction, railroad, and robotics. Their diverse client base reflects their capability to meet the needs of multiple markets. The company is located in Benton Harbor, Michigan.</i><br />Target victim <b>website</b>: <i>www.southshoretoolanddie.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lawrence-Family-Jewish-Community-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28104</link>
<guid>8702581b10fc44c8ee9021a967744624</guid>
<pubDate>Thu, 18 Dec 2025 21:29:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Lawrence-Family-Jewish-Community-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ec36a393c42362bae572f855f7495ea150ac5722f14c30ea9fc5250d90aefe4</i><br /><br />Threat actor <b>description</b>: <i>The Lawrence Family Jewish Community Center (LFJCC) offers a diverse range of programs and services aimed at fostering community among San Diego's Jewish population as well as the general public. Their offerings include sports, fitness, aquatics, early childhood education, and various cultural events that cater to all age groups. The center emphasizes inclusivity and welcomes individuals from any background or faith to participate in their programs. Key initiatives include youth camps, educational classes, and cultural events that celebrate Jewish heritage and community engagement.</i><br />Target victim <b>website</b>: <i>www.lfjcc.org</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Optimum-Window-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28105</link>
<guid>4231962b766e3f90f64fa07e4fc2d5cf</guid>
<pubDate>Thu, 18 Dec 2025 21:29:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Optimum-Window-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2098e61d586a5aaa305894a0a4dca341ce2d12e5ee391c640391d8b4ee7e8923</i><br /><br />Threat actor <b>description</b>: <i>Optimum Window Mfg is the largest and most diversified manufacturer of steel windows and doors in the United States, offering custom high-tech metal systems for commercial and high-end residential applications since 1985. The company specializes in a wide range of products including fire-rated and non-rated steel windows and doors, aluminum windows and doors, as well as bronze and stainless steel options. Optimum collaborates closely with architects to create custom designs that merge performance, structural integrity, and aesthetic appeal. Their mission emphasizes the importance of precision craftsmanship and technology to deliver unique, high-quality products tailored to their clients' specifications.</i><br />Target victim <b>website</b>: <i>www.optimumwindowmanufacturing.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Behr-Enterprises</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28109</link>
<guid>9dfcbc9897ad8f393da9c34d4883524f</guid>
<pubDate>Thu, 18 Dec 2025 21:28:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Behr-Enterprises</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cfc7e4ca535b602a1349e5a0a01bd295fe1a042fe79a5534bfae60404262c8fc</i><br /><br />Threat actor <b>description</b>: <i>Behr Enterprises is a Wisconsin-based metal fabrication company specializing in a wide range of services including laser cutting, welding, machining, and assembly. They cater to industrial, commercial, and residential clients, offering both high volume manufacturing capabilities and custom specialty designs. The company prides itself on providing 'drop everything' service, ensuring projects are completed on time with the highest quality craftsmanship. With a team of skilled fabricators and state-of-the-art machinery, Behr Enterprises is committed to delivering precision and reliability in metal fabrication.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Associated-Thermoforming</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28097</link>
<guid>3090f54f8d8eecd6469c3a9eb3ddb48a</guid>
<pubDate>Thu, 18 Dec 2025 20:26:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Associated-Thermoforming</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>827784a5ebcf6f1ae4c1ca88dc0261356799f330b8b6c443ff780923d9e27de3</i><br /><br />Threat actor <b>description</b>: <i>Associated Thermoforming offers a full range of services. ATI specializes in technically challenging custom thermoforming solutions, including vacuum forming, pressure forming, and twin sheet forming.We will upload 582gb of corporate data soon. Employees personal documents (passports, DLs and so on), financial information, client information, numerous projects, NDAs, confidential files, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>L.O.-Trading</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28095</link>
<guid>c4caf9e04a0d4f83565449f2cce9d5d5</guid>
<pubDate>Thu, 18 Dec 2025 18:26:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>L.O.-Trading</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>635bedb76423b6da9d968b0f45de42fa10e9d3157e1c9d77d48012867f4fd441</i><br /><br />Threat actor <b>description</b>: <i>L.O. Trading is a leading Technical Trading and Logistics Company that specializ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Farwest-Fabrication</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28088</link>
<guid>2c3f3db53ca4d872f79d87ec33c8c5fd</guid>
<pubDate>Thu, 18 Dec 2025 16:27:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Farwest-Fabrication</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>379fdee1fe221bcc92b954e797625d183a7a3bd9328a7ee32127316ba2db6645</i><br /><br />Threat actor <b>description</b>: <i>Farwest Fabrication specializes in steel fabrication, offering products such as pipe piling, structural and architectural steel.We will upload 45gb of corporate data soon. Employees information, financials, payment details, client files, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Phillips-Scales</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28089</link>
<guid>2ed82a7e645e45584d3aabab834eef35</guid>
<pubDate>Thu, 18 Dec 2025 16:27:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Phillips-Scales</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>99246acbebe36efef79fffd32a11917d3f686c0eb50fc689d7a30765fd28042b</i><br /><br />Threat actor <b>description</b>: <i>Phillips Scales Alaska is the largest distributor of commercial and industrial scales in the state, offering a wide range of products including airport, bench, crane, floor, retail, and truck scales.We will upload 10gb of corporate data soon. Employees personal documents (passports, DLs, SSNs and other information), detailed financial information, client information, projects, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Morningstar-Properties</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28093</link>
<guid>5e5bd82a90466d9434c270b85ddf187c</guid>
<pubDate>Thu, 18 Dec 2025 15:26:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Morningstar-Properties</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6186aa9b1280740c47954c21e18e498a82398f02fd7cc10338355f8a553500fc</i><br /><br />Threat actor <b>description</b>: <i>Morningstar Properties is a vertically integrated real estate developer, owner, and operator specializing in self-storage and marinas. We will upload 44gb of corporate data soon. Employees personal documents (passports, DLs and other information), financials, client information, projects, confidential files, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Household--Commercial-Products-Association</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28094</link>
<guid>d348d11f7f80d82e49a05e3c2269d373</guid>
<pubDate>Thu, 18 Dec 2025 15:26:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Household--Commercial-Products-Association</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>187e678f4c9adc86dc262ca6525db49758b5c7205f964d3ffdbf43e82285ac2c</i><br /><br />Threat actor <b>description</b>: <i>HCPA, or the Household and Commercial Products Association, represents companies that manufacture and sell household and commercial products, advocating for a sound business environment that promotes safety and innovation.We will upload 23gb of corporate data soon. Employees, clients, partners personal documents, financial information, a lot of projects files (many of them are confidential), production information, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>deerfield.com-singulargenomics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28085</link>
<guid>bf95b1669852932f77dc04f5ee405b7b</guid>
<pubDate>Thu, 18 Dec 2025 07:54:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>deerfield.com-singulargenomics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b7e67b4f1ec2fc14a9c649aad2962b86360de808960778e42aad3fa5950dfc75</i><br /><br />Threat actor <b>description</b>: <i>Singular Genomics https://www.singulargenomics.com/   The company, known for its next-generation sequencing technologies such as the G4® Sequencing Platform and the upcoming G4X™ Spatial Sequencer, is now focused on further innovation in genomic and spatial multiomics research.  Singular Genomics Systems, Inc. is a life science technology company founded in 2016 that develops next-generation sequencing (NGS) and multiomics technologies to empower researchers and clinicians in advancing science and medicine. The company's mission centers on leveraging its proprietary Sequencing Engine platform, which underpins its core product tenets of accuracy, speed, flexibility, and scale. Its commercially available G4 Sequencing Platform is a benchtop genomic sequencer designed for fast and accurate results, while the G4X Spatial Sequencer, an upgrade to the G4 platform, enables high-throughput in situ direct sequencing of RNA, targeted transcriptomics, and proteomics profiling from formalin-fixed, paraffin-embedded (FFPE) tissues. The company is also developing the PX Integrated Solution, a multiomics platform that combines single-cell analysis, spatial analysis, genomics, and proteomics in one instrument. As of February 21, 2025, Singular Genomics was taken private following the closing of an acquisition by Deerfield Management. The company is headquartered in San Diego, California, with additional operations in La Jolla.  Target CEO:  Drew Spaventa https://www.linkedin.com/in/drew-spaventa-98087213/  Josh Stahl https://www.linkedin.com/in/joshua-stahl-77238627/  Target Owner:  James E. Flynn https://www.linkedin.com/in/james-flynn-99304a72/ Deerfield Management Company, L.P.  Singular Genomics is currently owned by Deerfield Management Company, L.P., following the completion of its acquisition on February 21, 2025. The transaction involved an affiliate of Deerfield acquiring all outstanding shares of Singular Genomics common stock not already owned by Deerfield for $20.00 per share in cash. As a result, Singular Genomics transitioned from a publicly traded company to a private entity, with the goal of providing greater strategic flexibility. The company's new leadership includes Josh Stahl as Chief Executive Officer and Drew Spaventa, the co-founder, continuing on the board as a special advisor to the CEO.   The data affected by this breach includes:  Source Codes Biological Data Experemental Data Client Data Personal Data (PII) Staff Data Financial Data Proposal Contracts NDA's Internal Documents Service Agreements  Breach size:  20TB  Breach review:  Singular Genomics Systems, Inc., a U.S.-based life-science technology company developing high-throughput spatial multiomics and next-generation sequencing platforms, experienced a data breach discovered on September 11, 2025. The threat actor involved was identified as INC_RANSOM. The breach is currently under investigation, and the leak size remains unknown. The incident highlights growing concerns about cybersecurity in the genomics sector, where biological data is increasingly processed through digital pipelines vulnerable to cyber threats. https://www.breachsense.com/breaches/singular-genomics-systems-data-breach/   Research Genomes:  Bacillus_cereus bcereus clost danio_rerio ecoli epr grch38 metaphlan4_databases mm10 Mycobacterium_tuberculosis phep phix phixil plasmodium_falciparum pse rhodo Rhodobacter_sphaeroides roche ruber sal spc staph synthetic_allen synthetic_allen_hp1 synthetic_allen_hp2 tb      This company does not show any interest in solving its problem. She doesn't care about the security of her data and the research of her customers. </i><br />Target victim <b>website</b>: <i>singulargenomics.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>MedHelp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28081</link>
<guid>be7c20a83fb93c62352414aa58e525c2</guid>
<pubDate>Wed, 17 Dec 2025 22:20:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>termite</b> claims attack for <b>MedHelp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>240bb5c120f4804e041f5e015acb8c4c90fdb7500168f21d2cfce8a4478b2455</i><br /><br />Threat actor <b>description</b>: <i>MedHelp Birmingham provides urgent and primary care services in the Birmingham area, welcoming walk-in patients. Their offerings include a Long COVID clinic, wellness therapies, and specialized services such as Lyme Disease treatment and gynecology care.
</i><br />Target victim <b>website</b>: <i>medhelpclinics.com</i>]]></description>
<category>termite</category>
</item>
<item xmlns:dc='ns:1'>
<title>smilecenterutah.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28079</link>
<guid>7cf67a2def04352826be6914e1bb5405</guid>
<pubDate>Wed, 17 Dec 2025 20:26:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>smilecenterutah.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c96a7655fbffd12f3546b7b6da72597a65f3f22318ebda84fa720523b97644d</i><br /><br />Threat actor <b>description</b>: <i>Smile Center Utah is a private dental practice located in Provo, Utah, providing comprehensive oral healthcare services to patients of …</i><br />Target victim <b>website</b>: <i>smilecenterutah.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>artcitydental.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28076</link>
<guid>163e836b057fa98808f41048cba1195f</guid>
<pubDate>Wed, 17 Dec 2025 20:24:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>artcitydental.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12e544783453164a6496348e153f5fdc2fbd31fde3e607b87a8d3a78a3e29bfc</i><br /><br />Threat actor <b>description</b>: <i>Art City Dental is a family-oriented dental clinic located in Springville, Utah, within the United States. The practice provides a …</i><br />Target victim <b>website</b>: <i>artcitydental.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>gandlmechanical.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28075</link>
<guid>a621f7ab8fd0eae3805566885dda4a25</guid>
<pubDate>Wed, 17 Dec 2025 20:24:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>gandlmechanical.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6722fe3d79835ff3e826611297f976b1eacb5a2e801a048ac0210642109fd7ae</i><br /><br />Threat actor <b>description</b>: <i>G & L Mechanical Contractor, L.P. is a regional mechanical contracting firm based in Grapevine, Texas, and has been operating …</i><br />Target victim <b>website</b>: <i>gandlmechanical.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Adelman--Gettleman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28064</link>
<guid>b9c317d06906da03e3d4798fe5824e31</guid>
<pubDate>Wed, 17 Dec 2025 18:26:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Adelman--Gettleman</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7689e799518db8c125010d68d02b5433f2c91b4553476753775113123b810867</i><br /><br />Threat actor <b>description</b>: <i>Adelman & Gettleman is a boutique law firm based in Chicago that specializes in commercial insolvency, bankruptcy, and related litigation. With over 40 years of experience, the firm is known for efficiently resolving financial difficulties for its clients through creative and consensus-driven approaches.We will upload 31gb of corporate data soon. Clients and employeesinformation (passports, DLs, SSNs), financials, court files, police reports and other confidential files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>ACME-Industrial</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28065</link>
<guid>ad01564d8f0f4da5627726cc96f717d6</guid>
<pubDate>Wed, 17 Dec 2025 18:26:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>ACME-Industrial</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb3bc1a6debb04624e3d9736146bb5f9e8e7f179cc861f7f20792b975af15898</i><br /><br />Threat actor <b>description</b>: <i>ACME Industrial, Inc. offers a wide range of industrial, commercial, and marine repair and mechanical services from their 10,000 square foot facility in Staten Island, New York.We will upload 256gb of corporate data soon. Employees information (passports, DLs, SSNs, birth and death certs, medical information), financials, payment details, client files, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Latitude-33-Planning-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28066</link>
<guid>e5f69a36d50c3cb60dc35e49a62f4f24</guid>
<pubDate>Wed, 17 Dec 2025 18:26:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Latitude-33-Planning-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>990b11a0bf8b76c8c2f4beba60045bcc2218e16a9a85bc22393077e60dfe1afa</i><br /><br />Threat actor <b>description</b>: <i>Latitude 33 is a certified Small Business Enterprise that provides planning, engineering, and surveying services across various locations, including San Diego, Los Angeles, Sacramento, and Salt Lake City.We will upload 53gb of corporate data soon. Employees information(passports, DLs, and numerous forms with personal information), detailed financials, payment details, client files, projects, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Amla-Commerce</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28062</link>
<guid>0a6ad41f086b7d5700c2cc9e937bd348</guid>
<pubDate>Wed, 17 Dec 2025 08:52:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Amla-Commerce</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b3aadc87eb9ffbe0726a9e29d62e5bcc70dea169a580cc11dfceea7476160a2</i><br /><br />Threat actor <b>description</b>: <i>Amla Commerce develops ecommerce software platforms. Architected with a focus on long-term sustainability, the platforms offer unmatched flexibility and scalability, as well as premium feature sets and deep functionality proven to enable growth and support even the most complex operational needs for mid-market and enterprise-level companies. Amla Commerce is the parent company of Artifi Labs, an enterprise product customization platform, and Znode, a .NET ecommerce platform with headless architecture and multi-store capabilities. Artifi and Znode power the ecommerce experiences of hundreds of companies across dozens of industries including apparel and soft goods, promotional products, uniforms, CPG and retail. Amla Commerce is a privately-held company, headquartered in Milwaukee, WI.</i><br />Target victim <b>website</b>: <i>www.amla.io</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pueblo-West-Colorado</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28055</link>
<guid>c9a4268367a43297ba960eb5bd78155c</guid>
<pubDate>Wed, 17 Dec 2025 07:26:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Pueblo-West-Colorado</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>183a47f047060d4cc827ad8d3cb6923baf08cf37ede9e49a6c6a7f77a811e56c</i><br /><br />Threat actor <b>description</b>: <i>Government</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Roose-Ressler--Green-Co</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28053</link>
<guid>4df6cbc5729a0eda1d4aecbb08fbe9f9</guid>
<pubDate>Wed, 17 Dec 2025 05:26:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Roose-Ressler--Green-Co</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f116f55576aababe679fa6f585464772672179b969adbd1e1838d7e823afd50</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Smith-Hawks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28054</link>
<guid>761067fbba1d6ef159173bfb8109abc2</guid>
<pubDate>Wed, 17 Dec 2025 05:26:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Smith-Hawks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>49380f156f9d692fb53ae6ee212832b08a7861ba75aa68d95b86500eee469454</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Holiday-Tours</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28049</link>
<guid>ddf20ca99b0ddd9a0e505ed7830ea299</guid>
<pubDate>Tue, 16 Dec 2025 22:22:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Holiday-Tours</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91adb33deeadbad061e0736943a9bcf353c8be9a9525808289dab4b22ff3e402</i><br /><br />Threat actor <b>description</b>: <i>Holiday Companies, established in 1978, is a family-owned business based in North Carolina that specializes in providing motorcoach services, group travel, and a range of travel packages including cruises and air travel. They offer charter bus rentals and preplanned tours throughout North America and beyond, ensuring a safe and enjoyable travel experience for their clients. Their commitment to safety and high DOT ratings underscores their focus on providing top-notch services. With a diverse fleet of coaches, they cater to various organizations in need of group transportation solutions.</i><br />Target victim <b>website</b>: <i>www.holidaytours.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lanmark-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28048</link>
<guid>e9527aec68523b8ceb74e12b8685b96a</guid>
<pubDate>Tue, 16 Dec 2025 21:32:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Lanmark-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45cfb68a3ccf3ef0349cf1a58afa157cc8cab40b7ae6bcc76433e4fab07b8e74</i><br /><br />Threat actor <b>description</b>: <i>Lanmark Group, Inc. is a full-service general contracting firm based in Brooklyn, NY, founded in 2005. The company specializes in handling complex construction projects for both public and private sector clients, demonstrating a commitment to quality, safety, and client satisfaction. With a focus on meticulous planning and execution, Lanmark has established a strong reputation through their extensive portfolio of successful projects. Their expertise is showcased in multi-million dollar constructions, making them a trusted partner for state and municipal agencies.</i><br />Target victim <b>website</b>: <i>www.lanmarkgroup.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Milhench-Supply-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28047</link>
<guid>6ba927e95e97f5564105147a9d188931</guid>
<pubDate>Tue, 16 Dec 2025 21:31:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Milhench-Supply-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5ebc4d4b6fab3b17dc4754c97cb77f38d8a8e97d5248d792faa4abe702051004</i><br /><br />Threat actor <b>description</b>: <i>Milhench is a family-run business that has been providing everyday necessities to keep various industries running cleanly and efficiently for over three generations. Their mission focuses on delivering dependability and quick delivery services across New England. They offer Vendor Managed Inventory programs to help clients maintain lean inventory and improve cash flow. Milhench serves a diverse range of clients, including agriculture, healthcare, hospitality, and government sectors.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Peaker-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28030</link>
<guid>fca02d37f2e8afc58148dfdd93d0faf3</guid>
<pubDate>Tue, 16 Dec 2025 21:31:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Peaker-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6bbec03973c734193cf4ab0b953ba65c5d6624023eba8eeb56a1f6f002f2ac36</i><br /><br />Threat actor <b>description</b>: <i>Peaker Services, Inc. engages in rebuilding, repairing, and maintaining diesel engines and related equipment for railroad, power generation, and marine companies. The company also designs, assembles, and installs systems used in generator, compressor, propulsion, and mechanical drive systems; designs and installs custom control systems; and provides emergency and custom repair, case and pan repair, component and assembly rebuilding, contract maintenance, inspection, and surveying services. In addition, it engages in the distribution of power generation and control equipment. The company was founded in 1971 and is based in Brighton, Michigan with facilities in Brighton, Michigan; and New Castle, Delaware. Peaker Services, Inc. operates as a subsidiary of PSI Holding Company.</i><br />Target victim <b>website</b>: <i>www.peakerservices.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shlansky-Law-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28031</link>
<guid>151d71ff5173c3e5ade51b51b1429c7c</guid>
<pubDate>Tue, 16 Dec 2025 21:31:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Shlansky-Law-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>228b2caacadc46f0173d3da5274753d4dc61f97a7b6f363468f92f81ddb19514</i><br /><br />Threat actor <b>description</b>: <i>Shlansky Law Group (SLG) is a business law firm based in Wilmington, Delaware, specializing in providing creative legal solutions for clients in various industries including aerospace, defense, IT, and biopharmaceuticals. Established in 1995, SLG's civil lawyers are skilled in handling complex business matters such as corporate governance, fiduciary duties, and contracts, focusing on achieving favorable outcomes for their clients. The firm's dedication to client service is characterized by a nimble and consistent approach that prioritizes the specific goals of each client. SLG offers extensive experience in civil litigation, helping clients navigate disputes effectively while ensuring robust legal representation.</i><br />Target victim <b>website</b>: <i>www.shlanskylawgroup.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bowman-Trailer-Leasing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28032</link>
<guid>e41605316903fe4426fb0c9eee0c5b19</guid>
<pubDate>Tue, 16 Dec 2025 21:30:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Bowman-Trailer-Leasing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>253500335e23ea9ca5be795e5598b4bd2cbaf4fe90f0ae12d12310e26b1e91bc</i><br /><br />Threat actor <b>description</b>: <i>Bowman Trailer Leasing specializes in nationwide trailer leasing, offering a range of products including flatbeds, dry vans, and storage containers. They serve the transportation, construction, manufacturing, and retail industries with over 30 locations across the eastern United States. Established in 1972, the company provides reliable services and real-time asset tracking for their clients. With a strong focus on customer service, Bowman Trailer Leasing aims to meet diverse transportation and storage needs.</i><br />Target victim <b>website</b>: <i>www.bowmantrailerleasing.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Centurion-Security--Investigations</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28033</link>
<guid>590894963d4a3cc360d47e890416c00a</guid>
<pubDate>Tue, 16 Dec 2025 21:30:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Centurion-Security--Investigations</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63beb5aacdd2e3b0e5d2c9294164cc4567649831a63fbc2e673ee0fb12baf448</i><br /><br />Threat actor <b>description</b>: <i>Centurion Security is a premier, locally-owned security company in Utah, offering a range of services including home security, corporate building security, and private investigations. The company prides itself on its local expertise and commitment to understanding the unique needs of Utah businesses. With a focus on delivering exceptional service, Centurion Security aims to provide reliable security solutions without losing the personal touch that larger national vendors often overlook. Their historical knowledge and deep appreciation for the local market make them a trusted partner in security management.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Keycodes-Inspection-Agency</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28034</link>
<guid>1e5afce26f816c212a6b27dc47923658</guid>
<pubDate>Tue, 16 Dec 2025 21:30:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Keycodes-Inspection-Agency</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b60670a1fd1dd01585dfd4800ad082a9968e28c54d02bb846648cecea233865</i><br /><br />Threat actor <b>description</b>: <i>Keycodes Inspection Agency is a Pennsylvania State certified third-party inspection agency specializing in residential and commercial building inspections, including plumbing, mechanical, electrical, energy, and accessibility inspections. The agency is dedicated to public safety and customer service, ensuring timely and professional building code inspections. Their inspectors maintain current knowledge of building codes through required continuing education courses. Keycodes Inspection Agency is recognized as Lehigh Valley's premier inspection agency.</i><br />Target victim <b>website</b>: <i>www.keycodesinspectionagency.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>A-Uzzo</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28035</link>
<guid>2b7768fbcdb86bdb2c9288a0e5982d2b</guid>
<pubDate>Tue, 16 Dec 2025 21:29:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>A-Uzzo</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7dd1c364aa38408c87f42069f3f20993012f2a5b1687e62696e0e67ea1a8e4b7</i><br /><br />Threat actor <b>description</b>: <i>A. Uzzo & Company is a certified public accounting firm based in Purchase, NY, specializing in personalized accounting, tax planning, and advisory services. They cater to a diverse clientele, including small business owners, individuals seeking financial planning, and corporations requiring complex accounting solutions. With decades of experience, the firm emphasizes tailored strategies, innovative solutions, and long-term client relationships. Their comprehensive services include tax planning and preparation, estate and wealth advisory, and accounting consulting.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>TACK-Electronics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28036</link>
<guid>3e12d6d201020d2c809f63b8d02161b3</guid>
<pubDate>Tue, 16 Dec 2025 21:29:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>TACK-Electronics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7eefc6fb4d6e0c63b0e6fce869944f0187dac6a8913bf34a4e2b0fc937537015</i><br /><br />Threat actor <b>description</b>: <i>TACK Electronics specializes in producing high-quality custom wire harnesses and cable assemblies tailored for a variety of electronic applications across multiple industries. With over 25 years of experience, the company offers services including kitting, inventory management, and strategic sourcing to enhance efficiency for its clients. They are committed to quality production, ensuring that all products are 100% tested and meet customer expectations. Their clientele includes leading companies in sectors such as entertainment, transportation, aerospace, and medical.</i><br />Target victim <b>website</b>: <i>www.tackelectronics.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mercury-Wire-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28037</link>
<guid>af698f2b39b1f19d13e7259e6b560a85</guid>
<pubDate>Tue, 16 Dec 2025 21:29:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Mercury-Wire-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34b267d48f3f7e4c9088ecdabdff27685956fb3e6e2d8799c139f00a302e848e</i><br /><br />Threat actor <b>description</b>: <i>Mercury Wire is a manufacturer specializing in innovative custom wire, cable, and engineered assemblies since 1967. They provide tailored solutions by understanding client needs and employing lean processes, focusing on collaboration and high-value outputs. Their products serve a wide range of industries, including industrial, medical, military, and defense, as well as specific applications like underwater cable. The company is committed to building lasting relationships with clients through dedicated problem-solving and extensive material resources.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cinema-Concepts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28039</link>
<guid>0b890a8ca95e146ae3686e4bd3b8c9d2</guid>
<pubDate>Tue, 16 Dec 2025 21:29:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Cinema-Concepts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8aecf0b82769dab9f863a1263f89a44ea0f45f85001b2133c0d14ebe0c507928</i><br /><br />Threat actor <b>description</b>: <i>Cinema Concepts is a creative studio and production company specializing in content creation, digital mastering, and duplication/distribution for cinematic exhibition. With extensive experience and cutting-edge technology, they produce quality cinema-ready files for theatrical projection and optimize media for various platforms. Since 1977, they have collaborated with agencies, corporations, broadcasters, studios, independent filmmakers, and film festivals, redefining the media production experience. Their scalable and flexible studio enables them to effectively create, edit, and prepare content that resonates with audiences.</i><br />Target victim <b>website</b>: <i>www.cinemaconcepts.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>aspenviewacademy.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28046</link>
<guid>1a24d0708b32892bc735d64fa20d9dfb</guid>
<pubDate>Tue, 16 Dec 2025 21:27:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>aspenviewacademy.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8453c61167cdcb100ab7a2a02b0d22a9b25b4a95533abc9c267de8007821d462</i><br /><br />Threat actor <b>description</b>: <i>Aspen View Academy is a charter school located in Castle Rock, Colorado, serving students from pre-kindergarten through 8th grade. Founded …</i><br />Target victim <b>website</b>: <i>aspenviewacademy.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>feldmanandlopez.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28045</link>
<guid>f37432dbde02ae7536cab364df00ccae</guid>
<pubDate>Tue, 16 Dec 2025 21:27:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>feldmanandlopez.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f6515788f473a9d033d58b0d0dcbed3501e465159d6762a00137cea0662d2df</i><br /><br />Threat actor <b>description</b>: <i>Feldman & Lopez, P.A. is a law firm based in Miami, Florida, that specialises in property insurance law and related …</i><br />Target victim <b>website</b>: <i>feldmanandlopez.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>hoodriverdentist.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28043</link>
<guid>08b41ec0a7a71415ee6b932e222d8af3</guid>
<pubDate>Tue, 16 Dec 2025 21:26:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>hoodriverdentist.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd1a7297e5b4c2bf19a1b2397e75c33601df4ed9675ffebe5dcddb5bd40d8b06</i><br /><br />Threat actor <b>description</b>: <i>Hood River Dental is a private dental practice located in Hood River, Oregon, providing comprehensive oral healthcare services to individuals …</i><br />Target victim <b>website</b>: <i>hoodriverdentist.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Leger--Shaw</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28025</link>
<guid>119e3b320ed9a4694e5173c3b64591f1</guid>
<pubDate>Tue, 16 Dec 2025 21:26:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Leger--Shaw</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>368fef97cebf1f92a1c052b4174aee75704fecd9abbfceb80009025a4313bdab</i><br /><br />Threat actor <b>description</b>: <i>Leger & Shaw is a New Orleans-based law firm established in 1979, specializing in maritime and admiralty law, class actions, complex litigation, commercial liti...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Edward-J-Kone</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28026</link>
<guid>21353d3d417eb49d01e341ef047696ae</guid>
<pubDate>Tue, 16 Dec 2025 21:26:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Edward-J-Kone</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>922d77a9d24d3330469ad362c933728d886e68361695a5a85eefbec11d638c09</i><br /><br />Threat actor <b>description</b>: <i>Edward J. Kone, P.A. is a law firm focused on providing legal services in criminal defense, traffic violations, and personal injury cases. The firm, led by expe...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trine-Access-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28027</link>
<guid>487cbe45b70fc4e83a1dd07546649e34</guid>
<pubDate>Tue, 16 Dec 2025 20:26:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Trine-Access-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>80bdaaa9eeec3443b59f1ea9659eaf4ba11acbb3fcdcf83088de2065aedc85a9</i><br /><br />Threat actor <b>description</b>: <i>In 1999, a new company, Trine Access Technology was formed under new ownership. Our principle remains the same while our goals are greater than ever. Trine offers the largest selection of electric strikes in the industry, including the 3000 Series SMALLEST ELECTRIC STRIKES IN THE WORLD and the EN series ONLY UL® outdoor rated strike.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Power-Curbers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28028</link>
<guid>604ee6361f8a853c947ede4e3c9da372</guid>
<pubDate>Tue, 16 Dec 2025 20:25:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Power-Curbers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>636474229eec1e84fc9c46229ba2af73ac320d5c68c007ef53a371b4676f60a7</i><br /><br />Threat actor <b>description</b>: <i>Established in 1953 in Salisbury, NC, Power Curbers manufactured the worlds first automatic curb machine. The original machines, extruders used in forming small curbs, are still manufactured as the Power Curber 150 extruder.</i><br />Target victim <b>website</b>: <i>www.powercurbers.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Florida-Orthopaedic-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28029</link>
<guid>e8d6b4ac3e525d79c01f47bed8e1f93c</guid>
<pubDate>Tue, 16 Dec 2025 20:25:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Florida-Orthopaedic-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e41621d8b205873fc33cb0653aaeb051d1ee083c141920440ca39afba4543e10</i><br /><br />Threat actor <b>description</b>: <i>Florida Orthopaedic Associates & Walk-In Clinic is a leading provider of orthopedic care in Central Florida, offering services such as joint replacement, spine treatments, sports medicine, and general orthopedics. With a team of fellowship-trained physicians, they provide both surgical and non-surgical treatment options to address a variety of musculoskeletal conditions. The clinic operates multiple locations and features a walk-in service for immediate injury care, ensuring that patients receive timely attention for urgent orthopedic needs. Established in 1969, they have delivered over 50 years of specialized care to the community.</i><br />Target victim <b>website</b>: <i>www.floridaorthopaedicassociates.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.advancedentdenver.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28018</link>
<guid>3e159a2c6c50b5f1da0b308352b8c616</guid>
<pubDate>Tue, 16 Dec 2025 18:27:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>www.advancedentdenver.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a13dd92ce98084380d5f8554d6af70bdae5c9733251b60c9e64c973541ee3d64</i><br /><br />Threat actor <b>description</b>: <i>Advanced ENT & Allergy Center is a leading provider in Denver specializing in al...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Allure-Home-Creation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28024</link>
<guid>13712c22586d46361e911d81469a1a3e</guid>
<pubDate>Tue, 16 Dec 2025 18:24:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Allure-Home-Creation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df82b79947fa33dfeda02f0d2b47f049a29ff857b6fc7014fe5f5b6d85ed0264</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.allurehome.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fairgrove-Oil</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28023</link>
<guid>3c03e7f05b5cbd91dffba3da4986bc1a</guid>
<pubDate>Tue, 16 Dec 2025 18:23:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Fairgrove-Oil</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c214db68e3227cbc1abedc5beb8342365e803d143c9dbc7f9246ccaa23ad217</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.fairgroveoil.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Maypay-Farms-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28022</link>
<guid>1c7501e5cf59a9b7b371f9d76a67c03b</guid>
<pubDate>Tue, 16 Dec 2025 18:23:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Maypay-Farms-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3cb04b0bdeabb94916c60810fcb8335f26197dd7453d81e4bb99de5efb2656d3</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.maypayfarms.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southern-Specialty--Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28020</link>
<guid>64bb3c7589214974e7fd34f975ced5be</guid>
<pubDate>Tue, 16 Dec 2025 18:22:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Southern-Specialty--Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a72d60aabbf4bc7c30d7684b3c5e09dd370f07d5a76bd07f89e51d60be2f1e03</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.southernspecialtysupply.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Walters-Group-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28016</link>
<guid>a485f44b58ac44713d61366e5648f187</guid>
<pubDate>Tue, 16 Dec 2025 15:26:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>Walters-Group-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa535a5cac6e3910e72d0e1e2520cdfd2a21efa6914f84449b1b7f3163714137</i><br /><br />Threat actor <b>description</b>: <i>Specializing in the production of structural steel and construction.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>LiftPRO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28010</link>
<guid>d4535535b455dd9b910ba56286a4d8f5</guid>
<pubDate>Tue, 16 Dec 2025 14:26:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>LiftPRO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad313604b8ddeb82d1d2845f67f2e751b6a43baffeb2f324d3a5b271250a12b8</i><br /><br />Threat actor <b>description</b>: <i>LiftPRO has over 40 years of experience providing lifting, rigging, and weighing solutions for various industries, including transportation and military applica...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Precise-Benefits-Group-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28015</link>
<guid>9ef76737dc71b2cf44533b32fb344419</guid>
<pubDate>Tue, 16 Dec 2025 11:58:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Precise-Benefits-Group-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6b49757caa506c8241a4a08e28c39a9034c13e5639708e1e04f4967eb3ede6f</i><br /><br />Threat actor <b>description</b>: <i>Precise Benefits Group LLC operates as an employee benefits consulting and HR solutions provider. The company offers strategic employee benefits programs and services designed to help businesses manage healthcare costs, ensure regulatory compliance, and improve administrative efficiency. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Beyer-Law-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28004</link>
<guid>68af3564fb6024e891d093f8c3b8bc42</guid>
<pubDate>Tue, 16 Dec 2025 00:13:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Beyer-Law-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ae0100e364334e6e3fde59df3ffcacea59d5e054d03b96704502df86db55919b</i><br /><br />Threat actor <b>description</b>: <i>Data breach from Silicon Valley lawyers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Denk--Roche-Builders</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27991</link>
<guid>4cd9b9a23d1c08707a723b56062a502f</guid>
<pubDate>Mon, 15 Dec 2025 18:25:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Denk--Roche-Builders</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ceee1c080bb6691237220f814ffd7e9d8d47970a8b413950e32f67a6e4719555</i><br /><br />Threat actor <b>description</b>: <i>Denk & Roche Builders specializes in the construction of wood-framed and metal structures, providing services from early design concepts to final finishes, including solar applications and mass timber. We will upload 54gb of corporate data soon. Employee information,detailed financials, projects, contracts and agreements, client files, confidential files, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>International-Standard-Valve</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27992</link>
<guid>35fe071cd4426fe8a90666101fff1bf0</guid>
<pubDate>Mon, 15 Dec 2025 18:25:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>International-Standard-Valve</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8644bb5c0a515c73ac2dccaaebf49215fe0c4f6081058bfd8905b0a54887acdb</i><br /><br />Threat actor <b>description</b>: <i>International Standard Valve, Inc. specializes in providing a range of ball valves, gate, globe, and check valves tailored for theoil and gas, oil refining, natural gas, power generation, chemical, petrochemical, pulp and paper, and mining industries.We will upload corporate data soon. Employee information (name, DOB and other information), detailed financials, customer information, contracts and agreements, projects, specifications and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>uro.com-USA-Virginia</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=28007</link>
<guid>79a23b3b9ac3c3c789b319b86d784613</guid>
<pubDate>Mon, 15 Dec 2025 15:26:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ms13089</b> claims attack for <b>uro.com-USA-Virginia</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eb5a84a74381962738bfbdf618fbfc1fcf8d2617b94c844c98d6fd735b1e2d93</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ms13089</category>
</item>
<item xmlns:dc='ns:1'>
<title>Print-O-Tape</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27993</link>
<guid>acbcd0c9b20213125418321ef002f24d</guid>
<pubDate>Mon, 15 Dec 2025 15:18:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Print-O-Tape</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>73871a80df8909aee395b3597bbf89e481ac6c3fd3b9ff9f7aadea5b9934de1b</i><br /><br />Threat actor <b>description</b>: <i>Print-O-Tape, Inc. is a manufacturer specializing in self-adhesive labels, offering a wide range of products including custom labels, stock labels, RFID labels, and roll materials. The company has established strong relationships with well-known end users, resellers, and OEMs, providing labeling solutions. Their commitment to innovation and technology allows them to remain an industry leader, serving markets such as transportation, warehousing, food and beverage, and consumer goods. Print-O-Tape, Inc. manufactures and supplies self-adhesive labels to customers worldwides.</i><br />Target victim <b>website</b>: <i>printotape.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gordon-Clifford-Properties-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27988</link>
<guid>731d1ffc634f4e5ac44b01592b12a0ad</guid>
<pubDate>Mon, 15 Dec 2025 11:44:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Gordon-Clifford-Properties-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>075dcdb66da30e020531568aac3050ebc4900d10d7c03d9289e7af3a2ec2f201</i><br /><br />Threat actor <b>description</b>: <i>Property management and serving san francisco property owners</i><br />Target victim <b>website</b>: <i>gordoncliffordmanagement.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Angstrom-Automotive-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27987</link>
<guid>e3bff3cd294df3b24f6fe9e700d86a91</guid>
<pubDate>Mon, 15 Dec 2025 11:43:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Angstrom-Automotive-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c9bf734df1456caaf994e542e4076adfff675ab83dd48700a709ca4c5f222b0</i><br /><br />Threat actor <b>description</b>: <i>Leading tier 1 full-service supplier for Automotive and Industrial OEMs</i><br />Target victim <b>website</b>: <i>angstrom-usa.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>cityofsignalhill.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27981</link>
<guid>086c98cd8fcd5da4d44864f9b3c7c2fa</guid>
<pubDate>Mon, 15 Dec 2025 02:14:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>cityofsignalhill.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>724860f60bb39a287267481ad7c9b9b80e1891b880c41b76bafb094072d80374</i><br /><br />Threat actor <b>description</b>: <i>Signal Hill, CA offers a range of services and resources to its residents, including city hall renovation updates, a shop local campaign called Open Rewards, and information on upcoming city events. The city also provides resources for job seekers, safe clean water initiatives, and community assistance programs. Residents can access the city's cable channel online, nominate pets for Pet of the Month, and download the Signal Hill Now mobile app for convenient access to city information. Employees: 50 Revenue: $7.1 Million Industry: Government  Phone Number: (562) 989-7300</i><br />Target victim <b>website</b>: <i>cityofsignalhill.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kier--Wright</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27970</link>
<guid>43d5b8fc1b0674e7cfd04c36d6bb6442</guid>
<pubDate>Sun, 14 Dec 2025 23:26:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Kier--Wright</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a2b20253a8a020f1f7824c93f69f00b79f84781da4a521f60cbb0317cc79a7e</i><br /><br />Threat actor <b>description</b>: <i>Accounting Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>lampus.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27974</link>
<guid>0ba166bf271f1eb979cda386d2b74265</guid>
<pubDate>Sun, 14 Dec 2025 20:39:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>lampus.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b27dc0ec73104d2f0668516dc663f49274393390e4cb24e6bc5f1bc8879a923</i><br /><br />Threat actor <b>description</b>: <i>R.I. Lampus Company, operating the domain Lampus.com, is a long-established American manufacturer and distributor in the building materials industry. Founded …</i><br />Target victim <b>website</b>: <i>lampus.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Smith-Roberts-Baldischwiler-LLC--OKC-Engineering-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27968</link>
<guid>e6eb4c2fedeb246841d5b95592cb1218</guid>
<pubDate>Sun, 14 Dec 2025 14:25:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Smith-Roberts-Baldischwiler-LLC--OKC-Engineering-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>697f1795aaaeaedc272af237380aaf6f00aa8c4be193f34a37a19eac6ebf9045</i><br /><br />Threat actor <b>description</b>: <i>Many projects of large companies are now available to public. Customer information, confidential data, and much more. 
Successful engineering projects begin wit...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>dabafinance.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27967</link>
<guid>3db0c81b0a25ab06af83bde59115dd4b</guid>
<pubDate>Sun, 14 Dec 2025 01:53:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>dabafinance.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ce3160f9e1c594a356b2582dea18050d9b6d573804cd140025b2c6bf78ada96</i><br /><br />Threat actor <b>description</b>: <i>Price ??? Disclosures 0/1</i><br />Target victim <b>website</b>: <i>example.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vishnick-McGovern-Milizio</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27962</link>
<guid>b7720952eb73703ed33b3f05ddd2690a</guid>
<pubDate>Sat, 13 Dec 2025 18:22:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Vishnick-McGovern-Milizio</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b23c41fd7161a5311889071cc5430c5ec1c9bb3eb1795e70af95ed074af79dd0</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.vmmlegal.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jabezco-Industrial-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27960</link>
<guid>7428f98008346bb6aa6fc92d257505ab</guid>
<pubDate>Sat, 13 Dec 2025 16:59:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Jabezco-Industrial-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f4a8849d877a7bd1dcf8f5b4dfc52fab1de963b2516f39eed07d4b94bff2ad37</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.jabezco.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Choates-HVAC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27959</link>
<guid>57c2380d5c0be43f6c952835e58f7a55</guid>
<pubDate>Sat, 13 Dec 2025 16:59:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Choates-HVAC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cad7fdf1da7557dd6394db14fcd1037fcd208a547a6543c94104d7f4c4542030</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.choateshvac.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Viga-Eatery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27958</link>
<guid>352decc1e8f3d97fcdb53af60cbe1f53</guid>
<pubDate>Sat, 13 Dec 2025 16:58:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Viga-Eatery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>daeeb26b44040929aba915ed82394d0fe8acb8ed1d832945ed50e597bda80933</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.vigaeatery.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eastman-Cooke</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27957</link>
<guid>1fe37085233f04789c85afa0a8b3f7b3</guid>
<pubDate>Sat, 13 Dec 2025 16:57:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Eastman-Cooke</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6d2daae05585283b8a85cee6b71bdb482ddf7e7fb00ca8aa4932879693769d10</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.eastmancooke.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Temple-Shalom</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27951</link>
<guid>1899267a7cab6c98197ea43751df1c07</guid>
<pubDate>Sat, 13 Dec 2025 13:26:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Temple-Shalom</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1c9037ba2729a2b77b18445d0de6849a4a1921beb987594178870adff0008d9</i><br /><br />Threat actor <b>description</b>: <i>Temple Shalom is a Reform Jewish community of approximately 400 families who celebrate the diversity of modern Judaism in the Washington, D.C. area by welcoming...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Inter-American-Tropical-Tuna-Commission-IATTC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27947</link>
<guid>f335bf480fd91007c3c81a67a1dd4294</guid>
<pubDate>Fri, 12 Dec 2025 22:48:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>minteye</b> claims attack for <b>Inter-American-Tropical-Tuna-Commission-IATTC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b0cda02e90ecc5fa802d77e583de8ea6be84a76f37682eeead13ee2672c35288</i><br /><br />Threat actor <b>description</b>: <i>Size: 2.3 TB</i><br />Target victim <b>website</b>: <i>www.iattc.org</i>]]></description>
<category>minteye</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sponseller-Group-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27946</link>
<guid>e52265108325dab81ab318b51c5c83a1</guid>
<pubDate>Fri, 12 Dec 2025 22:48:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>minteye</b> claims attack for <b>Sponseller-Group-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>05c6ad46a8ede468b8349b8904b5ada787156f48bf4902df1a284cf6feb82a6c</i><br /><br />Threat actor <b>description</b>: <i>Size: 300 GB</i><br />Target victim <b>website</b>: <i>www.sponsellergroup.com</i>]]></description>
<category>minteye</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cranford-Buckley-Schultze-Tomchin-Allen--Buie-P.A.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27945</link>
<guid>0c9aecd2692cfe28067bb0eba9ae409a</guid>
<pubDate>Fri, 12 Dec 2025 22:47:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>minteye</b> claims attack for <b>Cranford-Buckley-Schultze-Tomchin-Allen--Buie-P.A.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f5a428cad13b4a5844fdf534dfe01dd60b59eb7b30f8cb8093bc408d801eacda</i><br /><br />Threat actor <b>description</b>: <i>Size: 350 GB</i><br />Target victim <b>website</b>: <i>www.southcharlottelawfirm.com</i>]]></description>
<category>minteye</category>
</item>
<item xmlns:dc='ns:1'>
<title>David-M.-Schwarz-Architects</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27943</link>
<guid>f428ed8209a04774dd294d6dc12ae201</guid>
<pubDate>Fri, 12 Dec 2025 22:47:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>minteye</b> claims attack for <b>David-M.-Schwarz-Architects</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa8ec77fc21ce2d724d0f2941260228aea9ceb112cc70ea3f8666d85e01058dd</i><br /><br />Threat actor <b>description</b>: <i>Size: 1.9 TB</i><br />Target victim <b>website</b>: <i>www.dmsas.com</i>]]></description>
<category>minteye</category>
</item>
<item xmlns:dc='ns:1'>
<title>ACE-Forwarding</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27940</link>
<guid>e7269f62ac39734ee9cfb1d0bd72cb06</guid>
<pubDate>Fri, 12 Dec 2025 22:11:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>obscura</b> claims attack for <b>ACE-Forwarding</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af7497b324bb297aedebf5d2d09eaaabbd482532f77e7f6e14d14f71b7e7f2ba</i><br /><br />Threat actor <b>description</b>: <i>Ace Forwarding offers several methods of protecting your freight. Full-service crating and repackaging are available in a variety of materials. Our full time staff of carpenters will custom-tailor crating and packaging to fit your specific needs.</i><br />Target victim <b>website</b>: <i>aceforwarding.com</i>]]></description>
<category>obscura</category>
</item>
<item xmlns:dc='ns:1'>
<title>United-Keetoowah-Band-of-Cherokee-Indians-in-Oklahoma</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27938</link>
<guid>8ee15923664a1ff58e5f7fddfdb91679</guid>
<pubDate>Fri, 12 Dec 2025 16:56:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>United-Keetoowah-Band-of-Cherokee-Indians-in-Oklahoma</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e4b67b3f47bffe7740b15a4619d756ad3ca0af1f4b7c15409885c6c4dd7794dd</i><br /><br />Threat actor <b>description</b>: <i>United Keetoowah Band of Cherokee Indians in Oklahoma</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>RJS-Logistics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27928</link>
<guid>0d2b7cc9dbcaf0935fd159ccfe19345d</guid>
<pubDate>Fri, 12 Dec 2025 16:27:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>RJS-Logistics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>41330fba16ff899a9c908e57e5cb9da01e37f7b997e7acd9d36b302e0701863f</i><br /><br />Threat actor <b>description</b>: <i>RJS Logistics is a freight and logistics company specializing in transporting produce and refrigerated freight. RJS Logistics alsoprovides van freight and flatbed freight services.We will upload corporate data soon. Employee information (DLs, w-9, phones, address and so on), detailed financials, a lot of customers files, contracts, NDAs, confidentiality agreements, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Warrior-Crane-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27926</link>
<guid>1a7f33274089feff1baef7286b95fe0e</guid>
<pubDate>Fri, 12 Dec 2025 14:25:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Warrior-Crane-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6efe750f2507b2b74fb3a5cd782cfa834ddade2efabfaa18b2d918271b2762e</i><br /><br />Threat actor <b>description</b>: <i>Warrior Crane is a leading provider of specialized crane lifting services, delivering customized solutions to diverse industries. We will upload 22gb of corporate data soon. Employee information (DLs, passports, phones, address and so on), financials, client information, contracts and agreements, confidentiality agreements,etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Maven-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27934</link>
<guid>3a4f2a43162106f67b1d40af656e4f5c</guid>
<pubDate>Fri, 12 Dec 2025 14:17:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Maven-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>331e641bc7fa6307d23c6c2a787aa4f407318f6261c1a2c150b1ac8afbf0cc7a</i><br /><br />Threat actor <b>description</b>: <i>We offer one of the best solutions in the market. We have solutions to target every vertical segment of the market be it a small shop, a small busi...</i><br />Target victim <b>website</b>: <i>mavensolutions.net</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arcom-Digital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27933</link>
<guid>dccf189cbe63472d0f4f5b00facfd2e1</guid>
<pubDate>Fri, 12 Dec 2025 14:16:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Arcom-Digital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a73792937e7eb6207ad56cbf5462170b02168af1686c02fb910809388fa61b0</i><br /><br />Threat actor <b>description</b>: <i>Arcom Digital specializes in advanced digital technologies aimed at enhancing network performance through products like PNM+, Hunter, and QAM Snare...</i><br />Target victim <b>website</b>: <i>arcomdigital.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Anderson-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27929</link>
<guid>79a1ceaa787c9e27d921fa324d93e9dd</guid>
<pubDate>Fri, 12 Dec 2025 14:02:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>Anderson-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29976b81a21aed194ff32c93b7b7586cf68c550ca71e531c6ad4116fb30c2c26</i><br /><br />Threat actor <b>description</b>: <i>We specialize in navigating complex regulatory requirements, engineering precise designs, and ensuring seamless permitting to get you building faster. With over 35 years of experience, we solve your most demanding engineering, permitting, and compliance challenges, letting you move to construction with precision and expertise.Personal information of employees and clientsFinancial documentsProjects, drawings https://www.andersoneng.com/</i><br />Target victim <b>website</b>: <i>www.andersoneng.com</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Personal-Injury</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27916</link>
<guid>11e7a6a3701b0a2593faef99048a2c86</guid>
<pubDate>Fri, 12 Dec 2025 08:25:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Personal-Injury</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c04f68f9766d14ed34c812473e4b5ac2b70364350bdcc50bb5af07754c55972</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jeff-DAmbrosio</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27917</link>
<guid>c96a3c8c43f8a4316ba293e5257bceb4</guid>
<pubDate>Fri, 12 Dec 2025 08:25:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Jeff-DAmbrosio</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d569d2f50d25944b7fd0e313b9d014c78d342397a6a9ecc9c4193ef9e55889e0</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Spitzer-Auto-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27918</link>
<guid>cb04f3f921fe1d7e1be45b44f8bba68e</guid>
<pubDate>Fri, 12 Dec 2025 08:25:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Spitzer-Auto-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60bf5576960719d5bdfb377d33bd5f6ebd1af7c682bcf7ccb74bbc0a75131088</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Oxford-Rehabilitation-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27919</link>
<guid>5e6c70cda1988d563aba2fa39bc65169</guid>
<pubDate>Fri, 12 Dec 2025 08:25:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Oxford-Rehabilitation-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ecf15ef57ec32f7971e68d43ed7a12dd7cdb09d5f791680ec2b1678eae70a9b</i><br /><br />Threat actor <b>description</b>: <i>0</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Parkes-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27920</link>
<guid>9d12e02aa8d4f4aa04006cdc0eca2517</guid>
<pubDate>Fri, 12 Dec 2025 08:25:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-Parkes-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>50004b56c379f6fcf286293cb85912671fbedf5e5b0eada5cd9260dec506e716</i><br /><br />Threat actor <b>description</b>: <i>Commercial & Residential Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Greene-Metal-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27921</link>
<guid>dd12bd299fda26a6e4bb066bb2d30d39</guid>
<pubDate>Fri, 12 Dec 2025 08:25:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Greene-Metal-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b7c348c0588407d0ae31dac1a7b0d59d07e32f94d63d044d51fa5e4b97f41669</i><br /><br />Threat actor <b>description</b>: <i>Building Materials</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Iroquois-Memorial-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27915</link>
<guid>50e8d294d7bce40086885257076ede3f</guid>
<pubDate>Thu, 11 Dec 2025 21:44:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Iroquois-Memorial-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>43df48f5aa47cdba40a7a6fc801ac3f80bd0053204ddd9d9496701d5081695b5</i><br /><br />Threat actor <b>description</b>: <i>Cost-efficient, high quality, consumer-responsive health care services</i><br />Target victim <b>website</b>: <i>iroquoismemorial.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Northern-Air-Systems2</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27910</link>
<guid>20bd92d00294780ca1aa5dcbb4474e36</guid>
<pubDate>Thu, 11 Dec 2025 18:25:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Northern-Air-Systems2</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>169700c6058e0978a889f86ea9a2decb47f94d1ab28964e643029e2e2557cf5a</i><br /><br />Threat actor <b>description</b>: <i>Northern Air Systems has been a leading manufacturer of high-quality HVAC systems for commercial and industrial applications for nearly three decades.As you could have noticed, we've made it 2nd time to penetrate totheir systems and locked almost 90 vms. At this time we've takenfive times more data (150gb) and we will upload the files soon. Detailed employee information (i-9 forms, passports, DLs, medicalinformation, pictures and so on), client data (DLs, addresses, emails), detailed financials, lots of projects information, contracts and agreements, numerous NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Woodard-Emhardt-Henry-Reeves--Wagner-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27914</link>
<guid>85fc1189e46c7278b2aeb7008506a6f2</guid>
<pubDate>Thu, 11 Dec 2025 14:49:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Woodard-Emhardt-Henry-Reeves--Wagner-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e55e2e91a32e53776d590a7b1fda244959e7defca40247f017b8eab2cbe97a2</i><br /><br />Threat actor <b>description</b>: <i>Woodard, Emhardt, Henry, Reeves & Wagner, LLP</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>A.S.A.P.-Restoration</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27903</link>
<guid>388e1fde50eb5883ad7b020fdb42b250</guid>
<pubDate>Thu, 11 Dec 2025 13:26:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>A.S.A.P.-Restoration</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ca91cf756d125d9ed3683b18bf740d26d08e77cf0383423ffee4b27d7a14a5f</i><br /><br />Threat actor <b>description</b>: <i>ASAP Restoration FL is a Florida-based company specializing in emergency restoration services for water, fire, and mold damage, operating 24/7 across South Flor...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ada-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27905</link>
<guid>9cc1efe753654fa0220a77e5c3c14478</guid>
<pubDate>Thu, 11 Dec 2025 12:13:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Ada-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6dcceab95f9da79ec52b03615f95a15802340dc059d2975a7916ddb31d758024</i><br /><br />Threat actor <b>description</b>: <i>ADA Technologies, Inc. is a Colorado-based manufacturing company 
with a focus on advanced energy storage and innovative products f
or advanced markets. The company utilizes third-party funding for
continuous research and development to create manufacturable pro
ducts tailored to the needs of its customers.

We will upload about 235gb of corporate data soon. Detailed emplo
yee information (passports, DLs, SSNs, phones, address, birth cer
ts, medical information and so on), detailed financials, client a
nd customer information, lots of project files, contracts and agr
eements, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>NSE-Insurance-Agencies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27898</link>
<guid>7577c54ea4b4258f50a4477dbd1bca3a</guid>
<pubDate>Thu, 11 Dec 2025 02:09:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>NSE-Insurance-Agencies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d397a71fc41ce3f1891b95932279aa790e42ccfd291abed58462cd645d6b2ef6</i><br /><br />Threat actor <b>description</b>: <i>NSE Insurance Agencies, Inc. is an independent insurance agency established in 1912, providing a comprehensive range of insurance services to individuals and business owners in Tulare, Kings, and Kern counties.</i><br />Target victim <b>website</b>: <i>www.nseinsurance.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Erie-Molded-Plastics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27897</link>
<guid>91a8651859745d25095a46fdda893cfa</guid>
<pubDate>Thu, 11 Dec 2025 00:30:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Erie-Molded-Plastics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e4d6f7baaad72f52154f1e68f655010fe3cf52339d2d192c60edc4c2ee387960</i><br /><br />Threat actor <b>description</b>: <i>Quality You Can Count On... Integral to our Rapid Response program is an extremely competitive pricing structure designed to save you money. We offer flexible order quantities and stocking programs to help integrate our closures into your production schedule. In addition, our products are manufactured within the highest quality standards. Our GMP facility is temperature controlled and has earned an ISO 9001:2008 certification. EMP Closures is the proprietary stock cap and closure business for Erie Molded Plastics. For more than 35 years, Erie Molded Plastics has been providing OEM and distribution customers custom injection molded parts and integrated packaging solutions. All of our custom and stock products are manufactured in our state-of-the-art molding facility conveniently located in Erie, PA. This temperature and humidity controlled plant features more than 20 molding presses, ranging from 85 to 725 tons. </i><br />Target victim <b>website</b>: <i>www.eriemoldedplastics.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lonich-Patton-Ehrlich-Policastri</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27891</link>
<guid>d4b928f113a81d37a37bdfe5a1fecfba</guid>
<pubDate>Wed, 10 Dec 2025 18:25:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Lonich-Patton-Ehrlich-Policastri</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6954dee89e76d1ca908f0230e8550c037ee50142cc0e9001067dae2623c7c272</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kirby-Agri</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27892</link>
<guid>3b9b987df093605d39c7aa0e30771742</guid>
<pubDate>Wed, 10 Dec 2025 17:25:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Kirby-Agri</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6158ac31e1bd255a1a1ca025927ab03bfedd4ae854727fb3246fe591c4f5bec</i><br /><br />Threat actor <b>description</b>: <i>Kirby Agri Inc. serves agricultural, landscape, and turf wholesalers with a complete line of fertilizer and plant nutrients.We will upload 15gb of corporate data soon. Employee information (name, DOB, address, email and so on), financials, customer information, and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>LINEMASTER-Switch</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27893</link>
<guid>990ecc138c1cbd618aca7cfd08cd1aa8</guid>
<pubDate>Wed, 10 Dec 2025 17:25:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>LINEMASTER-Switch</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7be37ebe2024244bead8c75ff53566532df1055eaa36f8dfbf78b73e2669ca46</i><br /><br />Threat actor <b>description</b>: <i>Linemaster Switch Corporation is a trusted manufacturer of medical and industrial footswitches, offering both custom and stock solutions with over 70 years of experience and ISO 13485 certification.We will upload about 25gb of corporate data soon. Employee information (passports, DLs and so on), detailed financials, customer information, projects, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Urban-Remedy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27883</link>
<guid>6b36917c087c21e48531ea1309ac0147</guid>
<pubDate>Wed, 10 Dec 2025 11:25:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Urban-Remedy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5fcfdcf3ee24a5ffb351dd61d42fd16d0f7ba5333aa08851c35f84a28732d30</i><br /><br />Threat actor <b>description</b>: <i>Food & Beverage</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vestil-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27885</link>
<guid>87208431a38b263a8212d32da9222f2d</guid>
<pubDate>Wed, 10 Dec 2025 11:25:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Vestil-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0ba1eeb8d30d6a7e9b188a379b271e9b76f362ab639470e5550bd2c8d6908ff</i><br /><br />Threat actor <b>description</b>: <i>Industrial Machinery & Equipment</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>dillonyarn.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27889</link>
<guid>5ebb9c2331e5ad574f452f293607041f</guid>
<pubDate>Wed, 10 Dec 2025 10:17:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>dillonyarn.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45f2be0805b21b7784b5592d0802c10aa39670b0d3a9e3a3973751abfc512709</i><br /><br />Threat actor <b>description</b>: <i>Dillon Yarn is a distributor of spun, flat and industrial yarn, as well as other incidental textile items for use in textile and related industries.</i><br />Target victim <b>website</b>: <i>dillonyarn.com</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cisneros</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27880</link>
<guid>30817601adbc53cc3d07ee109c602083</guid>
<pubDate>Wed, 10 Dec 2025 02:45:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Cisneros</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29bbbfac6e1c69c31f005d460d2e79b860bbfea79061a5004522755f058f5450</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.cisneros.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>rainbowtel.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27879</link>
<guid>8553bf408bb98c10bf0fdd4220b50329</guid>
<pubDate>Wed, 10 Dec 2025 01:27:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>rainbowtel.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7209aef1424bb3a28991f8c5652ce5621c7442fa7b10879eb0b71ac03e204f44</i><br /><br />Threat actor <b>description</b>: <i>Rainbow Communications offers reliable high-speed internet and phone services primarily in Northeast Kansas.  They cater to both residential and business clients, providing essential connectivity solutions.  We downloaded 200GB of selected information (accounting, HR, customer data, as well as confidential information).</i><br />Target victim <b>website</b>: <i>rainbowtel.net</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Teruya-Brothers-Ltd</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27878</link>
<guid>4a2d84630e650155dd3f0d107c9794a9</guid>
<pubDate>Tue, 09 Dec 2025 23:50:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Teruya-Brothers-Ltd</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ffaebef7c597fec3295868e7fab76d75570d4e5ecc86ce0ad4795eda1454a9a</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>teruyabrothersltd.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>CPS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27877</link>
<guid>4e69622f5a820f3d466927b558ba83ac</guid>
<pubDate>Tue, 09 Dec 2025 21:49:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>CPS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eb172703fe2cfa93d7bdbd19d5ca67447f77c54a0a608769e0915fd6d9c7c623</i><br /><br />Threat actor <b>description</b>: <i>CPS, Ltd. is a full-service engineering firm based in Grand Forks, ND, specializing in municipal engineering, transportation, water resources, solid waste management, and construction engineering. Established in 1979, the company aims to provide innovative, technically sound designs tailored to meet the unique needs of clients in communities, companies, and governmental agencies across North Dakota and northwest Minnesota. Their services also include land planning and surveying, ensuring accurate data and documentation for a variety of projects. CPS, Ltd. is committed to leveraging its experience and expertise to support clients in achieving successful project outcomes.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>James-Free-Jewelers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27875</link>
<guid>b2904d830c10d441213b8a7f67e9aafd</guid>
<pubDate>Tue, 09 Dec 2025 19:56:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>James-Free-Jewelers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>75e8b0bde0273a08ba42145fe253d7a3c24e77c0230e34eb4d12c36a82dad9bb</i><br /><br />Threat actor <b>description</b>: <i>James Free Jewelers specializes in fine jewelry and diamonds, offering a selection of engagement rings, Swiss timepieces, and luxury jewelry from renowned designers such as Mikimoto and Roberto Coin. Their extensive collection includes rings, bracelets, necklaces, and watches from prestigious brands like Rolex and Tudor. The company also provides custom jewelry design, repair services, and financing options tailored for clients seeking high-quality pieces. With locations in Dayton and Cincinnati, they cater to both local and online customers looking for exquisite jewelry and timepieces.</i><br />Target victim <b>website</b>: <i>www.jamesfreejewelers.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clean-Air</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27876</link>
<guid>25fadf1aed8557bf7c5355568201d8ee</guid>
<pubDate>Tue, 09 Dec 2025 19:56:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Clean-Air</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eeec364bb49b8e8ebd1549947040eebb4f84b5161a2c8e5d758cc064114dc414</i><br /><br />Threat actor <b>description</b>: <i>Baker Co. specializes in the engineering, testing, and manufacturing of made-to-order laboratory safety equipment, boasting over 100 years of industry experience. Their product offerings include biological safety cabinets, clean benches, pharmaceutical isolators, and fume hoods, among others. The company serves various sectors including biotechnology, pharmaceuticals, microbiology, and life sciences. With a commitment to biosafety and contamination control, Baker Co. collaborates with scientific partners to provide tailored solutions for laboratory automation and precision cell culture.</i><br />Target victim <b>website</b>: <i>www.cleanair.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dill-Dill-Carr-Stonbraker--Hutchings.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27862</link>
<guid>0ba41b0d638ce6603ba3187af10ea9ca</guid>
<pubDate>Tue, 09 Dec 2025 18:19:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Dill-Dill-Carr-Stonbraker--Hutchings.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a340ac3667a47825de7fa9ee31067cc1e9bda19e77ec274fee4ff68e3eef824</i><br /><br />Threat actor <b>description</b>: <i>A lawyer firm from Denver, USA.</i><br />Target victim <b>website</b>: <i>dillanddill.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sunair-Electronics-and-Circuitronix.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27863</link>
<guid>0ca43fa93984fe2501a08c50e7b72d36</guid>
<pubDate>Tue, 09 Dec 2025 18:19:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Sunair-Electronics-and-Circuitronix.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa1f8ae4d31f783d4eaa182a2bc46e4cfe7d7b1dc6162f99ce9969facaf97ff2</i><br /><br />Threat actor <b>description</b>: <i>Companies specialize in the manufacture of high-frequency communication products and printed circuit boards.</i><br />Target victim <b>website</b>: <i>sunairelectronics.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Inter-care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27869</link>
<guid>d697311aad4f58ad2c5d4286fc22980d</guid>
<pubDate>Tue, 09 Dec 2025 18:15:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>Inter-care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>66057397687cb66c90e254146a2dce211e5ddff6c20711004257b71782600b6f</i><br /><br />Threat actor <b>description</b>: <i>Full quickbooks dump, patients data, and financial data</i><br />Target victim <b>website</b>: <i>theintracare.com</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Center-of-Association-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27865</link>
<guid>d13d62b286a371638640a3f4638f1629</guid>
<pubDate>Tue, 09 Dec 2025 17:40:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>The-Center-of-Association-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>59bb6461087f1f6bc1313bebee675a840128a4b1acd7713be53078d29df3cfcb</i><br /><br />Threat actor <b>description</b>: <i>The Center of Association Management</i><br />Target victim <b>website</b>: <i>camihq.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hardesty--Hanover</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27856</link>
<guid>2ad6254f399210225fd55b419d4c855e</guid>
<pubDate>Tue, 09 Dec 2025 17:25:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Hardesty--Hanover</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d1f6abb5ff2d470be23378927a21199cd22880eef443442fe5c0fb5a7f92ccd</i><br /><br />Threat actor <b>description</b>: <i>H&H is an expert firm specializing in infrastructure engineering and kinetic systems structures, providing a broad range of services including architectural design, construction engineering, and geotechnical engineering.We are ready to upload 323gb of corporate data. Detailed personalinformation of employees (passports, DLs, headshots, visas, and a lot of forms containing personal information), detailed financials, confidential docs, agreements and contracts, project, drawings, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chastain--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27857</link>
<guid>42261fcdb3fa72a280e5adbb43bda240</guid>
<pubDate>Tue, 09 Dec 2025 17:25:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Chastain--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b2d1b82bdc00b9584b970515583cdbf5e55333528a31b6b07a308e3412a30b4</i><br /><br />Threat actor <b>description</b>: <i>Chastain is a professional consulting firm providing land surveying, land planning and development, civil, water/wastewater, construction, structural engineering, and urban planning services.We are ready to upload more than 90gb of corporate data. HR files, detailed financials, confidential files, agreements and contracts, project, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rodenburg-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27858</link>
<guid>5df66942fc13bbf265e17d1a3cb14b91</guid>
<pubDate>Tue, 09 Dec 2025 17:25:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Rodenburg-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8015f7cca72dd33035aefe7d42b8c319a90293c405b43f845817bd2b68dd9763</i><br /><br />Threat actor <b>description</b>: <i>The Rodenburg Law Firm represents collection agencies, commercialforwarders, lending institutions, auto and consumer finance companies, debt buyers, state colleges, health care organizations, and other creditors in credit matters including consumer and commercial collections.We are ready to upload more than 144gb of corporate data. Detailed employee information (passports, driver licenses and other docs), confidential legal files, court hearings, client information, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>GearGrid</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27859</link>
<guid>6f2c88b9135a5473b22386fd9f0632b1</guid>
<pubDate>Tue, 09 Dec 2025 17:25:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>GearGrid</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8d620e052456e2dbad6384525435b5eaf315743fb39b786e487b40fc6f70e2c</i><br /><br />Threat actor <b>description</b>: <i>GearGrid is a U.S.-based storage system and equipment manufacturer specializing in solutions for the fire and EMS, tactical, athletic, and public works industries.We will upload 16gb of corporate data soon. HR files, client files, financials, numerous project files, and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Wardlaw-Hartridge-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27853</link>
<guid>61e6cb26845d59928f3e93a2d4f8b2ef</guid>
<pubDate>Tue, 09 Dec 2025 15:26:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>The-Wardlaw-Hartridge-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dcc707efcbcdfdfd768a6ee38820d4fcfa00fd6a4597d694be8a888b43d0f984</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tele-Fonika-Cable-Americas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27860</link>
<guid>9c0a8e12265d2305a56af86e552e47d5</guid>
<pubDate>Tue, 09 Dec 2025 13:54:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>Tele-Fonika-Cable-Americas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd57b2151444d9f7055ad34d0d5740955367fdf1788d92cbfa37b8dc4c5dd446</i><br /><br />Threat actor <b>description</b>: <i>TFKable Group is a global leader in the production of high and extra-high voltage cables, primarily serving the energy sector. The company specializes in supplying land cables and accessories for offshore wind farms in the Baltic Sea, contributing to renewable energy projects. With a strong focus on quality and innovation, TFKable conducts advanced research and testing to ensure the reliability of its products. The company is actively expanding its operations and investing in modern technologies to strengthen the domestic supply chain for the energy sector - 10GB exf sales data , finance, partners, costumers infos + workers, IDs, invoices etc, sample provided</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>chemstress.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27851</link>
<guid>141facdacb30c9b2e86172c3cfdbecc1</guid>
<pubDate>Tue, 09 Dec 2025 08:49:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>chemstress.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b09402083b7d09a2684a31fef909e6648be47a0b7f210e8f6e52a12cb0bbdc4c</i><br /><br />Threat actor <b>description</b>: <i>Since its founding in 1965, the company has combined in-house disciplines — process, mechanical, piping, structural, instrumentation, electrical, and architectural …</i><br />Target victim <b>website</b>: <i>chemstress.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Serratelli-Hat</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27837</link>
<guid>af1a4ea496c2d7d01d9d1ebd8d5c82f4</guid>
<pubDate>Tue, 09 Dec 2025 08:25:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Serratelli-Hat</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>39e2250ca0f8406abe00ee3b0405c2a9112ad107571746a1b3ebaefffdcc6c58</i><br /><br />Threat actor <b>description</b>: <i>Manufacturing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Acu-Trans-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27849</link>
<guid>1c1c4d29dbbb2712f31f1b688ee8aaa8</guid>
<pubDate>Tue, 09 Dec 2025 05:18:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Acu-Trans-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24789604e6a14b3ac9ee11e7bfe02b21c1d3eb871d5e3c745e4af0277029dfe9</i><br /><br />Threat actor <b>description</b>: <i>300 GB Medical files</i><br />Target victim <b>website</b>: <i>www.acutranssolutions.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>b2be.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27830</link>
<guid>56713b5bbd4991e7a6cd723c2ec6063e</guid>
<pubDate>Mon, 08 Dec 2025 21:10:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>b2be.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22e2a9108ec0bdd896ddd293073a639015a4a9aa305fbbb9c93dc1a1806953bf</i><br /><br />Threat actor <b>description</b>: <i>B2BE provides a comprehensive suite of supply chain management solutions designed to enhance visibility, control, and efficiency for businesses globally. Their offerings include document management, e-invoicing, EDI, and automation tools tailored for both customer and supplier engagement. Targeting…</i><br />Target victim <b>website</b>: <i>www.b2be.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Redi-Carpet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27805</link>
<guid>a057378e3fd83af33775777b5183603b</guid>
<pubDate>Mon, 08 Dec 2025 20:25:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Redi-Carpet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>391f21b3646675c3b7c90c3421434171414642926f8b44ca32f0252802fb3c41</i><br /><br />Threat actor <b>description</b>: <i>Commercial & Residential Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Canno-Design</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27806</link>
<guid>800c987b1dabf9b106575da9bb5f15a6</guid>
<pubDate>Mon, 08 Dec 2025 20:25:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Canno-Design</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f3adeb428d39633631c88cf6fd97cdbb3f9d46498580d19448558c7ba7e23639</i><br /><br />Threat actor <b>description</b>: <i>Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>sandiegowarroom.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27827</link>
<guid>30c395dcc0e469d351859f1e0499bd16</guid>
<pubDate>Mon, 08 Dec 2025 19:25:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>sandiegowarroom.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f31cc5ca0dc70478e530c26d88a1b8d3332abd68149464afc70db1e39e5eb525</i><br /><br />Threat actor <b>description</b>: <i>The Westin San Diego is a hospitality establishment that offers specialized meeting spaces known as War Rooms. These facilities feature executive-style conference seating, advanced technology, and secure environments designed for legal professionals and businesses. The venue provides state-of-the-art amenities to support strategic planning, operational performance, and collaborative events. With dedicated meeting spaces and personalized service, The Westin San Diego creates an optimal environment for professional gatherings, strategy sessions, and business collaborations in the hospitality sector. Employees: 50 Revenue: $5 Million Industry: Hospitality  Phone Number: (619) 338-3611</i><br />Target victim <b>website</b>: <i>sandiegowarroom.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.goodmanmfg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27817</link>
<guid>67ba8120f499c6706644ce234fc5ee1c</guid>
<pubDate>Mon, 08 Dec 2025 18:50:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>www.goodmanmfg.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3280da5c5d707ee8a73d56c0394f13187dba42bf520867b66c4bfc70e6f1a1b9</i><br /><br />Threat actor <b>description</b>: <i>Administrative/System Files/ADMIN, DOAS,General operational, administrative records, and potential system configuration files /Proprietary Engineering Drawings/IP/Highly specific technical documents, schematics, and design files (Intellectual Property). The (MklUp) indicates marked-up or working drafts.Product Line/System Data /RoofTop Systems Folder, Goodman Models, Goodman 12.5 /Confidential information related to specific product lines,Systematically numbered Bitmap image files (BMP), which function as internal references for parts, components, or quality checks/Goodman LC</i><br />Target victim <b>website</b>: <i>www.goodmanmfg.com</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>hohmartin.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27811</link>
<guid>37c771d1bc9e621efc6c6c03c864f981</guid>
<pubDate>Mon, 08 Dec 2025 18:16:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>hohmartin.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a61d1c3fac94f3fb995134ffec650776b84882df25940fc0a1b462b8a774229</i><br /><br />Threat actor <b>description</b>: <i>House of Hope of Martin County provides a range of services aimed at supporting individuals and families in need, including food assistance, financial aid, housing support, and educational programs. Their initiatives, such as the Client Choice Pantry and various community resources, serve over 30,000 individuals each month. The organization also offers volunteer opportunities and encourages community involvement through events like charity tournaments. Their mission is to ensure a dignified process for those seeking help while effectively managing donations to support their programs. Employees: 50 Revenue: $5 Million Industry: Non-Profit & Charitable Organizations Phone Number: (772) 286-4673</i><br />Target victim <b>website</b>: <i>hohmartin.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Landreau-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27810</link>
<guid>eac53e141058c06737f091776b2e5462</guid>
<pubDate>Mon, 08 Dec 2025 17:46:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>The-Landreau-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ccbd0bb0e9266fa46d1e225861ba60faeee28cd585affa41f85bfeca2760dc0</i><br /><br />Threat actor <b>description</b>: <i>The Landreau Group is an independent insurance agency dedicated to serving the Minneapolis/St. Paul community and the greater metro area. They specialize in providing tailored insurance solutions for clients with complex needs, ensuring customers have the appropriate coverage to protect their businesses and homes. Founded in 2003 by Carlos Landreau, the company emphasizes a values-driven approach, prioritizing client relationships and offering integrity-driven service. With over 25 years of industry experience, they are committed to unraveling complexity and delivering knowledge to their clients.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.eliteflower.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27794</link>
<guid>4c524a05dcf524174f747e4006689e8f</guid>
<pubDate>Mon, 08 Dec 2025 16:26:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>www.eliteflower.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>93693c23aeda3c43a19db4d51c7673ed4a24376d93bc2431b4af6e796b1818da</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1991 and headquartered in Miami, Florida, Elite Flower specializes in...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>AGI-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27796</link>
<guid>74a4cc144b5ab22075db0cf92761830e</guid>
<pubDate>Mon, 08 Dec 2025 16:26:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>AGI-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47942ada3e2654798775c1a3083f003b5b4bfd331f96961a1ce5bbbabd39118f</i><br /><br />Threat actor <b>description</b>: <i>AGDisplays is an advanced display solutions specialist offering USA assembled, custom LCD application design and solutions across all industries.We are ready to upload 30gb of corporate data. Detailed personal information of employees (passports and DL scans, emails, phones,medical information), agreements and contracts, financials, credit card information, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nadel-Architects</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27797</link>
<guid>d36c8aa0e34a51ec87204ddc1329e2eb</guid>
<pubDate>Mon, 08 Dec 2025 16:26:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Nadel-Architects</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c3718ea53ba57a2f49288aa8ba591a5ce0dbd4edb17244a55d3608c489d87b8</i><br /><br />Threat actor <b>description</b>: <i>Nadel Architects has been a leader in comprehensive architecture design and planning services for over 50 years, known for their creativity, integrity, and cost-effective solutions.We are ready to upload 472gb of corporate data. Personal information of employees (passports and other information), agreements and contracts, confidential project files, financials, NDAs, and soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>TCG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27808</link>
<guid>60ca0083f9f3c57b8a91c3022d460c55</guid>
<pubDate>Mon, 08 Dec 2025 16:09:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>TCG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87a866e2a78dbfcb5ff7a0dde2e25d3747e35914768176ee8ac4353d570d1d2c</i><br /><br />Threat actor <b>description</b>: <i>TCG Inc delivers specialized information technology and management advisory services to federal government agencies, combining technical expertise with deep understanding of public sector operations. The company focuses on four core competencies: Agile development methodologies, federal shared services optimization, budget formulation and execution support, and health science analytics. This multifaceted approach enables TCG to address complex challenges across diverse government missions. The company's service offerings reflect extensive experience navigating federal procurement, compliance requirements, and mission-critical operations. TCG's Agile development capabilities help agencies modernize legacy systems and accelerate software delivery cycles. In budget management, the firm provides advisory support for formulation processes and execution strategies, helping agencies optimize resource allocation and financial planning. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nickman-DHK-Architects-Profondia-Talbot--Associates-Fishbowl-Solutions.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27800</link>
<guid>381c66445baad0ecd29fcf55354d77a2</guid>
<pubDate>Mon, 08 Dec 2025 15:25:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Nickman-DHK-Architects-Profondia-Talbot--Associates-Fishbowl-Solutions.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c18de02a9247f8a49fa544c5b7af9c6c5ac56ab43e2323d98e47642fa0b8af1</i><br /><br />Threat actor <b>description</b>: <i>We obtained about 24gb of data of the following companies:Nickman's Drug is a chain of five locally-owned community pharmacies located in Lemont and surrounding areas, dedicated to providing personalized, affordable pharmaceutical care.DHK Architects is an architecture and planning firm based in Boston, with offices in New York City and San Juan, PR.Profondia provides up-to-date data on the use of ICT in the Swissmarket.Talbot & Associates CPA is a bilingual accounting firm based in Manitoba, recognized as one of the top three accounting firms in Winnipeg.Fishbowl Solutions specializes in digital experience platforms, document management, and employee engagement services designed fororganizations seeking to streamline processes.You will find personal employee personal data, client information, numerous project files, accounting and financials and other internal operational files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-La-Vergne</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27801</link>
<guid>c2022b24f0b91de47194bcc16e578f02</guid>
<pubDate>Mon, 08 Dec 2025 15:25:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>City-of-La-Vergne</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06c4375826eafb993d84e30fe833d2723ad60be15c61935337ea2df377c8f30f</i><br /><br />Threat actor <b>description</b>: <i>The City of La Vergne provides essential services including police and fire departments, public library, and community events aimed at engaging and educating lo...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Capo-Brothers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27792</link>
<guid>777f838b6d6f456d4cd42e0c89e99c83</guid>
<pubDate>Mon, 08 Dec 2025 12:25:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Capo-Brothers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f69bb8714f42489e05606e2248dff911803ca7e388b7780db3ae965e6e21d21</i><br /><br />Threat actor <b>description</b>: <i>Capo Brothers is a premier commercial truck dealer located in Ronkonkoma and West Babylon, specializing in the sales, service, and parts of Isuzu and Mitsubishi...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Comcast</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27793</link>
<guid>817e911ebe6fbdaf957341830a65cc87</guid>
<pubDate>Mon, 08 Dec 2025 08:17:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>Comcast</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>58c973d42d27df2cca7baaded4b11037896f1e4710c2634d4b4ac79a91990d52</i><br /><br />Threat actor <b>description</b>: <i>As a global media and tech company, Comcast reaches hundreds of millions of customers, viewers, and guests with world-class connectivity and platforms and beloved content and experiences.The leak was made possible by Quasar Inc., a company that prepares technical documentation for Comсast and its Genesis project. The files contain design documentation for numerous cities, as well as detailed utility plans. https://corporate.comcast.com/</i><br />Target victim <b>website</b>: <i>corporate.comcast.com</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Caldwell--Company-Accounting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27790</link>
<guid>01efe0c4fb62ade937afa0bdf2ea0844</guid>
<pubDate>Mon, 08 Dec 2025 00:28:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Caldwell--Company-Accounting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ae3c689d8680349dab824728449d551a7f87d0ac094525d768a43c74756bea9b</i><br /><br />Threat actor <b>description</b>: <i>Caldwell Company Accounting is a well-respected CPA firm located in Plantation, FL, specializing in comprehensive accounting, tax, and financial services for both individuals and businesses in Broward County. With over a decade of experience, they offer services including IRS problem resolution, tax planning, QuickBooks support, and personalized financial consulting. Their commitment to delivering timely answers and professional advice ensures clients can navigate their financial journeys with confidence. The firm aims to provide permanent solutions to tax issues and help clients save on taxes and avoid costly mistakes.</i><br />Target victim <b>website</b>: <i>www.caldwellandcompanyaccounting.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jeffrey-W-Krol--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27786</link>
<guid>0c22d45f31acf0f4192c8c12b7a55dee</guid>
<pubDate>Sun, 07 Dec 2025 18:48:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Jeffrey-W-Krol--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fbe275d213eed5cd0780dd8ab79e4ea9a41277004b20e9008b11f2fd94540e2f</i><br /><br />Threat actor <b>description</b>: <i>Jeffrey W. Krol & Associates, Ltd. is a full-service certified public accounting firm based in Chicago, Illinois, serving a diverse clientele across the United States. The firm offers a wide range of services including personal financial planning, business accounting, tax preparation, and QuickBooks services. Their dedicated team provides professional and personalized guidance to both individuals and businesses, addressing various financial and business needs. With years of experience, Krol & Associates is committed to assisting clients in navigating their accounting challenges.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>David-M.-Schwarz-Architects</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27760</link>
<guid>87b428922a688f8a0e4ace11a473f29a</guid>
<pubDate>Sun, 07 Dec 2025 17:26:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>David-M.-Schwarz-Architects</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f0c1d4bc9a437fb9129d804801ed6252d45cc3b24ec5f7decc9eeac652ad2888</i><br /><br />Threat actor <b>description</b>: <i>Accounting Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gopher-Industrial</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27779</link>
<guid>b77670e4a9c8e282811958dcea1493a1</guid>
<pubDate>Sun, 07 Dec 2025 15:46:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Gopher-Industrial</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>13d90222add2c6c92458a69cf093fcfd134bd165e1c538163e51c52f6b18d05d</i><br /><br />Threat actor <b>description</b>: <i>Gopher Industrial is a premier industrial distributor specializing in hoses, welding products, safety solutions, and supply chain integration. They offer custom hose assemblies, inventory management through their GOcrib system, and a wide range of industrial supplies including safety products and welding equipment. The company focuses on delivering high-quality products and exceptional customer service to a diverse clientele. Their mission is to leverage technology to provide comprehensive solutions to customers around the globe.</i><br />Target victim <b>website</b>: <i>www.gopherindustrial.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>elematec</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27766</link>
<guid>dc4a1c1e778909c03a41d2c672c2b962</guid>
<pubDate>Sun, 07 Dec 2025 15:38:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>elematec</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>971e2e4256826a469ed689bb76e4feb047cdac491f09d2c0da74a25cdcb61faf</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Elematec Corporation is a Japan-based company engaged in procurement and supply of electronic components, semiconductors, displays, and other industrial materials. It also offers logistic, strategic inventory management, and technical support services. Furthermore, Elematec develops various products like emission components and touchscreen panels, contributing to the manufacturing industry worldwide.</i><br />Target victim <b>website</b>: <i>elematec</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>Galesi-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27780</link>
<guid>a9d671a92095bb4bbd7ff64507e8f1e8</guid>
<pubDate>Sun, 07 Dec 2025 14:42:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Galesi-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f8b200228f9120cca6f8a242072bf2813d94f9dd46c1ca829051aeec76cfa1f</i><br /><br />Threat actor <b>description</b>: <i>Galesi Group is a national real estate developer focused on creating dynamic buildings that enhance communities and drive progress. Established in 1969, the company manages a diverse portfolio of over 11 million square feet of industrial, commercial, retail, and residential properties, primarily in New York's Capital Region. Their services include construction management, property management, real estate development, and third-party logistics. Galesi Group aims to meet the needs of various clients by providing tailored spaces and fostering economic growth in the communities they serve.</i><br />Target victim <b>website</b>: <i>www.galesigroup.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Quality-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27781</link>
<guid>2f5c144531b316a819f61e78392e3d6d</guid>
<pubDate>Sun, 07 Dec 2025 14:42:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Quality-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46cc28d7659e6074c7f793deefc225f06e73240653604830480953b6d1498e63</i><br /><br />Threat actor <b>description</b>: <i>Quality Companies, headquartered in Youngsville, Louisiana, is a company that offers energy-related products and services and provides onshore and offshore construction, fabrication, maintenance, and other oil and gas-related services.</i><br />Target victim <b>website</b>: <i>qualitycompanies.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>La-Costa-Dental-Excellence</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27753</link>
<guid>0ff0a77035f9569943049ed3e980bb0d</guid>
<pubDate>Sun, 07 Dec 2025 13:25:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>La-Costa-Dental-Excellence</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>abfe5ace043fad4282d6f5e2db23a8f29e5578ff1beefb5afa8fe2e552cc46d4</i><br /><br />Threat actor <b>description</b>: <i>Healthcare Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Acoustical-Control</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27754</link>
<guid>0eb7a39fc22086b7e6249d1b5253dc2b</guid>
<pubDate>Sun, 07 Dec 2025 13:25:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Acoustical-Control</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>51fcda881b5fd5af3547393bf992fb300e35965eacdd4e74349aa12d57d28dfe</i><br /><br />Threat actor <b>description</b>: <i>Industrial Machinery & Equipment</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kanes-Furniture</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27759</link>
<guid>b54daf1b0028f1c892d8e3a56261d078</guid>
<pubDate>Sun, 07 Dec 2025 12:30:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Kanes-Furniture</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6aadbf1bf72e52af689cafa01f987e24d04ce0ba4db1ea2daabf25c3f882afb8</i><br /><br />Threat actor <b>description</b>: <i>Kane's Furniture</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>four-points.marriott.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27739</link>
<guid>259618323d3becf5697603b5a58254dd</guid>
<pubDate>Sun, 07 Dec 2025 10:39:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>four-points.marriott.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3b184f72c13855789b28b25487e4a40ddb90fd416fa4b694353c9cc01275a34</i><br /><br />Threat actor <b>description</b>: <i>Marriott Bonvoy™, an award-winning travel program, offers a brand for every type of journey. Earn an...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>physiciansmedicalbilling.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27747</link>
<guid>fdb72cbd0be58617706a18144e4edd05</guid>
<pubDate>Sun, 07 Dec 2025 10:39:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>physiciansmedicalbilling.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8bddcbbff8d7900f16065c3aaf81a22aed0c428e367b54781f7dd7f3dfb85d36</i><br /><br />Threat actor <b>description</b>: <i>Company Description: Physicians Medical Billing (PMB) is a full-service medical billing and accounts...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fish--Richardson-Overview-Metrics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27756</link>
<guid>b3511c39b8e9c8fedc482b0f518c36eb</guid>
<pubDate>Sun, 07 Dec 2025 08:47:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Fish--Richardson-Overview-Metrics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd58d25bac2e758c4732dd3520bfe6aa2763aafc618df45f18f44c295a5896b1</i><br /><br />Threat actor <b>description</b>: <i>Fish & Richardson, founded in 1878 and headquartered in Boston, Massachusetts, is a law firm specializ…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Benchmark-Electronics-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27734</link>
<guid>e0034a76c1f340348a2ac9abf6fc7a85</guid>
<pubDate>Sat, 06 Dec 2025 20:15:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Benchmark-Electronics-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c7f95affbe464cd93762d6d5a62feabb12f5e99944fd5d56046395799a3f266</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Benchmark Electronics Inc. is a global provider of integrated technology solutions and manufacturing services. Located in Arizona, USA, the company offers its services in various sectors including medical, industrial, aerospace, and defense. They specialize in electronic manufacturing services (EMS) and product design, engineering, technology solutions, advanced manufacturing, and after-market services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jack-Levine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27703</link>
<guid>8c5b85b2e2efb5bc2756a63747c720e9</guid>
<pubDate>Sat, 06 Dec 2025 18:25:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Jack-Levine</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbdf3b20d06ae61fa47b03eed578a2fdda441f89a2b112448f9f40251f1c933a</i><br /><br />Threat actor <b>description</b>: <i>Jack Levine PA CPAs is a boutique CPA firm based in the Midtown/Wynwood area of Miami, specializing in corporate tax and accounting services for businesses, ind...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.mylawcompany.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27707</link>
<guid>5dc8b954ec4e47baffc64f98d496282c</guid>
<pubDate>Sat, 06 Dec 2025 18:18:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>www.mylawcompany.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>64bd7983ca3af9c43996f526ef5b9e92ae92e55caa39aa256170b876bb85196e</i><br /><br />Threat actor <b>description</b>: <i>700gb 4,500 cases, personal data, passports, driver's licenses, medical data, medical card</i><br />Target victim <b>website</b>: <i>www.mylawcompany.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>lso.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27708</link>
<guid>80dcdb9cf644bba63464a2795f93a562</guid>
<pubDate>Sat, 06 Dec 2025 18:16:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>lso.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>21b1e292850ab93d287511185767e5e1a9f05abcfbfee9c03d451e2afffff71d</i><br /><br />Threat actor <b>description</b>: <i>Lone Star Overnight (LSO) is headquartered in Austin, Texas, and, over the last 30 years, has become a leading regional parcel delivery company. LSO has a netwo... - LSO does not understand encryption so we demonstrated for them how encryption works. We have ~500 GB data total includin...</i><br />Target victim <b>website</b>: <i>lso.com</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>Precision-Compounding</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27704</link>
<guid>355622b7e39186c76b1c8d7c90d8d67b</guid>
<pubDate>Sat, 06 Dec 2025 18:15:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Precision-Compounding</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c4682779508c9f66633f347f8009671000516e0a084382cac3f5f0aacc82a65</i><br /><br />Threat actor <b>description</b>: <i>Precision Compounding Pharmacy, located in Omaha, NE, specializes in creating customized medications that fit the unique needs of each patient. They collaborate with healthcare providers and patients to develop unique formulations, ensuring that all compounded medications are safe, effective, and accurately made. Their services include general compounding, men's and women's health, dermatology, low dose naltrexone, veterinary care, and nutritionals. With a commitment to quality and personalized care, they aim to achieve the best therapeutic outcomes for their clients.</i><br />Target victim <b>website</b>: <i>pcrxomaha.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Towerstream</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27682</link>
<guid>34b9df8d0ab73f851c2950554db628f7</guid>
<pubDate>Sat, 06 Dec 2025 05:26:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Towerstream</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4810a1d13f9eebe7edbb293e6b748cdfe1b5df01c53f02e345996640c76d9cee</i><br /><br />Threat actor <b>description</b>: <i>Broadcasting</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Khazzan-Logistics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27683</link>
<guid>8699bde6741dbac805e5e1f4e1f9651a</guid>
<pubDate>Sat, 06 Dec 2025 05:26:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Khazzan-Logistics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6e36ede0f1e5bf102941cf2f0c4eba485454bf46c256a4006ce6f4e157dc17e6</i><br /><br />Threat actor <b>description</b>: <i>Freight & Logistics Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Canvas-Church</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27697</link>
<guid>e71a19dede1686a40e8fddb2e0aa24ae</guid>
<pubDate>Sat, 06 Dec 2025 04:57:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Canvas-Church</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3da8bf8fc066555ff02c0022a72504abebc2e3e9c20b90a14da608b2c3cf7bd3</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>canvas.church</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trumbull-County</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27694</link>
<guid>569d09d580e772e2acaf522ba342ac0e</guid>
<pubDate>Sat, 06 Dec 2025 03:15:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Trumbull-County</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1cc51f427477be108c9675c30c3a78952cb1e908d38c3824de6527a092d9d97</i><br /><br />Threat actor <b>description</b>: <i>The Internal Story of a County in the State of Ohio.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>bennett.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27693</link>
<guid>46ee2a36b86b9de6d43d6e7a6774889a</guid>
<pubDate>Sat, 06 Dec 2025 00:17:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>bennett.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c92cfa44d8d8e3e7ff4c05308d3a69c69f473e0c956ef1d56236362000e6281</i><br /><br />Threat actor <b>description</b>: <i>Bennett College is a liberal arts college located in North Carolina, dedicated to empowering women through education. The institution offers a unique microcollege model that emphasizes personal attention and support for students, including high school, veterans, and first-generation college students. With a focus on equity in various fields such as health, education, and the environment, Bennett College prepares its students for successful careers and global citizenship. The college is recognized for its strong retention rates and innovative academic programs, including a Minimester model that enhances learning accessibility. Employees: 200 Revenue: $20.9 Million Industry: Colleges & Universities Phone Number: (336) 517-2100</i><br />Target victim <b>website</b>: <i>bennett.edu</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Beecher-Walker-Architects</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27676</link>
<guid>5ffd53ae71eb2693352a7c03c3cfd93c</guid>
<pubDate>Fri, 05 Dec 2025 19:25:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Beecher-Walker-Architects</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eec493d8a66b694a81419ff69023a686851ac95eee03056225eabb60667ccaf9</i><br /><br />Threat actor <b>description</b>: <i>Building Materials</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>King-City-Lumber</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27677</link>
<guid>8742739033fea88b95401b78a630f110</guid>
<pubDate>Fri, 05 Dec 2025 19:25:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>King-City-Lumber</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ce89de7003e5418cffbf78ad0676d71282d1015cbaff70d6513fffe233953de</i><br /><br />Threat actor <b>description</b>: <i>King City Lumber is a well-established provider of quality lumber and building materials, specializing in custom metal structures for over 50 years in the Midwe...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shumate-Mechanical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27674</link>
<guid>18f16de5c7012d9ab4e5de2a0dcb829b</guid>
<pubDate>Fri, 05 Dec 2025 18:25:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Shumate-Mechanical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>20fbb6601667a2e7a47812f02bf1575943a78c076de7425752817aa8914fc7d7</i><br /><br />Threat actor <b>description</b>: <i>Commercial & Residential Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>AvtechTyee</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27669</link>
<guid>ab8867645b0ef41d278102c85b55f782</guid>
<pubDate>Fri, 05 Dec 2025 16:25:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>AvtechTyee</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab148e60f62777b4c72d12b9fa2cd6373f304ff52aa6949f9657e11427a7c4ec</i><br /><br />Threat actor <b>description</b>: <i>AvtechTyee is a company operating in the aerospace and defense industries.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Foster--Eldridge</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27670</link>
<guid>ee00009ae546957c0eb323df484a7d8c</guid>
<pubDate>Fri, 05 Dec 2025 16:25:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Foster--Eldridge</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7ab2feb7c8a38594b2844fbdf40f2333769460a61214ebe6abaade8425dee0c</i><br /><br />Threat actor <b>description</b>: <i>Foster & Eldridge, LLP is a Boston area boutique law firm recognized for its excellence in medical malpractice defense. The firm specializes in representing health care providers in professional liability matters and offers consulting and litigation services in risk management and regulatory compliance.We are ready to upload 60gb of corporate data. Detailed client personal information (passports, DLs, phones, addresses, medical information and so on), financials, hearings, police records, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rosland-Capital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27672</link>
<guid>27a34f041b383b2b229aea2a38b36c16</guid>
<pubDate>Fri, 05 Dec 2025 16:25:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Rosland-Capital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a399b8a375660758d1c7f07c66f08262d4609ce03bb53dce8ae9807fec13c6f</i><br /><br />Threat actor <b>description</b>: <i>Rosland Capital is a precious metals asset management firm that sells gold and other precious metals in physical form.We are ready to upload corporate data. Projects, clients data, a bit of confidential files and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Consolidated-Sterilizer-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27668</link>
<guid>dc274708bba5df6e8b2d99932a71b1ff</guid>
<pubDate>Fri, 05 Dec 2025 14:25:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Consolidated-Sterilizer-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eb14ce2f2ea0dc77e9f7060360afd2b89ea804f054017a86c1985a8d657b9973</i><br /><br />Threat actor <b>description</b>: <i>Consolidated Sterilizer Systems has been manufacturing steam sterilizers and autoclaves in Boston, Massachusetts since 1946, setting the industry standard for over 60 years. Their product range includes customizable laboratory autoclaves for various applications such as animal research, life sciences, food safety, and healthcare environments.We are ready to upload about 10gb of corporate data. Employee personal information (passports, DLs, phones, addresses, medical reports and so on), financials, contracts and agreements and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fargo-Park-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27678</link>
<guid>2d09a47c442ccf7b6b18c11b6930d3a7</guid>
<pubDate>Fri, 05 Dec 2025 14:19:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Fargo-Park-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47d75410e342b3abe61dc4e4c50f512add3dbc456d52d3081eb5f73c1936d478</i><br /><br />Threat actor <b>description</b>: <i>https://www.fargoparks.comFargo Park District, with over 2,100 acres of land, is divided into Finance, Enterprise, Events, Operations, Programming and Facilities, Human Resources, Valley Senior Services and Courts, and Community Physical Activity. The Fargo Park District boasts over 150 parks, amenities, and over 170 kilometers of trails and paths.</i><br />Target victim <b>website</b>: <i>fargoparks.com </i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>insightchicago.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27711</link>
<guid>447f2fe245facad3a6a6966ebb3add3b</guid>
<pubDate>Fri, 05 Dec 2025 11:56:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>insightchicago.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4fb0c48445a6d3da6ef3fcb14671cddac80d821678ae65f8ccfd861f4534fb4f</i><br /><br />Threat actor <b>description</b>: <i>Welcome to Insight Hospital and Medical Center in Chicago. Our state-of-the-art facility offers comp...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>jobberswarehouse.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27712</link>
<guid>c30729adc645e1b908c3a1ac09527804</guid>
<pubDate>Fri, 05 Dec 2025 11:56:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>jobberswarehouse.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e699cca25a4a0113a314c6c864c1e442c9cc013cdcb88263d79bd449a942de97</i><br /><br />Threat actor <b>description</b>: <i>You cant help but make the right move with Jobbers Moving Storage and Allied Van Lines. Because we k...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>rjwalker.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27713</link>
<guid>e78baa1ce9b86173c8d5f876a00e64e5</guid>
<pubDate>Fri, 05 Dec 2025 11:56:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>rjwalker.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ada7e80d56ba183d0be2d4aa3641691bf7689d3a35629bf4f0194e184109646</i><br /><br />Threat actor <b>description</b>: <i>R J Walker Plumbing , Heating, Electrical and Cooling.Our family owned and operated business, with s...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>terracaribbean.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27717</link>
<guid>5a2abde8196f74354e8a23ba9551d0cc</guid>
<pubDate>Fri, 05 Dec 2025 11:56:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>terracaribbean.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a5bb4c1163bc9d5414cf19b8a9072546ecaa4d7289fbcc6cf429e2a7c95ccc7</i><br /><br />Threat actor <b>description</b>: <i>Terra Caribbean is your expert in Caribbean real estate, we&#039;re well equipped to help find you y...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>brumfieldconstructioninc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27718</link>
<guid>e619f7a17016c62600bafacfb8e15a6f</guid>
<pubDate>Fri, 05 Dec 2025 11:56:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>brumfieldconstructioninc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5bc9da89540b4436137475424fed1a44263897a82139defef2d3bafb5ca50515</i><br /><br />Threat actor <b>description</b>: <i>Brumfield Construction, Inc. is a professional commercial and residential construction company locat...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>intellioan.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27727</link>
<guid>214846ab5ca61bd83f438070a4ef7e34</guid>
<pubDate>Fri, 05 Dec 2025 11:56:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>intellioan.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>adfd2714ed93302ce63c75a34ef2c913458789ac32e1e33369f2797d3cc247ea</i><br /><br />Threat actor <b>description</b>: <i>Experience the Intelliloan difference! Get expert guidance on home loans, refinancing, and mortgage...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>Smith-Fire-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27664</link>
<guid>8af7aa91dea57ef40a8a11afea500470</guid>
<pubDate>Thu, 04 Dec 2025 23:48:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Smith-Fire-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8645cb69cad4fb266dcc7e806916b8c0e90ce354fbf10159d3bdbf42faabd45</i><br /><br />Threat actor <b>description</b>: <i>A company that provides comprehensive fire protection services for buildings.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kana-Pipeline-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27663</link>
<guid>83c15a5063efa34c1e31fc0a00ff04f6</guid>
<pubDate>Thu, 04 Dec 2025 22:25:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Kana-Pipeline-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc28847d991f5673459e5cb87ef8fc4ec7af2231695e7d45c31c12ba17450478</i><br /><br />Threat actor <b>description</b>: <i>Civil Engineering Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ABC-Home--Commercial-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27662</link>
<guid>f17e28704bf2b4702992842989431d24</guid>
<pubDate>Thu, 04 Dec 2025 19:26:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>ABC-Home--Commercial-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba2a15a4223587477d8f755cc4d58322a04bdc769467f6f5cbc42131975a1352</i><br /><br />Threat actor <b>description</b>: <i>ABC Home & Commercial Services is a provider of home and commercial pest control, air conditioning, heating, lawn care and more.We are ready to upload 24gb of corporate data. Employee personal information (passports, DLs, phones, addresses, medical information and so on), financials, contracts and agreements, confidentialfiles and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Medisend</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27661</link>
<guid>e7c3645a3ea1024d6704a3133c7930a8</guid>
<pubDate>Thu, 04 Dec 2025 18:26:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Medisend</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3264857dd7e4905dd3c731e628e6212ef1db97d4953d9382273e6c20cf4b3b9f</i><br /><br />Threat actor <b>description</b>: <i>Education</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Minor-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27654</link>
<guid>c00e300d85cc5e5f0d11a782da9bf045</guid>
<pubDate>Thu, 04 Dec 2025 16:26:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-Minor-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d4342c83720466f6cf098595523af0e5aaa351edb8c7bcb0c8c15c747768369c</i><br /><br />Threat actor <b>description</b>: <i>The Minor Firm is a premier law firm located in Northwest Georgia, established for over 40 years. They specialize in complex legalmatters, providing superior representation to individual and business clients in areas such as Health Care Law, Human Resources Law, Municipal & Utility Law, Real Estate Transactions, and EstatePlanning.We are ready to upload 63gb of corporate data. Client and employee personal information (Passports, DLs, phones, addresses and so on), court confidential documents, police reports with photos andother legal files, financials and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Scientology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27655</link>
<guid>36e7410e19523e17b648b49ad9230d75</guid>
<pubDate>Thu, 04 Dec 2025 15:27:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Scientology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea513e9d441d7465430fec8a2bdd241e447d5e952417dc64e327bba4cc49dc27</i><br /><br />Threat actor <b>description</b>: <i>Non-Profit & Charitable Organizations</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>McManes-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27656</link>
<guid>682793af8891c399ad9dee25d69700fb</guid>
<pubDate>Thu, 04 Dec 2025 15:27:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>McManes-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>69039b74c7b6802229e18730d802b23ff8d62e9ed0fe435794e5346c412ead54</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Institutional--Supermarket-Equipment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27657</link>
<guid>9b203b041a90f85433f0acde61ae1cc7</guid>
<pubDate>Thu, 04 Dec 2025 15:27:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Institutional--Supermarket-Equipment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>254b86992add6a07070e90a2b0c91c95cfb7c36aa1db38edf821ba59ab198c42</i><br /><br />Threat actor <b>description</b>: <i>Advertising & Marketing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Peter-Meijer-Architect</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27658</link>
<guid>b95466b8b139e9e1fa1400d527798b7c</guid>
<pubDate>Thu, 04 Dec 2025 15:27:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Peter-Meijer-Architect</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ddba90303607d56f2412652e5da59f3fa1993d8cf56026cd48661b32969cd031</i><br /><br />Threat actor <b>description</b>: <i>Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>sspinnovations.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27653</link>
<guid>3af72c083ddb534a6fe310bc744b5809</guid>
<pubDate>Thu, 04 Dec 2025 13:25:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>sspinnovations.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cfcbfc5bbcffaa25818124e24258aa7068d1220b2babb0811af5f158f3e719c3</i><br /><br />Threat actor <b>description</b>: <i>At SSP Innovations, we help utility, pipeline, and telecommunications organizati...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Yellow-Cab-of-Columbus</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27651</link>
<guid>7b9291a4431d2198fe9a16bb135f3736</guid>
<pubDate>Thu, 04 Dec 2025 09:25:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Yellow-Cab-of-Columbus</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>571062a1049db04daecdb0345a6f2dd888ad510250e5d735a057da6fb830713a</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Quasar-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27650</link>
<guid>28c9325a8cf6c9b1ee059630afc5a838</guid>
<pubDate>Thu, 04 Dec 2025 04:58:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>Quasar-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd91a9c8b777e1f599e5ab66a9a8ea4ffa09f643c13731fe6be4e16548619d37</i><br /><br />Threat actor <b>description</b>: <i>Quasar, Inc. specializes in high-quality design, implementation support, and related services tailored for the telecommunications industry. Since 1997, the company has set a benchmark with efficient and cost-effective network designs implemented across five continents and over 100 cities. Their offerings include plant network system designs, field services for strand work, and consulting to enhance operators' competitiveness. Additionally, Quasar provides complimentary services such as training and troubleshooting support to adapt to the evolving needs of the industry.Network projects, drawingsDetailed drawings of many cities with communications designsVarious information https://www.quasar.us</i><br />Target victim <b>website</b>: <i>www.quasar.us</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>CCJM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27648</link>
<guid>09a04b5f6189f34a3a8bb148c87cce78</guid>
<pubDate>Wed, 03 Dec 2025 21:29:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>CCJM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f844195b0f58f84119be7abf504215c74b931d95361720f61b6163505ee83afa</i><br /><br />Threat actor <b>description</b>: <i>CCJM is a multi-disciplined engineering firm that has been providing client-focused engineering solutions since 1979. Their services include buildings and facilities, civil/site work, construction management and inspection, energy solutions, smart technology, surveying, transportation, and water/wastewater management. The company emphasizes a collaborative approach to exceed client expectations through high-quality service and value. CCJM serves a diverse range of clients, including public and private sector projects, with a commitment to delivering innovative engineering solutions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clayco-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27639</link>
<guid>6bea0403f89e400ccd9b50f6f5875d27</guid>
<pubDate>Wed, 03 Dec 2025 20:15:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Clayco-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bad898ad2d17e3a1bfc90285bf6a73b8eb4cfdf93070336a7dc6ef95341404be</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.claycoelectric.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Valley-Eye-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27640</link>
<guid>42ada6a116005062613a49add8ab908b</guid>
<pubDate>Wed, 03 Dec 2025 20:13:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Valley-Eye-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e80d86b890b21a8225aed264ee853fb64d5f6558fa61646313fc4134e3e7e7a6</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.valleyeye.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>COTTAGE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27642</link>
<guid>c7710caff9842968fac74321fd95b77c</guid>
<pubDate>Wed, 03 Dec 2025 20:13:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>COTTAGE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc2444e6898dcdec7724c7a4ac86f8714af165c65193697aa24c4e151839b81e</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.cottagehospital.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Providence-Academy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27647</link>
<guid>df17389413b21cab96900be63f2c7ec4</guid>
<pubDate>Wed, 03 Dec 2025 19:30:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Providence-Academy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>39fb6b1f742e53a841229f15f6dc007f82366a9b20c1add6236b1d20312d88fd</i><br /><br />Threat actor <b>description</b>: <i>Providence Academy was established as a private Christian school. The institution's staff demonstrated a disregard for their own security and that of all their students. As a result, all student databases were accessed, revealing all personal information, including SSNs. The most unsafe and unsafe job was the Chief IT Director! This is simply nonsense! Numerous financial documents and confidential employee data were also leaked.</i><br />Target victim <b>website</b>: <i>providenceacademy.org</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Golden-Artist-Colors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27637</link>
<guid>ae8fec2f6956a0922e374a7c9d096d28</guid>
<pubDate>Wed, 03 Dec 2025 19:25:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>Golden-Artist-Colors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2596370a614b4b7b3287a19030a4713837c0a5691b311dc10a394bdb7e1bffce</i><br /><br />Threat actor <b>description</b>: <i>A major manufacturer of art materials for professional artists and designers: acrylic paints, oils, watercolors, pastels and other media/materials.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pan-O-Gold-Baking-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27636</link>
<guid>e2692f5522a9bf6fe212e70758d0701b</guid>
<pubDate>Wed, 03 Dec 2025 18:24:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Pan-O-Gold-Baking-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>788133cd1e1e431af2719f29aca9bae17e89bf52379c918b8709d7299a4937cd</i><br /><br />Threat actor <b>description</b>: <i>With a rich history dating back to 1906, Pan-O-Gold Baking Company has grown to include three state-of-the-art bakeries, making usone of the top wholesale bakers in the Midwest.We are ready to upload 21gb of corporate data. Employee information (DOB, phones, addresses and so on), agreements and contracts, detailed financials, client information, large amount of internaldocuments.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>cpasch.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27646</link>
<guid>614702957b7f03d0e9e4bcd2370c3a6d</guid>
<pubDate>Wed, 03 Dec 2025 18:18:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>cpasch.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1293c9459899c217de112b3673e248f75cdc7b0c049e4bc82d678fbbde9ebe86</i><br /><br />Threat actor <b>description</b>: <i>Ransom: 200gb
150k</i><br />Target victim <b>website</b>: <i>cpasch.com</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>Davis-Kitchens-United-States</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27643</link>
<guid>110be03bce924f1eb65caf8491effba0</guid>
<pubDate>Wed, 03 Dec 2025 16:51:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Davis-Kitchens-United-States</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>adb46e45821cad693bfa926dd5e8a3c1cebd9a78f7ca0e351f7872565f561b28</i><br /><br />Threat actor <b>description</b>: <i>Davis Kitchens, United States</i><br />Target victim <b>website</b>: <i>daviskitchens.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Custom-Engineered-Wheels</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27630</link>
<guid>4e111a3fe1958d7f4c0215bba108df0e</guid>
<pubDate>Wed, 03 Dec 2025 16:25:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Custom-Engineered-Wheels</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38e648517dfae2fa7eb482e4e0b6ac2ba82f5f9e307996b209b8c331678fd137</i><br /><br />Threat actor <b>description</b>: <i>CEW Inc. specializes in custom injection molding solutions, utilizing advanced technology to produce polyurethane foam products. They offer a diverse range of products, including industrial wheels, medical mobility solutions, and components for bicycles and recreational vehicles.We are ready to upload 65gb of corporate data. Detailed employee information (DOB, phones, addresses, documents scans and so on), agreements and contracts, numerous, confidential files, financials, client information, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Building-Controls-and-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27631</link>
<guid>e3354d31c6019a82e5f8d20088c5afdb</guid>
<pubDate>Wed, 03 Dec 2025 16:25:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Building-Controls-and-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3467903103656580167b1c6ad62fddc308d07e0d255ce3ef16512d6646938998</i><br /><br />Threat actor <b>description</b>: <i>Building Controls and Services, Inc. (BCS) provides innovative building automation, mechanical equipment, and energy management solutions aimed at creating efficient and comfortable environments for facility owners and managers.We are ready to upload 12gb of corporate data. Detailed employee information (DOB, DLs, SSNs, phones, addresses, documents scans and other docs of at least 212 employees), agreements and contracts, confidential files, detailed financials, client information, disclosure agreements, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eggelhof</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27632</link>
<guid>0753a43a5366ab9a63697fd9f3abfb9d</guid>
<pubDate>Wed, 03 Dec 2025 15:25:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Eggelhof</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>133594fd10eae2a46eec1d8ddeff6252bbaab6c9fc32e9592c75f2d4f58a662c</i><br /><br />Threat actor <b>description</b>: <i>Eggelhof Inc is a Houston-based company established in 1926, specializing in engineering products such as filtration and water treatment, piping and plant equipment, and steam specialties.We are ready to upload 67gb of corporate data. Projects, employeeinformation (DOB, phones, addresses and so on), agreements and contracts, financials, client information, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>LA-Injury-Attorneys</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27621</link>
<guid>e62e4e249110f293347233352a4edf81</guid>
<pubDate>Wed, 03 Dec 2025 14:25:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>LA-Injury-Attorneys</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>892320df3756e7959943b139ccdc713283295d02d5a6a7e970d3348f9488273e</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Urbana</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27623</link>
<guid>5abad9111ffcd62ba77847ae11e1ae65</guid>
<pubDate>Wed, 03 Dec 2025 14:25:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>City-of-Urbana</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3b670cad8a7c0300ec9601d253b5bcdd758050586d35a5b1f8108f38ad848731</i><br /><br />Threat actor <b>description</b>: <i>Government</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rouse-Frets-White-Goss-Gentile-Rhodes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27625</link>
<guid>4bc8e183d66e91b1282955588fe864eb</guid>
<pubDate>Wed, 03 Dec 2025 14:25:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Rouse-Frets-White-Goss-Gentile-Rhodes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b999301db938e2799b526614a9a735775f9e333e605aa8a75ebf2140d5ab8a58</i><br /><br />Threat actor <b>description</b>: <i>On September 30, 2018, the law firms of Rouse Frets Gentile Rhodes, LLC and White Goss, P.C. merged and became Rouse Frets White Goss Gentile Rhodes, P.C.We are ready to upload 87gb of corporate documents such as: detailed personal information clients and employees (SSNs, passports, driver licenses, addresses, phones, emails and so on), lots of confidential legal documents, court hearings, police reports, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wynn--Wynn</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27626</link>
<guid>ffb430ebdabce62d4d56f4e13cb50fa4</guid>
<pubDate>Wed, 03 Dec 2025 14:25:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Wynn--Wynn</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>71ff45cf85096a63efa9b668a73b284036a7cb51570ae5a126dbafda73e8f73d</i><br /><br />Threat actor <b>description</b>: <i>Wynn Wynn, P.C. is a general practice law firm based in Southeastern Massachusetts, offering a wide array of legal services including personal injury, family law, business litigation, criminal law, and real estate among others.We are ready to upload 12gb of corporate data. Another one law firm that doesn't case of their clients' personal information. You can find detailed clients' personal information (SSNs, passports,driver licenses, addresses, phones, emails and so on), court cases files, court hearings, police reports, incident reports, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bo-Beuckman-Ford</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27644</link>
<guid>0fa66dc7ac7cc66a4c72f28e7742f27f</guid>
<pubDate>Wed, 03 Dec 2025 13:53:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Bo-Beuckman-Ford</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>256d9bcdb1843a9ec41ccd4e855e0ab0c1f8e60eb0e2b81e628b913eda6fde96</i><br /><br />Threat actor <b>description</b>: <i>Bo Beuckman Ford</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wisconsin-Knife-Works-The-Smith-Companies-Envirotech-Services-Next-Generation-Logistics...</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27629</link>
<guid>76cb696d89f827c907d66d9388d96553</guid>
<pubDate>Wed, 03 Dec 2025 11:09:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Wisconsin-Knife-Works-The-Smith-Companies-Envirotech-Services-Next-Generation-Logistics...</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4355f490a80c234399a459300ddf2d6885552c9c28c065ad517d1696c4797e2a</i><br /><br />Threat actor <b>description</b>: <i>Here is the access to 17gb of the following companies:

Wisconsin Knife Works is a leader in tooling and precis
ion manufacturing of woodworking cutting tools, backed 
by over 90 years of experience.

Smith Companies, Ltd. is a Boston-based firm specializi
ng in unbiased and sophisticated advanced planning solu
tions that effectively incorporate life insurance into 
clients' overall financial strategies.

EnviroTech Services, Inc. specializes in developing sup
erior road and surface solutions to manage all environm
ents; both natural and man-made.

Next Generation Logistics, Inc. specializes in advanced
transportation management solutions and services, leve
raging over 35 years of expertise in the logistics indu
stry.

Security First Bank is dedicated to providing comprehen
sive banking services that prioritize customer satisfac
tion.

You will find personal employee personal data, client i
nformation, numerous project files, accounting and fina
ncials and other internal operational files.
Open uTorrent, or any another torrent client.
Add torrent file or paste the magnet URL to upload the 
data safely.
Archives have no password.

MAGNET URL:
magnet:?xt=urn:btih:F470CF902BF67478830753A753DB48D6081
B9ACF&dn=Data 4&tr=udp://tracker.openbittorrent.com:80/
announce&tr=udp://tracker.opentrackr.org:1337/announce
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>lesker.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27616</link>
<guid>2b5102c218cb2e3df76c2a0d94244c73</guid>
<pubDate>Tue, 02 Dec 2025 20:51:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>lesker.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c601c599cce338c56022b93ca8dbe85cc8562f889b007ee920f6b22c802f4c5</i><br /><br />Threat actor <b>description</b>: <i>Since it's foundation in 1954, Kurt J. Lesker Company has manufactured and sold vacuum equipment and parts to the electronic and communications related industries</i><br />Target victim <b>website</b>: <i>www.lesker.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pathmaker-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27611</link>
<guid>9890b5738941827eb39657583b4249fc</guid>
<pubDate>Tue, 02 Dec 2025 20:19:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Pathmaker-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff8df2e3b3c6b95791fe181e39adb5b1c0f2f3a4ea298b0ca69acdb6664f53a4</i><br /><br />Threat actor <b>description</b>: <i>PathMaker Group is a specialized consulting firm focused on Identity and Access Management solutions for businesses. They provide a full range of services, including planning, implementation, and management of identity management systems, access management, and privileged account management. The company serves a diverse clientele, emphasizing customer satisfaction and effective problem-solving. Established in 2003, PathMaker Group aims to build long-lasting partnerships with clients by combining technical expertise with consultative support.</i><br />Target victim <b>website</b>: <i>www.pathmakergroup.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mr-Christmas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27606</link>
<guid>f76adfc16cac13526a0d9d97e1401257</guid>
<pubDate>Tue, 02 Dec 2025 19:27:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Mr-Christmas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc3fcf0b76e3d78148a94a38323ef0fb2f3537d591b4dcfd64a8c64260dfe18f</i><br /><br />Threat actor <b>description</b>: <i>Advertising & Marketing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Moyes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27607</link>
<guid>13d429db192fbc7b5cabf9b936cf78e1</guid>
<pubDate>Tue, 02 Dec 2025 19:27:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Moyes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac461abd0c7327612e2f197d828ec346de7497829bea5f93d2760e7ee540ded1</i><br /><br />Threat actor <b>description</b>: <i>Finance</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Petra</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27614</link>
<guid>8b02ed5a86a1a326b7862bbba5eb74a7</guid>
<pubDate>Tue, 02 Dec 2025 19:23:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Petra</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>69063915ad8d232a6f3e2ced97e146a441d790599573f9b212e656e72cfc44f4</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Petra is a multinational corporation that specializes in the manufacturing and distribution of consumer electronics and small appliances. They are based in Edmond, Oklahoma. This company works as a bridge between the manufacturers and retailers, providing thousands of high-quality products to retail stores nationwide. Petra Industries offers a variety of services from warehousing and distribution to logistics and supply chain solutions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Reading-Elevator-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27613</link>
<guid>fdbeb638e95f0bb8868a6e7c1969a713</guid>
<pubDate>Tue, 02 Dec 2025 19:14:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Reading-Elevator-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c709a9faf3425b599d12379d6231584962b92ecace0b4907b7140826fe99dcf5</i><br /><br />Threat actor <b>description</b>: <i>Reading Elevator Service (RES) is a reputable elevator company established in 1969, specializing in the installation, maintenance, and modernization of non-proprietary elevator systems. The company is dedicated to delivering excellent customer service, ensuring safety and efficient traffic flow in both residential and commercial properties across Eastern Pennsylvania. RES is fully bonded and insured, with affiliations including IUEC, NAEC, NFIB, and the Chamber of Commerce. They provide a range of services aimed at meeting the unique needs of their clients while allowing flexibility in choosing service providers.</i><br />Target victim <b>website</b>: <i>www.readingelevatorservice.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>noment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27608</link>
<guid>414cb71ec2809a5fda79a2463125ddee</guid>
<pubDate>Tue, 02 Dec 2025 18:28:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>tridentlocker</b> claims attack for <b>noment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f96f5a45b0b5f4135f30516b43db02385888311781afede019ef597f37428b16</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>tridentlocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Garrett-Taylor-Dds</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27610</link>
<guid>8235568e92bbf73e71db3234723c8b51</guid>
<pubDate>Tue, 02 Dec 2025 18:24:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Garrett-Taylor-Dds</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb58e462de80390f4223a30e605e289b1d18d8e5891513aeb886150d50f81c19</i><br /><br />Threat actor <b>description</b>: <i>Taylor & Carter Family Dentistry, located in Pine Bluff, AR, provides personalized dental care to patients of all ages. The practice, led by Dr. Garrett Taylor, Dr. Hannah Carter, and Dr. Rontae Graham, offers a range of services including general, cosmetic, and restorative dentistry. They emphasize advanced techniques and patient-centered care, ensuring a comfortable dental experience. Committed to community outreach, the team participates in various service projects both locally and internationally.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Toledo-Transducers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27596</link>
<guid>04d81fced5c98dd0927231751561d1fe</guid>
<pubDate>Tue, 02 Dec 2025 17:27:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Toledo-Transducers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48d2d655e05b5c109586c4c782c7dbd5d012523f316db4e5ccfb35c5feb31ac0</i><br /><br />Threat actor <b>description</b>: <i>Toledo Integrated Systems specializes in designing and manufacturing press control solutions, tonnage monitors, and load cells. Their product offerings include press controls, material handling control solutions, tonnage monitors, and various calibration services.We are ready to upload corporate documents such as: personal information of all employees (passports, driver licenses, medical tests, and other confidential personal files), detailed customer information (including personal documents), numerous confidential files, contracts and agreements, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Prismier</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27597</link>
<guid>34ac42f166aab43ce18d720c21903cda</guid>
<pubDate>Tue, 02 Dec 2025 17:27:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Prismier</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fbe4e8040b86ad279193841bd9470e482df324ec4ba470c0cf61e4d03c79d3a3</i><br /><br />Threat actor <b>description</b>: <i>Prismier is a leading vertically-integrated Mechanical Contract Manufacturer (MCM). Service offerings include Design & Engineering, Rapid Prototype thru Production of Sheet Metal Fabrication & Stamping, Plastic Injection Molding, CNC Machining, Die Casting, and Assembly.We are ready to upload 42gb of corporate documents such as: detailed personal information of employees (passports, driver licenses, addresses, phones, emails and so on), customer information, projects, contracts and agreements, numerous NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>dakkota.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27609</link>
<guid>0dbcc22a131326b8056b0c26d845dda3</guid>
<pubDate>Tue, 02 Dec 2025 17:09:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>dakkota.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>653f294557e6d071a9097114f106e6f0a76863adc28150d5ec139f6eeca35379</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2001, Dakkota Integrated Systems is a manufacturing company that provides a variety of build-to-order manufacturing processes including cockpit, overhead, and fascia systems and more.</i><br />Target victim <b>website</b>: <i>dakkota.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Exegy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27603</link>
<guid>c657bb88929c8410c8b3dfb3d7a568e0</guid>
<pubDate>Tue, 02 Dec 2025 16:23:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Exegy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>494acb23f9ccc43ef3d59a8ae916030464109ebeb6ae5ae15b4c7175627886e1</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Exegy, Inc. is a technology firm providing managed services and real-time market data solutions. The company delivers hardware-accelerated appliances, cloud-based services, and historical market data for applications in trading, risk management, and market surveillance. Exegy serves firms globally in the financial services sector, including traders, market makers, and brokers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ziglin-Signs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27590</link>
<guid>67ec9e8decb48e53b1dd1f6514ff7a5b</guid>
<pubDate>Tue, 02 Dec 2025 15:26:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Ziglin-Signs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d948f8f56778d642947aaa519b1f7d133d8f72d25e0fd19427fca763a50c0db9</i><br /><br />Threat actor <b>description</b>: <i>Ziglin Signs Inc operates as a full-service custom signage provider delivering comprehensive visual communication solutions to businesses throughout the Midwest. The company specializes in designing and fabricating signage that establishes strong brand presence and professional identity for organizations ranging from independent local enterprises to multi-location franchise operations.We are ready to upload corporate documents such as: detailed employee information (passports, driver licenses, SSNs, addresses, phones, emails, medical information, credit cards details and os on), a bit of client information, contracts and agreements, confidentiality agreements, projects and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.precipiodx.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27600</link>
<guid>680a372679da6b97e589c2cf672d5aea</guid>
<pubDate>Tue, 02 Dec 2025 13:53:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>www.precipiodx.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4855ce78b466e5c3cff098b903503abafb7b0a142a398627b8f9f1aace25e4c</i><br /><br />Threat actor <b>description</b>: <i>150gb</i><br />Target victim <b>website</b>: <i>www.precipiodx.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tlusty--Kennedy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27588</link>
<guid>a250c65c14391dd15c000484a2f49801</guid>
<pubDate>Tue, 02 Dec 2025 13:26:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Tlusty--Kennedy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f234471e9575fa14328262cacf80b1ba747bf27a6f7360d1c9ca158126b4f56b</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mobilelink-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27585</link>
<guid>1833ac47b85928f3b36d2676ca9df03a</guid>
<pubDate>Tue, 02 Dec 2025 12:27:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Mobilelink-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a8d7fb699d8f16a7ae06cd5918cf50af946bc3444cc4e9d0f0e4415756d35ef</i><br /><br />Threat actor <b>description</b>: <i>Mobilelink USA is a private Cricket Wireless company that deals in providing unlimited 5G LTE services and state of the art devices with an understanding of wh...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Capital-Star-Oil--Gas-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27586</link>
<guid>597626eebeefc042afb36a69a049696d</guid>
<pubDate>Tue, 02 Dec 2025 12:27:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Capital-Star-Oil--Gas-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c093051554071571fc9f60aeb9c3d9ea60c9a8db76205987eee3f5d94d70e27b</i><br /><br />Threat actor <b>description</b>: <i>Capital Star Oil & Gas, Inc. is a small independent oil & gas company based in Houston, Texas. Most of drilling activities are financed through private placemen...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Pools--Spas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27589</link>
<guid>ddccf393356f010bc68c23d9bc76e917</guid>
<pubDate>Tue, 02 Dec 2025 11:20:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>American-Pools--Spas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1bef02c8b7bf9166b0764f76a490426d7932af7371f64d3e8050a4114ed44903</i><br /><br />Threat actor <b>description</b>: <i>American Pools Spas is a premier pool builder based in Orlando, FL, offering a wide range of services including pool construction, renovation, and repair.  We have 500GB of data at our disposal (fiscal data, internal mail,budgets and many other things)</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cleveland-County-Sheriffs-Office</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27587</link>
<guid>2c7dcef4ea90b05c642db06b3c128dfc</guid>
<pubDate>Tue, 02 Dec 2025 09:02:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Cleveland-County-Sheriffs-Office</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4b4bb285ee19360a75617398b9b3d80452cbad157716f49e6b008d06265150aa</i><br /><br />Threat actor <b>description</b>: <i>Cleveland County Sheriff's Office</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>University-Loft</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27582</link>
<guid>3a0cc05957ec30e262540e57b8a413ae</guid>
<pubDate>Mon, 01 Dec 2025 20:08:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>University-Loft</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd2deeb45c98247c2aa00a683edca333f0cc7594235ac57468b2e6208941d149</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.uloft.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>South-Island-Public-Service-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27580</link>
<guid>09963a393c5a37a7fda7a40e4ab52972</guid>
<pubDate>Mon, 01 Dec 2025 20:07:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>South-Island-Public-Service-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c26fae3849b35172e655532592042abac04da2d81ce8708a1cdede14a0261ce7</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.sipsd.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Virtualware-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27552</link>
<guid>2af9b1a840b4ecd522fe1cda88c8385e</guid>
<pubDate>Mon, 01 Dec 2025 18:26:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Virtualware-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a2abb8685e200a575cd2b6d22aebfc0d56cf9438bc773c6a9525ec8a0515b3fb</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wisconsin-Knife-Works-The-Smith-Companies-Envirotech-Services-Next-GenerationLogistics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27553</link>
<guid>2ff4529fe221eba7d79ce74b59d91e60</guid>
<pubDate>Mon, 01 Dec 2025 18:26:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Wisconsin-Knife-Works-The-Smith-Companies-Envirotech-Services-Next-GenerationLogistics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a30e8fe6a2ed63c73595d46249865d02ab8864b565440470d2cfcb87d761326</i><br /><br />Threat actor <b>description</b>: <i>We obtained about 17gb of the following companies:Wisconsin Knife Works is a leader in tooling and precision manufacturing of woodworking cutting tools, backed by over 90 years of experience. Smith Companies, Ltd. is a Boston-based firm specializing in unbiased and sophisticated advanced planning solutions that effectively incorporate life insurance into clients' overall financial strategies.EnviroTech Services, Inc. specializes in developing superior roadand surface solutions to manage all environments; both natural and man-made.Next Generation Logistics, Inc. specializes in advanced transportation management solutions and services, leveraging over 35 yearsof expertise in the logistics industry. Security First Bank is dedicated to providing comprehensive banking services that prioritize customer satisfaction.You will find personal employee personal data, client information, numerous project files, accounting and financials and other internal operational files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Industrial-Steam</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27561</link>
<guid>d35a992032a0224adc8231a4ff1c8330</guid>
<pubDate>Mon, 01 Dec 2025 18:15:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Industrial-Steam</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c7427cb61d125831a709530ca9c2a11528f02ec698d0d5400389e6be4c1c64a</i><br /><br />Threat actor <b>description</b>: <i>Industrial Steam is a leading manufacturer specializing in pressurized and atmospheric deaerators, providing innovative solutions for the boiler industry since 1952. Their product line includes various types of deaerators, blowdown systems, condensate recovery units, and advanced feedwater systems. With a commitment to unmatched performance and customer satisfaction, they offer unique designs such as dual compartment systems along with established technologies.</i><br />Target victim <b>website</b>: <i>www.industrialsteam.com</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clark--Sullivan-Constructors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27579</link>
<guid>1ceeb04b184ee1c9424f81c8a96fd686</guid>
<pubDate>Mon, 01 Dec 2025 18:12:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Clark--Sullivan-Constructors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9aed73447e0678118aedae045e41c041416dc2dfcac492ee338551373c01ba11</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.clarksullivan.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hall-Aluminum-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27578</link>
<guid>66ad4c25533779bfe270868c28b48b8d</guid>
<pubDate>Mon, 01 Dec 2025 18:11:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Hall-Aluminum-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e31e5b655c286adb5c076633c76cade65bd92ede11435044f0fd7af5c96f123</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.hallaluminum.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>millerwoodtradepub.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27558</link>
<guid>fcec608f0259e123aa4c88a4a51abc50</guid>
<pubDate>Mon, 01 Dec 2025 16:55:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>millerwoodtradepub.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c37a9d86feff7c84b53a97acf2f7655d7859b9424de1342ca23d7641dd93cabf</i><br /><br />Threat actor <b>description</b>: <i>Established in 1927, Miller Wood Trade Publications is a leading source of information for the forest products industry, publishing 10 specialized magazines and resources. Their offerings include various marketing directories and handbooks tailored to the lumber market. The company's publications serve both domestic and international clients, connecting suppliers with buyers across the globe. With a focus on the lumber trade, they cater to all segments of this billion-dollar industry</i><br />Target victim <b>website</b>: <i>millerwoodtradepub.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wisconsin-Knife-Works-The-Smith-Companies-Envirotech-Services-Next-GenerationLogistics...</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27562</link>
<guid>5ffdc65e9d413e3acd7b8ba5d03477a1</guid>
<pubDate>Mon, 01 Dec 2025 16:48:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Wisconsin-Knife-Works-The-Smith-Companies-Envirotech-Services-Next-GenerationLogistics...</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e44278b3bdc036bc5f3b64f157da39ea988405fa865445ccab1e06be00f3ffa</i><br /><br />Threat actor <b>description</b>: <i>We obtained about 17gb of the following companies:

Wisconsin Knife Works is a leader in tooling and precision manufa
cturing of woodworking cutting tools, backed by over 90 years of 
experience. 

Smith Companies, Ltd. is a Boston-based firm specializing in unbi
ased and sophisticated advanced planning solutions that effective
ly incorporate life insurance into clients' overall financial str
ategies.

EnviroTech Services, Inc. specializes in developing superior road
and surface solutions to manage all environments; both natural a
nd man-made.

Next Generation Logistics, Inc. specializes in advanced transport
ation management solutions and services, leveraging over 35 years
of expertise in the logistics industry. 

Security First Bank is dedicated to providing comprehensive banki
ng services that prioritize customer satisfaction.

You will find personal employee personal data, client information
, numerous project files, accounting and financials and other int
ernal operational files.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cleveland-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27549</link>
<guid>8d5ef74b92de0025e0a30d21d4714152</guid>
<pubDate>Mon, 01 Dec 2025 16:26:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Cleveland-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff4420c7f91e733d6bf44b6a51c20cd5612fb849106727f913294864439a38fc</i><br /><br />Threat actor <b>description</b>: <i>Cleveland Construction is a family-owned commercial contractor specializing in construction management and self-performing interior trades.We are ready to upload 12GB of corporate documents such as: very detailed employee information (about 1500 SSNs, passports, addresses, phones, emails, driver licenses and so on), contracts and agreements, projects and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Martin</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27550</link>
<guid>b61726a0869331a6dec8049de8f10fc9</guid>
<pubDate>Mon, 01 Dec 2025 16:26:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Martin</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>095cee9ea7164de76754a79b33bbd72299f6800c6c6e91ea5396d01fdc167bb3</i><br /><br />Threat actor <b>description</b>: <i>Martin & Company is a leader in tech-enabled insurance solutions,providing a comprehensive suite of services designed for insurance carriers and managing general agents (MGAs).We are ready to upload 46GB of corporate documents such as: employee information (passport, driver licenses and os on), client information, contracts and agreements, confidential files, projects and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Abhe--Svoboda</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27545</link>
<guid>fe103355d7f731a557951558ba906d39</guid>
<pubDate>Mon, 01 Dec 2025 14:26:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Abhe--Svoboda</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>593a4cbf7f279df4726d84af41ec21aa519b16bf4a7a438323454f95919d069f</i><br /><br />Threat actor <b>description</b>: <i>Abhe & Svoboda, Inc. is a full-service restoration contractor. Inaddition to offering a full range of industrial coatings services, our core competencies also include a variety of related construction services, such as concrete repair, and steel repair and replacement.We are ready to upload 82GB of corporate documents such as: Detailed personal employee information (passports, DLs, SSNs, addresses, emails, phones, medical information, credit cards), client information, projects, agreements and contracts, other internal documents.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Goldenrod</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27546</link>
<guid>ea0efe8ecbc569d1e8349f2625cb6af8</guid>
<pubDate>Mon, 01 Dec 2025 14:26:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Goldenrod</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>344b6fdd243ea695781c42364ed816cb399136eae87cc07a2fd8fc4acc1eed04</i><br /><br />Threat actor <b>description</b>: <i>Goldenrod has been designing and manufacturing industry-leading differential winding shafts, multiple bladder air shafts, lightweight aluminum and carbon fiber shafts, reel spools, chucks, and safety chucks for processors in the North American paper, film, foil, and non-woven converting industries.We are ready to upload 12GB of corporate documents such as: financial files, payment details, invoices and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Innomotive-SolutionsGroup</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27547</link>
<guid>b91f9ae1efafed4d85107226536195f3</guid>
<pubDate>Mon, 01 Dec 2025 13:26:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Innomotive-SolutionsGroup</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3b2aaeffb3894be6c2f8c618c5d9ae8864d20ed7c4cb0b033d284b30be87b860</i><br /><br />Threat actor <b>description</b>: <i>Innomotive Solutions Group is a North American leader specializing in high-quality roll-up doors, LED lighting, and power lifting systems for trucks and specialty vehicles.We are ready to upload 10GB of corporate documents such as: Personal employee information (passport, phones, emails and so on), financials, client data, projects, agreements and contracts, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>MD-Manouel-InsuranceAgency</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27548</link>
<guid>1f0676fd3f275d08290dec8157496a08</guid>
<pubDate>Mon, 01 Dec 2025 13:26:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>MD-Manouel-InsuranceAgency</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34bb09e02eb701b2124484eba200bab3859fdd4655b333c99d2c720a372eb87e</i><br /><br />Threat actor <b>description</b>: <i>S&R Insurance Services Inc. is a reputable insurance agency located in Rancho Cucamonga, California, specializing in a wide range of insurance products such as auto, home, commercial, life, umbrella, and health insurance.We are ready to upload more than 30GB of corporate documents suchas: Personal employee information, client data, projects, agreements and contracts, other internal documents.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rose-Displays</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27564</link>
<guid>c422e39e579b0c8896e9d9fc9a2ca8ac</guid>
<pubDate>Mon, 01 Dec 2025 08:53:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Rose-Displays</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>74befd388e558c664f6c986f53cf9755dea34b6059713ddc2b245eabc59fad0a</i><br /><br />Threat actor <b>description</b>: <i>A division of Visual Creations Ink</i><br />Target victim <b>website</b>: <i>rosedisplays.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Petro-Environmental.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27565</link>
<guid>c73b2ece3c47d44d3579a75ece205595</guid>
<pubDate>Mon, 01 Dec 2025 08:52:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Petro-Environmental.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c54ca8ed851b2d4c0c49173bf22185df557b15e03b758eb25a75ca8bb2dbf2e</i><br /><br />Threat actor <b>description</b>: <i>A company that offers a range of environmental services</i><br />Target victim <b>website</b>: <i>petroenviro.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Data-Enterprises-of-the-Northwest.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27566</link>
<guid>234d9cdb375d458cf93fb427a55da75f</guid>
<pubDate>Mon, 01 Dec 2025 08:51:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Data-Enterprises-of-the-Northwest.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa73f8eb3a4dbd3a98ecae31a1d4330e66ca99fa73f87a753231f6dda37edf59</i><br /><br />Threat actor <b>description</b>: <i>A company that offers the Automated Tool Inventory Control and Tracking System (ATICTS)</i><br />Target victim <b>website</b>: <i>aticts.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Curtis-Investment-Group-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27568</link>
<guid>d24110aad582c07b5b3c8a978dd167c6</guid>
<pubDate>Mon, 01 Dec 2025 08:49:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Curtis-Investment-Group-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f6bc0196c4823590bc194f945dc76fe4e2db54be387e765516c3924e3d8070a</i><br /><br />Threat actor <b>description</b>: <i>A full service real estate concern</i><br />Target victim <b>website</b>: <i>curtisinvestments.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>newhorizonsmedical.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27557</link>
<guid>a8c10ea52e3b84e7a2948f25a13f2768</guid>
<pubDate>Mon, 01 Dec 2025 08:45:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>newhorizonsmedical.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>402bc816060a5e21c2c7196c037559addeef242ff61eee014025093f4249f489</i><br /><br />Threat actor <b>description</b>: <i>Ransom: 90k
236gb</i><br />Target victim <b>website</b>: <i>newhorizonsmedical.org</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.eastersealsnei.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27573</link>
<guid>e624d754286d0aac962f185f1a21809e</guid>
<pubDate>Mon, 01 Dec 2025 08:45:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>www.eastersealsnei.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19ab1bd2c0f0f3557296f5a8f5f872d2daa1ba7f50af2865e99a7378e252352f</i><br /><br />Threat actor <b>description</b>: <i>Ransom: 550k
280gb</i><br />Target victim <b>website</b>: <i>www.eastersealsnei.org</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>Soderstrom-Architects-LTD</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27559</link>
<guid>00b546d495d29ea025af220831ceee42</guid>
<pubDate>Mon, 01 Dec 2025 07:37:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Soderstrom-Architects-LTD</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c115bc0287de85345d5cfe3d4e03ff8a3312d6e363529e0cbbf38e68d12d645</i><br /><br />Threat actor <b>description</b>: <i>Soderstrom Architects is a Pacific Northwest architecture firm that offers creative yet practical solutions for spaces that inspire individuals and communities. They were founded in 1984 and operate out of Portland, Oregon</i><br />Target victim <b>website</b>: <i>www.sdra.com</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fun-For-Less-Tours</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27544</link>
<guid>dd159c05a369b53f45e46d799740331f</guid>
<pubDate>Mon, 01 Dec 2025 00:45:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Fun-For-Less-Tours</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3b40e07eeeb56075c29a35cf24f02a8947ecf006ad911a72f3945e84524e4ff6</i><br /><br />Threat actor <b>description</b>: <i>Customer passports and personal data.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Concord-Academy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27543</link>
<guid>50e9ea9c1bc5e6067ab7c0d8fbdd5f21</guid>
<pubDate>Sun, 30 Nov 2025 17:57:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Concord-Academy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b4389f91ff2d79f1084a48190104b74227061068258655292b9f9590e486058</i><br /><br />Threat actor <b>description</b>: <i>Concord Academy is a specialized educational institution that serves students with Autism, learning and intellectual disabilities, language processing disorders, ADD/ADHD, and other neurodiverse learning needs. The academy provides a unique learning community focused on respect and acceptance, operating within a small, structured, and secure environment. Their mission is to prepare these students for lifelong success, offering tailored educational programs and support. A significant percentage of graduates advance to post-secondary placements, reflecting the effectiveness of their individualized approach.
company is headquartered in 4942 Walnut Grove Road, Memphis, TN 38117, USA.
11-50 Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Veton-Ai</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27541</link>
<guid>fbfe2df616b6864090539113663415f3</guid>
<pubDate>Sun, 30 Nov 2025 16:25:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Veton-Ai</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>591a35a1f24f35db998ebf2ea64506e8b8fc623c18e8136138445f1e14c1557e</i><br /><br />Threat actor <b>description</b>: <i>Accounting Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Division-10</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27540</link>
<guid>f10424d2b1cbf840765291e98f4ea293</guid>
<pubDate>Sun, 30 Nov 2025 06:44:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Division-10</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77f9327fb1434cd21e04d1374914283f4e26510d54dd2d9349c9c436cf060e98</i><br /><br />Threat actor <b>description</b>: <i>Division 10 Inc is a company based in Memphis, Tennessee, specializing in supplying specialty products to the construction industry since 1989. They offer services including product sales, estimating services, and installation quotes. Their clients range from contractors to automotive companies, evidenced by testimonials highlighting their successful project contributions. The company prides itself on its commitment to quality and customer satisfaction</i><br />Target victim <b>website</b>: <i>division10inc.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>TBC-Consoles</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27524</link>
<guid>c101eebb637fa965d366c92c41a3751a</guid>
<pubDate>Sat, 29 Nov 2025 20:25:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>TBC-Consoles</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d2979cc2b38c16a07fea10fa9989e607d07fb828696632c95ad4636669b4706a</i><br /><br />Threat actor <b>description</b>: <i>Furniture</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>CJW</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27525</link>
<guid>1a0f53650db79adca6f29470587a3d39</guid>
<pubDate>Sat, 29 Nov 2025 20:25:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>CJW</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c6765cb1b5bbd274f1b7585d0323c8eee0040b23728816e19481730c82636a4</i><br /><br />Threat actor <b>description</b>: <i>Grocery Retail</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chenango-Valley-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27526</link>
<guid>93b5129e24b9c92e5b8e7115056b46bd</guid>
<pubDate>Sat, 29 Nov 2025 20:25:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Chenango-Valley-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aaef7f9557fe3e42a5ed2f52950700726f16173c3b28bca812d33e0680d71bd9</i><br /><br />Threat actor <b>description</b>: <i>Manufacturing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Asia-Condominium-Association</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27527</link>
<guid>20ba096f2d3da322ed843f6a4bee9a91</guid>
<pubDate>Sat, 29 Nov 2025 19:25:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Asia-Condominium-Association</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>67d7abcf4d267e9cbece529a5f199206476d004bb59c93cd0af71e61df9e518f</i><br /><br />Threat actor <b>description</b>: <i>Real Estate</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advantage-360</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27536</link>
<guid>84f3ad98554f4c77f309c271fb93e1e7</guid>
<pubDate>Sat, 29 Nov 2025 15:41:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>tridentlocker</b> claims attack for <b>Advantage-360</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5caf2800c1dac7bf2521f866021c3e354aa7e0bb628628c4968840cd07ba5fd</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Advantage 360 is a software company that provides integrated customer relationship management, billing, and automation solutions. Their services are focused primarily towards telecommunications, digital service providers, and broadband providers worldwide. They offer scalable solutions which incorporate billing, customer care, fraud management, and revenue assurance.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>tridentlocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>iqs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27533</link>
<guid>51a4481447f563d89973aadd7e6cb95b</guid>
<pubDate>Sat, 29 Nov 2025 15:41:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>tridentlocker</b> claims attack for <b>iqs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8018bda44e2caef137e50760ca9536fc4b0db6a4f6216fb1d0da989dfda7f8f4</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>tridentlocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>LMG-Holdings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27534</link>
<guid>779146e5712cfe402503e06a5184bd69</guid>
<pubDate>Sat, 29 Nov 2025 15:41:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>tridentlocker</b> claims attack for <b>LMG-Holdings</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a53185b8f440f439353ba41bddb8bba2a23d8715d1389a869ac849fa29120769</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] LMG Holdings, Inc. is a leading provider of ignition interlock devices. Based in Raleigh, North Carolina, the company’s main mission is to provide products that continuously monitor breath alcohol and prevent operation of the vehicle when the driver’s levels are above specified limits. They aim to make the roads safer by preventing drunk driving.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>tridentlocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>vviewisd.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27520</link>
<guid>06cfd38cb4f1b2227cc7f5b8aada2c96</guid>
<pubDate>Fri, 28 Nov 2025 22:56:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>vviewisd.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9a17161e652c41cea99318d391776a498620781d4df4992a2d22d75b2996ec2</i><br /><br />Threat actor <b>description</b>: <i>Valley View ISD was one of only fifteen districts in the entire state of Texas to receive this rating. We are extremely proud of our students and staff for this great accomplishment. This would not be possible without the collaboration of all our stakeholders. It is no secret that when schools, families, and communities support each other and come together, students achieve at the highest levels. On behalf of our Board of Trustees and staff, thank you for your continued support and commitment to our students. Employees: 800 Revenue: $27.8 Million Industry: Education   Phone Number: (416) 783-6181</i><br />Target victim <b>website</b>: <i>vviewisd.net</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Williamson-County-TX</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27519</link>
<guid>914504d6a7f15be15048fdb72ddd71a7</guid>
<pubDate>Fri, 28 Nov 2025 21:24:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Williamson-County-TX</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>265facd3ea683e7ceb450fadaa9527ebc4569225db9546663402fe4dc066f4bf</i><br /><br />Threat actor <b>description</b>: <i>Government</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zoya</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27516</link>
<guid>af5a968312f8d1e3246a966fac1606da</guid>
<pubDate>Fri, 28 Nov 2025 19:24:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Zoya</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e0b0972d31a1ad069b524f210a85534682ba2f81989ef4b02727f25f4ff3be25</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Weiss</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27517</link>
<guid>a256147c9ed7998d36a10038d1eaa7ea</guid>
<pubDate>Fri, 28 Nov 2025 19:24:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Weiss</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a5a6c583f8bb86b6fec9cf7df2a54027bc3e314edfbeed3bf3e8f47ed050f1c7</i><br /><br />Threat actor <b>description</b>: <i>Accounting Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kleber-and-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27518</link>
<guid>f7e3b9df4fd0b3183fc4f380480c7788</guid>
<pubDate>Fri, 28 Nov 2025 19:24:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Kleber-and-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b0859a8187b52428290c2438ff596ab4e70f2395f08c3ae4706b8882e5371fdf</i><br /><br />Threat actor <b>description</b>: <i>Advertising & Marketing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lone-Rock-Timber</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27507</link>
<guid>666108a9094a0ec0f62ca61a2eb74538</guid>
<pubDate>Fri, 28 Nov 2025 17:24:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Lone-Rock-Timber</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cf8746238b9f54776e96472384b5232ddf6bcd867dbacc421b2ea59f3c0f57f6</i><br /><br />Threat actor <b>description</b>: <i>Lone Rock is a timber company.We are ready to upload 25GB files of corporate documents such as:personal employee data, financials, agreements and contracts, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Morton-LTC-Reed-Pope-Law-American-Public-Television-Benchmark-Connector-Radtke-Contrac</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27508</link>
<guid>839e35ed92c4f5619e8579159f70c437</guid>
<pubDate>Fri, 28 Nov 2025 17:24:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Morton-LTC-Reed-Pope-Law-American-Public-Television-Benchmark-Connector-Radtke-Contrac</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd68b7f1485610f7391cc83fec2d4239e3d0abf09b82c2f0b08cf0340adbbda2</i><br /><br />Threat actor <b>description</b>: <i>We obtained about 22gb of the following companies: Morton LTC Home specializes in providing pharmacy solutions tailored for long term care providers.Reed Pope is a leading business law firm based in Victoria, British Columbia, specializing in business law, land development, and real estate law.American Public Television (APT) is a distributor of public television programming that has introduced iconic shows and personalities such as Julia Child and Fred Rogers.LBenchmark Connector Corporation specializes in providing high-quality connectors for various industries, including military and aerospace applications.Radtke Contractors specializes in pile driving, marine and excavating contracting, their varied experience in snow removal, bridge, and railroad construction allows us to complete a wide range ofprojects in commercial, municipal and residential construction markets.You will find personal employees and customer information, lots of projects, agreements and contracts and other sensitive files. Some cases contain legal confidential files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Casting-House</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27509</link>
<guid>d61f11e5bda1c631302b96f8e65a6c3b</guid>
<pubDate>Fri, 28 Nov 2025 17:24:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Casting-House</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a7d9713f28964bc53834cb80b8d16d8eca0886ec6c9012e90b40a042ce614d9</i><br /><br />Threat actor <b>description</b>: <i>Casting House is a full-service custom jewelry manufacturing company that provides jewelers and designers with access to manufacturing solutions that will help grow their inventory.We are ready to upload 10GB files of corporate documents such as:personal employee data, financials, agreements and contracts, confidential files, credit card details, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Parrish-Tire</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27510</link>
<guid>4ecbb790f241666326d31f799eb85d1e</guid>
<pubDate>Fri, 28 Nov 2025 17:24:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Parrish-Tire</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b1b545324d3a8e7af6493b2d4ea177ba7e9c458546079134f59b328a1663246</i><br /><br />Threat actor <b>description</b>: <i>Parrish Tire Company is one of the largest tire dealers in the Southeast, operating wholesale, retail, and commercial truck tire centers in NC, SC, VA, GA, and OH.We are ready to upload 10GB files of corporate documents such as:personal employee data, client data (~150 credit cards details, and other information), financials, agreements and contracts, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Panini-Kabob-Grill</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27511</link>
<guid>b5daaa1a65fab780763c6dc7df93d38b</guid>
<pubDate>Fri, 28 Nov 2025 17:24:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Panini-Kabob-Grill</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9fc0e4d152ebe1ff4e951b08a9a1ecaabed1a13051388434ea2e25d531d7cfc4</i><br /><br />Threat actor <b>description</b>: <i>Panini Kabob Grill specializes in preparing fresh and healthier Mediterranean food using high-quality ingredients in a scratch kitchen.We are ready to upload 60GB files of corporate documents such as:detailed personal employee information (SSN, DLs, passport, photo, phone, emails and so on), credit cards, detailed financials, agreements and contracts, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Family-Farm-and-Home</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27503</link>
<guid>63c94b74065fc62f96c334f08c534843</guid>
<pubDate>Fri, 28 Nov 2025 14:25:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Family-Farm-and-Home</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5cd3f365ea20993aa9a7be3b8a30ed8c021c6130b307658e94453f26d3eda04c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gershow-Recycling</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27504</link>
<guid>76819f255a4d6d1d4d956492094489ea</guid>
<pubDate>Fri, 28 Nov 2025 14:25:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Gershow-Recycling</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2dcd4bbfa21b6a9fedcfb473c024ee23991ac07993f007967add1f7d204bf23b</i><br /><br />Threat actor <b>description</b>: <i>Gershow Recycling is a prominent scrap metal buying and selling facility located in various regions including Suffolk County, Nassau County, and Brooklyn.We are ready to upload 31GB files of essential corporate documents such as: Employee information (DLs and other scanned documents), internal confidential files, detailed financials, clients information, interesting agreements details with organizations, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Design-Team-Sign-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27505</link>
<guid>d2d26584b4ffbf0de1af4a7e9ecf3b68</guid>
<pubDate>Fri, 28 Nov 2025 14:25:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Design-Team-Sign-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c2ce665907d449befb0d1bfcdd34bc1570079f224b10202b33ee60e8f8f2747</i><br /><br />Threat actor <b>description</b>: <i>Design Team Sign Company is a manufacturer of custom graphic signmedia.We are ready to upload 108GB files of essential corporate documents such as: HR files, personal data, detailed financials, databases, projects, agreements, customer information, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>K2d</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27506</link>
<guid>68090119a695209306eefe7f69ebf574</guid>
<pubDate>Fri, 28 Nov 2025 14:24:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>K2d</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>72a4205e156d5e2b22dc0f31343941e5583efd71b6be491f5d1652d7b96e97f4</i><br /><br />Threat actor <b>description</b>: <i>K2D Consulting Engineers is a professional Mechanical, Electrical, and Plumbing (MEP) consulting firm based in Los Angeles, recognized for its innovative and collaborative design approaches.We are ready to upload 121GB files of essential corporate documents such as: personal employee data, detailed financials, agreements, client information, confidentiality agreements, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Devereux-Advanced-Behavioral-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27515</link>
<guid>ab38039d7c1a6862cc692cd15e20d757</guid>
<pubDate>Fri, 28 Nov 2025 13:56:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Devereux-Advanced-Behavioral-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>601445dbbc3386fe722b2342784ef44252f91dc85c575700cfe8e6e97ee23273</i><br /><br />Threat actor <b>description</b>: <i>www.devereux.org https://www.zoominfo.com/c/the-devereux-foundation/60082215 Devereux Advanced Behavioral Health, headquartered in Villanova, Pennsylvania, is a behavioral healthcare organization that operates a network of clinical, therapeutic, educational, and employment programs.</i><br />Target victim <b>website</b>: <i>www.devereux.org</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mid-South-Pulmonary--Sleep-Specialists</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27513</link>
<guid>b257ab6a4d4452e181b7998b5c6e38bc</guid>
<pubDate>Fri, 28 Nov 2025 12:19:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Mid-South-Pulmonary--Sleep-Specialists</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>78c3fbf7969fe4aa384d795cf9dd58f228ec89b0bc538341806b7daea4187ed1</i><br /><br />Threat actor <b>description</b>: <i>Patient data breach.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bcfpers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27494</link>
<guid>a2ad4a29fc99de79997f9a616c345a7b</guid>
<pubDate>Thu, 27 Nov 2025 18:29:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Bcfpers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>58545e1c05b7e95ce1e2ab7882ea9b936d10f9ce3fc6c12b94a060c564cca50c</i><br /><br />Threat actor <b>description</b>: <i>Insurance</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>United-Volleyball-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27495</link>
<guid>8b867815185dd36ff091a2702449feb9</guid>
<pubDate>Thu, 27 Nov 2025 18:29:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>United-Volleyball-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>51e939251616b3ae5bcd71402440387c8a54e502b94ac6f11b2ba488367d579f</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mechanical-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27497</link>
<guid>ce4e66f7f29c8b37eff635378a9b9c0f</guid>
<pubDate>Thu, 27 Nov 2025 16:48:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Mechanical-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6093bf4fe59bb9e781ef8b026267be9f35dd7a3851410f2e01ac18a49ce21ca</i><br /><br />Threat actor <b>description</b>: <i>Mechanical Systems Company offers building automation controls an
d services. 

We are ready to upload more than 30GB files of essential corporat
e documents such as: Employee personal information (SSNs, DLs, pa
ssports and so on), confidentiality agreements, financials, clien
ts information, NDA, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crucible-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27489</link>
<guid>44fa07418c5653af898002db3298a9b7</guid>
<pubDate>Thu, 27 Nov 2025 14:29:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Crucible-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>404dc3bc6274518367f29b0f417c1aee6c5ac59463ea3fd0cc0c9d0e95456aa9</i><br /><br />Threat actor <b>description</b>: <i>Crucible Industries was founded in 1870. This company provides the manufacturing of steel long products, and other metal building materials.We will upload 10gb of corporate documents soon. Internal operational files, a bit of customer information, scans and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Country-Club-Enterprises</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27491</link>
<guid>d0683d8499a7dbd42ee1abbb938e090b</guid>
<pubDate>Thu, 27 Nov 2025 14:29:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Country-Club-Enterprises</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d105c79962f84b88e1904574f6f7fef24d5effc32a62a0fb97e478557afcfaba</i><br /><br />Threat actor <b>description</b>: <i>Country Club Enterprises (CCE) sells and services Club Car golf cars and other low speed vehicles to Country Clubs, municipalities, and homeowners throughout New England.We are ready to upload more than 14GB files of essential corporate documents such as: employees and their relatives personal information (DLs, passports and so on), detailed financials, contractsand agreements, NDA, interesting project files and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kelly-Wearstler-Gallery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27492</link>
<guid>285fb42cb5e295f9249b7819417b3b77</guid>
<pubDate>Thu, 27 Nov 2025 14:29:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Kelly-Wearstler-Gallery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7a40491c3f0ecc966ff641f20abc2f2df72064633646018af62141876535107</i><br /><br />Threat actor <b>description</b>: <i>Kelly Wearstlers global luxury brand is influenced by spans of residential and commercial interior design. Kelly Wearstlers holds product collections of furniture, lighting, rugs, fabrics and trims, wall coverings, luxe bedding, fine china, and decorative homeaccessories.We are ready to upload more than 14GB files of essential corporate documents such as: HR files (employee personal information, complete forms and so on), financials, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Asl-Consulting-DTG-Consulting-Solutions-Snyder-Cohn-SBLM-Architects-Dealer-Information...</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27498</link>
<guid>273e78ede0ff68fcf04aa41a3dd8d36b</guid>
<pubDate>Thu, 27 Nov 2025 13:09:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Asl-Consulting-DTG-Consulting-Solutions-Snyder-Cohn-SBLM-Architects-Dealer-Information...</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26b62c984221aedf0dc01bd8985ee92add874c374008455afc1d924b2867e3ab</i><br /><br />Threat actor <b>description</b>: <i>We obtained about 14gb of the following companies:

ASL provides Human Resources Software, Professional Services and 
Managed Outsourced Solutions for large and medium-sized organizat
ions requiring a level of complexity and sophistication in HR bey
ond what is available from payroll providers with an HR offering.

DTG Consulting Solutions provides recruiting and staff augmentati
on for Information Technology and Finance professionals.

SBLM Architects specializes in blending design intelligence with 
technical excellence across various sectors, including healthcare
, education, retail, commercial, mixed-use, and civic projects.

Snyder Cohn is a renowned CPA and business advisory firm establis
hed in 1927, providing expert services to businesses, executives,
and nonprofits primarily in the Washington DC area. They offer a
comprehensive range of accounting services including compliance,
tax, audit, and specialized client accounting advisory services.

Dealer Information Systems (DIS) is a leading business management
software provider to ag, construction, truck refrigeration and l
ift truck dealers.

You will find personal employees and customer information, lots o
f projects, agreements and contracts and other sensitive files.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Santa-Paula</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27487</link>
<guid>978f39314267adc0e1c50db2615b467c</guid>
<pubDate>Thu, 27 Nov 2025 12:28:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Santa-Paula</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d395c8155be7427069ae8093f3929bd96d02ffb505430f0aca60e7f8b3e09d8</i><br /><br />Threat actor <b>description</b>: <i>Government</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>St.-Johns-River-Water-Management-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27459</link>
<guid>00a88476f623e4b554a2277fa4de42a0</guid>
<pubDate>Wed, 26 Nov 2025 18:28:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>St.-Johns-River-Water-Management-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a36217d5f7255548795a3dd21421906ab18be7e48b404e2336f4b0d2f7831bc0</i><br /><br />Threat actor <b>description</b>: <i>Government</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zoetis</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27460</link>
<guid>ec67ec14e2f01a4baeb2464a044aaec1</guid>
<pubDate>Wed, 26 Nov 2025 18:28:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Zoetis</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c34ce3f0c00f4e01e29b27f9890066805af13fa991490dd3b3275bcc791d203</i><br /><br />Threat actor <b>description</b>: <i>Zoetis discovers, develops, manufactures, and commercializes animal health medicines, vaccines, and diagnostic products in the United States and internationally.We will upload 25gb of corporate documents soon. Lots of internaldocuments, clients' data, numerous test and other information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fineline-Architectural-Millwork</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27461</link>
<guid>b928c4fa4fc95fd7e83a96fa48c76418</guid>
<pubDate>Wed, 26 Nov 2025 18:28:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Fineline-Architectural-Millwork</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f8bea189c4eca39b58358db035d0913eb72a03cbde906820de4266fdd7a0cb1</i><br /><br />Threat actor <b>description</b>: <i>Fineline Woodworks Inc. is full service custom carpentry located in Orange County in beautiful southern California.We will upload 100gb of corporate documents soon. Employee personal information, detailed financials, NDAs, projects, clientsinformation, agreements and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Healthcare-Retroactive-Audits</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27462</link>
<guid>b6b505ff2025d4dec937e9dfba52e4c2</guid>
<pubDate>Wed, 26 Nov 2025 18:28:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Healthcare-Retroactive-Audits</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6367b7d930b4292db2913e3f48121a6ed8855119abe9b65f8c8f103ef033aac7</i><br /><br />Threat actor <b>description</b>: <i>22 171 128 medical record files, neatly packaged into 11 archives by hospital. The firm Healthcare Retroactive Audits, which was auditing the data for insurers,...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>ADC-Aerospace</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27480</link>
<guid>3cfec6ddc9e6325247431a9ee7ee45ef</guid>
<pubDate>Wed, 26 Nov 2025 17:58:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>ADC-Aerospace</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2475e99a5c87f4dd2fc9c5d6f2534d3acfc59b622333a81a216f031521bfc992</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.adc-aerospace.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>AGS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27466</link>
<guid>67317d6dcc4cb778aeb9219565f5456b</guid>
<pubDate>Wed, 26 Nov 2025 16:36:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>AGS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>58169c71e62bdfceaf66dd7d2354bcb80654e74dda30c4eb40c24f962b2c505a</i><br /><br />Threat actor <b>description</b>: <i>AGS</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stacey-L-Tokunaga</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27458</link>
<guid>3570256111bfde271851c5e1f41325b5</guid>
<pubDate>Wed, 26 Nov 2025 15:28:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Stacey-L-Tokunaga</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8b153f3658d88a34e09485c55cc3458aeb545b967a7978542b15c023dbca215</i><br /><br />Threat actor <b>description</b>: <i>The Law Offices of Stacey L. Tokunaga specializes in Workers Compensation Defense law, offering committed and high-quality legal services to self-insured employers, third party administrators, and insured clients.We will upload 200gb of corporate documents soon. Detailed personal employee information (DLs, SSNs, passports, addresses, phones and so on), detailed financials, clients' credit cards, police reports, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bergeson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27451</link>
<guid>5679e914eb9b1e93d8924b8fc2e75a28</guid>
<pubDate>Wed, 26 Nov 2025 14:08:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Bergeson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ee06f3deab8d74da2e14abdd1bc8b19b70f50052cd2bf9ef533db6e56154fd6</i><br /><br />Threat actor <b>description</b>: <i>Bergeson, LLP is a leading litigation law firm based in Silicon Valley, established in 1990. The firm specializes in representing individuals and companies in high-profile and high-stakes litigation across the country, offering innovative strategies tailored to complex business disputes.We are ready to upload more than 33GB data. There are lots of essential corporate documents such as: financial data (audit, payment details, invoices), detailed employees and customers information (passports, driver's license , Social Security Numbers,death/birth certificate) confidential information, NDAs and other documents with detailed personal information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dobco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27452</link>
<guid>1fdd72b9fc6717195f76ea7c0783fa25</guid>
<pubDate>Wed, 26 Nov 2025 14:08:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Dobco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd26d7c93830e5e09cb93228b4035c760b7ec49f03c159d172a586546838f544</i><br /><br />Threat actor <b>description</b>: <i>Dobco founded in 1989 and headquartered in Wayne, New Jersey, is an established multi-faceted general construction firm.We are going to upload company data soon. You will find financialdata (audit, payment details,financial reports, invoices), personal financial details of employees, accounting files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pacific-Railway-Enterprises</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27453</link>
<guid>cefc67efdb268e350862ad876b826a6e</guid>
<pubDate>Wed, 26 Nov 2025 14:08:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Pacific-Railway-Enterprises</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9039a13359bd91de58178264d128bf789372386446612899b02eb3c0b08a60ab</i><br /><br />Threat actor <b>description</b>: <i>Pacific Railway Enterprises, Inc. is a woman-owned corporation specializing in Railroad System Design and Consulting.We will upload more than 20gb of corporate documents soon. Employee lists containing personal information, NDAs, contacts and agreements, projects, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>FloorHeat</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27454</link>
<guid>2161c3fb9c53f90509028a2179494696</guid>
<pubDate>Wed, 26 Nov 2025 14:08:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>FloorHeat</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18860ad35e49c8bfa4f8b5544843b479b1efe8b8a54a418fe2637c427b4c33eb</i><br /><br />Threat actor <b>description</b>: <i>FloorHeat Company specializes in manufacturing and distributing radiant heat components and complete underfloor heating systems, including electric film, cable heating mats, and their patented EasyFloor hydronic heating system.We will upload 25gb of corporate documents soon. Detailed employee personal information, financial and accounting data, contacts and agreements, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Williams--Sparages</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27456</link>
<guid>3b7dc46bb8c1cd27c5e259d59aec73f3</guid>
<pubDate>Wed, 26 Nov 2025 14:08:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Williams--Sparages</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a6360700a642068cb19baeef35559afd4306c58b2fcd519f0ef19b32c6beeb3</i><br /><br />Threat actor <b>description</b>: <i>Williams & Sparages is a full-service engineering firm specializing in civil engineering, planning and development, surveying and mapping, and construction services.We will upload about 127gb of corporate documents soon. Clients information, employee personal information, financials, credit card details, projects, contacts and agreements, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Burnham-Brown</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27446</link>
<guid>acc85fcea72cd0e4032763ed0c565dbc</guid>
<pubDate>Wed, 26 Nov 2025 11:28:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Burnham-Brown</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a8f20cdad716c963a16c71b60f7e632c98d0400e9a3911753b1439d0f8b0dd6</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eastek-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27447</link>
<guid>19813ce72de2e59f836d858196dabe6f</guid>
<pubDate>Wed, 26 Nov 2025 11:28:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Eastek-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f96d1cd9630621896b46fe86ff663e0a66a5cc0544abcd52c7f11bc18aaf8896</i><br /><br />Threat actor <b>description</b>: <i>Manufacturing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Workflow-Concepts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27448</link>
<guid>bc354cf7b5f838d2b1e8a51a0282acdd</guid>
<pubDate>Wed, 26 Nov 2025 11:28:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Workflow-Concepts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e11ce6068934fe261f2f37030325003eed209721e9e50af0a790ef6200abd78f</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Disston</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27450</link>
<guid>84fc80be70d6ffd85f3f172f1f8ea150</guid>
<pubDate>Wed, 26 Nov 2025 11:28:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Disston</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>565ae4893c0828b665929affe32d96f52f94737a6fe74eded6b463c9a5325df6</i><br /><br />Threat actor <b>description</b>: <i>Building Materials</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carlton-Fields</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27464</link>
<guid>c859dc7fb3f221f8598a9d851cb6199d</guid>
<pubDate>Wed, 26 Nov 2025 11:13:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Carlton-Fields</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b0cac905d86c16ddc1b42f38cea320792daf4adf8e6fcbf5293c43b211178f5b</i><br /><br />Threat actor <b>description</b>: <i>Carlton Fields is a nationally recognized law firm delivering strategic legal counsel to corporations,…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>AllerVie-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27443</link>
<guid>27a1e0e31bf1a18797d26f7796f1ae4e</guid>
<pubDate>Wed, 26 Nov 2025 01:12:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>AllerVie-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>165fc4a7f61fbeaef1a54fa4bec26102578e047a8695ef0d710892831407fb2f</i><br /><br />Threat actor <b>description</b>: <i>Major customer database leak.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Inspire-Communities</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27437</link>
<guid>d95a2fa315683f22cfa4713558f64dfe</guid>
<pubDate>Tue, 25 Nov 2025 20:28:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Inspire-Communities</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>074929478f658071a1c87638186f51eddc0cb41c905e47806aee3069dc71b703</i><br /><br />Threat actor <b>description</b>: <i>Real Estate</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-England-Tractor-Trailer-Training-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27438</link>
<guid>1cbb2344a50511f9ea581e66c5cc54f7</guid>
<pubDate>Tue, 25 Nov 2025 20:28:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>New-England-Tractor-Trailer-Training-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>771dfc480ab9f471be80614cc70aaf6386d456ea1ed27202443035c2ac9a9d73</i><br /><br />Threat actor <b>description</b>: <i>Education</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Columbia-Medical-Practice</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27429</link>
<guid>c6626118332e60bac18d07987a74c738</guid>
<pubDate>Tue, 25 Nov 2025 18:28:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Columbia-Medical-Practice</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c98e756e03e5657455f8a5bfa3368e2fa30ba3ab6f6e4f3ef5600b5a7cd11b84</i><br /><br />Threat actor <b>description</b>: <i>0</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lake-Superior-State-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27430</link>
<guid>4bd6a2a0403d0b5c3157bae3ac4fc601</guid>
<pubDate>Tue, 25 Nov 2025 18:28:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Lake-Superior-State-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2c5c0d3eb8d07df1a77b78c10b8914c86081b94487431077f88e0df12e6175f</i><br /><br />Threat actor <b>description</b>: <i>Education</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rochester-Philharmonic-Orchestra</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27431</link>
<guid>31c9f58aa5c02d63abfa65bf94dd602e</guid>
<pubDate>Tue, 25 Nov 2025 18:28:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Rochester-Philharmonic-Orchestra</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bccc75128b13c4a6342aeb01fcc2c7567949b035b3f521506f517f4292124060</i><br /><br />Threat actor <b>description</b>: <i>The Rochester Philharmonic Orchestra (RPO) is a distinguished institution with a 100-year legacy of artistic excellence, offering a diverse range of concerts and educational programs. We will upload corporate documents soon. Musicians' personal information (SSNs, DLs, phones and so on), budget, internal confidential docs, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Accord-Carton</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27432</link>
<guid>0eea9b5a14fff04fe8c0ebf78bc90d63</guid>
<pubDate>Tue, 25 Nov 2025 16:45:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Accord-Carton</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd2b5da0d1af2372fdc621d35785cfbdd0d7ae4cf5952ca28640ee714103b92c</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Accord Carton is a family-owned company that specializes in designing and manufacturing high-quality folding cartons. Founded in 1940, the company is based in Alsip, Illinois. Accord Carton utilizes advanced printing and finishing technologies to produce innovative packaging design solutions. Their services are widely used across industries, including food and beverage, healthcare, and beauty products.</i><br />Target victim <b>website</b>: <i>accordcarton.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Standing-Chapter-13-Trustee</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27415</link>
<guid>624f9da624e85b501a40c03730f6ba83</guid>
<pubDate>Tue, 25 Nov 2025 12:28:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Standing-Chapter-13-Trustee</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>49ea2a0edee8e8b6dc0639097ac3bde00814aabbd6cadca9618ac844b7df53f7</i><br /><br />Threat actor <b>description</b>: <i>The Standing Chapter 13 Trustee District of Minnesota provides services related to bankruptcy cases under Chapter 13, assisting debtors with payment information and case-related resources.We will upload 44gb of corporate documents soon. Employee and client personal documents (SSNs, passports, DLs and so on), detailedfinancials, internal confidential docs, contracts and agreements, court documents, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rempe-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27422</link>
<guid>36b5cde3df91a145d823508f9b5c9c91</guid>
<pubDate>Tue, 25 Nov 2025 10:47:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Rempe-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9a7101bac577e79c58d931b098f631a67a322fb5e6db1270a2e6e287230cb73</i><br /><br />Threat actor <b>description</b>: <i>Rempe Construction specializes in construction services, offering expertise to various clients in need of reliable building solutions. With a focus on quality and customer satisfaction, they deliver tailored construction projects. Located in Novato, California, they serve the local community and surrounding areas. Their commitment to excellence positions them as a trusted partner in the construction industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>MSK</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27425</link>
<guid>da5470b9e6792dbdc7ee450891b2945f</guid>
<pubDate>Tue, 25 Nov 2025 10:09:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>MSK</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52bde9a2a667a2a5fb0705f62624741364f91b547fa5a50cfa9892121397a985</i><br /><br />Threat actor <b>description</b>: <i>Established in 1908, Mitchell Silberberg & Knupp (MSK), is a firm that provides services such as Ventu…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>StatMedPlus-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27421</link>
<guid>aca1de509b1d10131783122f42ee4c75</guid>
<pubDate>Tue, 25 Nov 2025 08:47:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>StatMedPlus-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89f5edf97ecca6ffbbee7524a498c27148b8db7ff1850d64682ed9404548403b</i><br /><br />Threat actor <b>description</b>: <i>StatMedPlus LLC is located at 22 Jericho Turnpike in Mineola, New York 11501.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>HYTORC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27403</link>
<guid>90f5c2fca26cdc32f97373bba4c0c337</guid>
<pubDate>Mon, 24 Nov 2025 20:28:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>HYTORC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4bedd911ecad4401b8b872a24f7074f7e12aef9513bded7b7efed56eb7cffb9</i><br /><br />Threat actor <b>description</b>: <i>Industrial Machinery & Equipment</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Issaqueena-Pediatric-Dentistry</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27407</link>
<guid>ffec51567543679f01ce65724adca743</guid>
<pubDate>Mon, 24 Nov 2025 17:48:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Issaqueena-Pediatric-Dentistry</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f344e673472a5010d29d547570bee5067d16d3d452d2b858894161b4d11bfbe0</i><br /><br />Threat actor <b>description</b>: <i>Isaquenna is a medical center where people get dental treatment and leave their confidential data. Due to its low security, Isaquenna suffered a data breach involving its patients' phone numbers, addresses, SSNs, and personal information such as images, medical histories, and the entire history of the clinic.</i><br />Target victim <b>website</b>: <i>issaqueenadental.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lithographix</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27386</link>
<guid>e61d2ed0329c7be9a1cc46faed9b9a27</guid>
<pubDate>Mon, 24 Nov 2025 16:38:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Lithographix</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c3fec137ca06b3848f7f69c7bbd3ce0d01e884aa21a1ee0d4925e91d8e8e21e</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Lithographix is a printing company based in Hawthorne, California, specializing in offering high-quality printing solutions. They provide services including large format printing, direct mail, digital printing, commercial printing, and binding services. They cater to a range of industries such as advertising, publishing, retail, and more. Established in 1975, Lithographix is known for delivering comprehensive, innovative, and eco-friendly printing solutions.</i><br />Target victim <b>website</b>: <i>lithographix.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Westrian-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27402</link>
<guid>e71f0aa2ed94afb5e84cabf28aea9dfb</guid>
<pubDate>Mon, 24 Nov 2025 16:17:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Westrian-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>16a134a324192f3c5177b26a94ae3144f9cd1d50136eb11878ccd2928abf3642</i><br /><br />Threat actor <b>description</b>: <i>JR Engineering provides services in land management, surveying, land transportation, water resources, and structural design! This company was compromised due to extremely poor security and a weak IT department. Client databases were lost, including confidential contracts with clients and more! All of the company's current sketches and models are now publicly available, which could ruin its reputation and financial position!</i><br />Target victim <b>website</b>: <i>jrengineering.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chairmans-Foods</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27383</link>
<guid>ecec4e43c7aec3dac3535280cd06a37a</guid>
<pubDate>Mon, 24 Nov 2025 15:28:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Chairmans-Foods</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b44163c5df4be0c5937463b008916a72937af5f2f1dd50c9d19d8bf0e469f82d</i><br /><br />Threat actor <b>description</b>: <i>Chairmans Foods is a gold-star rated, USDA manufacturing plant and producer of fresh, frozen and refrigerated food products for more than 40 years. They serve delicious home cooked foods to various delis, grocers and chain restaurants.We are going to upload company data soon. You will find financialdata (audit, payment details, financial reports, invoices), personal financial details of employees, accounting files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Akehurst-Landscape-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27384</link>
<guid>7fcbff32ba6970c5a98efe594b17c6a8</guid>
<pubDate>Mon, 24 Nov 2025 15:28:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Akehurst-Landscape-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>99e6c817e5c9df7149fe639355e73fb598baa4b77927677890330a8b42b8199a</i><br /><br />Threat actor <b>description</b>: <i>Akehurst Landscape Service, Inc., based in Joppa, MD, offers a wide range of landscaping, snow removal, and grounds maintenance services tailored to meet the needs of commercial, industrial, and residential clients. We are going to upload company data soon. You will find financialdata (audit, payment details, financial reports, invoices), personal financial details of employees, accounting files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>dynamichomerepair.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27400</link>
<guid>bcbbe077e03672f38b53fc30865f577a</guid>
<pubDate>Mon, 24 Nov 2025 15:09:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>dynamichomerepair.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4b77cdd06ff435141bed6b2fefad818124295bd92fb8bcff75dc330b21a78e43</i><br /><br />Threat actor <b>description</b>: <i>Dynamic Home Repair is a U.S.-based company specializing in repair services for manufactured homes. It offers a “lifetime warranty” on …</i><br />Target victim <b>website</b>: <i>dynamichomerepair.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advanced-Dental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27388</link>
<guid>294aaff60deaa8b454a370d5952ed8ef</guid>
<pubDate>Mon, 24 Nov 2025 10:03:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Advanced-Dental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>623c44112b7bb32dca7f4049aadfc1347a2defcf609b595e9d007141cfbb6c3e</i><br /><br />Threat actor <b>description</b>: <i>Advanced Dental, located in Aliso Viejo, CA, offers cutting-edge laser dentistry and a wide range of comprehensive dental services tailored for families. Their experienced team, led by Dr. Chitra Tiruveedula and Dr. Joseph C. Yang, provides personalized care for patients of all ages, from toddlers to seniors. The practice emphasizes advanced technology and techniques, including dental implants, Invisalign, and emergency dentistry, ensuring a comfortable and efficient experience. With flexible payment options and a commitment to patient well-being, Advanced Dental aims to create healthy smiles that last a lifetime.</i><br />Target victim <b>website</b>: <i>www.advanceddental.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Access-Search</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27389</link>
<guid>3d2b08aa7cfa68fd54e3f4a4e7ffcf7d</guid>
<pubDate>Mon, 24 Nov 2025 10:03:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Access-Search</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a951e26d43920f226d11a924e4009bd530b5105676cd7777a42650c1edac55b2</i><br /><br />Threat actor <b>description</b>: <i>Access Search, Inc. was founded with one simple mission: to be an honest, diligent, and knowledgeable search firm. With that goal in mind, we assembled the organization that exists today. We take great pride in our team. Each recruiter at ASI has several years of recruiting experience coupled with years of valuable experience in Big 4 public accounting and/or Fortune 500 finance. We come from some of Chicago's finest employers including Andersen Consulting, Deloitte & Touche, Ernst & Young, KPMG, Baxter International, Platinum Technology International, R.R. Donnelley & Sons, Unilever, Cardinal Heath, and Sears Roebuck & Company. Our recruiters draw upon their collective knowledge to present our clients with carefully screened and informed business professionals.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Liberty-Gold-Fruit</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27387</link>
<guid>45ab092a5990dcce61e606f64873a98f</guid>
<pubDate>Mon, 24 Nov 2025 08:36:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Liberty-Gold-Fruit</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f8315de59d32e1f0cf0175cbd7e432cc8a5b009f2795ade80dfcd9e964734781</i><br /><br />Threat actor <b>description</b>: <i>Liberty Gold Fruit Company, Inc. is a family-owned business renowned for its premium quality food products and exceptional service since 1932. The company’s LIGO Brand boasts a presence on grocery shelves in 40 countries, primarily in Asia, Central America, and Europe, often ranking as a leading brand. With a commitment to excellence, Liberty Gold is one of the few remaining privately-owned companies in the industry. Its extensive distribution network ensures that their products reach a diverse clientele worldwide.</i><br />Target victim <b>website</b>: <i>www.libertygoldfruit.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Homestead-Museum</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27391</link>
<guid>8074ea1e919ed5dc154c7fe6f1a2e212</guid>
<pubDate>Mon, 24 Nov 2025 00:20:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Homestead-Museum</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04184029f2a21ddfac97de4e1127d269dd4f75579140d6b029ab3d9f5f281bc4</i><br /><br />Threat actor <b>description</b>: <i>The Homestead Museum is a Historic-Cultural Landmark located in the City of Industry, California, showcasing the history of Los Angeles from the 1840s to the 1920s. It offers a range of programs, including workshops and tours, aimed at educating visitors about local history and fostering advocacy for historical preservation. Ideal for families, students, and history enthusiasts, the museum provides engaging experiences such as storytelling sessions, crafts, and genealogy workshops. As a unique cultural resource, it invites visitors to explore its gardens, houses, and historical narratives.</i><br />Target victim <b>website</b>: <i>www.homesteadmuseum.org</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cayuga-Milk-Ingredients</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27372</link>
<guid>14d8905820297f70d9a211f964f16257</guid>
<pubDate>Sun, 23 Nov 2025 17:28:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Cayuga-Milk-Ingredients</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c513b933098b398346b191aa5dbd29044edadf8f25967705097acf87693fc69</i><br /><br />Threat actor <b>description</b>: <i>Grocery Retail</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Hunnicutt-Law-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27373</link>
<guid>a627f2f69e1caf8063d3fa385f8c4149</guid>
<pubDate>Sun, 23 Nov 2025 17:28:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-Hunnicutt-Law-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e734f8fffe54cca8b8888caaad3a99808c37cd4eeccd6631cca357ec4211f53</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Summit-Construction-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27366</link>
<guid>69cf37d6e6e7462c6bef71561f143071</guid>
<pubDate>Sat, 22 Nov 2025 22:28:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Summit-Construction-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>385f458f017e775fa090833298b9359067995181d2e9c432dc0a8160fad40aff</i><br /><br />Threat actor <b>description</b>: <i>Summit Construction Supply is a leading commercial construction product supplier based in Loveland, Colorado, specializing in providing a wide range of construc...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nugent-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27367</link>
<guid>c2d523e62edb799b473d282f848e2076</guid>
<pubDate>Sat, 22 Nov 2025 22:28:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Nugent-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30ce370b2333a0f1945961f3cd1834c4f35f7730dc78698f61aed66b1d6e8d59</i><br /><br />Threat actor <b>description</b>: <i>Nugent Supply Company is a Women Business Enterprise (WBE) and a member of the Specialty Tools and Fasteners Distributors Association (STAFDA) based in Loveland...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fueling-Solutions-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27368</link>
<guid>af83dfe0b00bdce9c850ae8d3c8a1b99</guid>
<pubDate>Sat, 22 Nov 2025 22:28:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Fueling-Solutions-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>381b97d55c1e12b1e19c94e6ca3a0b70bdae66909272ca3a00b3d18662a9063a</i><br /><br />Threat actor <b>description</b>: <i>Fueling Solutions, Inc. specializes in providing commercial, industrial, and mission-critical fueling systems across over 30 countries on four continents. The c...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Healthcare--More</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27369</link>
<guid>07c0dec6e97ec77c01aa90902a3fc6b5</guid>
<pubDate>Sat, 22 Nov 2025 22:28:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Healthcare--More</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>68bf3e32f7290821e721af6719506da7e61cdf58c78db5779d879eee0662d169</i><br /><br />Threat actor <b>description</b>: <i>Healthcare & Moore, led by independent insurance broker Myra 'Lynn' Moore, specializes in a comprehensive range of insurance products including Medicare plans, ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Barr-Trucking-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27362</link>
<guid>119bd52062c0246257fcd0ec0b8f1902</guid>
<pubDate>Sat, 22 Nov 2025 18:52:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Barr-Trucking-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6394b730a2a5fabf29b093c4a60ea0746d57b6d3b50f1a219ea60e18f9021602</i><br /><br />Threat actor <b>description</b>: <i>Barr Trucking was formed in 1981 by William Mark Barr and his Father William DeWitt Barr in Pinckneyville, IL. At the time, Barr Trucking consisted of two water delivery trucks and one dump truck utilized to deliver residential rock. In 1983 Mark acquired his father’s share of the company with visions of expanding into new markets. The next year Mark purchased the company’s first semi, a 1975 R Model Mack. With an expanding fleet and company growth, a new facility was in order. In 1989, Barr Trucking purchased a large work shop and storage yard west of Pinckneyville, IL where the company operates today.</i><br />Target victim <b>website</b>: <i>barrcos.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>F-W-S-Countertops</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27363</link>
<guid>88595b57c894d9b4a978cdad11062292</guid>
<pubDate>Sat, 22 Nov 2025 18:51:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>F-W-S-Countertops</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c639c3ca1fba8795622dd9b87bcf6f5ff95b594936a4e2835a258fd138735427</i><br /><br />Threat actor <b>description</b>: <i>F-W-S COUNTERTOPS specializes in the design, fabrication, and installation of premium countertops, including Quartzite, Granite, Sintered Stone, Man-Made Quartz, and Wood Butcher Block. The company serves residential, commercial, and institutional clients in Southern Illinois and the tri-state area. With a focus on quality craftsmanship and a wide range of customizable products, they offer unique solutions for various projects such as kitchen and vanity countertops, wall backsplashes, and outdoor kitchens. Their showroom features full slabs and samples along with kitchen and vanity sinks in multiple styles and materials</i><br />Target victim <b>website</b>: <i>f-w-s.net</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mmlk</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27357</link>
<guid>b9de76f2825e2107822a5c68b172a144</guid>
<pubDate>Sat, 22 Nov 2025 18:28:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Mmlk</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1dca0b59b7d1340d7380151e56507331c4bcbe98850df140cdcb7cf26f4643a8</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Keystone-Fabricating</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27360</link>
<guid>e5a872704d45c7fa661a94abd9f9d92d</guid>
<pubDate>Sat, 22 Nov 2025 17:13:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Keystone-Fabricating</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2e45df6530f1cedad634b28c1267179536977d0e83bb86a5fec4b434f8fdd2f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.keystonefabricating.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>CM-Software</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27354</link>
<guid>4c1f53116d73ff13367ffbfd35d8a105</guid>
<pubDate>Sat, 22 Nov 2025 12:50:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>CM-Software</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee11c4e42448054a65698c167e5bbadf2d4c0b72d168cb80d03517cbc3c20c83</i><br /><br />Threat actor <b>description</b>: <i>C&M Software is a leading technology company specializing in solutions for the financial market. Their offerings include automated processes, secure payment integrations, and payment solutions tailored for both immediate and installment transactions. The intended clients range from financial institutions to retail and corporate sectors, aiming to enhance efficiency and risk management within their financial operations. With a commitment to innovation, C&M Software is recognized for providing robust and flexible technology services that streamline payment processes and improve business intelligence.</i><br />Target victim <b>website</b>: <i>www.cmsw.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>onsolve.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27351</link>
<guid>7331da3b0e6d2887993eaee520f03a5a</guid>
<pubDate>Sat, 22 Nov 2025 11:43:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>onsolve.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1df3be6002f8ac66db055a16c4c520f999b8fd66a53045904500b7ffd17af5ae</i><br /><br />Threat actor <b>description</b>: <i>OnSolve is a leading critical event management provider that proactively mitigates physical threats, allowing organizations to remain agile when a crisis strikes. Using the most trusted expertise and reliable AI-powered risk intelligence, critical communications and incident management technology, the OnSolve Platform enables enterprises, SMB organizations and all levels of government to detect, anticipate and mitigate physical threats that impact their people, places and property.</i><br />Target victim <b>website</b>: <i>onsolve.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Medical-Center-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27350</link>
<guid>4469eee129fe5da0d3edce5404418f59</guid>
<pubDate>Sat, 22 Nov 2025 08:16:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Medical-Center-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a06e08009f2ef5bf56234549d2122ecfeb1a833b5bed5a14035a2ece9e9b1aef</i><br /><br />Threat actor <b>description</b>: <i>Family Medicine and Primary Care Practice in Dublin, GA</i><br />Target victim <b>website</b>: <i>dublinmedicalcenter.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Interlink-Trade-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27352</link>
<guid>a1ff59c9fcd256be3695bb06465e1011</guid>
<pubDate>Sat, 22 Nov 2025 07:23:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Interlink-Trade-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22cc1cd5faa834fd3ae8ea9ad1a4db4a568fc24e9743192313d48585e68f2bfd</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.interlinktrade.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>gsccca.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27348</link>
<guid>df4684fd22721f7396ace865dbf2bf3f</guid>
<pubDate>Fri, 21 Nov 2025 21:53:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>gsccca.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>703567365b23ba3736df5d1cfb843dc63fcdf561dbd174f5261d00c8ddef7b93</i><br /><br />Threat actor <b>description</b>: <i>Ransom: 500gb
400k</i><br />Target victim <b>website</b>: <i>gsccca.org</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>procure.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27346</link>
<guid>b9bd86411ab7be06a57612b91c7ef221</guid>
<pubDate>Fri, 21 Nov 2025 18:53:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>procure.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a33c96c695f4f931f3e59ac2e916ae51be9f44eda251b8a91607e19a62e42560</i><br /><br />Threat actor <b>description</b>: <i>Ransom: data theft 
40gb
120K</i><br />Target victim <b>website</b>: <i>procure.com</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alma-Realty</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27334</link>
<guid>58a2819da7144df30bfb364e9bd53453</guid>
<pubDate>Fri, 21 Nov 2025 17:28:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Alma-Realty</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>171d95524b573582d515e8bf241666a51109560cd6a08198793184c41afd7bb7</i><br /><br />Threat actor <b>description</b>: <i>Real Estate</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Electro-Mechanical-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27336</link>
<guid>70933ed510f3c50e1ebf98ef8c6625c2</guid>
<pubDate>Fri, 21 Nov 2025 17:28:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Electro-Mechanical-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9065445cf7258eeb0d8fa7d5be6754d03c641558124aa43afd4bfee343fbf1b</i><br /><br />Threat actor <b>description</b>: <i>Electro-Mechanical Industries, Inc. (EMI) is a manufacturer of standard and custom electrical distribution equipment serving the needs of the electrical industry in the national and internationalmarketplaces.We will upload 50gb of corporate documents soon. Lots of forms with personal employee data (SSNs, addresses, phones, emails), financials, client data, contracts and agreements, projects, drawingsand specifications, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>PM-Plastics-Reliable-Van--Storage-Landis-Whitinger-Strategic-Services-Kimber-Manufact</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27337</link>
<guid>0dd4332bc8f0e9692eaa585b1b20c712</guid>
<pubDate>Fri, 21 Nov 2025 17:28:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>PM-Plastics-Reliable-Van--Storage-Landis-Whitinger-Strategic-Services-Kimber-Manufact</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>686e942884ace39f43df86bd232eb05b924ad81ac2f85460efed9b0546fb3b27</i><br /><br />Threat actor <b>description</b>: <i>We obtained about 29gb of the following companies:PM Plastics manufacturing of miniatures, small parts, large parts, and multiple component assemblies, with most polymers, acrylics, and thermoplastics.Reliable Van & Storage is a full-service moving company based in New Jersey, offering local, long-distance, and international relocation services for both residential and commercial clients.Landis is a real estate services company that that uses technology and data science to help renters reach home ownership.Whitinger Strategic Services is a business development firm that offers a variety of consulting services to help organizations grow in effectiveness, both internally and in the marketplace.Kimber provides a singular purpose of building fine sporting firearms, better even than classics from the golden age of American gunmaking.You will find personal employee personal data, client information, project files, accounting and financials and other internal operational files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>First-Fruits-Farms</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27338</link>
<guid>2f4ab360cf3af4da6fde2edadc989788</guid>
<pubDate>Fri, 21 Nov 2025 17:28:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>First-Fruits-Farms</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f2014fa10604058fb37308447b91b7df5a7a13c33dc4f8c9b9ccd8f411ebb8e0</i><br /><br />Threat actor <b>description</b>: <i>First Fruits Farms, located in Prescott, Washington, is an agricultural company that specializes in apple and cherry orchards.We will upload 26gb of corporate documents soon. Employee personal documents (SSNs, passports, w-9 forms), detailed financials, customer data, contracts and agreements, projects, drawings and specifications, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>HCMSPARTNERS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27339</link>
<guid>c4561a0e19159df04bbefd195d1530a3</guid>
<pubDate>Fri, 21 Nov 2025 17:02:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HCMSPARTNERS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f46bc3fb10851898f419101d71b2fd58457f277f8b777bdf7eab03653eabbe3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MSG.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27307</link>
<guid>2bd17730427116dbfd936f57fbca0237</guid>
<pubDate>Fri, 21 Nov 2025 16:59:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MSG.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd186ce07c1abeeea7214680b9967010a5c45106a81e58986774898e007e1d02</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>INTELLINUM.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27308</link>
<guid>df1587ed91223bcb29b80f5bdcb9f3fa</guid>
<pubDate>Fri, 21 Nov 2025 16:56:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>INTELLINUM.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e94134cde3d5b2bf7a0a74e5b28883f571c49398cc3f7672f59ccf1f50b71449</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>KNEXTECH.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27309</link>
<guid>5e00e01a9eda901400af2385124a46f4</guid>
<pubDate>Fri, 21 Nov 2025 16:53:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>KNEXTECH.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47044215e999cde5593cd9c7bd4c5a92f70e9560b8275b87b28d92fb06b57968</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ANYWHERE.RE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27310</link>
<guid>36784239eafd68f930b48af7ba423a3a</guid>
<pubDate>Fri, 21 Nov 2025 16:51:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ANYWHERE.RE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2290a34970994ac6dfc37af2097d7324241154a313da6cafcd0461fc40490cff</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GOLDSTARPENS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27311</link>
<guid>be9e47ef1ac42972d5bee9836c8c7b73</guid>
<pubDate>Fri, 21 Nov 2025 16:51:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GOLDSTARPENS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bbb241ae1f2ad288c352e1467a307c3d9099274a9592989f53085238924b207e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>NORTHEASTERNCORP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27314</link>
<guid>80ddea7f4c358d2a47c0292bd58a635f</guid>
<pubDate>Fri, 21 Nov 2025 16:36:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NORTHEASTERNCORP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>35b99a0f2167abd90c2d9c6bc3f982222d3ae2f25181fa9cb14e310bc8b99e65</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MACYS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27316</link>
<guid>e7a180ba295bede84074fba08a8feea4</guid>
<pubDate>Fri, 21 Nov 2025 16:33:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MACYS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a2eaf6dd4c6160695fb184dfd57acafd778ca0fbf918b67be7f371a45fc36452</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HYPERTHERM.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27317</link>
<guid>51ca813b865fb6a3be61edd9fdf0b157</guid>
<pubDate>Fri, 21 Nov 2025 16:22:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HYPERTHERM.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7dbd4d541c2f1e338e84d232bf95d4410e0ed347ebe2e5f6a6d5f48d00b8c857</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>INVENTIVE-IT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27319</link>
<guid>96998fec57d81a588cb70dfd7a56bab8</guid>
<pubDate>Fri, 21 Nov 2025 16:18:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>INVENTIVE-IT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ff2f8b6032dccb032f4cb5939cab3e2c1499e769eb3b408d2e1826f3516f669</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>IBIZSOFTINC.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27326</link>
<guid>50f5a0b224ddb1270e0f523c7efae216</guid>
<pubDate>Fri, 21 Nov 2025 16:12:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>IBIZSOFTINC.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8291aa8db31d4b6feb21474fa63cdd4c2581d2301c78fe9229b1c2c2231c10a2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>LEGACYCLASSIC.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27327</link>
<guid>d6979f4b1fc40f9d720e42d4ce13bb10</guid>
<pubDate>Fri, 21 Nov 2025 16:12:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>LEGACYCLASSIC.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c40db54a6f4ff782299952e861fc06ca63ea93ebaa48fca8267571af7499dcf</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>AOSOM.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27328</link>
<guid>aad65b962da06a412ef0d9e499960b1a</guid>
<pubDate>Fri, 21 Nov 2025 16:12:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>AOSOM.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9285fa377f7366041fcdb8beb76dfa98c762306d08dd2ddc66b8d8f5a5cc12f7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>INCENTIVECONCEPTS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27329</link>
<guid>80975550806eb4c9abaf7bb3d6cd4868</guid>
<pubDate>Fri, 21 Nov 2025 16:12:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>INCENTIVECONCEPTS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f65dec9316508eea5c2ef8aac1e9d53b1be92a6703e2ed45274f22b3b58ee968</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wachusett-School-District-MA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27342</link>
<guid>a438a122ad7b41a2d652eccda5a6711b</guid>
<pubDate>Fri, 21 Nov 2025 15:46:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Wachusett-School-District-MA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>191eb46a333c376161129f58a507b028b6fc93387cda3bd1ea203e187b02badd</i><br /><br />Threat actor <b>description</b>: <i>Wachusett School District MA Wachusett School District MA is a public school district.    More</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>UAM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27341</link>
<guid>58473c0cf0d3a91a67640caff09c74f3</guid>
<pubDate>Fri, 21 Nov 2025 14:22:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>datacarry</b> claims attack for <b>UAM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6e08303e239aef26f68b008b3e46490148dd91d6a536c22d069972f49bee09c</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] UAM, officially known as Universal Asset Management, is a global leader in the aviation services industry. They specialize in whole asset management, from leasing, trading to dismantling end-of-life commercial aircraft. Established in 1992 and headquartered in Tennessee, USA, UAM utilizes advanced technology to serve a wide range of clients around the world. They are dedicated to environmental sustainability through recycling aircraft materials.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>datacarry</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gruenberg-Kelly-Della</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27301</link>
<guid>fe18b4fe37333a388473988576c744ee</guid>
<pubDate>Fri, 21 Nov 2025 12:16:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Gruenberg-Kelly-Della</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cfe8e554334dbe9a193ee0e3ddd3a413ed1483b521293d0fcb251e03e6a654b9</i><br /><br />Threat actor <b>description</b>: <i>One more law firm, which posts glossy Instagram updates about its victories, has now shut down its phones after confronting client‑data leaks and other problems, leaving customers in the lurch. We’re prepared to take down that post immediately once the firm’s representatives contact us and begin negotiations to prevent the release of the data for which they are responsible. If you’re a client, reach out to the firm and tell them you do not want your medical or financial information made public.
Gruenberg Kelly Della is a Long Island-based law firm specializing in personal injury cases, dedicated to achieving justice for the wrongfully injured. Their experienced legal team handles a wide range of cases, including car accidents, medical malpractice, and wrongful death, with a strong commitment to client advocacy. The firm operates on a contingency fee basis, ensuring that clients pay no legal fees unless they win their case. With a proven track record of recovering hundreds of millions for their clients, they are passionate about helping individuals navigate the complexities of personal injury law.</i><br />Target victim <b>website</b>: <i>newyorklawgroup.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>PATLITE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27296</link>
<guid>066d798d72836b03af5a4a692960a6e0</guid>
<pubDate>Fri, 21 Nov 2025 00:10:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>PATLITE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48e3e738dd1f238c54a00b40223b275fdfcfaebee0c2bb302e5f1a693aad6b80</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1947, PATLITE Corporation is a technology engineering and manufacturing company. PATLITE provides LED status indicating lights, sound alarms, and visual and audible communication network systems. The company is based in Torrance, California.</i><br />Target victim <b>website</b>: <i>www.patlite.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>SAExploration</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27294</link>
<guid>2326eb84b13c47afd79b98dda65b4fd9</guid>
<pubDate>Thu, 20 Nov 2025 22:44:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>SAExploration</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c788d32f6a2a61b7eeb75e2283eb0b23186c4b0df21aac8594055d6c077d454</i><br /><br />Threat actor <b>description</b>: <i>SAExploration Holdings, Inc., an oilfield services company, provides seismic data acquisition and logistical support services to the oil and natura...</i><br />Target victim <b>website</b>: <i>saexploration.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kewaunee-Scientific</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27293</link>
<guid>81b669febd10363a78964e2ea652a9e6</guid>
<pubDate>Thu, 20 Nov 2025 22:43:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Kewaunee-Scientific</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cdb804cf93ccc5f2825298b558a59754bed40e7d2d2f427569f8d0fa43850a38</i><br /><br />Threat actor <b>description</b>: <i>Kewaunee Scientific Corporation designs, manufactures, and installs laboratory, healthcare, and technical furniture products. The company operates ...</i><br />Target victim <b>website</b>: <i>kewaunee.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>classiccenter.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27292</link>
<guid>57b01adc7eb0a085a9eed546e5b0f617</guid>
<pubDate>Thu, 20 Nov 2025 21:28:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>classiccenter.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c463b0acd4eb9a88d3c1214a55ceb74b86ccb8cd0caaf55bf8ebac40756c519</i><br /><br />Threat actor <b>description</b>: <i>Akins Ford Arena is a state-of-the-art entertainment venue located in downtown A...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fayette-County</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27285</link>
<guid>fff574293a6252f4029a9413f364b2e6</guid>
<pubDate>Thu, 20 Nov 2025 19:28:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Fayette-County</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0267152ba1daa8757f1e3ebddb8e6be68b5d27d9d90e047c1e74d2fc0bcb90f0</i><br /><br />Threat actor <b>description</b>: <i>Government</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Radio-Sound</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27291</link>
<guid>ec811d0d775adc62776ba80fadd4ed19</guid>
<pubDate>Thu, 20 Nov 2025 18:12:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Radio-Sound</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df748b565a52f19e4ee7b9bcdc45e053d77e1289e8916ce35a4fec9c3a2c6374</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.radiosound.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Applied-Energy-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27290</link>
<guid>2b962f0b627cf45414b498eb963dde7d</guid>
<pubDate>Thu, 20 Nov 2025 18:11:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Applied-Energy-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>39e8dffb880244d30315728e58230f839d2816129030f0f98a5b65dee0f16137</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.appliedenergysystems.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>One-Source-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27288</link>
<guid>97fb74bbdd02677adc1a871fdd16ac7a</guid>
<pubDate>Thu, 20 Nov 2025 18:10:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>One-Source-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89c53d52618a84987b4c7c8953f4450741052359fce6b7ad3e53cb7e85501a71</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.onesa.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>N-C-Machinery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27287</link>
<guid>2dac573d6ff24bd9a16140531e156cdc</guid>
<pubDate>Thu, 20 Nov 2025 18:09:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>N-C-Machinery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb6ad94e6a667e8d155ff569a2ccd01d056c8954ff04b4c9d65f80cfda366758</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ncmachinery.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Highmark-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27286</link>
<guid>d0a0890b4ed35d097396473c7c84da92</guid>
<pubDate>Thu, 20 Nov 2025 18:08:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Highmark-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>68e893130da99000e5e241525d51c2bd5393f6150c8f36133fdea3592e96b7a3</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.highmarkcos.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>GREENBALL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27271</link>
<guid>ca172848cbc21794bac4f7ba9333fa5f</guid>
<pubDate>Thu, 20 Nov 2025 17:16:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GREENBALL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8d1ca128471be2ee6e74b8ebca634a2186d1d374d4053e8d548c3cb9f30fde7b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>-WELLBIZBRANDS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27274</link>
<guid>c712cafa19f7f3dfbd8a72abeac78ec8</guid>
<pubDate>Thu, 20 Nov 2025 17:13:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>-WELLBIZBRANDS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2afdd6abc476327644bb2beee8ccfc8925ab817ebd775ae2d1ca6118c229cb41</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DOONEY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27275</link>
<guid>3279e1d4c83720ed7e4b99f98b26feb1</guid>
<pubDate>Thu, 20 Nov 2025 17:12:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DOONEY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>62404a89e98216e04b4a9e3f05ea6652ea3e063d5a9b2f08a9e22b17ef06d49f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SIU.EDU-EBS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27276</link>
<guid>c4a5846ea90782929bf365eeec1eaa6d</guid>
<pubDate>Thu, 20 Nov 2025 17:12:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SIU.EDU-EBS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>07b9a47d6fe5e466bdbfe5543dcef10de5dfa2be36648b4e26270a46d887f0e8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>FRUIT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27247</link>
<guid>6a45c2b39692eedbfd0b378c47a5a693</guid>
<pubDate>Thu, 20 Nov 2025 16:47:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>FRUIT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>778e287ebe5d091756906554097a8bea68777f2e86124b8abd5b2821f69c863d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>FRONTROL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27248</link>
<guid>299024cfe2cd92197e0ab02d2421285c</guid>
<pubDate>Thu, 20 Nov 2025 16:47:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>FRONTROL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>466c8b5e4cefffb3dff31780461e6fdc53b8cdc9d1b1017bb86b5a5f0b5e8080</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HUMANA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27249</link>
<guid>ff99dc2d99ab4c337ff158793b47bee6</guid>
<pubDate>Thu, 20 Nov 2025 16:46:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HUMANA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3b8cf912a8335123bb1d5715ffffb9722dcb3b2fa86768ae9daf86cc8dcd253</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ORACLE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27250</link>
<guid>374cad868cb62202053d308252bc4040</guid>
<pubDate>Thu, 20 Nov 2025 16:46:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ORACLE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9bcdedbc60dfd1f99ad46873d8b077f3f7d8d27acea9ccad916329c0a74e9776</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ABBOTT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27251</link>
<guid>e5beda486259643c262e6fd24aa3ca88</guid>
<pubDate>Thu, 20 Nov 2025 16:45:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ABBOTT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33ea3b88e1bf829bd9b9a82b4aa4ee02360c6c1ae958cc21875b51c791d9c3e0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BECHTEL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27257</link>
<guid>f590ad7f681d5cf0b57f2a38f4874883</guid>
<pubDate>Thu, 20 Nov 2025 16:42:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BECHTEL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>951a78340b507548882d9b85ffaab897595535906d8c38d7a10a112aa952d59b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ELCOMPANIES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27258</link>
<guid>aaea30db7c8b270df7a0f70f92db0ab3</guid>
<pubDate>Thu, 20 Nov 2025 16:42:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ELCOMPANIES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7799b5893e01eb0275306eb2bc65cba7acd6838c8a230b008a7d5931781eb01</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>RIDERTA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27259</link>
<guid>60fbbc1c544a895285294af287c36db8</guid>
<pubDate>Thu, 20 Nov 2025 16:41:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>RIDERTA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3187b4074be0b24dd2902bedd46b0f3287692c436fd1e773e03494cd3e99dcab</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BROADCOM.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27260</link>
<guid>241f5934168d13edc6d3990fe5ddde40</guid>
<pubDate>Thu, 20 Nov 2025 16:41:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BROADCOM.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4059ff5adaadc68b465673c5d0be239590cee185d8c6d69140665512be082625</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wright-ArchitecturalMillwork</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27279</link>
<guid>8f1132db5edd938b22f6167b7f67d82b</guid>
<pubDate>Thu, 20 Nov 2025 16:41:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Wright-ArchitecturalMillwork</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9fdf0012087e9407111d49874146b978b010efab91c20f66ec8aae20f8a131a2</i><br /><br />Threat actor <b>description</b>: <i>Wright Architectural Millwork specializes in high-quality archite
ctural woodwork and has been in the industry for 50 years. 

We will upload 87gb of corporate documents soon. Employee persona
l information (passport numbers, driver licenses, phones, emails)
, financials, a bit of client data, contracts and agreements, NDA
, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Swift-Filters</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27280</link>
<guid>7144e2ba113bacdd760b73ae7478c74e</guid>
<pubDate>Thu, 20 Nov 2025 16:40:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Swift-Filters</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89b9a170e918f6bc372ceca1a628c452e80a1dc7607e5fef2eb3040e3b9e1bbb</i><br /><br />Threat actor <b>description</b>: <i>Swift Filters is a leading US manufacturer of high-quality hydrau
lic filter elements, offering a wide range of replacement filters
for various brands including Parker Hannifin, Pall, and Donaldso
n.

We will upload 140gb of corporate documents soon. Employee person
al files, financials, client data, contracts, NDA, projects, draw
ings and specification, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>A10NETWORKS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27261</link>
<guid>d9a63503ec814c2c1f9a594b15679eb4</guid>
<pubDate>Thu, 20 Nov 2025 16:40:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>A10NETWORKS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d01c9030ec72da07ab0544c8cd6a6df4a1bce2d718d372fb239297fd5dea978d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ENVOY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27262</link>
<guid>f7abe7d1372d2d2d0c15f1410e699b25</guid>
<pubDate>Thu, 20 Nov 2025 16:40:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ENVOY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d32fd937198261f3023bcd84d4668d1266cdca2f66131851d36d547497ab017f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MAZDAUSA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27265</link>
<guid>bbd4e463fe0ad675dcb2493d8abd6b0b</guid>
<pubDate>Thu, 20 Nov 2025 16:38:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MAZDAUSA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7716bba076a78214068851d70ff30293657824da84854dcd26ed4e041a1300a5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>LLPRODUCTS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27267</link>
<guid>1602c2b2b3692f45f9c6f00e435bdde5</guid>
<pubDate>Thu, 20 Nov 2025 16:31:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>LLPRODUCTS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1c906d224d65cff6ec1ca3516b536a411a123fb0d42613e77d24c8d45f8799c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PHOENIX.EDU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27269</link>
<guid>0139266877771d61f301725cd29cdb86</guid>
<pubDate>Thu, 20 Nov 2025 16:30:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PHOENIX.EDU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c4f04707d90f7c9fc4b1730fcf13eccd2834ed92314190791146e09ae76a84f0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Teamglobal</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27278</link>
<guid>f6be712d932810d3b2dd67e494cb78df</guid>
<pubDate>Thu, 20 Nov 2025 16:18:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>morpheus</b> claims attack for <b>Teamglobal</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>572a979ec20ff25ea1c786ef64b0bdd88c091f41109914a15367c96a3e94c185</i><br /><br />Threat actor <b>description</b>: <i>Website:  teamglobal.com

Revenue: $6.3 Million

Premier contract and direct hire staffing services. 30 years of industry experience in aerospace and light industrial and an extensive client list.

**</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>morpheus</category>
</item>
<item xmlns:dc='ns:1'>
<title>AJ-Jersey</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27242</link>
<guid>e0b8da96bad1458e5d78007b9e2d38c4</guid>
<pubDate>Thu, 20 Nov 2025 14:28:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>AJ-Jersey</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f39de731474c62743974dcc343f131918d9c4ed7828e60c45a3460ca7a1b27a</i><br /><br />Threat actor <b>description</b>: <i>AJ Jersey Inc. is an industry leader in Forklift Sales, Forklift Rentals, Forklift Service and all of your Material Handling needs.We will upload almost 22gb of corporate documents soon. Employee personal data (driver licenses of 73 employees, detailed health reports with DOB, phones, emails and so on), financials and accounting, client files, contracts, specifications, projects, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Croft</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27236</link>
<guid>5a18b2b3a647804eec32e380a70ba66f</guid>
<pubDate>Wed, 19 Nov 2025 20:14:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Croft</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>574cda67c41fd3cb879d0a55931cee2da491827316a3f44d7e490f6710759cbf</i><br /><br />Threat actor <b>description</b>: <i>Croft is a leading window and door company specializing in energy-efficient vinyl and aluminum products, including a variety of windows and patio doors. With a commitment to quality and innovation, the company has built a reputation as one of the largest and most reliable suppliers in the industry since its establishment in 1920. Croft's offerings are designed to enhance comfort and energy savings for homeowners, making them an ideal choice for those seeking high-performance solutions. The company caters to both individual customers and certified dealers in the market.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Trust-Administrators</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27227</link>
<guid>0ea841a00684473af118beb024287ce3</guid>
<pubDate>Wed, 19 Nov 2025 16:39:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>American-Trust-Administrators</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3eee6dd824363aa68bbb386ddad1715e397818c3dc5118ecc272c4b2458ccbba</i><br /><br />Threat actor <b>description</b>: <i>American Trust Administrators, Inc. (ATA) is a national leader in
the administration and management of employee benefit plans.

We will upload almost 143gb of corporate documents soon. As you c
an understand there are a lot of HR files, confidentiality agreem
ents, detailed financials and accounting, lots of client files, p
rojects, NDA, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Orchid-Island-Golf-and-Beach-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27228</link>
<guid>ec341a16d2ebfd5bd5954296bd261ffc</guid>
<pubDate>Wed, 19 Nov 2025 15:50:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Orchid-Island-Golf-and-Beach-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>82bfd49529a0d4cd535309f9d51a8e143333fb30acda94ecf6a11843cff64a9f</i><br /><br />Threat actor <b>description</b>: <i>Orchid Island Golf and Beach Club is a member-owned golf communit
y located in Vero Beach, Florida, nestled between the Atlantic Oc
ean and the Indian River.

We will upload almost 20gb of corporate documents soon. Employee 
data (driver licenses, phones, addresses), confidential files, fi
nancials and accounting, contracts and agreements, clients' infor
mation, NDA, projects, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Modern-Display</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27229</link>
<guid>7200be166920d491d01df95989e20999</guid>
<pubDate>Wed, 19 Nov 2025 15:50:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Modern-Display</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2134e68c55f377cdb249ee8fda8ffbda3e0459bdd4da549365384f48cf1c5e55</i><br /><br />Threat actor <b>description</b>: <i>Modern Display specializes in providing exquisite seasonal decor,
collectibles, and thoughtful gifts suitable for every occasion.

We will upload almost 20gb of corporate documents soon. Employee 
data, confidentiality agreements, detailed financials and account
ing, contracts with Disney and other widely known companies, clie
nt data, lots of projects, drawings and specification, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-InterTech-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27226</link>
<guid>29d750e5ac458ca572dfe267436a847f</guid>
<pubDate>Wed, 19 Nov 2025 15:23:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-InterTech-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5ecfa3dae2eb29b7ff907d9cd48dd383570b03bfacd2c8780337515ff422817f</i><br /><br />Threat actor <b>description</b>: <i>The InterTech Group is a holding company based in North Charleston, South Carolina, focused on investments, diversification, and opportunity creation.We will upload 17gb of corporate documents soon. Detailed personal employee data (SSNs, passports, driver licenses, Mexican ID's, personal phones, addresses, addresses emails), employee relativesdata will be available as well, confidentiality agreements, financials and accounting, contracts and agreements, clients' information, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>CYTIVALIFESCIENCES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27212</link>
<guid>b841314f665bb44d5aeea2d40a193c17</guid>
<pubDate>Wed, 19 Nov 2025 14:44:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CYTIVALIFESCIENCES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca71bdd2b71bd1bcad1f538f9e28b59fa8c5f17e0572b16fdcc576fe1a981653</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pearl-River-Valley-Electric-Power-Association</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27230</link>
<guid>fa980e7b000b6545a4c0c5373eb1b7f3</guid>
<pubDate>Wed, 19 Nov 2025 14:44:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Pearl-River-Valley-Electric-Power-Association</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>08b7ce07640eff38c9b33c7705b105af73cb4091f42e7c9c7fa861154d704948</i><br /><br />Threat actor <b>description</b>: <i>PRVEPA is an electric cooperative dedicated to providing safe, de
pendable, and affordable power to the residents of South-Central 
Mississippi since 1938.

We will upload 62gb of corporate documents soon. Employee data (d
river licenses, phones, addresses, emails), confidential technolo
gies, financials and accounting, contracts and agreements, client
s' information, NDA, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>NCH.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27213</link>
<guid>5ec67ad4f910b37110d81f2b3a72720a</guid>
<pubDate>Wed, 19 Nov 2025 14:43:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NCH.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f51f05e8128bcba5967fb1b148a1f438dde4a76062dacc26d42c355e9ab008dc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ENOVIS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27214</link>
<guid>08e546f8f607177ace79a17856033516</guid>
<pubDate>Wed, 19 Nov 2025 14:43:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ENOVIS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f52689058f83b16d4dc5ef6a75348c46d92a52204a04c6ea651704059ec70f4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ELKAY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27215</link>
<guid>b51ecba56e03d4181e0006ff1e8a5355</guid>
<pubDate>Wed, 19 Nov 2025 14:42:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ELKAY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>206eed4aa8ba9b1cc171133f91bda35c9e9b42a6fea131136cc6c66e54554c2f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>LIFEFITNESS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27216</link>
<guid>617eed14b937d3e2c5cec24f79eb134d</guid>
<pubDate>Wed, 19 Nov 2025 14:42:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>LIFEFITNESS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f53af038735b2f2ca945289d93f9507357cde66d6354578b2b500184997581b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TULANE.EDU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27217</link>
<guid>ea2c6871f6c0a711fe98331e411daa42</guid>
<pubDate>Wed, 19 Nov 2025 14:41:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TULANE.EDU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f61723ac8af88f88790c77604b4c4cce607e5c6d07f4ffa75ae8e88cf2821763</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>RFSUNY.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27218</link>
<guid>214a793090ffcaee487d7c0e1d5d23b0</guid>
<pubDate>Wed, 19 Nov 2025 14:40:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>RFSUNY.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c91bb89a09627ad0ba186364a8884cf5e72b09195b10df4a0b7e34bc530489d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BELFUSE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27219</link>
<guid>42a33d4150a53ec0160e9cad6f13b923</guid>
<pubDate>Wed, 19 Nov 2025 14:40:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BELFUSE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ef979603111a61210c5d4525b1a7d6ef566d8c7092bd37e255acbbf2943496da</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GARLANDISDSCHOOLS.NET</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27220</link>
<guid>6b3575c997eb8e46e71f91752bdfe41e</guid>
<pubDate>Wed, 19 Nov 2025 14:39:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GARLANDISDSCHOOLS.NET</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb81cd9d6550a8c02964506790469ce0d2abe3b24307e7fb66d92e7f9b8ced7c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>AVAILINFRA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27221</link>
<guid>b08fd3752ae338af086a4369611fa83f</guid>
<pubDate>Wed, 19 Nov 2025 14:38:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>AVAILINFRA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>76f21c322886edc068cb7dc63683b9fe5d6e248e5305fc9e151e2f435c136fe7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Perry-Brothers-Oil</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27222</link>
<guid>2bdc37abe64e30f5670fc891a5c83308</guid>
<pubDate>Wed, 19 Nov 2025 14:24:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Perry-Brothers-Oil</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af91a58747ae577a857e7be82608f53fa8161ab7e02d6c9862ecbcea4bbcda5a</i><br /><br />Threat actor <b>description</b>: <i>Perry Brothers Oil Company is an automotive shop specializing in tires, motor oil, and wheel alignments. We will upload 20gb of corporate documents soon. Personal employee and customers data (passports, driver licenses, personal phones, addresses, addresses emails, credit card records), confidentiality agreements, detailed financials and accounting, contracts andagreements, clients' information, incident reports, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>reidhurstnagy.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27231</link>
<guid>7a3989037ec79ff52a7c83c330874a5c</guid>
<pubDate>Wed, 19 Nov 2025 13:46:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>reidhurstnagy.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e5bdd908fef8b300f39645db16cbd564fb8990bcd8e7b089b1efc455eea4ca22</i><br /><br />Threat actor <b>description</b>: <i>RHN CPA is a full-service accounting firm that provides diverse accounting services to various clients including businesses, First Nations, not-for-profit organizations, and individuals across the Lower Mainland and Okanagan. The firm is committed to delivering superior accounting and related services that enhance clients' quality of life, while fostering a supportive and flexible environment for its employees. With a focus on accessibility and personalized service, RHN CPA builds strong relationships with clients to support their growth and success. Their offerings include bookkeeping, tax preparation, and financial advisory services tailored to meet the unique needs of their community.</i><br />Target victim <b>website</b>: <i>reidhurstnagy.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>mcchemical.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27233</link>
<guid>f599aac605e05f944669afe5c1b79375</guid>
<pubDate>Wed, 19 Nov 2025 13:43:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>mcchemical.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9b60ffa7e64c6b3614929dfa117c55a83757a5ece657d45fc5c34c0b4e9a089b</i><br /><br />Threat actor <b>description</b>: <i>Ransom: 200k
80gb</i><br />Target victim <b>website</b>: <i>mcchemical.com</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cardinal-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27225</link>
<guid>204febcbbc5ee18b88a7c4680f293c19</guid>
<pubDate>Wed, 19 Nov 2025 13:25:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Cardinal-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>71113fcace63f9c7239f0a487c2a0638be2312a54e01be450ffed3e7b3f94dfb</i><br /><br />Threat actor <b>description</b>: <i>Cardinal Services, based in New Iberia, LA, is a leading oilfieldservice company specializing in land and offshore services.We will upload 90gb of corporate documents soon. Personal employee files (driver licenses, phones, addresses, emails, credit card details), financials and accounting, contracts and agreements, clients' information, incident reports, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stoss-Landscape-Urbanism</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27211</link>
<guid>27e2633066b399616dbb49c89802ecbb</guid>
<pubDate>Wed, 19 Nov 2025 10:47:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Stoss-Landscape-Urbanism</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dad551d17dcf416a303501ad5f0bd281c19ca9dfd2b4e4b5163cef29f818bf4e</i><br /><br />Threat actor <b>description</b>: <i>Stoss Landscape Urbanism specializes in designing landscapes and 
social spaces that promote resilience, vitality, and equity. Thei
r projects encompass a variety of sectors including downtown plaz
as, parks, waterfronts, campus institutions, and mixed-use reside
ntial areas.

We are ready to upload more than 76GB data. You will find employe
es and customers information (passports, Social Security Numbers,
emails, phones) confidential information, NDAs and other documen
ts with detailed personal information. 
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Marine-Foods-Express-LTD</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27210</link>
<guid>817bc5291463f8c993dd1d46eca2bd0d</guid>
<pubDate>Wed, 19 Nov 2025 10:24:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Marine-Foods-Express-LTD</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf3cb022bd2a691872ce055640c4c46965ac19c636816796f9688b2c90a50a9e</i><br /><br />Threat actor <b>description</b>: <i>Food & Beverage</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Genrose-Stone--Tile</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27207</link>
<guid>f51cfc97dcd19892b6000e77f976bbf1</guid>
<pubDate>Wed, 19 Nov 2025 00:38:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Genrose-Stone--Tile</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97fb83cab4cf86d813e76e79d4cb12f6bc9c9567df962ba732a50e147eccfdf1</i><br /><br />Threat actor <b>description</b>: <i>Since 1988, we have been working together with homeowners, architects, and designers to bring ideas to life. Our core purpose is to inspire excitement through innovative products and support. At GENROSE Stone + Tile, we not only provide premium stone and tile for your project, we also look for ways to serve your best interests. Service and support are the foundations of the GENROSE brand, and your needs, creative vision, and long-term satisfaction are always our first priority. That's the difference we make every day. We search the world for the most beautiful natural stone and stay in step with fashion trends and technical innovations in interior design. With a very careful eye on style, quality and durability we source, import, and stock over 300 varieties of stone slabs and literally thousands of tile options. With our handcrafted tiles we can make any shape and any color tile in our manufacturing plant right in Connecticut to fulfill your vision. </i><br />Target victim <b>website</b>: <i>www.genrose.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>heywood.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27206</link>
<guid>faab108793e96f5c822ff32c527f66ca</guid>
<pubDate>Wed, 19 Nov 2025 00:38:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>heywood.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c83a0ce415ee4e931fc26f0bf3d85b64a68ac29afa592d46f9ed85a4d146efcc</i><br /><br />Threat actor <b>description</b>: <i>A member of the Heywood Healthcare system, Heywood Hospital is an acute care hospital in Gardner, MA, providing a broad range of high quality medical, surgical, obstetrical, pediatric and behavioral health services on an inpatient and outpatient basis.</i><br />Target victim <b>website</b>: <i>heywood.org</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>grandeprairie.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27191</link>
<guid>9d02d64b8e1ef4389b2ca1f4c19b2497</guid>
<pubDate>Tue, 18 Nov 2025 18:45:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>grandeprairie.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d6c8c549b57daa9e99dc58148166079ab4b1c9de29eaef731ab9ae4583bb8b8e</i><br /><br />Threat actor <b>description</b>: <i>Grande Prairie Public Library offers a variety of services including room reservations, notary public services, exam proctoring, and technology assistance. The library provides resources for all ages, including youth, teens, and adults, with access to eBooks, audiobooks, and educational databases. They also partner with Tutor.com to offer live virtual tutoring services. The intended clients are community members seeking educational resources, technology support, and recreational activities Employees: 50 Revenue: $5 Million Industry: Hospitality   Phone Number: (708) 798-5563</i><br />Target victim <b>website</b>: <i>grandeprairie.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bleyl-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27190</link>
<guid>3125b62f0e477cfdfbc779a31de3beb6</guid>
<pubDate>Tue, 18 Nov 2025 18:24:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Bleyl-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cac5275e91e558679cf9de4feb3a6e3a0e8576b6f57bc0cefc7f908b33e768b0</i><br /><br />Threat actor <b>description</b>: <i>Bleyl Engineering is a Consulting Civil Engineering firm based inConroe, Texas and with offices in Bryan - College Station, Austin, and Houston.We will upload 25gb of corporate documents soon. Lots of employeepersonal files (passports, driver licenses, SSNs, phones, addresses, email addresses, credit card details), detailed financials, contracts and agreements, clients' information, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>zadroinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27196</link>
<guid>7dea0e3bf353aa76b7af76ad8b70b186</guid>
<pubDate>Tue, 18 Nov 2025 18:23:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>zadroinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc3a098c8718fd333452aff89f393bd938315b7ddc04ad4b5551f6b54d88bcd7</i><br /><br />Threat actor <b>description</b>: <i>Zadro Inc. is a California-based beauty, health, and wellness brand with over 37 years of experience in creating innovative products. Specializing in advanced technology and holding more than 40 patents, the company offers a range of items including makeup mirrors, towel warmers, massagers, and aromatherapy products. Its intended clients include individuals seeking to enhance their daily routines and achieve spa-like comfort at home. With a commitment to quality and customer satisfaction, Zadro Inc. has established itself as a trusted brand in the wellness and beauty industry. Employees: 200 Revenue: $11.9 Million Industry: Retail Phone Number: (714) 892-9200</i><br />Target victim <b>website</b>: <i>zadroinc.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>General-Distributing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27185</link>
<guid>cc7895156592259f3ca4d789cb629260</guid>
<pubDate>Tue, 18 Nov 2025 15:20:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>General-Distributing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>80911d123ac29e8ebfdafd6eb673be55a8e3c3a9fea0869c21903afe1f1dad6b</i><br /><br />Threat actor <b>description</b>: <i>General Distributing Co is a company that operates in the Convenience Stores, Gas Stations & Liquor Stores industry. It employs 100to249 people and has 25Mto50M of revenue. The company is headquartered in Salt Lake City, Utah.
company is headquartered in 5350 W Amelia Earhart Drive, Salt Lake City, UT 84116, USA.
168 Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nationwide-Legal-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27188</link>
<guid>82cc164ceb375988c7ccc91b0b98c08c</guid>
<pubDate>Tue, 18 Nov 2025 15:20:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Nationwide-Legal-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>952620b84c06eefbf809aeacfa5afed772776c6db575627b7e3ee48f8abaa2e9</i><br /><br />Threat actor <b>description</b>: <i>Nationwide Legal LLC is a leading litigation support and legal services company based in Los Angeles, California, serving clients across the United States. The company provides a wide range of professional services, including process serving, e-filing, court reporting, document duplication, investigations, and subpoena preparation. With the motto “where technology meets experience,” Nationwide Legal focuses on combining advanced digital solutions with decades of industry expertise to ensure accuracy, speed, and reliability in every task. The company supports law firms, corporations, and government agencies by streamlining legal processes and improving overall efficiency in complex litigation workflows.
company is headquartered in The headquarters address of Nationwide Legal LLC is 1609 James M Wood Blvd, Los Angeles, CA 90015, United States.
501-1,000 Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>QuaLex-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27181</link>
<guid>71dc407af5ad9f5e2a8513886d398f8b</guid>
<pubDate>Tue, 18 Nov 2025 13:23:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>QuaLex-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d9477a7f0dc64c1826a068050782628af7bcdb477d3a988adca44ce7ef64153</i><br /><br />Threat actor <b>description</b>: <i>Industrial Machinery & Equipment</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Smoll--Banning-CPAs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27180</link>
<guid>50f09698c0bb749bdebded62c26516ac</guid>
<pubDate>Tue, 18 Nov 2025 02:48:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Smoll--Banning-CPAs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>93765cdc23c0d275df9b0afba9a792297e579a1cac7bc0bf6a2e78736f8e25e5</i><br /><br />Threat actor <b>description</b>: <i>Smoll & Banning, CPAs Smoll & Banning, CPA's, LLC is an independent accounting firm located in Dodge City, Kansas.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kdr-Real-Estate-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27174</link>
<guid>c19fa3728a347ac2a373dbb5c44ba1c2</guid>
<pubDate>Mon, 17 Nov 2025 21:24:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Kdr-Real-Estate-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e52fcceb00056319f343c4d95ffb1523062d34d2f8234d357ddc00ded3cefff2</i><br /><br />Threat actor <b>description</b>: <i>Real Estate</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Air-Design-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27176</link>
<guid>312e53ccba0b2ddfefd4a1f05b55bcdd</guid>
<pubDate>Mon, 17 Nov 2025 20:25:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Air-Design-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe4e15f12acaacad32ea4bf4815d7655777b63c4c581f3ac2fde3e50a4452d3d</i><br /><br />Threat actor <b>description</b>: <i>Air Design Systems, Inc. is a woman-owned business based in the Chicago area, specializing in complete ventilation solutions since 1977. They offer services such as Building Information Modeling, fabrication, and design assistance, catering to markets including healthcare, education, and commercial projects. The company is recognized for its commitment to innovation, quality, and safety, having received multiple awards for its exemplary safety programs and subcontractor excellence. With a focus on advanced technology and 3D coordination, Air Design Systems aims to provide high-quality infrastructure for successful project outcomes.</i><br />Target victim <b>website</b>: <i>www.airdesignsystems.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lincoln-IT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27177</link>
<guid>2e34e565526802985f40f7c11146406d</guid>
<pubDate>Mon, 17 Nov 2025 20:25:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Lincoln-IT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8692fc69b3e9cecc1dbc16ed06e531c39fe44ffb4a981fcfa31afe6fa160e7cc</i><br /><br />Threat actor <b>description</b>: <i>Gregory N. Mirsky is an AWS certified solutions architect and security specialist with extensive experience in optimizing cloud infrastructure and applications. He specializes in cloud migration, cybersecurity compliance, and implementing modern application architectures, such as serverless and containerized solutions. His targeted clients include companies seeking to enhance their IT security and operational efficiency, as well as those in need of infrastructure modernization. With a strong background in collaboration between technology teams, Mirsky offers holistic and strategic approaches to systems design.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>H-G-Reynolds</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27178</link>
<guid>de9d696001c1d17877d1dde0d35ffa41</guid>
<pubDate>Mon, 17 Nov 2025 20:25:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>H-G-Reynolds</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1c7a999549cde788ac467d1d78a6e3ec4affbff837a4765cd3793f2544b9d93</i><br /><br />Threat actor <b>description</b>: <i>H.G. Reynolds is a full-service construction management company specializing in the development of K-12 school facilities in the southeastern United States. With over 70 years of experience, the firm emphasizes maintaining long-term relationships with clients and positively impacting local communities through state-of-the-art educational spaces. Their range of services includes management planning, preconstruction services, quality control, and safety. H.G. Reynolds aims to enhance educational infrastructure while contributing to local economic growth.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Charles-Rutenberg-Realty</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27163</link>
<guid>5236d2d466e7a1d9785a33e298a58c3c</guid>
<pubDate>Mon, 17 Nov 2025 18:24:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Charles-Rutenberg-Realty</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38a130c853a696e9b1480b410e1b0e5917fb1d4010748504014a7832b4b9ff95</i><br /><br />Threat actor <b>description</b>: <i>Charles Rutenberg Realty, Inc., servicing Pinellas, Pasco, Hillsborough, & Hernando County real estate.We will upload 91gb of corporate documents soon. Their downloads folder contains so many personal docs (more than 1,5gb of just scanned docs), (passports, driver licenses, SSNs, phones, addresses, email addresses, credit card details, employee headshots), financials, contracts and agreements, NDA, clients' information, projects, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Poes-Accounting-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27172</link>
<guid>5387241957e449ab627283e8fb027d76</guid>
<pubDate>Mon, 17 Nov 2025 17:37:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Poes-Accounting-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1928d2a3fc26552f2a30ecd208df5d37deba434090cfcb714aab9333b666670</i><br /><br />Threat actor <b>description</b>: <i>Accounting services and tax return preparation</i><br />Target victim <b>website</b>: <i>poecpas.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Quinn-Jay-Patent</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27173</link>
<guid>f7f62619bfc41df6707311b79ab5e3e6</guid>
<pubDate>Mon, 17 Nov 2025 17:37:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Quinn-Jay-Patent</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d0c59ccad63e455b7996d7e4dd2715311287d52b7d644b51bd87225d30877379</i><br /><br />Threat actor <b>description</b>: <i>Drawing services for the intellectual property community</i><br />Target victim <b>website</b>: <i>quinnjaypatent.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Law-Office-of-Ronald-W.-Hillberg</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27171</link>
<guid>e3fe004c8a465494fcb14db3bb9f0ee1</guid>
<pubDate>Mon, 17 Nov 2025 17:36:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Law-Office-of-Ronald-W.-Hillberg</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a4fa1640d225e61604c3bc46186d3770396b93a008503208cf9e2f8aa350574</i><br /><br />Threat actor <b>description</b>: <i>Estate planning and wills</i><br />Target victim <b>website</b>: <i>hillberglaw.biz</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eagle-Oil--Gas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27161</link>
<guid>0524bbc7d57d3edbd146cb19bbd4d1f2</guid>
<pubDate>Mon, 17 Nov 2025 16:24:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Eagle-Oil--Gas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce169a72e728ff9a18a5cdd10c7cdfc01b6aa66b042590619d0a8cee7187fc08</i><br /><br />Threat actor <b>description</b>: <i>Eagle Oil & Gas operates and manages its own properties and the assets of other companies, focusing on drilling new wells and optimizing legacy assets.We will upload 70gb of corporate documents soon. Employee personal documents (scanned passports, driver licenses, SSNs, phones, addresses, email addresses, credit card payment details and so on),confidential contracts and agreements, NDA, and other client's files, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>ARH-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27162</link>
<guid>818a7cd413218993d9f871449f4e3321</guid>
<pubDate>Mon, 17 Nov 2025 16:24:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>ARH-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c56cada0d0c2f46a5acd07d5dfc5d184b3624a0be1689c23cf3ef6e69986bcaf</i><br /><br />Threat actor <b>description</b>: <i>ARH is an award-winning design engineering firm specializing in surveying, professional planning, environmental sciences, and GIS technologies.We will upload more than 12gb of corporate documents soon. Employee personal documents (scanned passports, driver licenses, SSNs, phones, addresses, email addresses, credit card details and so on), financials, contracts and agreements, NDA, client personal information, projects, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>UNDER-ARMOUR</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27169</link>
<guid>157d9f8e3592c76c244fa8f0327a04c0</guid>
<pubDate>Mon, 17 Nov 2025 16:13:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>UNDER-ARMOUR</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c9c74f69649ffa449435dfff954ca18336d5d0627c920608b5b41cd9e378e8cb</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Under Armour, Inc. is an American multinational corporation founded in 1996 by Kevin Plank. The company specializes in manufacturing and selling branded performance apparel, footwear, and accessories. Its products are engineered with innovative technologies to mitigate the impact of environmental conditions on physical activities. Headquartered in Baltimore, Maryland, it caters extensively to the sports industry globally.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>BOLD-Furniture</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27154</link>
<guid>7b3b85acc94d2df9ba27b7188e30d667</guid>
<pubDate>Mon, 17 Nov 2025 12:24:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>BOLD-Furniture</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5649e1f1bdf723ad873a6893939f7d5033c49e7ec62747a37189427aca6a4a84</i><br /><br />Threat actor <b>description</b>: <i>BOLD Furniture manufactures distinctive, highly functional and adaptable standard and custom furniture and fixtures for all kinds of work environments.We are going to upload company data soon. You will find financialdata (audit, invoices), project details, personal financial details of employees, accounting files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>MOBI-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27155</link>
<guid>08bf786cb3b22d313ee37f93586a24f4</guid>
<pubDate>Mon, 17 Nov 2025 12:24:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>MOBI-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fdb8cee32be4a83f43a348303fb679d9f313406c943a479610c90d642cd4e84e</i><br /><br />Threat actor <b>description</b>: <i>MOBI Technologies Inc. is a consumer health and home electronics brand committed to elevating the consumer experience around digital living and wellness monitoring for all ages. We are going to upload company data soon. You will find financialdata (audit, payment details, invoices), personal financial details of employees, accounting files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>United-Enterprise-Fund</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27151</link>
<guid>fc83b39f9ff554b393188dbc36e3f835</guid>
<pubDate>Sun, 16 Nov 2025 16:13:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>United-Enterprise-Fund</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f27030a6b17f32d5f4967e244a299383e509b5b5726b0e72a1733080f84e87ae</i><br /><br />Threat actor <b>description</b>: <i>https://www.zoominfo.com/c/united-enterprise-fund-lp/104726614 www.unitedenterprisefund.com United Enterprise Fund is a New Yorkbased financial services firm that delivers personalized investment management and advisory solutions. The company specializes in helping clients pursue long-term financial objectives through strategic investment planning and risk management. Operating from the heart of the financial district, United Enterprise Fund combines tailored planning with market insight to support sustainable financial outcomes.</i><br />Target victim <b>website</b>: <i>www.zoominfo.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Horst-Realty</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27146</link>
<guid>4064e4d885e4be966c600e071394c636</guid>
<pubDate>Sat, 15 Nov 2025 15:51:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>brotherhood</b> claims attack for <b>Horst-Realty</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f8f4c2797aafe72cada7373d68b0501f87ce3a8f1ad55380e6355a416b7e0c7e</i><br /><br />Threat actor <b>description</b>: <i>Contains: 27 Gb compressed Files, Emails</i><br />Target victim <b>website</b>: <i>www.horstrealty.com</i>]]></description>
<category>brotherhood</category>
</item>
<item xmlns:dc='ns:1'>
<title>Spoleta-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27145</link>
<guid>b5628fed964d280aab18f11d1afcd3fe</guid>
<pubDate>Sat, 15 Nov 2025 15:51:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>brotherhood</b> claims attack for <b>Spoleta-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0360092167c9917c44555c99f2be7c7d5a60625c78476129e2e3a6339a2bb3c3</i><br /><br />Threat actor <b>description</b>: <i>Contains: 4 Gb compressed Free Files + 33 Gb compressed Paid Files, Database</i><br />Target victim <b>website</b>: <i>spoleta.com</i>]]></description>
<category>brotherhood</category>
</item>
<item xmlns:dc='ns:1'>
<title>Force-Brokerage</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27133</link>
<guid>a7c2fa485508eb3890858493a5c7ed8b</guid>
<pubDate>Sat, 15 Nov 2025 12:02:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Force-Brokerage</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>28121e4a129507e83f3469d81d3c9e7bc98e8fc9d852f37ba75b0b0e5d357157</i><br /><br />Threat actor <b>description</b>: <i>Price ??? Disclosures 0/1</i><br />Target victim <b>website</b>: <i>forcebrokerage.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sol-Trading</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27129</link>
<guid>a7282c84a4c2109c3697b6aca8b86aba</guid>
<pubDate>Fri, 14 Nov 2025 23:24:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Sol-Trading</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>481f686d4238a4a0130376afa0583419256ac3f45c14457d835af35b4e3eb4a9</i><br /><br />Threat actor <b>description</b>: <i>Grocery Retail</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>killinglyschools.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27131</link>
<guid>6a7c8b3c6b0ecb1b72233e98c09793f4</guid>
<pubDate>Fri, 14 Nov 2025 22:18:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>killinglyschools.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2e218709dc47cae971d25e949dbba08ac867a1b2d56a5170fb67e3c206f2e398</i><br /><br />Threat actor <b>description</b>: <i>Killingly Public Schools is a K-12 public school district based in Danielson, Connecticut, serving students in the town of Killingly. …</i><br />Target victim <b>website</b>: <i>killinglyschools.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>eakas.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27130</link>
<guid>64998e5967db4db4bf25df2128c87c10</guid>
<pubDate>Fri, 14 Nov 2025 21:46:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>eakas.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a469edaab6b86b4ed72ba09a18b141895d7fbf5506dc106cc412e38fd98aae05</i><br /><br />Threat actor <b>description</b>: <i>Eakas Corp. specializes in producing both functional and decorative products for the automotive industry, serving as a Tier 1 supplier to manufacturers in the United States. They offer comprehensive services including engineering, injection molding, painting, chrome plating, assembly, and quality testing to ensure consistent product quality. Their product range includes various automotive components such as door handles, bumper fascias, and mirror assemblies. Eakas is committed to customer satisfaction by delivering quality services on time and at competitive prices. Employees: 416 Revenue: $81.3 Million Industry: Manufacturing  Phone Number: (815) 223-8811 phone site x236 (cell:870-208-5643) 248-536-2211 815-488-1879 x208 / 815-713-0753 (815) 223-8811 248-536-2211 248-536-2211 x224 (cell:815-830-6497) x218 (cell:815-875-7241) 248-536-2211 815-719-2814 815-713-0753 homePhone: 815-497-2023 5135921045 </i><br />Target victim <b>website</b>: <i>eakas.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jefferson-Enterprises-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27116</link>
<guid>41b7a4257befb2e8999eb01cb3b376b0</guid>
<pubDate>Fri, 14 Nov 2025 18:24:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Jefferson-Enterprises-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c07b8dc33c77035e6df8e28d7189c96469642d74f230444ce616825c46b80bac</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Platinum-Healthcare-Staffing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27117</link>
<guid>9aea3c940f8665926c97b3d3c64ace44</guid>
<pubDate>Fri, 14 Nov 2025 18:24:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Platinum-Healthcare-Staffing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>55a9760ae3aba8acc34914ab0966e8e4005e67a1e0563cb0ad4c16e611c44c9a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Herman--Chamow</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27119</link>
<guid>ececd3cff01bb6137f0578be5337a5f2</guid>
<pubDate>Fri, 14 Nov 2025 18:24:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Herman--Chamow</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d77c3f671bee8a3268369f859f52a3b23d5149c5db8df832c0ca098695b80fa4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aero-Precision</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27120</link>
<guid>0121fc02bb750488e774fff937545734</guid>
<pubDate>Fri, 14 Nov 2025 18:24:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Aero-Precision</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b448c7266c7672f210ddff8b7735f6b26da3c848a09f02e59e9954b192aa8d0</i><br /><br />Threat actor <b>description</b>: <i>Aero Precision is a firearm and components manufacturer.We will upload 24gb corporate documents soon. Employee information, project details, contracts and agreements, NDAs, specifications, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Valley-Banks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27121</link>
<guid>79ab793439aeaf01b4e2c8d4ceab0b70</guid>
<pubDate>Fri, 14 Nov 2025 18:24:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Valley-Banks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6d3861892962ef78e651bf823a1bfe84852dc85568c0ed95b14e281e3880b70</i><br /><br />Threat actor <b>description</b>: <i>Valley Bank is a state chartered community bank, with branches inRonan, Arlee, Hot Springs, Thompson Falls, Pablo, Polson and Saint Ignatius.We will upload 294gb corporate documents soon. Employee information (scanned passports, driver licenses, hr docs with DOB, phones,addresses, credit card details and so on), contracts and agreements, NDAs, and other client's files, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trigg-Laboratories</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27122</link>
<guid>a4111706bdc4b0445173f69f8418889b</guid>
<pubDate>Fri, 14 Nov 2025 17:25:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Trigg-Laboratories</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0089f037efa3fd92aeb01de395df138a3deb307cfd0b4d4fd5c6354b4a4dc20b</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Valley-Plains-Equipment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27128</link>
<guid>c34ae2b80c30c0a74b1c8e980e4dbe5d</guid>
<pubDate>Fri, 14 Nov 2025 16:17:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Valley-Plains-Equipment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0fb40fe2b37674b4dad111a5b38617f65cf90c711a2e3b28ab64e93af26a9cb9</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.valleyplainsequipment.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sellers-Publishing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27127</link>
<guid>99687949804f7bd0a24a825122001657</guid>
<pubDate>Fri, 14 Nov 2025 16:16:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Sellers-Publishing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>606f18653469a5b1a72e3662a85dc83db932cab91d1229786d7a05dcddca32a7</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.rsvp.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>BK-Precision</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27126</link>
<guid>20ef1c5bb97b3a464dc4d8bb4da18bac</guid>
<pubDate>Fri, 14 Nov 2025 16:16:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>BK-Precision</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a845ed9f054221d73ccd7095d9fde3395015f2066e8e56afd8b73c90ce9119a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.bkprecision.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Barbizon-Lighting-Company-Roseburrough-Tool-Mqd-McKay-Empire-Victor-Insulators.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27123</link>
<guid>77a81025ac3a31baaa0bd6dd3b5773d9</guid>
<pubDate>Fri, 14 Nov 2025 15:39:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Barbizon-Lighting-Company-Roseburrough-Tool-Mqd-McKay-Empire-Victor-Insulators.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dcb2ff4180805eceaf1a9ab9c4bfb1212e451978ce297bf76565bb90e9a2e48a</i><br /><br />Threat actor <b>description</b>: <i>We obtained about 15gb of the following companies:
The Barbizon Lighting Company specializes in sales, integration a
nd services of lighting and rigging equipment for houses of worsh
ip, live productions, performing arts, themed environments, film,
and television. 
Roseburrough Tool Company, Inc. is a manufacturer and provider of
high-quality tools and construction supplies.
MQD conducts independent, private, and accredited product testing
s and perform veterinary diagnostics and provide consulting servi
ces on hygiene,
technology, and other quality-related issues.
Ralph McKay Industries, Inc. specializes in manufacturing high-qu
ality agricultural parts including discs, coulters, openers, swee
ps, chisels, specialty items, and crop lifters.
Victor Insulators is a leading manufacturer and seller of insulat
ors, specializing in products made from standard strength silica 
porcelain and alumina.

You will find personal employee, client, partner information, pro
ject files, accounting and financials and other internal operatio
nal files.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>A-B-Communications</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27124</link>
<guid>90667252a0a036041ddc3553799772ef</guid>
<pubDate>Fri, 14 Nov 2025 14:41:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>A-B-Communications</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5ee662aba269c1aad48167afc9df2d02788d2fe4eb98bf49d1f358c99617977a</i><br /><br />Threat actor <b>description</b>: <i>A-B Communications has been serving businesses since 1960, offeri
ng a range of services including professional answering, call cen
ter solutions, voicemail/IVR services, and secure messaging. 

We will upload almost corporate documents soon. Detailed personal
employee information (about 100 persons or more), lots of scanne
d passports, DLs, SSNs, birth/death certs and so on. Contracts an
d agreements, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Waukegan-Steel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27111</link>
<guid>bac6ab6f28645db5cbbbbf00ed123f36</guid>
<pubDate>Fri, 14 Nov 2025 12:25:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Waukegan-Steel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a7ec782c2a30d7efce4073e2c0f728d11003dbd91f641e5af6b6252d3487c8c</i><br /><br />Threat actor <b>description</b>: <i>Waukegan Steel is a structural steel fabricator serving the Midwest, specializing in high-quality steel fabrication since 1929. The company has worked on notable projects in the Chicago area, such as Soldier Field and Willis Tower, offering a complete range ofservices including structural, miscellaneous, and ornamental steel fabrication.We will upload almost 15gb of corporate documents soon. Scanned personal documents (passports, social security numbers, driver licenses, w-9 forms and so on), project information, NDAs, contractsand agreements, financials, client's information, lots of drawings of ongoing projects, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Basin-Harbor</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27112</link>
<guid>8eef9b6c2c8397ee32bf3da4c752bc3c</guid>
<pubDate>Fri, 14 Nov 2025 12:25:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Basin-Harbor</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52db54c2dea92d7c205253e20a1bc81e44566ca5fa2e6f4f34f61f51f0f1cb9d</i><br /><br />Threat actor <b>description</b>: <i>Basin Harbor is a unique Vermont resort situated on the shores ofLake Champlain, offering a blend of timeless traditions and lakeside charm. The resort spans 700 acres and features historic cottages, making it an ideal destination for outdoor adventures, waterfront relaxation, and family gatherings. We are going to upload company data soon. There are lots of essential corporate documents such as: financial data (audit, payment details, invoices), detailed employees and customers information (passports, driver's license , Social Security Numbers, emails, phones) confidential information and other documents with detailedpersonal information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Barnhart</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27113</link>
<guid>218a6beba67ce30416235c45f0357c20</guid>
<pubDate>Fri, 14 Nov 2025 12:25:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Barnhart</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3791622f78055600716a211ef4f400e6de664338313768a1d1cbf2abeb259ab</i><br /><br />Threat actor <b>description</b>: <i>Barnhart is a third-party global logistics provider dedicated to delivering customized transportation solutions with a focus on safety and service. We are going to upload company data soon. There are lots of essential corporate documents such as: financial data (audit, payment details, invoices), detailed employees and customers information (Passports, driver's license ,Social Security Numbers, medical information, emails, phones) confidential information, NDAs and other documents with detailed personal information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Foot-Doctors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27114</link>
<guid>8783118abe1d12ceacf48e74fe8f9550</guid>
<pubDate>Fri, 14 Nov 2025 07:20:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>The-Foot-Doctors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6c50a59e8553224217517ad13a877e133f8962de2206fe05a5f77d4078be090</i><br /><br />Threat actor <b>description</b>: <i>The Foot Doctor's patients are people just like you - people who need pain relief and expert, effective foot care. When you choose our Casper, Wyoming podiatrists, you're choosing knowledgeable Podiatric surgeons who will take your pain seriously.Dr. Michael P. Wilkinson is board-certified with the American Board of Foot and Ankle Surgery and a fellow of the American Academy of Podiatric Sports Medicine. Dr. Wilkinson received his podiatric education from The California College of Podiatric Medicine in San Francisco, CA in 1995.Dr. Wilkinson competed at the highest level of collegiate athletics earning a scholarship to play defensive line on the Stanford football team. He is an avid football alum reuniting with teammates often to root on the Cardinal.While he founded The Foot Doctor, P.C. in 1997 in Casper, he performs some foot surgery. However, he loves the challenge and rewards of solving a multitude of foot conditions with creative custom orthotics for runners and other athletes and preventing diabetic amputations through educating patients, diabetic foot care, and therapeutic shoes and insoles. Dr. Wilkinson and his wife Alexandra enjoy spending time with their three children and one grandson and keeping active with golf and skiing.We look forward to working with you and your family!Personal information of employees and clientsOther documents https://wyofootdoctor.com/</i><br />Target victim <b>website</b>: <i>wyofootdoctor.com</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>wafergrind.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27101</link>
<guid>6484bc7860f609cf2e18ab5eebe01ba0</guid>
<pubDate>Thu, 13 Nov 2025 23:47:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>wafergrind.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f46711cc7c61976fdb4833e8da2a3bacba3a08c52b784feed0f45c271203dee2</i><br /><br />Threat actor <b>description</b>: <i>Grinding & Dicing Services Inc (GDSI) provides wafer thinning and dicing services to the IC industry for critical post-fabrication process requirements. GDSI is headquartered in San Jose, California. Employees: 50 Revenue: $5 Million Industry: Manufacturing-Electronics  Phone Number: (408) 451-2000 </i><br />Target victim <b>website</b>: <i>wafergrind.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>duboiswood.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27107</link>
<guid>cc56f342b0dc3f74024688bf135beab4</guid>
<pubDate>Thu, 13 Nov 2025 23:47:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>duboiswood.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>44ecfd44461338aab562377ddbcfee98c92d8913baa11ce9865e69983c947f8a</i><br /><br />Threat actor <b>description</b>: <i>Dubois Wood, located in southern Indiana, has been a domestic producer of high-quality, American-made furniture since 1979. The company caters to several markets by offering superior products at competitive prices, distinguishing itself in the furniture-making industry. Employees: 200 Revenue: $21.6 Million Industry: Retail-Furniture  Phone Number: (812) 683-3613</i><br />Target victim <b>website</b>: <i>duboiswood.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>GLOBALLOGIC.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27090</link>
<guid>fd6c128733fc1d31f48a431ee6dfe1bc</guid>
<pubDate>Thu, 13 Nov 2025 22:49:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GLOBALLOGIC.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe90bcb4fd5f95c4cf87c8825c10668b37581afa55ee6063ff73faa5cc744eeb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>rosemontexpo.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27105</link>
<guid>1745680a5a547dc1fb4b69f85054c299</guid>
<pubDate>Thu, 13 Nov 2025 22:48:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>rosemontexpo.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cbcf1e537d6b1978fa19b08d6bda3a866ab07c6830c3cf9c25b2f8b758d28a94</i><br /><br />Threat actor <b>description</b>: <i>Rosemont Exposition Services, Inc. is an Illinois-based company that offers exhibitor show services. These include exhibit rentals, utilities, decorating services, catering, and area information. Formerly known as O'Hare Exposition Services, they primarily function as the full-service general contractor for all trade shows and events held at the Donald E. Stephens Convention Center located in Rosemont, IL. Employees: 500 Revenue: $48.6 Million Industry: Business Services Phone Number: (847) 696-2208 </i><br />Target victim <b>website</b>: <i>rosemontexpo.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Metropolitan-Adjustment-Bureau</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27108</link>
<guid>318d38a7aa1b5fca9ff53fdefef3ee88</guid>
<pubDate>Thu, 13 Nov 2025 22:43:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>Metropolitan-Adjustment-Bureau</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f2b76445fd6492957518ef28c6cd6a2f025314d4ac467d1e5162f18d20c6b49b</i><br /><br />Threat actor <b>description</b>: <i>Metropolitan Adjustment Bureau is a public insurance adjusting firm with over 50 years of experience assisting homeowners and businesses with insurance claims related to fire, water, earthquake, and disaster damage.</i><br />Target victim <b>website</b>: <i>www.metroadjusters.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>-AFLGLOBAL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27091</link>
<guid>45e7f7967d7fb661fabbb61db524a286</guid>
<pubDate>Thu, 13 Nov 2025 21:58:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>-AFLGLOBAL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1cb0492d391759319e2aa8ad33d088f814be4e3b710ff4106f0bd557e462b4a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>INTEGRALIFE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27092</link>
<guid>426281d73409354c214025722c6160a8</guid>
<pubDate>Thu, 13 Nov 2025 21:57:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>INTEGRALIFE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c93565ffd5c09a198ff27e3dba252adf02cc4cfeede6b08963479107f088cab</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MARITZ.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27093</link>
<guid>56e3fb541605e047f551bffc5a3dc209</guid>
<pubDate>Thu, 13 Nov 2025 21:57:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MARITZ.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>214dd6aaa9dd6f7673a1638cebd1b608db2a2a9139c6ad3f06ec34f3dd3bf211</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HELIXESG.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27094</link>
<guid>da960bb5bdcdc36aa9f836df530a9e3c</guid>
<pubDate>Thu, 13 Nov 2025 21:56:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HELIXESG.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7976c214b49be510b814ce486dfc8cd0edc6fb82b7aadae90c126b6e0456728</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TPICOMPOSITES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27095</link>
<guid>021de1d3005e39b3eab3f7591231696b</guid>
<pubDate>Thu, 13 Nov 2025 21:56:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TPICOMPOSITES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>09f0196de0115f67facaa5e7bf2586cd00354f79c4775c2bcca965f7c7ad7c29</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>FLUKE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27096</link>
<guid>0722ba570f1e381a4cf86360ad7d2000</guid>
<pubDate>Thu, 13 Nov 2025 21:56:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>FLUKE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bae02aadc36a653faccf6378c652a4cfe7d5652be2643d30fa52f9192fd42bf3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PENS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27099</link>
<guid>da5e8bfed9bdb84595be92afeb3fd378</guid>
<pubDate>Thu, 13 Nov 2025 21:54:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PENS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec9ca4bae5ff83ee896acef523bca20a3d297e4cfb77a2244f8a926887d726d0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ENTRUST.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27100</link>
<guid>d73bdb1ac56ee271cda563e7949255b2</guid>
<pubDate>Thu, 13 Nov 2025 21:53:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ENTRUST.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8c375db3bfb11f8312b02f26a481fc55d7a42a17d87906e386cb751d20f2598c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>FullBeauty-Brands</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27089</link>
<guid>c5d84b491de9533ab5043b62c3d41057</guid>
<pubDate>Thu, 13 Nov 2025 17:20:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>FullBeauty-Brands</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c9626f6e6d7d387ce89b9bc8559dfe466b7ebbe3abfd761478127778bed7d09c</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] FullBeauty Brands is a US-based plus-size women's and men's apparel and home goods company. The company operates multiple brands such as Woman Within, Roaman's, Jessica London, Ellos, Swimsuits For All, KingSize, and BrylaneHome. It is committed to providing stylish, high-quality products in sizes that are traditionally hard to find.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lung-Rose-Voss-Wagnild</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27087</link>
<guid>2716856dce285289a8cf7463eee2eb45</guid>
<pubDate>Thu, 13 Nov 2025 17:15:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Lung-Rose-Voss-Wagnild</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b28ee6e9aff19998625432204b28c6c038c8489ea5135da8678e4d7b0a3e727</i><br /><br />Threat actor <b>description</b>: <i>Hawaii’s leading law firm data breach.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Smith-Gardner</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27078</link>
<guid>dcc1041b85c1bcd477a8f90cad93775e</guid>
<pubDate>Thu, 13 Nov 2025 16:10:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Smith-Gardner</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8cac0730c7e46f123d01d863037d5666a60e7593043d16c195c6e7562c9ccd67</i><br /><br />Threat actor <b>description</b>: <i>Smith Gardner is an industry-leading solid waste consulting engin
eering firm committed to delivering sound, innovative solid waste
solutions.

We will upload almost 101gb of corporate documents soon. Employee
personal documents (passports, w-9 forms and so on), confidentia
l projects, NDAs, contracts and agreements, financials, client's 
information, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>PACCAR</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27082</link>
<guid>f719801846ff4eb77a7e393cbf607d00</guid>
<pubDate>Thu, 13 Nov 2025 14:20:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>PACCAR</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ccad9c7c179fc45caad368163807da232fa7bfa100248cd626c1e99a7530166a</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1905, PACCAR is a global technology company in the design, manufacture and customer support of high-quality light, medium and heavy-duty...</i><br />Target victim <b>website</b>: <i>paccar.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Avery-Dennison</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27081</link>
<guid>0bec370d93e454d9a0cd7dee3e0ef456</guid>
<pubDate>Thu, 13 Nov 2025 14:19:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Avery-Dennison</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>88e49cfd0310545f1dadeb29670710f73224076663314df4cf47d832915140d4</i><br /><br />Threat actor <b>description</b>: <i>Avery Dennison Corporation produces and sells pressure-sensitive materials worldwide. The companys Label and Graphic Materials segment offers press...</i><br />Target victim <b>website</b>: <i>averydennison.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>SGK-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27079</link>
<guid>13941bddb1399810f387f38dc7c775f0</guid>
<pubDate>Thu, 13 Nov 2025 14:18:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>SGK-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b7e4ed05b7b497fe77d3aa8fc4e2697be0af7b0a4adaf6c761d023c9be5c5daa</i><br /><br />Threat actor <b>description</b>: <i>Based in Des Plaines, Illinois, SKG is a marketing company that specializes in global brand development, activation, and deployment. The company is...</i><br />Target victim <b>website</b>: <i>sgkinc.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vikor-Scientific-LLC--Korgene</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27072</link>
<guid>0e6930d35e9a52977d5bd93c414ce3b2</guid>
<pubDate>Thu, 13 Nov 2025 11:18:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Vikor-Scientific-LLC--Korgene</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9d12274b1a728d7b6136aae0fd6b4e674765820beac7ee375faafae6993f358</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Vikor Scientific, LLC / Korgene is a specialized molecular diagnostics company dedicated to advancing the healthcare sector through innovation. They offer comprehensive, customized diagnostic tests to clinicians for better patient outcomes. Vikor aims to combat the rise of antibiotic resistance by providing targeted treatments. Korgene, on the other hand, develops efficient diagnostic platforms to detect diseases like cancer.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>KorPath</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27073</link>
<guid>841b9457fd9014ede0e8ba949e5be76d</guid>
<pubDate>Thu, 13 Nov 2025 11:18:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>KorPath</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9deda1acb9e9b6ebd0f145d37051267ec6b39fa26b961f0b027afb95bb277a59</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] KorPath is a biotechnology company that specializes in early-stage technologies. Their main focus is on identifying unique compounds and molecules that can be used in various medical interventions. The company conducts extensive research on pathological conditions including cancer and neurodegenerative disorders. They also offer preclinical services such as ex vivo efficacy studies.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cornerstone-Staffing-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27071</link>
<guid>6151ca1f26822034f6b12f142bdfc9db</guid>
<pubDate>Thu, 13 Nov 2025 10:45:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Cornerstone-Staffing-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>54116a069b65bd2f0fb322ca03bdfd1f09396d3dc69daba9d8f21dd2c85d155f</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.cornerstone-staffing.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.pointcag.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27070</link>
<guid>521255db815eb7f2e44d31ce130352c9</guid>
<pubDate>Thu, 13 Nov 2025 09:22:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kraken</b> claims attack for <b>www.pointcag.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8347ceda9fa4c9c293524292dfa73f04c1d5167f5258a99ba6b650b09c659c27</i><br /><br />Threat actor <b>description</b>: <i>POINT provides expert Construction Management Consulting and Litigation Services with objectivity and reliability. 

http://o5...</i><br />Target victim <b>website</b>: <i>www.pointcag.com</i>]]></description>
<category>kraken</category>
</item>
<item xmlns:dc='ns:1'>
<title>MultistateTax-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27067</link>
<guid>b53b3c9fb0fe5c6cbdbb5fedace0745b</guid>
<pubDate>Thu, 13 Nov 2025 01:45:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackshrantac</b> claims attack for <b>MultistateTax-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5fe4b8b514776fbcd91798ffded4c830e117b86b1953a2a1778b09da7fbd22b1</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackshrantac</category>
</item>
<item xmlns:dc='ns:1'>
<title>iconinternational.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27062</link>
<guid>861fc05a34bf88b3c689a89ef8f34384</guid>
<pubDate>Wed, 12 Nov 2025 19:42:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>iconinternational.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ea3474d5098617149d38599d017ec8082ddb080b20244cd0dc7a3fb8610ecd6</i><br /><br />Threat actor <b>description</b>: <i>ICON International, Inc. is a corporate barter firm that offers innovative solutions and strategic thinking to help brands grow and create economic value.</i><br />Target victim <b>website</b>: <i>www.iconinternational.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>doversd.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27061</link>
<guid>3dc91c9313038ce8c97966f7f4194aac</guid>
<pubDate>Wed, 12 Nov 2025 19:25:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>doversd.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>856af66d78cf5760d4b1e44671b3f857492f6a196847d367ddc4dc6889c58533</i><br /><br />Threat actor <b>description</b>: <i>Dover City Schools is a public K-12 school district located in Dover, Ohio, serving approximately 2,650 students across multiple schools. …</i><br />Target victim <b>website</b>: <i>doversd.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>KohaFoods-Hawaii</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27057</link>
<guid>228b495ddf77bcfc7f5a57c1648599f9</guid>
<pubDate>Wed, 12 Nov 2025 13:19:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>KohaFoods-Hawaii</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e4efb4829912db5445b0833456bd0af88e85819f3935218ebe568a8d632724a</i><br /><br />Threat actor <b>description</b>: <i>Koha Foods is a Honolulu-based distributor and wholesaler specializing in Asian food products. The company boasts a diverse selection of over 2,500 items including seafood, condiments, and Korean dishes, catering primarily to local Oahu businesses such as restaurants and supermarkets. Having served Hawaii since 1970, Koha Foods emphasizes quality and connection with the community through its offerings. In addition to distribution, they manufacture their own signature Korean food items using authentic recipes and high-quality ingredients.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>bridge-housing-corp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27053</link>
<guid>288a8d4e8014cf089c28ac2eba7c7d0b</guid>
<pubDate>Wed, 12 Nov 2025 12:49:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>bridge-housing-corp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>71028cf132ead1362299d9a4ce6f29510ae3c0e66db7390996ba13379a5e6e41</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1983 BRIDGE Housing is a non-profit that works towards securing affordable housing. The organization is headquartered in San Francisco, California.  We have over 150 GB of confidential information, and the management of this organization has completely ignored us. Remember, the publication of your data is entirely their fault.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>forensicmed.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27055</link>
<guid>647eb89e04e05801979246bd0d2ec15b</guid>
<pubDate>Wed, 12 Nov 2025 11:48:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>forensicmed.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>942567d933f62e70f7959269c8a9538a89f172ce5b9d62bc4937d098219c0de6</i><br /><br />Threat actor <b>description</b>: <i>Forensic Medical is a comprehensive forensic pathology company headquartered in Nashville, Tennessee, which provides medical examiner, death investigation, medical autopsy services, expert forensic testimony and forensic management services to government agencies and private individuals.</i><br />Target victim <b>website</b>: <i>forensicmed.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Treetop-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27049</link>
<guid>8e7035e068f7046d16a509453862e0da</guid>
<pubDate>Wed, 12 Nov 2025 10:24:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Treetop-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f4565b7bc0ef53d11508b6034301e94afdd34d2f3d5c0d981957fafe50d825bb</i><br /><br />Threat actor <b>description</b>: <i>Treetop Companies is a real estate investment firm founded in 2005 by Azi Mandel and Adam Mermelstein.We will upload almost 100gb of corporate documents soon. Lots of confidential files, clients personal documents (passports, drivers licenses, financials), other internal client information, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Irwin-Car</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27039</link>
<guid>faaae1866a54fdb13aa89b7da8101bdc</guid>
<pubDate>Tue, 11 Nov 2025 21:23:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Irwin-Car</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f9694a08b6eb70ad765034dfb1958da6d3e557fab0677c8ca95aa83f024ffe1</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Irwin Car and Equipment is a manufacturing company specialized in the production of heavy-duty material handling equipment. They create custom mining cars, conveyor cars, tunneling cars and more. It aids various industries, including mining and tunneling, in improving their efficiency and safety. The company is based in the USA and is recognized for its innovative and durable equipment.</i><br />Target victim <b>website</b>: <i>irwincar.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brenda-Richardson-Memorial-Care-Home-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27046</link>
<guid>4fc147e998bc303d0f94b6239b7b1449</guid>
<pubDate>Tue, 11 Nov 2025 20:50:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Brenda-Richardson-Memorial-Care-Home-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>620a167f8b78bfc86510159ef2d9a0d23a2b17664132e479a2e8daba1f3f750e</i><br /><br />Threat actor <b>description</b>: <i>Negligence of mental health care agency employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Olive-Branch-Family-Medical-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27045</link>
<guid>32cf59fa14aee4619887264860712707</guid>
<pubDate>Tue, 11 Nov 2025 20:48:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Olive-Branch-Family-Medical-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ecd6aa220f7bc81bcbc88226eccc82dc863aac20483597e33d833413be5b3431</i><br /><br />Threat actor <b>description</b>: <i>Data Breach at U.S. Medical Center Puts Thousands of Patients at Risk</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>DARTMOUTH.EDU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27037</link>
<guid>5f7733de9c8bddeb31b24d3434640003</guid>
<pubDate>Tue, 11 Nov 2025 19:24:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DARTMOUTH.EDU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53abfee837a6862612213de40d281f531e6f3baf91ec151191dc75f90f16a3fd</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>glendaleobgyn.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27044</link>
<guid>bae4f11996f82f08ae1800943df99925</guid>
<pubDate>Tue, 11 Nov 2025 19:18:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>glendaleobgyn.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9fdcf78abaf263ef8ceacfc4cfa4d720d81e002cdea398ba3ff85d933010c7e4</i><br /><br />Threat actor <b>description</b>: <i>Glendale OBGYN (an obstetrics and gynecology practice) would likely operate as a mid-sized women’s health clinic in Glendale, California, offering …</i><br />Target victim <b>website</b>: <i>glendaleobgyn.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>S.B.-Conrad-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27040</link>
<guid>788292a2cdb9fa425ff5fb269688befd</guid>
<pubDate>Tue, 11 Nov 2025 18:22:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>S.B.-Conrad-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d30b11a21f6f3d61aa902417f05b91dbfb26f7086fc84bacabf2514c068d907f</i><br /><br />Threat actor <b>description</b>: <i>A general contracting construction company</i><br />Target victim <b>website</b>: <i>sbconrad.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Continental-Global-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27041</link>
<guid>4423df30c2370b6c952d07397078b3ae</guid>
<pubDate>Tue, 11 Nov 2025 18:22:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Continental-Global-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>555ee6c10b86503bbf6325bbd0e82fd81cb97ee2f7568290389add3368a6ab69</i><br /><br />Threat actor <b>description</b>: <i>A subsidiary of PPI Global</i><br />Target victim <b>website</b>: <i>cgmh.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Manusos-General-Contracting-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27043</link>
<guid>64ad8f3af92ef8d9a1c7dfd7265e577d</guid>
<pubDate>Tue, 11 Nov 2025 18:20:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Manusos-General-Contracting-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8c6c26320710a0e8055a4d2a88c77b6c060bc336d47a7ff6ad1fc18d334266c6</i><br /><br />Threat actor <b>description</b>: <i>A general contracting construction company</i><br />Target victim <b>website</b>: <i>manusosinc.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Barry-Sallinger-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27031</link>
<guid>2ecc65c44282f1ad4bfa9ca7bf4d0a37</guid>
<pubDate>Tue, 11 Nov 2025 17:24:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Barry-Sallinger-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b9e539221e67b8e826692b1a7b7ef4efb39a6013e5b12d9fd414f9c1d2c3d9c2</i><br /><br />Threat actor <b>description</b>: <i>Sallinger / Melancon Defense Attorneys are top-rated criminal defense lawyers based in Lafayette, specializing in alcohol, drug offenses, and complex litigation. We will upload corporate documents soon. Clients personal documents (scanned passports, drivers licenses, SSNs, medical information), court files, financials, confidentiality agreements, confidential files, police reports and other legal files, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Miromar</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27029</link>
<guid>5cacb64862789cc1a6c5d2e646e8177f</guid>
<pubDate>Tue, 11 Nov 2025 16:24:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Miromar</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>140d2aa60ccc6abde375b51dbc6bd222d3f7b9dc5a15a2446bad2139d018a2df</i><br /><br />Threat actor <b>description</b>: <i>Miromar Development Corporation is a multi-faceted real estate development company which holds a portfolio of internationally recognized residential and commercial properties in the United States.We will upload corporate documents soon. Clients information, HR files, financials, agreements and contracts, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rhodes-Young-Black-Duncan-RYBD</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27030</link>
<guid>ee2ce2b68e8909ca92ffea6598099cbe</guid>
<pubDate>Tue, 11 Nov 2025 16:24:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Rhodes-Young-Black-Duncan-RYBD</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a1b9f99b48bc5a84d519f6dde4958aadae1ad91f66c04f61e88604733b718e2</i><br /><br />Threat actor <b>description</b>: <i>Rhodes, Young, Black & Duncan is a CPA consulting firm based in Duluth, offering comprehensive tax, accounting, and business consulting services.We will upload corporate documents soon. Lots of clients personaldocuments (scanned passports, drivers licenses, SSNs, medical information), HR files, financials, agreements and contracts, projects, a few military related files, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brian-Kyles-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27026</link>
<guid>76652668cad0e5ab9abedb7d7357d6fd</guid>
<pubDate>Tue, 11 Nov 2025 14:24:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Brian-Kyles-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4bfb9b8d86d6e2f01eb95cc1489f9042edf24f340a1f77fd335e07603fe73324</i><br /><br />Threat actor <b>description</b>: <i>Commercial & Residential Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Doctor-Alliance--Streamlined-Document-and-Billing-Management-for-Healthcare-Providers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27034</link>
<guid>2fecdeaa123ef60a82894a45c5a7ae26</guid>
<pubDate>Tue, 11 Nov 2025 13:19:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kazu</b> claims attack for <b>Doctor-Alliance--Streamlined-Document-and-Billing-Management-for-Healthcare-Providers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91f94070375426d9495a1808281585f906cfca8824b6ef0495763e6816ce2ede</i><br /><br />Threat actor <b>description</b>: <i>Doctor Alliance (doctoralliance.com) is a U.S.-based healthcare technology platform that helps physicians and medical agencies manage documents, referrals, and billing in one secure online system. Headquartered in Dallas, Texas, it offers services such as electronic document signing, coordination with agencies, and billing support for programs like CPO, CCM, and TCM. The platform integrates with systems like Axxess Home Health to streamline workflow and reduce paperwork, promoting faster document turnaround and improved billing efficiency -- contact me to protect your files !!</i><br />Target victim <b>website</b>: <i>doctoralliance.com</i>]]></description>
<category>kazu</category>
</item>
<item xmlns:dc='ns:1'>
<title>omniumint.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27028</link>
<guid>baef4802848fb2c2e3026a7f26a53315</guid>
<pubDate>Tue, 11 Nov 2025 12:21:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>omniumint.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>15ab401b185b42d3153d45f00b285ec2b6c2c025e67aeba2c6a3849ddc1a1ee8</i><br /><br />Threat actor <b>description</b>: <i>Ransom: 1.2million
1.2 tb
and one very interesting email</i><br />Target victim <b>website</b>: <i>omniumint.com</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>himmelstein.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27025</link>
<guid>33a88364c4e7651c59a0116c74de1f9b</guid>
<pubDate>Tue, 11 Nov 2025 07:50:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>himmelstein.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a0e226af75f90683a5dd28198f7aa3f5f2d737d6c8891ebdf240f428213418ef</i><br /><br />Threat actor <b>description</b>: <i>S. Himmelstein & Company is a U.S.-based specialist manufacturer founded in 1960, headquartered in Hoffman Estates, Illinois. The company focuses …</i><br />Target victim <b>website</b>: <i>himmelstein.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>GAEAGLOBAL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27011</link>
<guid>3804d8a77337b4ed9c5f388c98822525</guid>
<pubDate>Tue, 11 Nov 2025 01:09:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GAEAGLOBAL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4618d936787f4278fb892d9de890eb9fa4b24c0030988acef0e2a4228b029e3b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>P2ENERGYSERVICES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27012</link>
<guid>bb78a710e7d0494db915c83459de0c42</guid>
<pubDate>Tue, 11 Nov 2025 01:09:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>P2ENERGYSERVICES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>08172726934ca9bbea3d93a4aca47ec0ce95b390eae10e62a73c95195de8c5dc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GLOBUSANDCOSMOS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27013</link>
<guid>d48fff99ca7aafcfe2e7a5c530eef864</guid>
<pubDate>Tue, 11 Nov 2025 01:08:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GLOBUSANDCOSMOS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26445596bdfa48509bc5324c53516e204699f335dc0f681d4f080f1b743c2718</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ENNVEE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27014</link>
<guid>5c17761f7220777710a535e7dea512d3</guid>
<pubDate>Tue, 11 Nov 2025 01:08:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ENNVEE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c40cbd7668fc6e15b5d8acba8382be087db2fa81042a201162a4cbed7420cadd</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>VITAMIX.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27016</link>
<guid>eb94d25085ab649f81d89e90cbe12fee</guid>
<pubDate>Tue, 11 Nov 2025 01:05:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>VITAMIX.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f96f56d95ea30885f469045efe75208d8f56564da2cff765f059ca31c1c6a37</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GARDENOFLIFE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27017</link>
<guid>b9df039a53bee7e42906016fbf7cd441</guid>
<pubDate>Tue, 11 Nov 2025 01:04:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GARDENOFLIFE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>094a56923e1277346b6ed8cca3c7d68253c1bfd87012c1821e597f4e8a4028c4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Middlesex-Endodontics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27022</link>
<guid>f7b6da9dedde15499538bf7e5e23f0ee</guid>
<pubDate>Tue, 11 Nov 2025 00:58:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Middlesex-Endodontics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>23ec3a50c12da9ceecaa5b66d9a13becffe4931c44a779eacc44bb71778a4070</i><br /><br />Threat actor <b>description</b>: <i>Middlesex Endodontics is conveniently located in Burlington and Winchester, MA. Our experienced team of endodontists and staff is dedicated to providing the highest level of professional care for our patients. Besides routine endodontics (root canals), our services also include: Pediatric endodontics, Post removal and retreatment, Endodontic surgery, and Implants. EXPERIENCE For over 40 years our practice has worked together with area dentists to provide the best overall dental care. Supporting our 5 endodontists is an experienced staff --many members of which have been with us for over 15 years, with several over or approaching the 25 year mark. We do not believe any patient should have to wait with pain and discomfort. We offer same day emergency appointments and we also like to accommodate busy schedules with expanded hours for scheduled appointments including evenings and Saturdays.</i><br />Target victim <b>website</b>: <i>www.middlesexendodontics.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.modcomedia.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27020</link>
<guid>b9dfbed6c12d438d6c550fa1a2032135</guid>
<pubDate>Tue, 11 Nov 2025 00:27:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>www.modcomedia.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be54d433e13a21ac80cea7a7fd4af3646e0f4f2161f8e8e989b63ae810d38bc4</i><br /><br />Threat actor <b>description</b>: <i>5GB of confidential data, 400GB of total data, contracts with Rockstar, Siemens, and other popular brands.</i><br />Target victim <b>website</b>: <i>www.modcomedia.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Easterseals-Arc-of-Northeast-Indiana</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27003</link>
<guid>0c8c5b55e8a3c4c0856a1fc3d0a46f61</guid>
<pubDate>Mon, 10 Nov 2025 21:22:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Easterseals-Arc-of-Northeast-Indiana</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c07a4d579177a4b056c426b5314e57fcd4114d7cfd907dfbf8737bc765a7e96</i><br /><br />Threat actor <b>description</b>: <i>Easterseals Northeast Indiana provides life-changing services and programs for individuals with disabilities, their families, and the wider community. Their offerings include youth and adult services, employment readiness programs, wellness coordination, and recreational activities designed to empower participants. The organization operates across multiple locations in northeast Indiana, including Fort Wayne, Columbia City, and Angola, and is committed to meeting the unique needs of each individual. Through compassionate staff and various service initiatives, they aim to create inclusive environments and enhance the quality of life for their clients.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Community-Unit-School-District-201</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27004</link>
<guid>1eb4505084d87118b8c710ac96b97cb2</guid>
<pubDate>Mon, 10 Nov 2025 21:22:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Community-Unit-School-District-201</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>336cadf0b05ec365afa92ad24db86133efc800c2ad4cccd0733f75e4d7cca9c9</i><br /><br />Threat actor <b>description</b>: <i>Community Unit School District 200 is dedicated to inspiring, educating, challenging, and supporting all students to achieve their highest potential in learning and personal development. The district offers various educational programs and services aimed at fostering student growth and excellence. Their intended clients include students, parents, and the community, with a focus on providing a supportive environment for all. The district is committed to innovation and technology in education, as well as special education services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>ielplumbing.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27006</link>
<guid>a3f559a66f188c89e4289caa9765aaef</guid>
<pubDate>Mon, 10 Nov 2025 20:46:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>ielplumbing.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5819596a0ba64e1eb5afc6ae6e246bbf39b1eec237c6da64dde67c692c27ed62</i><br /><br />Threat actor <b>description</b>: <i>I.E. Plumbing Services is a privately-held plumbing contractor based in Southern California, operating from two locations in the Riverside / …</i><br />Target victim <b>website</b>: <i>ielplumbing.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Heart-South-Cardiovascular-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27005</link>
<guid>5aafc3f70332f6e42228be384d3c4f01</guid>
<pubDate>Mon, 10 Nov 2025 20:45:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Heart-South-Cardiovascular-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>92a3088875af854447477c1984edaf3126d71399a76588dedf75cd7140e365c9</i><br /><br />Threat actor <b>description</b>: <i>Heart South Cardiovascular Group Heart South is a leading provider of comprehensive cardiac and vascular care in Central Alabama.    More</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Garvin-Promotion-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27002</link>
<guid>7580584dbb499d1e2a45411a0cc7fa23</guid>
<pubDate>Mon, 10 Nov 2025 18:55:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Garvin-Promotion-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56538b2000fe50d11eec99026387e8d254a98d36d41cd5797d5968ec3c8bc21b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.garvinpromo.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jean-Georges</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=27001</link>
<guid>ffa486a4029dee1a46c0ed19bdc4b6b7</guid>
<pubDate>Mon, 10 Nov 2025 18:54:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Jean-Georges</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>105f39fa75ba4211c6375f8635ebc04d671f0753e2a8c0ab95a8e1cbb56cef29</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.jean-georges.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ioxo--Stream-Computers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26999</link>
<guid>36bf0c2be198fce4b4ce1bdc6c9dbd56</guid>
<pubDate>Mon, 10 Nov 2025 18:53:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Ioxo--Stream-Computers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e16eb9d63ec3b6d7c018ad2c1ea8ce98e7fa01cfdd925691811bdb050f32e52</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ioxo.cloud www.streampc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Darvin-Furniture</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26998</link>
<guid>d3b0b66668aabbb1887660ef1ba740ff</guid>
<pubDate>Mon, 10 Nov 2025 18:52:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Darvin-Furniture</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97579866fd18aca017b8626e71a6e773c4479a190e949edc36fd3ba6f7e3cc57</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.darvin.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Land-Title-Guaranty</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26997</link>
<guid>d1c1a2daad72f9d116f600c1c542b573</guid>
<pubDate>Mon, 10 Nov 2025 18:51:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Land-Title-Guaranty</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2dbc17da847cf976307a081d3ceeebad789066ae5ba9d917e131c681e419f552</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.landtitleweb.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mciver-Engineering--Controls</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26993</link>
<guid>1d14f7a40b5c0e95f6b5529810582f23</guid>
<pubDate>Mon, 10 Nov 2025 18:25:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Mciver-Engineering--Controls</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c865c65e1ff538e978d56bc67e5ad96f97aba4d0babd774ecc5c5e702b6ad4f6</i><br /><br />Threat actor <b>description</b>: <i>Industrial Machinery & Equipment</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ami-Bearings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26994</link>
<guid>c5c57642a4f73eae7413ce5ad2782158</guid>
<pubDate>Mon, 10 Nov 2025 17:24:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Ami-Bearings</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f0da0ddb45e52a271e5360a3ebbcd83abb75fe8345568951cc2ae976d1022b8</i><br /><br />Threat actor <b>description</b>: <i>AMI Bearings, Inc. is a premier manufacturer of mounted ball bearings that caters to the North American market.We will upload 15gb of corporate documents soon. Employee information, clients information, lots of projects information, agreements and contracts, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>MARCK-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26995</link>
<guid>005cbfa3ec6690c005d1de9182683241</guid>
<pubDate>Mon, 10 Nov 2025 15:49:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>MARCK-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>113da3288d3bf96bd499b521da00017ada2e8588d3b80530c565c633d92166a0</i><br /><br />Threat actor <b>description</b>: <i>GMARCK Industries believe that the services we provide make a difference: In Your Company - From your first 360 Waste Audit to implementing and maintaining your customized recycling program, we help you reach your sustainability goals while helping you increase efficiencies and reduce costs. In Our Community - Recycling keeps reusable products out of the landfill, while boosting the local economy with sustainable jobs.</i><br />Target victim <b>website</b>: <i>www.marck.net</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Weintraub-Traub-Tracy--Virk-Cras-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26991</link>
<guid>d9e6b46563c1a62a6d0979d929fe2e6b</guid>
<pubDate>Mon, 10 Nov 2025 12:21:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Weintraub-Traub-Tracy--Virk-Cras-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd9d5c5a43c5b138c2560940880690b1be5becce2aa7b76a63b880e8b2b9b611</i><br /><br />Threat actor <b>description</b>: <i>We have data from Piaty Müller-Mezin Schoeller Rechtsanwälte GmbH, payment and tax records, employee and client documents, as well as projects and developments, and personal correspondence with clients. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>LMHT-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26990</link>
<guid>72417e4a6ce410ee495dc2978c405084</guid>
<pubDate>Mon, 10 Nov 2025 07:47:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>LMHT-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>401bd4dd0733c32a9aabda21d2d6cab5b762a34e8a2125b24ee5493695de87f8</i><br /><br />Threat actor <b>description</b>: <i>LMHT Associates</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Seward-County-KS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26986</link>
<guid>5564890753e533c5fb71cf81125fccfb</guid>
<pubDate>Mon, 10 Nov 2025 00:53:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Seward-County-KS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8c579abcabf62744183fc0c189a21ec3c8b6c1af61a0c963d8cd0b97303cb9d</i><br /><br />Threat actor <b>description</b>: <i>Seward County is a county located in Kansas. This county was formed on March 20, 1873 and the county seat is Liberal.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>CapitalPlus-Exchange</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26987</link>
<guid>552f5e345c9d523300ea73c6a65b0a6e</guid>
<pubDate>Mon, 10 Nov 2025 00:52:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>CapitalPlus-Exchange</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1a968bec680f09933d40e3fe70a107591b7948134afe789cda3aca07a7b8ea6</i><br /><br />Threat actor <b>description</b>: <i>CapitalPlus Exchange (CapPlus) supports financial institutions in emerging economies by enhancing their strategic and operational capacities, offering training and innovative financing solutions for small and medium enterprises (SMEs). Through initiatives like the Education Markets Impact Initiative (EMII) and FIRST+, CapPlus helps to unlock education finance markets and catalyze job creation in sectors such as agriculture by improving access to finance. CapPlus partners with local institutions to tailor financial services, focusing on underserved demographics such as women and youth. With nearly two decades of experience, CapPlus aims to reduce poverty by expanding financial services for small businesses.</i><br />Target victim <b>website</b>: <i>www.capitalplusexchange.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Atrium-Living-Centers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26979</link>
<guid>b2ebf93cb2667a995c12787e51e6ec0b</guid>
<pubDate>Sun, 09 Nov 2025 18:42:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Atrium-Living-Centers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c712f3f0bbeb77b0aa34005279e556a0f932dffda7e01daab5b182e10bf6773</i><br /><br />Threat actor <b>description</b>: <i>Atrium Living Centers is a 100% employee-owned company providing skilled nursing, rehabilitation, and long-term care services. The organization is dedicated to delivering compassionate, high-quality healthcare to residents while promoting dignity, respect, and community involvement. With a strong focus on personalized treatment, Atrium Living Centers offers both short-term post-acute rehabilitation and long-term nursing care. Their mission is to “be a light in the lives of our residents and families,” ensuring comfort and well-being in a supportive environment. The company operates multiple care centers across several U.S. states, including Ohio, Michigan, Kentucky, and Wisconsin.
company is headquartered in Atrium Living Centers headquarters is located at 2550 Corporate Exchange Drive, Suite 200, Columbus, Ohio 43231, United States.
2,000 Employees
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ringmor</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26976</link>
<guid>fc33073cb57bd68d6df31b8c97c91e93</guid>
<pubDate>Sun, 09 Nov 2025 13:10:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Ringmor</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bceb307eb379e3b863417e75cae0dc861d48d52125dd9d96fd64ba74327598f2</i><br /><br />Threat actor <b>description</b>: <i>CallMor offers virtual phone system services aimed at businesses looking for unlimited communication options with no hidden fees. Their plans are designed to simplify connectivity for teams and clients alike and include 24/7 customer support. With offices in Orange County, San Diego, and Los Angeles, they prioritize customer satisfaction and provide competitive pricing in the telecommunications market. CallMor is known for its professional service and effectiveness in improving communication and sales results for its clients</i><br />Target victim <b>website</b>: <i>www.ringmor.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>JC-Auto-Accident-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26971</link>
<guid>fc60881482701eecdb18102735fc2308</guid>
<pubDate>Sat, 08 Nov 2025 18:24:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>JC-Auto-Accident-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7043a8c8037746bf3354961665ed4266971b8d009954172f9be15df189a5d064</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gadge-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26972</link>
<guid>07fc49d464acdc489fc1a262fecf8023</guid>
<pubDate>Sat, 08 Nov 2025 18:24:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Gadge-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>820467a11407b973d63c9a3f064000efa0bcb8c7e85499a73125a41812665081</i><br /><br />Threat actor <b>description</b>: <i>Manufacturing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advanced-Delivery-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26968</link>
<guid>1ff74a7bfef596dee39077acae425bcd</guid>
<pubDate>Sat, 08 Nov 2025 12:25:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Advanced-Delivery-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a578859a46eeea186228770ae2bb62407e9a98ee914122f96f36925869c746ea</i><br /><br />Threat actor <b>description</b>: <i>Freight & Logistics Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>SHRM-New-Mexico</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26967</link>
<guid>407db1f4e4ad1fc027d01a09ed569d7d</guid>
<pubDate>Sat, 08 Nov 2025 05:51:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>SHRM-New-Mexico</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>59a17d6f5efff9e9e48644094ceaf128d486b90810f58a0c95f372603f127392</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.shrmnm.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mold-In-Graphic-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26964</link>
<guid>0e53dc3b8871ecd8207df9da83f683b6</guid>
<pubDate>Sat, 08 Nov 2025 00:44:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Mold-In-Graphic-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f79dd1c228ede029786d0fac43de4dbcda67706a3d3f3e1425428be211e2e7d</i><br /><br />Threat actor <b>description</b>: <i>Mold In Graphic Systems specializes in providing permanent labeli
ng solutions for plastic durable goods using their unique Polymer
Fusion Labels.

We will upload 15gb of corporate documents soon. Employee informa
tion (Driver licenses, credit cards scans, medical information an
d so on), projects information, internal confidential files, agre
ements and contracts, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shollenberger-Januzzi--Wolfe</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26957</link>
<guid>468e5112d68b2cb7c9df93692fe5730f</guid>
<pubDate>Fri, 07 Nov 2025 20:24:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Shollenberger-Januzzi--Wolfe</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be87ff3afc8995e6a2edab3f1c600b079770a887477608267a4bb1d3ef2498a6</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Marine-Turbine-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26958</link>
<guid>3afa23ac1b717491cdb68424e043a45f</guid>
<pubDate>Fri, 07 Nov 2025 20:24:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Marine-Turbine-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c4d35499b885ddfe63ad7e13623c8060b59214c0816f155ddcae1b0bc97ab4b</i><br /><br />Threat actor <b>description</b>: <i>Industrial Machinery & Equipment</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clackamas-Community-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26959</link>
<guid>8e09ecaeb8fc3c2f8f0b52fff9eec3ec</guid>
<pubDate>Fri, 07 Nov 2025 18:30:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Clackamas-Community-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4576b1c5f49f4979287a2112b824d60e2f707b1d9232d641b6be1592f59ab519</i><br /><br />Threat actor <b>description</b>: <i>Clackamas Community College offers a variety of academic programs including associate degrees, certificates, and customized training for various career pathways. The college is committed to supporting a diverse student population, including veterans, English learners, and adult learners seeking education and skill development. With over 100 programs and a focus on community engagement, CCC provides resources such as financial aid, counseling, and student clubs. Their mission is to empower individuals to achieve their educational and career goals while celebrating equity and inclusion.
company is headquartered in 19600 Molalla Avenue, Oregon City, Oregon 97045, United States.
936 Employees. The total amount of data leakage is 1.21 TB
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Village-of-New-Lenox</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26951</link>
<guid>0943a2b85be5f182bcd97cee9beebd5f</guid>
<pubDate>Fri, 07 Nov 2025 18:24:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Village-of-New-Lenox</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1fb1a6ba956b61871ad8095a81adf8cd8769b4b9dfda63d0442496284557d6fd</i><br /><br />Threat actor <b>description</b>: <i>Government</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Klae-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26952</link>
<guid>e2fc74dd6dde6ff116ccc7a4086adc0c</guid>
<pubDate>Fri, 07 Nov 2025 18:24:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Klae-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>94f76de36a71875f214d558175d76db21ca9f4c00aa4a4c096f8ce3fa242a36f</i><br /><br />Threat actor <b>description</b>: <i>Commercial & Residential Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Soapy-Joes-Car-Wash</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26953</link>
<guid>440bcbe45a6a4e361b606228f0c86365</guid>
<pubDate>Fri, 07 Nov 2025 18:24:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Soapy-Joes-Car-Wash</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>561d2be536acc39c8acfc8e38548b8960d8a1021812e2ad9ff550d5d4ec12dfe</i><br /><br />Threat actor <b>description</b>: <i>Voted Best Car Wash in San Diego. Guinness World Record holder.We will upload more than 40gb of corporate documents soon. We obtained personal information of all employees of this company. Phones, addresses, DLs, passports, almost 2000 SSN numbers, medical information. Detailed financials, lots of confidential files, contracts and agreements, partners information and so on, NDAs etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shands-Elbert</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26954</link>
<guid>7aedaa9271fdee6dc5b0d3e9858e1cf1</guid>
<pubDate>Fri, 07 Nov 2025 18:24:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Shands-Elbert</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>412d662693530a0e13d420194e6c85b2c084b90b156158754750e0c5d4c07786</i><br /><br />Threat actor <b>description</b>: <i>Shands, Elbert, Gianoulakis & Giljum, LLP is a law firm based in St. Louis with over 50 years of experience offering a wide range of legal services. They provide expertise in areas such as business law, education law, labor and employment, litigation, and estate planning, serving clients including corporations, governmentalentities, educational institutions, individuals, and small businesses.We will upload more than 31gb of corporate documents soon. Another ones lawyers that don't care of their clients (and family members) personal information. Name, DOB, phones, addresses, DLs, passports, SSN numbers, numerous medical files. Detailed financials, lots of confidential files, court hearings, police reports and soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>PLP-SoCal</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26955</link>
<guid>793fde23ec4fb2972bfe2ee461f63645</guid>
<pubDate>Fri, 07 Nov 2025 18:24:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>PLP-SoCal</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c775d2141a6f2de99be49786193563a8e2dd2336bbd0cb3a7e38c986d0650da6</i><br /><br />Threat actor <b>description</b>: <i>PLP SoCal is Southern California's premier representative of performance Architectural Lighting, Decorative Lighting, Lighting Controls, Acoustic, EV Charging Stations, Illuminated Handrails & Site Furnishing.We will upload 26gb of corporate documents soon. You will find full personal information of almost every employee. (Name, DOB, phone, SSN, address, DL, passport, medical information, family members personal information and so on), financials, internal confidential files, client information, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Koch--Co-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26956</link>
<guid>4854417254fa352c8deea7c55ed11dd2</guid>
<pubDate>Fri, 07 Nov 2025 18:24:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Koch--Co-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d433ac53898e1a5af0187fbee7180a894eec0cfaec9bc44d7c729de84bda54b7</i><br /><br />Threat actor <b>description</b>: <i>Koch & Co, Inc., is a wood door and cabinet manufacturing company.We will upload 54gb of corporate documents soon. Detailed financials and accounting, projects information, contracts, agreements, lots of HR files, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aptura-Group--Central-Indiana-Hardware</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26961</link>
<guid>e41576c2d63eab99e7d7209204739ce8</guid>
<pubDate>Fri, 07 Nov 2025 15:33:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Aptura-Group--Central-Indiana-Hardware</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0162127668856aa0e4aa73067e4381368f4a211923f5de7680f7ec19360a9f04</i><br /><br />Threat actor <b>description</b>: <i>Central Indiana Hardware - Produces custom access systems, space management solutions, and high-performance hardware to optimize the security and functionality of commercial spaces.
APTURA GROUP is a wholly employee-owned company specializing in innovative solutions and services in the door hardware and security systems industry. Working with several leading brands, including Central Indiana Hardware (CIH), APTEK, Security Builders Supply, and HG/Schultz Door, we have built our reputation on precision, efficiency, and exceptional customer service that consistently exceeds expectations.
CIH helps the company work more productively.</i><br />Target victim <b>website</b>: <i>apturagroup.com & cih-inc.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rex-Hide</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26950</link>
<guid>ec78e9f1c48cec8f5a6de60b921e4e46</guid>
<pubDate>Fri, 07 Nov 2025 08:25:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Rex-Hide</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ab14248bf6282e43815ed451c915d613257a764331a7c7136467edaab27732e</i><br /><br />Threat actor <b>description</b>: <i>Manufacturing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Health-Dimensions-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26939</link>
<guid>802cb8aeda781c153c4358d9e6cd32ad</guid>
<pubDate>Thu, 06 Nov 2025 22:25:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Health-Dimensions-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8487bd31645f7dcd739fd6c73679c9170519e047475172893cab1de5fc3f7b7e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>WASHINGTONPOST.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26936</link>
<guid>91ab07539b36f85ba8180d74ad2bb3ee</guid>
<pubDate>Thu, 06 Nov 2025 20:35:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>WASHINGTONPOST.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>28c995f0a22f32b4949451eba6007d5149d48ec8d29c567e8ec2ee796915f2d3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>UScraft</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26937</link>
<guid>0c48ec1f07958ea1b58ac7721dc6058b</guid>
<pubDate>Thu, 06 Nov 2025 19:25:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>UScraft</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a11226a56d5cbd0447a3e9fe6bfa693f9ffd7992ababe8347f71ad3a997c410</i><br /><br />Threat actor <b>description</b>: <i>Advertising & Marketing</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>RHEEM.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26924</link>
<guid>f5e083092550d2f93898e9829e677e39</guid>
<pubDate>Thu, 06 Nov 2025 18:22:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>RHEEM.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f52075113937b8d068c88078ec1d696cb223f904d5af4549908de2a07f28842d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Systems-Integrated</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26930</link>
<guid>695494b434b3711f396bc5f0d3c0a54e</guid>
<pubDate>Thu, 06 Nov 2025 17:24:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Systems-Integrated</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91c91772cca957f9aa6035ea933a053865cb742ba55033784ec8fac76e06b612</i><br /><br />Threat actor <b>description</b>: <i>Industrial Machinery & Equipment</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Black-Hills-Bentonite</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26920</link>
<guid>53e232bcc4a6386499454667194addd1</guid>
<pubDate>Thu, 06 Nov 2025 16:24:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>Black-Hills-Bentonite</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d34db57d115fe756109897aa4d3c5886d4107922e94329874ac2713be1e58a46</i><br /><br />Threat actor <b>description</b>: <i>An American company founded in 1947. It mines and processes sodium bentonite, a natural clay used in well drilling, metal casting, and pond and landfill sealing.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>E-First-Aid-Supplies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26914</link>
<guid>1df58e63816ec9ab895d8f14640a5f47</guid>
<pubDate>Thu, 06 Nov 2025 14:25:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>E-First-Aid-Supplies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ef3785e64e0b43276b020d916c81fdf5d551867a466486bafa54c7d2e38011a9</i><br /><br />Threat actor <b>description</b>: <i>Fieldtex is a manufacturer known as Fieldtex Cases that produces soft sided carrying cases for portable electronic equipment for medical and military markets. Their second division is a medical supplies distributor known as Fieldtex Medical.We will upload more than 14gb of corporate documents soon. Employee and customer, financials, confidential files, lots etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>INTERNATIONAL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26915</link>
<guid>1533e368c21be061fac64ad083b5f8c1</guid>
<pubDate>Thu, 06 Nov 2025 14:22:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>INTERNATIONAL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9b48df1253689c91eed7f8889e9c9feb43256efccf336034f09fa1450fa54680</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>KIRBYCORP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26916</link>
<guid>2d16ef569bb8d2fddf2e9b279f73e7f8</guid>
<pubDate>Thu, 06 Nov 2025 14:21:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>KIRBYCORP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd5a7f5c084197b0ceb95016d8625dbfda49f7476edd9157655539c0e8412f17</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TRIMBLE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26917</link>
<guid>93e0873f2cce60514c26bd8bbdc3ccc8</guid>
<pubDate>Thu, 06 Nov 2025 14:21:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TRIMBLE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b34e2a6d0965bd476042610443223d1f7af321a845e2f54ae591e67490ea1d52</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MKS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26918</link>
<guid>b3385637859c7e1bf875c127272934a6</guid>
<pubDate>Thu, 06 Nov 2025 14:20:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MKS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ef5bf035a719f5c701cf1c1662eb6e896613f3d74fbe39af1fc0b525125ed02</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dermatology-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26933</link>
<guid>f88c38d9ce16d575ff23353bde81df3b</guid>
<pubDate>Thu, 06 Nov 2025 14:19:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Dermatology-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b27d27017b4b026d4be3a77c92287302d48f3644c2224e3c4b6f6ba045308cd</i><br /><br />Threat actor <b>description</b>: <i>Leak of clinic customer data.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Union-League-of-Philadelphia</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26892</link>
<guid>daa845e72247bceebbf545aed4737521</guid>
<pubDate>Thu, 06 Nov 2025 00:14:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>The-Union-League-of-Philadelphia</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e429f02349b66cb0d6c360db9d2d43fb75d90bddb141339d99cca565dacb87d2</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1862 as a patriotic society to support the Union and the policies of President Abraham Lincoln, The Union League of Philadelphia laid the philosophical foundation of other Union Leagues across a nation torn by civil war. The League has hosted U.S. presidents, heads of state, industrialists, entertainers and dignitaries from around the globe and has proudly supported the American military in each conflict since the Civil War. The Union League continues to be driven by its founding motto, Amor Patriae Ducit or Love of Country Leads.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>LaRosas-Pizzeria-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26888</link>
<guid>5ca641f66bd082a37a9b11fe9236c7fd</guid>
<pubDate>Wed, 05 Nov 2025 20:52:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>LaRosas-Pizzeria-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ad0e76ad72a73a26270f7047734f5822b884daa877213972469ea5ab3efa535</i><br /><br />Threat actor <b>description</b>: <i>LaRosa’s Pizzeria is a family-owned pizza restaurant chain founded in 1954 by Donald “Buddy” LaRosa in Cincinnati, Ohio. Known for its signature thin-crust pizzas made with Aunt Dena’s original sauce recipe, the company has become a regional favorite across Ohio, Kentucky, and Indiana. LaRosa’s offers a wide variety of Italian-inspired dishes including pasta, hoagies, and salads. The brand emphasizes family traditions, community values, and quality ingredients. Still operated by the LaRosa family, it continues to represent the spirit of local hospitality and authentic Italian-American cuisine after more than 70 years in business. company is headquartered in 2334 Boudinot Avenue, Cincinnati, OH 45238, United States. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Maine-Course-Hospitality-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26883</link>
<guid>cc658daf205377fb870d72f7c9f2b59f</guid>
<pubDate>Wed, 05 Nov 2025 17:25:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Maine-Course-Hospitality-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c4520a9f07805b51014f9eb53d63f0fc8b32cfb1c0bb5cd4113de88a1cbf4c1</i><br /><br />Threat actor <b>description</b>: <i>Hospitality</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shelbyville-Police-Department</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26886</link>
<guid>f6f20ada728b7a41ea4c0eb996c817b6</guid>
<pubDate>Wed, 05 Nov 2025 15:57:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Shelbyville-Police-Department</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b360c4ac63d3104677c40fc03a6356647563551f61960df16b2f3521000afdd0</i><br /><br />Threat actor <b>description</b>: <i>The Shelbyville Police Department is committed to protecting lives and preventing crime. But the opposite has happened! Officers are failing to protect themselves and are endangering other residents due to their indifference to safety! A vast amount of confidential data has been exposed! As a result, access was gained to the department's cameras, all data and databases containing archived videos and crime footage, as well as all available cameras and devices recording audio or video!</i><br />Target victim <b>website</b>: <i>shelbyvillepolice.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>sensationalteeth.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26885</link>
<guid>ede08f3ae4d17d223051ed8282a67caf</guid>
<pubDate>Wed, 05 Nov 2025 15:54:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>sensationalteeth.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>019ec4664a8cec31c95d921e204a4cdc3c7463a713751cccf6e1626997a2cb11</i><br /><br />Threat actor <b>description</b>: <i>Oelbaum Kagan Dentistry provides comprehensive dental services in the Bronx and New York City, with offerings including routine care, cosmetic dentistry, restorative procedures, and orthodontics. Led by experienced dentists Dr. Victor Oelbaum and Dr. Victor Kagan, the practice prioritizes patient comfort and satisfaction, employing advanced technology for optimal treatment. They aim to create a welcoming environment for both new and returning patients, promoting extensive dental health care. The team is dedicated to delivering high-quality treatment tailored to the needs of individuals, families, and seniors. Employees: 25 Revenue: $5 Million Industry: Dental Offices  Phone Number: (718) 882-7202 </i><br />Target victim <b>website</b>: <i>sensationalteeth.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pine-Pharmaceuticals</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26879</link>
<guid>3ea1a7505194e632a33246e1c7a1a0ee</guid>
<pubDate>Wed, 05 Nov 2025 15:25:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Pine-Pharmaceuticals</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab0861c509f8050dcc720bb83139b8291962a5747995aff7f51de19f37c90a6a</i><br /><br />Threat actor <b>description</b>: <i>Pine Pharmaceuticals is one of the industry's largest and most trusted 503B outsourcing facilities specializing in the preparationof high-quality, ready-to-administer compounds and repackaged products.We will upload more than 18gb of corporate documents soon. Detailed employee information (complete I-9 forms, SSN, DL, passports, birth/death certs and so on), customer information, projects details, financials, confidential files, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Christina-Development</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26880</link>
<guid>4028aad989b92a2aaf6fc94295aaf8ab</guid>
<pubDate>Wed, 05 Nov 2025 15:25:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Christina-Development</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>438eb4d9febc41204737e61ec2ee2ce3af05c527605fe2360ba9ebb609ed2b8a</i><br /><br />Threat actor <b>description</b>: <i>Christina is a Los Angeles-based real estate investment firm with45 years of experience, focusing on providing investors the opportunity to invest in prime real estate in locations such as Beverly Hills, Malibu, and Santa Monica.We will upload more than 18gb of corporate documents soon. Employee personal documents (passports, driver licenses, birth/death certificates), customer projects and other information, client information, financials, confidential files, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>mcintoshlabs.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26884</link>
<guid>bca7d174d4387a5394a9c3d899091b2d</guid>
<pubDate>Wed, 05 Nov 2025 13:24:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>mcintoshlabs.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2e340240d7d6eb8e2585c513be38fa6ba8981fc02d878c635e6f4a9534d2fd6</i><br /><br />Threat actor <b>description</b>: <i>McIntosh Laboratory is an iconic American company, founded in 1949 and headquartered in Binghamton, New York. It specializes in high-end, …</i><br />Target victim <b>website</b>: <i>mcintoshlabs.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Coilplus</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26877</link>
<guid>e6ce7db38187cc8f163c21f26b62879b</guid>
<pubDate>Wed, 05 Nov 2025 12:48:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Coilplus</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a16be965cd033c32d6e4206da0e6a0e94476d3a4300c37adfa996f18108bdfd</i><br /><br />Threat actor <b>description</b>: <i>Coilplus is part of the MetalOne Group, MetalOne is the largest i
ntegrated steel company in the world.

We will upload 14gb of corporate documents soon. Detailed employe
e information (complete I-9 forms, SSN, DL, passports, birth/deat
h certs and so on), financials, internal confidentiality agreemen
ts, NDA, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Durvet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26872</link>
<guid>36609c3d6cf0d6ca0887852c9d84e57d</guid>
<pubDate>Wed, 05 Nov 2025 06:25:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Durvet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>55954ab35b3f7416a9b705f82d6218cbe5eed04629e3d66d129ef7e2ace4d153</i><br /><br />Threat actor <b>description</b>: <i>Healthcare Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ConvExx</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26871</link>
<guid>e055a992677dc62362dc6ceda3245224</guid>
<pubDate>Tue, 04 Nov 2025 20:54:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>ConvExx</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5deaf7bff237acf6a617739ef742953a8b48420e4df50e97ab1ca07525ef1b46</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.convexx.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sellars-Absorbent-Materials</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26870</link>
<guid>a25a6cb241dbe44d927ea9eac5a61172</guid>
<pubDate>Tue, 04 Nov 2025 20:53:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Sellars-Absorbent-Materials</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7a9f7d1c8be0bef4678c8d9838d8424894f480b70b685d124a454e9d6405d62</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.sellarscompany.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-PowerNet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26869</link>
<guid>743c11a9f3cb65cda4994bbdfb66c398</guid>
<pubDate>Tue, 04 Nov 2025 20:52:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>American-PowerNet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>571ddf29e1d86ad269eddd76fa363d996cf718709f7eee637b8633504a14962d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.americanpowernet.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mangos-Tropical-Cafe</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26861</link>
<guid>542a659782a0b10f3b9bf402455d3169</guid>
<pubDate>Tue, 04 Nov 2025 18:25:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Mangos-Tropical-Cafe</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>585e5b29e89d1cf92fe188071d8108d87ab2c80133ab7f346eb0a4faf6902e7e</i><br /><br />Threat actor <b>description</b>: <i>Hospitality</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>MS-Metal-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26863</link>
<guid>5af545e99254638ce9829ea2329f72d4</guid>
<pubDate>Tue, 04 Nov 2025 17:25:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>MS-Metal-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9e9f79d88b151737048b2b6f3e68db1636456ac3c644ebd2c360fd81f59d546</i><br /><br />Threat actor <b>description</b>: <i>MS Metal Solutions offers a wide range of manufacturing capabilities including cutting, welding, and powder coating to cater to diverse industries such as automotive, agriculture, and office furniture. We will upload corporate documents soon. Complete information about employees (w-9 forms containing DOB, SSN, DL, passport, address, email, phone   personal docs scans, credit card details), HR files, financials, internal confidential files, NDA, confidentiality agreements, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Palacios-Marine--Industrial</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26858</link>
<guid>680a8d55cea7984805c47e807c854f84</guid>
<pubDate>Tue, 04 Nov 2025 16:25:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Palacios-Marine--Industrial</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb69fe90966a4029b6ca7f7724441ffb9d3d201c33342510460a69ed5c9cff89</i><br /><br />Threat actor <b>description</b>: <i>Palacios Marine Industrial (PMI)  offers quality contracting and service solutions while prioritizing environmental health and safety. We will upload corporate documents soon. Detailed employee information (passports, driver licenses, medical information, social security number and other scans with personal information), NDA, contracts and agreements, client data, drawings, and other operational data.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Benda-Grace-Stulz</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26859</link>
<guid>8b9f221c0a8ce23d96068fafae80c7ec</guid>
<pubDate>Tue, 04 Nov 2025 16:25:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Benda-Grace-Stulz</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>14c530f28774a6df9f78ed4ad3ebf42d622b9a28f035a3fda389103b8e778ab3</i><br /><br />Threat actor <b>description</b>: <i>You Are Number One at Benda, Grace, Stulz & Co. operates in the Certified Public Accountant business/industry within the Engineering, Accounting, Research, and Management Services sector. Their most valuable assets - our clients. And this company is ready to share 90gb of their data containing the data of their clients. We will upload corporate documents soon. Detailed client financials,a bit of employee personal information, NDA, credit card details, payment information, confidentiality agreements and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Elliott-Tax-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26860</link>
<guid>737b0dc5f7113a4a045cd290bc2ae2d9</guid>
<pubDate>Tue, 04 Nov 2025 16:25:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Elliott-Tax-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33052daad499edec55aa1e98a94aabc54840c988cf1786122e909e87f9edb63d</i><br /><br />Threat actor <b>description</b>: <i>Elliott Tax Service is a local firm in San Mateo specializing in income tax preparation and advice, boasting 27 years of experience. We will upload 82gb corporate documents soon. Client personal documents scans, employee personal information and other HR information. Clients financials and other files, NDA, credit card details, payment details, confidentiality agreements, legal and court documents, police reports, and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Automated-Logistics-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26865</link>
<guid>9bfa4291fb5844d8d79e81724c9d853c</guid>
<pubDate>Tue, 04 Nov 2025 14:51:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Automated-Logistics-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ee8c6483d994914172d16492c5b2af0c68c2b603bf8855dbf8f3f4e24123538</i><br /><br />Threat actor <b>description</b>: <i>Automated Logistics Systems</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>General-Micro-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26857</link>
<guid>ea9be6ea49c5c752abb11953955c90e4</guid>
<pubDate>Tue, 04 Nov 2025 13:24:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>General-Micro-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e3325f3591e952f152a5773e386ffffc47b47840a16e9823ab2d1d2a7a0d2de9</i><br /><br />Threat actor <b>description</b>: <i>General Micro Systems (GMS) is the rugged server company. The company is known as the industry expert in highest-density, modular,compute-intensive, and rugged small form-factor embedded computing systems, servers, and switches.We will upload corporate documents soon. Detailed project information, a bit of client information, financials, confidential military information, NDA, the most interesting thing here is confidential files of Intel corporation concerning Thunderbolt. And they don't care about such data leaked. We'll upload the files soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Invacare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26856</link>
<guid>aa45ea35cbdcb42012f2bf55012a0624</guid>
<pubDate>Tue, 04 Nov 2025 08:43:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Invacare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8f194dc3717c6e41d667df8489dc4b90609cbe33745d3dc80c7785025e9c40b8</i><br /><br />Threat actor <b>description</b>: <i>Invacare Invacare, founded in 1885 and headquartered out of Elyria, Ohio, is a manufacturer and distributor of home and long term care medical products.    More</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crown-Automotive-Sales</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26852</link>
<guid>4a79a7ede1f5c12290122e93a1331a7e</guid>
<pubDate>Tue, 04 Nov 2025 00:48:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Crown-Automotive-Sales</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a1b028c0989187e9d1a914c84109536e3f1fb9372112600825620b20559af3c</i><br /><br />Threat actor <b>description</b>: <i>Crown Automotive Sales Co specializes in providing high-quality replacement parts for Jeep, Chrysler, and Dodge vehicles. With over 8,000 part numbers and a diverse range of applications, the company supplies authorized dealers with essential components for both maintenance and upgrades. Additionally, their RT Off-Road line features performance accessories specifically tailored for Jeep models. The company has been a key player in the automotive parts industry since 1963, serving retailers and dealers exclusively.</i><br />Target victim <b>website</b>: <i>www.crownautomotivesales.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.myriversidedentaloffice.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26850</link>
<guid>7d9a49f74cd1c1740ce05485e41258b8</guid>
<pubDate>Mon, 03 Nov 2025 21:25:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>mydata</b> claims attack for <b>www.myriversidedentaloffice.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48fd3c6560604bf02cd964fa971d40237fa82e7e1eb6d4fe0dbe923ca0876760</i><br /><br />Threat actor <b>description</b>: <i>It is dental practice devoted to restoring and enhancing the natural beauty of your smile using conservative, state-of-the-art procedures that will result in beautiful, long lasting smiles!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>mydata</category>
</item>
<item xmlns:dc='ns:1'>
<title>Irwin-Car</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26851</link>
<guid>50ab6aa42d206917721ed0e79778ab9f</guid>
<pubDate>Mon, 03 Nov 2025 19:22:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Irwin-Car</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>810a813835565e8e26a97ad0e4dceb97029245d0df3ceb91c38c610abe1cc4bc</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.irwincar.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Morris-Communications-Company-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26837</link>
<guid>65f76dcdbd789fbe2623a33ab6b35da0</guid>
<pubDate>Mon, 03 Nov 2025 17:24:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Morris-Communications-Company-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>17bc507f1a4fbf9531a42c1e21a952f0d9610abfc14a879c76764a1a76b0237f</i><br /><br />Threat actor <b>description</b>: <i>Morris Communications Company, founded in 2001 and headquartered in Augusta, Georgia, is part of a privately held company with diversified holdings in media, Real Estate and property development and agriculture.We are ready to upload more than 84GB data. There are lots of essential corporate documents such as: financial data (audit, payment details, invoices), detailed employees and customers information (passports, driver's license , Social Security Numbers, medicalinformation, death/birth certificate, emails, phones) confidential information, NDAs and other documents with detailed personal information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Moonlight-Basin</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26838</link>
<guid>af3de23c3548eaaf65ba6278bacbf607</guid>
<pubDate>Mon, 03 Nov 2025 17:24:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Moonlight-Basin</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f4ed098d3f54ed99e3918e56425f00ff0e17cad33575e5de756707beeb074396</i><br /><br />Threat actor <b>description</b>: <i>Moonlight Basin offers the best snow conditions in Montana, firstclass rental lodging and vacation homes, fine dining, spa services, and easy access to attractions such as Yellowstone National Park and seasonal activities such as fishing, horseback riding, hiking, and rafting, Moonlight Basin is also known for providing anextraordinary level of guest service.We will upload 17gb of corporate documents soon. A bit of client and employee data, lots of internal reports, contracts and agreements, accounting and financial documents, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Designs-for-Vision</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26839</link>
<guid>085dfc68338d1ed37766086a1aee1934</guid>
<pubDate>Mon, 03 Nov 2025 17:24:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Designs-for-Vision</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cf62adcc218575c18dc8ef291eda7bff7cbf8fd680a908617c6199869499d8d0</i><br /><br />Threat actor <b>description</b>: <i>Designs for Vision, Inc. specializes in high-quality magnification and LED headlights for dental, medical, and low vision applications.We will upload about 50gb of corporate documents soon. Lots of project information, a bit of personal information, credit cards details and other financial and accounting information, contracts and agreements, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mecanex-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26840</link>
<guid>1a371879ae7ae905850d5dee733f303e</guid>
<pubDate>Mon, 03 Nov 2025 17:24:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Mecanex-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>74faeb3ff4cc625799e0a5ed637464a3b025c6a4db21799ee073fc9ad2353323</i><br /><br />Threat actor <b>description</b>: <i>Mecanex USA is a U.S. subsidiary of RUAG Aviation. RUAG Aviation is a leading supplier, support provider and integrator of systemsand components for civil and military aviation worldwide. We will upload 24gb of corporate documents soon. Detailed employee information (Social security number, passports, driver licenses, phones, addresses and so on), confidential military information, lots of contracts and agreements (including military), information on how to work with explosive and so on, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bishop-Ireton-High-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26842</link>
<guid>63f6019ca436ea42e23a670f0bca5a8f</guid>
<pubDate>Mon, 03 Nov 2025 15:56:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Bishop-Ireton-High-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d816681e73110c271f43b2ceae1ca5b9c33465ad650588e8913704e0abbc529e</i><br /><br />Threat actor <b>description</b>: <i>Bishop Ayrton High School is a Catholic college preparatory school that focuses on spiritual, intellectual, creative, social, and physical development. The school offers an academic program that includes honors courses and dual enrollment programs, as well as a variety of extracurricular activities, such as sports and arts programs. The school helps students and their families receive an education based on Christian principles that prepares them for future challenges. The school supports the Salesian community, which combines learning and service, encouraging students to participate in community service and personal growth.</i><br />Target victim <b>website</b>: <i>bishopireton.org</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pinto-Coates-Kyre--Bowers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26849</link>
<guid>ba8e2e450af203ab114d338707251486</guid>
<pubDate>Mon, 03 Nov 2025 15:56:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Pinto-Coates-Kyre--Bowers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>76ec1726fe77cd7a819e799296fd2a68eeb3095efb33d86f5d18fc28e892ad72</i><br /><br />Threat actor <b>description</b>: <i>Pinto Coates Kyre & Bowers is a civil litigation law firm based in Greensboro, NC, specializing in defending individuals and corporations as well as representing claimants in diverse legal matters. Due to its easily accessible security, the company was compromised and published publicly! The company and its clients lost a significant amount of confidential information and data!</i><br />Target victim <b>website</b>: <i>pckb-law.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Montage-Marketing-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26834</link>
<guid>980e5ef572c190392a6fe0dd63b3d917</guid>
<pubDate>Mon, 03 Nov 2025 15:24:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Montage-Marketing-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c97971320ea5f18cc008967eba9e21cd3015053fb644616183819d7fe8a81d78</i><br /><br />Threat actor <b>description</b>: <i>Montage Marketing Services is an outsourced contact center specializing in handling peak activity periods and supporting back-office needs through their Customer Contact Center, Custom Fulfillment Center, and Administrative Services.We will upload 26gb of corporate documents soon. Employee and customer information, contracts and agreements, accounting and financial documents, HR files, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Seasons-Federal-Credit-Union</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26835</link>
<guid>8c78bd132fff9eb9d47d4759fb8eda13</guid>
<pubDate>Mon, 03 Nov 2025 15:24:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Seasons-Federal-Credit-Union</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29fbde3042108f19b97a5d4aff123ea04f4256c9982d6c865c4394a710009d37</i><br /><br />Threat actor <b>description</b>: <i>Montage Marketing Services is an outsourced contact center specializing in handling peak activity periods and supporting back-office needs through their Customer Contact Center, Custom Fulfillment Center, and Administrative Services.We will upload 17gb of corporate documents soon. Employee and customer information, w-9 forms, contracts and agreements, confidential files, accounting and financial documents, HR files, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>UnitedLayer</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26843</link>
<guid>719653e675f24537d4cb647537a2a04f</guid>
<pubDate>Mon, 03 Nov 2025 14:10:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>UnitedLayer</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91c1e67d58939067007e4fa3730003863162bdd90c62f607a5c6a53d3fd9a640</i><br /><br />Threat actor <b>description</b>: <i>UnitedLayer® provides the Colocation services from one of the largest data centers in San Francisco, USA, at 200 Paul Ave. Their long list of managed services enables enterprises to modernize their infrastructure and improve their responsiveness, resource utilization, scalability, and agility resulting in better customer experience and faster time to market</i><br />Target victim <b>website</b>: <i>www.unitedlayer.com</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gerson--Schwartz-Accident--Injury-Lawyers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26833</link>
<guid>487cf32249fbaaa5a79258e26d54fe19</guid>
<pubDate>Mon, 03 Nov 2025 12:22:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Gerson--Schwartz-Accident--Injury-Lawyers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63b9b896de062239fbc4bffa882967ef6e4ca35974df8b0de6407405efa1429d</i><br /><br />Threat actor <b>description</b>: <i>A Miami law firm representing victims in all types of legal proceedings related to accidents, injuries, and wrongful death</i><br />Target victim <b>website</b>: <i>injuryattorneyfla.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>REPECHAGE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26830</link>
<guid>0f9d99f598cb439e8e733a3c7bb9892c</guid>
<pubDate>Mon, 03 Nov 2025 10:52:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>REPECHAGE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>00c96b02474b2156769c0ec38830847e9e5d9c28327f74756d8f970b4b5d7aff</i><br /><br />Threat actor <b>description</b>: <i>We have over 1 TB of personal data belonging to this organization, and all attempts at peaceful resolution have been completely ignored. Aware that the addresses, phone numbers, and job titles of individual employees, medical records, and complete data on clients and partners have been lost (and will undoubtedly be used for selfish purposes by a huge number of people), they have shown complete indifference—REPECHAGE we want you to know about this before it is too late.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mayco-International-www.maycointernational.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26825</link>
<guid>20ab3465d85c1a8a408d7d0897f12cc8</guid>
<pubDate>Sun, 02 Nov 2025 23:45:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Mayco-International-www.maycointernational.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>73d486c5b80bf41864fef3dd644fcd95d273efee3dde1be06b8da85ec189763f</i><br /><br />Threat actor <b>description</b>: <i>Data breach at automotive industry leader.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Deco-Dental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26823</link>
<guid>2f96e47253a9f882207e621f642aa2f1</guid>
<pubDate>Sun, 02 Nov 2025 13:16:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Deco-Dental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c2a3916129b540dec9903784d310d81caac31123c30cccf0c2d379c7b08d8d90</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.decodental.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Professionals-Choice-Sports</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26820</link>
<guid>1d9aa373bc6d83a320559b9b7261db73</guid>
<pubDate>Sat, 01 Nov 2025 15:23:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Professionals-Choice-Sports</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7bceafd7e2b5e3b6dc00e72055df65654d46b46c3bad367d9c561a68c6bc838a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.profchoice.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Encore-Repair-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26819</link>
<guid>3980c69a4aef759ee74a882fe274dc84</guid>
<pubDate>Sat, 01 Nov 2025 15:22:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Encore-Repair-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db5f0f8aebe7ab5a7d670306d0c89ec6d8e4ad67f4ef925908fe2bb4eb776556</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.encorerepair.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tavo-Packaging-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26818</link>
<guid>53e2a437534e65b9403677a567069f20</guid>
<pubDate>Sat, 01 Nov 2025 15:21:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Tavo-Packaging-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>05392d425070bed34e7dc5e353723c9d6bce3b9225a58594f16a4027edd00aaf</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.tavopackaging.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wright-Tool</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26817</link>
<guid>95932ec3ba94ee1951d83524c88d8c49</guid>
<pubDate>Sat, 01 Nov 2025 15:21:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Wright-Tool</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>945de4af6d2499fd719a3a31392ca9c598a929e77be2cfbdfec59ce8bb6b79fb</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.wrighttool.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Red-Phoenix-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26811</link>
<guid>dce311e9986a54e3925ea37479f55e10</guid>
<pubDate>Sat, 01 Nov 2025 11:24:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Red-Phoenix-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc3168d3e1d58a93f8499f76c979c5ccbb6f8761914ebbc2a7e1ebe100730bc3</i><br /><br />Threat actor <b>description</b>: <i>Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>aa-llp.com-aa.law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26807</link>
<guid>4b2e0217a0ed46be7207c0acfe2fee53</guid>
<pubDate>Fri, 31 Oct 2025 19:51:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>aa-llp.com-aa.law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bbcf52a026e765c68187a08439d9b7f8da30c68443ae4765e707111d0c188439</i><br /><br />Threat actor <b>description</b>: <i>All criminal cases, clients' personal documents, medical records, and all confidential files were stolen.</i><br />Target victim <b>website</b>: <i>aa.law</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hometown-Credit-Union</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26804</link>
<guid>22f266a9987440c2fcba09a845b638b1</guid>
<pubDate>Fri, 31 Oct 2025 13:25:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Hometown-Credit-Union</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd2501aa7aa54ccf8d50a48259b53e6d2a1296547665569d2554e64e79b1c380</i><br /><br />Threat actor <b>description</b>: <i>Hometown Credit Union offers a range of financial services including savings accounts, checking accounts, consumer loans, and homeequity lines of credit.We will upload corporate documents soon. HR documents with employee personal information (social security number, addresses, phones, emails, driver licenses), lots of financial documents, accounting documents and other internal documents.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gun-Accessory-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26802</link>
<guid>75ab8ec90f11a4f0a172aee44bc801bc</guid>
<pubDate>Fri, 31 Oct 2025 10:25:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Gun-Accessory-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc5a8e5a0e1656bf9b070e3bf43d39b32329565a0e45935f54be9b0a3c9d258f</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>CCI-Tax-Pros-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26803</link>
<guid>1b3ecca102b57d735ac385a9c03fd15b</guid>
<pubDate>Fri, 31 Oct 2025 08:15:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackshrantac</b> claims attack for <b>CCI-Tax-Pros-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9621a3d4d1fdf62f1dd7d5af46fdb5d3acfb0a869a092fc8c837da2a71745bcf</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] CCI Tax Pros, Inc., based in Virginia, USA, is a consulting company that specializes in providing comprehensive tax and financial services to both businesses and individual clients. Their services range from personal tax planning, professional tax return preparation, and representation before tax authorities, to business tax management and strategic planning. Their team comprises of experienced accountants and financial advisors who strive to maximize their clients' savings and returns.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackshrantac</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.verdugohillsdental.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26797</link>
<guid>1c3ef503ecadc5b8674be1540c609009</guid>
<pubDate>Fri, 31 Oct 2025 02:25:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>mydata</b> claims attack for <b>www.verdugohillsdental.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8384c00c302513f8677dcd13cde931b132e9aefa02e815deffcb1e0352bedfa9</i><br /><br />Threat actor <b>description</b>: <i>At Verdugo Hills Dental in Glendale, CA, our experienced team is committed to more than just dentistry—we’re here to ensure your comfort and overall well-being every step of the way. From routine check-ups to advanced restorative treatments, we deliver comprehensive care with a gentle touch, alw...Read more ⇒</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>mydata</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Matlusky-Firm-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26800</link>
<guid>9092e7bee2d622e7c6c5ef8476928917</guid>
<pubDate>Fri, 31 Oct 2025 02:15:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackshrantac</b> claims attack for <b>The-Matlusky-Firm-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3b556deff1ca958ffd07de7b4b7cc0ba11d23dbdfc7c5b25be39f95bb87e158a</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackshrantac</category>
</item>
<item xmlns:dc='ns:1'>
<title>TENAX-Law-Group-PC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26798</link>
<guid>ceb689455a88ec958a3c9e3983f3f5b4</guid>
<pubDate>Fri, 31 Oct 2025 01:21:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackshrantac</b> claims attack for <b>TENAX-Law-Group-PC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb19df379a1c1fc8e27b2374d4fc48d0c8b991ad67e292a4825a733b5e9fafc7</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] TENAX Law Group, P.C. is a U.S.-based law firm that specializes in numerous sectors. Areas of practice include business law, estate planning & trusts, real estate law, civil litigation, among others. It is committed to providing high-quality legal services & personalized solutions to both individuals and businesses. Located in Point Richmond, California, they're renowned for maintaining professional and cost-effective legal solutions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackshrantac</category>
</item>
<item xmlns:dc='ns:1'>
<title>Center-for-Neuropsychology-Learning-and-Development</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26791</link>
<guid>5571df479aa024d28e17f555babd1fcb</guid>
<pubDate>Thu, 30 Oct 2025 19:24:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Center-for-Neuropsychology-Learning-and-Development</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc27a374e14f2cedc82082aad3ce3d7764c4edb04cd35a342b0be53da34a34e4</i><br /><br />Threat actor <b>description</b>: <i>Healthcare Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Post-Ranch-Inn</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26795</link>
<guid>3cbddfc0631041f3bebf720bf2d72e7f</guid>
<pubDate>Thu, 30 Oct 2025 18:50:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Post-Ranch-Inn</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b5966d06d69343e186273429fa515ed0bfbbb971715993e1e843245d55b2f0e2</i><br /><br />Threat actor <b>description</b>: <i>Post Ranch Inn is a luxury hotel situated on the cliffs of Big Sur, offering stunning views and serene accommodations designed for restorative experiences. The hotel features a variety of luxurious packages, exceptional dining options at its acclaimed restaurant Sierra Mar, and engaging wellness activities like yoga and guided nature walks. Catering primarily to couples and those seeking a tranquil getaway, Post Ranch Inn emphasizes sustainability and community investment. Recognized with numerous awards, including a Three-Key MICHELIN distinction, it provides an unforgettable escape for discerning travelers.</i><br />Target victim <b>website</b>: <i>www.postranchinn.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Architectural-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26783</link>
<guid>3855053032ebfd54d04e184091bcbe34</guid>
<pubDate>Thu, 30 Oct 2025 18:24:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Architectural-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>854fc463a073979fd95913fb4c97281b01dadcc62b9e353c6cb1cc7be5768bc3</i><br /><br />Threat actor <b>description</b>: <i>Architectural Systems, Inc. is a full-service partner in the commercial construction industry, dedicated to providing high-qualityproducts and timely delivery.We will upload 355gb of corporate documents soon. Numerous confidential files of clients (drawings of building, security systems),customer information, accounting information, contracts and agreements, client information and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Anderson-Moore-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26785</link>
<guid>8eef6ff991f69d436ef38262bb3eef52</guid>
<pubDate>Thu, 30 Oct 2025 17:25:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Anderson-Moore-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ad46f262fdc0dfdb87fbe6f9f1649bb0b03b1e94e70da0a19c9f5063104dc84</i><br /><br />Threat actor <b>description</b>: <i>Construction</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Huber--Erickson--Bowman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26779</link>
<guid>9c9a06df136e82ebb47c92b32ef7a61b</guid>
<pubDate>Thu, 30 Oct 2025 15:24:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Huber--Erickson--Bowman</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06cabf17361b3fc1718df996b418bb60073e02fa0936c9c78d294f4b262541f0</i><br /><br />Threat actor <b>description</b>: <i>HEB Advisors is Salt Lake City's premier full-service tax and accounting firm with over 45 years of experience, serving individuals, small and mid-sized businesses, government entities, and non-profit organizations.We will upload 66gb of corporate documents soon. We've taken incredibly large amount of personal information of clients and employees (addresses, phones, DOB, driver licenses, social security cards, credit cards and so on and so forth), detailed accounting information, internal confidential files, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Boilersource</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26780</link>
<guid>3b74ab8eb83faf0992aad7a123d02707</guid>
<pubDate>Thu, 30 Oct 2025 15:24:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Boilersource</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb12f57eedbe4795fe6e0d97406c5f46f20357f6cdf7a0755d12b3bc3c03ef1a</i><br /><br />Threat actor <b>description</b>: <i>Meilner Mechanical Sales, doing business as Boilersource, is a third-generation, family-owned and proud WBENC certified business.We will upload corporate documents soon. Employees personal information (addresses, phones, DOB, driver licenses, social security cards, credit cards insurance forms with personal information), accounting information, contracts and agreements, NDA etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sullivan-Interests</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26781</link>
<guid>9c32c3ceb9d37c517bf8ff4b2c517e6d</guid>
<pubDate>Thu, 30 Oct 2025 15:24:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Sullivan-Interests</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7b15e246656107d2c7f7fe7cca91141d503ae27af250c1686b13fb84ad8c5d7</i><br /><br />Threat actor <b>description</b>: <i>The Sullivan Brothers Family of Companies (SBFC) offers a diverserange of services in environmental remediation, disaster recovery, health, construction, infrastructure, and industrial sectors across North America and beyond.We will upload 40gb of corporate documents soon. Employees personal information (passports, addresses, phones, DOB, driver licenses, social security cards, w-9 forms), accounting information, contracts and agreements, incidents and police reports and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Buffalo-Games-Edaron-Ceaco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26782</link>
<guid>ec4a427258aa615cc0b56df3b79683ac</guid>
<pubDate>Thu, 30 Oct 2025 15:24:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Buffalo-Games-Edaron-Ceaco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a85a1b22918dc595cab2b493930c64e29e7b952c855de9de18d89a2016044998</i><br /><br />Threat actor <b>description</b>: <i>Buffalo Games is an American company that specializes in board games and puzzles, headquartered in Buffalo, New York. We also tooksome data from Edaron, Inc. and Ceaco.We will upload 34gb of corporate documents soon. Numerous employee docs (passports, driver licenses, social security cards, w-9 forms), accounting information, contracts and agreements, client information and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>ANSELL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26773</link>
<guid>dd939412d661b27a92e611a89e977f0a</guid>
<pubDate>Thu, 30 Oct 2025 14:17:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ANSELL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2d982295a530be16fd622d20f6481e46da5fd05c7d62dacad0291bcfcfe27b5e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Gerson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26774</link>
<guid>f54b03e4f11c8bd9920741657069c6b6</guid>
<pubDate>Thu, 30 Oct 2025 13:25:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-Gerson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6bbdf7c0995b5b2198bf21ff3ca8fb7d74af740424a40aa80dd8505e47e3e258</i><br /><br />Threat actor <b>description</b>: <i>Gerson is a company specializing in high-quality respiratory protection products, including NIOSH and FDA approved respirators, masks, and filter systems. Their product range includes various styles such as molded masks, half masks, and full face masks, catering to diverse industrial and health needs. We are going to upload company data soon. You will find financialdata (audit, payment details, financial reports, invoices), detailed employees and customers information  (medical information, emails, phones)  and other documents with detailed personal information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>RPI-Roofing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26775</link>
<guid>2948bc9a490e9251ad1c9be2bc2796cb</guid>
<pubDate>Thu, 30 Oct 2025 13:25:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>RPI-Roofing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>09536188f99ae28bcc2326c842c2b69ce299c37099ef2304880c69fcb31e74b7</i><br /><br />Threat actor <b>description</b>: <i>RPI Roofing specializes in providing professional commercial roofing services for businesses in the southeastern United States.We will upload 90gb of corporate documents soon. Detailed employee information (addresses, phones, DOB, driver licenses, social security cards and so on), financial information, internal confidential files, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Econo-Pak</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26776</link>
<guid>1ef97cba05f5ab8401445bec0d6d523f</guid>
<pubDate>Thu, 30 Oct 2025 13:25:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Econo-Pak</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12b30a8d748149bd4854797dce5af24ee7389ed539938493123cc5a6316336ea</i><br /><br />Threat actor <b>description</b>: <i>Econo-Pak is a food packaging expert. They help growing companiesand Fortune 500 clients package food products at a fixed price.We are going to upload company data soon. You will find financialdata (audit, payment details, invoices), detailed employees and customers information  (emails, phones)  and other documents withdetailed personal information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Apache-OpenOffice</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26777</link>
<guid>aa48055d254b34d08c1a88a7c92c58cd</guid>
<pubDate>Thu, 30 Oct 2025 13:25:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Apache-OpenOffice</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7fbcdcb2a4836a094a97641502f6734cd524822a0c625c029233f951ed329e93</i><br /><br />Threat actor <b>description</b>: <i>Apache OpenOffice is an open-source office productivity software suite developed by the Apache Software Foundation. It was createdas a successor project of OpenOffice.org, itself a successor to StarOffice.We will upload 23gb of corporate documents soon. Employee information (addresses, phones, DOB, driver licenses, social security cards, credit cards information and so on), financial information, internal confidential files, lots of reports about their problemswith the application and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>halifax.k12.va.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26787</link>
<guid>56c12a4512e84416de450db11ab040c3</guid>
<pubDate>Thu, 30 Oct 2025 13:09:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>halifax.k12.va.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>130cff506a529880c778ab7b7b659691214db8d6536372780818c68d0da484f2</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>halifax.k12.va.us</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Spindletop-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26772</link>
<guid>2e28dda26c212b9fddfcfa1e44ab97b1</guid>
<pubDate>Thu, 30 Oct 2025 09:53:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Spindletop-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b2ae7622d9d3e87720eed2f7bf72a4de7fb8109971d53d6e6b7c3bfdc17809aa</i><br /><br />Threat actor <b>description</b>: <i>Spindletop Center Spindletop Center is a non-profit healthcare organization focused on providing behavioral healthcare, as well as programs for individuals with intellectual and developmental disabilities and substance use recovery services. Over 100,000 patient records (address, phone number, passport number, social security number, diagnosis, medical history, etc.)</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Evolve-Mortgage-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26770</link>
<guid>c5ba6c2c3073e705c04fab652e3482f3</guid>
<pubDate>Thu, 30 Oct 2025 03:22:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Evolve-Mortgage-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7054d4dc61ab4aa43886913a4058373a1e449789af3e1909d3082e77decbf736</i><br /><br />Threat actor <b>description</b>: <i>Introducing Evolve Mortgage Services, the old company name mrn3.com. We stole more than 20 TB of company data. Including 2TB of databases. This company refused to resolve the issue with us with the security of its customers' data. This company does not care about the safety of its customers. They don't care about leaks and disclosure of your data. We have all the data on all clients of both companies since 2016. SSN numbers, scans of client IDs, home and work addresses, personal, home and work phone numbers, FULL credit history about each client. Personal and confidential PII form information for thousands of citizens of the United States of America.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>nationalcoatingsinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26769</link>
<guid>1adfb4bd48c63abb9cd5e5cb2311b319</guid>
<pubDate>Thu, 30 Oct 2025 01:24:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>nationalcoatingsinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>edcbfb1d60f365f82219873282118dbcf882e2a2f9e954e991efd2cb66ba3421</i><br /><br />Threat actor <b>description</b>: <i>National Coatings is a trusted commercial and industrial painting company servin...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Time-Equities</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26764</link>
<guid>aa40d567c94a14b2e9c126c1b043457d</guid>
<pubDate>Wed, 29 Oct 2025 19:15:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Time-Equities</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c27358f1b200c30ed7d3f50f93afec5eaacdc8e435f65051a5eb8a14363ee641</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Time Equities is a globally diversified real estate firm, founded in 1966, based in New York City. The company focuses on 3 main aspects: acquisition, development, and management of properties. It handles a variety of types, ranging from office and retail to industrial and residential. They have properties in 30 states in the US, as well as in Europe and Canada.</i><br />Target victim <b>website</b>: <i>timeequities.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>OpenEyes-Technologies-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26761</link>
<guid>9978e9e9fb93fb29863fa07903d01010</guid>
<pubDate>Wed, 29 Oct 2025 18:25:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>radar</b> claims attack for <b>OpenEyes-Technologies-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6675c342b7707cf28fa7a9dbc553fa8d2ede8416e1cc79ebbb360cf5463548c4</i><br /><br />Threat actor <b>description</b>: <i>Confidential data from two companies OpenEyes Technologies Inc. and OpenEyes Software Solutions Pvt. Ltd (OPC) Corporate office, Suite #405, 4th Floor, Iscon Atria 1, Gotri Road, Vadodara – 390021, Gujarat – India . OpenEyes Technologies Inc. Headquarter · 1629 K Street, NW Suite 300. Washington, DC 20006 · +1.202.349.5858. Email address. dc@theOpenEyes.com ; ODC (India)</i><br />Target victim <b>website</b>: <i>theopeneyes.com</i>]]></description>
<category>radar</category>
</item>
<item xmlns:dc='ns:1'>
<title>Phillips-Printing-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26744</link>
<guid>6713524ea458bee4d73485010e9c682f</guid>
<pubDate>Wed, 29 Oct 2025 18:24:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>Phillips-Printing-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c4068eca2d0de05f2a97281ff80545047ae4c56718086f1c9b8a86b1c5c18ee</i><br /><br />Threat actor <b>description</b>: <i>This is a commercial printing house that deals with design, offset and digital printing.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bell-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26745</link>
<guid>75ad20f9c546aef9e9fcc21e08a8a3dd</guid>
<pubDate>Wed, 29 Oct 2025 17:25:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Bell-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d402d6a6f14d080917c8ed5c8dab4d0b8f5cfaa43e759dcec32bc2e8de813475</i><br /><br />Threat actor <b>description</b>: <i>Founded in Lexington, Kentucky in 1914 by Howard K. Bell, Bell Engineering has earned a solid reputation as a provider of solutions-based, innovative engineering applications that fulfill the needs of communities and industries around the country.We will upload corporate documents soon. Clients information, employee information, detailed financial information, projects, contracts and agreements, lots of specifications and drawings, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ritz-Clark--Ben-Asher</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26746</link>
<guid>a3171cc0f610fdfdf460831fb25a3dc7</guid>
<pubDate>Wed, 29 Oct 2025 17:25:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Ritz-Clark--Ben-Asher</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>93b6cb22ffb6df0154f063540916586d8560b2b63d637f201a21930bacc532df</i><br /><br />Threat actor <b>description</b>: <i>Ritz Clark & Ben-Asher LLP is a nationally recognized law firm focused on representing individuals facing employment-related legalissues.We will upload 109gb of corporate documents soon. Lots of clientsdocuments (passports, driver licenses, social security numbers, I-9 forms, and so on), same information of employees, detailed financial information, lots of legal documents, court cases, hearings, police reports, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Price--Ramey-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26760</link>
<guid>73bf740ed941e13e76e67049a5165b91</guid>
<pubDate>Wed, 29 Oct 2025 16:54:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Price--Ramey-Insurance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>725a2faf2f1c3ca4fcfb0fa1b8301cc5704970e4f4e1888fb80ab63fabee2f11</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.priceramey.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wright-Gardner-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26742</link>
<guid>497e5e9501f2ffbc07b4db02c8c5421e</guid>
<pubDate>Wed, 29 Oct 2025 16:25:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Wright-Gardner-Insurance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9fdbc09853263fd905cc8d1dacacf3c0f05e433e9dbce3efd5310cd7e86e1978</i><br /><br />Threat actor <b>description</b>: <i>Wright-Gardner Agency offers customized insurance solutions for individuals and businesses, including home, auto, life, and commercial insurance options.We will upload more than 12gb of corporate documents soon. Clients and customers information (financials, contacts, contracts), detailed employee information (DOB, driver licenses, phones, addresses, emails, emergency contacts and so on), lots of confidential files, contracts and agreements, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clarion-Safety-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26750</link>
<guid>10ce671d55af2d7a7be6fbc8d028cdf1</guid>
<pubDate>Wed, 29 Oct 2025 16:19:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Clarion-Safety-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>82ba9b39728c704522a3647af2004e940ead0b497d0f6c3e0745a68f486d3882</i><br /><br />Threat actor <b>description</b>: <i>Clarion Safety is at the forefront of product and workplace safet
y communication, leading the best practice ANSI and ISO standards
in these areas for over three decades. 

We will upload more than 40gb of corporate documents soon. Client
and customers information (addresses, phones, DOB, numerous form
s with personal information), employees information (DOB, phones,
emails and other HR information), detailed financial information
, confidential files, NDA, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>reesegroupinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26758</link>
<guid>acd58adfb79073f8cbe2bdc0a3201968</guid>
<pubDate>Wed, 29 Oct 2025 15:24:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>reesegroupinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>43f8c6e6165c68d4f52c57c021a91318178f23f56cde24b7b18dd7708ef1faba</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>reesegroupinc.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>southernspecialtysupply.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26747</link>
<guid>d8e04b16451f7f67a5da5005d4e032ee</guid>
<pubDate>Wed, 29 Oct 2025 15:23:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>southernspecialtysupply.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1127203fd0de25a1b3c3527bbb1c15180d902e11b0b70119c0f0cec2772c96c</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.southernspecialtysupply.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>tanyacreations.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26748</link>
<guid>8e6386593ca0e8602ff05a069fa23777</guid>
<pubDate>Wed, 29 Oct 2025 15:23:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>tanyacreations.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>daa9281d79cd88d1708fc076e709203ba8c749d5932377dd72867dc549026007</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.tanyacreations.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Simon-Property-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26743</link>
<guid>e150c862ec07920e8c0a6809302fb2a2</guid>
<pubDate>Wed, 29 Oct 2025 15:17:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Simon-Property-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b06296fa3bad1d27287c3226d4515b461ac48c3b9ef9312d16ca77e5d8f96aa</i><br /><br />Threat actor <b>description</b>: <i>Simon Property Group is a leading real estate investment trust (REIT) based in Indianapolis, Indiana. Founded in 1993, it owns, develops, and manages premier shopping malls, outlets, and lifestyle centers across the United States and internationally. The company’s well-known properties include Premium Outlets and The Mills centers. Led by CEO David E. Simon, it focuses on creating high-quality retail and entertainment destinations that attract millions of visitors each year. Despite challenges from online retail, Simon Property Group continues to innovate by combining shopping, dining, and mixed-use spaces, maintaining its position as a global leader in retail real estate. company is headquartered in 225 West Washington Street, Indianapolis, Indiana 46204, USA. 3,000 employees </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>renrns.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26755</link>
<guid>b105ac0f79d9e167dbc3ea6d69e6145a</guid>
<pubDate>Wed, 29 Oct 2025 13:55:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>renrns.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7473d7f444329231656c5e630b3ceb3002759cc173426963539170cf5600ba0</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>renrns.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>upea.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26754</link>
<guid>ead3f24f650fcf6d8936af5c23ecafc4</guid>
<pubDate>Wed, 29 Oct 2025 13:54:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>upea.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>934097135500afa3e91cc8de65a61162e7d9a7e451481682ba62d06dd6046b71</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.upea.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>chirhochiropractic.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26753</link>
<guid>8ad259d840bf6a763d6c1805d5c714c8</guid>
<pubDate>Wed, 29 Oct 2025 13:53:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>chirhochiropractic.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>caeafc77174d7d1a9ea3c09e71a8459f27f563bafcf1c97f828806fda885cd50</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.chirhochiropractic.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>echolakefoods.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26751</link>
<guid>3fa14ed7b5855de1e9a3cf48677fa60c</guid>
<pubDate>Wed, 29 Oct 2025 13:52:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>echolakefoods.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af905c9c561c93267fe61ad93287084c02124cb75216ef058a9d51f5c88d2460</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>echolakefoods.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sadler-Gibb--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26738</link>
<guid>423e44c6ee3fc6678aefa0f854160482</guid>
<pubDate>Wed, 29 Oct 2025 13:24:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Sadler-Gibb--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>542101c5d3525fe982e3930821cb4092324c08993693da0acaca5bd5dbc7b29a</i><br /><br />Threat actor <b>description</b>: <i>Sadler Gibb is a certified public accounting firm dedicated to providing professional financial services to businesses and individuals. They specialize in tax planning and preparation, financial statement audits, business advisory, bookkeeping, and payroll processing. We are ready to upload more than 65GB data. There are lots of essential corporate documents such as: financial data (audit, payment details, invoices), detailed employees and customers information (passports, driver's license , Social Security Numbers, death/birth certificate, medical information, emails, phones) confidential information, NDAs and other documents with detailed personal information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>G--H-Distributing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26734</link>
<guid>88186ae4f3d59234d5b515b1ca86660f</guid>
<pubDate>Wed, 29 Oct 2025 11:25:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>G--H-Distributing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25e002ae07560acf2692c30eefa6b1c2e306881467eea593222f260a82a9139f</i><br /><br />Threat actor <b>description</b>: <i>GH Distributing Inc. is a prominent agricultural and industrial supply distributor in South Dakota, known for its retail and wholesale operations.This company will soon be known as another one that doesn't care of employee information. We will upload corporate documents soon.You will find lots of 2-9 forms with addresses, phones, emails and other information of employees. Also there are accounting files, projects, client information and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bridgehead-I.T</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26735</link>
<guid>83d8be72f731a9977c2ac9e41807ac0d</guid>
<pubDate>Wed, 29 Oct 2025 11:25:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Bridgehead-I.T</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b3c06e6cb60518bf7e10547a04be9975f37c12bce60df77b6e99a02f9e4897e</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1999, Bridgehead I.T. Inc. provides customized Information Technology (IT) solutions for businesses across all industries. Bridgehead I.T. services are specifically engineered for eachclient needs. Bridgehead I.T. is headquartered in San Antonio, TX.We are going to upload company data soon. You will find financialdata (audit, payment details, invoices), personal financial details of employees, accounting files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pritchard-Brown--Chillicothe-Metal</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26733</link>
<guid>4ec227f2c9f8dd31ccb23834f1022721</guid>
<pubDate>Wed, 29 Oct 2025 06:24:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Pritchard-Brown--Chillicothe-Metal</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1da4c8fc99a5ec8f940f00ee3f1a37a3a81670fb254b69b0c3a0f9b4e75d581</i><br /><br />Threat actor <b>description</b>: <i>Pritchard Brown and Chillicothe Metal Company (CMCO) are two manufacturers that collaborate to develop comprehensive solutions in the field of protective enclosures and microclimate control systems. Founded in 1947, Pritchard Brown specializes in custom-designed protective enclosures, offering a range of weatherproof, weather-resistant, and noise-absorbing models specifically designed for harsh operating environments. With over 50 years of experience, Chillicothe Metal Company complements Pritchard Brown's offerings by specializing in protective enclosures and complete generator sets. Operating in a wide range of industries, including energy, utilities, petrochemical, mining, and defense, CMCO has completed more than 40,000 projects at facilities around the world. Its expertise in design, engineering, and manufacturing is evidenced by its work on high-profile projects such as the Statue of Liberty and NASA.</i><br />Target victim <b>website</b>: <i>pritchardbrown.com & cmcousa.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Florida-Spectrum-Environmental-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26729</link>
<guid>35b47299c1130953d286c976e9c608dc</guid>
<pubDate>Tue, 28 Oct 2025 22:53:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Florida-Spectrum-Environmental-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a1686f90eb09135d17c44d4896916410c0aed24feab2c0cafd2adfc4954c9d8</i><br /><br />Threat actor <b>description</b>: <i>Florida-Spectrum Environmental Services, Inc. is a premier full-service environmental testing and analytical chemistry laboratory specializing in the assessment of contamination in various mediums, including water, soil, and hazardous wastes. With over 40 years of experience and multiple locations in Florida and Georgia, the company serves the Engineering, Consulting, Chemical, Petroleum, and Waste Management industries. They offer a range of analytical and sampling services, supported by a commitment to superior service and client satisfaction through dedicated Client Service Managers. Their philosophy emphasizes building partnerships with clients, ensuring that the data quality objectives of environmental projects are met efficiently.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>WarmBlue</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26728</link>
<guid>6c0924840f28f96026147e2cde8420af</guid>
<pubDate>Tue, 28 Oct 2025 21:49:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>WarmBlue</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f8fba7754e7cf8fa97391bd7f2d59db3832b7654372f9c567d312216a040a2db</i><br /><br />Threat actor <b>description</b>: <i>Small company</i><br />Target victim <b>website</b>: <i>www.warmblue.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Heimbrock</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26725</link>
<guid>9a65d8f681eb161006ac959a570600f5</guid>
<pubDate>Tue, 28 Oct 2025 21:18:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Heimbrock</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8def9888c0b2e137d35ce4915a15c9aa5e0f7169c4be64263e611769afd00f59</i><br /><br />Threat actor <b>description</b>: <i>Heimbrock Inc. is a national refractory contractor.</i><br />Target victim <b>website</b>: <i>heimbrock.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eligibility-Tracking-Calculators</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26727</link>
<guid>a4376b1e16378bd96b9ca18a1efb03a8</guid>
<pubDate>Tue, 28 Oct 2025 21:14:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackshrantac</b> claims attack for <b>Eligibility-Tracking-Calculators</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>98b00bff53b61e9461e557dbf943bd4aad9d19da1af756275ec58095b6022f67</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "Eligibility Tracking Calculators" (ETC) is a company that offers technological solutions for employee benefits management. It provides software applications that help employers, insurance brokers, and CPA firms to track and calculate their employee benefits eligibility efficiently. This assists organizations in adhering to various legal compliance requirements related to employee benefits.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackshrantac</category>
</item>
<item xmlns:dc='ns:1'>
<title>MASTEC.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26705</link>
<guid>066dac329055466b3d5094adc421744f</guid>
<pubDate>Tue, 28 Oct 2025 19:24:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MASTEC.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>199a5002b9020dd6b6437baf7d31454109623a96111192bbb4fa8b763614be4d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lorber-Greenfield--Polito-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26722</link>
<guid>610126195c0f6e4df38f399c3325aecb</guid>
<pubDate>Tue, 28 Oct 2025 18:20:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Lorber-Greenfield--Polito-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97050bfa8c87b289a8d34fb510b24617dff0c8f98b641693d70eb5f5032e56ee</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.lorberlaw.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gemini-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26721</link>
<guid>a16b5a3c25b73ce4e3445e369749dd43</guid>
<pubDate>Tue, 28 Oct 2025 17:43:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Gemini-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>295e4f44cf24180e6678982afe9da61403ad7b709fc7c283599ff23c76366540</i><br /><br />Threat actor <b>description</b>: <i>Gemini Group</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Henry-Raymond--Thompson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26720</link>
<guid>24ed200dcfcc1b04fad9d6e361e41ac9</guid>
<pubDate>Tue, 28 Oct 2025 17:41:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Henry-Raymond--Thompson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c9591050c71f74b85e39b95478efc909c7a993ec44dbf71a40bed43d874111e3</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.hrmtcpas.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Evogence</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26719</link>
<guid>58977814981a9bab5e4495ab61d13efa</guid>
<pubDate>Tue, 28 Oct 2025 17:40:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Evogence</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>efa478c89e1afacdd1936862fe2b51cbee0aeb972274b25d79c02efe650bb40e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.evogence.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Super-Quik</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26718</link>
<guid>e704bb84211a84111e4c138a17e68edb</guid>
<pubDate>Tue, 28 Oct 2025 17:40:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Super-Quik</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7e6223e95a57c799497b83521f4b325fae838baffb21ad28690a1f5ff9b4c93</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.superquik.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aphase-II</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26716</link>
<guid>4815717d5a93704f7d9f0e23dd3d78fc</guid>
<pubDate>Tue, 28 Oct 2025 17:38:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Aphase-II</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>93ee9fe49ed38a3149dc7d316f5fc851796a63dcbdad6d68ca8834d83f7ec8ce</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.aphaseii.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kitchen-Design-Concepts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26715</link>
<guid>36bf351df23d91002df48e5c8c78e635</guid>
<pubDate>Tue, 28 Oct 2025 17:38:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Kitchen-Design-Concepts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a7f434ab4ba43482969a13db78f634713a53a1d4fc2434eabc64495cbac0910</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.kitchendesignconcepts.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sylvester-Roofing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26712</link>
<guid>621937d0e97e2559f2170a66a2218089</guid>
<pubDate>Tue, 28 Oct 2025 17:36:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Sylvester-Roofing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6b4e026888f0af47a992d05fb0085a1aecc6973d44b70632f9ddc446d452ac2</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.sylvesterroofing.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>BK-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26698</link>
<guid>45b60dbddc4b267a67ced2c509beb4f2</guid>
<pubDate>Tue, 28 Oct 2025 17:24:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>BK-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af2f4616eb9bb7090ee3e8a5a297cc21f389fac8bf8e57de0776de9c7a39f743</i><br /><br />Threat actor <b>description</b>: <i>BK Technologies mission is to remain deeply rooted in the critical communications industry for all military, first responders, andpublic safety heroes.We will upload 25gb of corporate documents soon. Employees information (phones, emails, addresses, medical cards and so on), accounting and financials, lots of confidential agreements, military contracts, contracts with BOSCH and other companies, NDA, credit card information, payment details, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Boyer</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26699</link>
<guid>1124ba177f7d0f77f243297b70d5b005</guid>
<pubDate>Tue, 28 Oct 2025 17:24:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Boyer</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e494613f2b2be43bed3a988df371710fa24fceb942548feae6b62e8ad350351</i><br /><br />Threat actor <b>description</b>: <i>Boyer Company is a leading commercial real estate development andconstruction management firm based in the Western United States.We will upload more than 13gb of corporate documents soon. Clientinformation, detailed accounting and financials, w-9 forms with personal information, lots of agreements and other internal docs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>fhw.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26711</link>
<guid>45fe7c4d0a9c4104b3157fea2f233ad5</guid>
<pubDate>Tue, 28 Oct 2025 17:14:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>fhw.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c782cc052c45ffd358875c53992264d6790b9405ae2b82213a18652908e273b9</i><br /><br />Threat actor <b>description</b>: <i>Ransom: 700k
120gb</i><br />Target victim <b>website</b>: <i>fhw.org</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bergman-Dacey-Goldsmith</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26693</link>
<guid>14d9f3a29e7fb45297564da4fe44473e</guid>
<pubDate>Tue, 28 Oct 2025 14:24:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Bergman-Dacey-Goldsmith</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9676464a3b93639773e61cf4147308dcec3e0d8aef5b5c12cff7243abe9064f0</i><br /><br />Threat actor <b>description</b>: <i>BDG Law Group is a full-service law firm based in Los Angeles, specializing in business litigation, construction law, real estate,and various other legal services. We will upload 110 GB of corporate documents soon. Complete personal information of employees and clients (phones, emails, addresses, driver licenses, passports, social security numbers, confidential legal files, court hearings, police reports, medical information and is on), accounting and financials, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>CESO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26696</link>
<guid>a03175e68893309a3c69d0b9e018bcca</guid>
<pubDate>Tue, 28 Oct 2025 14:08:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>CESO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a8a8a0d50d723dccf8eba89d488822855c1dbc5a81b3bb33dba73e31d4e7839</i><br /><br />Threat actor <b>description</b>: <i>CESO is a comprehensive firm offering multi-disciplinary capabili
ties through our ability to provide surveying, landscape architec
ture, civil engineering, environmental, architecture, and interio
r services to our clients.

We will upload corporate documents soon. Very detailed personal e
mployees information (passport scans, SSN lists, driver licenses,
phones, emails, addresses, medical cards and so on), accounting 
and financials, confidential clients projects and other files, lo
ts of NDA, credit card information, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Productive-Tool-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26697</link>
<guid>2e7f535455049bda7e8c9df49e3d293c</guid>
<pubDate>Tue, 28 Oct 2025 13:48:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Productive-Tool-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d35020c3db25fa397ec52a5789977252f7c7f2f0ac2417f8c7412459132a7df2</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.ptpsystems.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bellflower-Unified-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26695</link>
<guid>ff0a431a29c728e766168d412be85567</guid>
<pubDate>Tue, 28 Oct 2025 12:55:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Bellflower-Unified-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc73d24e9a17697a89a88ec0f429ceafeef2155e1069082cb4f4f2c2251a9342</i><br /><br />Threat actor <b>description</b>: <i>Bellflower Unified School District Headquartered Bellflower, California, Bellflower Unified School District is a general education district that offers K-12 classes.    More</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Axelson-WilliamowskyBender--Fishman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26692</link>
<guid>2d564b42a715a624dbc939d5434e6262</guid>
<pubDate>Tue, 28 Oct 2025 12:24:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Axelson-WilliamowskyBender--Fishman</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>41194a9e3a1a2d55ca548463f2041968b25dc8bcf8dfd516c21f66452223c5b5</i><br /><br />Threat actor <b>description</b>: <i>Axelson, Williamowsky, Bender & Fishman, P.C. is a full-service law firm serving the Washington Metropolitan Area with over 100 years of combined experience. They offer a wide range of legal services including personal injury, family law, estate planning, realestate, and business law. We are ready to upload more than 100GB data. There are lots of essential corporate documents such as: financial data (audit, payment details,financial reports, invoices), detailed employees and customers information (passports, driver's license , Social Security Numbers, medical information, emails, phones) confidential information, NDAs and other documents with detailed personal information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Riddell-Law-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26694</link>
<guid>9577390e8eeb4fae6241266d2f2ab279</guid>
<pubDate>Tue, 28 Oct 2025 11:11:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Riddell-Law-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1fe97dbce8463a709fd014c7a06f7738a55b812fee6ca253701edaae3e19736c</i><br /><br />Threat actor <b>description</b>: <i>Real Estate Law, Title Insurance, Probate Estate Planning, Bankruptcy, Foreclosures/Short Sales</i><br />Target victim <b>website</b>: <i>rlglawfirm.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jimfor-S.A.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26691</link>
<guid>408c43f7f18fd6b4f50bf3857aecbd3f</guid>
<pubDate>Tue, 28 Oct 2025 05:11:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ciphbit</b> claims attack for <b>Jimfor-S.A.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe7657620d0a90efbb07dcc7c5eb8ec6f1f2d6991433ccef236dd5a3d2edbcf0</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>jimfor.com</i>]]></description>
<category>ciphbit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advantage-CDC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26687</link>
<guid>ffc7ad29e9362b828655bba4a3fe60dc</guid>
<pubDate>Tue, 28 Oct 2025 02:13:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Advantage-CDC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1336d7009aa7dbd41de4d9ffe1c36dcf9db839cf10f8b08b286359ca3eee723c</i><br /><br />Threat actor <b>description</b>: <i>A company that provides long-term loans</i><br />Target victim <b>website</b>: <i>advantagecdc.org</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kipp--Christian</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26688</link>
<guid>4cb9b6afe97b8c5fffb19af9227f8a36</guid>
<pubDate>Tue, 28 Oct 2025 02:13:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Kipp--Christian</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a615e20ad94294f54c59e7d043ee22e7c7c1dac2320da2c7f0f57c5e838afe6e</i><br /><br />Threat actor <b>description</b>: <i>A law firm located in Salt Lake City</i><br />Target victim <b>website</b>: <i>kippandchristian.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cohens-Fashion-Optical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26689</link>
<guid>2c1b748dffe74069de48429ee20cfc96</guid>
<pubDate>Tue, 28 Oct 2025 00:26:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Cohens-Fashion-Optical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a49f70c13d9d476c9eceb2b10e7235046fd0ba8240d4640bc29eec496b1ed5e7</i><br /><br />Threat actor <b>description</b>: <i>Cohen's Fashion Optical (formerly known as Cohen's Optical) is an optical retailer headquartered in New York City featuring fashion products such as eyeglasses, frames and sunglasses, lenses, contact lenses, and accessories. Professional eye exams are usually available with on-site Doctors of Optometry</i><br />Target victim <b>website</b>: <i>cohensfashionoptical.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>usbmemorydirect.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26686</link>
<guid>cf1974d028f1a6ad6378cdc9539853b3</guid>
<pubDate>Mon, 27 Oct 2025 20:47:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>usbmemorydirect.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26dd35e0074f20229b5f7f285756a02f305b60c538229a59d156603724996848</i><br /><br />Threat actor <b>description</b>: <i>Personal data (individual names, photos, etc.), company/business data (company names, services, tools, equipment), backup copies, system archive compressed files, internal documents and project files, and more.</i><br />Target victim <b>website</b>: <i>usbmemorydirect.com</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>MedImpact-Healthcare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26681</link>
<guid>53cdd4182f8d7e4b71e9b598f46f814b</guid>
<pubDate>Mon, 27 Oct 2025 20:18:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>MedImpact-Healthcare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f15d1ff7572369ad384ff43aee76ad6da340d4a60fbeb4f1d203d09af207694</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.medimpact.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Navigator-Business-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26680</link>
<guid>5b6f477594a1fa41586e0ee57d76daba</guid>
<pubDate>Mon, 27 Oct 2025 20:15:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Navigator-Business-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c70bbc6950aa84015d500af7619e2407c4592367d1abe5ec746a61985b71d47</i><br /><br />Threat actor <b>description</b>: <i>Life Sciences/Biotechnology, Distribution, and Consumer Products Organizations come to Navigator Business Solutions when they find their ability to grow and or adapt is being limited by their current business processes and systems.</i><br />Target victim <b>website</b>: <i>www.navigatorbusinesssolutions.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>SanDiego-Automotive-Museum</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26674</link>
<guid>37db198a94d1b7770f36244f1fda20ca</guid>
<pubDate>Mon, 27 Oct 2025 18:25:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>SanDiego-Automotive-Museum</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1f34aec300db53bce97d0511375ad08014e2b551bd3c52388294a43be20cf16</i><br /><br />Threat actor <b>description</b>: <i>The San Diego Automotive Museum is a premier transportation museum located in Balboa Park, dedicated to showcasing the history and evolution of motorized vehicles through its collections and exhibitions. It offers educational programs and community events aimed at both automobile enthusiasts and casual visitors. The museum services local residents and tourists, providing a rich experience for anyone interested in the social and technological impact of vehicles. With various membership options and ongoing events, the museum also focuses on career exploration and hands-on learning through its IGNITE Academy.</i><br />Target victim <b>website</b>: <i>www.sandiegoautomotivemuseum.org</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Double-Oak-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26676</link>
<guid>efdbf45bfc950fc5a2ac0e1511a354b8</guid>
<pubDate>Mon, 27 Oct 2025 18:21:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Double-Oak-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6144c374eede664fa3418a735eb6ed2f295fd0f780c2d98dbe53cd1b9ce17cf7</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.doubleoakinc.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Engineered-Profiles</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26660</link>
<guid>faa346cce8568de3e8822f5857d6b918</guid>
<pubDate>Mon, 27 Oct 2025 17:24:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Engineered-Profiles</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56d074eccfe0451cfd1f057f4c8a02f4b94f40e1d12547d03976a4e72746d719</i><br /><br />Threat actor <b>description</b>: <i>Engineered Profiles specializes in high-quality plastic extrusion, design, and advanced manufacturing technologies.We are ready to upload more than 56gb of corporate documents. Employee information (social security cards, driver licenses, medical information, addresses, phones and so on), projects, customer information, accounting, confidentiality agreements, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Henrietta-Ezeoke-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26669</link>
<guid>69a2835d20b8290bc7984b8aa6538f89</guid>
<pubDate>Mon, 27 Oct 2025 17:11:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Henrietta-Ezeoke-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>07f5e7c38df1e6c4f4ad788e2d91e8c1e60a2c40157a38f1c4995003f1ac8f8f</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>houstonwrongfuldeathlawyers.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Izaki-Group-Investments</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26668</link>
<guid>b68e8a73610d9aeeef7b5a2bfffbcb7f</guid>
<pubDate>Mon, 27 Oct 2025 17:10:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Izaki-Group-Investments</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d4c613d7bb5872a85aec973cf0f08e4c05aa402c408d6f58c2132fdf5dee252a</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>www.izaki-group.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Maki-Building-Centers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26666</link>
<guid>b34caaa41c545122c9b31631174b7015</guid>
<pubDate>Mon, 27 Oct 2025 15:48:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Maki-Building-Centers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56e689e86b0a8188aded5cbb08a369bfdc60280bdec1a55a7a18c0133af33c67</i><br /><br />Threat actor <b>description</b>: <i>Maki Building Centers is a company engaged in commerce and manufacturing with three branches in central Massachusetts. The company has warehouses, manufacturing facilities, large volumes, and financial resources! Security was very low, and the entire system was successfully compromised and taken over. Company, employee, and customer data ended up in our hands and, accordingly, in the public!</i><br />Target victim <b>website</b>: <i>makicorp.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Abilene-Family-Medical-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26662</link>
<guid>858ec5a3b980fd513684df12b8683db9</guid>
<pubDate>Mon, 27 Oct 2025 13:12:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Abilene-Family-Medical-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>660062de0f910e168720ba3ab89d971a073505591b786943cfdf67af03f90b3c</i><br /><br />Threat actor <b>description</b>: <i>Abilene Family Medical Associates</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Flegenheimer-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26656</link>
<guid>0a979f021ded11b1db1a9468d6a65826</guid>
<pubDate>Mon, 27 Oct 2025 11:24:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Flegenheimer-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f8c394f0927cb49a4b417664022ed0586f8020859bec3592168459202731732</i><br /><br />Threat actor <b>description</b>: <i>Flegenheimer International is Licensed Customs Broker company based out of 227 W Grand Ave, El Segundo, CA, United States.We are ready to upload more than 16gb of corporate documents. Employee information (address, phones and so on), customer information, accounting and other business files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Miami-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26657</link>
<guid>389c96d539ed67bd670f0a32d9765469</guid>
<pubDate>Mon, 27 Oct 2025 10:49:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Miami-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77b07040eea1e6d64ad61442e97521923d95e06388b5876b410a66884935c2a4</i><br /><br />Threat actor <b>description</b>: <i>A licensed and insured company providing a full range of property management services</i><br />Target victim <b>website</b>: <i>miamimanagement.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>LaBonne</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26649</link>
<guid>bc27eb4af89384b95ab89cc980814502</guid>
<pubDate>Sun, 26 Oct 2025 19:49:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>LaBonne</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c0af67fdd8c336c78e8d2c8ccfb5bd973e1d9ad41ec185d14050fabaee6b503</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.labonnes.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Metal-Pros</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26648</link>
<guid>e74f0b8cc8a53963231216f649076da0</guid>
<pubDate>Sun, 26 Oct 2025 19:48:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Metal-Pros</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f3912e621fa7cfb1adede18c24ca4fcf962de6753ad60b28c356bbbb5d33f99b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.metalprosllc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>South-Alabama-Regional-Planning-Commission</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26644</link>
<guid>612b1105e9636bffe0afd71b33a854a8</guid>
<pubDate>Sun, 26 Oct 2025 16:24:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>South-Alabama-Regional-Planning-Commission</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ffc659c694c9f45e1f84c4fb7fb1f96520ae7b219d736c19969f06c4382afc9</i><br /><br />Threat actor <b>description</b>: <i>SARPC is a locally controlled and organized instrument of local government in Southwestern Alabama, serving Mobile, Baldwin, and Escambia counties, along with twenty-nine municipalities. The organization provides programs and services focused            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>auge.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26643</link>
<guid>de06ce4800bd5a95f4dc7312700c3e3e</guid>
<pubDate>Sun, 26 Oct 2025 11:55:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>auge.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d47be95383943acdd506a169bfffef5e89215be332e3fabeb62c36408e7f0def</i><br /><br />Threat actor <b>description</b>: <i>Industrias Auge S.A de C.V is a company that specializes in manufacturing and distribution of commercial and specialty alloy fasteners, including machined components. It offers alloy fasteners, machined components, anchoring systems, line pipe, boiler and heat exchanger tubing, casing tubing, platings & coatings, fittings, flanges, and structural material. The company was founded in 1965 and is based in Houston, Texas  We have contracts, data of all employees of the company internal mail, drawings and more at our disposal. We will share all this.</i><br />Target victim <b>website</b>: <i>auge.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Latona-Trucking</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26640</link>
<guid>5b85f7b702c448f83eb60d77551e20f3</guid>
<pubDate>Sun, 26 Oct 2025 08:24:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Latona-Trucking</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>786e636c686271dc334c43a8ee44cb8c57bdec936fea594f4b1f588e82a71868</i><br /><br />Threat actor <b>description</b>: <i>latonatrucking.com is a company that operates in the Transportation industry. It employs 100to249 people and has 1Mto5M of revenue.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Saturn-Machine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26641</link>
<guid>6c9c4ca27e9848025ab5cc56702e797b</guid>
<pubDate>Sun, 26 Oct 2025 08:24:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Saturn-Machine</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c2a5da1c834d1851d592a65a204cf9df9d013f08f607b5d6b4241aa70a03296</i><br /><br />Threat actor <b>description</b>: <i>Saturn Machine is a leading designer and manufacturer of equipment for major steel companies in North America, specializing in steel fabrication, machining, las...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>West-Welch-Reed-Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26642</link>
<guid>08c7bab8988c8f289a3e47c2700dac52</guid>
<pubDate>Sun, 26 Oct 2025 08:24:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>West-Welch-Reed-Engineers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>02357442925628be59bdee76321e4e99299c17cb4d47b4680c92177a3267a39d</i><br /><br />Threat actor <b>description</b>: <i>West, Welch, Reed Engineers, Inc. offers engineering services focused on transforming ideas into tangible projects. They cater to a diverse range of clients, pr...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Precision-Machined-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26638</link>
<guid>79a00b87195cb584d0b3b5358e19f795</guid>
<pubDate>Sat, 25 Oct 2025 22:25:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Precision-Machined-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>62129e0a67f21dbaf8469402536ea90ceac18555b707dddacc929aa313def1bf</i><br /><br />Threat actor <b>description</b>: <i>Precision Machined Products is a tier one supplier of downhole equipment for the Oil and Gas Industry.We are ready to upload more than 12gb of corporate documents. Employee information and other HR files, projects, internal confidential files, clients confidential files, lots of specifications and drawings, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Essential-Cabinetry-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26636</link>
<guid>47ff2df82c7ee1eee6a617829de46b22</guid>
<pubDate>Sat, 25 Oct 2025 21:24:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Essential-Cabinetry-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3b65e082bdc37fd34795a93f2120f9424a3c838e493fab236dd99ff418486539</i><br /><br />Threat actor <b>description</b>: <i>Simpsonville, SC-based Essential Cabinetry is a manufacturer of custom, semi-custom and stock-plus kitchen and bathroom cabinetry that is sold primarily through the dealer channel. Through its three market-leading brands (Tedd Wood Fine Cabin            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Adore-Children-and-Family-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26631</link>
<guid>5636cbbbf9d5624b172862ee276bec73</guid>
<pubDate>Sat, 25 Oct 2025 18:21:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Adore-Children-and-Family-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be77c40ac8d662dbf7cff4bf33b8f16324210b1176e72108fe367302caee9edb</i><br /><br />Threat actor <b>description</b>: <i>Adore Children and Family Services is a foster care agency dedicated to providing substitute care for children in need. The organization offers a comprehensive range of services, including individual case management, behavioral assessments, and training for foster families.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Sugar-Land</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26627</link>
<guid>659d6880990e3894803d8b8c131c8789</guid>
<pubDate>Sat, 25 Oct 2025 17:24:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>City-of-Sugar-Land</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8c75ebe5cba95fba6bf6324857afa95956b5be8cddaffd27380c43ef0361e3d</i><br /><br />Threat actor <b>description</b>: <i>Founded as a sugar plantation in the early mid-20th century and incorporated in 1959, Sugar Land is a city in the state of Texas, in the United States. The city is within the Houston, The Woodlands and Sugar Land metropolitan area and Fort Be            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kaufman--Stigger</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26629</link>
<guid>0d4caa61a340cc953d6d0ec97ecd6180</guid>
<pubDate>Sat, 25 Oct 2025 17:24:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Kaufman--Stigger</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1351a62825bb44469189701847f778317156dae64e8a308d52dedc33928e0e72</i><br /><br />Threat actor <b>description</b>: <i>When you call Kaufman & Stigger, PLLC Injury Lawyers, you will talk to a team with decades of experience helping people injured after an accident. Our Louisville-based law firm is focused exclusively on providing counsel to injured clients th            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>DAVIDYURMAN.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26621</link>
<guid>fe8cc9477d746cb4c6d1a0d09ea685cd</guid>
<pubDate>Sat, 25 Oct 2025 15:15:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DAVIDYURMAN.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>239b1810f4e96af73bcacd4f2ba6ad80ff8528a721bf166f2e10afa43164530e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>COXENTERPRISES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26623</link>
<guid>43e9fffa93004c327ce88972bc528eca</guid>
<pubDate>Sat, 25 Oct 2025 15:14:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>COXENTERPRISES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab09b4086878d336e4bf426e05be24ea1d0ec3f7cb5ed831464999cb9bea1230</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HRSD.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26624</link>
<guid>b8028b0003882ecaf9ff4f5a92a0cc23</guid>
<pubDate>Sat, 25 Oct 2025 15:13:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HRSD.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7481d3f13852ff18e30df897cbea3839c864e35e6b70f70ebb7185d7cdaa1133</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MetroWest-Community-FCU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26625</link>
<guid>5d1d848d2a48beb57a1aa5c86fdf2881</guid>
<pubDate>Sat, 25 Oct 2025 14:24:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>MetroWest-Community-FCU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9b64f6c5538cc51a6ecfd2d63e034f68c29a380e8e6f3071c7d79fce6954dbb5</i><br /><br />Threat actor <b>description</b>: <i>MetroWest Community Federal Credit Union offers a range of personal banking services including checking and savings accounts, mobile banking, and various lending products such as vehicle, home, and personal loans.We are ready to upload corporate and client documents. Lots of clients documents (DLs, birth and death certs and numerous forms with personal information), financial and accounting information, court cases information, employee personal files, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>greenhouseapt.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26616</link>
<guid>e0354c78e2ed7d09be80f3781f7f1c8e</guid>
<pubDate>Fri, 24 Oct 2025 21:22:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>greenhouseapt.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b3e68dc97e4152f4d14356788d1d7f88b5d0a42cb3214a12d21c2078ab29311</i><br /><br />Threat actor <b>description</b>: <i>The Greenhouse is an apartment building and management/letting operation in Boston’s Back Bay / South End that offers 1–3 bedroom …</i><br />Target victim <b>website</b>: <i>greenhouseapt.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>hanson-inc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26613</link>
<guid>7caf3e67c79b93b52339407142ee7198</guid>
<pubDate>Fri, 24 Oct 2025 20:47:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>hanson-inc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53d47c352dd9f82a360c69ec329f65abdbcf98b3e7803b1837136c9109cd67e5</i><br /><br />Threat actor <b>description</b>: <i>Hanson Professional Services Inc. is a national consulting firm that specializes in engineering, planning, and allied services. They provide a wide range of services including aviation, asset management, construction support, and sustainability solutions, catering to various sectors such as healthca…</i><br />Target victim <b>website</b>: <i>www.zoominfo.com/c/hanson-professional-services-inc/1114749567</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hall-Estill</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26615</link>
<guid>6506f30b358ef57db84f257ad7540011</guid>
<pubDate>Fri, 24 Oct 2025 19:43:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Hall-Estill</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6b12f2d5e49e17bd11d9210b253f5e659f5f4f96d14cf61343ee37b1a56db8e</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1966 in Tulsa, Oklahoma, Hall Estill is a full-service law firm with clients ranging from F…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Summit-Hotel-Properties</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26609</link>
<guid>8550c8318d98aa713e0ef7c500981dbc</guid>
<pubDate>Fri, 24 Oct 2025 17:24:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Summit-Hotel-Properties</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a21377ae39bd01141e0c97ec83659806354664164323c000b545742922f02106</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Essilor-of-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26610</link>
<guid>df320a984cfb79b17d721a870665cdba</guid>
<pubDate>Fri, 24 Oct 2025 17:24:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Essilor-of-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af3698f8261cf6c9f4031c3ecebec7f2d08bb275abab94c9f3ab8ef6f1f1ca81</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Peruvian-Connection</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26611</link>
<guid>64a9c037f9a4d1f4ad271611c784a92b</guid>
<pubDate>Fri, 24 Oct 2025 17:24:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Peruvian-Connection</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d47eb2a3d41067b06b939e7fefb0528c075dc8d9591aaa4a421d2da286989c7c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>simmerscrane.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26606</link>
<guid>dd4378fa6376a85a4cafc940fbc289f0</guid>
<pubDate>Fri, 24 Oct 2025 10:24:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>simmerscrane.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2682abbb3e9aa6bf8c2352f5d735ec017221ab23f6539c556d38ae8b109a23a2</i><br /><br />Threat actor <b>description</b>: <i>Simmers Crane Design & Services Company was founded in 1958 by Charles Simmers, ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>IREM-companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26600</link>
<guid>958bb6bd458626ce4add509077f3c5df</guid>
<pubDate>Thu, 23 Oct 2025 23:25:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>IREM-companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>637bcc783a448d37d732891d47b46db64345605b25d7d346c8efd9c8c6646193</i><br /><br />Threat actor <b>description</b>: <i>IREM companies, USA - is an international institute for real estate and asset managers, promoting management through education and information exchange. IREM conducts real estate management training courses, organizes national meetings of rea            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>iCare-Software</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26591</link>
<guid>38abae704fb4cdba00a26baa58cb4443</guid>
<pubDate>Thu, 23 Oct 2025 16:18:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>iCare-Software</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff6628620d34ccbd9426ac6427a512bb943715d0513d14f1ab25780890521086</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1997, iCare Software, based in the United States, delivers innovative management solutions for childcare and afterschool programs. Serving childcare centers, preschools, afterschool programs, and multi-site operations, iCare automates critical tasks like attendance tracking, staff scheduling, tuition collection, and compliance reporting. Its unique offerings include AI-driven analytics, business intelligence dashboards, and CRM tools to boost enrollment and staff retention. With seamless data migration and robust back-end technology, iCare empowers providers to focus on quality care while streamlining operations and driving growth.</i><br />Target victim <b>website</b>: <i>icaresoftware.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vanan-Online-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26590</link>
<guid>6df811b75fbf2f0dc32a60ece213f1a3</guid>
<pubDate>Thu, 23 Oct 2025 16:17:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Vanan-Online-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db1156d026f1b2a0fcfda3cb17fdaf15dc638bcb06e45c57ea65e03445f4988f</i><br /><br />Threat actor <b>description</b>: <i>Vanan Online Services offers a comprehensive range of language services, including transcription, translation, captioning, subtitling, voice-over, and typing. They cater to individuals and businesses across various industries, providing solutions in over 100 languages with a focus on quality and affordability. With a commitment to seamless project management and customer support, they ensure timely deliveries and customer satisfaction. The company has built a strong reputation over a decade of service, making them a trusted partner in the language services field.</i><br />Target victim <b>website</b>: <i>vananservices.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>CSCGLOBAL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26579</link>
<guid>b3caae6857cf5662d007d49b4ace0e05</guid>
<pubDate>Thu, 23 Oct 2025 11:15:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CSCGLOBAL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d1df8eb83ec9ed75392094b2164d7daf2b419219d704dffbfba6084e35293d2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>LKQCORP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26581</link>
<guid>a79f393b36fd04bbbdd6d344caba8e11</guid>
<pubDate>Thu, 23 Oct 2025 11:12:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>LKQCORP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d9b74bd2bff1259629325c28e8f2ba979ef3e0e3b6e2d51b538ed6363911ba4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Real-Estate-Specialists</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26568</link>
<guid>cbf66d053fa53ff5ad8a9e83e2f864be</guid>
<pubDate>Thu, 23 Oct 2025 00:25:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Real-Estate-Specialists</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c9425bd673c07996e91f875a53c709f9e28e80c2b33314c57c3c2c7e7986257</i><br /><br />Threat actor <b>description</b>: <i>Real Estate Specialists is dedicated to managing and maintaining rental properties in southeast Wisconsin, focusing on enhancing their performance since 1982. They offer a comprehensive range of property management services, catering to prope            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Samera-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26569</link>
<guid>3d3f53e1702fe7d002b4dd7d166d1996</guid>
<pubDate>Thu, 23 Oct 2025 00:25:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Samera-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca523123bbc47421d495fdaf0be57fbb522c90cbe6a1b3a84eb94cbce084e811</i><br /><br />Threat actor <b>description</b>: <i>Samera Health is a Third Party Administrator (TPA) that provides Health, Dental, and Vision benefits for employer groups. The company focuses on delivering innovative and cost-saving solutions while ensuring a positive customer experience thr            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>CHDFS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26570</link>
<guid>d9c9af41dda3bd35df1fddd4ff2b9b2b</guid>
<pubDate>Thu, 23 Oct 2025 00:25:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>CHDFS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e5e567248551e07850bbb7f14ebbdd9a4034b7aeb3bc8439d18373895ff97198</i><br /><br />Threat actor <b>description</b>: <i>CHDFS Inc is dedicated to providing social services and support for individuals, families, and communities in need. They offer a range of programs including OPWDD, OMH, Early Intervention, and Health Home Care Management. Their mission focuse            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>NurseSpring</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26571</link>
<guid>8feddc18ebc59ad43f459ab72b07f93f</guid>
<pubDate>Thu, 23 Oct 2025 00:25:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>NurseSpring</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60d366952f0cb15d052ff09fbf7c056d91054b311d297af2e935eb9cc1b1375d</i><br /><br />Threat actor <b>description</b>: <i>NurseSpring specializes in home health care, health care staffing, and nurse recruitment services. They prioritize compassion, dignity, and respect while delivering care, ensuring clients receive the right care at the right time. Their intend            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Integral-Networks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26572</link>
<guid>efb926bfce4f58539b1c2b45a5676b09</guid>
<pubDate>Thu, 23 Oct 2025 00:25:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Integral-Networks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e4b1cdc54ee70616e7eda6745cdfcb2137d677f7c73ab32204a051c657c404c</i><br /><br />Threat actor <b>description</b>: <i>Integral Networks, Inc. is a leading IT services provider in Sacramento, specializing in responsive IT support tailored to the needs of legal firms and various other industries including construction, manufacturing, and finance. They offer a             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Signet-Armorlite-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26573</link>
<guid>178656689427a1c3b74f44d9f4fc0754</guid>
<pubDate>Thu, 23 Oct 2025 00:25:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Signet-Armorlite-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9b39c8d49e26a35dfec20e2e4bf583f3e2856751fe6477e1e73678c4ac7d96c2</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1947, Signet Armorlite, Inc., an optical company, designs and manufactures glass ophthalmic lenses and molds. It also distributes lenses worldwide and adhesive optical supply products in the United States. Signet Armorlite is headq            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Magna-Hospitality-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26565</link>
<guid>98c2473648afc991669f9b9334c11072</guid>
<pubDate>Wed, 22 Oct 2025 19:24:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Magna-Hospitality-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5c1e45e9cff089c8061057a04ef83b7c432b5b7ede237cd0343d502789541a1</i><br /><br />Threat actor <b>description</b>: <i>Magna Hospitality Group, USA -  a private equity firm dedicated to the investment, development and management of hotel properties. Magna employs more than 100 professionals specializing in all areas including investment, finance, legal, hotel            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>More-Than-Gourmet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26566</link>
<guid>c82864f384d7a8f675b311a9d9560aba</guid>
<pubDate>Wed, 22 Oct 2025 19:24:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>More-Than-Gourmet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3db7a3c985432abdc482b07bfbc7e1721071648125dcc7fb23f51466ab06c82d</i><br /><br />Threat actor <b>description</b>: <i>More Than Gourmet, USA - is a food company based on classic French culinary traditions. MTG products are used in gourmet restaurants, resorts and sold in specialty gourmet food stores.  Privately held since 1993, MTG has been financially soun            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ATT-Careers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26564</link>
<guid>d690d0cd274a05efe2a0a58dac0d9461</guid>
<pubDate>Wed, 22 Oct 2025 14:15:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>ATT-Careers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0aaa5d8f1e071bf9c81bc01ce736dc35ce0062c4ef4c08f6ff0f7ec1a52fa03c</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] AT&T Careers is the employment division of AT&T, an American multinational conglomeric communications company. It offers opportunities in various fields including technology, sales, marketing, customer service, cybersecurity. The company seeks individuals interested in the tech industry with drive for innovation. Roles include internships, entry-level, management, and more experienced positions. It provides competitive benefits and a diverse, inclusive workplace.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Applied-Technology-Resources</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26557</link>
<guid>06f867ad5a8dd38502b33ec03d5abc47</guid>
<pubDate>Wed, 22 Oct 2025 09:24:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Applied-Technology-Resources</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>61769acd59bdb675d5749799b8005a1445b6f9277182c96df86da3e0f8643fc7</i><br /><br />Threat actor <b>description</b>: <i>Applied Technology Resources, Inc. is an international leader in Title Search Exams throughout the United States, offering unmatched accuracy and turnaround times through their proprietary information system. The company specializes in custom            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>MILGARD.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26559</link>
<guid>db18ad102e99e047876c7c51ff482d5a</guid>
<pubDate>Wed, 22 Oct 2025 09:11:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MILGARD.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63658dca9e86fb95448aaffcdf74bba8d6c5679def0ae47fb3fc2f579da19e54</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>COPELAND.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26560</link>
<guid>db922619896fd0e04b6e58c897c61841</guid>
<pubDate>Wed, 22 Oct 2025 09:10:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>COPELAND.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d2e0d0a0f4941e0549cde7da8737df41a8e2858fb698cda2c613545374ec5046</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tri-City-Foods</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26549</link>
<guid>a6071a20f0095f50c0bc7329d45184be</guid>
<pubDate>Wed, 22 Oct 2025 00:25:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Tri-City-Foods</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>890dd08f44163253c5427419ddf9d838776749b37c6260e856596a66a8be0f0b</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2003 and headquartered in Downers Grove, Illinois, Tri City Foods is a franchisee of the Burger King restaurant chain. The company owns and operates locations in and around Chicago, Illinois.
A group of companies was attacked: lmc            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>SANHUA-INTERNATIONAL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26550</link>
<guid>56c9807aabbf7dc7279c1ec2b314bc47</guid>
<pubDate>Tue, 21 Oct 2025 20:11:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>SANHUA-INTERNATIONAL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d5fbb9b53e8bb86f370b54abf881bf116e787971ab916b2b202b9566590de8db</i><br /><br />Threat actor <b>description</b>: <i>Sanhua International is delivering on its commitment to offer eco-friendly products with the North America introduction at the 2017 AHR Expo in Las Vegas of the Green Tech Line of refrigeration and air conditioning components, designed for use with natural refrigerants R290 (propane), R600a (isobutane) and R744 (CO2). Recent mandates from the U.S. Environmental Protection Agency (U.S. EPA) are leading commercial refrigeration and air conditioning manufacturers to redesign product offerings for a greener future. Sanhua works closely with these world-class manufacturers by providing high quality, hydrocarbon and CO2 ready system components including valves, controllers, transducers, filter driers and micro-channel heat exchangers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nelligan-White-Architects</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26552</link>
<guid>9b665b2accf17da9077cea4c5dad8e94</guid>
<pubDate>Tue, 21 Oct 2025 19:18:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Nelligan-White-Architects</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea7f2257f5e3a6cfe7d26310328e8468107cc15eb17f0a44a7e399dae87376da</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.nelliganwhite.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>National-Coatings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26551</link>
<guid>bbd2f7ac63dcd6415a821f8b0168b88e</guid>
<pubDate>Tue, 21 Oct 2025 19:17:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>National-Coatings</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>081e03f9211b2fce81f54f1edb4bce76b021099e665061e7ef017187ec5446bf</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.nationalcoatingsinc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Prime-Dental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26546</link>
<guid>327f7a07efe1dae93cc6313e8cdfbbdc</guid>
<pubDate>Tue, 21 Oct 2025 18:38:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Prime-Dental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52b4356c5c762d8f2485c9270225e0c918c733ea17cc22453a622d278689ff3b</i><br /><br />Threat actor <b>description</b>: <i>Our practice specializes in procedures ranging from cosmetic dentistry, preventive dentistry, orthodontics, and early intervention orthodontics for young children and teenagers. Providing high-quality dental care is what we strive for daily and this is reflected in our detail-oriented work ethic. We work with patients closely to achieve the best results clinically possible, placing emphasis on educating our patients along the way. At Prime Dental we take extra care to explain the specifics of each procedure provided as well as to inform patients on what they can personally do to achieve better results. Because we see dentistry as a partnership, educating our patients is a top priority in our goal to improve patients overall dental health. We also place a strong emphasis on keeping current with modern technological advances so youll find our clean and contemporary facility equipped with quality, state-of-the-art technology</i><br />Target victim <b>website</b>: <i>www.primedental.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crave-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26547</link>
<guid>707ab73422e213d6c39597e2078c565e</guid>
<pubDate>Tue, 21 Oct 2025 18:38:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Crave-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e82b1248eda9b8f1c77b3356f278967f553e4ec650cf80191231b8c3c0f6392</i><br /><br />Threat actor <b>description</b>: <i>Crave Management Group is a fast-food franchisee operator based in Montana, known for its diverse brands and commitment to operational excellence. With a growing presence in Utah, the company is expanding its portfolio to include Bobbys Burgers by Bobby Flay alongside its existing Taco Bell locations. They prioritize exceptional customer experiences and offer unique benefits to employees, including early parental leave and paid volunteer opportunities. Crave Management Group is excited about creating numerous new career opportunities while maintaining a focus on community engagement and employee growth.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Peraso</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26548</link>
<guid>6d0ca152a941f960431082ec429f6f11</guid>
<pubDate>Tue, 21 Oct 2025 18:37:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Peraso</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>935408f97eaa902d6dda15b651d26118f720e84294c463507252f1ded9e29c39</i><br /><br />Threat actor <b>description</b>: <i>Peraso</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>marquscompanies.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26529</link>
<guid>a03e5aa252e564c23062c4af8b7adf1e</guid>
<pubDate>Tue, 21 Oct 2025 15:25:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>marquscompanies.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>103d76361c3ffbb2247dd8d04a9a0ca1468629d236633f517ceff4965ae341c8</i><br /><br />Threat actor <b>description</b>: <i>Marquis Companies offers healthcare services. The Company offers assisted living...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southern-Specialty-and-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26536</link>
<guid>834806a11a5b9335f5947a842a4a00df</guid>
<pubDate>Tue, 21 Oct 2025 15:17:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Southern-Specialty-and-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8e1a8d3a62cc3361b6060762f8b9eae93ce286cdfd6909a4d7170c851da64ce</i><br /><br />Threat actor <b>description</b>: <i>Provide support for offshore, onshore, and drilling operations.</i><br />Target victim <b>website</b>: <i>southernspecialtysupply.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Roth--Scholl</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26537</link>
<guid>fd37c8fab2b7e539b0131c6572ee7d1c</guid>
<pubDate>Tue, 21 Oct 2025 15:17:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Roth--Scholl</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a071302049eec39fb349a95ef69a145bcca63d70f1afd1f0644f15456ce5538</i><br /><br />Threat actor <b>description</b>: <i>Providing legal service in Commercial Litigation, Real Estate, Business Law.</i><br />Target victim <b>website</b>: <i>rothandscholl.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>River-City-Eye</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26538</link>
<guid>b4c544e383856764707838df2ebaff46</guid>
<pubDate>Tue, 21 Oct 2025 15:16:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>River-City-Eye</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ea4620eacad1b00bf40fc340a25c8f7741ab925d86b97c9495d8f1c168aa812</i><br /><br />Threat actor <b>description</b>: <i>Optometry clinic located in the Hollywood District and Happy Valley.</i><br />Target victim <b>website</b>: <i>rivercityeye.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Austin-Capital-Trust</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26539</link>
<guid>b8ba4466c47209f470ae8902069192a6</guid>
<pubDate>Tue, 21 Oct 2025 15:16:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Austin-Capital-Trust</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7e6f422c48a4bccae3cec805ed86c37741b62c2bbc672c1332fb5a6cc8023a00</i><br /><br />Threat actor <b>description</b>: <i>The Trust company that offers a range of financial services.</i><br />Target victim <b>website</b>: <i>austincapitaltrust.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Healthy-Living-Market-and-Caf</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26540</link>
<guid>793d2101fe21893b3d463a6600eead38</guid>
<pubDate>Tue, 21 Oct 2025 15:15:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Healthy-Living-Market-and-Caf</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>076c4baa7d9cfe55870f046fcbacf00ae97368a8ea6721cbdbb8ab5f2034603b</i><br /><br />Threat actor <b>description</b>: <i>Healthy Living Market & Cafe is a marketplace organic and products</i><br />Target victim <b>website</b>: <i>healthylivingmarket.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Claimlinx</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26542</link>
<guid>cf577c93108e7dcf27f7905e65933d18</guid>
<pubDate>Tue, 21 Oct 2025 15:15:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Claimlinx</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6df1f763ecbcbb9ecff7139cdfa0a19917314b66d2d3b430664763debd806e16</i><br /><br />Threat actor <b>description</b>: <i>A provider of health insurance benefits for the businesses</i><br />Target victim <b>website</b>: <i>claimlinx.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ronemus--Vilensky</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26545</link>
<guid>fdfef5e702d13ee41d102090422bc7b5</guid>
<pubDate>Tue, 21 Oct 2025 15:14:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Ronemus--Vilensky</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>02a025493205279bd5df33437453dc1be4ecdd480fcab7d83113603d2ca07285</i><br /><br />Threat actor <b>description</b>: <i>A New York-based law firm</i><br />Target victim <b>website</b>: <i>ronvil.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dependable-Plastic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26543</link>
<guid>ae5b201527b188809873d2f108db3a79</guid>
<pubDate>Tue, 21 Oct 2025 15:13:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>Dependable-Plastic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e43524392a52a17fab139628c1c9870a65a33c3cbd0acbec0064d0dbe477034</i><br /><br />Threat actor <b>description</b>: <i>A janitorial supplies company based in Brooklyn, New York</i><br />Target victim <b>website</b>: <i>dependableplastic.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>I-Tek-Medical-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26544</link>
<guid>8238291cb43f4eb400feef91b4ddc225</guid>
<pubDate>Tue, 21 Oct 2025 15:13:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>I-Tek-Medical-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe39ab18ae1772af98d618761a5c07351980f80a2c40af310542074ec467a459</i><br /><br />Threat actor <b>description</b>: <i>A provider of contract design, development, and manufacturing</i><br />Target victim <b>website</b>: <i>i-tekmedical.com</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>U.S.-Vanadium-Holding-Company-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26531</link>
<guid>e4aded2e2c92b168bfaf4b509a62be56</guid>
<pubDate>Tue, 21 Oct 2025 12:53:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>crypto24</b> claims attack for <b>U.S.-Vanadium-Holding-Company-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>62aa25155317b9b506cdf007bc740a4275fd7d773f6a1de2f464de34727789b5</i><br /><br />Threat actor <b>description</b>: <i>We have successfully extracted over 300GB of documents from your internal network, including internal company documents, customer and project information, and other data stored within your internal systems.</i><br />Target victim <b>website</b>: <i>usvanadium.com</i>]]></description>
<category>crypto24</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mailing.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26532</link>
<guid>83870fb92477054676ffda84e1e22f9f</guid>
<pubDate>Tue, 21 Oct 2025 12:51:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Mailing.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc88fc7dc95eabc00c93a5aa83138b83aca1ebf45db27c0ca3c98341533ba69a</i><br /><br />Threat actor <b>description</b>: <i>Mailing.com is a printing and mailing company that offers service
s in Lithographic Printing, Digital Printing, Mailing Services, A
rt and Design and more.

We are ready to upload 40gb of corporate documents. Employee pers
onal information (Full name, DOB, address and so no), same inform
ation of their VIP clients, drawing and specifications, etc.
</i><br />Target victim <b>website</b>: <i>Mailing.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nvno</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26533</link>
<guid>ec151b6ecbb40275f4ac68bc99635554</guid>
<pubDate>Tue, 21 Oct 2025 12:50:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Nvno</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>55351b726b052542aab19c688f99380926e7c7ef92645bfc1f303e866632cf4e</i><br /><br />Threat actor <b>description</b>: <i>Napierski, VanDenburgh, Napierski & O'Connor, L.L.P. is a leading
civil litigation firm based in Albany, NY, specializing in vario
us legal areas including medical malpractice defense, personal in
jury, and employment law.

We are ready to upload about 6gb of corporate documents. There ar
e SO MUCH personal documents. Full information of at least 150 of
their clients (Full name, DOB, address, passport numbers, SSNs, 
DLs and so no). Employee personal information (DOB, addresses, ph
ones, salaries and other information), a lot of court cases inclu
ding ransomware and others, corporate information of dozens of co
mpanies will be uploaded. Stay tuned.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>trailridgeenergy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26527</link>
<guid>6488517bf6015b4964f5576aae4206e9</guid>
<pubDate>Tue, 21 Oct 2025 11:24:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>trailridgeenergy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a4ad9f44f51001e076fae96a16e01fee515f7b91098e21b6efebbdc8e0f4342d</i><br /><br />Threat actor <b>description</b>: <i>Trail Ridge Energy Partners II LLC is a privately held oil and gas exploration a...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.dekalbcountyga.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26528</link>
<guid>2b12a84466d35eee6f84649d1c0ac8a5</guid>
<pubDate>Tue, 21 Oct 2025 11:24:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>www.dekalbcountyga.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d516e6d2c376f372308756822bfbe369174fb38a3b405745675472a56a87a8e7</i><br /><br />Threat actor <b>description</b>: <i>DeKalb County is the third most populated county in the state of Georgia and is ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.ccls.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26526</link>
<guid>393db82ebb6d0148176e924e40f9d2e6</guid>
<pubDate>Tue, 21 Oct 2025 08:24:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>www.ccls.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>575e7f286067a52aba19309e6490dca63bb879607cbb078f74559a9de4e4964e</i><br /><br />Threat actor <b>description</b>: <i>The Chester County Library & District Center was established in 1962 and moved t...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>McDonald-Building</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26530</link>
<guid>cf4d516ca85abafb7b26406d82bf9f0b</guid>
<pubDate>Tue, 21 Oct 2025 07:52:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>McDonald-Building</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1edcbc7253a03df68303da10a0f12bd8ae476548f9af2b9a1c25af1b92871682</i><br /><br />Threat actor <b>description</b>: <i>McDonald Building Co. is a growing construction firm that embarks on innovative projects within the Architecture, Engineering, and Construction (AEC) industry. They utilize advanced technologies such as Virtual Design Construction to ensure quality and efficient project delivery while maintaining strong relationships based on trust and dependability. The company employs a unique drone, nicknamed Batman, to monitor and provide updates on construction progress and safety. Their commitment to excellence has garnered positive feedback from clients, highlighting their adaptability and competency.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Greater-Mental-Health-of-New-York</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26525</link>
<guid>9a3bd37a71b632e7726f149bbd771052</guid>
<pubDate>Mon, 20 Oct 2025 20:46:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Greater-Mental-Health-of-New-York</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8dc38da5323f86bf1d679b7f89b7e2527a6e17f457d7a0125262efe84f62b350</i><br /><br />Threat actor <b>description</b>: <i>Greater Mental Health of New York is the new name of the merged entity of The Mental Health Association of Westchester and The Mental Health Association of Rockland, two agencies who have a long history of collaboration and a shared mission and ethos for promoting mental health throughout the Hudson Valley region.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tryon-Distributing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26522</link>
<guid>9486af7e0d767abe3859480dd307e1b7</guid>
<pubDate>Mon, 20 Oct 2025 20:45:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Tryon-Distributing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d5548504ed74810e402735b4ff9a677623f5256c20a3651501af7c7a7aa199f</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1985, Tyron Distributing is a craft beer and fine wines distributor headquartered in Charlotte, North Carolina.</i><br />Target victim <b>website</b>: <i>tryondistributing.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>MSC-Wireless</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26524</link>
<guid>03f27843d915554916cc80323ce5f787</guid>
<pubDate>Mon, 20 Oct 2025 20:44:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>MSC-Wireless</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd2cb4023acb52210dcf6d777d0e37530627b7c6c70e3acefbecaadc8bbbd737</i><br /><br />Threat actor <b>description</b>: <i>Wireless in the mountains</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>South-Atlanta-Medical-Clinic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26520</link>
<guid>6c0aa5ae1b6aadd1cfe5f1151b1a6c60</guid>
<pubDate>Mon, 20 Oct 2025 19:50:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>South-Atlanta-Medical-Clinic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6413c5564a2ca578654ad9c4f44499510e259581c7be6263e218fde9b8d11a6</i><br /><br />Threat actor <b>description</b>: <i>South Atlanta Ambulatory Surgery Center is a specialized outpatient surgical facility in Stockbridge, Georgia, dedicated exclusively to ear, nose, and throat procedures. The center is staffed by experienced board-certified otolaryngologists and anesthesiologists, providing high-quality, personalized surgical services for both pediatric and adult patients. With a focus on excellence and comfort, South Atlanta ASC is equipped with advanced technology for various ENT surgeries, including computer image-guided sinus surgery and balloon sinuplasty. Their mission is to ensure cost-efficient, compassionate care tailored to the needs of each patient.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Harmony-Brands</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26521</link>
<guid>17d23e54aab31807fc9060d0d191161b</guid>
<pubDate>Mon, 20 Oct 2025 19:50:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Harmony-Brands</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f0566dee6ca0de1d53be372af0e87d45758afdc373665344e9e263e09fa47d4e</i><br /><br />Threat actor <b>description</b>: <i>Harmony Brands was founded in 2014, from a desire to create a premium sod grass that matched the needs of the varied geography of the United States, and also measured up to the industrys highest standards. Harmony, based in Sarasota, Florida, was created by Bethel Farms, one of the nations leading sod growers, with over 50 years of agricultural expertise.Harmony sod was first available to homeowners in Florida and within a few months, Georgia, Alabama, Mississippi and Texas. Currently its available throughout the continental United States. Soon after, a Harmony sod installation program was launched. Harmony Brands aims to offer homeowners everything to create a unique outdoor living experience, from quality sod to premium care and maintenance.</i><br />Target victim <b>website</b>: <i>www.harmonybrands.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Phoenix-Village-Dental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26519</link>
<guid>49cea6b66a1c9d9fcbba8946453c057b</guid>
<pubDate>Mon, 20 Oct 2025 18:41:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Phoenix-Village-Dental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7903bb04476b9ec75c7782686319633e4907e798b2bfa83f64e03bcad0c07d80</i><br /><br />Threat actor <b>description</b>: <i>Phoenix Village Dental is a family dentistry practice designed with you in mind! We know how busy you are-and how difficult it is to fit dental visits for your family into your hectic schedule.</i><br />Target victim <b>website</b>: <i>www.phoenixvillagedental.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>ocbar.orgUSA114GB</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26518</link>
<guid>f5e298925daba7141e05ef336ae52e30</guid>
<pubDate>Mon, 20 Oct 2025 18:16:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>ocbar.orgUSA114GB</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da75e69bb7b8c8e8cbe18114605145b434cd4a96220ca1c4e4afdf2872b23720</i><br /><br />Threat actor <b>description</b>: <i>Unknown - Orange County Bar Association</i><br />Target victim <b>website</b>: <i>ocbar.org/USA/114GB</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>cdom.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26516</link>
<guid>db16fe601371c8ef1105fa442e445b07</guid>
<pubDate>Mon, 20 Oct 2025 18:05:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>cdom.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a5857535690b1e825af8d8b3d42522ecfab1716c14084fe2e3554c25a691db4f</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>cdom.org</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>Selig-Enterprises-AAA-Parking</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26508</link>
<guid>9a8d909d7652448b2dc301613a123aab</guid>
<pubDate>Mon, 20 Oct 2025 16:17:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Selig-Enterprises-AAA-Parking</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bbc62bcef1eeed646fe240567d5fdb9c12327be6d6b4355f9d5d8f292877afa8</i><br /><br />Threat actor <b>description</b>: <i>There are two companies in the upcoming leak. Selig Enterprises i
s a real estate company that has a portfolio of more than 15 mill
ion square feet of retail, industrial, residential, hotel, office
, and mixed-use properties throughout the Southeast. And AAA Park
ing, headquartered in Atlanta, Georgia, and established in 1956, 
is a parking management company.

We are ready to upload 81gb of corporate documents of these two c
ompanies. Employee personal documents (passports, DLs), clients p
ersonal information (Full name, DOB, SSN, phone and so on), detai
led accounting and financials, credit cards details, projects (co
nfidential ones), drawing and specifications, NDAs, police report
s and other interesting information.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cabinets-2000-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26512</link>
<guid>fc6c370893059e7241288dc04db24ee7</guid>
<pubDate>Mon, 20 Oct 2025 14:50:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackshrantac</b> claims attack for <b>Cabinets-2000-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7ab2a775cb6d4b551c16a7ada7b65a15316fa6f437a46d1d28b4114b394ca371</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "Cabinets 2000, LLC" is a business that manufactures and sells a diverse variety of cabinetry products. Based in Norwalk, California, it serves a range of customers primarily in the residential market. The company is committed to offering high quality, affordable cabinets. Products range from kitchen and bathroom cabinets, to office and storage solutions. Key attributes include design flexibility, on-time delivery and excellent customer service.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackshrantac</category>
</item>
<item xmlns:dc='ns:1'>
<title>Linxx-Global-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26501</link>
<guid>a4f87e21ec472bbff8435588d5b08a8f</guid>
<pubDate>Mon, 20 Oct 2025 07:14:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Linxx-Global-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>abf9be2120ef66adce3a326a3fc8c3b4743afc6e137469034bdfc774bb3d92ff</i><br /><br />Threat actor <b>description</b>: <i>Linxx Global Solutions is a leading provider of mission-critical support services specializing in Training, Security, and Cyber Security solutions. Their primary goal is to enhance the safety, security, resiliency, and productivity of their clients through innovative problem-solving and a commitment to excellence. The company has established a strong reputation by successfully supporting various contracts, including those with the U.S. Navy and the U.S. Army. With their focus on delivering high-quality services, they serve a diverse range of clients in government and military sectors.
company is headquartered in 2901 S Lynnhaven Rd Ste 450, Virginia Beach, VA 23452, United States.
724 Employees
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Accord-Carton</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26499</link>
<guid>de96180969ef18d44b7c93571803bb16</guid>
<pubDate>Sun, 19 Oct 2025 20:40:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Accord-Carton</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>65f001de26bc48e020a053d139bf6496d88ab5511bb31f33038da43860cc0857</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.accordcarton.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Khatami-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26491</link>
<guid>5eb97552583ad9440a45927fb0263bd8</guid>
<pubDate>Sun, 19 Oct 2025 19:24:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Khatami-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>55603c3439327dfae546d3830b816a4e53c6bb2bc334631b137d0af536fc8653</i><br /><br />Threat actor <b>description</b>: <i>Hoss Law is a law firm specializing in personal injury and family law services, dedicated to helping clients in Sacramento and surrounding areas. They focus on maximizing compensation for accident victims and offer a no-win, no-fee guarantee,            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kudela--Weinheimer</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26493</link>
<guid>f3db95bfda8bf707858c4c50a41e811a</guid>
<pubDate>Sun, 19 Oct 2025 19:24:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Kudela--Weinheimer</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9ef86aced2910ad1e9c38d258a29aaf7dd17075b41d786211383b99b9dbfc02</i><br /><br />Threat actor <b>description</b>: <i>KW Landscape Architects is a landscape architecture firm that specializes in creating exceptional built environments by balancing innovation with functionality. With over 30 years of experience, they offer services across various markets incl            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>healthandvitalitycenter.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26497</link>
<guid>a66dbabd793deed367030aadfcfc59b9</guid>
<pubDate>Sun, 19 Oct 2025 17:41:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>healthandvitalitycenter.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63bfa383ee3b17cbd01f09b4636104ba708a729463183dd7a9ead1f8edaac240</i><br /><br />Threat actor <b>description</b>: <i>The Health & Vitality Center is a holistic medical practice located at 11600 Wilshire Blvd, Suite 120, Los Angeles, CA. …</i><br />Target victim <b>website</b>: <i>healthandvitalitycenter.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>BARCO-Rent-A-Truck</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26471</link>
<guid>a432f60bb9550adf0c2e00bf906d8939</guid>
<pubDate>Sun, 19 Oct 2025 17:25:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>BARCO-Rent-A-Truck</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1cd845de73b5ece56b8897dddb33b7892934a7ead6b4c672c512af4976f11023</i><br /><br />Threat actor <b>description</b>: <i>Barco Rent-A-Truck is a leading provider of corporate 4x4 pickup truck rentals in the United States, offering a comprehensive fleet of brand new trucks, including 1/2, 3/4, and 1-ton models. Their services cater to a wide range of clients, fr            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gas-Generator-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26473</link>
<guid>26324d8e2cc1957b8e581568a089a51c</guid>
<pubDate>Sun, 19 Oct 2025 17:25:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Gas-Generator-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ae5f4f29749755d5f8551f5a99e87e9fa674bcd5c9b3b96a4f597ca0f276a4f5</i><br /><br />Threat actor <b>description</b>: <i>Gas Generator Solutions (GGS) is a privately owned, independent organization established to provide Lab Managers with single point of contact for the Servicing and Repair of ANY Laboratory Gas Generator within their facility, independent of b            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stowaway-Storage</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26475</link>
<guid>471f23c944fc170279354fb74ece7ce4</guid>
<pubDate>Sun, 19 Oct 2025 17:25:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Stowaway-Storage</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e7db9b46f90e275434665059c1aa01509bfbe41181f71467fd78edc3853328b</i><br /><br />Threat actor <b>description</b>: <i>Opened in the fall of 1998, Stowaway Storage has long been part of the North Haven community. The business has always been family owned and operated since it's beginning. Owner Raymond V Iannucci started the company on land previously utilize            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>JA-Jennings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26476</link>
<guid>ba16fd41fab7b93931b2e628c6e62441</guid>
<pubDate>Sun, 19 Oct 2025 17:25:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>JA-Jennings</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>11852fe9cb0bb718ec67a5e31b065b4f34e27ba2b7ce742959c15ece9ed7754e</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1917, J.A. Jennings is a mid-size full-service construction company which constructs private sector commercial interiors projects as well as full-scale building renovations and infrastructure programs throughout the New York City m            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Scales-Sales--Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26480</link>
<guid>90d048af68ca32e1bfb1d645e35ab644</guid>
<pubDate>Sun, 19 Oct 2025 17:25:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Scales-Sales--Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>511b2eade85c20aa52ac44b46460a6375943576ea6f4830f0ac08447cb27c72d</i><br /><br />Threat actor <b>description</b>: <i>Scales Sales & Service LLC was originally founded in 2004 in Omaha, Nebraska. A full-service scale company with locations in Greeley, CO, Colorado Springs, CO, Denver, CO, Omaha, NE, Kearney, NE, Scottsbluff, NE and Atlantic, IA, in addition             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Laloma</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26481</link>
<guid>77bd8919603ba3c00e26d92710171b8c</guid>
<pubDate>Sun, 19 Oct 2025 17:25:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Laloma</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cfb98b1f89209f0105c0557e6bc9f6a78b4e6737b4ec0a29e89a604da4adae54</i><br /><br />Threat actor <b>description</b>: <i>La Loma Tamales is a Mexican restaurant chain in the Minneapolis-St. Paul area known for its traditional, handmade tamales made from fresh ingredients, including a unique process of cooking and grinding their own corn. They offer both savory             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>My-Florida-Case-Management-Services-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26496</link>
<guid>1697fe5eb0141dca1379090a4d766cc7</guid>
<pubDate>Sun, 19 Oct 2025 16:44:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>radar</b> claims attack for <b>My-Florida-Case-Management-Services-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d60eafb59a01cad88052bf112d1df892c7fedba0c9b8cc4e5698ea4446becc93</i><br /><br />Threat actor <b>description</b>: <i>My Florida Case Management Services, LLC, a professional case management company located in Doral, FL. It could also be a general reference to the state of Florida's case management services, such as the Medicaid Mental Health Targeted Case Management program provided through the Florida Agency for Health Care Administration (AHCA) for individuals with serious mental illnesses or emotional disturbances. Additionally, it may refer to court-based case management, such as the Family Court Case Management process.</i><br />Target victim <b>website</b>: <i>www.mapquest.com</i>]]></description>
<category>radar</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Blood-and-Marrow-Transplant-Group-of-Georgia</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26482</link>
<guid>3b0d3acaf5e61ac97738f559aa43fb1d</guid>
<pubDate>Sun, 19 Oct 2025 16:25:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-Blood-and-Marrow-Transplant-Group-of-Georgia</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e68f8bcad3b89ca10d3984babc7a3c529e22e67b96e18fba728eae3a23534ae</i><br /><br />Threat actor <b>description</b>: <i>The Blood and Marrow Transplant Group of Georgia (BMTGA) specializes in providing advanced care for patients undergoing blood and marrow stem cell transplantation, acute leukemia treatment, and CAR T-cell immunotherapy. They are recognized fo            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sports-Medicine-and-Orthopaedics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26484</link>
<guid>8b71c85ef2c0088afedaf83ebb8ed0b2</guid>
<pubDate>Sun, 19 Oct 2025 16:25:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Sports-Medicine-and-Orthopaedics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a26a822305033edc63b7a962df6091e27db67b4c0fba9a12e257944f52ce018</i><br /><br />Threat actor <b>description</b>: <i>Sports Medicine and Orthopedics is committed to providing excellent patient care and education to orthopedic patients across Rhode Island, Massachusetts, and Connecticut. Led by Dr. Jack Goldstein, a Fellowship Trained Orthopaedic specialist,            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Winholt-Equipment-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26485</link>
<guid>729016c738c95503023f9c7bba4cb332</guid>
<pubDate>Sun, 19 Oct 2025 16:25:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Winholt-Equipment-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>707e5b82cf493a2732bcfea3f78d579de84b742494c3ab63fdc81a209119fef4</i><br /><br />Threat actor <b>description</b>: <i>Winholt Equipment Group, founded in 1946 and headquartered in Woodbury, New York, is a manufacturer of food service, food handling, and material handling equipment.
As a multiple-facilities manufacturer, we have the resources to quickly reac            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>All-Weather-Architectural-Aluminum</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26486</link>
<guid>c2e2be234ac059e1be0c0201da680753</guid>
<pubDate>Sun, 19 Oct 2025 16:25:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>All-Weather-Architectural-Aluminum</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a595380d4f40005be4346e575b7fbc9e5a11ee08652901a739fcea4770c5ea7</i><br /><br />Threat actor <b>description</b>: <i>All Weather Architectural Aluminum specializes in custom windows and doors, providing innovative solutions for both residential and commercial projects. Their extensive range includes sliding, folding, and pivot designs, catering to the uniqu            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>SIGN-Fracture-Care-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26488</link>
<guid>3dcfdd8da0bc9ad027d2e7184439ad44</guid>
<pubDate>Sun, 19 Oct 2025 16:25:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>SIGN-Fracture-Care-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0169e3dcba1324fd4bd29cd9a1b8970b22da1fca7553d275ff16062179a8c9ae</i><br /><br />Threat actor <b>description</b>: <i>SIGN Fracture Care International is a humanitarian organization dedicated to creating equality in fracture care globally by building sustainable orthopedic capacity in developing countries. They provide education to surgeons and donate the ne            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Indian-Spring-Country-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26489</link>
<guid>9de812f86fcb6f1cd0f661d684978665</guid>
<pubDate>Sun, 19 Oct 2025 16:25:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Indian-Spring-Country-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>611eeec4dd2f6121a3112e563e0e111035bedbfe5b0d57ac0c25bbd6dde6b81d</i><br /><br />Threat actor <b>description</b>: <i>Located in beautiful Boynton Beach, Florida, Indian Spring Country Club is a gated, private country club that has the total package ...championship golf, tennis, fitness, casual and formal dining. The Indian Spring Country Club experience is             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grande-Prairie-Public-Library</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26490</link>
<guid>8d9a224f87de1920fca2833749d18df3</guid>
<pubDate>Sun, 19 Oct 2025 16:25:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Grande-Prairie-Public-Library</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b8e4ce2a75b9fff8b4b2719caa77ee869dc4ff0cd48b2b685607f708a421bea</i><br /><br />Threat actor <b>description</b>: <i>The Grande Prairie Public Library District is located at 3479 West 183rd Street, in Hazel Crest, Illinois. We serve the communities of Hazel Crest and Country Club Hills. We provide service to all residents living within our district boundari            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Long-Island-Weight-Loss-Institute</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26469</link>
<guid>22b8064b56f29c9bdf64e9b09bbdc56e</guid>
<pubDate>Sun, 19 Oct 2025 05:25:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Long-Island-Weight-Loss-Institute</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7f476b849d803c9aa2b14c3b597561eaceb63310a0dade8a6702d23bcb03fe3</i><br /><br />Threat actor <b>description</b>: <i>Long Island Weight Loss Institute is a medical weight loss clinic that offers physician-supervised weight loss programs designed to treat the whole person. The clinic provides individualized support tailored to each patient's unique needs wit            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>summitgolfbrands.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26468</link>
<guid>2ca586bb2adf43e68fb77b916b0fc7db</guid>
<pubDate>Sun, 19 Oct 2025 00:47:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>summitgolfbrands.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2e103a8eedccac14e464f93f0b5bddb40f596cc9aefd3ec42d045591081962f2</i><br /><br />Threat actor <b>description</b>: <i>SUMMIT GOLF BRANDS specializes in high-end golf apparel and sportswear, selling products online and through leading country clubs and resorts worldwide. Their portfolio includes brands such as Fairway Greene, Zero Restriction, B. Draddy, and EP New York, with a presence in over 3,000 accounts across more than 25 countries. The company emphasizes quality through vertical integration for decoration and fulfillment, ensuring exceptional service. They cater to various clients including pro shops, corporations, and retailers, focused on delivering innovative and stylish apparel for golf enthusiasts. Employees: 125 Revenue: $27.9 Million Industry: Holding Companies & Conglomerates  Phone Number:(212) 302-7255 760-607-7574 501-940-5393 203-722-2472 207-317-1954 203-984-1657 516-776-3298 203-402-9704 917-975-9357 585-967-0609 917-587-2409 540-270-5566 800-926-8010</i><br />Target victim <b>website</b>: <i>summitgolfbrands.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>EMERSON.COM---EBS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26461</link>
<guid>90c5b57809d8cb1703f89023c6d17060</guid>
<pubDate>Sat, 18 Oct 2025 14:34:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>EMERSON.COM---EBS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>071738338786bcd7d76827cc2fc9f1c238be44fbbefb3e7291ef28f1dc316dbb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>AA.COM---EBS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26462</link>
<guid>58b311abb1f038c7371016670f355608</guid>
<pubDate>Sat, 18 Oct 2025 14:33:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>AA.COM---EBS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f71bcb93ca304c9d5a3260c4402c57198f4169eb12a58464591dcc2a51bc744</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Collins-Aerospace--RTX.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26460</link>
<guid>f829d0a47d2f435f6c452ebe867f6056</guid>
<pubDate>Fri, 17 Oct 2025 23:24:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Collins-Aerospace--RTX.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53ed75d22648575a35fe881cc9685c33d4bc7acb013241eb35653f7825dcdaf6</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Collins Aerospace, a unit of Raytheon Technologies Corporation, is a leader in technologically advanced, intelligent solutions for the global aerospace and defense industry. Created in 2018 by bringing together UTC Aerospace Systems and Rockwell Collins</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>D-Magazine-Partners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26457</link>
<guid>4466f2c1e7eed04c491b8620b142ff72</guid>
<pubDate>Fri, 17 Oct 2025 21:52:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>D-Magazine-Partners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>218477a6abf2e09cecc0f67194df1f1ff5e6c0fecb093318d226346935e10d30</i><br /><br />Threat actor <b>description</b>: <i>ounded in 1974, D Magazine is a monthly magazine covering Dallas-Fort Worth. Topics include Food, Arts, Home, Living, Business, and Weddings. The company is headquartered in Dallas, Texas.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hematology-Oncology-Consultants</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26456</link>
<guid>dfba6121d0dbcf806a79e74a7ba58a7b</guid>
<pubDate>Fri, 17 Oct 2025 20:47:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Hematology-Oncology-Consultants</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>107e1ff5de331dcfaec11ce2d304d1a2ffe35c16dd50806ca623924219045068</i><br /><br />Threat actor <b>description</b>: <i>Hematology Oncology Consultants Michigan Hematology Oncology is a private practice dedicated to providing the highest level of quality care in a healing environment for the mind, body and spirit of patients dealing with cancer and blood disorders.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cottage</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26451</link>
<guid>783900b1dad49f8e7665ebea90ccdfcc</guid>
<pubDate>Fri, 17 Oct 2025 20:45:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Cottage</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c49c71ffba5852127426dac45920669ef6dec7a38fe1392a1ff8a75798c66475</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.cottagecorp.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shadrix--Parmer-P.C.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26452</link>
<guid>5b8b532425202aabea874712edabd2ac</guid>
<pubDate>Fri, 17 Oct 2025 19:26:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Shadrix--Parmer-P.C.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6927468fb042a89a46888051036ac87dda80537467253b02b15ee5faddf9a244</i><br /><br />Threat actor <b>description</b>: <i>Documents, correspondence, payments, clients</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Manko-Window-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26441</link>
<guid>fca1843a88d84796402f2cb5cf8fead4</guid>
<pubDate>Fri, 17 Oct 2025 19:25:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Manko-Window-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4bacbcf6ea4261d34c7e0d5e88bd8def1abac901ad63116dc31541b2abdb4fd</i><br /><br />Threat actor <b>description</b>: <i>Manko Window Systems is a manufacturer of commercial windows, aluminum systems, and glass products.We are ready to upload 20gb of corporate documents. Client personal information (SSNs, DOB, phones and other docs), employee information, accounting and financials, projects, drawing and specifications, detailed information on their products, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tenryu-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26442</link>
<guid>c8d128c127cc299c41e73a24f1158b7c</guid>
<pubDate>Fri, 17 Oct 2025 19:25:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Tenryu-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97cb22a8b6dda350c398f71a0d47207a95beee7786f58045052e592ed1487d15</i><br /><br />Threat actor <b>description</b>: <i>Tenryu America, Inc. is a leading manufacturer of high-quality saw blades, offering over 3,000 types of carbide blades suitable for woodworking, metalworking, plastic cutting, and machining composite materials.We are ready to upload corporate documents. Employee information (DOB, addresses, phones and so on), a bit of client data, financials, contracts, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>GFFF---Galine-Frye-Fitting--Frangos-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26449</link>
<guid>4139cb778ebae8996577f0a5533e4bb0</guid>
<pubDate>Fri, 17 Oct 2025 17:39:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>GFFF---Galine-Frye-Fitting--Frangos-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e3c1828904d91a7f2951443475906ed520006d39642086be78bd4eb463ad28fe</i><br /><br />Threat actor <b>description</b>: <i>Highest-rated San Mateo personal injury attornes</i><br />Target victim <b>website</b>: <i>dongaline.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Consolidated-Restaurant-Operations-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26437</link>
<guid>cf8e18367059d20cbb1650809d53e825</guid>
<pubDate>Fri, 17 Oct 2025 14:25:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Consolidated-Restaurant-Operations-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e310f85d1b3ec0f957e561aa5b7f9dd648281fbc8a7fd49759661f15e1b90b86</i><br /><br />Threat actor <b>description</b>: <i>Consolidated Restaurant Operations, Inc. (CRO) operates more full-service and franchise restaurants internationally in addition tocatering events.We are ready to upload 38gb of corporate documents. Scans of employee documents (Passports, driver licenses, medical information, SSNs and other docs), lots of confidentiality agreements, detailed financials, NDAs, police reports, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Plastics-Extrusion-Machinery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26438</link>
<guid>9cdef155fb46f275b78d8c9eb523d7a0</guid>
<pubDate>Fri, 17 Oct 2025 14:25:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Plastics-Extrusion-Machinery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6378e59b8ed3bc0fffa227188fb36046d7ce5667f0e938d5d99d50d9698b27c</i><br /><br />Threat actor <b>description</b>: <i>Plastics Extrusion Machinery LLC, known as PEM, is a leading provider of innovative downstream equipment tailored for the PVC pipeand custom profile industries. We We are ready to upload more than 350GB data. There are lots ofessential corporate documents such as: financial data (audit, payment details,financial reports, invoices), detailed employees and customers information ( Dl numbers, Social Security Numbers, medical information, emails, phones) confidential information, NDAsand other documents with detailed personal information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Curtis-Steel-Co</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26439</link>
<guid>c5d2c718008d3490546d029cab134fb7</guid>
<pubDate>Fri, 17 Oct 2025 12:39:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Curtis-Steel-Co</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a4350929192633f9fa3304a38cc8ca142a8445182123d244248f0fbdfbe6ed66</i><br /><br />Threat actor <b>description</b>: <i>Curtis Steel Aluminum Co. is a leading tubing supplier based in L
as Vegas, providing high-quality metal and steel products, includ
ing aluminum, carbon steel, stainless steel, and welding supplies
. The company offers various precision services such as steel cut
ting, laser cutting, metal drilling, and hole punching, catering 
to both commercial and individual clients since 1970. 

We We are ready to upload more than 20GB data. There are lots of 
essential corporate documents such as: financial data (audit, pay
ment details,financial reports, invoices), detailed employees and
customers information ( Dl numbers, Social Security Numbers, med
ical information, emails, phones) confidential information, NDAs 
and other documents with detailed personal information. 
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>BMP-Worldwide</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26429</link>
<guid>6ac9ae1743524cdf9197f1ea50412d72</guid>
<pubDate>Thu, 16 Oct 2025 18:46:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>BMP-Worldwide</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>309e3b7e9e2e4270cf47981c3242390906c342d6151b4b3dc18fe266033ddfc0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.bmpworldwide.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Coilplus</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26426</link>
<guid>22b880633e6c3b3c7bccc56c59ff11b9</guid>
<pubDate>Thu, 16 Oct 2025 16:25:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Coilplus</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7deaa35ab6c2285a9fbcb67575bc63fb755a9b40e2a67be5a0f3772a0ce4ac6b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>gslong.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26413</link>
<guid>da92ce36d3c841c78a1dc24ea5abcb72</guid>
<pubDate>Thu, 16 Oct 2025 13:24:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>gslong.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f06e663ab87a31e5ad791bac67292a164197d048fd9e98ddbe90ec8541fd310</i><br /><br />Threat actor <b>description</b>: <i>GS Long provides specialized services in plant nutrition, plant protection, and field consulting for the agricultural industry. 
The company specializes in developing customized solutions to increase crop yields and safety. Committed to buil            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>coppage.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26414</link>
<guid>86779aa5332ae2efcb7252165bc633e5</guid>
<pubDate>Thu, 16 Oct 2025 13:24:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>coppage.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>898654e52d95be25642097d430210c3c04803078f6251a929dac9914a8f1511a</i><br /><br />Threat actor <b>description</b>: <i>At Coppage Construction, we design and build homes.
1.The document is a statement of income for Coppage Construction Company, Inc. for the period ending April 30, 2025.
2.The document is a report entitled “Work in Process” by Coppage Co            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>arizonafireplaces.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26415</link>
<guid>3aef625160d85a9fc3b52f3be4474ed5</guid>
<pubDate>Thu, 16 Oct 2025 13:24:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>arizonafireplaces.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>98ab7fd1b82b85b4392c582471492cf48f360b319e7c6da25c464ddb006f898c</i><br /><br />Threat actor <b>description</b>: <i>Arizona Fireplaces offers its customers top-notch quality and service for fireplaces and accessories from leading global brands.
1.Arizona Department of Revenue — Contractor’s Certificate (Form 5005) “Contractor's Certificate for Prime            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>pcdpackaging.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26417</link>
<guid>691f1c02ba340056657d9fd9f5bf017c</guid>
<pubDate>Thu, 16 Oct 2025 13:24:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>pcdpackaging.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d6a3fc636f804368e34368e0f0358951df3be9cbffe7715ea4e8560a2bcae30</i><br /><br />Threat actor <b>description</b>: <i>Development of customized industrial packaging. Single-use racks, export packaging, packaging for power units, specialized packaging, packaging for sea containers.
1.The document is an official bank statement from PCD Packaging de México S.            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.ronvil.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26421</link>
<guid>3ca43d27fa81f452a4d0b6ae09f809aa</guid>
<pubDate>Thu, 16 Oct 2025 09:24:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kraken</b> claims attack for <b>www.ronvil.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0426dc24ea730bde13046627e62203868d37136c914140c63109b3247c6b3ae1</i><br /><br />Threat actor <b>description</b>: <i>Ronemus & Vilensky LLP is a New York-based law firm specializing in personal injury, civil rights, medical malpractice, and acci...</i><br />Target victim <b>website</b>: <i>www.ronvil.com</i>]]></description>
<category>kraken</category>
</item>
<item xmlns:dc='ns:1'>
<title>Beta-Dyne</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26408</link>
<guid>5e29cd6e10b0c9d7af2be2668f0f152a</guid>
<pubDate>Thu, 16 Oct 2025 07:25:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Beta-Dyne</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0943e0ace77bc4e643b8ba51065ff957f43100bff81219da3886e74e569d0d6b</i><br /><br />Threat actor <b>description</b>: <i>Beta Dyne, USA - develops and manufactures electrical equipment for the industrial plants, communications и medical. With over 20 years in the power industry, Beta Dyne, Inc. has developed a wide range of unique and high performance power pr            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Middlesex-Appraisal-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26406</link>
<guid>165cbe7ba268f8d7901f5edbc896084e</guid>
<pubDate>Thu, 16 Oct 2025 02:25:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Middlesex-Appraisal-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f71fe0470ffdaf05f4adb4c951709c26114fa6e9d9e1c507d565a8ac06275bbc</i><br /><br />Threat actor <b>description</b>: <i>Middlesex Appraisal Associates, USA - provides appraisal services in Eastern Massachusetts in Middlesex, Essex, Suffolk, Norfolk, Worcester, and Plymouth counties. Founded in 1992, the company provides appraisal and consulting services utiliz            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sprague--Jackson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26407</link>
<guid>261afa2a7f87c853bb38ebe6149a0ac0</guid>
<pubDate>Thu, 16 Oct 2025 02:25:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Sprague--Jackson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f2c3647beb6b2721ba9847558f770d76e065dc2504eede31514439d55d878a7</i><br /><br />Threat actor <b>description</b>: <i>Sprague & Jackson, USA - Sprague & Jackson is a tax services firm that offers a range of client services including secure document submission and payment options. They provide personalized assistance through scheduled meetings to help clients            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bengal-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26405</link>
<guid>96f4303c756ba84f75fdbcc92d0f0414</guid>
<pubDate>Thu, 16 Oct 2025 01:25:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Bengal-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>141853b28f11257db4c22a966c27369c9d52be2e8bc662c533a94f3ed8faaa28</i><br /><br />Threat actor <b>description</b>: <i>Bengal Industries, USA - founded in 1995, is a specialty carrier serving the continental United States and Canada.  The company is experienced in turnkey projects involving heavy lifting and transportation services. If the load is large, heav            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rasi-Laboratories</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26404</link>
<guid>e7ba959de901f17d3f72929c945df002</guid>
<pubDate>Wed, 15 Oct 2025 22:25:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Rasi-Laboratories</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f10df03c3aca5bfbb378efcd48441a34fd19d042b360270f1b63f11b0a85f85e</i><br /><br />Threat actor <b>description</b>: <i>Rasi Laboratories, USA -  a manufacturer and developer of nutraceuticals, specializing in dietary supplements like capsules, tablets, probiotics, and functional foods.  Their facility in Cranbury, New Jersey, spans 198,500 square feet and is             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tex-Tube</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26403</link>
<guid>81fd0241fd6df61d5201d65fd47bb698</guid>
<pubDate>Wed, 15 Oct 2025 18:45:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Tex-Tube</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>35a1d4b9ae3c02d3d515b59e35e62e785a2421e78e711aa0e2f3f8831e5ef41b</i><br /><br />Threat actor <b>description</b>: <i>Tex-Tube Tex Tube has over 75 years of experience in manufacturing steel products, specifically electric resistance welded (ERW) steel pipes, adhering to API and ASTM specifications. Serving the North American continent, the company produces tubular steel products that meet both API and ASTM standards.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Richmond-Behavioral-Health-Authority</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26395</link>
<guid>58a3c88f8354d4464ad552a6ab7ce400</guid>
<pubDate>Wed, 15 Oct 2025 18:43:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Richmond-Behavioral-Health-Authority</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1fdf091858976a00c607f6bf26548886f15692f49c4f3fcc315f528950fc6886</i><br /><br />Threat actor <b>description</b>: <i>Richmond Behavioral Health Authority (RBHA) is a statewide organization dedicated to providing comprehensive mental health, mental retardation, substance abuse and prevention services to the residents of the City of Richmond. The organization            ...</i><br />Target victim <b>website</b>: <i>www.rbha.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cellucap-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26402</link>
<guid>0dc5fdbc98f80f9aaf2b43b8bc795ea8</guid>
<pubDate>Wed, 15 Oct 2025 18:42:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Cellucap-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3b1da83d708a62ac761b177009f7e1f2ddc0aae022aa62476a3ebd0ae7427d81</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.cellucap.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Global-Shop-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26401</link>
<guid>26bdec29ad7cc9553a512959d3896f97</guid>
<pubDate>Wed, 15 Oct 2025 18:41:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Global-Shop-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cac2a0dea7f074dd41279b720ff054c67459db4e9f841af087c4b6148e1cd0b2</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.globalshopsolutions.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Legacy-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26400</link>
<guid>19bf54221c2a7acc39e53408da0b4612</guid>
<pubDate>Wed, 15 Oct 2025 18:40:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Legacy-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b2dd6c7c5e7d98128bfa7ea73f1f973d70440f0d9896905a77a04d4b96eec46f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.legacymfg.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Koch--White-Heating--Cooling</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26399</link>
<guid>b22c8dd80eaa4578ca19fc1c6e983da7</guid>
<pubDate>Wed, 15 Oct 2025 18:40:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Koch--White-Heating--Cooling</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9bd294d42b36ad08e7b996f3e41f66d4b5cadac42fd506aa737783f5000d3f66</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.koch-white.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Royal-Thai</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26398</link>
<guid>5f6780632f5d27dd0cded5fc9361169e</guid>
<pubDate>Wed, 15 Oct 2025 18:39:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Royal-Thai</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b935b7d80a211217d619122d7819a884969234974a65b9f73f8e51c8093a333</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.royalthai.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>EMBASY-OF-BOLIVIA-DC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26397</link>
<guid>125afb06ef365c0991aa632cd76104e1</guid>
<pubDate>Wed, 15 Oct 2025 18:21:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>EMBASY-OF-BOLIVIA-DC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9635603e9217e37e4a990d6f1bff35d6f528d118f2d0e2c44c336636972fc5fd</i><br /><br />Threat actor <b>description</b>: <i>Ransom: 200k
400gb</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>regionalurology.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26396</link>
<guid>a47cab1df307c338b6843eb72d9ee91e</guid>
<pubDate>Wed, 15 Oct 2025 18:20:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>regionalurology.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f979ab93f5e9da8ea84604c2fe50f38a3dd6833715b9c2df665df7924f75020f</i><br /><br />Threat actor <b>description</b>: <i>Ransom: 200k
300gb</i><br />Target victim <b>website</b>: <i>regionalurology.com</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>Core-Resources-Inc-CRI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26390</link>
<guid>82555ac1fb22a5c18698fda8c4220169</guid>
<pubDate>Wed, 15 Oct 2025 16:46:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Core-Resources-Inc-CRI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e51ef829d25d161db82377a9a1e3b734dd419ac219e17f7e9a3095191f8003f6</i><br /><br />Threat actor <b>description</b>: <i>Core Resources specializes in real estate development, general contracting, and owner representation, aiming to establish lasting partnerships in the construction industry. Their services encompass a holistic approach, covering everything from blueprints to financial consulting, to cater to clients’ essential assets. The company emphasizes integrity and strong values, which guide their operations and relationships. They serve a diverse clientele, including notable projects like Washington Park and Coldstream Country Club.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Newmark-Healthcare-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26391</link>
<guid>4d04ff8c215cf3678bb0b3aaf7ee4939</guid>
<pubDate>Wed, 15 Oct 2025 16:46:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Newmark-Healthcare-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d49997f510e3334ec0f82c83b4cf0963cff83bb8916610979a72530d6ebd226</i><br /><br />Threat actor <b>description</b>: <i>Newmark Healthcare Services specializes in healthcare recruiting, staffing, and medical career placement, including locum tenens physician placement. The company provides customized solutions tailored to meet the unique needs of healthcare organizations, enhancing recruitment strategies with the latest techniques and digital marketing. Their services extend to healthcare consulting, focused on optimizing organizational efficiency and addressing specific challenges faced by clients. With a commitment to honest engagement and personalized service, Newmark aims to build genuine partnerships with both clients and candidates.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>East-Jefferson-General-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26392</link>
<guid>ce182c417ca31f93b03690507fa78f83</guid>
<pubDate>Wed, 15 Oct 2025 16:45:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>East-Jefferson-General-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>09432bd9773fc5cae657f9441ae25e09a52b56146fb900f1ee1ef07ed16edb4d</i><br /><br />Threat actor <b>description</b>: <i>Established in 1971, East Jefferson General Hospital is a non-profit community hospital providing care to patients throughout the area. The campus is located in Metairie, Louisiana.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zierick-Manufacturing-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26393</link>
<guid>7cb74407125873315ea8225aacd97e6d</guid>
<pubDate>Wed, 15 Oct 2025 16:45:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Zierick-Manufacturing-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b615d14e75a19e5183903c4e3ed946b5cbc2000e90d616ac910623f39f9c51ec</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1919 and headquartered in Mount Kisco, New York, Zierick Manufacturing engages in designing, engineering, prototyping, and manufacturing connectors and other stamped metal components for the electronics industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Centurion-Family-Office-Services-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26387</link>
<guid>4b0c6b58fb9b42eaace2cb27c73343db</guid>
<pubDate>Wed, 15 Oct 2025 16:24:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Centurion-Family-Office-Services-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a0bc807057bda7e956898c73e4a1b3aa31c1e2ace89a0959e4f7c9aaba59e520</i><br /><br />Threat actor <b>description</b>: <i>Centurion originated as an idea to bring the high-value, high-impact services, traditionally reserved for only the wealthiest of individuals, to a broader network of families and entrepreneurs. Our Family Office Services address the needs of             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Superior-Linen-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26374</link>
<guid>a0dabc6f2a8ea64b7fb210eec0175a02</guid>
<pubDate>Wed, 15 Oct 2025 15:25:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Superior-Linen-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60f44940a8c783269dfa7887b213e2005cb7305a96f8fc6e3d483b5ce0d3fd16</i><br /><br />Threat actor <b>description</b>: <i>The Superior Linen Supply Company is designed to serve as an extension of our customers' business. By providing timely delivery of quality merchandise, outstanding service and affordable prices for over a century, customers have come to know             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Victory-Christian-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26377</link>
<guid>fbd4c23e175c533d7887cf4c717fac7e</guid>
<pubDate>Wed, 15 Oct 2025 15:25:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Victory-Christian-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>09560c53b2584c6dc99d4f77facfa80a6d20f1efbb66c490f6b163d1c16f37ac</i><br /><br />Threat actor <b>description</b>: <i>Victory Church is a community-focused church located in Tulsa, OK, dedicated to fostering a space where individuals can love God and love people. The church offers a variety of ministries, including programs for children, youth, and young adu            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bay-West</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26378</link>
<guid>af921d3f4ba622035a8eb3ec4cb87659</guid>
<pubDate>Wed, 15 Oct 2025 15:25:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Bay-West</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7761275d04622f19b32c379ed9cc8da4cb7753fa201516076525533199ba1fac</i><br /><br />Threat actor <b>description</b>: <i>Bay West LLC provides environmental consulting and remediation services for government and commercial enterprises. The company offers services in the areas of industrial storm water permitting and consulting; brownfield site assessment, clean            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Florida-Marking-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26379</link>
<guid>eaef056473008c7fe947a09daeb8f592</guid>
<pubDate>Wed, 15 Oct 2025 15:25:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Florida-Marking-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7adf97366fe989af48b496e2e2d366f19b8c9930ef9e6e7f24b71a5def4625b</i><br /><br />Threat actor <b>description</b>: <i>The Kennedy Group, an Inovar company, specializes in providing innovative labeling and packaging solutions that enhance brand visibility. They offer a wide range of high-performance products, including pressure-sensitive labels, warehouse loc            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wheale-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26381</link>
<guid>02d1941438bbd398f00e76203eeee9ea</guid>
<pubDate>Wed, 15 Oct 2025 15:25:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Wheale-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7e279bcd709c53feacad5c3f2855cd3e36b76dc9fd935cc318c2156300fa5280</i><br /><br />Threat actor <b>description</b>: <i>It's Wheale Law Firm's vision that justice is achieved, tailored to each client's case.
Most injury lawyers define success in one way:  money.  Not surprisingly, these attorneys also treat each case and each client the same.  You deserve mor            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ChampionX</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26389</link>
<guid>724192f20f6974d1078ed37a52cf53e3</guid>
<pubDate>Wed, 15 Oct 2025 14:13:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>ChampionX</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad3d5650b0efd69cbc1e3636274bd33f4bdd15374ee598197bff55f36e482524</i><br /><br />Threat actor <b>description</b>: <i>Headquartered in The Woodlands, Texas, ChampionX is a global leader in chemistry solutions and highly engineered equipment and technologies that he...</i><br />Target victim <b>website</b>: <i>championx.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kearney-Public-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26388</link>
<guid>6ca372d29d2e321e25d0a7a6458d7995</guid>
<pubDate>Wed, 15 Oct 2025 13:22:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Kearney-Public-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d0fce9c241dde8f19adb962ad8517385005b40473412684affc72c51c4874e2</i><br /><br />Threat actor <b>description</b>: <i>Kearney Public Schools is a school district comprised of 18 schools of various ages! This school has significant financial and other resources and the ability to protect itself and its students! However, it chose a poor path and is now paying for its irresponsibility! A large amount of confidential and classified information of various kinds was leaked into the public domain! This included personal security data, financial documents, and even information belonging to third parties, such as students' relatives and parents.</i><br />Target victim <b>website</b>: <i>kearneypublicschools.org</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Navigator-Business-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26370</link>
<guid>1ed013af9f67744751dc13861ebeea2f</guid>
<pubDate>Wed, 15 Oct 2025 09:45:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Navigator-Business-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aeca391f4555f803e8dd52efc0d4ea795ef8cf80fd7bb77c78414384e98d6f95</i><br /><br />Threat actor <b>description</b>: <i>Helps companies conquer their industry and business complexity by implementing and supporting the best fit systems and processes</i><br />Target victim <b>website</b>: <i>nbs-us.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Executive-Cabinetry</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26337</link>
<guid>819ba59c63730c44639f973a71652916</guid>
<pubDate>Wed, 15 Oct 2025 02:24:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Executive-Cabinetry</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6980e08107297e4510bada88d91b98764ba7cb639c8ffe56b7fb54ad3ea6e79e</i><br /><br />Threat actor <b>description</b>: <i>Located in Simpsonville, South Carolina, Executive Cabinetry is an industry leader in semi-custom and custom cabinetry. The Executive Cabinetry facility encompasses 226,000 square feet of vertically integrated manufacturing space. Simply stat            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>WebCut-Converting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26347</link>
<guid>0d0d9d004baee1e34b4dc96a0ba2e03d</guid>
<pubDate>Wed, 15 Oct 2025 02:24:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>WebCut-Converting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>edc42368c92c3d98625bd35933c6cd46fb938213c44647021f6e6c0c261a1c1b</i><br /><br />Threat actor <b>description</b>: <i>WebCut Converting, Inc. specializes in contract slitting, laminating, and sheeting services tailored for the printing, converting, medical, and industrial markets. They process a variety of substrates including films, foams, non-wovens, and p            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pro-Fab</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26350</link>
<guid>9a2645cb664378e50626065996e58791</guid>
<pubDate>Wed, 15 Oct 2025 02:24:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Pro-Fab</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e485e08865c5cba9c3af9192a946b5b3a08d008310517f01f8a8a019131ee950</i><br /><br />Threat actor <b>description</b>: <i>Pro Fab, Inc. specializes in custom design and fabrication products and services primarily for cleanrooms and industries such as semiconductor manufacturing, medical pharmaceutical labs, and American defense. They offer a wide range of produc            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-Jersey-Property-Liability-Insurance-Guaranty-Association</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26351</link>
<guid>a50d6d536bc495e21188adddad4e853a</guid>
<pubDate>Wed, 15 Oct 2025 02:24:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>New-Jersey-Property-Liability-Insurance-Guaranty-Association</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e3cfdf4b50b00d5230f83f191d2b64647dc2931f8759245841592e58aa5cfc3</i><br /><br />Threat actor <b>description</b>: <i>New Jersey Property-Liability Insurance Guaranty Association, USA - is committed to excellence in providing outstanding claims service to claimants and policyholders in accordance with the Association's statutory responsibilities on behalf of            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>All-Truck-Transportation-Co.-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26352</link>
<guid>659815cccf7b2a3c4bc88c198377a778</guid>
<pubDate>Wed, 15 Oct 2025 02:24:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>All-Truck-Transportation-Co.-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c1b0f66a0f1a9187ace8ede2ff93a52506067b25fe8eacd4fe5f306e82dea6d</i><br /><br />Threat actor <b>description</b>: <i>All Truck Transportation Co., Inc. is an asset-based carrier offering local and regional truckload transportation solutions. We are headquartered in Chicago, Illinois with a vast network of terminals throughout the Midwest. We operate within             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Charles-River-Properties</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26353</link>
<guid>427d46205152382d9d20f64490c8cce0</guid>
<pubDate>Wed, 15 Oct 2025 02:24:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Charles-River-Properties</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a76e14b75c2d96c2521ffdf43d1c99317d824adc4d662dc3459404caf66a681</i><br /><br />Threat actor <b>description</b>: <i>Charles River Properties, USA -  a real estate brokerage based in Waltham, Massachusetts, that handles residential and commercial sales and rentals. The company works only with very large properties. In its portfolio you will not find real es            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ganther-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26335</link>
<guid>3ff55afdf16fea13cf00f29dddc53948</guid>
<pubDate>Tue, 14 Oct 2025 21:55:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Ganther-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3a2c00838bff12bac40eef57b692ad18316266ae50111073869ae793a682912</i><br /><br />Threat actor <b>description</b>: <i>Established in 1979, GCI is headquartered in Anchorage, Alaska. They are a telecommunications provider with services including internet, mobile, TV, and more. As Alaska's largest telecommunications provider, they're committed to bridging the digital divide in the most remote communities in the world by investing in connectivity solutions that empower all Alaskans to live more connected lives.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>UT-Health-Austin</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26356</link>
<guid>4a381f06f401489920c2ed5650ac4915</guid>
<pubDate>Tue, 14 Oct 2025 20:25:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>UT-Health-Austin</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96cccc3b46d9e54cb7f9b73ee9bba81a63494cff2186ad85f29b127c41244259</i><br /><br />Threat actor <b>description</b>: <i>UT Health Austin is the clinical practice of the Dell Medical School located in downtown Austin, offering personalized and comprehensive health care services. The organization provides a wide range of medical services including adult psychiat            ...</i><br />Target victim <b>website</b>: <i>www.uthealthaustin.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Repeated-Signal-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26323</link>
<guid>f35537cb63b3c6f0c82ff3d27e37814f</guid>
<pubDate>Tue, 14 Oct 2025 20:24:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Repeated-Signal-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>69c9b0f4efec61d47299fce005a52d6c5d9ae99279255fb04de401b8739fdea9</i><br /><br />Threat actor <b>description</b>: <i>Repeated Signal Solutions (RSS) specializes in Cellular, Public Safety, and Wireless Coverage Solutions, offering a wide range of services including engineering, construction management, and managed services since 2004. Their expertise spans             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Catawba-County-Government</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26324</link>
<guid>deabeaf0bc00589d890fa81d23f56bf5</guid>
<pubDate>Tue, 14 Oct 2025 20:24:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Catawba-County-Government</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b0e89f5af3cf3db6efabb60e0a9059f87ba49f8ccf3fffff99b39a6ba890feec</i><br /><br />Threat actor <b>description</b>: <i>Catawba County, NC provides an online directory to services around the area including Human Resources, Libraries, Sheriff's Office and more. Created for Catawba County and located in North Carolina.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>HMP-Global</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26325</link>
<guid>7b5bdfc3463973353c96415d45663cc4</guid>
<pubDate>Tue, 14 Oct 2025 20:24:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>HMP-Global</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1c579c8acf0604b060ecdeb93f4a0f6cf9e746d5fbe945886a17a7134ee96ca</i><br /><br />Threat actor <b>description</b>: <i>For 40 years, the company has built trusted brands including Psych Congress, the premier source for mental health education, and the Symposium on Advanced Wound Care (SAWC), the largest wound care meeting in the world. HMP Global partners wit            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Morris-Sockle</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26326</link>
<guid>aae14bda33aa45a1d45d45011529b806</guid>
<pubDate>Tue, 14 Oct 2025 20:24:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Morris-Sockle</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d19e7b2f68fab8b9c3c5814906953c2e6d37cfcc6db2c7d1eb35fea3175f7d7</i><br /><br />Threat actor <b>description</b>: <i>Morris-Sockle, PLLC is a premier law firm specializing in Family Law and Divorce, with over 40 years of experience in protecting clients' rights during and after divorce. They offer a comprehensive range of services including divorce processe            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Capitol-Construction-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26327</link>
<guid>b2a223f097589a3682d3221d102fc52e</guid>
<pubDate>Tue, 14 Oct 2025 20:24:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Capitol-Construction-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d8c0aa25b057ce88c36c466974d444cf7d7fc9d0fade194354d4557dca5c3637</i><br /><br />Threat actor <b>description</b>: <i>For over 25 years, Capitol Construction Services, Inc. has been one of the most professional general contractors in the Indianapolis market and has followed many clients all over the United States. CCSI has become experts in the areas of tena            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Journal-of-Managed-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26331</link>
<guid>ac596866c319dc8ac9d108a4f3da2fc3</guid>
<pubDate>Tue, 14 Oct 2025 20:24:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>American-Journal-of-Managed-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63bba3d180741f771c979a5b3c32e71986935761d14c0841e8469dfdbf2f24dc</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1995, The American Journal of Managed Care is a multimedia peer-reviewed, Medline-indexed journal that keeps industry leaders on the forefront of various different policies. This company is headquartered in Cranbury, New Jersey.
T            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>PQCNC-Hospitals</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26333</link>
<guid>556af2550dcbee76da893225af4aaf44</guid>
<pubDate>Tue, 14 Oct 2025 20:24:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>PQCNC-Hospitals</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8432a1e804ea8c125ea783d66620c39e3be7605240c3d46371096ae29c83eeb</i><br /><br />Threat actor <b>description</b>: <i>The Perinatal Quality Collaborative of North Carolina is a community-focused organization dedicated to improving maternal and infant health outcomes in the state. They offer various initiatives and resources aimed at enhancing the quality of             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Riviera-Beach-Florida</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26360</link>
<guid>83575ac3b1da0569ebbbea825b9346a3</guid>
<pubDate>Tue, 14 Oct 2025 20:22:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>City-of-Riviera-Beach-Florida</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60f78a70385f49d0580214cbee0235bfc7e3ed9f4a6e9ba92e347901e22bd8ee</i><br /><br />Threat actor <b>description</b>: <i>The City of Riviera Beach is committed to making its' website/social media accessible and user-friendly for everyone. If you are having difficulty viewing or navigating the content on our website, or notice any content, feature, or functional            ...</i><br />Target victim <b>website</b>: <i>www.rivierabch.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trans-World-Shipping-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26362</link>
<guid>fec4a76ff20508cb6c36cf6b37fea805</guid>
<pubDate>Tue, 14 Oct 2025 20:21:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Trans-World-Shipping-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eed3f408b8cc333457cec69b369b7339db50fe8081ec67181821c745afede9ad</i><br /><br />Threat actor <b>description</b>: <i>Trans-World Shipping Service, Inc. and Toledo Air Cargo, Inc. are full-service companies offering a wide variety of import and export services including US customs brokerage, international freight forwarding, air freight services, warehousing            ...</i><br />Target victim <b>website</b>: <i>www.tws-tac.net</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Addis</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26363</link>
<guid>e8349b4c48f9678248af8c5e8148a16e</guid>
<pubDate>Tue, 14 Oct 2025 20:21:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Addis</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0dc31cde1e4e001a35d282e33e87b0dc5da5394d5c124604d44b21b9cb163709</i><br /><br />Threat actor <b>description</b>: <i>Addis, Louisiana, located in West Baton Rouge Parish, along the Mississippi River, situated on Louisiana Highway One, is located just minutes from Louisiana’s State Capitol City – Baton Rouge. The Town of Addis is a growing town, home to             ...</i><br />Target victim <b>website</b>: <i>www.addisla.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>LaRosas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26365</link>
<guid>105f777347c73908a23cbf0de0c33d3b</guid>
<pubDate>Tue, 14 Oct 2025 20:19:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>LaRosas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>80b7267531b73cad4e991fadb80c26375447c7750b1154773cb92a22dd838712</i><br /><br />Threat actor <b>description</b>: <i>LaRosa's, Inc. operates and franchises Italian restaurants and family pizzerias. The company offers pizzas and other Italian favorites for dine-in, delivery, and carrying out. It serves guests and neighborhoods throughout Greater Cincinnati,             ...</i><br />Target victim <b>website</b>: <i>www.larosas.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ostrolenk-Faber</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26316</link>
<guid>7059c6d38ee3bd1197869687cbb10fc2</guid>
<pubDate>Tue, 14 Oct 2025 18:25:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Ostrolenk-Faber</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e58f6bb2042f5da24b20a03bfb60cad8cbbfc8ddb6c8143d26d938bb8f70681c</i><br /><br />Threat actor <b>description</b>: <i>Ostrolenk Faber LLP is a premier intellectual property boutique law firm that has been specializing in domestic and international intellectual property legal matters since 1929.We are ready to upload more than 43gb of corporate documents. Employees personal documents, scans of customer documents (SSNs, name, DOB, address and so on), project files, lots of client information, financials, confidential project files, contracts and agreements, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Art-Guild</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26317</link>
<guid>771f705223826e116ce54153b8f1268a</guid>
<pubDate>Tue, 14 Oct 2025 18:25:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Art-Guild</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d0f40dcf1bec8cf3b70c4f549ab41142764ce4bd25cb1a9feaa8a43bd3c4ac37</i><br /><br />Threat actor <b>description</b>: <i>Art Guild is a full-service provider of face-to-face marketing and educational programs.We are ready to upload 24gb of corporate documents. Lots of HR files with employee information (DOB, addresses, phones, medical test and so on), a bit of client data, financials, contracts, confidential project files, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>baronespecialtysteel.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26334</link>
<guid>93f19dbc4426f203a274642a804f36e8</guid>
<pubDate>Tue, 14 Oct 2025 16:53:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>baronespecialtysteel.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c34fa677d8ae9359ed23d3fc2b93e44c3c364011d9254c3ffdf923fe351804e3</i><br /><br />Threat actor <b>description</b>: <i>Bar One Specialty Steel specializes in providing high-quality specialty steel products tailored for various industrial applications. Their product offerings include a wide range of steel grades and forms designed to meet specific client needs. The company primarily serves clients in the manufacturing, construction, and automotive sectors. With a focus on exceptional customer service and precision engineering, Bar One aims to be a trusted partner in the steel supply chain. Employees: 25 Revenue: $5 Million Industry: Industrial Machinery & Equipment Phone Number:(877) 541-6421</i><br />Target victim <b>website</b>: <i>baronespecialtysteel.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Law-Offices-of-Michael-C-George</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26315</link>
<guid>e75d64c2cffa2c2daa3809c44103d725</guid>
<pubDate>Tue, 14 Oct 2025 16:25:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>The-Law-Offices-of-Michael-C-George</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>def33117dc204e7daa057cad1211b83074d10370fbf8fd92afbe773dd0a4c9c0</i><br /><br />Threat actor <b>description</b>: <i>The Law Office of Michael C. George, P.A. specializes in personal injury and criminal law, providing legal representation for clients throughout Florida who hav...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pratt-Homes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26308</link>
<guid>476e44e8d1f95737990dcabe656081b4</guid>
<pubDate>Tue, 14 Oct 2025 15:25:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Pratt-Homes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e20514cf8bebccd3d39b58780ca36ba63cc6329f3b88510ec6ab189d1f58b390</i><br /><br />Threat actor <b>description</b>: <i>Pratt Homes was founded in 1973 by Len and Lowell, who, along with their partner Uncle Doug, built their first official Pratt Home in Scandia. They faced student loans but were driven by a passion for quality craftsmanship. Their commitment t            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Force-Marketing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26309</link>
<guid>ba0745192120cbda87da3de261ec9f02</guid>
<pubDate>Tue, 14 Oct 2025 15:25:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Force-Marketing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc5a610931339e0c3e0e227b19c58614dd08ace26254aa250739f3023c508aff</i><br /><br />Threat actor <b>description</b>: <i>Force Marketing, USA - Founded in 2006, Force Marketing is a leading marketing technology provider to the automotive industry, whose Helix Technologies, WeDrive Automotive and DRIVE video technology brands deliver combined synergies to optimi            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Plast-O-Matic-Valves</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26310</link>
<guid>ea8f123bcd0751b651e0944774d790e0</guid>
<pubDate>Tue, 14 Oct 2025 15:25:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Plast-O-Matic-Valves</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d7c8023b08dcbec7994f3dd84d5e4d2a0277794ecc04c10aef9f143a1013f36</i><br /><br />Threat actor <b>description</b>: <i>Plast-O-Matic Valves, Inc. specializes in the development and manufacturing of high-quality thermoplastic valves and controls for various industries, including agriculture, chemical processing, wastewater treatment, and semiconductor applications.We are ready to upload 51gb of corporate documents. Employees personal documents (DLs and others), lots of HR forms, clients information, financial and accounting data, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Blood-Bank-Computer-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26311</link>
<guid>48e3e457e80b2cf856688ab6280c0d56</guid>
<pubDate>Tue, 14 Oct 2025 15:25:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Blood-Bank-Computer-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c577b1e51f742ea1ea0134507a7a11a4e4fd6974e9e3e506dd11f9ce8b43db8</i><br /><br />Threat actor <b>description</b>: <i>BBCS Inc specializes in innovative blood banking software and biologics management solutions, designed to enhance operational workflows and decision-making for healthcare providers.We are ready to upload 20gb of corporate documents. Detailed employees personal documents scans (passports, DLs, SSNs, w-9 forms, credit card details and so on), confidential HR forms, clients information, medical information, financial and accounting data, contracts and agreements, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>ME-Global-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26313</link>
<guid>93c91c3712b38f071fe9804ced79c112</guid>
<pubDate>Tue, 14 Oct 2025 14:25:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>ME-Global-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3099d2096edfd224f71781a130b68fdb719740ceece7335653d181a216da814f</i><br /><br />Threat actor <b>description</b>: <i>M&E Global Group, Inc. USA -  specializes in point of purchase display and store fixture manufacturing, offering comprehensive services from design to production and fulfillment. Another part of this business is the production of parts such a            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Karnes-Electric-Cooperative</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26292</link>
<guid>35b729b42782ce151f53d08c954284dd</guid>
<pubDate>Tue, 14 Oct 2025 02:25:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Karnes-Electric-Cooperative</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6d2972e601a8f30e319ec33b6694a9aadef0aa0ef174df5097fbf0dfd7f109e</i><br /><br />Threat actor <b>description</b>: <i>Karnes Electric Cooperative, USA is a not-for-profit electric distribution utility that serves 12 counties in South Texas and the Coastal Bend region. Headquartered in Karnes City, Texas, it offers competitive rates and innovative solutions t            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bank3</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26290</link>
<guid>72dee70a8d52e44dd4e2bd463b806ffe</guid>
<pubDate>Tue, 14 Oct 2025 00:25:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Bank3</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd317752d4b01743a46381ff9561c3bad47c06c4e66b2e85e2c18f067caf2094</i><br /><br />Threat actor <b>description</b>: <i>Bank3, USA - it's a disaster for the clients. Bank3 is a community-driven banking institution offering personal and business banking services, as well as mortgage lending. The bank serves clients in various locations including Memphis, Nashvi            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>San-Bernard-Electric-Cooperative</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26288</link>
<guid>b769f92a201bb18dd58e514e7c2e8f05</guid>
<pubDate>Mon, 13 Oct 2025 23:26:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>San-Bernard-Electric-Cooperative</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06f66335c3f402064e34c90329f0ab59e622cfa5ff82b9d94c88d35e30e62e7d</i><br /><br />Threat actor <b>description</b>: <i>San Bernard Electric Cooperative, USA - offers a range of services including outage reporting, generator installation, and energy efficiency programs. Its intended clients are members of the community who utilize electric services, as well as            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>SourceOne-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26282</link>
<guid>806107639381a3c77b34ee5128f7430f</guid>
<pubDate>Mon, 13 Oct 2025 21:01:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>SourceOne-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>215efb41c65358e9a58755afede401184df5477f4f68c35867c3ffbdfe2310ba</i><br /><br />Threat actor <b>description</b>: <i>SourceOne Corporation, USA - specializes in managing all phases of Outside Plant (OSP) and Inside Plant (ISP) projects, offering comprehensive solutions including fiber design, permitting, construction, and final inspection. The company provi            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fountains-Condominium-Operations</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26283</link>
<guid>f0bc49a48370642aac2e13d6db960830</guid>
<pubDate>Mon, 13 Oct 2025 21:01:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Fountains-Condominium-Operations</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d469f05eebec246fd24b4b79ecbdbc4d2f6d824f7dfeee2cae0eb4c2d9092610</i><br /><br />Threat actor <b>description</b>: <i>Fountains Condominium Operations Inc. is an in-house management company dedicated to ensuring the beauty, safety, and stability of the area, promoting neighborl...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Design-To-Print</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26261</link>
<guid>2fd71648d0bfec3f35c7415c3901a72c</guid>
<pubDate>Mon, 13 Oct 2025 13:58:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Design-To-Print</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>336af02c5899276594fa4c63b9ff246d51c2e893c2207e1c485b8f3aa1309dea</i><br /><br />Threat actor <b>description</b>: <i>Printdaddy design printing is known for its excellence and expertise in indoor, outdoor advertising, custom vinyl banners that are personalized according to your business requirement. Advertise you business well and our designs will bring the best out of your services company is headquartered in 175 N 400 E, St. George, UT 84770, USA. 73 Employees. The total amount of data leakage is 3.3 TB. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cemtrex</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26263</link>
<guid>1d03841ea08e08c6e1c43cee7e07aaaa</guid>
<pubDate>Mon, 13 Oct 2025 13:52:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Cemtrex</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b666d7e5c53dbc88eb1bd2b3f61caba6ce2d0b0f15ca8d921fc241868c4f501c</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2004 and headquartered in Brooklyn, New York, Cemtrex is a global, diversified industrial and manufacturing company that provides a wide array of solutions to meet today's technology challenges. Cemtrex provides manufacturing services of advanced custom engineered electronics, industrial contracting services and monitoring instruments for industrial processes and environmental compliance. company is headquartered in 276 Greenpoint Avenue, Building 8, 2nd Floor, Brooklyn, NY 11222, USA. 264 Employees</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>North-Stonington-Elementary-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26285</link>
<guid>acc9a9c91909c59853d0f527e068c11c</guid>
<pubDate>Mon, 13 Oct 2025 13:17:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>North-Stonington-Elementary-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0671d8619dd27c5f9446d44e7495a0321367ab04787f49d3238ccf99f3e64bf4</i><br /><br />Threat actor <b>description</b>: <i>North Stonington Public Schools have two public schools and 736 students, strives to create a safe environment for themselves, their school, and their students. However, their "Safety First" slogan has recently changed! Despite having extensive resources and support, North Stonington Public Schools has a very poor IT security team that is doing a poor job! With our help, over 3 TB of confidential data was exposed, meaning all student data, including the entire history and documentation, is now in our hands!</i><br />Target victim <b>website</b>: <i>northstonington.k12.ct.us</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>michigancityin.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26273</link>
<guid>90ee95b54c20d0991531360036611c37</guid>
<pubDate>Mon, 13 Oct 2025 11:52:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>obscura</b> claims attack for <b>michigancityin.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>83939e57e2100273ab29aeb3a6131071c4aacb08e3ca2caa32b9a97675e73753</i><br /><br />Threat actor <b>description</b>: <i>Revenue: ?? | Leak Size: 450 GB | Status: Published</i><br />Target victim <b>website</b>: <i>michigancityin.gov</i>]]></description>
<category>obscura</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carewell</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26264</link>
<guid>4f513f68a7732df8db6b106ba6565073</guid>
<pubDate>Mon, 13 Oct 2025 09:20:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Carewell</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d03ddf7af069a44c4eac4df66c57e2ef94571ddb48936fecb2810bbfd0d93b89</i><br /><br />Threat actor <b>description</b>: <i>No description available.</i><br />Target victim <b>website</b>: <i>Not provided</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>CMF</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26258</link>
<guid>902c747a0d415560ebd0cfb9f8e01794</guid>
<pubDate>Sun, 12 Oct 2025 20:43:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>CMF</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b8683d8f0312755d065b63da1106dd793711e7b3c803fc93f1ad59413ba4608</i><br /><br />Threat actor <b>description</b>: <i>CMF Inc specializes in expert design assistance, fabrication, and installation services for architectural sheet metal and related products. Since 1956, they have collaborated with leading architects and builders to deliver innovative metal solutions for a variety of projects, including commercial, educational, and public spaces. Their comprehensive services encompass design-build, design-assist, CAD/BIM drawing, and all aspects of metal roofing and siding. CMF is recognized for their craftsmanship, having received multiple awards for their work on notable projects like the Apple Park Headquarters and the LACMA Resnick Pavilion.</i><br />Target victim <b>website</b>: <i>www.cmf.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sunbelt-Design--Development</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26259</link>
<guid>b02e588aac5fb0396ed0293ebaba8326</guid>
<pubDate>Sun, 12 Oct 2025 20:42:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Sunbelt-Design--Development</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>762bf031d09187ed78b80de24b20e6ec8b0e027798a27a38f23265f4c66f3a47</i><br /><br />Threat actor <b>description</b>: <i>Sunbelt Design & Development, Inc. specializes in ground handling equipment, lifting equipment, inspection equipment, spare parts, and maintenance equipment. The company aims to provide high-quality solutions for clients in need of reliable lifting and handling equipment. Their comprehensive offerings include inspection and testing services, ensuring safety and compliance in operations. Based in San Antonio, Texas, Sunbelt caters to various industries that require robust handling and maintenance solutions.</i><br />Target victim <b>website</b>: <i>www.sunbeltdesignanddevelopment.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>HARVARD.EDU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26252</link>
<guid>eadb38098fddecbe319d0d83c840134a</guid>
<pubDate>Sun, 12 Oct 2025 19:42:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HARVARD.EDU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c8b43708820d952fb4cb284521fb4f966b5019fcc66298abdb92181c9370c6b</i><br /><br />Threat actor <b>description</b>: <i>Headquarters:
Massachusetts Hall, Cambridge, Massachusetts, 02138, United States
Phone:
(617) 495-1000
Website:
www.harvard.edu
Revenue:
$6.1 Billion
Industry:
Colleges & Universities, Education </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Team-Schierl-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26239</link>
<guid>e81fbbc0f74685dfb845057e10587be2</guid>
<pubDate>Sun, 12 Oct 2025 03:26:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Team-Schierl-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>69b66ea032cb4115ecc44574c1254b2a4af53a41b81cae870a53d167be693ca2</i><br /><br />Threat actor <b>description</b>: <i>Team Schierl Companies is an organization of retail businesses and real estate development. TSC was founded in 1956 and is currently headquartered in Stevens Point, Wisconsin. Today, the family owned and operated Team Schierl Companies passed            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Balfour-Beatty</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26246</link>
<guid>c91c68898d52729db7e6168dcd9b2845</guid>
<pubDate>Sun, 12 Oct 2025 00:49:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Balfour-Beatty</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2cf751ea359a40efbace4e9042cb4868ed5078fd81230fe57ef4fa9ae7815fdf</i><br /><br />Threat actor <b>description</b>: <i>Balfour Beatty US, founded in 1933 and headquartered in Dallas, Texas, is a commercial construction company that offers services for construction management, general contracting, cost consulting, and design-building.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Minnesota-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26249</link>
<guid>e11c667b4ee37a4d0ff7a34695f07405</guid>
<pubDate>Sun, 12 Oct 2025 00:15:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>radiant</b> claims attack for <b>Minnesota-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>adb9985c632a307583da3bfb3c47c7225101837df65d055a30194ff5e1b2573b</i><br /><br />Threat actor <b>description</b>: <i>Unknown. Contact us within 7 days or we will expose your hospitals name, add the view more button and start our pressure process.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>radiant</category>
</item>
<item xmlns:dc='ns:1'>
<title>Retail-Texas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26248</link>
<guid>861180853c3c32a9d29791a80a8f21ec</guid>
<pubDate>Sun, 12 Oct 2025 00:14:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>radiant</b> claims attack for <b>Retail-Texas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>40094a2e9f420e1bebb130e657e8955adb679538f85bbef1bb36cb6c2ffc7f3c</i><br /><br />Threat actor <b>description</b>: <i>Unknown. Contact within 7 days or we will publish your name, add the view more button and begin our pressure process.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>radiant</category>
</item>
<item xmlns:dc='ns:1'>
<title>Streebo</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26245</link>
<guid>9ca688b61d4c5f20cab24ef1287e2bad</guid>
<pubDate>Sat, 11 Oct 2025 23:19:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Streebo</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c7241b26d9a3925dd0ebb63eef7ef05983de6e076d63f4c72fb2f6276b5f287</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "Streebo" is an established global IT solutions company, specializing in AI-powered digitization services and products. With a focus on Automation, Mobile and AI technology, Streebo develops digital experiences for industries like banking, healthcare, eCommerce, & telecommunication. Renowned for its consultative approach, Streebo partners with businesses to reshape and renovate their digital landscape, aiding in their overall growth and efficiency.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Citizens-Committee-for-Children-of-New-York</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26242</link>
<guid>3afb012b9305852ff2d460b5aabd071d</guid>
<pubDate>Sat, 11 Oct 2025 20:32:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>brotherhood</b> claims attack for <b>Citizens-Committee-for-Children-of-New-York</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5eb35805d4bc0c7eff1aad19fc4b031531911085768b4c7cece9c4cb0dc7c739</i><br /><br />Threat actor <b>description</b>: <i>Contains: 45 Gb compressed Files</i><br />Target victim <b>website</b>: <i>www.cccnewyork.org</i>]]></description>
<category>brotherhood</category>
</item>
<item xmlns:dc='ns:1'>
<title>Maine-Oxy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26238</link>
<guid>df35ddf90fe44c0afd1a334f5d2aa398</guid>
<pubDate>Sat, 11 Oct 2025 16:07:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Maine-Oxy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33d9096d823591e30d56b6a5fa6d24bd5bc0ab10df8782228dfc7e9553220735</i><br /><br />Threat actor <b>description</b>: <i>Financial data breach</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Complete-Milling-Lab</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26217</link>
<guid>794c58ac5bc1a201c0dd171621d565bd</guid>
<pubDate>Fri, 10 Oct 2025 21:15:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Complete-Milling-Lab</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>985830bf10a216150ee8ccef7a54e6cbadc183da91b64b56c8e095b7db47c10d</i><br /><br />Threat actor <b>description</b>: <i>Complete Dental Lab is a family-owned dental laboratory based in South Florida, specializing in a wide range of custom restorations. They focus on delivering high-quality oral products, including crown and bridge restorations, partial dentures, and night guards, while also offering 24-hour expedited services. Their commitment to customer service fosters strong relationships with dentists and their staff, enhancing dental practices through superior products. The lab leverages advanced dental techniques and materials to cater to diverse client needs, ensuring durability and aesthetic appeal.</i><br />Target victim <b>website</b>: <i>completemillinglab.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Paleontological-Research-Institution</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26218</link>
<guid>bac5c16e8ddd5aba46bf99b19c05fe93</guid>
<pubDate>Fri, 10 Oct 2025 21:15:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Paleontological-Research-Institution</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd2ac13c98748a346c36e599997a944e3c2b7610fdafeb7b19c39f93de731139</i><br /><br />Threat actor <b>description</b>: <i>The Paleontological Research Institution, or PRI, is a paleontological organization in Ithaca, New York with a mission including both research and education. The Paleontological Research Institution was founded in 1932.</i><br />Target victim <b>website</b>: <i>www.priweb.org</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>empirico-mr.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26226</link>
<guid>1e360e456bb346d5ec2e9d6b411a323f</guid>
<pubDate>Fri, 10 Oct 2025 21:14:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>empirico-mr.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8f1cae867ab678807a5c065737e42fd69c13c0688fd9e8406c2cc0b27491286b</i><br /><br />Threat actor <b>description</b>: <i>Empirico Research is a boutique global market-research and data-collection firm founded around 2016. The company combines online panels, telephone interviewing …</i><br />Target victim <b>website</b>: <i>empirico-mr.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>bridgenetcommunicationsrgv.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26224</link>
<guid>851fd85e0c2baf63f6042123c2b4aac7</guid>
<pubDate>Fri, 10 Oct 2025 21:13:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>bridgenetcommunicationsrgv.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8f7633a470391cae9c3f2f595b1821520c8c16f9ceecb4bed0caa2db08b95737</i><br /><br />Threat actor <b>description</b>: <i>BridgeNet Communications is a regional low-voltage and structured-cabling specialist serving the Rio Grande Valley and parts of Central Texas. The …</i><br />Target victim <b>website</b>: <i>bridgenetcommunicationsrgv.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>krne.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26223</link>
<guid>cfe04034c4af619cfabd5f2c785131d2</guid>
<pubDate>Fri, 10 Oct 2025 21:12:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>krne.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5bc8f3d7ae55548a48efce59a00766ffbf27b660e0e32098ee4df63047a04f2b</i><br /><br />Threat actor <b>description</b>: <i>Krne Law Firm a small to mid-size private legal practice, perhaps specializing in general civil law, real estate, business contracts, …</i><br />Target victim <b>website</b>: <i>krne.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>portofuneralhomes.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26221</link>
<guid>89c44761d7bafba48b64d0477dfb544e</guid>
<pubDate>Fri, 10 Oct 2025 21:11:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>portofuneralhomes.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ddb4d3753c58d7f6e08f9c8cc281ab4245415ea2b3b10a9c653e785213444ad</i><br /><br />Threat actor <b>description</b>: <i>Porto Funeral Homes (Porto / Porto Funeral Home) operates funeral and memorial services in New Haven County, Connecticut, with facilities …</i><br />Target victim <b>website</b>: <i>portofuneralhomes.net</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bellingham-Vet-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26216</link>
<guid>67c4b489cfd04c9a094ea2781cb69bee</guid>
<pubDate>Fri, 10 Oct 2025 20:23:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Bellingham-Vet-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b34fbc004ffd469b193f51e85d9780f545c1d799d6e46fc8e8e2a597527bbe2b</i><br /><br />Threat actor <b>description</b>: <i>Bellingham Animal Hospital specializes in preventive care. We strongly recommend regular check-ups for your animal to ensure better health and a longer life. If your pet needs medical attention, Bellingham Animal Hospital's staff will take the time to explain treatment options. We'll help guide your decision process by answering any questions or concerns. Our practice utilizes the latest technology to help your pet overcome ailments and return to full health.</i><br />Target victim <b>website</b>: <i>www.bellinghamvetcenter.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Central-Jersey-Medical-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26213</link>
<guid>bb6023f7e8817eda36cae6b7405ee65d</guid>
<pubDate>Fri, 10 Oct 2025 20:22:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Central-Jersey-Medical-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0684e82d7a72b5ba5c0577ebfca14d203f0ccd97a37e7ebe919bab5416a3cacc</i><br /><br />Threat actor <b>description</b>: <i>Central Jersey Medical Center (CJMC) is a Federally Qualified Health Center (FQHC) that provides primary care, dental, and preventive health services for you and your family. We are a community-based center, guided in part by our patients, and focused on meeting the health needs of the people we serve.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brevard-Skin</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26215</link>
<guid>57198de0fd9b28665ba93b8c07ccbae3</guid>
<pubDate>Fri, 10 Oct 2025 20:17:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Brevard-Skin</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f684a256f98cb171ddd6ec2af375dadb104199a5cc2c12e385aff2429b02c88</i><br /><br />Threat actor <b>description</b>: <i>Dedicated to providing comprehensive dermatological care to address a wide range of skin, hair, and nail conditions</i><br />Target victim <b>website</b>: <i>brevardskin.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Confie</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26210</link>
<guid>79976930d5b363b51b6e7557ac2dafd2</guid>
<pubDate>Fri, 10 Oct 2025 15:37:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Confie</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ce43f55695f1c63c8e622f775eabebb569aeb85cf65d4f5d9008ab15f9c5f9a</i><br /><br />Threat actor <b>description</b>: <i>Confie, founded in 2008 and headquartered in Huntington Beach, California, is an insurance distributio…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>americanhome</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26196</link>
<guid>d17f5f9a0f781be4885fbd8b25f4f51a</guid>
<pubDate>Fri, 10 Oct 2025 15:31:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>americanhome</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0d8b394e7480aca9fa8032a0a43ee735329704a39f9ce880b1a44e0e688758a2</i><br /><br />Threat actor <b>description</b>: <i>American Home Furniture and Mattress was founded by Mr. Emanuel "Mannie" Blaugru...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Five-Star-MechanicalInc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26197</link>
<guid>bafe5a19bbef4152f217efc037c1be59</guid>
<pubDate>Fri, 10 Oct 2025 14:34:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Five-Star-MechanicalInc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f32839c6efd89c6a251ea2239a58a1de8910b227f5e2fb9349d0e81866d3f80a</i><br /><br />Threat actor <b>description</b>: <i>Five Star Mechanical Inc. specializes in providing commercial andindustrial HVAC services, plumbing, piping, and sheet metal fabrication.We are ready to upload 30gb of corporate documents. Employee and owners personal information (passports, DLs, SSNs, address, emails and so on), customers files, projects, financials and other operating files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carlson-Building-Maintenance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26198</link>
<guid>0e8b25d538721f754c135daf02eb8a64</guid>
<pubDate>Fri, 10 Oct 2025 14:34:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Carlson-Building-Maintenance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5739c9ee8bc54964c75223f5b8ec7f62446532bb3bb16d89f02ec7df2fefb522</i><br /><br />Threat actor <b>description</b>: <i>Carlson Building Maintenance specializes in commercial cleaning services throughout the Midwest, offering a variety of solutions including general cleaning, hard floor care, carpet cleaning, and specialty services. They serve diverse industries such as retail,grocery, schools, and warehouses, tailoring their cleaning programs to meet the specific needs of each facility. We are ready to upload more than 20GB of there data. There are lots of essential corporate documents such as: financial data (audit, payment details,financial reports, invoices), employees and customers information (passports, driver's licenses, emails, phones), confidential information and other documents with personal information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Friendly-Gus</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26209</link>
<guid>1135230be8c1d1853111db00c02d48bb</guid>
<pubDate>Fri, 10 Oct 2025 13:49:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Friendly-Gus</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7135638fcb7bb74458bf1ad0aac97eeb1463d908bd4ba3889c92522b727dd304</i><br /><br />Threat actor <b>description</b>: <i>FRIENDLY GUS FOOD STORE is a retail wholesale distribution business that is supplying independent grocers throughout rural Georgia. They offer chicken,iced tea and spaghetti. It was founded in year 1915 and it is headquartered at Dublin, Georgia.</i><br />Target victim <b>website</b>: <i>www.friendlygus.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Woodmen-Valley-Chapel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26199</link>
<guid>63a82e1bc44f8cf90a9189b4632951df</guid>
<pubDate>Fri, 10 Oct 2025 12:38:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>brotherhood</b> claims attack for <b>Woodmen-Valley-Chapel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36dfcb7918af149e975cf8397095cbb5de394ee368268765121e7aaaf8297ead</i><br /><br />Threat actor <b>description</b>: <i>Contains: 274 Gb compressed Files</i><br />Target victim <b>website</b>: <i>woodmenvalley.org</i>]]></description>
<category>brotherhood</category>
</item>
<item xmlns:dc='ns:1'>
<title>Motility-Software</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26202</link>
<guid>5fa260f9aef5c32cc0ddf4934f058bdf</guid>
<pubDate>Fri, 10 Oct 2025 12:37:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>brotherhood</b> claims attack for <b>Motility-Software</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>729b3e4025bbd46440cbd113541ff00fc24d171aad3271004ba0f9a34fa21e5f</i><br /><br />Threat actor <b>description</b>: <i>Contains: 3.3 Gb compressed Files, Databases</i><br />Target victim <b>website</b>: <i>www.motilitysoftware.com</i>]]></description>
<category>brotherhood</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.ucisd.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26187</link>
<guid>a215c3439968170d0649dc73b81b5fb4</guid>
<pubDate>Thu, 09 Oct 2025 23:59:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.ucisd.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e0a1d3047f6a41c238782c60fd64d14323cb055df249d978fe86352e8af89e4</i><br /><br />Threat actor <b>description</b>: <i>Uvalde Consolidated Independent School District, USA -  is a public school district based in Uvalde, Texas, US. Located in Uvalde County, the district extends into portions of Zavala and Real counties. It is a progressive, rural school distri            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>georgetown-brewing-co</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26190</link>
<guid>b9a01aa77750279f4bc00c265a632095</guid>
<pubDate>Thu, 09 Oct 2025 23:52:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>georgetown-brewing-co</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3272dba385da398f0e6dd609e95f9c56d822375c41eb23ff8f4adc859ab66c53</i><br /><br />Threat actor <b>description</b>: <i>Georgetown Brewing Company is an independently owned craft brewery located in Seattle, known for its flagship beer, Mannys Pale Ale. The brewery transitioned from draft-only production to canning select beers and offers pints in its tasting room alongside kegs, growlers, and cans for customers to take home. Their focus remains on brewing high-quality, flavorful beer, with a lively atmosphere that encourages visitors to enjoy their offerings on-site or at local bars. Intended clients include craft beer enthusiasts and patrons looking to experience unique local brews.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Accelerated</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26189</link>
<guid>df4dc4a2a2e34014279a7fe7dd5fd47b</guid>
<pubDate>Thu, 09 Oct 2025 18:19:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Accelerated</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa3e480129684e08ad56a2904e04a3aa9d776555dbf102e0b51a9f51f17d9306</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.acceleratedusa.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Elmer-W.-Davis</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26188</link>
<guid>caa1f293d0555eec031b201f066d6278</guid>
<pubDate>Thu, 09 Oct 2025 18:18:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Elmer-W.-Davis</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd88cf8f9ffd3a3e4293329972ae0ff433c6b5b9f3c28c4b14a2452327e35e7e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.elmerdavis.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Midsun-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26183</link>
<guid>15dd27d1e33bb4f584e33e7ab49608d1</guid>
<pubDate>Thu, 09 Oct 2025 17:31:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Midsun-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eaa2a2aa598c8808581661e0c22326a7ff69e5d38b7b16528d69a93b8e70d788</i><br /><br />Threat actor <b>description</b>: <i>Midsun Group, USA specializes in extending the life of power utility equipment through premium silicone covers and coatings. Their innovative products provide solutions for wildlife intrusion and environmental contamination, enhancing reliabi            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Northern-Air-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26184</link>
<guid>16d62f85a33e3e975a40c787b69d68dd</guid>
<pubDate>Thu, 09 Oct 2025 17:31:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Northern-Air-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>268f3111e29649ad3dbdf199ca2cbad52b02f2bd4573b7e390e315535bf6b23f</i><br /><br />Threat actor <b>description</b>: <i>Northern Air Systems has been a leading manufacturer of high-quality HVAC systems for commercial and industrial applications for nearly three decades.We are ready to upload 22gb of corporate documents. Client data (DLs, addresses, emails), employee information (DLs, emails, phones and so on), lots of projects information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sdii-Global</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26186</link>
<guid>1c0ec7275bfb7c37e7ed1f88750cce1d</guid>
<pubDate>Thu, 09 Oct 2025 16:15:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Sdii-Global</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8fc5b55da7488318ad77c175bd4c31f353f92e7f5d41ffd1e80509a34f7beae</i><br /><br />Threat actor <b>description</b>: <i>Sdii Global Since 1989, Sdii Global has set the standard in forensic engineering and consulting, renowned for our expertise and unwavering commitment to excellence.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.msssolutions.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26185</link>
<guid>cd7624e391b1552c6de504d71dadc520</guid>
<pubDate>Thu, 09 Oct 2025 15:41:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>www.msssolutions.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aba545b7cfd3eaefcca16f40b36f196d3cbaaa74e51f9a8641090c7c28f4c537</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1996, MSS Solutions is a full-service Mechanical Contractor offering Design-Build, Design-Assist, and complete implementation services. The company specializes in new construction, large-scale renovations, and retrofit/replacement projects for HVAC, Fire, Security and Controls systems. Th…</i><br />Target victim <b>website</b>: <i>www.zoominfo.com/c/mss-solutions-llc/74305122</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>MBS-Secure</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26180</link>
<guid>4cb2c784110fa31d56c0d67b36d19cab</guid>
<pubDate>Thu, 09 Oct 2025 15:32:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>MBS-Secure</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e1b068eed259e7efa4287ab4972458d9a604dc7a53d1d337db931d9f7d7714f</i><br /><br />Threat actor <b>description</b>: <i>MBS Secure, Ntiva - Ignore your teeth and they'll go away. The same goes for customers. If you leak their confidential data online, they'll leave. That's what happened to MBS Secure, a cybersecurity company. It has many customers, including i            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Heritage-Communities</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26179</link>
<guid>5872043836c3d79e59d2ad6886918bfd</guid>
<pubDate>Thu, 09 Oct 2025 10:26:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Heritage-Communities</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6b7f009ca0c62b0369774156e23391d2ade56d3e6dbfaabf6cf7c4e6d0abd66</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>cameronhodges.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26150</link>
<guid>968402fb81659baface13dfca7f11890</guid>
<pubDate>Wed, 08 Oct 2025 19:27:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>cameronhodges.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>67639bab111d659cb9d81e0b0e096ec58bba72308328c51cdf3ce3008deb6abb</i><br /><br />Threat actor <b>description</b>: <i>Cameron, Hodges, Coleman, LaPointe & Wright, USA - No matter where you are in Florida, we are here to leak your data. law firm specializing in insurance defense with over 35 years of experience. They provide legal services to clients across F            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>St-Peter-Law-Offices</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26151</link>
<guid>c7550aa992da57915ff925bf923825fa</guid>
<pubDate>Wed, 08 Oct 2025 19:27:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>St-Peter-Law-Offices</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53a192418751a5c9996c61c3940ec00490fb0e88490055d5cab6a2725e543a80</i><br /><br />Threat actor <b>description</b>: <i>St. Peter O’Brien Law Offices, P.C. is a law firm that specializes in various areas of law, including adoption, business formationand compliance, estate planning, real estate, tax law, general litigation, and guardianships.We are ready to upload 188gb of corporate documents. Employee personal documents (DLs, financials and other docs), customer files (DLs, SSN numbers, credit card details, payment details, medical records and so on), project information, financial and accountinginformation, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hoyer-Law-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26152</link>
<guid>938a56471d1a3fb0f01f1b04ad30f398</guid>
<pubDate>Wed, 08 Oct 2025 19:27:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Hoyer-Law-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>61d850de85159a08b48e7f3c2abea5b17e099b6b9330863905ceb4d914f2500f</i><br /><br />Threat actor <b>description</b>: <i>Hoyer Law Group, PLLC is a nationwide law firm specializing in employment legal services, advocacy for victims of employment discrimination, harassment, wrongful termination, and help whistleblowers navigate legal complexities while safeguarding against retaliation.We are ready to upload corporate documents. Customer personal documents (a bit of personal docs, correspondence and other docs), employee files (w4 complete forms, SSNs, phones, addresses and so on), project information, medical reports, police reports, and other confidential documents, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>VIM-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26153</link>
<guid>141bd48b3fcfa157981a2155709ad6a7</guid>
<pubDate>Wed, 08 Oct 2025 19:27:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>VIM-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>74d63f5da441e81263733ccd4076ab4923045e261cb55e2b76518a14c1de18d4</i><br /><br />Threat actor <b>description</b>: <i>VIM Technologies, Inc. is a leading provider of compliance monitoring software solutions and support services tailored for the electric utility and industrial markets.We are ready to upload corporate documents. Customer information,partners files, projects, contracts and agreements, employee files (I-9 forms and other data), NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chek-Tan-and-Company-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26175</link>
<guid>f47a07182433c042d84cb754ddcac64f</guid>
<pubDate>Wed, 08 Oct 2025 19:10:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>radar</b> claims attack for <b>Chek-Tan-and-Company-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc400c7a4e552df72cd3ef85ec75cf6bb30633a141238dcd3ccf50b3b056dc0a</i><br /><br />Threat actor <b>description</b>: <i>Chek Tan and Company offers accounting, audits, management consulting, IRS representation, and tax management services. San Francisco, California, United States.</i><br />Target victim <b>website</b>: <i>chektan.com</i>]]></description>
<category>radar</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shape-Corp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26176</link>
<guid>f702ad17879bf0f827cdd740da7fb1df</guid>
<pubDate>Wed, 08 Oct 2025 19:08:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>Shape-Corp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9da06d17ab44172525f4ede12ffb0381d42d697c735a896ed0833eb50a130827</i><br /><br />Threat actor <b>description</b>: <i>Shape Corp. is a global leader in automotive engineering and manufacturing, providing advanced crash management and body structure solutions utilizing ultra-high strength steel roll forming, tight tolerance aluminum extrusions and large tonnage injection molding. The company specializes in producing lightweight and innovative products that maximize performance while minimizing environmental impact.
[[ Data extracted include Engineering design files, Marketing and presentation assets, CAD, mechanical designs, CNC programs, project documentation, automation data, brand media, financial, production, and quality assurance records etc.. ]]</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Catered-Affair</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26169</link>
<guid>4b8cdf66647df5b1d9549039eca7819e</guid>
<pubDate>Wed, 08 Oct 2025 17:24:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>The-Catered-Affair</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7e8ce1bb7b086d8a7b5c1655ed3d657f4bc2fc2d1d82f955acbc29e6dd81ec3</i><br /><br />Threat actor <b>description</b>: <i>The Catered Affair is a Boston and New England catering company with upscale venues and creative menus for weddings, corporate events, and private parties.</i><br />Target victim <b>website</b>: <i>www.thecateredaffair.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Public-Relations-Society-of-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26170</link>
<guid>019059823f48e01d3dc9e864a371605f</guid>
<pubDate>Wed, 08 Oct 2025 17:24:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Public-Relations-Society-of-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0305073c314447acce241ca3161576add6252c3cc7b3ce9ce5ebe33c83a592ea</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1947, the Public Relations Society of America (PRSA) is a nationwide non-profit trade association serving the communications community and public relations professionals. It is headquartered in New York City, New York.</i><br />Target victim <b>website</b>: <i>www.prsa.org</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sun-Fiber</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26171</link>
<guid>dcb5060fba0123ff56d253331f28db6a</guid>
<pubDate>Wed, 08 Oct 2025 17:24:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Sun-Fiber</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2232e7ba8641fb8c5f6697d907047ff71ad9d53f2748b9b42e744f30b3c3cfb4</i><br /><br />Threat actor <b>description</b>: <i>Sun Fiber LLC is a leading manufacturer and supplier of recycled polyester staple fiber (Re-PSF), catering primarily to the Home Textile and Furniture industries. The company is committed to providing customized filling solutions that meet a variety of customer needs with a focus on softness and comfort. Sun Fiber emphasizes a customer-centric approach, offering supply chain support, technical assistance, and personalized service. Established in 1999, Sun Fiber combines industry expertise with sustainable practices to ensure product quality and reliability.</i><br />Target victim <b>website</b>: <i>www.sunfiber.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>MTI-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26172</link>
<guid>8803f7fa56465a59d0c1a12ec666f533</guid>
<pubDate>Wed, 08 Oct 2025 17:23:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>MTI-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc84ebc560ddb949fa2947138ba1f54a03abfb64d5dbcee229fd05649e02b632</i><br /><br />Threat actor <b>description</b>: <i>MTI America specializes in providing comprehensive workers' compensation ancillary healthcare solutions, including transportation, language services, physical medicine, and home care. Their services cater to insurance carriers, self-insured employers, third-party administrators, and case management companies, ensuring efficient and empathetic patient care. The company offers a range of programs such as tele-rehabilitation, diagnostic imaging, and durable medical equipment, all designed to enhance the recovery process for injured workers. With a focus on innovation and client satisfaction, MTI America aims to transform the claims process and improve outcomes for patients.</i><br />Target victim <b>website</b>: <i>www.mtiamerica.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>D.-Wilson-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26173</link>
<guid>0594763bf6171668f8bc4cd79ebcbd63</guid>
<pubDate>Wed, 08 Oct 2025 17:23:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>D.-Wilson-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2cca11f6b60339dfe91ac40c238e61cf2a69e6cf6ce2cea985b77ad62d0e1940</i><br /><br />Threat actor <b>description</b>: <i>D. Wilson Construction is a leading commercial and industrial construction company founded in 1957, serving South and Central Texas from its offices in the Rio Grande Valley and San Antonio. Known for its reliable and timely building solutions, the company specializes in both design-build and design-bid-build projects. Their notable clients include the Bert Ogden Auto Group and the City of New Braunfels, reflecting a diverse portfolio in the commercial sector. D. Wilson Construction has earned recognition as a top contractor in the region, showcasing their commitment to quality and client satisfaction.</i><br />Target victim <b>website</b>: <i>www.dwilsonconstruction.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>IFPC-Worldwide</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26174</link>
<guid>dd5db93a1d7b73cc6b3e36f136f7d99f</guid>
<pubDate>Wed, 08 Oct 2025 16:57:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>IFPC-Worldwide</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ccb4f8cf5b8e10c15237cd63c2a1627d55c21b3e22d8f2435161721247010ab</i><br /><br />Threat actor <b>description</b>: <i>Once again, a company "IFPC" that claims to ensure public safety during hiring, customer verification services, and a wealth of other personal and confidential information has been leaked due to poor security and employee performance.</i><br />Target victim <b>website</b>: <i>ifpcworldwide.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Right-at-Home-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26158</link>
<guid>f1461909ac11780acf665caf329c10b9</guid>
<pubDate>Wed, 08 Oct 2025 16:15:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Right-at-Home-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d8a826130b87cba3f2611aaae6a75a12e1dfd6f026ee2bab65f2b50356d8a825</i><br /><br />Threat actor <b>description</b>: <i>Right At Home Care, LLC provides home care services designed to promote independence, healing, and comfort for clients. Their offerings include companionship care, assistance with daily living activities, and specialized care for conditions like Alzheimer's and dementia. The company focuses on tailoring care to meet the individual needs of each client, ensuring a personalized approach. Their intended clients are individuals seeking to maintain their quality of life and independence while receiving compassionate support in the comfort of their own homes.</i><br />Target victim <b>website</b>: <i>www.rightathomecare.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Industrial-Chemicals</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26159</link>
<guid>09b8c249733de5c23897177cc1a25e51</guid>
<pubDate>Wed, 08 Oct 2025 16:14:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Industrial-Chemicals</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8912dbd46219c2ace00a6f089254ca2589a64581529a038e1aaa24ba6fa01754</i><br /><br />Threat actor <b>description</b>: <i>Industrial Chemicals Corporation is a wholesale-commodity chemical distributor. We have proudly served the Colorado market for over 60 years and the New Mexico market for nearly 20 years. Our primary focus is to provide a variety of chemicals to the marketplace that is in packaging suitable to the customer's requirements. We will provide reliable service to our customers, with quality products, by anticipating and then meeting/exceeding their expectations. We are dedicated to the safety of our employees and our customers. We will operate our distribution facilities with the utmost concern for safety. We will represent our supplier partners in a cooperative and responsible manner that demonstrates a concern for the environment and our community. Our standard is to meet as minimum, and to exceed as a norm, all parameters in the "Responsible Distribution Process", as set forth by the National Association of Chemical Distributor (NACD).</i><br />Target victim <b>website</b>: <i>www.industrialchemicals.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tibbetts-Lumber</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26163</link>
<guid>9d50bcc2d13c9160fcf2a3fd160252a6</guid>
<pubDate>Wed, 08 Oct 2025 16:14:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Tibbetts-Lumber</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6dae245b7c47ab67cf70b40475b36d8473e31c07aa220d5cc03bdc10d07bdbae</i><br /><br />Threat actor <b>description</b>: <i>Tibbetts Lumber Co. is a leading provider of construction materials in Florida and the Caribbean, offering a wide range of residential building products including lumber, trusses, and millwork. Established in 1949, the company prides itself on delivering high-quality products at reasonable prices while fostering a family-centric work culture. Their services cater primarily to residential builders, providing manufactured trusses, installed trim, windows, and siding for new construction and remodeling projects. With a commitment to excellence and integrity, Tibbetts Lumber aims to serve its customers while honoring its legacy.</i><br />Target victim <b>website</b>: <i>www.tibbettslumber.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dakota-Boys-and-Girls-Ranch</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26164</link>
<guid>e91cc44798f02debded730aaf2453fe5</guid>
<pubDate>Wed, 08 Oct 2025 16:13:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Dakota-Boys-and-Girls-Ranch</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d1c9448cc0764493c1853a97c1d7a61792137140c059167b20e5b17bcdf1efde</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1952, Dakota Boys and Girls Ranch is a Christian residential treatment and educational center for children and their families. The company is headquartered in Minot, North Dakota.</i><br />Target victim <b>website</b>: <i>www.dakotaranch.org</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lashbrook</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26165</link>
<guid>df934f579f2cfbd5eadc33af86b60a6c</guid>
<pubDate>Wed, 08 Oct 2025 16:13:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Lashbrook</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7481bcd29637a5306f245ac490036c512bee21f9bba1f46ee05f46954f3c6fd1</i><br /><br />Threat actor <b>description</b>: <i>Lashbrook started with just a handful of styles that were finished in our founder Eric’s garage. Eric named the company after his great, great grandfather, an immigrant who was among the first western settlers. We honor his pioneering spirit today as we innovate and have grown to offer nearly infinite options for personalization. Throughout our growth, we've remained dedicated to handcrafting our products in Utah.</i><br />Target victim <b>website</b>: <i>www.lashbrook.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bohlsen-Restaurant-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26166</link>
<guid>ebc33d3cfa0dc5d199f58077fbd1de28</guid>
<pubDate>Wed, 08 Oct 2025 16:13:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Bohlsen-Restaurant-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3203ffc2671995454837e1771cbc88c890f15fa76ac314cd36ecd63eb856ed1b</i><br /><br />Threat actor <b>description</b>: <i>Bohlsen Restaurant Group is a family-based organization. Michael and Kurt Bohlsen, third generation restaurateurs, uphold the family tradition of mixing the essential ingredients to any successful restaurant enterprise - service, style and cuisine. By focusing on quality, we hope to inspire today's discerning diners and generations of future diners at a Bohlsen Restaurant. We believe that you should have a great dining experience and have fun along the way. We have a strong sense of community, and we aim to enrich the lives of both those who choose to dine with us as well as our valued and loyal staff. </i><br />Target victim <b>website</b>: <i>www.bohlsenrestaurantgroup.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Desert-Plastering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26167</link>
<guid>944ba20ccf432f83a48b0879149ea2d1</guid>
<pubDate>Wed, 08 Oct 2025 16:12:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Desert-Plastering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce12f3c66206a87d8ea5611cbbafc3e4e8ba59faaec79e789ba3a401ad04f517</i><br /><br />Threat actor <b>description</b>: <i>With over 35 years of working experience in Lath and Stucco, Desert Plastering was founded in 1998 by Manuel and Javier Rodriguez. In January, 1999 Desert Plastering, LLC was officially established. To date, both principals are actively involved with the day-to-day management of all projects to bring forth the utmost quality, durability and dependability of our products & services. Customer Service and Satisfaction is our primary goal and we take pride in all the jobs and projects that we do. Diligently taking care of issues before they escalate into major problems. With a wonderful group of team players and highly qualified personnel, Desert Plastering has grown at a steady pace and we look forward to future growth with all Builders at the same rate. </i><br />Target victim <b>website</b>: <i>www.desertplastering.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Osland-Financial-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26155</link>
<guid>6bea12680b6672c5427a4413d7fbbed0</guid>
<pubDate>Wed, 08 Oct 2025 15:21:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Osland-Financial-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>993621ec3039e95a4f3377cf39818ccffee85d8bfa8f07cd84cfbe38f1f96716</i><br /><br />Threat actor <b>description</b>: <i>Osland Financial Group specializes in simplifying financial planning to help clients navigate investment, risk management, retirement preparation, and wealth preservation. They offer a range of services including annuities, long-term care insurance, life insurance, and disability income insurance. The company aims to establish long-term, trusted relationships by providing essential information for achieving financial objectives. Their intended clientele includes individuals seeking financial security and proactive asset protection.</i><br />Target victim <b>website</b>: <i>www.oslandfinancialgroup.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>St-Catherine-of-Siena</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26156</link>
<guid>ccd9cd148bbec8a9c3bfea662aef81ce</guid>
<pubDate>Wed, 08 Oct 2025 15:21:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>St-Catherine-of-Siena</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e074e34baf1432219cfcb36cc117b039c713cbfb1c8b2e1683d890fb6fcdd1f</i><br /><br />Threat actor <b>description</b>: <i>Catholic community of St. Catherine of Siena, commit ourselves to live out Christ's great commandments to love God and to love our neighbor as ourselves.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>JB-Brown--Sons</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26160</link>
<guid>32d7f5dcce0010ba30b41ee9b36dbced</guid>
<pubDate>Wed, 08 Oct 2025 15:20:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>JB-Brown--Sons</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be1d04fa4f68fcf31436262199f4c0443696dbd3e0e4c8036e56071a55762e16</i><br /><br />Threat actor <b>description</b>: <i>J.B. Brown Sons is a commercial property management and development company based in Portland, Maine, with over 200 years of experience in real estate. The company specializes in owning, leasing, and managing a variety of commercial properties, including office, warehouse, manufacturing, retail, and mixed-use buildings. Aimed at long-term stable growth, J.B. Brown Sons offers responsive services to assist tenants with their commercial space needs. Their portfolio of properties and development projects reflects their deep-rooted presence in the Greater Portland area.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>DataStream-Content-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26147</link>
<guid>b5839f3b37f86762f4e300e32db051ea</guid>
<pubDate>Wed, 08 Oct 2025 12:39:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>DataStream-Content-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>23d173c95a0fa5a783d9a9baaa840ecc507a849b58135061a8749e28d8e97215</i><br /><br />Threat actor <b>description</b>: <i>As the premier content concierge, DataStream Content Solutions pr
ovides comprehensive information management solutions that allows
you harness the power of data. 

We are ready to upload corporate documents. Customer files, proje
ct information and other files. Be careful when working with them
because they allow everyone to access your data.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chapter-13-Texas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26149</link>
<guid>c8819aac10c0706b7466f78bd9854da0</guid>
<pubDate>Wed, 08 Oct 2025 11:49:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Chapter-13-Texas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c36bc18b0868f290ac38b14d7de11c32af225ade4501cd4b3f2f4892ba6e1ad7</i><br /><br />Threat actor <b>description</b>: <i>We have over 150GB of private data, ranging from employee data to customer and partner data. The management of planoch13.com has completely ignored us. You have 24 hours before we publish.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cerenade</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26148</link>
<guid>3b716043fd8fff8812df0a90a592958c</guid>
<pubDate>Wed, 08 Oct 2025 11:44:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Cerenade</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a41040a30193ae20058bfb27563e8f0af08e80602947df3d87036a72689dd56d</i><br /><br />Threat actor <b>description</b>: <i>Cerenade Technology is a leader in providing cloud-based solution
s for immigration law firms, offering products such as eIMMIGRATI
ON, eCMS, and eForms Solutions. Their software aims to automate w
orkflows, manage cases and clients, and ensure compliance for leg
al and government organizations.

This is a very special case. We obtained almost 100gb of their cl
ients scanned documents (passports and visas). Thousands of adult
s and kids are going to suffer because of this leak. We got docum
ents of people from India, USA, Mexico, Middle East countries, Ja
pan and other countries around the globe. It appears that Cerenad
e's software automates personal fraud schemes.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Linxx-Global-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26146</link>
<guid>b9648e4dc6a5ad47bea0c9023e810dfd</guid>
<pubDate>Wed, 08 Oct 2025 11:17:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Linxx-Global-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>afa8d81619ce63ccc374b7b09d4454f851d1e78ecfddf7e133adb0d18fc67b8d</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Linxx Global Solutions is a U.S. based company that provides training and operational support services for the defense sector. Their offerings include security and defense training, protective services, intelligence, and maritime solutions. Linxx works in partnership with the federal government and military, and is particularly specialized in counter-terrorism and law enforcement training.</i><br />Target victim <b>website</b>: <i>linxxglobal.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Charter-Industrial-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26142</link>
<guid>ae9950b87ffc3b372739ad468bb2a676</guid>
<pubDate>Wed, 08 Oct 2025 08:13:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Charter-Industrial-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>54e8ecd2887a89d16fb74eb7b8a0163ca06e4496691ea34bd223eff1228b6e56</i><br /><br />Threat actor <b>description</b>: <i>Charter Industrial Supply
Charter Industrial Supply is a family-owned distributor specializing in industrial and hydraulic hose and fittings, serving diverse markets such as construction, military, and original equipment manufacturing (OEM). They offer a wide range of products including valves, fasteners, and pipe fittings, and are recognized for their reliable performance and extensive inventory management solutions. The company prides itself on maintaining a 100% fill rate and meeting the demanding needs of their clients, which include industry leaders and critical projects across various sectors. As a premier distributor, they have established partnerships with top manufacturers and provide quality-certified products in accordance with ISO and military specifications.Geo: USA - Leak size: 67 GB Archive - Contains: Files, SQL</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>ebaengineering.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26135</link>
<guid>fd7b8a148f3a229310f4170e8f4fa383</guid>
<pubDate>Tue, 07 Oct 2025 21:20:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>ebaengineering.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad25928811707772c6b07d203b1b1d68067bc215ec3dbacb14540536009f1287</i><br /><br />Threat actor <b>description</b>: <i>EBA Engineering is a multidisciplinary engineering firm focused on providing exceptional, client-centered experiences with a commitment to delivering results. They offer a wide range of services including construction management, civil site engineering, geotechnical engineering, and asset management…</i><br />Target victim <b>website</b>: <i>www.ebaengineering.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.rocketstores.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26133</link>
<guid>a24904e5d3ed28eae9225fd787f64a71</guid>
<pubDate>Tue, 07 Oct 2025 19:51:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>www.rocketstores.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a4dee87068c0d482d738b4aaa2a25028e3b4f20798d84abb4a6eff9e0685b3b</i><br /><br />Threat actor <b>description</b>: <i>$738.9 Million | Gas Stations, Convenience & Liquor Stores Retail</i><br />Target victim <b>website</b>: <i>www.rocketstores.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>indiesemi.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26134</link>
<guid>5b80dedf31c1b00d98e7f24c45cd3c1c</guid>
<pubDate>Tue, 07 Oct 2025 19:51:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>indiesemi.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>990994e66a4c57ca0379ef45668837f3fdee1102dfc29a6e9162c41b869e2f68</i><br /><br />Threat actor <b>description</b>: <i>indie offers highly innovative automotive semiconductors and software solutions for Advanced Driver Assistance Systems (ADAS), including LiDAR, connected car, user experience and electrification applications.</i><br />Target victim <b>website</b>: <i>www.indiesemi.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>California-Golf-Club-of-San-Francisco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26121</link>
<guid>f6556dfe948f58c57650fc8c13294030</guid>
<pubDate>Tue, 07 Oct 2025 17:27:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>California-Golf-Club-of-San-Francisco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a644d0c278a9474912c1027469c1d7099a0a35d7cb82c01978919763ae9a2007</i><br /><br />Threat actor <b>description</b>: <i>California Golf Club of San Francisco, commonly known as Cal Club, is a private golf club established in 1918, originally located in Ingleside before moving to its current 425-acre site in 1924. The club features a world-class golf course des            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Massachusetts-Bay-Community-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26123</link>
<guid>54b352116069f22a7b46fb2e2917732a</guid>
<pubDate>Tue, 07 Oct 2025 16:27:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Massachusetts-Bay-Community-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eb8674180268fadd48b37697bb21a36d07c9cc4208349a26dcd940e9d05ed070</i><br /><br />Threat actor <b>description</b>: <i>Massachusetts Bay Community College is a comprehensive, open-access community college, offering associate degrees and certificate programs. 
We gave MassBay every opportunity to prevent this publication. We engaged their leadership. Their re            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>J-Lorber</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26124</link>
<guid>cdaf0f49f125851ae975f4e3a063db52</guid>
<pubDate>Tue, 07 Oct 2025 16:27:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>J-Lorber</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>55b36d583813d7fb5500ebc5746570e5b0a5b208002b205f8965496b0e1c4c7c</i><br /><br />Threat actor <b>description</b>: <i>J. Lorber Company specializes in a wide range of plumbing, HVAC, and hydronics products, including water heaters, fixtures, and heating systems.We are going to upload 45gb of data soon. Personal documents of customers (DLs, addresses, credit card details and so on), employee information (names, DOB and other information), financial and accounting files, contracts, agreements, projects, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Harbor-Diesel--Equipment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26125</link>
<guid>a21679f89da6d712ed6581b3cc5fc64d</guid>
<pubDate>Tue, 07 Oct 2025 16:27:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Harbor-Diesel--Equipment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e87d9daa563c2a1de5503c48d13d27f1dd60d07cc069e44d535f92e8fba9a399</i><br /><br />Threat actor <b>description</b>: <i>Harbor Diesel and Equipment, Inc. primarily operates as the Southwestern Distributor of ZF Heavy Duty Off-Highway and On-Highway Driveline Products, the Southern California Dealer for Capacity ofTexas Trailer Jockeys and Factory Authorized Full-Service Dealerfor Cummins, Caterpillar (Truck and Marine), Detroit Diesel and John Deere Natural Gas On-Highway Engines. We are going to upload 7gb of data soon. Customers information, w9 forms, detailed employee information, detailed financial and accounting files, contracts, agreements, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>archway.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26128</link>
<guid>d3416acbe6cd441c5fea6bf3a9816cd9</guid>
<pubDate>Tue, 07 Oct 2025 14:11:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>archway.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46d4eb19fddeaa4b2b91d99d73b5eecd150611726553c81a111f9ea23cdac3ca</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1952 and headquartered in Rogers, Minnesota, Archway is a provider of marketing logistics, fulfillment services, and supply chain management solutions.</i><br />Target victim <b>website</b>: <i>www.archway.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lautrec</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26116</link>
<guid>356f7eed0a78a9c4802b42bed40c84d6</guid>
<pubDate>Tue, 07 Oct 2025 12:27:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Lautrec</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1d7c71cc378ca7edc9dc69ca9c7be7c9b4cee7d711e7358a65a12d16dc7dbf2</i><br /><br />Threat actor <b>description</b>: <i>Lautrec is based out of the United States with an office operating in Alberta, Canada. Lautrec offers new and pre-owned manufactured homes, apartments, townhomes, and RV rental sites. Their communities offer swimming pools, sports facilities, and a community clubhouse.We are ready to upload more than 18GB of there data. There are lots of essential corporate documents such as: financial data (audit, payment details,financial reports, invoices), employees and customers information (passports,driver's license, Social Security Numbers, birth certificates, emails, phones) confidential information and other documents with detailed personal information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clifford-Paper-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26110</link>
<guid>6100b117ea6245ad3383b299ad5f7ee1</guid>
<pubDate>Tue, 07 Oct 2025 00:27:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Clifford-Paper-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a67352404dabac81c09feb1c027d0bde030e6a0b1d22095236b65320b75bade</i><br /><br />Threat actor <b>description</b>: <i>Clifford Paper Inc, USA - is a family-owned business with a deep legacy in the forest products industry, operating since 1985. They specialize in providing paper products and value-added services. Clifford Paper maintains strong relationships            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Centers-Laboratory</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26108</link>
<guid>1b285431b6d97f0b3d25c629171a4448</guid>
<pubDate>Mon, 06 Oct 2025 22:27:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Centers-Laboratory</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ed7123e54f64f15e38b907dcffcfe3bd9bff8c94b564c7b1f5340be0c145b37</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>AES-Clean-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26115</link>
<guid>ada2552da65206d7f880ef928a65753e</guid>
<pubDate>Mon, 06 Oct 2025 21:20:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>AES-Clean-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a0a65a80ba28d53401251acaffb79152646723952801bdc50132504f6ac75995</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.aesclean.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dataforth</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26114</link>
<guid>f6370bef326f11083c0fc214d6d01d12</guid>
<pubDate>Mon, 06 Oct 2025 21:19:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Dataforth</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>325bac87f8af8688ff269241e528d2543c89d290346c98717a92d2dde6e68617</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.dataforth.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Development-Services-Group-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26105</link>
<guid>48d09449297662146572c38c68b7eb5e</guid>
<pubDate>Mon, 06 Oct 2025 20:27:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Development-Services-Group-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52eb5ffdf416c7878df41f00e16c037a6645a2c486946fdb3ed161c18ca96fea</i><br /><br />Threat actor <b>description</b>: <i>Development Services Group, Inc., USA -  The most high-profile terrorist attacks and crimes against the public that are being planned. All of this is contained in the reports of Development Services Group, Inc. You have to admit, it's interes            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.landmarkmgtinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26106</link>
<guid>f70576b9278d9a5c4814046749627269</guid>
<pubDate>Mon, 06 Oct 2025 20:27:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.landmarkmgtinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0ada3c0d4837e4ae04434ae9d6c97e494a9df7a40b058682f33ebb9fce7b50d</i><br /><br />Threat actor <b>description</b>: <i>Landmark Management, Inc., manages 90 projects, consisting of 2,462 units across 5 states. Whether you are searching for an apartment to rent or a reliable company to manage your rural development property, let us put our thirty-six years of             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rogue-Valley-Door</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26111</link>
<guid>4ede9640e357f086a55ab84467f2bfe2</guid>
<pubDate>Mon, 06 Oct 2025 20:14:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Rogue-Valley-Door</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22a5d987cfe5191de5a145633fb8dd57822b0870320eb2bbaccfb39fdae34c44</i><br /><br />Threat actor <b>description</b>: <i>Rogue Valley Door specializes in manufacturing a wide range of high-quality doors, including decorative, urban, rustic, traditional, and specialty options. Their products cater to homeowners and professionals seeking to enhance entrance aesthetics and functionality. The company offers tools like a door builder and visualizer to help clients design their ideal doors. Additionally, they provide various resources and support for door installation, repair, and maintenance.</i><br />Target victim <b>website</b>: <i>www.roguevalleydoor.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Law-Offices-of-James-Scott-Farrin</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26112</link>
<guid>6924d618d27cad63a1b3fca578c13e49</guid>
<pubDate>Mon, 06 Oct 2025 20:14:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Law-Offices-of-James-Scott-Farrin</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1160bb6d0b4f3919a91a871a8a85ba41b3a020d7e96509c7b3a23dcc6c658d8e</i><br /><br />Threat actor <b>description</b>: <i>The James Scott Farrin Law Firm is a legal services firm that handles personal injury, medical malpractice, eminent domain cases, and more. The firm is based in Durham, North Carolina with additional offices based around North Carolina and South Carolina.</i><br />Target victim <b>website</b>: <i>www.farrin.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.nurturecare.comUSA192GB</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26113</link>
<guid>e71dca519a9758e28dac9f1804b297cd</guid>
<pubDate>Mon, 06 Oct 2025 19:46:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>www.nurturecare.comUSA192GB</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c7674af7b6a205337aec325b2b24c33ed9a8430bd8a4db18315da4d52971f44</i><br /><br />Threat actor <b>description</b>: <i>Unknown - NurtureCare</i><br />Target victim <b>website</b>: <i>www.nurturecare.com/USA/192GB</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Milliman-Financial-Risk-Management-LLC-Milliman-Inc.-subsidiary</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26098</link>
<guid>1af1a2e1c891b3cb9fad0a57d927a492</guid>
<pubDate>Mon, 06 Oct 2025 19:27:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Milliman-Financial-Risk-Management-LLC-Milliman-Inc.-subsidiary</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b53543df19212252e4f2a36760c7b80e68efa7edcc6af2788f1b553c14e87433</i><br /><br />Threat actor <b>description</b>: <i>Milliman Financial Risk Management LLC is a global leader in financial risk management to the retirement savings industry. Established in 1998, the practice includes over 200 professionals operating from three trading platforms around the world (Chicago, London, and Sydney). Milliman FRM is a subsidiary of Milliman, Inc.We are going to upload 260gb of corporate data soon. Client information (clients' financial portfolios, account balances, transfers and so on), lots of internal operating files, financial and accounting files, contracts, agreements, projects, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Daily-Printing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26099</link>
<guid>c6b674f5588228036011778df458d756</guid>
<pubDate>Mon, 06 Oct 2025 19:27:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Daily-Printing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6568c03edc0e79034b748ccb15fc28f0fd5e121f2ae3830ad5ba482a1d213c00</i><br /><br />Threat actor <b>description</b>: <i>Daily Printing provides commercial printing services, digital printing, variable data printing, web-to-print, and print on demand services.We are going to upload 32gb of data soon. Client information, a bit of employee files, lots of internal operating files, financialand accounting files, contracts, agreements, projects, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Orion-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26100</link>
<guid>87ae9f68b3b1afa507a7bf4fd7e3144e</guid>
<pubDate>Mon, 06 Oct 2025 19:27:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Orion-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5744397637fdb2747ca37153bf012e3dc11ac0c69aec34069f7940d4699e865</i><br /><br />Threat actor <b>description</b>: <i>Daily Printing provides commercial printing services, digital printing, variable data printing, web-to-print, and print on demand services.We are going to upload 32gb of data soon. Internal confidential information containing client personal information (SSNs, address,email addresses and so on), employee information (w9 forms), financial and accounting files, contracts, agreements, clients' engineering specifications and drawings, projects, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mecklenburg-County-Public-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26101</link>
<guid>ec69afac0d09f2914d811fa665d06e54</guid>
<pubDate>Mon, 06 Oct 2025 18:26:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Mecklenburg-County-Public-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1174a98b09d9239fb4b7c656234f03522e01ffaa21e31312f6b017ec10a9c4b5</i><br /><br />Threat actor <b>description</b>: <i>Charlotte-Mecklenburg School District, USA - Do you keep your children's secrets? They are the most precious thing you have. They must not be betrayed. And that is exactly what the Charlotte-Mecklenburg School District (CMS) specializes in. T            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>mcgeorgeai.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26102</link>
<guid>4d951e4a84953a9cbd85cfcbede14509</guid>
<pubDate>Mon, 06 Oct 2025 18:26:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>mcgeorgeai.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>783aea3ba9c7e1b880b0f0698790916a7878ef48fc1a9de9cdad85bca42e35fd</i><br /><br />Threat actor <b>description</b>: <i>McGeorge Architecture Interiors (MAI), USA - свободный доступ в любой дом. MAI is a full service architecture and interior design firm specializing in corporate office, retail projects of all varying scopes and sizes,             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>kecymetals.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26097</link>
<guid>23c84f1d392d1453b7a1e380bd6acd0a</guid>
<pubDate>Mon, 06 Oct 2025 16:27:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>kecymetals.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>523b905b2fb1182e8b08c0c77bc7a5e33a58f8f4848ac487c4212019d01a9bd1</i><br /><br />Threat actor <b>description</b>: <i>Kecy Metal Technologies, USA - Terrible management, outdated equipment, uncompetitive salaries. This is how employees describe working conditions at Kecy Metal Technologies on condition of anonymity. The company was founded in 1988 in Michiga            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ludlow-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26095</link>
<guid>84648eaca6a7fc8394fbdb9cf07fd236</guid>
<pubDate>Mon, 06 Oct 2025 15:27:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Ludlow-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7fc3b3b7ae483a012b03e846df7cc409992b410bf720ad715ee2da356516eba0</i><br /><br />Threat actor <b>description</b>: <i>Ludlow Construction Co. Inc. is a business specializing in underground infrastructure, roadway construction, and site development with over 25 years of experience. They offer services including road construction, sewer, water, storm utilities installation, site development, and curbing concrete.We are going to upload 205gb of corporate data soon. Detailed employee information (Names, DOB, DLs of almost all the employees, medical certificates, passports and other docs scans), financial and accounting files, correspondence with authorities, contracts, agreements, projects with specifications, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Natoli-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26093</link>
<guid>925cdef65f6a1d131fd8ca6c867c5c0a</guid>
<pubDate>Mon, 06 Oct 2025 13:27:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Natoli-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>54b57de1e89094b5dda680a48e368db6b5f2d3981593025a9582ea53ce13602e</i><br /><br />Threat actor <b>description</b>: <i>Natoli Engineering is a renowned leader in tablet compression tooling with over fifty years of expertise in manufacturing high-quality punches and dies. They offer a range of products including tablet presses, encapsulation machines, and replacement parts, alldesigned to meet the needs of research and production in the pharmaceutical industry.We are ready to upload more than 936GB data. There are lots of essential corporate documents such as: financial data (audit, payment details,financial reports, invoices), employees and customers information (passports,driver's license, Social Security Numbers,death/birth certificates, emails, phones) confidential information, NDAs and other documents with detailed personal information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpswww.libertydentaltown.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26089</link>
<guid>8c41eebf5a1f5867cbe38cf59b37c1bf</guid>
<pubDate>Mon, 06 Oct 2025 05:27:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>mydata</b> claims attack for <b>httpswww.libertydentaltown.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5faa91b71fe83091efaf7e67a63261c93b0bfec777f4d624add6b3b1732a7944</i><br /><br />Threat actor <b>description</b>: <i>Liberty Dental Care & Dentures provides general dentistry 7100 Sennet Pl, Suite E Liberty Township, Ohio 45069Around The Corner From Laser Web in Liberty Town Centerlibertydental007@gmail.com513-644-2086513-644-228958Gb data has been stolen</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>mydata</category>
</item>
<item xmlns:dc='ns:1'>
<title>WELLSLANDSCAPING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26091</link>
<guid>91be0e18777ce6c751271fcc00d93d87</guid>
<pubDate>Mon, 06 Oct 2025 01:54:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>WELLSLANDSCAPING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>68a387dcbd3a6f1e0e858a5c2f6533894349bab580864cfe593d8d24fa89eb9a</i><br /><br />Threat actor <b>description</b>: <i>We provide a comprehensive array of services for both commerical and residential properties. In addition to traditional lawn and garden care we offer onsite consultation, landscape design, installation, and maintenance. Wells Landscaping is fully licensed and insured - just another way we show "You are important to us!" Employees: 25 Revenue: $$5 Million Industry: Architecture, Engineering & Design Phone Number:(781) 963-6017</i><br />Target victim <b>website</b>: <i>WELLSLANDSCAPING.COM</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Red-Hat-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26086</link>
<guid>faf73b21f308431fb3cf1c58d228eca2</guid>
<pubDate>Sun, 05 Oct 2025 19:21:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Red-Hat-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>858ea7b2f5ba65bf31fb300656ea164117170b6ac8cd3013778d2338ceff057e</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Red Hat, Inc. is a leading American multinational software company that provides open-source software products to businesses. It became a subsidiary of IBM in 2019. The company is best known for Red Hat Enterprise Linux, a top-level operating system. Other notable offering includes its architecture service, cloud computing (virtualization), and storage solutions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>SP-Global-spglobal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26083</link>
<guid>d2fb7247a8585505ca84d40afe37eea6</guid>
<pubDate>Sun, 05 Oct 2025 10:48:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>SP-Global-spglobal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e5440ad3a8968987b5c378a3513f726ef6c025bdf7faffb37630749e546f17dc</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] S&P Global is an American company that provides high-quality market intelligence in the form of credit ratings, analytics, data, and insights to help customers make informed decisions. It operates through four divisions: S&P Global Ratings, S&P Global Market Intelligence, S&P Dow Jones Indices, and S&P Global Platts, covering various sectors like energy, finance, commodities, and technology.</i><br />Target victim <b>website</b>: <i>spglobal.com</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>hillsidelibrary.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26080</link>
<guid>502bde293ec97ed8b6113eed820d2f62</guid>
<pubDate>Sun, 05 Oct 2025 07:19:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>hillsidelibrary.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5cb7b78a97ea128e61ee3861a572425484630682237ebbd240f9e454e517b007</i><br /><br />Threat actor <b>description</b>: <i>Hillside Public Library offers a number of options for patrons blind or visually impaired. Our Kurzweil software scans in any typewritten document and reads the document aloud to the patron. We also have 2 types of magnifiers. The first, the software-based Zoomtext, reads any computer-generated documents and files, including web/internet pages. Our other magnifier allows the user to increase the print size on documents and books. Employees: 25 Revenue: $5 Million Industry: Hospitality Phone Number:(973) 923-4413</i><br />Target victim <b>website</b>: <i>hillsidelibrary.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>stalkerradar.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26079</link>
<guid>97bed14a683cfd0065fd1a5613a1a205</guid>
<pubDate>Sun, 05 Oct 2025 05:21:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>stalkerradar.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7becc5bb512beefe8b230171beae461a8168da98088aea816c9ad629fa4ab94f</i><br /><br />Threat actor <b>description</b>: <i>Applied Concepts, Inc., d.b.a. Stalker Radar, was founded as a small contract engineering and manufacturing firm in 1975. Since that time, we have grown to be the United States premier manufacturer of police radar and Lidar in the United States. More state police agencies use our speed enforcement equipment than all other radar brands combined. Employees: 142 Revenue: $$25.3 Million Industry: Manufacturing Phone Number:(972) 398-3780</i><br />Target victim <b>website</b>: <i>stalkerradar.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>ocmaine.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26078</link>
<guid>e7aa803cb22f5aea99caa8c91fcf94e5</guid>
<pubDate>Sun, 05 Oct 2025 04:20:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>ocmaine.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a583122bf2cde3e45018d49c6aa1930e50ce79243c93565024a2bb3121f4579a</i><br /><br />Threat actor <b>description</b>: <i>Ouellet Construction is a family-led construction company specializing in commercial construction services in Southern Maine and the broader New England area. They are dedicated to delivering exceptional service through a collaborative and personalized approach that ensures projects remain on time and within budget. Their client base includes various sectors such as healthcare, manufacturing, non-profit, education, retail, and banking. With a focus on establishing enduring relationships, Ouellet Construction emphasizes integrity and consistency in all their projects. Employees: 25 Revenue: $5.3 Million Industry: Commercial & Residential Construction  Phone Number:(207) 725-0100</i><br />Target victim <b>website</b>: <i>ocmaine.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>uhlcompany.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26076</link>
<guid>1ee634c4211a128142ecef927787f0af</guid>
<pubDate>Sun, 05 Oct 2025 01:27:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>uhlcompany.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5da92b73e0998c9559b411169d281485d4833b962b8d6e72fa5450c41fffc4f2</i><br /><br />Threat actor <b>description</b>: <i>Imagine that the building where you live or work has gone haywire. You can't turn the lights on or off, the heating and air conditioning systems are out of order, and the video cameras have stopped focusing on the right areas. Do you think th            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Standard-Fiber</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26074</link>
<guid>762f942f9ebc76e485a774e4bea7f4de</guid>
<pubDate>Sat, 04 Oct 2025 16:39:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackshrantac</b> claims attack for <b>Standard-Fiber</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>419800f22a8615f0c633789261846dc2b9502c038b70c29ad0dad7cd275c0083</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Standard Fiber is a global company specializing in designing and manufacturing bed and home textiles. They maintain key partnerships with manufacturers to provide products, such as bed sheets, comforters and pillows, to retail and hospitality industries. In addition to product development, it provides supply chain solutions and ensures quality control compliance. Established in 1998, Standard Fiber maintains offices in California, USA and Shanghai, China.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackshrantac</category>
</item>
<item xmlns:dc='ns:1'>
<title>Medstar-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26073</link>
<guid>0bdfa70fd4894b47e136ae023e2db7c2</guid>
<pubDate>Sat, 04 Oct 2025 16:18:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Medstar-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>432ab5d3a65a1a56f3aca49d4914c5c8bb1ddbd7866e164640e600ee138c4379</i><br /><br />Threat actor <b>description</b>: <i>Medstar Health</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Corban-OneSource</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26063</link>
<guid>002fdf1e30206e2b0289c5bdc7d5a369</guid>
<pubDate>Sat, 04 Oct 2025 02:26:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Corban-OneSource</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e06d44424ca9ae72e4c56f439e99ec3b24c7fd359ca5c7e76bf475e9f2d9b1f4</i><br /><br />Threat actor <b>description</b>: <i>Corban OneSource, USA - maximize risks to compliance. Company provides comprehensive HR outsourcing services, including payroll administration, employee benefits management, and HR support, aimed at reducing risks and improving organizational            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Western-Orthopaedics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26068</link>
<guid>5677daf23249cd3061fec263776483bb</guid>
<pubDate>Sat, 04 Oct 2025 01:49:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Western-Orthopaedics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f7f7bbdfa80835e83c3828d3e83c2757708c1af9dc6c95554f0b0d8cf9c27fe</i><br /><br />Threat actor <b>description</b>: <i>The orthopaedic surgery, musculoskeletal conditions, sports injuries and spinal conditions</i><br />Target victim <b>website</b>: <i>western-ortho.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Waterborne-Environmental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26067</link>
<guid>e1d55a1caf2d7b5c0c88fd76b8df2141</guid>
<pubDate>Fri, 03 Oct 2025 19:45:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Waterborne-Environmental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d42098c4e077ea9191fc636ce1f148b989278fbd053e1b769bf7ec5099a6e09f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.waterborne-env.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>DSA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26022</link>
<guid>e855c133ac38e1b4d136b6a4c12c4826</guid>
<pubDate>Fri, 03 Oct 2025 18:27:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>DSA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a9230b556f071d8518fa33e952c19132f3d560440f98c1f436ad1c051c35886</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1963, & based out of Pennsylvania, Data Systems Analysts is a company that provides information technology & consultingsolutions services with locations in Feasterville, PA, Aberdeen,MD, Tinton Falls, NJ, Fairfax, VA & McLean, VA.We are ready to upload more than 19GB data. There are lots of essential corporate documents such as: financial data (audit, payment details,financial reports, invoices), employees and customers information (passports, Social Security Numbers, emails, phones) confidential information, NDAs and other documents with detailed personal information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>TransUnion</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26042</link>
<guid>6b8268b2aea8c743f066d9a8f5d056f6</guid>
<pubDate>Fri, 03 Oct 2025 15:53:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>TransUnion</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f505458845d102b6b0f752ec8618aaf8c896e09adf7234dc9463138c4d3fa4e</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] TransUnion is a global credit reporting agency that provides credit information and analytics services to businesses and individual consumers. It collects and aggregates information on over a billion individual consumers in over thirty countries including "Big Three" credit-reporting agencies in the United States. The data they handle includes credit history, credit scoring, and personal information protection services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cisco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26053</link>
<guid>ec615d81761cddecefc011465ed6e3a2</guid>
<pubDate>Fri, 03 Oct 2025 15:52:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Cisco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>71990ef4ea2f0d86d2fb0b232b5cd6172f14ff982551733176b2b78a24f25c65</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Cisco Systems, Inc. is a multinational company based in San Jose, California. It specializes in developing and selling networking hardware, high-technology services, and products. Founded in December 1984, it has been paving the way for digital innovation primarily in the IT industry. Much of the internet protocols and its infrastructure are driven by Cisco's technological advancements.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Google-Adsense</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26045</link>
<guid>c3236725cfb305098d9c19d3ed7b15b2</guid>
<pubDate>Fri, 03 Oct 2025 15:52:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Google-Adsense</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46d09b5718469c54991c20b0c36839cb16325c4293a4ee8460b41d3bfb93b3d2</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Google AdSense is a program run by Google through which website publishers in the Google Network of content sites serve text, image, video, or interactive media advertisements, that are targeted to site content and audience. These advertisements are administered, sorted, and maintained by Google, providing a revenue generating opportunity for publishers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>1-800Accountant</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26057</link>
<guid>df977c84b274de4bd67ed823cf61931e</guid>
<pubDate>Fri, 03 Oct 2025 15:51:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>1-800Accountant</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b71b51b358e3de5be1d86c1e19808162c34762b967379d46e78f5105c13a4269</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] 1-800Accountant is a nationwide virtual accounting firm merging the convenience of technology with proactive professional services to provide small businesses with tax, accounting and advisory services. They serve start-ups, small and medium-sized businesses across various industries. The services include tax preparation and planning, bookkeeping, payroll, entity formation, tax planning and audit defense. Their mission is to make accounting and taxes easy and affordable for individuals and small businesses.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Saks-Fifth</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26026</link>
<guid>b05b64b135c654deacc33cf7c4a8aeb5</guid>
<pubDate>Fri, 03 Oct 2025 15:51:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Saks-Fifth</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>54087995fe77387c0d276070c618f558541da112a29a8b796f25544e307c6ffa</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Saks Fifth Avenue is a luxury retail store originating from the United States. It is renowned for its high-end offerings in clothing, shoes, handbags, jewelry, beauty products, and home goods. Founded in 1867, Saks has garnered global recognition with its flagship store located on Fifth Avenue, New York City. The company also operates numerous department and outlet stores across the United States and online platforms.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>CarMax</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26032</link>
<guid>bd4341b9f5d6bd9c55b3fde4b287bd50</guid>
<pubDate>Fri, 03 Oct 2025 15:50:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>CarMax</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cccb4a32f17c6a508901b580b852be59cb7d068d3117b38bfb2df9dbfe1e8e7f</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] CarMax is a leading car dealership company in the United States that specializes in used cars. The company offers a unique car buying experience to its customers with its no-haggling and fair pricing model. In addition, CarMax also offers financing options and a wide range of car types, makes and models. They are renowned for their thorough inspections, warranties, and return policy.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>TripleA-aaa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26033</link>
<guid>a4b5a70ca8cf24d0eb4330748d1e72e5</guid>
<pubDate>Fri, 03 Oct 2025 15:50:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>TripleA-aaa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5bf17168307a6ca946ce5b1845787a79036260c54216e07873618d091bbd0c87</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] TripleA is a fintech company that aims to simplify cryptocurrency transactions. It provides a business-to-business platform for companies to accept Bitcoin and other cryptocurrency payments. Using blockchain technology, TripleA converts received cryptocurrencies into a local currency, mitigating exchange rate risks. It also supports cross-border transactions, enabling businesses globally to accept cryptocurrency payments from any country.</i><br />Target victim <b>website</b>: <i>aaa.com</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Petco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26024</link>
<guid>dc996ffddc4f1b64eda6c10cd08739fc</guid>
<pubDate>Fri, 03 Oct 2025 15:48:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Petco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>83dc60dfd86def7661e907235b5df39bdd9e1fa3c09b213903e33d05fcc3083c</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Petco is a leading pet specialty retailer in the US providing essential pet products and services. Founded in 1965, it offers a variety of pet food, supplies, and services such as grooming and dog training. Petco operates more than 1,500 locations across the US and Puerto Rico. Its goal is to improve the lives of pets, pet parents, and Petco employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Instacart</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26029</link>
<guid>16af635d9bcc11766919e03aebcb8cf8</guid>
<pubDate>Fri, 03 Oct 2025 15:47:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Instacart</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>053018325f3595e228a0349d1b383bdfe5823055d0173488771f0f456ea8497d</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Instacart is an American company that operates as a same-day grocery delivery and pick-up service in the U.S. and Canada. Customers shop for groceries through their mobile app or website from participating stores. The purchased items are delivered to customers' doorsteps by a personal shopper.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>HBO-Max</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26035</link>
<guid>d2669f6dd645e4881e07eb89a00afa98</guid>
<pubDate>Fri, 03 Oct 2025 15:47:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>HBO-Max</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c35c5f39506da0f9d76250d3c1daa174989ac30719d6e9cff78529b6698f6080</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] HBO Max is a premium streaming service offered by Home Box Office, Inc., a subsidiary of WarnerMedia Entertainment. Launched in 2020, it delivers a vast library of personalized content like original series, theatrical films, and specials directly to viewers. It combines HBO's content with shows, movies, and originals from Warner Bros., DC, CNN, TNT, TBS, and more.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Engie-Resources-Plymouth</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26052</link>
<guid>c44bfdfa0357e84e7243173b7bdee5a9</guid>
<pubDate>Fri, 03 Oct 2025 15:46:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Engie-Resources-Plymouth</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be85db09ddc1ba2813139165cee563e5520c227417a734f10e13c0b1d4cd83db</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Engie Resources (Plymouth) is one of the leading energy providers in the United States. The company operates from Plymouth, Massachusetts, and offers competitive electricity and gas plans for large and medium-sized businesses, local authorities, and institutions. As part of the global ENGIE group, it emphasizes renewable energy and sustainable business practices. From energy procurement to risk management and advising services, they provide comprehensive energy solutions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Albertsons-Jewel-Osco-etc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26050</link>
<guid>115672407a04ac04cbe1a44c16ac4f26</guid>
<pubDate>Fri, 03 Oct 2025 15:46:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Albertsons-Jewel-Osco-etc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7ad4d7624528c7415b826e5dd6befc783c87aea968436320699303990823ad1</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Albertsons Companies Inc. is one of the largest American grocery corporations, founded by Joe Albertson in 1939. It operates stores across 34 states under 20 well-known banners including Albertsons, Safeway, Vons, Jewel-Osco, Shaw’s, Acme, Tom Thumb, Randalls, United Supermarkets, Pavilions, Star Market, and Carrs. It remains a leader in the supermarket industry, offering grocery products, pharmacy services, and specialty food products.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Instructure.com---Canvas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26048</link>
<guid>28b666d0bbf15152aca966add171113d</guid>
<pubDate>Fri, 03 Oct 2025 15:46:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Instructure.com---Canvas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbfb00cac0faa59f9994ac310fd76c0e2e419d07b80801af084f3ae8b03bfd29</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Instructure Inc. is a technology company that developed the Canvas Learning Management System (LMS). Founded in 2008, Canvas is used by educators and students worldwide to connect and integrate digital learning resources into a school's curriculum. Upgraded features include assessment and reporting tools, plus customizable apps. They also offer Bridge, an employee development and engagement software for businesses.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>HMH-hmhco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26049</link>
<guid>60b4f063604e40c044bb1113825bc17a</guid>
<pubDate>Fri, 03 Oct 2025 15:45:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>HMH-hmhco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7290171c4ff7b7959d226407739fd342c07e1ad296d06ff61efc5568f17d685</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] HMH, or Houghton Mifflin Harcourt, is a long-established publishing company specializing in educational content. They provide a variety of instructional technology, assessments, and other learning materials to schools in over 150 countries. The company also publishes a number of well-known trade and reference works, alongside children's books. Their goal is to foster a lifelong love of learning in every individual they serve.</i><br />Target victim <b>website</b>: <i>hmhco.com</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>GAP-INC.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26036</link>
<guid>93fb03efcd98ca5aa136ff9f761c9c2d</guid>
<pubDate>Fri, 03 Oct 2025 15:44:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>GAP-INC.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8983766420b48beaf337b9503cecbbfba58df6ff497f452842bf52c2da35f527</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] GAP, INC. is an American multinational clothing and accessories retailer. The company was founded in San Francisco, California by Donald Fisher and Doris F. Fisher in 1969. The company operates several well-known brands apart from Gap itself, including Banana Republic, Old Navy, Intermix, Hill City and Athleta. Known for its casual style, Gap is one of the largest apparel retailers in the world.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>KFC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26039</link>
<guid>3efe6c32370fb3b8bcba9451df36483a</guid>
<pubDate>Fri, 03 Oct 2025 15:43:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>KFC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>840f3c8a084cf9fc6ed4b91de2acfdbd870d4648ad98f0e76133d75bac7917e3</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] KFC (Kentucky Fried Chicken) is a world-renowned fast food restaurant chain known for its fried chicken. It was founded by Colonel Harland Sanders in 1952 in Kentucky, USA. The brand is now a subsidiary of Yum! Brands and operates over 23,000 outlets globally. KFC's secret recipe of "11 herbs and spices" is a distinctive feature of their products. The company also offers burgers, sides and drinks, among other items.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>McDonalds</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26041</link>
<guid>2b74be52b8b68afdc9ba228f485c71bc</guid>
<pubDate>Fri, 03 Oct 2025 15:43:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>McDonalds</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b3f029cd2b31c7b091374ae8529fa0bd23231796648ab03d27c00a6011ac7252</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] McDonald's is a global fast-food chain, established in the USA in 1940 by Richard and Maurice McDonald. It is renowned for its hamburgers, french fries, breakfast items, soft drinks, and desserts. Primarily, the business model is based on franchising, operating over 38,700 restaurants in over 100 countries worldwide. The Golden Arches logo is globally recognized.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Walgreens</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26051</link>
<guid>56ac9c76e0abcb1c69c370705e45993f</guid>
<pubDate>Fri, 03 Oct 2025 15:42:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Walgreens</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f14c0e60013f7e8e80d75cb4bdf887bc0e1c0ca68bf31a11461232acbd07ec6</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Walgreens is an American pharmaceutical retail company, established in 1901. It is one of the largest US drugstore chains, known for selling prescription and non-prescription drugs, health and wellness products, cosmetics, and groceries. It also offers health services like immunization and patient care clinics. Often, Walgreens operates 24/7 to allow customers access to their products and services at any hour.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Marriott</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26059</link>
<guid>41edce5cfc8f660a3c9a4c1d502d7bef</guid>
<pubDate>Fri, 03 Oct 2025 15:42:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Marriott</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9dcdf530f6f07271f6fa6fb6e2990f6f7bcc2630a3a69b7df0cf469405f2b581</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Marriott International is a renowned multinational hospitality company, headquartered in Maryland, USA. Founded in 1927, it operates a broad portfolio of hotels and related lodging facilities globally. Offerings include diverse properties from luxury to economy chain brands. As of today, Marriott has more than 7,000 properties in over 130 countries and territories, making it one of the world's largest hotel companies.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Home-Depot</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26062</link>
<guid>2f9fc227758c8375bfd10a1447c195cf</guid>
<pubDate>Fri, 03 Oct 2025 15:41:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Home-Depot</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e34232566e787b763c7d49b9e9c57aface03f581c32f7d26eda5c0989fcf1df</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Home Depot is the largest home improvement retailer in the United States. It is a one-stop-shop for tools, construction products, and various services. The company caters to do-it-yourself (DIY) customers, professional contractors, and the construction industry. It offers installation services and tool and equipment rental in addition to selling a litany of home improvement items.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>UPS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26061</link>
<guid>5c0321b6b78eecdfcf72e6a44222fef9</guid>
<pubDate>Fri, 03 Oct 2025 15:40:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>UPS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1cb8b825485f3e6d88de0cff10db07f59a3f3425d1de32fa07c85df91e5f2900</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] United Parcel Service (UPS) is an American multinational company that specializes in logistics, courier delivery services, and supply chain management solutions. Founded in 1907, it's headquartered in Atlanta, Georgia. With a global network, UPS delivers over 20 million packages daily to 220+ countries and territories worldwide. It also offers services like freight forwarding and supply chain designing.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Republic-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26046</link>
<guid>d6623790e6c5ecbbd823c3bbd576cb3e</guid>
<pubDate>Fri, 03 Oct 2025 15:40:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Republic-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ff008da9063d08a17c80d37079975dd74693b891768aa974939a854cd992cef</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Republic Services, Inc. is a leading firm in recycling and non-hazardous solid waste services in the United States. Founded in 1998 and based in Phoenix, Arizona, the company provides waste collection, transfer, evacuation, recycling, and landfill services. It serves commercial, industrial, municipal, and residential customers, catering to multiple sectors including housing, education, and healthcare.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>DisneyHulu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26030</link>
<guid>c6f32964ed71a81a16b0c3e047350c06</guid>
<pubDate>Fri, 03 Oct 2025 15:40:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>DisneyHulu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ade3d659f93863cfce0593aab7c6b3bacaeb2ec51abbcbc59d8bd65742b0b5fa</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Disney/Hulu refers to two separate entities, the Walt Disney Company and Hulu LLC. Walt Disney is a diversified multinational mass media and entertainment conglomerate, known for its film and TV production. Hulu, partially owned by Disney, is an American subscription video-on-demand service offering a variety of TV shows and movies.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>FedEx</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26060</link>
<guid>b7aee80335268a4c2bc6bc5ba337b4e1</guid>
<pubDate>Fri, 03 Oct 2025 15:39:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>FedEx</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e0076234ae05504ce3c3b5dd3c5a27e5c474161a3d7112805305a0682a07827f</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] FedEx Corporation is a multinational delivery services company headquartered in Memphis, Tennessee. Founded in 1971, it offers courier express, freight forwarding, logistics services globally. Along with these, FedEx provides e-commerce, packaging, shipping and business services. It pioneered a system for real-time tracking of packages which has now become an industry standard. With a fleet of cargo aircraft, FedEx is one of the world's largest airlines.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Saint-Marys-Home</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26015</link>
<guid>0b606c5849811a2d8b92b8f4e6391fd7</guid>
<pubDate>Fri, 03 Oct 2025 13:27:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Saint-Marys-Home</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ce33786aa2b6dd4639b1d4983672d193f57de384c5e6f5460729208e744ddff</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sobotec</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26016</link>
<guid>6750b4fb30436bc1df7d0513eb0022e9</guid>
<pubDate>Fri, 03 Oct 2025 13:27:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Sobotec</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e2288b5bffb6e14a2f145b28aafb79bf7834d7f80535b23e87a152d378e6b81</i><br /><br />Threat actor <b>description</b>: <i>Sobotec was founded in 1988 with a vision to produce the best modern wall panel systems available. That vision, coupled with a strong engineering background and a commitment to innovation, led Sobotec to become the first company worldwide to design and developa Rainscreen Wall Panel System (SL-2000) for the metal compositematerial (MCM) ALUCOBOND®. We are ready to upload more than 277GB data. There are lots of essential corporate documents such as: financial data (audit, payment details,financial reports, invoices), employees and customers information (passports, Social Security Numbers, emails, phones) confidential information, NDAs and other documents with detailed personal information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Milburn</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26017</link>
<guid>7ea6925b773d2ab35403de093b290a17</guid>
<pubDate>Fri, 03 Oct 2025 13:27:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Milburn</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>75e662a452da49d49823d14f1c7f0a37ed64f61c36ae5575f64a5d964e4436c0</i><br /><br />Threat actor <b>description</b>: <i>Milburn is a General Demolition contractor out of Chicago, Illinois. They deploy the latest in demolition technology and equipmentwith a fleet of Bobcat skid steers and Brokk remote demolition robots that can tackle everything from structural slab demolition to full interior strip-outs. We are ready to upload more than 16GB data. There are lots of essential corporate documents such as: financial data (audit, payment details,financial reports, invoices), (passports, driver's license, SSNs , emails, medical information, medical cards) Confidential information and other documents with detailed personal information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Field-and-Goldberg</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26018</link>
<guid>08648e60ac32d2c805ab6b0e0c174180</guid>
<pubDate>Fri, 03 Oct 2025 12:27:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Field-and-Goldberg</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db802ab0891bf6a5bbcffd23f63955ea779e07bc100c92c8bbd0e41286d1eef3</i><br /><br />Threat actor <b>description</b>: <i>Field and Goldberg, LLC is a  law firm located in Chicago specializing in real estate taxation, transactions, and litigation. The firm provides comprehensive legal services to a range of clients including condo associations, commercial properties, banks, and apartment buildings. We are ready to upload more than 232GB data. There are lots of essential corporate documents such as: financial data (audit, payment details,financial reports, invoices), project details, personal financial details of employees, accounting files. Confidential information, NDAs and other documents with detailed personal information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>TriMed-Inc.-Henry-Schein</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26008</link>
<guid>f4a6ed9b2695f62c1b2763fa0d56527d</guid>
<pubDate>Thu, 02 Oct 2025 21:27:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>TriMed-Inc.-Henry-Schein</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>78ab5190fc70ffc5cc18d75d9e327f910054b987e838c543a8bb2f0e0956ae0c</i><br /><br />Threat actor <b>description</b>: <i>Headquartered in Santa Clarita, California, TriMed is a leader in developing cre...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>sagchip.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26003</link>
<guid>804a372a28109de1050ce3c0738b1eb4</guid>
<pubDate>Thu, 02 Oct 2025 19:26:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>sagchip.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d4495d183d4e7b6c896ebb7abb4c29e205ee9f0a8dd50cacd0dc521a42e3be6a</i><br /><br />Threat actor <b>description</b>: <i>the Saginaw Chippewa Indian Tribe of Michigan, USA - It's impossible to keep a poker face now. This small community of about 3,000 people is located in Isabella County, near Mount Pleasant. The tribe owns gas stations, a water park, a hotel,             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mitchell-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26004</link>
<guid>12853ea82bcc01634317345a2175a51d</guid>
<pubDate>Thu, 02 Oct 2025 19:26:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Mitchell-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19e4bd409819f01ad9063ad2e8d460603468162953fe7c2698eeddaeeb29e4c5</i><br /><br />Threat actor <b>description</b>: <i>Mitchell Industries, USA - like sand through one's fingers. The company manufactures Accu-Weld¢ wedge wire screens for applications in both the petroleum and refining industries. The family-owned company has been in business for many years a            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Xebec-Building</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26006</link>
<guid>c414093ef0e52a9437267acfcb481dbe</guid>
<pubDate>Thu, 02 Oct 2025 18:27:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Xebec-Building</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d34fa44288d33acac9355b3b5948ac2074553bb11853abc67604b0852215556f</i><br /><br />Threat actor <b>description</b>: <i>Xebec Building Company is a premier design build and general construction firm, providing services throughout the major Los Angeles and Southern California submarkets.We are going to upload corporate data soon. Detailed employee information (Name, DOB, DLs and other docs), financial and accounting files, clients and customers information, contracts and agreements, projects, lots of policies, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>wilsenergy.comUSA77.1GB</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26010</link>
<guid>61cfeaeeca00302aed604bef641447a5</guid>
<pubDate>Thu, 02 Oct 2025 17:27:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>wilsenergy.comUSA77.1GB</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19bd50d3843a35207017d1ba3c00654a6daa5b25f33e5f010fff9d08cdd136f4</i><br /><br />Threat actor <b>description</b>: <i>Unknown - Wilsenergy</i><br />Target victim <b>website</b>: <i>wilsenergy.com/USA/77.1GB</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Weber-Flavors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26007</link>
<guid>925a10591aef311718138363f040e391</guid>
<pubDate>Thu, 02 Oct 2025 16:41:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Weber-Flavors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8aee15f73eb75608637d843defab8e41f9ec5bce1030b31b5b8412bdffcfcb2d</i><br /><br />Threat actor <b>description</b>: <i>Weber Flavors is a family-owned company with over a century of experience in serving the food industry by providing thousands of flavors for various applications. They specialize in custom flavor creation, offering a diverse range of products including liquid flavors, powder flavors, vanilla, and organic flavors. Their intended clients are businesses within the food industry looking for tailored flavor solutions.</i><br />Target victim <b>website</b>: <i>www.weberflavors.com</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dual-Temp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25998</link>
<guid>2f3d5280b5160e984c5472b5110a74b1</guid>
<pubDate>Thu, 02 Oct 2025 15:27:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Dual-Temp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf72ae1f38002e9f591e902db8ef0320050323fa02728a6d6ed014da59035e5c</i><br /><br />Threat actor <b>description</b>: <i>Dual Temp is a leader in mechanical engineering specializing in design, build and service of HVAC/R, Plumbing and Automated Building Control Systems in Eastern Pennsylvania.We are going to upload corporate data soon. Detailed employee information (DLs of more than 100 employees, photos and other employee files), detailed financials, information about customers, confidentiality agreements, projects, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Displayit</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25999</link>
<guid>a17c8f64019807c6c53ea7fad557679b</guid>
<pubDate>Thu, 02 Oct 2025 14:27:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Displayit</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6d9fa0e7478e616e2fa2c84f8beab57fef233a25816c746cd799448e1808476d</i><br /><br />Threat actor <b>description</b>: <i>DisplayIt specializes in designing and fabricating custom displays, casework, and signage tailored for various industries including retail, healthcare, restaurants, and technology.We are going to upload 105gb of corporate data. Employee information, financials, clients confidential files, contracts and agreements, projects (lots of Starbucks project files), and of other data.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Apricorn</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=26000</link>
<guid>63793ae8b9ddc409224f9ba13919d1b6</guid>
<pubDate>Thu, 02 Oct 2025 14:27:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Apricorn</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d31b91eefbe2362c69fe5abd672c0e7d37f3225f68ade2b9851a7e030bad7921</i><br /><br />Threat actor <b>description</b>: <i>Apricorn provides secure storage innovations worldwide to companies and organizations seeking the ultimate protection for their data at rest.We are going to upload corporate data soon. Detailed employee information (lots of medical records, tests, EEGs, MRIs, CTs, SSN scans and other personal information), financials, information about clients, contracts and agreements, projects, NDA, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Spectrum-Painting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25987</link>
<guid>cffb7924cc48c212e70437f8b32c5831</guid>
<pubDate>Thu, 02 Oct 2025 00:19:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Spectrum-Painting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0824d361c0adc142ac66ea956a91ed3521d7f21e38c2f3da9815c12ae2cdadb7</i><br /><br />Threat actor <b>description</b>: <i>Spectrum Painting NYC is a full-service painting company with over 100 years of combined experience, focusing on luxury high-rise buildings and commercial structures throughout the New York Tri-State area. They offer a variety of services including painting, wallcovering installation, plastering, and epoxy finishes. The company's management team ensures that all projects meet their high standards, leading to work with prestigious developers and builders across the nation. Spectrum Painting has built a reputation as a leader in commercial painting since its inception in 1996.</i><br />Target victim <b>website</b>: <i>www.spectrumpainting.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Prince-William-Ice-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25988</link>
<guid>fecbb2b0283f5e5452813021a81585c3</guid>
<pubDate>Thu, 02 Oct 2025 00:19:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Prince-William-Ice-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a4537d891bdeafacb40eb1f27f68c5a407693ff9fb773219aec36600bc9e727</i><br /><br />Threat actor <b>description</b>: <i>Prince William Ice Center provides Northern Virginia with a premier facility for all of your skating and hockey needs. We offer a full range of figure skating and ice hockey programs on our NHL and Olympic-sized rinks all year round. Our professional staff of ice hockey and figure skating instructors offer lessons for all ages and skill levels to assist our skaters and players to reach their optimum level of performance. Prince William Ice Center has a variety of public skating, Freestyle, and Stick & Shoot sessions scheduled through the week. Our full-service Pro Shop has professionally-trained skate sharpening technicians, and our Café offers snacks, meals, and catering for parties, business meetings, and team meetings.</i><br />Target victim <b>website</b>: <i>www.pwice.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Association-on-Health-and-Disability</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25989</link>
<guid>834520f1cd753417e62225779928fe9e</guid>
<pubDate>Thu, 02 Oct 2025 00:18:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>American-Association-on-Health-and-Disability</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>326f9ecea920f1e9a021d4de20527b5fe8a13121c60aec16c67503970ce321a3</i><br /><br />Threat actor <b>description</b>: <i>The American Association on Health and Disability (AAHD) is focused on enhancing overall health for individuals with disabilities through health promotion and wellness initiatives. They engage in policy advocacy, research, and public health programs aimed at reducing health disparities and ensuring health equity for persons with disabilities. AAHD also disseminates information related to disability health and provides resources such as their peer-reviewed Disability Health Journal. Their intended clients include individuals with disabilities, healthcare professionals, researchers, and policy makers.</i><br />Target victim <b>website</b>: <i>www.aahd.us</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Judson-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25990</link>
<guid>5faade0d566fcec8b00f8d195be751aa</guid>
<pubDate>Thu, 02 Oct 2025 00:18:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Judson-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd766d0382306ccd81102a07a863a43d8256a7abeef53f7b482b0159d9987330</i><br /><br />Threat actor <b>description</b>: <i>Judson Center, trusted by Michigan families for more than 97 years, is a non-profit human service agency that provides comprehensive services that strengthen children, adults and families impacted by abuse and neglect, autism, developmental, behavioral, and physical health challenges so they can achieve whole health, well-being, and maximum potential. Judson Center also offers integrated primary healthcare for all through Judson Center Family Health in Warren and is a Certified Community Behavioral Health Clinic (CCBHC). Since opening its doors in 1924, Judson Center has grown to change the lives of over 12,000 children, adults, and families each year. Judson Center has offices in Genesee, Macomb, Oakland, Washtenaw, and Wayne counties.</i><br />Target victim <b>website</b>: <i>www.judsoncenter.org</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Karat-by-Lollicup</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25991</link>
<guid>397fc000ce6f8e94df510c3ff5d86a61</guid>
<pubDate>Thu, 02 Oct 2025 00:18:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Karat-by-Lollicup</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d450d873515566e644ce566e43ac98663917ff1c2af9c336109356d41a2e721d</i><br /><br />Threat actor <b>description</b>: <i>Karat® by Lollicup is a rapidly-growing manufacturer and distributor of environmentally friendly, single-use disposable products, primarily used in restaurants and food service settings. The company supplies a wide range of products for national restaurant chains, as well as smaller, regional chains. Karats products include food packaging, containers, tableware, cups, lids, cutlery and straws. The company also provides additional environmentally friendly options to sustainably-conscious customers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Immaculate-Heart-of-Mary</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25992</link>
<guid>1efc1b615012fad9d233b3f3ca069dd1</guid>
<pubDate>Thu, 02 Oct 2025 00:17:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Immaculate-Heart-of-Mary</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e84258a846d3bd10e09a83bd92290146d4e9cd8b1117d7723551981c4e75e0c9</i><br /><br />Threat actor <b>description</b>: <i>Immaculate Heart of Mary Home, associated with the Immaculate Heart of Mary Roman Catholic Church, has been serving the Brooklyn community since 1893 with a focus on faith and unity. The church offers various ministries including catechesis, consolation support, and food pantry services, aimed at meeting the spiritual and practical needs of its congregants. St. Joseph the Worker Catholic Academy is part of the community, providing education in a Catholic environment to students of all faiths. The organization prioritizes connecting with its members through live Mass services and updating them on important parish information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Johnson-Regional-Medical-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25993</link>
<guid>2a822afd087f6001d3a645686ff08389</guid>
<pubDate>Thu, 02 Oct 2025 00:17:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Johnson-Regional-Medical-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b48fcae293af9d79c12b0a54f343f06117aeb8159350092954b99ab9f8cf01a</i><br /><br />Threat actor <b>description</b>: <i>Johnson Regional Medical Center has been a healthcare provider in Johnson, Logan, Franklin, and Pope counties since 1922, evolving from humble beginnings into a licensed facility with 90 beds. The center offers a wide range of medical services including outpatient therapy, orthopedics, emergency care, and various specialty clinics. Their commitment to quality care aims to serve local patients and visitors effectively. They also engage in community events and support initiatives such as blood drives and health education classes.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Integrity-Wealth-Consulting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25996</link>
<guid>97ea23024b2ad96252af3583dce92d5f</guid>
<pubDate>Thu, 02 Oct 2025 00:14:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Integrity-Wealth-Consulting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a112712e37d4a61ee76157014164cdcc272326fc264b76f1fcf3312e82bf0e5</i><br /><br />Threat actor <b>description</b>: <i>IWC Schaffhausen, founded in 1868 and headquartered in New York, New York, is a luxury Swiss watch manufacturer. IWC has been a subsidiary of the Swiss Richemont Group since 2000.</i><br />Target victim <b>website</b>: <i>www.integritywealthconsulting.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>suntreeinternalmedicine.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25984</link>
<guid>a77520dcdffad519983fef3884d172e1</guid>
<pubDate>Wed, 01 Oct 2025 21:53:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>suntreeinternalmedicine.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57826fb0e0636889d96867c438bc2ca12070c869a27a0862188acaa447e71883</i><br /><br />Threat actor <b>description</b>: <i>Suntree Internal Medicine is a medical center located in the Suntree neighborhood of Melbourne, FL, offering a wide range of healthcare services including preventive care, diagnostic testing, and weight reduction programs. They emphasize personalized, compassionate care and aim to provide swift and efficient visits while maintaining a focus on patient comfort and wellbeing. The center is open seven days a week and provides same-day appointments for convenient access to healthcare. They also offer free in-house antibiotics to expedite recovery for their patients</i><br />Target victim <b>website</b>: <i>suntreeinternalmedicine.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Watsonville-Community-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25980</link>
<guid>7af30e45ae2c3b194ef8e9a9162811d2</guid>
<pubDate>Wed, 01 Oct 2025 21:15:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Watsonville-Community-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>545391b1f2bb48fa4220f41f614f6c89e3babe31fa6c4a3741dc46054be38b44</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1895, Watsonville Community Hospital is a 106-bed, acute care facility accredited by The Joint Commission. In addition to the emergency department that serves as an advanced life support base station for Santa Cruz County, the hospital offers a comprehensive portfolio of medical and surgical services, including a full service Wound Treatment Center. The physicians and staff at Watsonville Community Hospital strive to exceed patient expectations, while delivering compassionate, quality care.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mitrani-Rynor-Adamsky--Toland</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25973</link>
<guid>c66e591693fd6e7b26fc5a60efb68817</guid>
<pubDate>Wed, 01 Oct 2025 20:26:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Mitrani-Rynor-Adamsky--Toland</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>39a32a124076d34e576874ac10044c3c11f179db867fad48473d3e31791bfb7f</i><br /><br />Threat actor <b>description</b>: <i>The company has failed to contact us.

Full file directory: http://securo45z554mw7rgrt7wcgv5eenj2xmxyrsdj3fcjsvindu63s4bsid.onion/data/12/

-- Files of interest --

Trial list including discovery and perso            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Green-Labs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25983</link>
<guid>f20fc1528a7cf30c9d94068b6e65a20e</guid>
<pubDate>Wed, 01 Oct 2025 20:18:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>The-Green-Labs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e724558646f06854f169b5e8af91dadd4097fa83b75e503a523e2e5cbb2dc1d4</i><br /><br />Threat actor <b>description</b>: <i>The Green Labs LLC specializes in supplying bulk raw materials of organic functional foods and nutraceutical ingredients aimed at diverse industries including food, pharmaceuticals, and cosmeceuticals. They offer a wide range of innovative products such as superfoods, proteins, and extracts from reliable sources, focusing on quality and compliance. Their clientele consists of marketing companies, contract manufacturers, and private labelers, emphasizing long-term relationships and exceptional service. The company is committed to supporting consumers' transition to healthier lifestyles by providing high-quality organic certified raw materials.</i><br />Target victim <b>website</b>: <i>www.thegreenlabs.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Calsoft-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25982</link>
<guid>2d1cf69466793ffabe159495a3c28825</guid>
<pubDate>Wed, 01 Oct 2025 20:16:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Calsoft-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>10d74e508bbc5ecc2e868a50f93b2b4f81fdc8b87f0216561e6ab0ef037b9ba4</i><br /><br />Threat actor <b>description</b>: <i>For over two decades, Calsoft Systems has been a leading provider of business technology solutions, specializing in ERP systems implementation for Microsoft Dynamics GP, Microsoft Dynamics NAV, Microsoft Dynamics AX, and Microsoft Dynamics 365. As a Microsoft Gold Certified partner and award winner, Calsoft excels in multi-site ERP implementations, tailored customizations, comprehensive IT support services, and boutique customer service. Our expertise in the distribution, logistics, manufacturing and travel industries enable our clients to leverage an enterprise system to its fullest potential.</i><br />Target victim <b>website</b>: <i>www.calsoftsystems.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Barr-and-Barr</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25969</link>
<guid>c89cef51792c2c4420221ba3964e5165</guid>
<pubDate>Wed, 01 Oct 2025 17:27:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Barr-and-Barr</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79cca66ea66b9b9ef80583ced5b080a4df0fb3f7527b94d8dedbe161e94dc8af</i><br /><br />Threat actor <b>description</b>: <i>Barr & Barr, Inc is a construction management company that provides building information modeling & construction management.We are going to upload 323gb of corporate data. Employee detailedinformation (name, address, DOB, phones, scanned passports, DLs,death reports and so on), financials, clients information, contracts and agreements, projects, and of other files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Plainview-Volunteer-FD</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25977</link>
<guid>eb95e630acb84f9cff9abfc310349381</guid>
<pubDate>Wed, 01 Oct 2025 17:16:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>The-Plainview-Volunteer-FD</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>66950a34b5319c0c6d76011ee8fabcf706a2677e7473e3d29d343eae9eb42c2e</i><br /><br />Threat actor <b>description</b>: <i>The Plainview Volunteer Fire Department provides fire protection and emergency services to the communities of Plainview, Old Bethpage, and parts of Woodbury, responding to approximately 2,200 emergencies annually. It operates three stations staffed by volunteer members and offers programs for Junior and Cadet Firefighters.</i><br />Target victim <b>website</b>: <i>plainviewfd.org</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dimensional-Control-Systems-3dcs.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25974</link>
<guid>7a9caff9ca745d67b4115660429d3bf3</guid>
<pubDate>Wed, 01 Oct 2025 15:46:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>J</b> claims attack for <b>Dimensional-Control-Systems-3dcs.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>766424259dfb972820275b0dd2c237a299f931982a096166e8cd12e5f2933ebf</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Dimensional Control Systems (DCS) is a company specializing in quality management and engineering services. They provide solutions to analyze and predict the impact of variation on product assembly and performance. Their software tools, like the 3DCS variation analyst, assist industries such as automotive, aerospace, medical devices, electronics, to enhance their product quality and manufacturing efficiency.</i><br />Target victim <b>website</b>: <i>3dcs.com</i>]]></description>
<category>J</category>
</item>
<item xmlns:dc='ns:1'>
<title>Keystone-Solutions-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25967</link>
<guid>56640a2494792805eaac82c499e97324</guid>
<pubDate>Wed, 01 Oct 2025 14:28:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Keystone-Solutions-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>deef91279a8b505af39eda5381f4243dca85eedbe527acb351ef986b25f114e7</i><br /><br />Threat actor <b>description</b>: <i>Keystone Solutions Group is a medical device contract manufacturer and product development company based in Kalamazoo, Michigan. They provide a range of services including assembly, kitting, packaging, sterilization management, and clean room environments. Keystone specializes in managing customer product transfers and offers comprehensive solutions from prototypes to full-scale production. We are ready to upload more than 65GB data. There are lots of essential corporate documents such as: financial data (audit, payment details,financial reports, invoices), employees and customers information (passports, driver's license, Social Security Numbers,emails, phones) confidential information, NDAs and other documents with detailed personal information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>DRL-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25972</link>
<guid>f2bb74a2c8f3ec7d16e2982467277e55</guid>
<pubDate>Wed, 01 Oct 2025 12:47:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>DRL-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cfcaad13c563648cc2f4c5c98572199fe274605a2ce2ec71ac86dd2e66395380</i><br /><br />Threat actor <b>description</b>: <i>Customer data leak</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>callhci.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25971</link>
<guid>e8568f57572bc50daf688754f4717ccc</guid>
<pubDate>Wed, 01 Oct 2025 11:45:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>callhci.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0de755d4e08c06369ec9dee88c8a765ecce57da62151838f7b073536f5038539</i><br /><br />Threat actor <b>description</b>: <i>Heritage Communications is a B2B telecommunications provider based in Little Rock, Arkansas, specializing in high-quality Cloud and On-Prem VoIP services from NEC. They serve businesses throughout Arkansas and West Tennessee, offering scalable and customizable telecommunications solutions tailored to meet specific client needs. With over 30 years of industry experience, they prioritize customer experience and provide exceptional service and support. Their partnership with NEC enables them to deliver advanced technology and reliable communication solutions to their clients. Employees: 25 Revenue: $5.1 Million Industry: Cable & Satellite Phone Number:(501) 819-3100</i><br />Target victim <b>website</b>: <i>callhci.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>icc-nw.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25970</link>
<guid>9bfdc40ac4a69d961ab44de9268fd07d</guid>
<pubDate>Wed, 01 Oct 2025 11:44:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>icc-nw.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cefcaf59b2af9758d00728543457cc87b1511cb1ebd67010d447d5f692351529</i><br /><br />Threat actor <b>description</b>: <i>ICC NW specializes in manufacturing custom stainless steel tanks, mixers, and reactors tailored for the food processing, beverage, and pharmaceutical industries. Based in Canby, Oregon, the company boasts a state-of-the-art 50,000 square foot facility that is capable of producing tanks of substantial size and according to various industrial standards. Their product lineup includes various innovative vessels such as smart mix tanks and computerized processing controls, along with patented components like the Sanifoil impeller and Sanibearing steady bearing. ICC NW also provides engineering and automation services, including installation and retrofitting, making them a comprehensive partner for industries in need of efficient processing solutions. Employees: 74 Revenue: $8.2 Million Industry: Industrial Machinery Phone Number:(503) 912-2727</i><br />Target victim <b>website</b>: <i>icc-nw.net</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cholakyan-Chiropractic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25968</link>
<guid>2ece43ae64a6d8da7b88b71be40f7b13</guid>
<pubDate>Wed, 01 Oct 2025 10:49:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Cholakyan-Chiropractic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c46199dc91df4302f3b7f9e6c8ed26a5c40d3bf2fc364b70ddd98d1739a5c7c</i><br /><br />Threat actor <b>description</b>: <i>Here at Cholakyan Chiropractic we have built chiropractic offices, which are very well equipped with state of the art physiotherapy modalities, chiropractic tables, traction units, a high frequency Digital X-ray machine and rehab/therapeutic exercise equipment. In combination with a well trained staff of Chiropractors and Chiropractic Assistants we give each patient a personalized treatment plan and regimen to ensure that we get the best possible results for our patients.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>LAMMCO.NET</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25965</link>
<guid>51fe2fba6faea9b92809477e2fe80b4c</guid>
<pubDate>Wed, 01 Oct 2025 06:53:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>LAMMCO.NET</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e3a8426290dc3521bb6568d503889071ef21954bf27778eace3a5515af5c89d6</i><br /><br />Threat actor <b>description</b>: <i>LAMMCO specializes in industrial furniture and construction specialties. The company focuses on providing high-quality products tailored for various industrial applications. Their intended clients include businesses in need of durable and functional furniture solutions. LAMMCO aims to meet the demands of the construction industry with innovative offerings. Employees: 25 Revenue: $5 Million Industry: Retail Phone Number:(765) 447-7400 CFO: Michael Smith</i><br />Target victim <b>website</b>: <i>LAMMCO.NET</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Smiles-By-Steedman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25964</link>
<guid>8d6e401410acccfbd1e77b322cfb6e88</guid>
<pubDate>Wed, 01 Oct 2025 06:21:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>Smiles-By-Steedman</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec56f036b2fa58a9aeb1d28a07e37706c6cde92b8db99b4ac9101b7944059c26</i><br /><br />Threat actor <b>description</b>: <i>Smiles By Steedman, a family and general dentistry practice in Lake Stevens, Washington! We are dedicated to providing you and your family with the personalized, affordable and comfortable care that you deserve. Through every step of the dental process, we will work and consult with you to ensure that you achieve a healthier oral state in your timeframe and on your budget.- Patients' personal information- documents and medical histories- Company network database- Financial documents- Other information etc.  https://www.smilesbysteedman.com/</i><br />Target victim <b>website</b>: <i>www.smilesbysteedman.com</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Greenville-Legal</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25956</link>
<guid>14b1943788292919ae987f02167d2243</guid>
<pubDate>Tue, 30 Sep 2025 22:27:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Greenville-Legal</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>569c32809fdb80baaa1e2c9e95cdaed9964791d0147ae2b6398d0819d529b744</i><br /><br />Threat actor <b>description</b>: <i>David R. Price, Jr., P.A. is a personal injury law firm based in Greenville, South Carolina, specializing in a wide range of legal matters including auto accide...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rectory-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25950</link>
<guid>ca8a2575f96034775c7dc00162fcc27f</guid>
<pubDate>Tue, 30 Sep 2025 19:59:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Rectory-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a59ed77b30ed209202769c66de31ca628234aa45ad9f00182f7bdcdc6e82bbaa</i><br /><br />Threat actor <b>description</b>: <i>Rectory School, USA - What began as a charitable educational project has, turned into a money-making machine for children. The school, founded by Reverend Frank H. Bigelow in 1920, is now far removed from its philanthropic ideals. Sending you            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cascade-Pacific-Pulp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25953</link>
<guid>c8632be6d99d932350491c9fa87159d7</guid>
<pubDate>Tue, 30 Sep 2025 18:28:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Cascade-Pacific-Pulp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a95792a8619274eab60f9d694187ab191ebe56381c3ff035ef3851a768ee1d51</i><br /><br />Threat actor <b>description</b>: <i>Cascade Pacific PulpCascade Pacific Pulp LLC is a leading market pulp mill located inthe Pacific Northwest, known for its environmentally progressivepractices. The company produces 200,000 tons per year of high-grade pulp, including products like Oregon Gold and White Gold, which are used in various applications such as tissue and printing papers. We are ready to upload more than 146GB data. There are lots of essential corporate documents such as: financial data (audit, payment details,financial reports, invoices), employees and customers information (passports, driver's license, Social Security Numbers, death certificate, emails, phones) confidential information, NDAs and other documents with detailed personal information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Komar-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25957</link>
<guid>8039d1e6173bc70139d255a933d84a75</guid>
<pubDate>Tue, 30 Sep 2025 18:11:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Komar-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f99dfb6de436aaea7f59a7fda11d62d19beffc07a4a80db8b9c02bf4a54e92ca</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.komarindustries.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>CCMC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25945</link>
<guid>10cf7332c3f7998555770c79032723c5</guid>
<pubDate>Tue, 30 Sep 2025 16:50:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>CCMC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b18f776e1bd5340963308010ca48aa50b491efa7790cafcc6f1cfd481498bff5</i><br /><br />Threat actor <b>description</b>: <i>CCMC, based in Scottsdale and founded in 1973, Arizona provides community association management services to residential communities, as well as association management for municipal districts, utility districts, commercial associations, and other entities. The company also provides pre-development consulting to developer clients across the country, including budget forecasting, community governance review, amenity planning, and lifestyle and communications development. company is headquartered in 8360 East Vía de Ventura #100, Scottsdale, AZ 85258, United States 738 Employees. The total amount of data leakage is 2.92 TB. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Comcast</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25946</link>
<guid>36a6cb7962364107dbd2aeee06d11814</guid>
<pubDate>Tue, 30 Sep 2025 16:50:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Comcast</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>421d6d468551c473d4ffa9fc341f0e36df73acee360739b826987409d0a54c14</i><br /><br />Threat actor <b>description</b>: <i>Comcast Corporation operates as a media and technology company worldwide. It operates through Residential Connectivity & Platforms, Business Services Connectivity, Media, Studios, and Theme Parks segments. The Residential Connectivity & Platforms segment provides residential broadband and wireless connectivity services, residential and business video services, sky-branded entertainment television networks, and advertising. The Business Services Connectivity segment offers connectivity services for small business locations, which include broadband, wireline voice, and wireless services, as well as solutions for medium-sized customers and larger enterprises; and small business connectivity services in the United Kingdom. company is headquartered in Comcast Center 1701 John F. Kennedy Boulevard Philadelphia, PA 19103 United States. 182,000 Employees. The total amount of data leakage is 834.4 GB </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Organon</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25947</link>
<guid>4a6aecb3942c1ab2641b83d0731a74b7</guid>
<pubDate>Tue, 30 Sep 2025 16:49:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Organon</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>404747755311d70618ffa610b67f89ba59f5f30ea647ba1bed1311f6ead6d572</i><br /><br />Threat actor <b>description</b>: <i>Organon creates, manufactures and markets innovative prescription medicines that improve the health and quality of human life. Through a combination of innovation and business partnerships, Organon seeks to leverage each of its core therapeutic fields. company is headquartered in 30 Hudson Street, Jersey City, New Jersey 07302, USA. 10,000 Employees. The total amount of data leakage is 478.2 GB </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Insightin-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25948</link>
<guid>3824ab9a06b2d12d1221c7f79bd17da5</guid>
<pubDate>Tue, 30 Sep 2025 16:48:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Insightin-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab636098436abd85551aec1465b703e3006f9d151743715180ade07e62815083</i><br /><br />Threat actor <b>description</b>: <i>Insightin Health helps healthcare payers eliminate data silos and deliver highly satisfying consumer-centric experiences. inGAGE our software as a service (Saas) platform is the industry leading solution for quickly creating a connected data ecosystem. Using artificial intelligence and machine learning techniques, inGAGE leverages the totality of the connected data, in real-time, to produce insights that drive Next Best Action (NBA) recommendations to solve pressing healthcare challenges. inGAGE allows healthcare payers to deliver lifetime member value, driving growth and increasing overall plan profitability. company is headquartered in 333 W Ostend St. Suite 100 Baltimore, MD 21230. 45 Employees. The total amount of data leakage is 378 GB
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Priester-Aviation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25931</link>
<guid>e2625f6934c1cdc344a0f5b5ca3e1e37</guid>
<pubDate>Tue, 30 Sep 2025 13:51:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Priester-Aviation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>793fc76e3b7ec47831018772ace800c3881bcdcb3508af22496376e9a4eb36f7</i><br /><br />Threat actor <b>description</b>: <i>Priester Aviation is a leading provider of aircraft management and private jet charter services, based in Chicago, IL, and operating with nearly 200 years of combined experience in the industry.We are going to upload 124gb of corporate data. HUUUUUGE amount of employees (and their relatives) personal documents (passports, DLs and other docs with complete person information, medical testand other medical docs), crew personal documents, financials information, a bit of customer information, aircraft maintenance information, confidential contracts and agreements, numerous NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sinco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25932</link>
<guid>d3cff5ee422bc11366792285cd0b6b93</guid>
<pubDate>Tue, 30 Sep 2025 13:51:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Sinco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>466749086ef88f57e5388f4688e9ad0599df786810a176a7e3576680cbe82a8f</i><br /><br />Threat actor <b>description</b>: <i>Sinco, Inc. is a certified company specializing in sheet metal fabrication, offering a range of services including profiling, forming, welding, machining, and powder coating.We are going to upload 13gb of corporate data. Employee and customers information, complaints, financials information, lots of agreements and contracts, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pawling</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25933</link>
<guid>610139afa33fd14569ca5713c1057fe1</guid>
<pubDate>Tue, 30 Sep 2025 13:51:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Pawling</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79f1b54270cc89287cda9e088b95261b559bc2a55cfc49eb9dee77ac5eea4ca0</i><br /><br />Threat actor <b>description</b>: <i>Pawling provides the following services: Architectural Products includes Impact Protection Systems Entrance Mats and Gratings Athletic Flooring Systems Heavy-Duty Impact Protection Systems Parking & Traffic Safety Products Presray includes Wateright Doors & Barriers Airtight Doors.We are going to upload 21gb corporate data. Detailed employee personal information (DOB, emails, titles, phones, addresses and so on), financials information, customer information, lots of agreements, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tom-Duffy-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25934</link>
<guid>89148408d209b6fc7dcc7ac44daf70aa</guid>
<pubDate>Tue, 30 Sep 2025 13:51:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Tom-Duffy-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4af65a6ec0d742c2448aa48f592fcf60d99a81ebbbddd593ddd575536ac7e69c</i><br /><br />Threat actor <b>description</b>: <i>Tom Duffy Company specializes in floor covering and supplies offering flooring installation, Ceramic Tile & Stone Setting, and floor heating systems.We are going to upload 7 gb of corporate data. Employee information (names, DOB, address, emails, phones), customers and partners information, financials, lots of agreements and contracts, NDAs etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Midwest-Industries-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25935</link>
<guid>3d7be5aea8e8c8c0224542aec2a732fa</guid>
<pubDate>Tue, 30 Sep 2025 13:51:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Midwest-Industries-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>febb2191a102b96fac547f8a7a8fa115d8f24eb1afe7959331e694910b4f90fe</i><br /><br />Threat actor <b>description</b>: <i>Midwest Industries, Inc. designs, manufactures, and markets boats. The Company offers small fishing boats, cruisers, specialty trailers, pontoons, deck boats, utility trailers, specialty water crafts, and on-water storage for boats.We are going to upload of corporate data. Full employee information (names, DOB, address, emails, phones, SSNs, passports, medicalinformation and so on), financials, agreements, internal confidential files and other HR files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sueba-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25938</link>
<guid>d2817e5b9188a8fac590cb6c263f2222</guid>
<pubDate>Tue, 30 Sep 2025 13:51:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Sueba-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6f54650878e1ec71c7b5708a3e4f0a992029e32bcfdd519ebeab461bf3290e3</i><br /><br />Threat actor <b>description</b>: <i>With over three decades of experience, a reputation for quality, and end-to-end expertise in developing luxury residential and commercial properties, SUEBA USA is an innovator in the real estate development market. We are going to upload 20gb of their corporate data. Lots of financial documents, detailed financials, clients documents, agreements, confidential files, projects, a bit of clients information, and of other files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Von-Paris-Moving</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25939</link>
<guid>9f58ce25aeb1d1cf74703aeabda1b3a3</guid>
<pubDate>Tue, 30 Sep 2025 13:51:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Von-Paris-Moving</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3140da5ed5d7767fb53a6ca29622bb000eb1848e2e5dad31fe8a6d63d2d4ab78</i><br /><br />Threat actor <b>description</b>: <i>Von Paris Moving is a moving company that provides services in the moving and storage industry.We are going to upload corporate data. Employee detailed information (name, address, DOB, phones and so on), financials, clients documents, contracts and agreements, projects, and of other files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Apex-CoVantage</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25940</link>
<guid>170d889b454173db5ca041019ce726de</guid>
<pubDate>Tue, 30 Sep 2025 13:51:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Apex-CoVantage</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fbd6b1e78c768be3ceec98a9afe7a622b278489ccf4951a19e0d4d9d4455a1d3</i><br /><br />Threat actor <b>description</b>: <i>Apex CoVantageThe company provides data conversion, prepress, content enhancement, and editorial services to publishers and both private and public libraries around the world.We are ready to upload more than 35GB files of essential corporate documents such as: financial data (audit, payment details,financial reports, invoices), employees and customers information (passports, death certificate, emails, phones) confidential information, NDAs and other documents with detailed personal information so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Burke-Contracting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25941</link>
<guid>b2a3c1459a5e98694b1f8ce495a9906c</guid>
<pubDate>Tue, 30 Sep 2025 10:46:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Burke-Contracting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b3e4374d0b0b9a76c9e778e1617388659888590e56ea5a2b59b80de11801a383</i><br /><br />Threat actor <b>description</b>: <i>Burke Contracting provides design-build, general construction, co
nstruction management and preconstruction consulting services.

We are going to upload 292gb of corporate data. Employees (includ
ing founders and upper management) personal information (w9 forms
with full names, DOB, address, emails, phones), financials and c
redit cards information, customers information, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>MCBS-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25942</link>
<guid>68f24a4e5f0a836969e4d293fd2eec92</guid>
<pubDate>Tue, 30 Sep 2025 08:20:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>MCBS-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f8ddc695b340b7ee35d5f497ebefd05106c83d10ea4083e968640219f267cf9</i><br /><br />Threat actor <b>description</b>: <i>Provides a complete range of management services to healthcare providers</i><br />Target victim <b>website</b>: <i>mcbs.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>AZpro-Group-azprogroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25943</link>
<guid>be5dfeb671c12d7520445b9292e10d13</guid>
<pubDate>Tue, 30 Sep 2025 07:45:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>J</b> claims attack for <b>AZpro-Group-azprogroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f0a974a76dda90663c1ad34f20cf2ecc10aadaf1bded32398cb7b23ce98ba69f</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] AZpro Group is a multi-faced company that specializes in graphic design, installation, and printing services. Based in Arizona, the company offers a diverse range of services such as vehicle graphics, custom interior graphics, exterior graphics, retail graphics, and large format printing. With its proven expertise, the company helps businesses enhance brand visibility through high-quality graphic solutions.</i><br />Target victim <b>website</b>: <i>azprogroup.com</i>]]></description>
<category>J</category>
</item>
<item xmlns:dc='ns:1'>
<title>Caresoft-Global-caresoftglobal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25929</link>
<guid>0283ed0eee6998607137643223c4e475</guid>
<pubDate>Mon, 29 Sep 2025 20:42:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacknevas</b> claims attack for <b>Caresoft-Global-caresoftglobal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6089b971fe1fb5fc5895ab81c5b3c92a871503d4b85a385a5aaaf11630ebe94f</i><br /><br />Threat actor <b>description</b>: <i>Caresoft Global is a global engineering company specializing in solutions for the automotive, off-highway, agricultural, and construction equipment industries, as well as for Tier 1 suppliers.The company offers solutions in product development, cost optimization, manufacturing, and aftersales service.Caresoft Global is also a leader in automotive benchmarking, technology optimization, and cost reduction engineering strategies.Headquartered in the United States, the company has a strong global presence in Europe, Japan, China, India, and the UAE.Caresoft Global's clients include leading global automotive companies.All accounting records from 2021 to the present day and other documents are for sale.write to us for information:Qualitydatarecovery@mail.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blacknevas</category>
</item>
<item xmlns:dc='ns:1'>
<title>Petro-Diamond-petrodiamond.com---subsidiary-of-Mitsubishi-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25923</link>
<guid>656d366d457c77166c48c6b30a909702</guid>
<pubDate>Mon, 29 Sep 2025 15:43:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>J</b> claims attack for <b>Petro-Diamond-petrodiamond.com---subsidiary-of-Mitsubishi-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cf1cde7e2c4c87130a03dc109da78db35cf44f9fc00a40d6a55dfe84cff9fb10</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Petro-Diamond is a commodity trading subsidiary of Mitsubishi Corporation. It's involved in the trade and marketing of petroleum and its derivatives, liquefied petroleum gas (LPG), and carbon-related materials. Also, they handle petrochemicals and participate in energy project developments.</i><br />Target victim <b>website</b>: <i>petrodiamond.com</i>]]></description>
<category>J</category>
</item>
<item xmlns:dc='ns:1'>
<title>Peavey-Electronics-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25924</link>
<guid>41d98b54063973ecbdcbe845ff38ff95</guid>
<pubDate>Mon, 29 Sep 2025 15:15:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Peavey-Electronics-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8dea6c4f634ccf76b886859d9ec02e953c571e724dace6720d62209001d381c6</i><br /><br />Threat actor <b>description</b>: <i>Peavey Electronics Corporation Founded by Hartley Peavey in 1965 as a one-man shop, today Peavey Electronics Corporation is one of the largest makers and suppliers of musical instruments, amplifiers and professional audio systems in the world-distributing more than 2,000 products to more than 130 countries.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>lakehaven.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25906</link>
<guid>3df9f63b70bff498764b4daa10ce8f6a</guid>
<pubDate>Mon, 29 Sep 2025 14:28:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>lakehaven.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b2d15ed2738adcfc66404556bc3dbe70924b4fac94320904987aeeddafe67a6</i><br /><br />Threat actor <b>description</b>: <i>Lakehaven Water District provides essential water and sewer services to residents of South King County, Washington.
1.The document dated January 3, 2025, is a report on GL Distribution for the pay period December 16–31, 2024 (payment on Ja            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>raimore.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25911</link>
<guid>24b482e0e7581adb4d2f9ec2a4abf347</guid>
<pubDate>Mon, 29 Sep 2025 13:45:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>J</b> claims attack for <b>raimore.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9525fe086116ddb32c82f56ed47f8beef5af2bc5114bf203287e8f3008eb8181</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>raimore.com</i>]]></description>
<category>J</category>
</item>
<item xmlns:dc='ns:1'>
<title>Virtual-Projects-virtualprojects.build</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25912</link>
<guid>88bccac4be340a681f5eff6d5cbde9d2</guid>
<pubDate>Mon, 29 Sep 2025 13:44:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>J</b> claims attack for <b>Virtual-Projects-virtualprojects.build</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>439eaab63979147d03e44c87c2fe68f0d1d10726c53898f0139e649d3f1932ce</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Virtual Projects is a construction-focused firm based in Northern California. They are dedicated to providing a comprehensive range of services including preconstruction, project estimating, and construction management. Their cutting-edge technology and experienced personnel allow them to offer virtual design and construction methodologies, assisting clients from concept through to completion.</i><br />Target victim <b>website</b>: <i>virtualprojects.build</i>]]></description>
<category>J</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.braswellsvc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25919</link>
<guid>c5f5a733716c32cdc8da76f30827420d</guid>
<pubDate>Mon, 29 Sep 2025 13:36:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>www.braswellsvc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6121ab9c64d4ae3afef1cc1cba1695b37a7519f3b0f9e8ac0500491af7f8fe13</i><br /><br />Threat actor <b>description</b>: <i>Ransom: 120000 USD | Note: 300gb exfiltrated</i><br />Target victim <b>website</b>: <i>www.braswellsvc.com</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.chicagobotanic.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25917</link>
<guid>5657a4a1f4bb5cc4b95d6e17b6ac6d62</guid>
<pubDate>Mon, 29 Sep 2025 13:34:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>www.chicagobotanic.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f4b24c282ef2641a7ac171ebf384ea44671161a39d5feeaabbfa10f0f8c003f</i><br /><br />Threat actor <b>description</b>: <i>Ransom: 590000 USD</i><br />Target victim <b>website</b>: <i>www.chicagobotanic.org</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>r3consulting.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25916</link>
<guid>240771160420640663f944cc56c37018</guid>
<pubDate>Mon, 29 Sep 2025 13:33:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>r3consulting.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>591aa1ef35b66a7ae8531cbea285ea3f63a74e880327853c799d7aa18fab3994</i><br /><br />Threat actor <b>description</b>: <i>Ransom: 350000 USD | Note: 400gb stollen</i><br />Target victim <b>website</b>: <i>r3consulting.com</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>ncgllc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25915</link>
<guid>629cfb1750e1aafd9fd8b37d5fa6e982</guid>
<pubDate>Mon, 29 Sep 2025 13:32:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>ncgllc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>092805d58d6b325423c70fed3581021aca29a6f026cde5db4264e1610e430b14</i><br /><br />Threat actor <b>description</b>: <i>Ransom: 100000 USD</i><br />Target victim <b>website</b>: <i>ncgllc.com</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>sacada.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25913</link>
<guid>3276d012055292a66a29bc5aa5df12d7</guid>
<pubDate>Mon, 29 Sep 2025 13:31:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>sacada.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12edece4c7f557f6f2598ec19b4fd099bdfcb4623b52f08f85fd8eb82e9bf58b</i><br /><br />Threat actor <b>description</b>: <i>Ransom: 100000 USD</i><br />Target victim <b>website</b>: <i>sacada.org</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>heparks.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25904</link>
<guid>b15780f320ec1c2819defb6d337eef1f</guid>
<pubDate>Mon, 29 Sep 2025 11:28:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>heparks.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d4db33c8a68f48208d2241cfca4aae5c9d7d69b55cf08e26feabed22e751c2b</i><br /><br />Threat actor <b>description</b>: <i>The Hoffman Estates Park District strives to provide the local community with exceptional recreational programs, well-maintained parks, and high-quality facilities. Their offerings include a variety of programs for youth, adults, and seniors,            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>MSB</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25901</link>
<guid>2cf203516f33059cf320d8b7ec385328</guid>
<pubDate>Mon, 29 Sep 2025 07:27:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>MSB</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6c8fc6b31f031ff3f32aec0fbab5a25f9ae5d5f26edcb84720cc0aa672aec72</i><br /><br />Threat actor <b>description</b>: <i>Site: msbuilders.com
														Industry: Commercial & Residential Construction
														GEO: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>Naftali-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25902</link>
<guid>60a5a506e99d3b76a199c91aaf28c181</guid>
<pubDate>Mon, 29 Sep 2025 00:48:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Naftali-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8463d48e4d9862ee456966107c3dcfdf405cb4ac093ba7877c596c69bd895d64</i><br /><br />Threat actor <b>description</b>: <i>Naftali Group, a privately held global real estate development and investment firm based in New York City, has a prestigious track record, having led some of the most significant developments and landmark restorations. Founded and led by Miki Naftali, Naftali Group is highly specialized in identifying and acquiring undervalued properties in premier geographic areas with strong potential growth while maximizing the value of unique and irreplaceable assets. Naftali Group pursues strategic acquisitions and continuously grows its extensive portfolio of new development condominiums, income-producing, mixed-use properties and other assets. Through innovation and discipline, Naftali is recognized as a leading developer with a current and past portfolio comprised of more than 30 projects encompassing more than $9 billion in total value.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bignault--Carter</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25903</link>
<guid>06fcc10b4a95f17133ee992810735a01</guid>
<pubDate>Mon, 29 Sep 2025 00:48:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Bignault--Carter</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e88c400e3b47577e8e5f7b7f7cbb17d7613192e7bc934f544845cc2497b65f6c</i><br /><br />Threat actor <b>description</b>: <i>Bignault & Carters Savannah law practice is focused on the representation of Labor Unions and Pension, Vacation, and Health and Welfare Funds in and around Savannah Georgia</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-DM-Burr-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25898</link>
<guid>fc2ab5e9a8dd35473c8dc453a62962f7</guid>
<pubDate>Sun, 28 Sep 2025 22:48:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>The-DM-Burr-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3c6bb5c090159f3139402c53e3d7ad09db5779fddda6c7d2820b6c4ea54a047</i><br /><br />Threat actor <b>description</b>: <i>The DM Burr Group is a multifaceted company that has many divisions that are complementary to one another giving our customers the easiest way possible to bundle services together thus saving time and money at the same time. DM Burr was started in January of 1998 and has had extraordinary growth due to our ever present "the customer comes first" attitude. Cannot imagine a better group of managers and employees than the ones that work at DM Burr. DM Burr Mechanical- All phases of Heating, Cooling, Plumbing and Electrical installation, service and repair. Direct vendor of York and Lennox. DM Burr Disaster Restoration-Water.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Belleville-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25897</link>
<guid>dd1f345b360e81d1a63935eeae1ca462</guid>
<pubDate>Sun, 28 Sep 2025 21:57:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Belleville-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bbb9b36084130417ea7986df44fda2e429288ba715400edd30a12d456ee73c3e</i><br /><br />Threat actor <b>description</b>: <i>Belleville International specializes in precision load solutions, providing durable washers and disc springs designed for high-stress environments across various industries. Their product offerings include flange washers, valve components, and downhole drilling springs, all tailored to meet specific application needs. The company emphasizes customer-centric services, including 24/7 emergency support and quick turnaround on custom and stock products. With a commitment to quality and full traceability, Belleville International serves clients in sectors such as oil and gas drilling, valve manufacturing, aerospace, and automotive racing.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>WaltersMorgan-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25896</link>
<guid>af6e15cfa6c456895fd802a9d29ead74</guid>
<pubDate>Sun, 28 Sep 2025 21:56:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>WaltersMorgan-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c2246d1d93434ae45431c52c75d5b81adc8f038277ce9f45e8665682cb54bc00</i><br /><br />Threat actor <b>description</b>: <i>Walters-Morgan Construction, Inc. is a leading construction firm based in Manhattan, Kansas, specializing in the construction of water and wastewater treatment plants as well as other municipal utilities. Established in 1938, the company is dedicated to community success and environmental stewardship through quality engineering and construction services. They offer a wide range of career opportunities, promoting a positive work environment and benefits for employees of all skill levels. Their commitment to high-quality projects reflects their goal of ensuring community pride and satisfaction.</i><br />Target victim <b>website</b>: <i>www.waltersmorganconstruction.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Punctual-Abstract</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25892</link>
<guid>a06dfaedc1e4413666a940fb0e84fbd6</guid>
<pubDate>Sun, 28 Sep 2025 21:49:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Punctual-Abstract</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>236308192b1b421c8ff2b101ec0c5d444fcc20427d7f6cb3a74759577a65dc1d</i><br /><br />Threat actor <b>description</b>: <i>Punctual Abstract is a leading provider of abstracting services in the land title industry, boasting over 25 years of experience. The company utilizes advanced technology for national title production, delivering near-instant real estate property data returns across the United States. Their proprietary software integrates seamlessly with leading title and escrow platforms, allowing for efficient and accurate data management tailored to client needs. Punctual Abstract serves a variety of clients, including title agencies and underwriters, with extensive coverage and dedicated support.</i><br />Target victim <b>website</b>: <i>www.punctualabstract.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dorrell-Fabrics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25893</link>
<guid>303e5a77002b8f8acf84ef064760f23e</guid>
<pubDate>Sun, 28 Sep 2025 21:49:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Dorrell-Fabrics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e641f7c67c1e9800ac731a38aa77c2ff1669e1b3af23fe44af10623a3109090</i><br /><br />Threat actor <b>description</b>: <i>Dorell Fabrics specializes in fabric sourcing and innovation, offering a wide array of products including residential, performance, contract, outdoor, and specialty fabrics. The company collaborates with designers, manufacturers, and suppliers to provide high-quality textiles tailored to meet specific needs. With nearly 88 years of experience, Dorell Fabrics is committed to operational excellence and trend forecasting in the textile industry. They aim to make the fabric sourcing process seamless for various clients across different sectors.</i><br />Target victim <b>website</b>: <i>www.dorrellfabrics.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crane-Production-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25894</link>
<guid>f096d3da9f8797e053edd854335413ab</guid>
<pubDate>Sun, 28 Sep 2025 21:49:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Crane-Production-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d0468a80f1013af01fbdef3208351fe8e4aeb3743c9d0241fd2b26ecaff00543</i><br /><br />Threat actor <b>description</b>: <i>Crane Production Systems is a full-service metal stamping and material handling company that specializes in the installation and servicing of industrial equipment. They provide a wide range of products including metal stamping machines, conveyors, and various retrofitting services for improved production efficiency. Their target clients include manufacturing industries looking for reliable machine solutions and technical support. With a commitment to excellence and customer service, Crane aims to enhance productivity and operational safety for their clients.</i><br />Target victim <b>website</b>: <i>www.craneproductionsystems.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Queens-Center-For-Change</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25895</link>
<guid>fd268d6fb813bbdb142908d7c23e4a88</guid>
<pubDate>Sun, 28 Sep 2025 21:48:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Queens-Center-For-Change</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d301890c0b9314c8e8729a1fba70f1e16a98c54db6bddd667f65b31ab642bd8f</i><br /><br />Threat actor <b>description</b>: <i>Queens Counseling for Change (QCC) provides behavioral counseling services. Services are provided by licensed counselors with many years of experience in the field. The agency is led by Larry Menzie, LCSW/R and Lillian Passoni, LCSW/R social workers with over 25yrs of experience providing services in a variety of settings.  QCC provides a myriad of services: problematic sexual behaviors, sexual offenses, batterers, anger management, bias crimes, animal cruelty education, and DWI (evaluations only).</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>BAM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25891</link>
<guid>f6ff1d6f23269b8af44ca23ab194e7e9</guid>
<pubDate>Sun, 28 Sep 2025 18:15:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>BAM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d5df6e9e41aa9412eeaccaf72d0a28ffc6447c6dc897460dc335f1b102f8f616</i><br /><br />Threat actor <b>description</b>: <i>You are fully aware of what we have, yet you’ve chosen not to uphold your end of the agreement. This is unacceptable. If you do not get in touch ...</i><br />Target victim <b>website</b>: <i>???</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Amelia-Overhead-Doors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25886</link>
<guid>a827c8955bcaf2cb9c7e451161ece13b</guid>
<pubDate>Sat, 27 Sep 2025 21:10:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Amelia-Overhead-Doors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8b2dc0cd369ee93ddf5ebbacb6b1e4663449d9dbe8a5b11020ea561c56c49de</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ameliadoor.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pangborn</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25885</link>
<guid>b079ec4c72b94420282bf9b0b544133d</guid>
<pubDate>Sat, 27 Sep 2025 21:10:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Pangborn</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a17e3c27fcc4717f518370b36fdd2de5787455ed5bd62df8c549596677cb756</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.pangborngroup.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>ComTec-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25881</link>
<guid>bddad3b16ee4fcc5f24b228a8f78a111</guid>
<pubDate>Sat, 27 Sep 2025 21:09:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>ComTec-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>55001c88caa7f724ccb7df104e0b818141a9ec387439f694ab8b444bee4bc4e6</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.comtecsystems.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Earthadelic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25884</link>
<guid>9f423d8558ba8d9d96a987c9933ffd49</guid>
<pubDate>Sat, 27 Sep 2025 21:09:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Earthadelic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>980fd748168f5c8d7b3af6a4da6e351c31766f09a876cb748dd3a01375422c3d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.earthadelic.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Steve-Basso-Plumbing-Heating</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25883</link>
<guid>60a77e068efeffff1391d72e4fbfec5c</guid>
<pubDate>Sat, 27 Sep 2025 21:08:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Steve-Basso-Plumbing-Heating</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c390f614ea0ad71d34a5c5f5301d50db0601908faf325445a82596b29750ae8</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.bassophac.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Atlas-Pressed-Metals</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25882</link>
<guid>f84aa65357bec670cbba3ae77711c233</guid>
<pubDate>Sat, 27 Sep 2025 19:35:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Atlas-Pressed-Metals</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5ae29cda04d3f6936771aaae59153d9f80dd0b990017b59e1fca08f63f50e65</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.atlaspressedmetals.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Phillips-Feldman-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25878</link>
<guid>acc1fc2a7746c567f63c3c0490c35ddc</guid>
<pubDate>Sat, 27 Sep 2025 06:51:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Phillips-Feldman-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>03eb0d71c3ebda2354f61c9322e1694b41e84591fc4ec5fa1e4778d742afd8bd</i><br /><br />Threat actor <b>description</b>: <i>Quality, personalized financial guidance to South Florida individuals and businesses</i><br />Target victim <b>website</b>: <i>cpfgcpa.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>thomasmhughes.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25869</link>
<guid>799d3f5de8680c081517920476881764</guid>
<pubDate>Fri, 26 Sep 2025 23:28:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>thomasmhughes.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>032992a1865bfe604fdd3b6ac38779eeac9cf0a93c4fb407fcbbeafa3063bddb</i><br /><br />Threat actor <b>description</b>: <i>Thomas M. Hughes, Ltd. USA - Calculation error. Company specializes in providing experienced legal counsel focused on employee benefits, ERISA, tax, and pension law. With over 30 years of expertise, they offer clear, practical solutions tailo            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Memphis-Millwork</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25867</link>
<guid>2fffa6dd1b50ced2b3d67b862bf2f61d</guid>
<pubDate>Fri, 26 Sep 2025 20:27:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Memphis-Millwork</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f179bb60aa49ae581737abf730fbbe4d69881af44d7667abfa417a2ee7d32744</i><br /><br />Threat actor <b>description</b>: <i>(Client data, accounting records, and internal documentation) Memphis Millwork specializes in commercial architectural millwork, catering to clients in Memphis ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cardinal-Machinery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25868</link>
<guid>bfd1269f6ca371debca250799daabb02</guid>
<pubDate>Fri, 26 Sep 2025 20:27:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Cardinal-Machinery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>644eb9c08031661cb42ec0badd036d894eee7dcae1770c0c1f20d44460eb8ee2</i><br /><br />Threat actor <b>description</b>: <i>(Full data) Cardinal Machinery is a family-owned business with over 50 years of experience in the Machine Tool Industry, serving clients across Tennessee, Alaba...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>ComTec-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25870</link>
<guid>c1b8c48c660ae44b22e250b32acae44f</guid>
<pubDate>Fri, 26 Sep 2025 15:47:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>ComTec-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b489fafece1ec17fc263aced2e2fedcd577e18bd398d2201b35f923a3296d980</i><br /><br />Threat actor <b>description</b>: <i>Specializing in business telecommunications and cost reduction consulting</i><br />Target victim <b>website</b>: <i>comtecsystems.net</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>WEST-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25858</link>
<guid>b276d5b499aa50a632efddf40bbdd75b</guid>
<pubDate>Thu, 25 Sep 2025 23:28:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>WEST-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04746bc2a22b8df763718e6185bb093cb0a178072878c917adb464830a2c7640</i><br /><br />Threat actor <b>description</b>: <i>West Water & Energy Systems Technology, USA - clean, but dangerous. Company specializes in sustainable water treatment solutions for various industries, particularly mining, boiler systems, and cooling towers. The company suffered a global da            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>XCAssociates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25859</link>
<guid>d64676745e6f99d0a8ab6c90160c438b</guid>
<pubDate>Thu, 25 Sep 2025 23:28:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>XCAssociates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77c783d921fa6480629f598aa409f262fb0c822912b33213f342db6de9205338</i><br /><br />Threat actor <b>description</b>: <i>XC Associates, USA specializes in the design and manufacturing of advanced carbon glass fiber composites tailored for various high-performance industries including medical, aerospace, energy, and consumer sectors. They offer a comprehensive r            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>oconnorcp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25848</link>
<guid>9c7eae0c470302045fc7e20c147b1929</guid>
<pubDate>Thu, 25 Sep 2025 17:27:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>oconnorcp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d5d95feff4c40d14cac643eedf49a3da0b8e4903d2d961cab2e65586a2490a7</i><br /><br />Threat actor <b>description</b>: <i>O'Connor Capital Partners is a real estate investment company specializing in retail, office, industrial, residential, and multifamily properties in major cities across North America and Europe. The company was founded in 1983 and is headquar            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>waxhaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25849</link>
<guid>1abdec9e557dd71f742a5cfd35fb85f5</guid>
<pubDate>Thu, 25 Sep 2025 17:27:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>waxhaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>003e277ac25bf35ca6da91a496a87967892180a0cd094be34c990b1e4ae5c7bd</i><br /><br />Threat actor <b>description</b>: <i>The Town of Waxhaw in North Carolina.
1.All files relate to municipal procurement and contracts for the Town of Waxhaw (NC) for land rights acquisition services, map preparation, and related work for the Waxhaw-Marvin Road and Kensington Dri            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>regalmold.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25851</link>
<guid>5c10d595f3dfb3c6605a34f0c1a4c5b6</guid>
<pubDate>Thu, 25 Sep 2025 17:27:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>regalmold.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57c0ed0e44aff5df245aeaca0867cc26c938bb93cf18a8c1b49680cae549f78b</i><br /><br />Threat actor <b>description</b>: <i>We design and manufacture custom molds, components, and many other types of tools and assemblies for a wide range of customers.To manufacture custom products, we use precision machining on CNC machines, 5-axis machining, electrical discharge             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>halemakua.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25854</link>
<guid>b82e68e6366d4177332acdf3fa4d1e3a</guid>
<pubDate>Thu, 25 Sep 2025 17:27:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>halemakua.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a0074f693c743eddc3eeaf16e38df9e2b323f02576d6030b1297d7511c4e82b6</i><br /><br />Threat actor <b>description</b>: <i>Hale Makua Health Services is a private, non-profit company located on the Hawaiian island of Maui. 
Our mission is to improve the well-being of our clients by providing personalized medical services at home, both at our facility and at your            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Study-Gate</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25860</link>
<guid>871c97e4e4732049f0e08079646b1f27</guid>
<pubDate>Thu, 25 Sep 2025 14:57:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Study-Gate</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9bb28872e0c3e563c95675b2ce2a83ce53194cd6ec89778e3b327f9b8ffe7ac</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>studygate.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>pactchangeslives.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25839</link>
<guid>5b0f06cd304f174c316b40e5b384a164</guid>
<pubDate>Thu, 25 Sep 2025 00:27:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>pactchangeslives.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>09e4ea9f43bb9d67257b8aa15644074eeea74441c1647eed51a0ab82fffd1380</i><br /><br />Threat actor <b>description</b>: <i>Porter County PACT is a company that operates in the Government industry. It emp...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>lwginc.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25840</link>
<guid>e9164c9ba1d2a0dc4e7a4a53a7613438</guid>
<pubDate>Thu, 25 Sep 2025 00:27:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>lwginc.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0768dcc809c1a029a6b169a894d8dbac14bc08ea12f2e056bf3840067fef5251</i><br /><br />Threat actor <b>description</b>: <i>LWG Construction offers end-to-end commercial construction services, focusing on...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>VIR</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25838</link>
<guid>c3bd3d83ed8935f03a904ca943dd6f4d</guid>
<pubDate>Wed, 24 Sep 2025 23:28:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>VIR</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6e0d6122b3927074d3aec664cf29ebe031c723829269cd3892a1105647640a6</i><br /><br />Threat actor <b>description</b>: <i>Vir Biotechnology is a clinical-stage immunology company that focuses on combini...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>amsfulfillment.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25843</link>
<guid>0e9a570f97a6f2a4e1326a10228176a4</guid>
<pubDate>Wed, 24 Sep 2025 20:48:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>amsfulfillment.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f4daf955d19543354ab0b3bba396556ea542b147573289cbe52023bd3f557fe1</i><br /><br />Threat actor <b>description</b>: <i>AMS Fulfillment is a leading full-service order fulfillment company operating as a third-party resource for order management, fulfillment center management and complex fulfillment services. AMS provides a full suite of fulfillment and distribution services to consumer products companies focused on serving the B2B retail (brick-and-mortar), online retail, and direct-to-consumer channels.</i><br />Target victim <b>website</b>: <i>www.amsfulfillment.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Valufinder-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25841</link>
<guid>9e667fbfbd97792f460f4c60557ab349</guid>
<pubDate>Wed, 24 Sep 2025 19:40:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Valufinder-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96ddb6a52c22229b370816d7f104a3c0de635c7013c84e63ca9e3f0d31726715</i><br /><br />Threat actor <b>description</b>: <i>Valufinder Group, Inc. is a boutique investment banking firm, recognized as a leader in providing comprehensive advisory services to mid-sized firms. Our seasoned professionals have mastered both the art and science of presenting businesses for financing or sale. We combine a highly personalized, service-oriented approach with a proven system for maximizing an owner's value, while minimizing risk, maintaining confidentiality, and anticipating and meeting the many challenges inherent in the process</i><br />Target victim <b>website</b>: <i>www.valufindergroup.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>TLD-Law.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25835</link>
<guid>8200e2e850224e4cea691cdc3ad0da2d</guid>
<pubDate>Wed, 24 Sep 2025 11:50:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>TLD-Law.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8747fdd55e24e3c30cf8fa11f3857eb344b75d7845a9ecd97e5f4de2f5f265a4</i><br /><br />Threat actor <b>description</b>: <i>TLD Law is a Southern California law firm specializing in estate planning, business transactions, employment law, real estate, and civil litigation.  They offer comprehensive legal services to both individuals and businesses, including corporate counsel, mergers and acquisitions, and trust administration.  ========================= In September, we downloaded corporate information from the company's server Tldlaw.com Their management decided not to contact us, so now we are publishing a small number of screenshots of internal corporate information. We own personal information of company employees, internal mail, financial information tldlaw.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Maryland-Department-of-Transportation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25836</link>
<guid>94f2bea7eb6186bb607e796153b2c343</guid>
<pubDate>Wed, 24 Sep 2025 11:08:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>The-Maryland-Department-of-Transportation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c67aa001427bb9ad8c733a8f8d108cb719e137e700c18fba5122c034289aa721</i><br /><br />Threat actor <b>description</b>: <i>The Maryland Department of Transportation</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.cr-installers.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25829</link>
<guid>7fdcabbd898d3abe2690b023345adc9a</guid>
<pubDate>Wed, 24 Sep 2025 00:28:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.cr-installers.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>31aafcb5e49366a02d054d32102bd282cff15efa0706cdf38ffc70f981e1cdd7</i><br /><br />Threat actor <b>description</b>: <i>Chris Rodriguez Installers, USA - The company specializes in the installation, delivery, and warehousing of system furniture for federal, regional, and commercial organizations. CRI also operates a 50,000-square-foot warehouse conveniently lo            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Madison-Healthcare-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25818</link>
<guid>876af3a1db90d050582dc4b1c2201198</guid>
<pubDate>Tue, 23 Sep 2025 20:26:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Madison-Healthcare-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fdb760a7712284fa25df00bbfbc58fec2a9e1df44272e3eff8ff5503494a7f09</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pyramid-Global-Hospitality</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25819</link>
<guid>5361ef0c3c103c396bb6c7a24e638b5e</guid>
<pubDate>Tue, 23 Sep 2025 20:26:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Pyramid-Global-Hospitality</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fcbf563c950caa6ca1399c63b729195f5f0209b4e130561972a54b1f4502bdbe</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mavis-Tire-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25820</link>
<guid>d5c9087190e4d541da83e0739edeb60c</guid>
<pubDate>Tue, 23 Sep 2025 20:26:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Mavis-Tire-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6714d2384decc777e8ec63a350e8aed9bf351b0e378a351c8675bd41a0e0e6a7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>KIPP-DC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25821</link>
<guid>9c75e36585c849bbac315c81661b0821</guid>
<pubDate>Tue, 23 Sep 2025 20:26:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>KIPP-DC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>737f7cb4db53cd1979715002588b517284df9a63b81e1f6e5b7eb5aaf285db40</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sapp-Bros</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25822</link>
<guid>a1b865daa05b1b1283171c4d28c02ec6</guid>
<pubDate>Tue, 23 Sep 2025 20:26:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Sapp-Bros</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f33e2f0c69394f3d3c9cd4ec53a465e395b531cd66f03ae294c1385d37a42aa3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Washington-Prime-Group-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25823</link>
<guid>c49b360013e94c4d5e72d5e7cc3742ed</guid>
<pubDate>Tue, 23 Sep 2025 20:26:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Washington-Prime-Group-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f76d7bbbb5707167788525a999767c1eb404e1ce68994ea5b5699d9875cab14</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.margaritavilleatsea.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25824</link>
<guid>768d084123cb2ed6e871ad2019d3ae8a</guid>
<pubDate>Tue, 23 Sep 2025 20:26:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>www.margaritavilleatsea.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3b6f9a85ce65d9b153338d1467b303044302e2c38801a0de3b9a24eda40262d</i><br /><br />Threat actor <b>description</b>: <i>Margaritaville at Sea Cruises offers a unique offshore resort experience with fu...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Paul-Rossi-Law-Offices</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25816</link>
<guid>cb1791d9672d69b321c67b55d0aa3db4</guid>
<pubDate>Tue, 23 Sep 2025 16:27:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Paul-Rossi-Law-Offices</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fb5eed66d408e822c04f606da33ccc3bf0550851a924127ca6ea872e63b50cc6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Speed-Art-Museum</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25825</link>
<guid>de447028949b3471aa2617ad9db5a97f</guid>
<pubDate>Tue, 23 Sep 2025 15:47:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Speed-Art-Museum</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>740d219cfaab80ed553714f496f66bd99ed6904fba24cc7eb016b16bdaeb0653</i><br /><br />Threat actor <b>description</b>: <i>The Speed Art Museum, originally known as the J.B. Speed Memorial Museum, now colloquially referred to as the Speed by locals, is the oldest and largest art museum in Kentucky. It was established in 1927 in Louisville, Kentucky, on Third Street next to the University of Louisville Belknap campus. It receives around 180,000 visits annually.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>PP-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25817</link>
<guid>0c9097d0139751fc728f1614cca51b43</guid>
<pubDate>Tue, 23 Sep 2025 12:53:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>PP-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1fbe8f05c8e620a7c1feb9606a0f93ee268378f23208d38367f8db8bcf804a6</i><br /><br />Threat actor <b>description</b>: <i>P & P Industries, Inc. | 2100 Enterprise Drive Sterling, IL 61081 | Phone: 815-632-3297  Internal documents, Finance, Development, Personal documents</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Edro-Real-Estate</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25814</link>
<guid>f79995153b479a0830ca77943d5ed37f</guid>
<pubDate>Tue, 23 Sep 2025 04:20:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>Edro-Real-Estate</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c71c4cdcdfb277258d08f8d1526d4767cb61a2663b23453beab45a0ad9559a31</i><br /><br />Threat actor <b>description</b>: <i>Real estate agency with extensive experience in construction, finance, and sales. Offers expertise in home construction and the financing process to guide buyers and sellers, available.- Database- Financial documents- Personal information of employees and clients https://edrorealestate.com/</i><br />Target victim <b>website</b>: <i>edrorealestate.com</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Takeuchi-US</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25812</link>
<guid>580606b7af236a5d0aec0dde1a7422fa</guid>
<pubDate>Mon, 22 Sep 2025 21:10:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Takeuchi-US</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>74d6dc1a748f39530c92529722aa0c715303d2f83b84cc3cd9cbbcc5124a9839</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.takeuchi-us.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>DHM-Properties</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25811</link>
<guid>8f64c0a6975ce782d1adaf73ce892d51</guid>
<pubDate>Mon, 22 Sep 2025 21:09:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>DHM-Properties</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a12c3fd735c1ff6e1bc9b1d5b16d879041698446616a915fa15a7121536faa2b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.dawnhomes.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vcinity</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25810</link>
<guid>1ac0c4b7634b3b88cea891e3aebe5860</guid>
<pubDate>Mon, 22 Sep 2025 20:22:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Vcinity</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c53ff735d88e817d9b480f7c8f26e3530487c87b118d506f3a94a81c92f3e8c</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.vcinity.io</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>GrammaTech</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25809</link>
<guid>23fd4faa302cb93d315147b1b7e713f1</guid>
<pubDate>Mon, 22 Sep 2025 20:21:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>GrammaTech</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>caf0eaa6d19358fdb3df6e5be09cca3a48153a1dd425b65b366bfd60acbefa93</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.grammatech.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>APG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25808</link>
<guid>43675d9e95fa6fcff3217c6429c3e4cb</guid>
<pubDate>Mon, 22 Sep 2025 20:21:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>APG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>95e957154d18ed298ba183e65ab29d2fb9f162c33f871b550d55389bfa13584c</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.apgsolutions.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Roth--Scholl</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25807</link>
<guid>0ecb6f61668018486c7ae0c73fef41f2</guid>
<pubDate>Mon, 22 Sep 2025 20:20:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Roth--Scholl</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b50cc10d05cba29ee1e28d4d762efd82915995c8530e3a6054fdef682dd7ae14</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.rothandscholl.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-England-Waterproofing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25806</link>
<guid>9bf9e4342000488a6910bbb1e8ceddf9</guid>
<pubDate>Mon, 22 Sep 2025 20:19:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>New-England-Waterproofing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dcdb10c5d125cd19122c645c0c9fe930b00861e9b4df44ae36f13600d61acae7</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.livedry.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Combined-Services-HVAC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25805</link>
<guid>370abbc7e1cbca7ae9e5d71dd316f28f</guid>
<pubDate>Mon, 22 Sep 2025 20:18:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Combined-Services-HVAC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48ca1eb33351d07f44d50b8f4b09cd732d5b811513db2e5c9be882a0c440851a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.combinedserviceshvac.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>PTR</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25804</link>
<guid>87755e2bb813ed0ad03d9801b4e0320d</guid>
<pubDate>Mon, 22 Sep 2025 20:18:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>PTR</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8d7bf5c4e7663c0f608eb35abc1c25ad66ec3ee13bde932b3947936b13ce29a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ptrco.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hilldun</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25802</link>
<guid>674d8d5f7f53691ee5ccf2d6095602da</guid>
<pubDate>Mon, 22 Sep 2025 19:37:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Hilldun</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5dc741a8ee2c81e5daf79ea06dfdb10f31551597bd7c655b763557067dce75a7</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.hilldun.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Markowitz-Ringel-Trusty--Hartog</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25799</link>
<guid>2f355056f055d7c1eabc82fdf1b71419</guid>
<pubDate>Mon, 22 Sep 2025 17:32:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Markowitz-Ringel-Trusty--Hartog</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47ac4384197040b5cdf1d98e5efbcf5f9d154fe2366a877a0326c488fa9a76fb</i><br /><br />Threat actor <b>description</b>: <i>Markowitz Ringel Trusty & Hartog provide setvices as Restructuring   Insolvency, Litigation   Dispute Resolution, Real Estate   Business, Probate   Guardianship, and Trust   Estates.We are going to upload 25gb corporate data. Huge amount of employees and clients information (full names, DOB, address, emails, phones, SSNs, DLs, death/birth certs and so on), legal files (police reports, hearings protocols and other court confidential files), financials, a bit of credit card information, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>cegconstruction.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25785</link>
<guid>241f7e77a83327ca9f60c68f65960fc9</guid>
<pubDate>Mon, 22 Sep 2025 11:56:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>cegconstruction.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>02e67180a7b10587c10089af7b830a8e86aad1a01427acabf8f8a1608234264c</i><br /><br />Threat actor <b>description</b>: <i>CEG Construction is on a path to self-destruction. This company is an industrial contractor based in Southern California that specializes in the construction of concrete warehouses and food processing facilities. They offer comprehensive desi            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rainwalk-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25798</link>
<guid>779748b3baa7be62d16f8a23844951af</guid>
<pubDate>Mon, 22 Sep 2025 09:26:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Rainwalk-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77d004b14b773cf42c447f1022f7d92954d397afe27a33ea5aacab1fe071a428</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>rainwalkpetinsurance.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>BEHCA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25796</link>
<guid>3f94dc570a5b16dc8e85fe4bdd0b8099</guid>
<pubDate>Mon, 22 Sep 2025 09:24:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>BEHCA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ddc4406332de5189c1086be4210f49d82936369fa29f2bc148ca61ecbc51d8d</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>behca.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>MortDash</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25792</link>
<guid>f8e022748d5214eb5ce98d3f69a0036c</guid>
<pubDate>Mon, 22 Sep 2025 09:21:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>MortDash</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8643c7a77f1b3fabc89914714d64a5551ccce7b694822365fc892c0363be3921</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>mortdash.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>optimumdesign.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25787</link>
<guid>9dfdb3a175a991c93bb89b6585f09036</guid>
<pubDate>Mon, 22 Sep 2025 09:09:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>optimumdesign.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d2bed4ed1c2b26de2ea8f0d899595cb472a0e8a0a9021f1661e4d36d778c10d</i><br /><br />Threat actor <b>description</b>: <i>Optimum Design Associates specializes in PCB design services, leveraging elite experience and proven methodologies to deliver high-quality electronic engineering solutions.</i><br />Target victim <b>website</b>: <i>optimumdesign.com</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>Batesky-Law-Office-BLO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25786</link>
<guid>c61020b12cf805b7c3f39937118fffd3</guid>
<pubDate>Mon, 22 Sep 2025 08:18:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>Batesky-Law-Office-BLO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e02f89d0d59e4fa27a2cfac51e5a4e93dd9dd068557d7ef08c76d0d2431adc24</i><br /><br />Threat actor <b>description</b>: <i>Attorney Richard Batesky has devoted nearly 30 years of his life to helping his clients receive compensation after a car accident, construction site accident, or personal injury due to another person’s negligence. At Batesky Law Office, we devote ourselves to discovering the best way to achieve a favorable outcome for all of our clients. Our knowledge and experience allows us to develop strategies that meet your individual needs. Indianapolis personal injury attorney Richard Batesky provides practical advice and solid counsel on all aspects of your case.Our philosophy is to remain in close contact and help you understand the strengths and weaknesses of your case from all perspectives. Personal injury and bankruptcy cases are not easy to litigate and can take years to achieve a result. There will be setbacks and obstacles along the way and an experienced attorney can build a solid case for you. The Indianapolis injury attorneys at Batesky Law Office will be devoted to your case and helping you receive the most favorable outcome.- Database- Financial documents- Personal information of employees and clients https://bateskylaw.com/</i><br />Target victim <b>website</b>: <i>bateskylaw.com</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Miami-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25784</link>
<guid>48d086c253bb8d866e7d5ba8414a5943</guid>
<pubDate>Mon, 22 Sep 2025 07:27:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Miami-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>71cf686dd495fd8da12afc3c207e8160478ad9d24136ff6ad1abd583a6a8c954</i><br /><br />Threat actor <b>description</b>: <i>Site: miamimanagement.com
														Industry: Business Services
														GEO: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pennsylvania-Office-of-Attorney-General</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25782</link>
<guid>e9ef4cc28cff2bbfaa9cca870ef88b58</guid>
<pubDate>Sun, 21 Sep 2025 00:46:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Pennsylvania-Office-of-Attorney-General</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8ad6498dc52f2efe0aaf5b67d74c3c024ffdbf2855b4a17b2527d1efc6eaaa4</i><br /><br />Threat actor <b>description</b>: <i>Pennsylvania Office of Attorney General is a law enforcement official that protects and serves the agencies of the Commonwealth and citizens of Harrisburg, Pennsylvania. 5.7TB data leak, access to internal network of FBI and more...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>goodcents.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25781</link>
<guid>11f9b53e8e2fafa24156bde7ba8b82d2</guid>
<pubDate>Sat, 20 Sep 2025 22:27:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>goodcents.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff6fe895e5ce0e512e89055fcb4339383accd24da8d945067df8d7085da1ea25</i><br /><br />Threat actor <b>description</b>: <i>Goodcents, USA - Cheap food outlets are part of Custom Foods Inc., a company that produces frozen dough. The company manufactures a wide range of products, including dough for pizza, bread, cookies, and much more. The company supplies its pro            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>usadebusk.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25777</link>
<guid>6465f369dc088bc31009cf92a541b28b</guid>
<pubDate>Sat, 20 Sep 2025 05:46:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>usadebusk.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>70340d4e41bb484647a9518cf2fc12e44df3c0986325a55d3942317f564a1659</i><br /><br />Threat actor <b>description</b>: <i> USA DeBusk provides a comprehensive suite of industrial cleaning and infrastructure maintenance services to a diverse, blue-chip customer base across a broad r... - 2 TB including Contracts, Client Data, Employee Private Data, Incident Reports, and more</i><br />Target victim <b>website</b>: <i>usadebusk.com</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>United-Machine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25775</link>
<guid>861e8bae74e22a572164fdb59b1caa8b</guid>
<pubDate>Fri, 19 Sep 2025 20:22:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>United-Machine</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1fde4d64718a447b84f64a9c45953c76dc0319fe66508a430acd3c7224a8b751</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.unitedmachine.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alan-Shintani-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25774</link>
<guid>5f6fc587ba2a036b38affbb8c0a42008</guid>
<pubDate>Fri, 19 Sep 2025 19:47:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Alan-Shintani-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8988151b6bffd1a66d4dcb71f8ba87c9749877e6ccdfcfc63f140aa2eb973d4</i><br /><br />Threat actor <b>description</b>: <i>Photos and blueprints of government facilities.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jones-Soda-Stock-Symbol-JSDA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25770</link>
<guid>e86ebab434ff5a7172440f41518a7455</guid>
<pubDate>Fri, 19 Sep 2025 17:27:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Jones-Soda-Stock-Symbol-JSDA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7e0c800244dc14546d5bbb68ad2c44ad5aa2399320ff337e40b79b2eb3438705</i><br /><br />Threat actor <b>description</b>: <i>Jones Soda Co.® (CSE: JSDA, OTCQB: JSDA) is a leading craft soda manufacturer with a growing line of cannabis products.We are going to upload 66gb corporate data. Employee information (complete name, DOB, address, emails, phones, SSNs and so on), financials, payment details, credit cards details, numerous contracts and agreements (with PepsiCo and others), NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>About-Ross-Brittain-Schonberg-Co.-Lpa</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25771</link>
<guid>668e5773130d942b59a3ceea6ec85225</guid>
<pubDate>Fri, 19 Sep 2025 17:27:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>About-Ross-Brittain-Schonberg-Co.-Lpa</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>742e416733eb59880c737d3c536f2ac9a6ee828575c91121b0f036704fe353ac</i><br /><br />Threat actor <b>description</b>: <i>Ross, Brittain & Schonberg specializes in Labor Law, Employment Law, Workers’ Compensation, and OSHA matters, representing management across various sectors.We are going to upload 66gb corporate data. Lots of legal files (police reports, hearings protocols and others), clients and employees documents and other personal information (Full names, DOB, address, emails, phones, SSNs, DLs and so on), financials, NDAs, etc. Very interesting data.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>KCI-Telecommunications</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25769</link>
<guid>bbc57478f9bdc47a0126f9e93343346d</guid>
<pubDate>Fri, 19 Sep 2025 14:27:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>KCI-Telecommunications</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d909e077ff66faaeff17d34c1c744f90c78af046a62fb5815c5dfe602f41262d</i><br /><br />Threat actor <b>description</b>: <i>KCI provides support services and turn-key solutions focused on exceeding their client’s Network, Resources Management and legacy support needs.We are going to upload corporate data. A lot of personal information of employees (DOB, address, emails, DL numbers, phones and soon), confidential files, payment details, numerous contracts andagreements, financials, customer information, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>cardiofocus.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25765</link>
<guid>489df1727ce07aae5f09ca2d90ff9f74</guid>
<pubDate>Thu, 18 Sep 2025 20:58:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>cardiofocus.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8d55936a97fc7100a3c983f62c8146826a355f2bf153364080af568797bc75a</i><br /><br />Threat actor <b>description</b>: <i>CardioFocus specializes in offering innovative tools for electrophysiologists to treat atrial fibrillation. Their advanced technologies, including the HeartLight X3 and Centauri System, leverage laser and PFA technology for precise and effective treatment. The company focuses on enhancing procedural efficiency and patient outcomes through shorter procedure times and advanced customization. Their primary clients are electrophysiologists looking to improve care standards in managing complex cardiac arrhythmias. Employees: 87 Revenue: $29.1 Million Industry: Retail  Phone Number:(508) 658-7200</i><br />Target victim <b>website</b>: <i>cardiofocus.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gurneys-Resorts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25755</link>
<guid>a5d16104be85fc85838ce2259c88f2cb</guid>
<pubDate>Thu, 18 Sep 2025 20:27:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Gurneys-Resorts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>120b2d954cb7ff9416d8ed703f54d38d1505513476cda9f500166cb4af1b211a</i><br /><br />Threat actor <b>description</b>: <i>Gurneys Montauk Resort & Seawater Spa is a luxury beach hotel located in Montauk, NY, offering 158 rooms, suites, and beachfront cottages with stunning ocean views. We are going to upload 20GB of corporate data. Employees' personal information (passports, addresses, SSNs, phones, emails, medical information and so on), client information (DOB, full name, phone, emails, room numbers, addresses and so on), finance and accounting files, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hood-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25756</link>
<guid>d1d2f825932ae8df3aa6db09325cf61e</guid>
<pubDate>Thu, 18 Sep 2025 20:27:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Hood-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c77669a4b524efac21c3d3b4c59c3e2cdc0703baf94125c054b0e004813f543</i><br /><br />Threat actor <b>description</b>: <i>Hood Technology Corp is an engineering-oriented company based in Hood River, Oregon, specializing in the development of stabilizedgimbals for both manned and unmanned vehicles.  We are going to upload corporate data. Lots of project files withdrawings and specifications, contracts with sound names like Ferrari, Toshiba, MAN, Siemens, Apex and other companies. Customer information, lots of NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>MMI-Direct</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25759</link>
<guid>ba307c1fd60c35533dcf424e1befabff</guid>
<pubDate>Thu, 18 Sep 2025 20:27:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>MMI-Direct</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>09208c730c94b3d88b91b7867c6a4fa8289588b0e531be0c961426235ff466f8</i><br /><br />Threat actor <b>description</b>: <i>MMI Direct is a leading data processor that specializes in providing services like NCOA, PCOA, analytics, list fulfillment, merge purge, and data append to nonprofits, businesses, and government clients.We are going to upload 116gb corporate data. Employee files (Passports, DLs, birth and death certificates, interviews and other personal documents), medical information, HR data, contracts and agreements, financial information, client information, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wargo-French</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25761</link>
<guid>f838653dadc0732215222a1e0fd8190f</guid>
<pubDate>Thu, 18 Sep 2025 20:27:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Wargo-French</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>78fc03eaea19aa148e1d85db369956834f3f55fba4edc7e9f229e4b98f6b5a7c</i><br /><br />Threat actor <b>description</b>: <i>Wargo French Singer is a full-service law firm with offices in Atlanta, Los Angeles and Miami. We are going to upload 11gb corporate data. Lots of client information (DOB, address, emails, phone and so on), lots of confidential files, contracts and agreements with Coca-cola and other big names, financial information, projects and other files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Legend-Senior-Living</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25752</link>
<guid>be03f76cc8e48304c888adcf6241e45b</guid>
<pubDate>Thu, 18 Sep 2025 19:27:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Legend-Senior-Living</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>76bac9aa2378c66a5b10068bcf105fca1b2d939fed69078dd76e34d51e27efa0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>ACRO-Automation-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25753</link>
<guid>d059f8fe3d5acacbe25424c27759f111</guid>
<pubDate>Thu, 18 Sep 2025 19:27:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>ACRO-Automation-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eb4113ea8ac82f89249d46e0112b880521b9d34ad04b517115abdd02d8e86272</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-Wide</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25754</link>
<guid>2229f5e95ef45e343890f2e839c7f74c</guid>
<pubDate>Thu, 18 Sep 2025 19:27:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>City-Wide</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8bbd507bc18d560019da4d0ba9576cab8dc343832b8ebaed87fd996d63932a89</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dubroff-Easley--Lovell-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25764</link>
<guid>7bd89d300d39ced373d95ee7eb3c4b78</guid>
<pubDate>Thu, 18 Sep 2025 17:51:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Dubroff-Easley--Lovell-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>074b28e0d37e4ef4916d7a272234dd70771ae378a68075aba0cf4441aa190654</i><br /><br />Threat actor <b>description</b>: <i>Attorney service in family law</i><br />Target victim <b>website</b>: <i>dubrofflaw.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tri-Century-Eye-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25763</link>
<guid>e04a9a2d51029f73f5c3b7a085de91ee</guid>
<pubDate>Thu, 18 Sep 2025 17:51:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Tri-Century-Eye-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>665e1fc4c2961ca32de45d47da578a10955d11db4c609f07da464ca9aae84dd2</i><br /><br />Threat actor <b>description</b>: <i>Ophthalmologists and optometrists provide comprehensive and sub-specialty eye care across patients of all ages</i><br />Target victim <b>website</b>: <i>tricenturyeye.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>United-Pharma</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25762</link>
<guid>2c0c63b0449c63fe70737d064f3c43bb</guid>
<pubDate>Thu, 18 Sep 2025 16:51:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>United-Pharma</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a2f09e201967c3bd19c7b05d580303fa390a4995f6231667be3fb18a57006a02</i><br /><br />Threat actor <b>description</b>: <i>United Pharma LLC is a softgel contract manufacturer based in Southern California, specializing in high-quality nutraceuticals and supplements. Founded in 2006, the company boasts a state-of-the-art 55,000 square foot facility and adheres to strict quality standards in its production processes. Their services include gelatin mixing, encapsulation, bottling, and custom labeling, catering to clients seeking innovative softgel solutions. With a highly experienced management team, United Pharma aims to be a progressive partner for both its customers and the community.</i><br />Target victim <b>website</b>: <i>www.unitedpharma.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.independentpaperboard.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25749</link>
<guid>9248a959405836566e6ba694aaa884a6</guid>
<pubDate>Thu, 18 Sep 2025 14:27:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>www.independentpaperboard.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>11295aaba623ad038cd8dfe2c323c1465298487bd7f752d5859935602f550218</i><br /><br />Threat actor <b>description</b>: <i>Independent Paperboard Marketing, LLC is a problem-solving paperboard brokerage ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>cardinal-services.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25742</link>
<guid>cf1f249ab7ce26315cf395fd2f794620</guid>
<pubDate>Thu, 18 Sep 2025 00:50:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>cardinal-services.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>16af2b1e1c64397428ad7662c26d1ba4d64a7f608e1ff3f1052a36a18ff3a947</i><br /><br />Threat actor <b>description</b>: <i>Cardinal Services is a full-service staffing company founded in 1984 and headquartered in Coos Bay, Oregon. Employees: 50 Revenue: $48.7 Million Industry: Business Services Phone Number:(541) 888-9799</i><br />Target victim <b>website</b>: <i>cardinal-services.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Thomas-Safran--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25740</link>
<guid>6158cdc6f0b5626d7f9b407adf4bb89b</guid>
<pubDate>Wed, 17 Sep 2025 22:18:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Thomas-Safran--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8bda54289e318ffca0b565fcb2b4ed2c99a36946e73307af87b3c1fd7070e25d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.tsahousing.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>lindenlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25733</link>
<guid>fc08e88c689b903532df9465c4e21cab</guid>
<pubDate>Wed, 17 Sep 2025 21:52:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>lindenlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f19ac0f9503bf4e6eb7975e399a51cb8586e5741da5190e56284f8066219427</i><br /><br />Threat actor <b>description</b>: <i>Howard T. Linden, P.C. is a Michigan-based law firm specializing exclusively in probate law, offering services such as wills, trusts, guardianships, and wrongful death settlements. With nearly 50 years of experience, the firm is known for its efficient and cost-effective probate services for attorneys, insurance companies, creditors, and families. The firm caters to both local and out-of-state clients needing assistance with probate matters in Michigan. Attorney Howard Linden's extensive knowledge and compassionate approach ensure that clients receive thorough and timely support throughout the probate process. Employees: 25 Revenue: $5 Million Industry: Law Firms Phone Number:(248) 358-4545</i><br />Target victim <b>website</b>: <i>lindenlaw.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>spartanburgcounty</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25725</link>
<guid>30075533571c1a82bb8f1b810203cd57</guid>
<pubDate>Wed, 17 Sep 2025 20:29:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>spartanburgcounty</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5d88c697dd41ccb71afdfeca3ce0cd6355327ad518385ebd17d9495845fad981</i><br /><br />Threat actor <b>description</b>: <i>SPARTANBURG, USA - Failure before the election. 08/08/25 FOX Carolina issued an urgent announcement: “Spartanburg County officials have stated that a ‘cybersecurity incident’ has occurred on their network.” As always, local authoritie            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>alliancesteelco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25738</link>
<guid>3506709108e107543aa9fcf845daf0a6</guid>
<pubDate>Wed, 17 Sep 2025 20:13:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>alliancesteelco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4aea8560415bee4ade52757fd9ea637a4bbe2a1220e289898c195b71c13d4982</i><br /><br />Threat actor <b>description</b>: <i>“Alliance Steel” is a generic trade name used by multiple flat-rolled steel service centers in North America; relevant examples include …</i><br />Target victim <b>website</b>: <i>alliancesteelco.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>slusarski.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25737</link>
<guid>8ac65b1061ec1e8b4ebdebc5b98e5c9d</guid>
<pubDate>Wed, 17 Sep 2025 20:12:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>slusarski.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a4a2366cce932fee7b731629e216e4b9ca02b0b3c403e9b03452b3a25955fe4</i><br /><br />Threat actor <b>description</b>: <i>Slusarski is a Michigan-based sitework, earthmoving and paving contractor founded in 1982 that provides excavation, asphalt paving, sealcoating, striping, materials …</i><br />Target victim <b>website</b>: <i>slusarski.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>drcloudemr.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25736</link>
<guid>1dc6d927cb8ec9838ad96a48af31ea4c</guid>
<pubDate>Wed, 17 Sep 2025 20:12:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>drcloudemr.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de3dfe26e54454429ec4d8459810d454c38c8635fe00337547e1a9cf5d0d765f</i><br /><br />Threat actor <b>description</b>: <i>DrCloudEHR (often referenced as DrCloud/DrCloudEMR) provides cloud-hosted electronic health record (EHR) / practice management software targeted at ambulatory clinics and …</i><br />Target victim <b>website</b>: <i>drcloudemr.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>venetianassociates.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25735</link>
<guid>cfe1bae9441470f7d25f0ea2c29fce2d</guid>
<pubDate>Wed, 17 Sep 2025 20:11:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>venetianassociates.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a5f66da5fe5c33bf7c1f6a5c72cb2ce492553892b24bfea8ed76aac33fa13084</i><br /><br />Threat actor <b>description</b>: <i>Venetian Associates is a private family-office style investment vehicle and lower-middle-market acquirer based in Michigan that focuses on buying consumer …</i><br />Target victim <b>website</b>: <i>venetianassociates.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>biosorthopedics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25731</link>
<guid>5fc4d0155cf2d4d93bdbdf4b8dc54da8</guid>
<pubDate>Wed, 17 Sep 2025 18:42:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>biosorthopedics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>84072aa6972113ef20eeb978ca60acc9e23559a17d6170772a3b1661657148a3</i><br /><br />Threat actor <b>description</b>: <i>Broward Institute of Orthopaedic Specialties (BIOS) is a multi-physician orthopaedic practice headquartered in Hollywood and Pembroke Pines, Florida. The practice …</i><br />Target victim <b>website</b>: <i>biosorthopedics.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Prime-Asset-Fund</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25723</link>
<guid>c8c83f959021e1042efa4c5146754409</guid>
<pubDate>Wed, 17 Sep 2025 18:27:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Prime-Asset-Fund</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4883c965dd52c569c469f25d264f8b0c9fb802942776de64565f29aa1f1874ed</i><br /><br />Threat actor <b>description</b>: <i>Prime Asset Fund, USA is a highly questionable player in the US financial market. It is a company that operates in the investment banking industry. It employs 20 to 49 people and has revenues of $10 million to $25 million. Prime Asset also in            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.vdyne.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25722</link>
<guid>f25319e832341516c2a618ef2a314932</guid>
<pubDate>Wed, 17 Sep 2025 14:58:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.vdyne.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>935019b70d406359e980c9ac70166a43b9033963ccf66ff13208024ded6291d4</i><br /><br />Threat actor <b>description</b>: <i>VDyne, USA is a clinical-stage medical device company dedicated to developing transcatheter valve solutions for the treatment of debilitating and life-threatening Tricuspid Regurgitation (TR). They are developing medical micro-prostheses that            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>bmsi.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25706</link>
<guid>df90e07fdc98b84c3c41b4fbab8de98c</guid>
<pubDate>Tue, 16 Sep 2025 17:17:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>bmsi.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42b1fed99e4607edb09bc205a4b7c76b6b69356aa28bb483cb311488ba79d9aa</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>bmsi.org</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>Medpeds</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25703</link>
<guid>3bc188adb791a56ccce03630b0d9f593</guid>
<pubDate>Tue, 16 Sep 2025 11:11:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Medpeds</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2519be21265990595b9476eb9459482ed6180313af876d169a4b433eeaaf2058</i><br /><br />Threat actor <b>description</b>: <i>MedPeds Associates, located in Sarasota, Florida, specializes in Internal Medicine and Pediatrics with a strong emphasis on preventive care for adults, seniors, and children. The practice is recognized as a Level 3 Patient Centered Medical Home by the National Committee for Quality Assurance, showcasing its commitment to high-quality healthcare practices. They offer a full spectrum of medical services including same day lab services, chronic care management, and telehealth options. Their goal is to promote good health through proper nutrition, regular professional care, and the establishment of good habits.</i><br />Target victim <b>website</b>: <i>www.medpedsdocs.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>webville.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25695</link>
<guid>d61fc047656a08fd0cddc1a37e4dd729</guid>
<pubDate>Tue, 16 Sep 2025 05:28:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>warlock</b> claims attack for <b>webville.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25c8832aebdd7e5ea544de0077eb43cb3c00a9a942ec31487dbd6e10b3be2bf1</i><br /><br />Threat actor <b>description</b>: <i>all data</i><br />Target victim <b>website</b>: <i>webville.net</i>]]></description>
<category>warlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>elssurveying.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25694</link>
<guid>31073475fc4fe0f27c6b876472f0888e</guid>
<pubDate>Tue, 16 Sep 2025 05:27:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>warlock</b> claims attack for <b>elssurveying.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>279848cfefb3488d548d62556b37b6603f3f24218f373ed59fb5ab9bb4e788fb</i><br /><br />Threat actor <b>description</b>: <i>all data</i><br />Target victim <b>website</b>: <i>elssurveying.com</i>]]></description>
<category>warlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>News-Press--Gazette-Co.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25690</link>
<guid>507779fbc52283f223fb8cc6bb9e6d2e</guid>
<pubDate>Tue, 16 Sep 2025 00:47:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>termite</b> claims attack for <b>News-Press--Gazette-Co.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1e5e0e4b536bca17646023cc178ccfab966aaef9647a0f92a0e416fef61d0a4</i><br /><br />Threat actor <b>description</b>: <i>News-Press &amp; Gazette Company publishes daily newspapers and weekly publications. 
</i><br />Target victim <b>website</b>: <i>www.npgco.com</i>]]></description>
<category>termite</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.peuh.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25687</link>
<guid>0ab3906a724cfe5ba8b36e7c25d33491</guid>
<pubDate>Mon, 15 Sep 2025 21:51:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>www.peuh.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1b129055c58e6bd3656d2260a4a63c5b77ece267277935f1514ef8bd6729bfe</i><br /><br />Threat actor <b>description</b>: <i>1700000 USD</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>VirMedice</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25668</link>
<guid>627f1c009880d8f375bf48ba6b8f4564</guid>
<pubDate>Mon, 15 Sep 2025 20:52:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>VirMedice</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d73c0851f9aa5405fb6f207cf018ccd00eb3d4f735601b17e380a4d52615c829</i><br /><br />Threat actor <b>description</b>: <i>VirMedice offers the NextGen Ambulatory EHR (Electronic Health Records) and NextGen Ambulatory PM software (Practice Management) in two Models</i><br />Target victim <b>website</b>: <i>virmedice.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>AdScale</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25684</link>
<guid>c80e2e3dfd073a58a7868ba33aed57a9</guid>
<pubDate>Mon, 15 Sep 2025 20:48:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>AdScale</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3643bb4ec1642b55383a6bab5e10bbc7670042b5f9963444dbd5d913c8fbc1f4</i><br /><br />Threat actor <b>description</b>: <i>AdScale is an AI-driven advertising platform tailored for e‑commerce and digital marketers, offering unified campaign management across Google Se...</i><br />Target victim <b>website</b>: <i>www.adscale.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dreyfuss-Williams--Associates-Co--LPA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25665</link>
<guid>25d116dc9e29065600cd84782e385de2</guid>
<pubDate>Mon, 15 Sep 2025 20:48:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Dreyfuss-Williams--Associates-Co--LPA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52fcd94498b33fef697ead76fee4dc16c48e59b4fe067a88c4de6351b9bbbc10</i><br /><br />Threat actor <b>description</b>: <i>Dreyfuss Williams Attorneys & Counselors at Law is a law firm specializing in Health Care Law, offering legal representation to hospitals and medic...</i><br />Target victim <b>website</b>: <i>www.dreyfuss.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Plug-Power</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25681</link>
<guid>cf1f4d5318c6b0a76eb889ba14443cbe</guid>
<pubDate>Mon, 15 Sep 2025 20:46:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Plug-Power</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa1480db2eb0c9e379264c1a8be4241621f3be155a1d481e2d5a91cfc29433ee</i><br /><br />Threat actor <b>description</b>: <i>Plug Power is a premier provider of innovative hydrogen fuel cell solutions, specializing in clean energy technologies that enable the transition t...</i><br />Target victim <b>website</b>: <i>www.plugpower.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Volt</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25664</link>
<guid>9a1e6dff7dbc2da64a3577c8b9a24854</guid>
<pubDate>Mon, 15 Sep 2025 20:45:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Volt</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc874944c1d0b78b8fa4e7cd12bbc3fcaee57531728dd86d8bda7646061e44ac</i><br /><br />Threat actor <b>description</b>: <i>Volt is a global talent solutions provider, specializing in workforce management, recruitment, and staffing across industries such as technology, e...</i><br />Target victim <b>website</b>: <i>www.volt.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wakefield--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25666</link>
<guid>b7e898084c1ec0616b4b2f0cf14a758b</guid>
<pubDate>Mon, 15 Sep 2025 20:45:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Wakefield--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f6dd28f7e81fb6a8aca1618c68bd0b1ae4b7126c30172e99f09eeb243550e35</i><br /><br />Threat actor <b>description</b>: <i>Wakefield & Associates is a financial services company specializing in debt collection and billing services. Wakefield & Associates helps clients i...</i><br />Target victim <b>website</b>: <i>www.wakeassoc.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lake-Book-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25667</link>
<guid>79525d41efbf16d3363c138f713d2417</guid>
<pubDate>Mon, 15 Sep 2025 19:47:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Lake-Book-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>16a28ec3d0d800c24ffd828c2aaca5bde5912b51fb33d9739cd0cd387ecd37bd</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.lakebook.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eau-Palm-Beach-Resort--Spa</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25678</link>
<guid>c6b2aa071387a2e68359d61f88ea16f6</guid>
<pubDate>Mon, 15 Sep 2025 19:47:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Eau-Palm-Beach-Resort--Spa</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbef7bfbb7ca45003ecb0df5924efc0ea4f2798b243b183ce71601efe79feeb0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.eaupalmbeach.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Energenecs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25677</link>
<guid>8c2a6cec60863b5ffd776ad9ff57495a</guid>
<pubDate>Mon, 15 Sep 2025 19:46:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Energenecs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc2b3c6614b9fd61c562cea440196c2bc357d2034b006d45f8e9cf40e9dd5353</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.energenecs.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Garrison-Architects</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25676</link>
<guid>461254593ec0cc1839a590251176c99c</guid>
<pubDate>Mon, 15 Sep 2025 19:46:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Garrison-Architects</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>453e05497f27c953db38247f9a50b18acffdc4ecb8d7c385eaa482cd5e72c55f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.garrisonarch.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>McCarter-Electrical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25675</link>
<guid>eda9c67d6a20358927319cf3510402df</guid>
<pubDate>Mon, 15 Sep 2025 19:45:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>McCarter-Electrical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9eb95619ba76958e207e59cbad8f4f4287f1ec63d99c348875e8a665f8267c1a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.mccarterelectric.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pathfinder</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25674</link>
<guid>62f6e7ceadd1f1eb64fe5d6936e7122b</guid>
<pubDate>Mon, 15 Sep 2025 19:44:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Pathfinder</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>240b79f7cada9235db667cc2c52c2ab4e9ff198e47a92534c06d1fc805122eea</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.pathfinderlld.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>General-Control-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25673</link>
<guid>03f68714dba796f8d6b268029d0e62c4</guid>
<pubDate>Mon, 15 Sep 2025 19:44:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>General-Control-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22d4ef9d23bcb915662a4f0d8d848c0df09fa8d7fe0d1963823816849fe29b0c</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.generalcontrolsystems.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>RFI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25672</link>
<guid>0555bb36e8cfb7af4aaad5472cab1c49</guid>
<pubDate>Mon, 15 Sep 2025 19:43:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>RFI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d15bac78506b422a15ac074743b90cdd534eb2edaaa68cb50a92b214a7498a38</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.rfiingredients.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crestone-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25671</link>
<guid>1bc3368ddb162d1f2846b60b810ce6c0</guid>
<pubDate>Mon, 15 Sep 2025 19:42:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Crestone-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f3dbdb53f27d973e06c345a2fd06ff33dc4a7562156c67fd45cdc7e99b681715</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.crestone-group.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>TerranearPMC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25670</link>
<guid>fffcc1a3964b4ad665fa2f07d7bfd086</guid>
<pubDate>Mon, 15 Sep 2025 19:42:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>TerranearPMC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>061335c1eefde2c54767c7b0b59f3b9476cea637245c9ca41efea04415751be3</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.rochesteroptical.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rochester-Optical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25669</link>
<guid>eaaec0f511fd0cbc445208525b36de96</guid>
<pubDate>Mon, 15 Sep 2025 19:41:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Rochester-Optical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3dc97eb889cef8c3e93d143d091fb1789d06c900d4b7ca843598fac9cc427f1</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.rochesteroptical.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>CyberData</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25656</link>
<guid>d3e0182476466a3c2fcc74778b89ea6b</guid>
<pubDate>Mon, 15 Sep 2025 17:27:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>CyberData</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a461c1eba7a6d1d65126de23bdf86221f2e4edf227ddefd6de4703c9209a6a05</i><br /><br />Threat actor <b>description</b>: <i>CyberData Corporation is a leading OEM design and manufacturing firm with more than 40 years of experience. They specialize in IP Endpoints for the VoIP marketplace, VoIP and POS (Point-of-Sale) connectivity solutions, and POS protocol conversion technologies.We are going to upload 9GB of corporate data. Employees' personalinformation, client data, partners data, a bit of finance and accounting files, lots of project files, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Technology-Assurance-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25661</link>
<guid>54526e432dbfc94816c704c3e81710df</guid>
<pubDate>Mon, 15 Sep 2025 14:23:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Technology-Assurance-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c1461e299b9c94f8321210e75907134f91662c46b5c0e2d11750a1a52bd8ad8</i><br /><br />Threat actor <b>description</b>: <i>Technology Assurance Group is an organization of leading managed technology services providers (MTSPs) in the United States and Canada. TAG Members integrate all technology solutions including IT, cloud-based technologies, cybersecurity, telecommunications, AV, video surveillance, access control and managed print</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>jsgroup</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25662</link>
<guid>5de2a609f24dd206f3a9cfe3378fb4e0</guid>
<pubDate>Mon, 15 Sep 2025 14:22:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>jsgroup</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a18e8ec360c7a21cde9b305e6d18055b7c0ffaedb05ef8f12731bd101dcd7529</i><br /><br />Threat actor <b>description</b>: <i>JS Group International is a house of brands that encourages individual expression, authenticity, innovation and social responsibility. ‍ JS Group entered the North American fashion scene more than 50 years ago, having first made its mark in the evening wear market in 1971. Today, we have expanded into eight divisions, and are widely recognized as one of the leading suppliers of women's sportswear, dresses and evening wear, available in specialty stores, major chain stores and department stores worldwide, as well as on our brand websites.  Each of our brands, AMUR, Theia, JS Collections, Et Ochs, has a unique attitude that not only reflects the trends, but aims to instill confidence in all women, regardless of age or size. In addition, we hold licenses for BCBGMAXAZRIA, Halston and Kay Unger.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trucchis-Supermarkets-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25659</link>
<guid>013e7eede60069b472064b3e9a46455f</guid>
<pubDate>Mon, 15 Sep 2025 12:41:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>radar</b> claims attack for <b>Trucchis-Supermarkets-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>78a6ebbc5e49dceb86264e29da0f8701a1d6d3eeac55541a62dbc047d005ee41</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Trucchi's Supermarkets, Inc. is a chain of family-owned supermarkets based in Taunton, Massachusetts, USA. It was established by William M. Trucchi Sr. in 1928. Currently, the company operates six full-service supermarkets in Massachusetts. Trucchi's places emphasis on providing value to customers by offering fresh quality products and personal customer service. They also offer custom cake designs through their bakery department.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>radar</category>
</item>
<item xmlns:dc='ns:1'>
<title>volinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25651</link>
<guid>2abb73368bdec87c1ebcd83baae08823</guid>
<pubDate>Mon, 15 Sep 2025 10:27:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>volinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>01a30b8cc8b770af06aa12ef4040c8cd94652edd4da4f0c95efe39234a8a8f2a</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1992 and headquartered in Conyers, Georgia, Volume Transportation, Inc. provides ground transportation, cargo loading, warehousing, storage, and material flow management services.
1.The document is a confidential mediation stateme            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>trchealthcare.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25652</link>
<guid>eb69ec3b34db9fc42da12bd9c3a8ad37</guid>
<pubDate>Mon, 15 Sep 2025 10:27:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>trchealthcare.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed4d115709bd38d8a3b6dcaaf16de25f30daf4996c394a34ca68a22cc5fdf2d8</i><br /><br />Threat actor <b>description</b>: <i>The Therapeutic Research Center was founded in 1985 and is headquartered in Stockton, California. The Therapeutic Research Center specializes in studying and evaluating new drugs that are approved for use each year.
1.The document is a clini            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Baum-Precision-Machining</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25647</link>
<guid>92e2febe8d6183b8026d49448c382d0e</guid>
<pubDate>Mon, 15 Sep 2025 02:50:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Baum-Precision-Machining</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3360f2644d38894759c7f6a3862dc12b0fb5fca707f8d5ade4bac8ee51be8bfd</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.baumprecision.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpwww.hiec.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25649</link>
<guid>c80bc2fbadab1c16dd058069491b4604</guid>
<pubDate>Mon, 15 Sep 2025 02:23:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>httpwww.hiec.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8466a8a2b1001adf4a6d8bf33c89922f7f4c699967ae293760ed977810f804e7</i><br /><br />Threat actor <b>description</b>: <i>H.I. Executive Consulting is a global executive search firm specializing in the recruitment of Board, CEO, and senior-level executives. The firm focuses on acquiring digital talent and transformational leaders to meet the needs of modern organizations. With a strong presence across the US, EMEA, and APAC, H.I.E.C operates through a united team in 14 international offices, providing tailored, expert advice for every assignment. Committed to promoting diversity, H.I.E.C helps clients attract a wide range of talent to foster innovative organizational cultures</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpsheritagegrowth.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25650</link>
<guid>9e1f10e4ad1f09457c81d8dbd9dd254f</guid>
<pubDate>Mon, 15 Sep 2025 02:22:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>httpsheritagegrowth.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b10a68c0f919f43ba12c791d301e89364205f917c391a7f0e0613d2f8b05b01</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2014, Heritage Growth Partners is a private, family investment office specializing in growth equity investments in collaboration with owner-managers. The firm emphasizes a patient and flexible capital approach, offering strategic, financial, and operational support to enhance long-term business growth. Heritage Growth Partners seeks to build true partnerships with management teams, understanding their goals and celebrating their entrepreneurial spirit. Their clients primarily include owner-managers looking for investment and collaborative resources to accelerate growth and increase value</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>usenergy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25642</link>
<guid>89a183c0c11d6d0ca7830f9d530a3097</guid>
<pubDate>Sun, 14 Sep 2025 22:41:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusalocker</b> claims attack for <b>usenergy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81fb480ac54fe42fce7138377eca3a26c093a0821295c0d498317e726b42dcda</i><br /><br />Threat actor <b>description</b>: <i>Price-$120000 (sale in one hand there are options for making a profit from these files will be included in the deal)</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusalocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eagle-Excavation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25617</link>
<guid>694a6dc002be509353ef2c5dd874dfab</guid>
<pubDate>Sun, 14 Sep 2025 21:26:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Eagle-Excavation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a0a0510ef17c392a7d258b83a671e5feaa5b19e403566bd072112a46e9f9efe1</i><br /><br />Threat actor <b>description</b>: <i>Eagle Excavation, USA - They pride themselves on their digging skills, but they couldn't bury their dirty secrets deep enough. Eagle Excavation Atlantic performs site preparation work for projects throughout Georgia. They boast of multimillio            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>opso.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25608</link>
<guid>75e913d400755a0d2782fc65e2035e97</guid>
<pubDate>Sun, 14 Sep 2025 17:28:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>opso.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>645da31fccaf9a59b9a2dfb0f43360db04a36e780ebfa4ad6dab4fe277d800ae</i><br /><br />Threat actor <b>description</b>: <i>The Orleans Parish Sheriff's Office and Sheriff Marlin N. Guzman are responsible for the custody, care, and control of inmates in one of the largest urban correctional facilities in the United States.
1.The document is a summary report on in            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Conception-Reproductive-Associates-Colorado</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25616</link>
<guid>c764288af5c0147a988705c2e7826e28</guid>
<pubDate>Sun, 14 Sep 2025 13:48:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Conception-Reproductive-Associates-Colorado</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45ebc3a0a5cc8cf56d46994f76529f43cbda55df54437f5ec0746308d164e7b1</i><br /><br />Threat actor <b>description</b>: <i>For over 20 years, Conceptions Reproductive Associates of Colorado has been a pillar of success and hope for patients across Colorado and around the world with clinical outcomes that meet or exceed US benchmarks.   We have a huge amount of data from this company in our hands. Medical records, patient images, customer personal data, medical records, email correspondence, photos, and more. In the event that we do not come to an agreement, all data will be published.</i><br />Target victim <b>website</b>: <i>conceptionsrepro.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Black-Butte-Coal</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25613</link>
<guid>da38769133a761c1db1bf48db6e4a135</guid>
<pubDate>Sun, 14 Sep 2025 13:47:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Black-Butte-Coal</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b138259b967abbd948485fee2b0d89c03ae4dc42d814f90fb74934745cf3f08</i><br /><br />Threat actor <b>description</b>: <i>Black Butte Coal Co is a company that operates in the Mining & Metals industry. It employs 101-250 people and has $25M-$50M of revenue. The company is headquartered in Point Of Rocks, Wyoming.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vicon</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25615</link>
<guid>9a469156f5e380345f69dba2862d44e0</guid>
<pubDate>Sun, 14 Sep 2025 13:47:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Vicon</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d50ca4fae50db3b4244ce64028d1c6c8705d8d471e5e036ecdab3a019460c528</i><br /><br />Threat actor <b>description</b>: <i>Vicon Industries, Inc. designs, assembles, and markets video management systems and system components for use in security, surveillance, safety, and communication applications worldwide. The companys product line comprises various video system elements, including cameras for image capture and stand-alone network video management system software, as well as various video recording, storage, management, and output devices and peripherals; analog, digital, and high definition megapixel cameras for fixed and robotic positioning applications; and other video system components, such as video encoders decoders and monitors, camera lenses, housings and mounts, matrix video switchers and controls, and various video transmission devices. Its products are used by commercial and industrial users comprising office buildings, manufacturing plants, warehouses, apartment complexes, shopping malls, and retail stores; federal, state, and local governments for national security purposes, agency facilities, prisons, and military installations; and financial institutions that include banks, clearing houses, brokerage firms, and depositories for security purposes. The companys products are also used by transportation departments for highway traffic control, and bridge and tunnel monitoring, as well as airport, subway, bus, and seaport security and surveillance; gaming casinos; health care facilities, which comprise hospitals; and institutions of education, such as schools and universities, as well as hotels and sports arenas. It sells its products primarily to independent dealers, system integrators, and security products distributors.</i><br />Target victim <b>website</b>: <i>vicon.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ramar--Paradiso</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25621</link>
<guid>f3bda8482463fdd4796e4f3880688643</guid>
<pubDate>Sun, 14 Sep 2025 13:27:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Ramar--Paradiso</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f5bbaa635bbf42b0e1244731be1772e4d0f3738d314881584766ce11b89ca5e</i><br /><br />Threat actor <b>description</b>: <i>The law firm of Ramar & Paradiso, are experts of medical malpractice defense, health care law, corporate law, contract dispute, and appeals</i><br />Target victim <b>website</b>: <i>ramarparadiso.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>West-Chester</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25622</link>
<guid>2b4bf71bc3df8c999ad2286bfe5a385f</guid>
<pubDate>Sun, 14 Sep 2025 13:26:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>West-Chester</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>823499b9eb4f2ac1e8e974eda6828e0cbac6c9f40cd7a60ede9a0edac997696c</i><br /><br />Threat actor <b>description</b>: <i>West Chester Township is the most populous township in Ohio, with a population of 65,242 according to the 2020 census</i><br />Target victim <b>website</b>: <i>westchesteroh.org</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Homsey-Law-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25620</link>
<guid>80088112c1b2f1ef9063e0f8ed2f9fe0</guid>
<pubDate>Sun, 14 Sep 2025 13:24:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Homsey-Law-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8520de89ff5e94c33536cd7cca795a02d9ec48914bf2ffe77f00eec05144825</i><br /><br />Threat actor <b>description</b>: <i>Homsey Law Center are experts in personal injury law dedicated to serving Oklahoma City for the last 47 years</i><br />Target victim <b>website</b>: <i>homseylawcenter.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cheyney-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25623</link>
<guid>eac626340b6ff134e38fc5b7b1f14974</guid>
<pubDate>Sun, 14 Sep 2025 13:23:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Cheyney-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>817c50351037609b04af0b6107e9194af1a4b53f4f98fb2daddf48ffe5c9822d</i><br /><br />Threat actor <b>description</b>: <i>Cheyney University of Pennsylvania the nation’s first Historically Black College and University (HBCU)</i><br />Target victim <b>website</b>: <i>cheyney.edu</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rescue-Mission-Alliance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25626</link>
<guid>5e1fe0a89f56e5e59e057b49aae118bb</guid>
<pubDate>Sun, 14 Sep 2025 13:22:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Rescue-Mission-Alliance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce0862e613b6eb66c3bdc9867d71d2e29fe43ff03cc595db99a03c694ea2818c</i><br /><br />Threat actor <b>description</b>: <i>Pioneering Christian organization that helps people realize their potential to live beyond their limitations</i><br />Target victim <b>website</b>: <i>erescuemission.org</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cullen-Haskins-Nicholson--Menchetti</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25627</link>
<guid>8845ac2b3647d7e9dbad5e7dd7474281</guid>
<pubDate>Sun, 14 Sep 2025 13:21:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Cullen-Haskins-Nicholson--Menchetti</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f39ca6debff4ea014c22bcf6af9c43371c583bf8f3d79a213f455aa1d249004c</i><br /><br />Threat actor <b>description</b>: <i>The firm represente injured workers in Illinois state compensation cases</i><br />Target victim <b>website</b>: <i>chnm-law.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Beaumont-Bone--Joint-Institute</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25625</link>
<guid>0a8e9d1cf3ee0af0e6526059e1ac59d1</guid>
<pubDate>Sun, 14 Sep 2025 13:20:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Beaumont-Bone--Joint-Institute</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4469b941a2992f73937e8c245d332a32c25f10b14622a7bb7d5d3e6dfe70d2fd</i><br /><br />Threat actor <b>description</b>: <i>A trusted leader in orthopedic care with over 300 years of combined experience</i><br />Target victim <b>website</b>: <i>beaumontbone.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>US-Graphite</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25624</link>
<guid>69fc366f1a0ccb6967c128510f26854e</guid>
<pubDate>Sun, 14 Sep 2025 13:19:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>US-Graphite</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30658cc6168507ae1d453bd6567344f23b81eda2efb7f4cc5493a67c99835034</i><br /><br />Threat actor <b>description</b>: <i>Specialists in carbon and graphite engineering solutions</i><br />Target victim <b>website</b>: <i>us-graphite.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Expert-MRI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25628</link>
<guid>4421113f38b3ce3467c194394e8ca46c</guid>
<pubDate>Sun, 14 Sep 2025 13:18:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Expert-MRI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b830f49c20f9d7a645bdb4661088b6f31d9d7b087a97bcce82a5e563caeebc66</i><br /><br />Threat actor <b>description</b>: <i>Pioneers in Cutting-Edge Imaging for Brain, Neck, Spine Injuries, and Orthopedic Excellence</i><br />Target victim <b>website</b>: <i>expertmri.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Next-Level-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25630</link>
<guid>01b0d1b5a3812eded622df653d3cd482</guid>
<pubDate>Sun, 14 Sep 2025 13:17:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Next-Level-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ef446c2a1eeb02fe1a673987dbee05a00b7f9a8451d9ec554345b981fe4998b</i><br /><br />Threat actor <b>description</b>: <i>Partners with companies to provide accounting, human resources and technology deployment services</i><br />Target victim <b>website</b>: <i>nextlevelsol.net</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Reynolds--Reynolds</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25629</link>
<guid>59f09348ac59397302394ffcd5d9eb9a</guid>
<pubDate>Sun, 14 Sep 2025 13:16:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Reynolds--Reynolds</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc8975bbe5ab9e6acf4a325a4261d5e05e679bf0c7bb37ac42a4f4b3f4a96039</i><br /><br />Threat actor <b>description</b>: <i>Leading provider of automotive retailing solutions that help manage and improve dealership</i><br />Target victim <b>website</b>: <i>reyrey.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cleveland-City-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25602</link>
<guid>2cd39cf1b560c1eef41a7cebffc64b75</guid>
<pubDate>Sun, 14 Sep 2025 12:19:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Cleveland-City-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca32d286a81ca78b26d7a49eee14331b538782bcaf11cb47d97d094958e07ff7</i><br /><br />Threat actor <b>description</b>: <i>Cleveland City Schools offers educational and employment opportunities without regard to race, color, creed, national origin, religion, sex, age, or disability and adheres to the provisions of the Family Education Rights and Privacy Act (FERPA).</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>halbarstainless.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25596</link>
<guid>8cfedff86a61fa80c0836728161963ff</guid>
<pubDate>Fri, 12 Sep 2025 19:07:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>halbarstainless.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1017ebd5f0c89ad479effefadf8a0c608ef949f880373690e1e80cd9a745e71c</i><br /><br />Threat actor <b>description</b>: <i>Halbar Stainless Products Ltd., founded in 1974 by Cliff Baird, is a family-owned custom metal fabrication company specializing in stainless …</i><br />Target victim <b>website</b>: <i>halbarstainless.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>TimHaahs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25592</link>
<guid>0ef63386fdcb3dc2c2914b319668ff81</guid>
<pubDate>Fri, 12 Sep 2025 18:28:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>TimHaahs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f34c3f0bb0679a8f2ab6792b7c91664bd086a42803640a2e4e48aa3bb30b894a</i><br /><br />Threat actor <b>description</b>: <i>THA Consulting is a DBE and W/MBE certified company that specializes in planning, design, and consultation services.We are going to upload 66GB of corporate data. Employees' personal documents (Passports, medical certificates, credit cards details), confidentiality agreements, payment details, finance and accounting files, clients information, projects, NDA etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>cityofmiddletown.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25594</link>
<guid>ad00ad125782c8dfc70a6c8e18b82792</guid>
<pubDate>Fri, 12 Sep 2025 17:36:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>cityofmiddletown.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>90af66282db8bea5bb723e89d68201a02c08bc5155bb79408766748eb0cda810</i><br /><br />Threat actor <b>description</b>: <i>The City of Middletown, located in Ohio, United States, operates as a municipal government dedicated to providing essential services and …</i><br />Target victim <b>website</b>: <i>cityofmiddletown.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>osdcourtks.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25593</link>
<guid>0006dd05ea1e999ddaa041a7091b7b36</guid>
<pubDate>Fri, 12 Sep 2025 17:35:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>osdcourtks.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04f88b2df5bd87c866381473a8e982eb9dd121d984fc045f5e72dfdd2cb1560d</i><br /><br />Threat actor <b>description</b>: <i>The domain osdcourtks.org appears to belong to the Osage County District Court in Kansas. As part of Kansas’s Fourth Judicial …</i><br />Target victim <b>website</b>: <i>osdcourtks.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>denali-industrial.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25591</link>
<guid>ab4981fb59db07f87db4b1a7a2e9efcf</guid>
<pubDate>Fri, 12 Sep 2025 16:26:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>denali-industrial.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38cd30bca044da8477d075f6536527510782ae2d0da33a541f74d6bf79761796</i><br /><br />Threat actor <b>description</b>: <i>Denali Industrial Supply - a knockout blow to its reputation. For 35 years, Denali Industrial Supply has been a supplier of high-quality industrial tools, fasteners, and accessories in Alaska. They work with many well-known manufacturers, inc            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aluf-Plastics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25586</link>
<guid>872338a783596365d7fc8d44214be720</guid>
<pubDate>Fri, 12 Sep 2025 15:27:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Aluf-Plastics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9fcd13583d0afaf7c05cc7f4dbbf20f473189e7ad22a1e8c15ecc826ddea599</i><br /><br />Threat actor <b>description</b>: <i>Aluf Plastics is a prominent manufacturer and distributor of high-quality plastic products, specializing in trash bags, can liners, sheeting, and poly bags.We are going to upload 40GB of corporate data. Employees' personal information (Full personal info: address, phone, passport information, medical information, credit cards), confidentiality agreements, finance and accounting files, clients and customers information, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>PYATOK</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25587</link>
<guid>2b3aa41ec493d9908c56dcd665d08d22</guid>
<pubDate>Fri, 12 Sep 2025 15:27:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>PYATOK</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d6489d899829a6249bdeca7148166b8b73c2a0e1dc3719692f3491eaa978986</i><br /><br />Threat actor <b>description</b>: <i>PYATOK works to foster the development of vibrant, sustainable, inclusive communities through sensitive architecture and urban design, rigorous research and education, exemplary service and technical innovation, and thoughtful advocacy.We are going to upload 30GB of corporate data. Employees' personal information (USCIS forms with full info, medical information, credit cards), confidentiality agreements, payment details, finance and accounting files, clients information, projects, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brownstone-Agency</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25588</link>
<guid>f83d13844fb3dadd32223756dd132261</guid>
<pubDate>Fri, 12 Sep 2025 14:27:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Brownstone-Agency</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9b5c24d827fabd38b4a9f613e2a9821f37c53ef88e61e8076582f696f048fa71</i><br /><br />Threat actor <b>description</b>: <i>Brownstone Agency, Inc. offers a range of insurance products including property and general liability coverage, specifically tailored for brownstones, row houses, condominiums, and multi-family dwellings.We are going to upload 10GB of corporate data. Employee documents(Full name, DOB, addresses, zip and so on), lots of confidentialagreements, detailed finance and accounting files, lots of clients and customers information, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mazza-Recycling-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25589</link>
<guid>3f4a917da8640f243cd5e5c2d66a99c6</guid>
<pubDate>Fri, 12 Sep 2025 14:27:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Mazza-Recycling-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c05cbe495fe4279dadeab6e4925071972291605ed8394b605d9edf2775452293</i><br /><br />Threat actor <b>description</b>: <i>Mazza Recycling Services is a leading waste recycling company based in New Jersey, specializing in innovative waste recycling solutions for residential, commercial, and industrial clients.We are going to upload 27GB of corporate data. They didn't even try to protect their employees' personal information (Full name, DOB, addresses, zip, DLs of at least 69 employees, SSNs, medical insurance policies and so on), confidentiality agreements, financeand accounting files, clients and customers information, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Survival-Flight-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25584</link>
<guid>33cbad177e0a2ab6b93c92124826f407</guid>
<pubDate>Fri, 12 Sep 2025 11:26:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Survival-Flight-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>818600001bded5aea2a97e7159e17eb39e92439c9b9de95e3e82670cbcd971e1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Meskan-Foundry</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25590</link>
<guid>f220707c3afe39d1779e0a34af72bb7f</guid>
<pubDate>Fri, 12 Sep 2025 10:49:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Meskan-Foundry</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b388b0b754364448d866df2cf898ab933110bdfc83a360823b2946fed844a2f</i><br /><br />Threat actor <b>description</b>: <i>Meskan Foundry is a 5th generation, family owned, non-ferrous casting facility in Chicago since 1907. With over 200 combined years of foundry knowledge and experience passed down from generation to generation, you can be assured that the castings you receive from us are the best in the industry. We are a full service foundry, capable of handling all secondary operations to provide our customers with finished castings.</i><br />Target victim <b>website</b>: <i>www.meskan.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>TAKwest</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25583</link>
<guid>6e18b12a82c40871803b88fa42cc1a20</guid>
<pubDate>Fri, 12 Sep 2025 02:27:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>TAKwest</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d995237f1aae3e9e9dd11acb7b2e846ca3452c00ebefaa2aceccbb8e7b1c81af</i><br /><br />Threat actor <b>description</b>: <i>Broadband data leak. Those who provide access to new digital opportunities have failed to ensure their own cybersecurity. TAK West Shore is a subsidiary of TAK Broadband. They offer comprehensive service solutions in the field of fiber optic             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Northwest-Medical-Specialties</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25578</link>
<guid>c566177f38627e45e5a79dbf1dd187ca</guid>
<pubDate>Thu, 11 Sep 2025 19:28:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Northwest-Medical-Specialties</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a88af93eb6ef332652647c7f2b2fd871b7ede3d303fa806728c53c5fc206cc8a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>STANDARD-IRON--WIREWORKS-Helgesen-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25573</link>
<guid>15d4408a4d391c3fb8344af099a4a051</guid>
<pubDate>Thu, 11 Sep 2025 16:28:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>STANDARD-IRON--WIREWORKS-Helgesen-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>41adf6395af6c98dfd6563abb6c95b4b672da188128abec35a57bc2f5ad4e44b</i><br /><br />Threat actor <b>description</b>: <i>STANDARD IRON & WIRE WORKS manufactures products in two distinct divisions. Contract Manufacturing fabricates, assembles and paints heavy-duty products for blue-chip original equipment manufacturers (OEMs) across numerous end markets including, agriculture, construction, power generation, industrial HVAC, among others.We are going to upload 40GB of corporate data. Employee data (SSNs, driver licenses, medical files and so on), finance and accounting files, payment details, customer information, contract and agreements, confidentiality agreements, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fluxergy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25574</link>
<guid>da502cff136c2848905d8c0e169ba278</guid>
<pubDate>Thu, 11 Sep 2025 16:28:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Fluxergy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b23d1f6231b1bf16c45d2376b4c40881631c5d74399d09063059e1e96fb72609</i><br /><br />Threat actor <b>description</b>: <i>Fluxergy is developing a platform with multi-modal detection technologies which bring the variety of tests found in the central laboratory.We are going to upload 16GB of corporate data. Detailed employee data (lots of personal documents: SSNs, driver licenses, passports and so on), detailed finance and accounting files including confidential ones, lots of customer information, contract and agreements, confidentiality agreements, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Molod-Spitz--DeSantis</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25575</link>
<guid>e5299a3f17ebbcce23d7a8c90adf81cc</guid>
<pubDate>Thu, 11 Sep 2025 16:28:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Molod-Spitz--DeSantis</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0cb65db84519af3a9e60c718c994ed7bd2e207892d760ddef7f51e5ae9cd55ca</i><br /><br />Threat actor <b>description</b>: <i>Molod Spitz & DeSantis, P.C. specializes in defending clients in complex liability matters in New York and New Jersey courts. The firm prides itself on being trial-ready, with a long record of successful verdicts and a commitment to tracking metrics that reflect their results. We are going to upload 62GB of corporate data. Employee documents, medical information, confidential agreements, lots of customersinformation, detailed finance and accounting files, lots of clients information, contract and agreements with customers, police reports, investigations, court hearings, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>TDK-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25576</link>
<guid>016dda407fff9ed48128da45058b0366</guid>
<pubDate>Thu, 11 Sep 2025 16:28:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>TDK-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e927b34cc5254264418fd23bea7643b14b5ae2936e68387dc4a66b5f15c71e03</i><br /><br />Threat actor <b>description</b>: <i>TDK Technologies provides information technology consulting and custom software development for businesses through either staff augmentation or outsourced project solution delivery.We are going to upload company data soon. You will find financialdata (audit, payment details,financial reports, invoices), employees and customers information (passports, driver's license, SSN ) confidential information, NDAs and other documents with detailed personal information so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Communicare-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25571</link>
<guid>87a57c9dce29e600b772912ff1c4c1c7</guid>
<pubDate>Thu, 11 Sep 2025 09:55:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>daixin</b> claims attack for <b>Communicare-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5d6978615b3fb4fa0d9c64c6da0796b60b88225e2c7cbeb3758d7b87918fb0f3</i><br /><br />Threat actor <b>description</b>: <i>Communicare, Inc. has been a premier provider of behavioral health services in Kentucky's heartland since 1967.</i><br />Target victim <b>website</b>: <i>communicare.org</i>]]></description>
<category>daixin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Insurance-Office-of-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25570</link>
<guid>70b546d3daac16b1d8a1fc46e6d63a72</guid>
<pubDate>Thu, 11 Sep 2025 09:54:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>daixin</b> claims attack for <b>Insurance-Office-of-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ad38c9d93149431603f9a25740ff4c7ce046c8c2ffe5500fb9cc4da21f2e4a7</i><br /><br />Threat actor <b>description</b>: <i>Insurance Office of America (IOA) is a premier, full-service insurance agency dedicated to delivering bespoke insurance solutions since 1988. We’re one of the USA’s fastest-growing agencies.</i><br />Target victim <b>website</b>: <i>ioausa.com</i>]]></description>
<category>daixin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gagosian</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25569</link>
<guid>ebe4361baf7318a92facaec817c6d0d9</guid>
<pubDate>Thu, 11 Sep 2025 09:54:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>daixin</b> claims attack for <b>Gagosian</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>326aeb8bd69176fc1249b386ee6ed21772c59248f67034cf60c0e076cf629a27</i><br /><br />Threat actor <b>description</b>: <i>Established by Larry Gagosian in Los Angeles in 1980, Gagosian is a global gallery specializing in modern and contemporary art that employs more than three hundred people at eighteen exhibition spaces across the United States, Europe, and Asia.</i><br />Target victim <b>website</b>: <i>gagosian.com</i>]]></description>
<category>daixin</category>
</item>
<item xmlns:dc='ns:1'>
<title>moinian.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25568</link>
<guid>07b6b142463f773e941206c21967edb1</guid>
<pubDate>Thu, 11 Sep 2025 09:48:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>moinian.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2dd086e4cdd34b78f17fe5b95a79a688badde4638a713e37bff6c1610ae31880</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1982, The Moinian Group is a privately held real estate investment company focusing in New York City commercial, residential, and hospitality properties.</i><br />Target victim <b>website</b>: <i>moinian.com</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>deerfield.com--singulargenomics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25567</link>
<guid>bd38184ee56f9f286f9a4e649a740e42</guid>
<pubDate>Thu, 11 Sep 2025 05:22:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>deerfield.com--singulargenomics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f4de7b0aa676e5fbb53061ae58db139806346647cf4bd5957339d41881b4bf77</i><br /><br />Threat actor <b>description</b>: <i>================================================================================================ deerfield.com  Deerfield Management ("Deerfield") is an American investment firm headquartered in New York City. It is focused on making public and private investments in the healthcare and biotechnology industries. Deerfield is considered to be one of the largest dedicated healthcare investment firms in the world. ================================================================================================ We hacked and compromised one of the many laboratories belonging to Deerfield: ================================================================================================ www.singulargenomics.com  A Singular Focus on Advancing Science and Medicine Our aim is to empower scientists to answer their most pressing questions, allowing them to forge a path of discovery without limits. Our commitment is to serve the scientific community through continuous and thoughful genomic innovation that's driven by real-world feedback and solution-oriented development. ================================================================================================  We downloaded about 20 TERABYTES of data from servers and Amazon storage. Including experiments, software sources, AI data, as well as research for the company's clients - fox chase, GeneDX, Juno, lexogen, HARVARD, siemens, and many others. Soon, anyone who wants and understands the issue will have the opportunity to study in detail the activities, research and experiments of this company. And to see who and why they are conducting their experiments in the field of gene engineering. Maybe it will become clearer why Deerfield is buying up pharmaceutical laboratories and what they want to achieve in the end. What do gene laboratories and government universities have in common? Everyone will soon be able to discover a lot of questions. ================================================================================================</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Encore-Leisure-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25562</link>
<guid>059def4514ca1bc7ff5781ac48428572</guid>
<pubDate>Thu, 11 Sep 2025 02:26:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Encore-Leisure-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7117b48c714ad91656dfe1c73d0906188e303889fb2498d110d74a540f854f23</i><br /><br />Threat actor <b>description</b>: <i>Encore Leisure Group
 Founded by Dale Folmar and Jacques James, was formed to ma...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Spectra-Logic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25561</link>
<guid>bd652bf1e9b66171ef77f1e0db2e9c1e</guid>
<pubDate>Wed, 10 Sep 2025 23:27:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Spectra-Logic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4bd8e9e7c15b5cbe2a4566ce8fa29f6fe6caa98c80e1f4ffa23f69973dfc6cf9</i><br /><br />Threat actor <b>description</b>: <i>Spectra Logic, USA - data protection and storage company LMAOOOAHHAHA I'm dead!!! Sorry, but this is really funny. PROTECTION! STORAGE! DATA!!!! On our blog, yes. So, Spectra Logic helps organizations manage, migrate, store and preserve busin            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>waverlychildcare.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25566</link>
<guid>54e86f8a9dd94e31f18fe3bc94f0ae75</guid>
<pubDate>Wed, 10 Sep 2025 19:09:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>waverlychildcare.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d7340adeb9ff955ce8e75f7c648a50f8eb568cdac683521b8a0e396e76cad80</i><br /><br />Threat actor <b>description</b>: <i>Waverly Child Care & Preschool is a nonprofit early childhood education provider based in Waverly, Iowa, established in 1970. It …</i><br />Target victim <b>website</b>: <i>waverlychildcare.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>RG-ELECTRIC-COMPANY-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25564</link>
<guid>d2f8a028891ab3c7e90238798117e99d</guid>
<pubDate>Wed, 10 Sep 2025 17:17:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>radar</b> claims attack for <b>RG-ELECTRIC-COMPANY-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>59373cceb7e31eecc47d832e8ef77e5c5e067de25383ba0d71621d09f413f57d</i><br /><br />Threat actor <b>description</b>: <i>R. G. Electric Company, Incorporated, a Virginia-based electrical contractor founded in 1980. Around ~500GB of confidential data. The leak of internal company documents contains a huge variety of personal documents and information of clients, employees private data, private contacts, confidential contracts, confidential projects, orders, IDs, SSN, email conversations. Bank documents: statements, balances, Tax bills, signatures, checks. Video - https://streamable.com/4wn1jk , screenshots - https://imgur.com/a/Er9J1Kp, all contacts - http://4q5tsu5o3msmv4am4dfhupwhzlyg7wv3lpswbvbhcrknr4ega7xetxad.onion/RGELECTRIC_part2/dataRobert%20G%20Dashiel/contacts.csv</i><br />Target victim <b>website</b>: <i>rgelectric.com</i>]]></description>
<category>radar</category>
</item>
<item xmlns:dc='ns:1'>
<title>ROBERT-G.-DASHIELL-JR.-P.E.-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25565</link>
<guid>05b755ace5b49029e32c3b90fb494edc</guid>
<pubDate>Wed, 10 Sep 2025 17:16:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>radar</b> claims attack for <b>ROBERT-G.-DASHIELL-JR.-P.E.-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>771991b73a58d178037cff524696945d800840549d8b9301efc777ec32567615</i><br /><br />Threat actor <b>description</b>: <i>Robert G Dashiell Jr PE Inc is a reputable engineering firm based in Norfolk, VA, specializing in providing professional engineering services. Around ~500GB of confidential data. The leak of internal company documents contains a huge variety of personal documents and information of clients, employees private data, private contacts, confidential contracts, confidential projects, orders, IDs, SSN, email conversations. Bank documents: statements, balances, Tax bills, signatures, checks. Video - https://streamable.com/4wn1jk , screenshots - https://imgur.com/a/Er9J1Kp, all contacts - http://4q5tsu5o3msmv4am4dfhupwhzlyg7wv3lpswbvbhcrknr4ega7xetxad.onion/RGELECTRIC_part2/dataRobert%20G%20Dashiel/contacts.csv</i><br />Target victim <b>website</b>: <i>rggroup.net</i>]]></description>
<category>radar</category>
</item>
<item xmlns:dc='ns:1'>
<title>1-ACT-Driving-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25558</link>
<guid>7d571ef48d7c44ec949687e28abcdf30</guid>
<pubDate>Wed, 10 Sep 2025 16:49:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>1-ACT-Driving-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>99701a85cb91517ed1da3b3483205722b603f543f371ffe7633c186a5af2fa0a</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>1statlantaduischool.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>BFLI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25557</link>
<guid>4b6f0a34fce7b7679d959111f4875948</guid>
<pubDate>Wed, 10 Sep 2025 15:43:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>BFLI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47de0a9f1030975fd8add80330ddab6e37d318096be8ce3c03024388df4431aa</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>betterfamilylife.org</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Docklyne</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25556</link>
<guid>9fd54dd7e4d3bff4807c83c241e2751c</guid>
<pubDate>Wed, 10 Sep 2025 15:42:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Docklyne</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>379f7b2d70b4b79d5b2032e43006959abba1096817f84b90d3c05c2f3161832c</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>docklyne.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Northland-Auto-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25550</link>
<guid>24bb26bb300eefd5ecd1373e002d8df5</guid>
<pubDate>Wed, 10 Sep 2025 14:43:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>Northland-Auto-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ac6b34332a788d86279d70629ca76a65df50ad189c8b19e9725f3271202957d</i><br /><br />Threat actor <b>description</b>: <i>Our Company—Over 30 years of Success and LeadershipNorthland Auto Solutions is proud to be your preferred dealership solutions and insurance services provider. Founded in 1990 by Executive Director Allen Lentsch, we provide dealers with programs to support used car leasing, daily rentals, and all your dealership’s insurance needs. Northland is also known for ancillary products such as bonds, dealer supplies and GPS devices.The real surprise you’ll find in doing business with us is that we are approachable, knowledgeable, and share our experiences in ways that you can understand, learn from, and follow.- Database- Financial documents- Personal information of employees and clients https://northlandautosolutions.com/</i><br />Target victim <b>website</b>: <i>northlandautosolutions.com</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Accelerated-Academy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25555</link>
<guid>aea9789988c08f28538422f1c3427388</guid>
<pubDate>Wed, 10 Sep 2025 14:16:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Accelerated-Academy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cbaf4a0ba2539e25728bcab1bbc49f71158153ca9ab20c7057292a43411ef1aa</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>acceleratedacademy.us</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Commercial-Casework</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25551</link>
<guid>b4aa16d8d291bc9eef7d9eccc6567683</guid>
<pubDate>Wed, 10 Sep 2025 13:18:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Commercial-Casework</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8a3b1baf81d362ecc1bb0459ba2acb7bdcf96ecd6f5e084ace50dd1fe9c9ef0e</i><br /><br />Threat actor <b>description</b>: <i>Commercial Casework Inc. has been a leading provider of custom ar
chitectural woodwork and cabinetry in Northern California since 1
976, situated in the San Francisco Bay Area. The company speciali
zes in high-end tenant improvements for various commercial spaces
, including Board Rooms, Cafes, and Reception Areas. 

We are going to upload 12GB of corporate data. A lot of hr data, 
medical information, accounting files, payment details, client in
formation, project information, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Venezia</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25552</link>
<guid>221d772de257c968c2c15b9155d436ab</guid>
<pubDate>Wed, 10 Sep 2025 13:17:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Venezia</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f4fac5e4826e157e43e519d0efe466b24157591b7f2af6c471e5bb0e0544acd5</i><br /><br />Threat actor <b>description</b>: <i>Venezia, headquartered in Limerick, PA, provides high quality tra
nsport & trucking services for the Liquid, Dry Bulk & Specialty c
ommodities transportation industry to 48 states and Canada.

We are going to upload 35GB of corporate data. Employee data (DOB
, addresses, phones, emails, medical certificates, passports, dri
ver licenses and so on), finance and accounting files, payment de
tails, client information, project information, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>HD-Media-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25544</link>
<guid>96045cb4b220959781bbbff6f5367268</guid>
<pubDate>Tue, 09 Sep 2025 22:47:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>HD-Media-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7836e70c0992d921e0fd1c3f4d8182acccb3840a1e1855a946c3079dbfce67ba</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.hd-mediasystems.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mayors-Machine-Works</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25543</link>
<guid>7514b3e0aba63c1dc6d14618f0d1f386</guid>
<pubDate>Tue, 09 Sep 2025 22:46:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Mayors-Machine-Works</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2dd197236722a8d881bfbb5558a1be1776d1bb5532cdd9182e991984040ce3e2</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.mayorsmachine.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>JIT-Energy-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25542</link>
<guid>d7445d18d5c5ab0ce2bbd3bc67c8d9f3</guid>
<pubDate>Tue, 09 Sep 2025 22:45:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>JIT-Energy-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>76666ea4d9a57f3058edf163d29b3f694c0ef0b1f98d55714b246b2a88b0a1be</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.jitservicesinc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Anderson-Aluminum</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25541</link>
<guid>7377f47f95a1202ea8d330061b674dea</guid>
<pubDate>Tue, 09 Sep 2025 22:44:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Anderson-Aluminum</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb2c792f399222e785cef2aeeb27f9eef03ee7ea90d514956de92a5a92564e94</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.andersoncompanies.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Royal-Machine--Tool</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25540</link>
<guid>6ae87b539605df13856d273cca0da569</guid>
<pubDate>Tue, 09 Sep 2025 22:44:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Royal-Machine--Tool</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f58c75e4241b29e474f3ac44e94cda12aa9f99061360053c1ee54daff5db6172</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.royalworkholding.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Reliable-Roofing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25539</link>
<guid>5683495c01530bccb72168dc75a983f1</guid>
<pubDate>Tue, 09 Sep 2025 22:43:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Reliable-Roofing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b728ac91d5cd21357be3c6ec1bf79985312e6b95bdac7a9733ded3b4bdbe896f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.reliableroofing.biz</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Celtic-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25538</link>
<guid>90a8d5aeed9822b634a21d1d5a2543c9</guid>
<pubDate>Tue, 09 Sep 2025 22:42:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Celtic-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>804f1c37dbea4a1c8744fdc5a7ac12215d605edffb57802a8a9b829fd93f4b35</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.celticengineering.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>GDZ-Computer-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25530</link>
<guid>e6258b956c06d8dbabbde10d4919e5ef</guid>
<pubDate>Tue, 09 Sep 2025 22:42:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>GDZ-Computer-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d15db66b85e79842a462ff70ad6e2bb22845633cff48caf3ed9b3ecc12e3009d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.gdz.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cool-Wind-Ventilation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25537</link>
<guid>688141bcde5012d86f76663a425ff07d</guid>
<pubDate>Tue, 09 Sep 2025 22:41:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Cool-Wind-Ventilation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ea6a3f7c43a34cd954b9f35b04d4ffb734683ab43b37d716e253a3ee547cf07</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.coolwind.biz</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rising-Star-Hydraulics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25536</link>
<guid>3ae84dcbd2cfadb3fdd4d58dbaa386ef</guid>
<pubDate>Tue, 09 Sep 2025 22:40:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Rising-Star-Hydraulics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c4f3cf92e440cd92278724b318ad2956424adb228fdb1dda94418b61693df5e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.risingstarhyd.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Edwards-Interiors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25535</link>
<guid>68f4f1c9069efc3169ccef543fc9b706</guid>
<pubDate>Tue, 09 Sep 2025 22:40:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Edwards-Interiors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>07a418ce418e77f6bec868b644404d121191f48f9df763249a48a1209ebe03fa</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.eiiaerospace.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>GL-Veneer</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25534</link>
<guid>f50118652ac9772880a8fe2822522f8f</guid>
<pubDate>Tue, 09 Sep 2025 22:39:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>GL-Veneer</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fef9b694d2a835c12c68bda2bca7c78e7306c58b6e2dea3eb2d122ad05a2b19d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.glveneer.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Allegis-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25533</link>
<guid>5b48cf6d948c70034f7a239f8e5c566d</guid>
<pubDate>Tue, 09 Sep 2025 22:13:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Allegis-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5ec66afce0f79b9f9849eab0022a597f38b70db840a33e9a86cf42079bebb123</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Allegis Group is a privately-held global talent solutions provider. The company offers a wide range of services, such as staffing and recruitment, workforce management, and talent advisory. Their expertise includes IT & communications, aerospace, biopharmaceuticals, energy, financial services, and more. Allegis was founded in 1983 and has its headquarters in Hanover, Maryland, USA.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aupaircare-and-Intraxinc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25532</link>
<guid>c56b7becfe4383d3ef77d68c78a5d2bd</guid>
<pubDate>Tue, 09 Sep 2025 22:13:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Aupaircare-and-Intraxinc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e434ecf60292b83e2ed3c294db9bea6f9dd91b28f129249098078c2f31946218</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] AuPairCare and Intrax Inc. are sister companies. AuPairCare is a leading au pair agency providing live-in childcare services to American families in over 40 states. It pairs host families with international young adults who provide up to 45 hours of childcare each week. Intrax Inc. on the other hand, is a globally-oriented company providing a variety of educational and cultural exchange programs, including work and internship, teaching, and language learning opportunities.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>ES-Food</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25506</link>
<guid>c913d53b4c55ee20acb97bad39c38458</guid>
<pubDate>Tue, 09 Sep 2025 20:26:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>ES-Food</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89b798624c26b20b2ddc447debce5650f583a4603f25a39cf4334138c3a6b5bf</i><br /><br />Threat actor <b>description</b>: <i>E&S Food, Inc., was started in 1980 by Settimo Guttilla, selling grated cheese from his car and his first warehouse was his garage. Now utilizing a warehouse over 50,000 square feet, E&S has over3,000 products, and the company employs over 50 employees.We are going to upload 190GB of corporate data. A lot of financial and accounting data, credit card details, personal information of employees, client information, a bit of client data, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kandeo</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25525</link>
<guid>86a9d09856a0f9f7a762ddce0af753ce</guid>
<pubDate>Tue, 09 Sep 2025 16:03:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Kandeo</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a4371e88c307d6f99c5208079a9e8d38571ea604af7c85be291339d15417e9e</i><br /><br />Threat actor <b>description</b>: <i>www.kandeofund.com , https://diaphanum.pe/ , https://www.zoominfo.com/c/kandeo/355444055 Kandeo is focused on providing innovative solutions to enhance growth for businesses. Their product offerings are designed to empower companies to achieve brilliance in their operations. The intended clients range from small startups to large corporations seeking to optimize their business strategies. By leveraging advanced technologies, Kandeo aims to drive success and foster sustainable development.</i><br />Target victim <b>website</b>: <i>www.kandeofund.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wharton-Independent</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25502</link>
<guid>bdbe575de5ecbc20be758c6f4e105da6</guid>
<pubDate>Tue, 09 Sep 2025 15:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Wharton-Independent</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>029815c3454d4e864ae5dd9b34334752c91e126edd1a7aba72cdae10c2e2a6e7</i><br /><br />Threat actor <b>description</b>: <i>www.whartonisd.net , www.zoominfo.com/c/wharton-independent-school-district/213188688 Wharton Independent School District provides educational services to a diverse student population, aiming to prepare every student for success in a global society. The district offers a wide range of programs including athletics, special education, and vocational training. Targeting students from elementary through high school. Wharton ISD also emphasizes parental and community engagement in the educational process. Additionally, it provides resources and support for both students and staff across its various departments</i><br />Target victim <b>website</b>: <i>www.whartonisd.net</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>InjectSense</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25497</link>
<guid>bfaadb09eb2d1eb21b7b5f1eac3ea902</guid>
<pubDate>Tue, 09 Sep 2025 15:52:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>InjectSense</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>830eebc1912689100f9c499705b338c28e8212e438cfa2836dbc2e19b44ab7d1</i><br /><br />Threat actor <b>description</b>: <i>https://www.zoominfo.com/c/injectsense-inc/406591024 https://www.injectsense.com/ Injectsense specializes in ultra-miniature implantable sensors designed for digital health applications. Their self-anchoring platforms continuously measure health parameters such as absolute pressure and oxygenation, providing doctors with vital 24/7 health insights. The company combines expertise in semiconductor and medical systems, ensuring their devices are supply chain-ready and utilize advanced miniaturization technology. Their target clients include physicians seeking to improve patient care through autonomous sensing and actionable data.</i><br />Target victim <b>website</b>: <i>www.zoominfo.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>J.V.D.B.--Associates-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25515</link>
<guid>788719cc45ba3937014fad2961c6d27b</guid>
<pubDate>Tue, 09 Sep 2025 15:45:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>J.V.D.B.--Associates-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2bae2b4626a270b49ada162d5960182be08962ecdd3c77c6aba97efceb14e214</i><br /><br />Threat actor <b>description</b>: <i>[J. V. D. B. & Associates, Inc. is an Illinois collection agency. Illinois collection agencies can help businesses, medical practices and facilities that are creditors to collect their accounts receivable. Debt collection help might include; collection demand letters, debt collector phone calls, credit reporting to credit bureaus and legal proceedings including lawsuits.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Energy-Fishing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25489</link>
<guid>063b7d7ae9cd5ea74e1f879c52a91917</guid>
<pubDate>Mon, 08 Sep 2025 23:40:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Energy-Fishing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cbc1b0452a5f006175aa3cb14d0f53707caeb19ae457a7a935c2ebdcc358e269</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.energyfrs.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>BDE-Computer-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25488</link>
<guid>ea5b254610d3af85fb861cc7be787ad5</guid>
<pubDate>Mon, 08 Sep 2025 23:39:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>BDE-Computer-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>95c8e600b154fec3db5eb92a07e015a87b81010651d5bf39b2f632cbfc3c1ba3</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.bdecomputer.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Promark-Partners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25487</link>
<guid>8648eaae8f6cd2dbd737201ba9708a34</guid>
<pubDate>Mon, 08 Sep 2025 23:39:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Promark-Partners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b39a71456794894043844ded8fa25d741a41a928a6e7109237c3c2c0e3963cd</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.promarkpartners.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Melwood</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25486</link>
<guid>e61f7911ee778def6a5aade05bbe9ca1</guid>
<pubDate>Mon, 08 Sep 2025 20:44:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Melwood</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7e307aa20197bddca4393d410552e46500ef264db27f44f3e14c09f72e4bd497</i><br /><br />Threat actor <b>description</b>: <i>Melwood is a family of companies with a shared vision of a world where people with disabilities are fully included. Melwood comprises three primary companies—Melwood Enterprises, Melwood Community Services, and Melwood Inc.—together serving as one of the nation’s leading advocates, service providers, and employers of people with disabilities and their caregivers. They offer employment, job placement, job training, life skills for independence, support services, and youth and community recreational services to more than 3,000 people each year in D.C., Maryland, and Virginia.</i><br />Target victim <b>website</b>: <i>www.melwood.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bounds-Gillespie-Killebrew-Tushek-Architects</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25481</link>
<guid>f1ce94556e4edc2c15a463ca093a05bc</guid>
<pubDate>Mon, 08 Sep 2025 18:33:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Bounds-Gillespie-Killebrew-Tushek-Architects</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>602013c87446e393a92a2c0b3db1e9b315c08b919034cf5bb633a37a93f12ac1</i><br /><br />Threat actor <b>description</b>: <i>BGKT Architects a new company has emerged out of a longstanding partnership betw...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>General-Converting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25475</link>
<guid>1c7640494d7b763e2f1521e08075cf61</guid>
<pubDate>Mon, 08 Sep 2025 17:30:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>General-Converting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ae476122f266c6482d56ff5a01559f07a766386479ccfea5b76053e60a97cb65</i><br /><br />Threat actor <b>description</b>: <i>General Converting, Inc. was founded in 1982 and was comprised then of three people, a 1 color press, a small die cutter, and a gluer. Today, the thriving GCI remains an independent company and now employs a staff of 65 people, most of whom have been with the company for 10 years and longer. We are going to upload 138 GB of corporate data. Employee personal information (name, DOB and is on), detailed financial data, confidential agreements, lots of customer files, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>RBJ-Escrow-Software</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25476</link>
<guid>b8727981b7f3d46b51d5b6770632e453</guid>
<pubDate>Mon, 08 Sep 2025 17:30:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>RBJ-Escrow-Software</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>67ee0bec843696fb3378f7e5db08d48f1102056c394af2c5879abb4e32b82508</i><br /><br />Threat actor <b>description</b>: <i>RBJ Escrow Software leverages 35 years of California escrow experience to provide advanced software solutions for escrow processing, title production, and trust accounting.We are going to upload 20GB of corporate data. A a lot of client data, HR files, detailed financial and accounting data, lots of files with personal data of employees, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>runaces.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25478</link>
<guid>020ea2e7e3f2cec1ca4af57682211297</guid>
<pubDate>Mon, 08 Sep 2025 16:30:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>runaces.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>66221c36ed85a7cd954438ecd1c4f243a3d8890bde8b63817670ec474087b145</i><br /><br />Threat actor <b>description</b>: <i>Finished the game. Running Aces -you're playing a losing hand.The Running Aces Casino and Racetrack opened in Columbus, Minnesota, in April 2008. Things did not go well from the start. In its first year of operation, the racetrack lost $4 mil            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>rose-acre-farms-inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25469</link>
<guid>b575e1f659c7d47f3fd50cc248891ecf</guid>
<pubDate>Sun, 07 Sep 2025 20:33:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>rose-acre-farms-inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e62a813b7445ff83bf5aaeb1fd6d398f03c3631a4c0996c8bc24bf48ee2014f</i><br /><br />Threat actor <b>description</b>: <i>www.goodegg.com
 www.roseacre.com
 Established in 1939 and headquartered in Seym...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rad-Solutions-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25464</link>
<guid>f950866095596db1d471ffbc7694fb0a</guid>
<pubDate>Sun, 07 Sep 2025 09:10:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Rad-Solutions-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cf97288fd057b8ee5d60ce179dadf0d7620e8b257c25da7be57fead4fd41ed4e</i><br /><br />Threat actor <b>description</b>: <i>Rad-Solutions, LLC is a North American company that specializes in energy curable raw materials, specialty coatings, and innovative products for various industries including graphic arts and cosmetics. Their product range encompasses Radsol brand acrylate diluents, oligomers, and unique items such as adhesion promoters and proprietary stabilizers. With a management team of experienced chemists and engineers, the company imports and markets a diverse array of raw materials, ensuring availability through strategic alliances with global manufacturers. Additionally, Rad-Solutions offers formulating assistance and contract manufacturing to meet the needs of their clients.
company is headquartered in 2221 Justin Road Suit 119-142 Flower Mound, TX</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>TuftsMedicine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25465</link>
<guid>f75de331bfe8b590187c79b46e70d24b</guid>
<pubDate>Sun, 07 Sep 2025 09:07:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>TuftsMedicine</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a50885b22cd00ce1a4da80f22a5ed95ff0535ec120a0a35d105099bf8f6422c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>GPS-Trackit</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25468</link>
<guid>7b5f37cf6529d139d0735e31fa4baae4</guid>
<pubDate>Sun, 07 Sep 2025 06:13:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>GPS-Trackit</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a766233494ad200a648c026c328a8998f74be7717f441a9e07582c09535c609d</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>gpstrackit.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Archer-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25467</link>
<guid>4a50c47d4386ee44d38066ae1b474dd7</guid>
<pubDate>Sun, 07 Sep 2025 06:13:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Archer-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2269d4ce6e103c246a92f22d667551d7a748607e3d67f8a5517d938afc2ee47b</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>archerhealthinc.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gordon-Rees-Scully-Mansukhani-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25466</link>
<guid>4d36e559787b682162ce19874702bf39</guid>
<pubDate>Sun, 07 Sep 2025 00:44:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Gordon-Rees-Scully-Mansukhani-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f50804c1e09f7e485b27ce41deeb3cc57ff5d957faded8104a5259d9c649fee</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services - California, United States - 2,500 Employees. Gordon & Rees was founded in…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mechatronics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25456</link>
<guid>233e59fa6283938baff02608900e1bbf</guid>
<pubDate>Sat, 06 Sep 2025 20:27:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Mechatronics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d1ec5533f77ae08c09f9a4aaee9d07a5bf6c523f51a05a83ff88efc47003b70</i><br /><br />Threat actor <b>description</b>: <i>Mechatronics, Inc. USA specializes in providing a wide range of AC, DC, and EC fans and blowers, including accessories and custom assemblies, catering to industries such as telecom, medical, industrial, alternative energy, lighting displays,             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Indo-MIM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25451</link>
<guid>65df376cb19d1a208ea312d7f58c7579</guid>
<pubDate>Fri, 05 Sep 2025 14:28:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Indo-MIM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56fac646913d532a08fd390a029d5f924a57ddc1de06bba2c0ee6579ddd9ecc2</i><br /><br />Threat actor <b>description</b>: <i>Indo-MIM s a manufacturer and supplier of precision-engineered products using Metal Injection Molding.We are going to upload 13 GB of corporate documents. A huge number of employee personal files (Full Name in Native Language, OtherNames Used, Telecode Name Used, Sex, Marital Status, Date of Birth, Place of Birth, Country/Region of Origin (Nationality), country/region of origin (nationality) above, National Identification Number, U.S. Social Security Number, U.S. Taxpayer ID Number, Home Address, City, State/Province, Postal Zone/ZIP Code), financialdata, project information, drawings and specifications, customerinformation and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Michigan-Sugar</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25452</link>
<guid>ededc7e1ce8f57bb859089b9360ed86f</guid>
<pubDate>Fri, 05 Sep 2025 14:28:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Michigan-Sugar</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>93fbada75f020bb8329358b451567c12f69280742066730090963faa4f9d13d5</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1906 and headquartered in Bay City Michigan. Michigan Sugar manufactures granulated, powdered, liquid, and brown sugars.We are ready to upload more than 40GB files of essential corporate documents such as: financial data (audit, payment details,financial reports, invoices), employees and customers information (driver's license, death certificate, medical information, emails, phones) confidential information, NDAs and other documents with detailed personal information so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>HeavenlyDental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25446</link>
<guid>db6040c329c81f77c902cc63b2b74aca</guid>
<pubDate>Fri, 05 Sep 2025 06:41:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>obscura</b> claims attack for <b>HeavenlyDental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25eaebe8092d06bae52b485cad6bd5b65477f3b2712ce9083c0d98f0eb3683c0</i><br /><br />Threat actor <b>description</b>: <i>Dental clinics in San Jose</i><br />Target victim <b>website</b>: <i>heavenly-dental.com</i>]]></description>
<category>obscura</category>
</item>
<item xmlns:dc='ns:1'>
<title>Plazadental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25447</link>
<guid>9129fd2aed62d0d2a5093bd9d118f3ce</guid>
<pubDate>Fri, 05 Sep 2025 06:41:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>obscura</b> claims attack for <b>Plazadental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2bb04db2079ee3ce278df28ba5bbe7322780529d4cdd4364eba7478dd42e5bd9</i><br /><br />Threat actor <b>description</b>: <i>Dental clinics in San Jose</i><br />Target victim <b>website</b>: <i>plazadental.com</i>]]></description>
<category>obscura</category>
</item>
<item xmlns:dc='ns:1'>
<title>Elite-Trailers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25450</link>
<guid>2ad63b2ee1c70baedfadbe817528fc17</guid>
<pubDate>Fri, 05 Sep 2025 06:19:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Elite-Trailers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d7e16734cb8d707995d823978a8961bc4bb6c3908b1f4739e5b3c82d1cd5ef6a</i><br /><br />Threat actor <b>description</b>: <i>Elite Trailers Elite Trailer MFG, LLC. specializes in the custom manufacturing of high-quality trailers, including horse, livestock, and specialty models.</i><br />Target victim <b>website</b>: <i>elitetrailers.com</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ekmanian-Tax--Accounting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25441</link>
<guid>16f0fd52ff1008af716ba556886e37d0</guid>
<pubDate>Thu, 04 Sep 2025 23:28:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Ekmanian-Tax--Accounting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6189631b6c039670accc296be1a30d956fd74661920b39f19848217f74bb9833</i><br /><br />Threat actor <b>description</b>: <i>Ekmanian Tax & Accounting, USA - scandal immediately after M&A. Company is a law firm that provides tax account services and bookkeeping for people and companies. Most recently, they announced a merger with another company, Brave Accounting.             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Monterey-Mushrooms-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25443</link>
<guid>961e4b86bf690651cf87d52d714bc7f1</guid>
<pubDate>Thu, 04 Sep 2025 23:17:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Monterey-Mushrooms-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ef92957ffa36b0fb74fb8e3395483873156182eabfc713d3a637d39838511a6</i><br /><br />Threat actor <b>description</b>: <i>Monterey Mushrooms, Inc. was initially established in 1971 as a single farm operation in Royal Oaks, California. Today, this multi-site business is headquartered in Watsonville, California, and has production, sales and administrative offices, internationally. Monterey is the country’s largest and only national marketer of fresh mushrooms, supplying products for sale to supermarkets, foodservice and ingredient manufacture operations, and for preparation of processed, canned, and frozen mushroom products. In 1999, the company furthered its expansion into the Midwestern and Southeastern regions via the acquisition of mushroom farms in Princeton, Illinois, and Orlando, Florida. Monterey also continued its expansion in the Pacific Northwest via contracted pounds from Canada - all pounds are packed and distributed under the Monterey Mushrooms label.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>CI-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25439</link>
<guid>d2d6abcb8d26945763acf5d5b7872bce</guid>
<pubDate>Thu, 04 Sep 2025 19:28:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>CI-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb69e816fb3db23d848bc13c38eafdba419396fed29e0785d318ee981e2bed62</i><br /><br />Threat actor <b>description</b>: <i>9</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.sixgunsllc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25423</link>
<guid>6d287702e0f315118da3186374b4a191</guid>
<pubDate>Thu, 04 Sep 2025 17:27:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>www.sixgunsllc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7445316bbf1f372af8af78103ca358b7772f7eafc1a4be108119a524060b4a4</i><br /><br />Threat actor <b>description</b>: <i>Six Guns LLC offers superior commercial framing, drywall, and acoustical service...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.simmonsboardman.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25424</link>
<guid>5534491fa36be80ffbade139ea1a48ac</guid>
<pubDate>Thu, 04 Sep 2025 17:27:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>www.simmonsboardman.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e5fbe6590a775bd15a267b90dbee9d728b1c2216d73b5776770c5e3fadee4288</i><br /><br />Threat actor <b>description</b>: <i>Simmons Boardman Publishing is one of the oldest and most well-respected private...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>firstlight.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25427</link>
<guid>17cc0dddda0de48483f7447086c73767</guid>
<pubDate>Thu, 04 Sep 2025 17:27:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>firstlight.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b4aaac6bda7e038d217ce7eea5c360cb7d916afdbea0fff92147c05041d913e</i><br /><br />Threat actor <b>description</b>: <i>Headquartered in Albany, New York, FirstLight provides fiber-optic data, Interne...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Spokane-Produce</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25428</link>
<guid>74a3faa048e151b7a9b61267399d79e3</guid>
<pubDate>Thu, 04 Sep 2025 17:26:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Spokane-Produce</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c875b30584c42dec87c0d48e36a96f04e368c116aefffa2ed452cd623f971b8</i><br /><br />Threat actor <b>description</b>: <i>Spokane Produce, Inc. is a family-owned business established in the 1940s, specializing in the distribution of high-quality fresh produce, cut fruits and vegetables, deli items, and floral arrangements. We are ready to upload more than 74GB files of essential corporate documents such as: financial data (audit, payment details,financial reports, invoices), employees and customers information (driver's license, birth certificate, medical information, emails, phones) confidential information, NDAs and other documents with detailed personal information so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>cphcorp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25440</link>
<guid>0f56e1045e205122bb0dd4233c0b944f</guid>
<pubDate>Thu, 04 Sep 2025 16:52:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>cphcorp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2016da6f6d554d254bc4d954e53c80968bf5b585b4af820378dc0e5b8fafdac3</i><br /><br />Threat actor <b>description</b>: <i>CPH is a full service architectural and engineering firm providing design for public and private sector projects. The multi-disciplinary team includes architects, engineers (civil/structural/traffic/transportation/electrical/mechanical), planners, landscape architects, surveyors, environmental scientists and construction administrators. CPH works throughout the United States and the Caribbean, completing projects that include water and wastewater treatment, collection, and distribution systems, complete streets, roadways, parks and recreation, and commercial / industrial complexes. Employees: 257  Revenue: $44.1 Million Industry: Architecture Phone Number:(407) 322-6841</i><br />Target victim <b>website</b>: <i>cphcorp.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.medwayplastics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25430</link>
<guid>94a69f0a7d3171579ee7d8e089ad900b</guid>
<pubDate>Thu, 04 Sep 2025 16:27:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>www.medwayplastics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b98dbeb72c75fa2751fadc1fb81fa31c40d4d277a6daed3e766c79d8c60c1ef1</i><br /><br />Threat actor <b>description</b>: <i>Medway Plastics is a family-owned plastic injection molding company based in Cal...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>pesadoconstruction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25432</link>
<guid>4af455c264cf269a141d01d8ab29ad97</guid>
<pubDate>Thu, 04 Sep 2025 16:27:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>pesadoconstruction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b7a48483e44f51af3ebffe8483561efe721afb829b2a5f35bb4db521b41255b</i><br /><br />Threat actor <b>description</b>: <i>Pesado Construction is a premier General Contractor based in San Antonio, specia...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>volanno.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25436</link>
<guid>af075e90875e107a1963c799eb861a61</guid>
<pubDate>Thu, 04 Sep 2025 16:27:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>volanno.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>41274afb95041d3c4c5d0ec3d9004a838d2749bc45f3feb5c5b463e53c8e29a4</i><br /><br />Threat actor <b>description</b>: <i>Volanno is a software company providing software development, data analytics, an...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>city-of-batavia</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25437</link>
<guid>5988319f8fdeb1b2d254a9a38518f52e</guid>
<pubDate>Thu, 04 Sep 2025 16:27:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>city-of-batavia</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>43d4d953569e35c579257c2ab73b7a4ba461f9c5eba997c1060f4c913261e376</i><br /><br />Threat actor <b>description</b>: <i>The City of Batavia is a business-friendly organization with a balanced budget, ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.metrotech.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25438</link>
<guid>3dc430c160636fb3d2b8ffb62d9f1f3c</guid>
<pubDate>Thu, 04 Sep 2025 16:27:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>www.metrotech.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fae373b6ae2a654d60933e1d45f0a2b0f16b7ad942e90c306226e5a5c1c64040</i><br /><br />Threat actor <b>description</b>: <i>Metro Technology Centers is a career and technology education institution that p...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carus</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25422</link>
<guid>976f3d77e359f934970e7287f2318116</guid>
<pubDate>Thu, 04 Sep 2025 14:27:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Carus</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd08f05a78a9111d9d528d73f3d236a8042e4ee28d37978446f083e76ec761e1</i><br /><br />Threat actor <b>description</b>: <i>Carus provides solutions to environmental concerns involving water, air and soil with specializations in the area of chemical oxidation and sequestration.We are ready to upload more than 161GB files of essential corporate documents such as: financial data (audit, payment details,financial reports, invoices), employees and customers information (passports, credit cards, medical information, emails, phones) confidential information, NDAs and other documents with detailed personal information so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpsipathpr.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25421</link>
<guid>29e3808cfcf435dea788d9da1c245d03</guid>
<pubDate>Thu, 04 Sep 2025 12:27:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>mydata</b> claims attack for <b>httpsipathpr.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36a902650692184bf87855935c2baae89ea1d5b7fbf2d43706004d42d5d46a5a</i><br /><br />Threat actor <b>description</b>: <i>Integrated Pathology Services90 GB data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>mydata</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rivertown-Surgey-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25416</link>
<guid>383a2a1e8e4bf855f4149671967161bb</guid>
<pubDate>Thu, 04 Sep 2025 05:27:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Rivertown-Surgey-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a11f34108ad4df904e56be3ad055864dc5a433ef86ff76a04b3253d20102414</i><br /><br />Threat actor <b>description</b>: <i>Rivertown Surgery Center is a Medicare-certified ambulatory surgical center specializing in outpatient procedures.
The facility offers general surgery, pain management, foot surgery, and radiology services, supported by modern equipment.
It            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>sandg.local</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25420</link>
<guid>87fff7865acbd081aa2570994204bbcc</guid>
<pubDate>Thu, 04 Sep 2025 01:26:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>sandg.local</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a525eb23b05ae8e9a54ff81666c64f29bf7443af2fbe925044940b4abb5eb879</i><br /><br />Threat actor <b>description</b>: <i>https://shaferpartners.com/    law 370gb data   </i><br />Target victim <b>website</b>: <i>sandg.local</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>omegabiotek.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25419</link>
<guid>89f53faf95dedd155d17d200c2f2df2e</guid>
<pubDate>Thu, 04 Sep 2025 00:25:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>omegabiotek.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dfc5125fc0b9f20cd58c13e068736fc4ea68b47838f8ac5c5d249c36cdc46573</i><br /><br />Threat actor <b>description</b>: <i>Omega Bio-tek is an ISO 9001:2015 certified company specializing in nucleic acid isolation products for clinical and basic research, biotechnology, and agricultural applications. Founded in 1998, the company offers superior nucleic acid extraction technologies, including magnetic beads, silica membranes, and salting-out. These three methods are available in a wide range of various kits and configurations for a total of over 900 products for manual and automated processing. Employees: 145 Revenue: $50.1 Million Industry: Manufacturing   Phone Number:(770) 931-8400 SANNIDHI  ABHINAV  6462589152 Brandy Dailey      +1 770 401 8694 Cynthia Chambers   9194957522 Icaza Ellen        770-596-0554</i><br />Target victim <b>website</b>: <i>omegabiotek.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>CANDhenterprises.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25417</link>
<guid>2243ee303bf3b1042e3d60895273eee0</guid>
<pubDate>Thu, 04 Sep 2025 00:25:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>CANDhenterprises.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53a4e18c85d105ab44d6c28c8fff3b91e1914a4ff282d719a42953b74524607b</i><br /><br />Threat actor <b>description</b>: <i>C&H Enterprises is an ISO compliant custom fabrication Job shop, as well as an industry leader in precision machining. Our experienced and diversified management staff is available to assist you in the design and development of your project. As part of our valued engineering service, we will insure that your parts are manufactured as economically as possible. We are proud of our "Core Capabilities & Strengths" which enable us to provide precision parts to the semi-conductor, medical, defense, and other industries by utilizing the following diverse fabrication capabilities: State-of-the-art CNC Machining Department State-of the-art Inspection Department In-house Leak Testing using a Helium Mass Spectrometer Leak Detector In-house Welding Dept. employs welders that are certified in a variety of metals and weld types for structural and vacuum welding under such qualifications as AWS DI.1 and AWS DI.2.  Employees: 94  Revenue: $23.1 Million Industry: Industrial Machinery Phone Number:(510) 226-6083</i><br />Target victim <b>website</b>: <i>CANDhenterprises.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Moore--Van-Allen</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25418</link>
<guid>dddc6994d5d3cd2cce94b112443e8fc9</guid>
<pubDate>Wed, 03 Sep 2025 23:18:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Moore--Van-Allen</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a63899e1c2406cb48e6f1c35dc437326ae267df5fc5787dc37b08686d011616d</i><br /><br />Threat actor <b>description</b>: <i>Jay Bilas, Of Counsel, appeared on a podcast called "The Dan Patrick Show" on 06/25/2025. Topics discu…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Master-System-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25410</link>
<guid>f48db3cd91ebb288ff33e95493b6329b</guid>
<pubDate>Wed, 03 Sep 2025 22:27:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Master-System-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>577cd74ecdaca80cfcf2923fbf3b8f142d706be5d29e8599cc86165a54d0dc9d</i><br /><br />Threat actor <b>description</b>: <i>Master System develops and supports software and services that deliver enterprise management and collaborative supply chain solutions to thousands of small to midsize distributors in a number of industries.Master System is headquartered in Ar            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>UNIDEL-Ventures-Pvt</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25414</link>
<guid>dedacf1615c66d5fcd7126df8cbefb46</guid>
<pubDate>Wed, 03 Sep 2025 18:38:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>UNIDEL-Ventures-Pvt</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cf4dea74698046a28b70ad45b28aebc3c416ffdf70a7cca935da3d72d289cca3</i><br /><br />Threat actor <b>description</b>: <i>The UniDEL Group has been providing technology solutions and products since 1973. SoftDEL Systems Ltd provides engineering software solutions for the US, European markets and Japanese markets...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jack-Resnick--Sons</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25405</link>
<guid>46c6a6c72edf42b1335217a9eb4b2325</guid>
<pubDate>Wed, 03 Sep 2025 18:27:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Jack-Resnick--Sons</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>182bb7a90036a913195a736dee7d928687085d60baef38b18a0b08e55469ef9d</i><br /><br />Threat actor <b>description</b>: <i>Jack Resnick & Sons provide a variety of real estate availabilities, including notable residential buildings like Symphony House and Gracie Mews.We are going to upload corporate data soon. You will find lots ofcontracts and form containing clients DOB, addresses, phones, emails, financial and accounting files, payment details, and other data.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>stthom.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25411</link>
<guid>6b71c628253026a0f563beb5dd759d41</guid>
<pubDate>Wed, 03 Sep 2025 17:40:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>stthom.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>44c25c7c48bc57270317df6141627bdd7f2c0ab475890d00b4aebe14ab6d1092</i><br /><br />Threat actor <b>description</b>: <i>The University of St. Thomas (UST) is Houston's Catholic University, committed to the religious, ethical and intellectual traditions of Catholic higher education. For more than 70 years, we've been graduating students like you into successful careers in medicine, education, business, public administration and more throughout Houston and across the globe. Our student body reflects the rich diversity of the city itself. We welcome undergraduate and graduate students of all faiths and of no faith. The campus is located in Houston's Museum District and Innovation Corridor, a diverse and vibrant urban environment with professional opportunities. We're just steps from downtown and the famed Texas Medical Center where many students perform prestigious internships. Read more about our mission and vision. Employees:300 Revenue:$64.9 Million Website:www.stthom.edu Phone Number:(713) 522-7911 Lambert, Anne -Vice President (713) 525-6999 Justin Puder -IT Manager (713) 525-3599 Alexander Thomas-Admins Operations Coordinator (713)942-5023</i><br />Target victim <b>website</b>: <i>stthom.edu</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>blytheco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25403</link>
<guid>d268221f68f96be176c05c7de5ad9501</guid>
<pubDate>Wed, 03 Sep 2025 17:27:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>blytheco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>819ebcdde8ab387ca9f72dd01f6f2c2a4f071478d4a6129222896d79ababbc1a</i><br /><br />Threat actor <b>description</b>: <i>Blytheco is a full-service consulting firm that has been working with small and medium-sized businesses since 1980. Blytheco offers a wide range of business management software (ERP, CRM, HCM, marketing automation), backed by exceptional prof            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>CESCONSULT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25407</link>
<guid>75f4b15635b6362df162948b296aaef7</guid>
<pubDate>Wed, 03 Sep 2025 14:41:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>CESCONSULT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>feacb8d760ae88331d3a3592a0f6e1f1e881aeb80f8b9ef1cb7348a6ac1a0f55</i><br /><br />Threat actor <b>description</b>: <i>CES Consultants, Inc. is a engineering firm that specializes in program management, construction management, and design-build solutions.firm founded in 2001 by Rudy M. Ortiz, PE, CGC.  This is a small part of what we downloaded. https://cesconsult.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>TSI-Accessory-GroupStanley-Creations-Inc-iStar-Jewelry-Roman--Sunstone.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25402</link>
<guid>8afb5804f92f8d5f149bfc66d149aa92</guid>
<pubDate>Wed, 03 Sep 2025 14:27:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>TSI-Accessory-GroupStanley-Creations-Inc-iStar-Jewelry-Roman--Sunstone.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd1eeb45203df7b0aa517d5aee6bcce641bd48565ff2b158b8c8e6d2b7d735c8</i><br /><br />Threat actor <b>description</b>: <i>We are going to upload about 35 gb of essential corporate documents of a bunch of companies. You will find in the archives: financial data (audit, payment details,financial reports, invoices), employees and customers information (passports, Social Security Numbers, medical information, emails, phones) confidential information and other documents with detailed personal information so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>NPIAV</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25399</link>
<guid>b2cea2ce8a7b8ee1ad5a97f9170cf234</guid>
<pubDate>Wed, 03 Sep 2025 12:28:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>NPIAV</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b99ede78baca1c8bf51eb2bb6b95fe59d3f72c5a3692735b9c22e3061fdfa2ca</i><br /><br />Threat actor <b>description</b>: <i>NPi Audio Visual Solutions, USA - the company organizes and hosts business events and parties. What happens behind closed doors at private conventions? Now we can peek behind the curtain and find out what the rich and famous really discuss an            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Monterey-Mushrooms</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25396</link>
<guid>09097f6b55431417a44fb77260332781</guid>
<pubDate>Wed, 03 Sep 2025 00:38:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Monterey-Mushrooms</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e926bcbffdfc23a7681c0382867dc29968688e54bab41a7d4a31cb2535fcc24</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Monterey Mushrooms, founded in 1971 and headquartered in Watsonville, California, is a multinational company that cultivates, packs, and distributes fresh market mushrooms for retail, foodservice, and ingredient markets. Its product portfolio includes various types of mushrooms, such as white, brown, specialty, and organic mushrooms.</i><br />Target victim <b>website</b>: <i>montereymushrooms.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.dimarcogroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25391</link>
<guid>a9a2c061a1c2743d489c6863eae6725a</guid>
<pubDate>Tue, 02 Sep 2025 22:26:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>www.dimarcogroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>806c48947c27fbdf7b8f6ecd0596d5b9f208b17db52e1a1359a71feb5cdf4698</i><br /><br />Threat actor <b>description</b>: <i>The DiMarco Group, LLC founded in 1910 and headquartered in Rochester, New York,...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Level-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25388</link>
<guid>92759f3b989bd57b544abacd6cf92d32</guid>
<pubDate>Tue, 02 Sep 2025 16:56:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Level-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>94253093d06fe5a2bd206f6f4cc5ca62be6561f8382c33794617da275430b7a1</i><br /><br />Threat actor <b>description</b>: <i>Level is a B2B2C fintech company comprised of a diverse team from industry-leading companies like Square, Oscar, Google, Uber, and Airbnb. Together, were creating a new payments tech stack to help employers offer more accessible and personalized benefits for their teams. company is headquartered in PO Box 176, New York City, New York, 10013, United State. 167 Employees </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>ArtistsClients</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25394</link>
<guid>4703873a678a5cd835a7500d9a0948d1</guid>
<pubDate>Tue, 02 Sep 2025 15:12:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lunalock</b> claims attack for <b>ArtistsClients</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b11ce3f275019b4588caf9d87de3d3f8fc4c3c94f4319f216030195ed7f8fbd</i><br /><br />Threat actor <b>description</b>: <i>We have breached the website Artists&Clients to steal and encrypt all its data. If you are a user of this website, you are urged to contact the owners and insist that they pay our ransom. If the ransom is not paid, we will release all data publicly on this Tor site, including source code and personal data of users. Additionally, we will submit all artwork to AI companies to be added to training datasets.</i><br />Target victim <b>website</b>: <i>artistsnclients.com</i>]]></description>
<category>lunalock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pooler-Enterprises</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25386</link>
<guid>e61b865c4e3287487f1b8feb13d6215c</guid>
<pubDate>Tue, 02 Sep 2025 14:27:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Pooler-Enterprises</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ab8216ecb8d46c34af4b0454d76688737da67c772aface3a056999b2cc9c870</i><br /><br />Threat actor <b>description</b>: <i>Pooler Enterprises is a seasoned provider of commercial land development services based in Fishers, NY, with over three decades ofexperience. We are ready to upload more than 15Gb files of essential corporate documents such as: financial data (payment details, invoices), employees and customers information (emails, phones, addresses) confidential information and other documents with detailed personal information so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Natare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25387</link>
<guid>a262af3a94c718b89b81bd68713329e9</guid>
<pubDate>Tue, 02 Sep 2025 14:27:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Natare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>51a7055e30208ef43d0bdaed8b5328d77254cc8ad061376b2c24d05759de2945</i><br /><br />Threat actor <b>description</b>: <i>Natare Pools specializes in designing, building, and installing custom stainless steel pools, spas, and related equipment for various applications including competition, commercial, and communityuse. We are ready to upload more than 10Gb files of essential corporate documents such as: financial data (audit, payment details, financial reports invoices), employees and customers information (emails, phones, addresses) confidential information and other documents with detailed personal information so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>GCC-of-America-inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25395</link>
<guid>d5b2473a8cb10baff0ddae36ca49efa9</guid>
<pubDate>Tue, 02 Sep 2025 14:12:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>GCC-of-America-inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c989d44ea0b89fdeadc96d9a8cf9b7520c788aa51249fdf16388b55ad073e17b</i><br /><br />Threat actor <b>description</b>: <i>Data breach at one of the largest cement and concrete producers in North America.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pittsburgh-Gastroenterology-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25385</link>
<guid>ed043feaff3fc5794439b33118c12256</guid>
<pubDate>Mon, 01 Sep 2025 21:18:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Pittsburgh-Gastroenterology-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca467ca2c4ba21833c5ffa1869c3734d3a181c30d70fa39dabcd333ba9de9fe1</i><br /><br />Threat actor <b>description</b>: <i>Pittsburgh Gastroenterology Associates specializes in the diagnosis and treatment of digestive health issues, focusing on diseases of the esophagus, stomach, intestines, liver, gallbladder, and pancreas. The organization provides a comprehensive range of services, including state-of-the-art diagnostic and therapeutic options, particularly emphasizing screening colonoscopy starting at age 45 due to an increase in colorectal cancer among younger individuals. They aim to deliver high-quality medical care with a team of skilled providers dedicated to patient compassion and support. Their intended clientele includes individuals needing gastroenterology services and preventive screenings.</i><br />Target victim <b>website</b>: <i>pghgastro.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>bthcpa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25384</link>
<guid>3ab2501f57ad3a624edf8599dc6237d5</guid>
<pubDate>Mon, 01 Sep 2025 19:10:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>bthcpa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>995955223a8424a69eaedaf66db45489e124019d5ad6c06e23fa5f8222a7e45e</i><br /><br />Threat actor <b>description</b>: <i>BTH CPA is a professional accounting and advisory firm based in the United States, offering a full range of financial …</i><br />Target victim <b>website</b>: <i>bthcpa.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>usai.io</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25382</link>
<guid>0adde37468be10ecf593f1586c143494</guid>
<pubDate>Mon, 01 Sep 2025 19:08:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>usai.io</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd2ca5df0e6126d4b502ba30e40123ccffdfda7d6dd8ad7c6fa4b4a96f07b8df</i><br /><br />Threat actor <b>description</b>: <i>USAI is a U.S.-based artificial intelligence and technology solutions provider. The company develops AI-driven platforms and software designed to optimize …</i><br />Target victim <b>website</b>: <i>usai.io</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>wilsonatllaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25381</link>
<guid>caa0fe665af380b663e4cd90f4e976c8</guid>
<pubDate>Mon, 01 Sep 2025 19:07:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>wilsonatllaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d207c8b056ef6910abbff0eb76b723e8efe11b5d0f5d575f5623fd9a9a56b3f5</i><br /><br />Threat actor <b>description</b>: <i>Wilson AT Law is a U.S.-based legal practice specializing in areas such as personal injury, family law, estate planning, and …</i><br />Target victim <b>website</b>: <i>wilsonatllaw.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>scottschiff.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25380</link>
<guid>ced398e2e89ba5d2840497063e42b1ad</guid>
<pubDate>Mon, 01 Sep 2025 19:07:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>scottschiff.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>686b1f4133dff83d43ff6406503ab983b4eb7736f4931ce9e5a8395e3a573500</i><br /><br />Threat actor <b>description</b>: <i>Scott Schiff & Associates is a U.S.-based law firm located in Columbus, Ohio, with a specialization in personal injury and …</i><br />Target victim <b>website</b>: <i>scottschiff.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>mdneal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25379</link>
<guid>402de63be8bc8040dd2878205deac386</guid>
<pubDate>Mon, 01 Sep 2025 19:06:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>mdneal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>20242f92833027ce9afa771f15cc308e8d0cab6596ff2f765062300edccc4c1f</i><br /><br />Threat actor <b>description</b>: <i>M.D. Neal Engineering is an American engineering consulting company specializing in structural engineering, design, and project management. The firm provides …</i><br />Target victim <b>website</b>: <i>mdneal.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>ellison-mills.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25378</link>
<guid>bdc9f6ada518791b8b76e8a07021e145</guid>
<pubDate>Mon, 01 Sep 2025 18:38:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>ellison-mills.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b755bb06810520d8e0e3732df4a9fe4d4cdf98d1356c8bd1e22eac8e1f250d5e</i><br /><br />Threat actor <b>description</b>: <i>Ellison-Mills Contracting is a family-oriented company specializing in wet utility and roadway infrastructure in Southern Arizona. They are committed to cultivating strong relationships with clients and team members while delivering quality construction management for various project types. With extensive experience in multimillion-dollar projects, the company prides itself on its ability to complete work on time and under budget across several contracting methods.</i><br />Target victim <b>website</b>: <i>ellison-mills.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>waterfordsurgicalcenter.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25376</link>
<guid>372680a47ac1b06023127cc5830f0441</guid>
<pubDate>Mon, 01 Sep 2025 17:41:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>waterfordsurgicalcenter.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3c464dd5d86b6f28f639f854f72f76da27841b85cbd32d8db727e2096964a85</i><br /><br />Threat actor <b>description</b>: <i>Waterford Surgical Center is a specialized healthcare facility in the United States dedicated to outpatient surgical care. The center provides …</i><br />Target victim <b>website</b>: <i>waterfordsurgicalcenter.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>oiwky.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25375</link>
<guid>262717604b93578b7309e4a57fe91447</guid>
<pubDate>Mon, 01 Sep 2025 17:41:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>oiwky.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c546e4f8f7809122acefe5556bb2e1baafd706752c1c0d9cfdbf63232ccd2af</i><br /><br />Threat actor <b>description</b>: <i>Oiwky is a U.S.-based technology and innovation company focused on providing IT solutions, digital platforms, and business support services. The …</i><br />Target victim <b>website</b>: <i>oiwky.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Genmark-Automation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25367</link>
<guid>c3c7377014553b7643f4f43a6f679360</guid>
<pubDate>Mon, 01 Sep 2025 17:27:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Genmark-Automation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa6a3702e06ed2ad02929f77139fa714091ea45f34264256423f5ab5a27acd54</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1985 and headquartered in California. Genmark Automation is a worldwide developer and manufacturer of tool and fab automation equipment solutions for the semiconductor, flat panel, solar, LED, data storage, and associated industries.We are ready to upload more than 47Gb files of essential corporate documents such as: financial data (audit, payment details,financial reports, invoices), employees and customers information (green cards, passports, driver's license, Social Security Numbers, credit cards, death/birth certificate, medical information, emails, phones, addresses) confidential information, NDAs and other documents with detailed personal information so on. The company management refused to take the situation seriously. So their employees and customers will have to face all the consequences of their data being compromised.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Automated-Business-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25368</link>
<guid>b51e4564bcafee1b797c2ef510e0f989</guid>
<pubDate>Mon, 01 Sep 2025 17:27:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Automated-Business-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc0435fdd167fbc905725ab8b4c8ebc35a1e6787b70fe48552eb516c252f63dc</i><br /><br />Threat actor <b>description</b>: <i>Automated Business Solutions, Inc. is a designer and supplier of office equipments and comprehensive business solutions.We are ready to upload more than 93Gb files of essential corporate documents such as: financial data (audit, payment details,financial reports, invoices), employees and customers information (credit cards, death certificates, medical information, emails, phones, addresses) confidential information, NDAs and other documents with detailed personal information so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>TAK-Communications-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25373</link>
<guid>e51e26bd5855b6ea5fc7bcc2c4010124</guid>
<pubDate>Mon, 01 Sep 2025 17:13:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>TAK-Communications-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>49c54749f8afa6e5bfbd96148e996a35e86b9d136c417da6713ef4f60381e01b</i><br /><br />Threat actor <b>description</b>: <i>TAK Communications, Inc. is a nationally recognized Cable Installation Contract Firm for the Cable TV and Telecommunications industry. TAK provides a wide variety of services including Cable Installation, Fulfillment Services, Direct Sales, Underground Construction, Structured Cabling and more. TAK provides countless services for its Cable TV and Telecommunications business partners, with the overall customer experience at the forefront of our minds. Whether you are a TAK business partner, company employee, or consumer, expect nothing less than a positive and professional experience from everyone at TAK Communications, Inc. At TAK Communications, Inc. we understand any company is only as good as its employees and our employees are the most important part of our company. When becoming an employee at TAK Communications, Inc., you are part of a team that looks out for your best interests. We set our employees up for success and are happy to say we have countless veteran employees that are making their career with TAK Communications, Inc. Cable, Internet, Phone, Installation, Direct Sales</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>gmpc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25371</link>
<guid>fa5723a60fc448c4ee84819937dfdeb7</guid>
<pubDate>Mon, 01 Sep 2025 16:08:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>warlock</b> claims attack for <b>gmpc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0383df5283e1b0339b47aca3c417eb547bcb5b9f01f5ecf47a5ce7938d5bb0ca</i><br /><br />Threat actor <b>description</b>: <i>No description provided.</i><br />Target victim <b>website</b>: <i>gmpc.com</i>]]></description>
<category>warlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>oakland-museum-of-california</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25361</link>
<guid>b34b82f8014b6e1c1f3274bb1d6fe0dd</guid>
<pubDate>Mon, 01 Sep 2025 14:27:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>oakland-museum-of-california</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>31bbe60b1e979a914a13c5af82d3bc235d840b7c7f0cbd86471bd926905e7342</i><br /><br />Threat actor <b>description</b>: <i>Established in 1969, Oakland Museum of California provides collections, exhibiti...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>PathoQuest-Biotechnology-Research</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25360</link>
<guid>10a55f345c206822c64a07d7728aef73</guid>
<pubDate>Mon, 01 Sep 2025 11:29:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>PathoQuest-Biotechnology-Research</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1612e005bc9dfb42e9fccb99b208e5842d41e89881de69b31358eeaea992313</i><br /><br />Threat actor <b>description</b>: <i>PathoQuest-Biotechnology Research, USA-France The company conducts research on innovative biopharmaceuticals under complex testing conditions on two continents. PathoQuest offers a proven next-generation sequencing (NGS) approach to biosafety            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arboris</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25366</link>
<guid>0d1e0d602ebcba3dec4cff58832c7181</guid>
<pubDate>Mon, 01 Sep 2025 10:46:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Arboris</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3630adee7ba348b28e85e0a90c1e80af2bee6086b9f343879b624c6eb0021d5</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.arboris-us.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Juggernaut</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25365</link>
<guid>2ee48d7685054b85f9e9d9b8b67c404f</guid>
<pubDate>Mon, 01 Sep 2025 10:46:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Juggernaut</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>44cabffd154f37983b8ef42b619cc404adc33d012a6574a78987cd1e22747350</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.juggernautdesign.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vanderpool-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25364</link>
<guid>f319ba8aa8a10c4d0df2b8acf127be64</guid>
<pubDate>Mon, 01 Sep 2025 10:45:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Vanderpool-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>21ae66a3acc7b5e5bab35bbb1ec69777a22eafe5fd5e1662b1459d5fde3519f9</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.vanderpoolinc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>All-States-Materials-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25363</link>
<guid>29f6bff5f05251565c618bbb35143c06</guid>
<pubDate>Mon, 01 Sep 2025 10:44:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>All-States-Materials-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b9ea4af9c27e68fc4b05f93a6c4831010d58db614fadc1fc1259aa26a887122</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.asmg.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>LEVEL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25362</link>
<guid>04678698d4bd6a8a5b775ec3ac878191</guid>
<pubDate>Mon, 01 Sep 2025 10:19:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>desolator</b> claims attack for <b>LEVEL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1151ee434e0fb3a31ac9ac617414051e380d2f57e32de65a27bfb4b001108118</i><br /><br />Threat actor <b>description</b>: <i>Status: waiting | Expiration: 2025-09-05T00:00</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>desolator</category>
</item>
<item xmlns:dc='ns:1'>
<title>LS-Proline</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25358</link>
<guid>51a9c5784bc9459856a826362c057737</guid>
<pubDate>Sun, 31 Aug 2025 01:53:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>LS-Proline</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e20c192a33f96301984e1ac69edbe01c3e02a18ef6c01f8d3323320f7bc3f8d6</i><br /><br />Threat actor <b>description</b>: <i>L&S Proline, USA - Drill, baby, drill! L&S Proline is a full-service company specializing in solutions for the oil and gas industry, offering a range of products and services, including measurement control equipment, structural fabrication, a            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ABM-Wireless-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25348</link>
<guid>27810d8aed732a494b7c10f1aaabcc8e</guid>
<pubDate>Sat, 30 Aug 2025 18:24:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>ABM-Wireless-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eb87d4dac13ac3d574b1e1bf4bf7c48056a7cfb59ab194928bec71dd6be305da</i><br /><br />Threat actor <b>description</b>: <i>Inscope is a New York based Master Dealer in the wireless distribution space. Established in 2002, we have grown to become one of the largest Master Dealers for...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hilco-Metal-Building--Roofing-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25349</link>
<guid>c90a356873c27f2033848630133bbf22</guid>
<pubDate>Sat, 30 Aug 2025 18:24:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Hilco-Metal-Building--Roofing-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7613fbc87ee7d56ab368d1ecf77bf7fcf8e6cca1909bc6844a728396756a9480</i><br /><br />Threat actor <b>description</b>: <i>Hilco Metal Building & Metal Roofing Supply specializes in providing a comprehensive range of metal buildings, roofing materials, and custom-designed arenas spe...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Park-Country-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25350</link>
<guid>c7d67339105519c3dae1c323022dbd04</guid>
<pubDate>Sat, 30 Aug 2025 18:24:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Park-Country-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96691246c20b704f84fee900521a4f31c7ef5bfc6d2e706a11ace4633c1378b0</i><br /><br />Threat actor <b>description</b>: <i>(financial documentation and clients' data internally) Park Country Club is a premier traditional country club located in Western New York. The club offers a co...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Engineered-Components</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25353</link>
<guid>8f91e3c119da5993c7ff3bbdd6fb1f32</guid>
<pubDate>Sat, 30 Aug 2025 18:24:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Engineered-Components</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7372005c5b005a4f432c70d679158823bf7ca0ff30e74e9e7212c5e7ba85684</i><br /><br />Threat actor <b>description</b>: <i>(Financial documents, counterparties, clients) We also distribute a multitude of other components that are utilized by original equipment manufacturers worldwid...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>sandersonmanagement.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25357</link>
<guid>d865f737d6777cdadaa957a87662d7ea</guid>
<pubDate>Sat, 30 Aug 2025 18:05:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>sandersonmanagement.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ddce09d56ab868cf6b37066150a025f6bb5fb1547811b933299da4cb01239a86</i><br /><br />Threat actor <b>description</b>: <i>Sanderson Management is a renowned property management company based in the United States, specializing in the efficient and effective management …</i><br />Target victim <b>website</b>: <i>sandersonmanagement.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>OB-GYN-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25347</link>
<guid>9a1a05c42c96b161ecd2884b758e114a</guid>
<pubDate>Sat, 30 Aug 2025 12:23:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>OB-GYN-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>65e4d06fa3491e11eb351220d4faaa04197363052c076a41270c7bbfc8fe1b17</i><br /><br />Threat actor <b>description</b>: <i>OB/GYN Associates offers comprehensive women's healthcare from obstetrics and pregnancy to gynecological care in Reno, Nevada.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>atlanta-neighborhood-charter-school</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25337</link>
<guid>aac1ea0f73d4664c59969f5b9d6fd41e</guid>
<pubDate>Sat, 30 Aug 2025 00:28:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>atlanta-neighborhood-charter-school</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>98e593597ecc0f9aff610f8d66a9cd3f70c0d75b9e7d99c7158509ec6f311acc</i><br /><br />Threat actor <b>description</b>: <i>Atlanta Neighborhood Charter School (ANCS) is a K-8 public charter school in Atlanta, recognized for its academic excellence and innovative programs. However, they could not make a program to protect their own students. All information on the            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>companionsandhomemakers.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25345</link>
<guid>8d4965eaf92972d652fd44ece6f79533</guid>
<pubDate>Fri, 29 Aug 2025 21:37:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>companionsandhomemakers.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>00fd73d2adfa551bbef3e447fca0a4c0c8950965572ca1a3633449f85fe9a3f5</i><br /><br />Threat actor <b>description</b>: <i>Companions & Homemakers, based in Connecticut, is a nonprofit home-care service provider with more than 30 years of experience. It …</i><br />Target victim <b>website</b>: <i>companionsandhomemakers.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>hardwicktactical.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25340</link>
<guid>78ade5b560946211ce63652717b37aea</guid>
<pubDate>Fri, 29 Aug 2025 21:34:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>hardwicktactical.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b56a648d27a2f787bee4af89dd2ea98c386f533b4acf9a772eaa24202a6d057</i><br /><br />Threat actor <b>description</b>: <i>Hardwick Tactical Corporation, located in Cleveland, Tennessee, is a historic American manufacturer of military and professional uniforms. Founded in 1880, …</i><br />Target victim <b>website</b>: <i>hardwicktactical.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>templeemanu-el.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25339</link>
<guid>6dcb66034aed7493a93ef9b231ecaf14</guid>
<pubDate>Fri, 29 Aug 2025 21:33:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>templeemanu-el.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a7660648889dbb2211abbec92fc7fe8b6a44e101f41ee03892213af6a052236</i><br /><br />Threat actor <b>description</b>: <i>Temple Emanu-El, located in Dallas, Texas, is one of the largest and most historically significant Reform Jewish congregations in the …</i><br />Target victim <b>website</b>: <i>templeemanu-el.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>thecelestehotel.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25338</link>
<guid>9b985eb1206505396c15126062c31bef</guid>
<pubDate>Fri, 29 Aug 2025 21:33:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>thecelestehotel.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f516211a9f9e46968baf990203ee09ed43c6d4bb0087b411b2010dc5e6797521</i><br /><br />Threat actor <b>description</b>: <i>The Celeste Hotel is a boutique hotel located in Orlando, Florida, within the University of Central Florida (UCF) campus area. …</i><br />Target victim <b>website</b>: <i>thecelestehotel.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>allphaselandscape.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25333</link>
<guid>8a005b6bbfa78c441688ee23f5756e04</guid>
<pubDate>Fri, 29 Aug 2025 18:27:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>allphaselandscape.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96031a9d7798a30df3d10585da278c93651e11b238dafd9e530888b5e77051f0</i><br /><br />Threat actor <b>description</b>: <i>All Phase Landscape, USA is a company engaged in landscaping, design, and service of green areas in parks, around administrative, office, and residential buildings. Making the surrounding space more beautiful and environmentally friendly is o            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ibew1547.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25334</link>
<guid>9ec80d58ed3495c213848b3957cf8ea1</guid>
<pubDate>Fri, 29 Aug 2025 18:27:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>ibew1547.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>20fe14644794d4570464ceec7336362920cc2264af493756a72a8e302801dd85</i><br /><br />Threat actor <b>description</b>: <i>IBEW Local 1547, USA - a union in Alaska that is supposed to provide safety and protect the rights of electric utility and communications workers, local officials, health care workers, and many other professionals. Safety - failed. Protection            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ogdenpubs.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25335</link>
<guid>6aa899171430d12d1ed53cc8c02dc3d6</guid>
<pubDate>Fri, 29 Aug 2025 18:27:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>ogdenpubs.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>35ee8cde388e36ed94e3572369ea257c84305c9ffc66d9812e88700430e97efc</i><br /><br />Threat actor <b>description</b>: <i>Ogden Publications Inc., USA - history repeats itself. One of the oldest publishing houses in the USA repeats its mistake time after time and has no experience. There is no other word than “idiocy” for their approach to problem solving. O            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>RMO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25327</link>
<guid>ebfebc42d8f8dd67da25a2dcab4ac8ff</guid>
<pubDate>Fri, 29 Aug 2025 13:27:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>RMO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>093b9e911771433ad13b11ae12c364d7c86cfd72e35d2fb4aba2e49cf5b02d76</i><br /><br />Threat actor <b>description</b>: <i>RMO Orthodontics is a leading manufacturer and supplier of innovative and high-quality orthodontic instruments and supplies. They offer a comprehensive catalog of products including brackets, archwires, and accessories, catering primarily to orthodontic professionals. We are going to upload company data soon. You will find financialdata (audit, payment details,financial reports, invoices), employees and customers information (passports, emails, phones, SocialSecurity Cards, birth certificate) confidential information, NDAs and other documents with detailed personal information so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Fredericks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25329</link>
<guid>6a639c52538fd7bb3e1186724afbe9b2</guid>
<pubDate>Fri, 29 Aug 2025 12:27:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-Fredericks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5532f62b4f3d648bcc8ba4b8d8588b69c231734f702735dff45650fb9c372338</i><br /><br />Threat actor <b>description</b>: <i>The Fredericks Company is a leading manufacturer and innovator specializing in tilt and vacuum measurement sensors. We are going to upload company data soon. You will find financialdata (audit, payment details,financial reports, invoices), employees and customers information (emails, phones) confidential information, NDAs and other documents with detailed personal information so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Delta-Information-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25323</link>
<guid>b8fd187b3f6b41d95bbc6c831075f367</guid>
<pubDate>Fri, 29 Aug 2025 03:20:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cephalus</b> claims attack for <b>Delta-Information-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be8e8ed284468c47c786481f924a56289e3aec553fc9e9a4b83e24d8b5878ba4</i><br /><br />Threat actor <b>description</b>: <i>We have got all the software and hardware code,and got 800G+ of internal data. The link will coming soon...
Of if anyone is intersted in purchasing the code,pls contact me</i><br />Target victim <b>website</b>: <i>acroamatics.com</i>]]></description>
<category>cephalus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Town-of-Chatham-MASSACHUSETTS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25308</link>
<guid>6fe5f41ad53538d0b9c78ba3a5603d67</guid>
<pubDate>Fri, 29 Aug 2025 02:27:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Town-of-Chatham-MASSACHUSETTS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5583d5e26a1fca873b5b57c14118584a38181d485e10d6f890854993c7fde5eb</i><br /><br />Threat actor <b>description</b>: <i>Chatham, Massachusetts is located at the southeast tip of Cape Cod.

Chatham MA is a municipal government that provides essential services to its residents, including emergency services, utilities, and community resources. The town focuses             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>gmcontractinginc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25302</link>
<guid>7b763dcb78dd4c378a4170623a213821</guid>
<pubDate>Thu, 28 Aug 2025 21:26:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>gmcontractinginc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d6e8173a7730940edef7975de8c5238e3955e2946d0e3f1ec0b992c20adc623e</i><br /><br />Threat actor <b>description</b>: <i>GM Contracting offers a full range of residential utility construction services. GM Contracting has years of residential experience with water and sewer utilities. In addition to traditional construction methods, GM Contracting is a full serv            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kafka-Conveyors--Equipment-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25316</link>
<guid>51f2e9ae8acea3cede0ab0b8fbcd973d</guid>
<pubDate>Thu, 28 Aug 2025 21:23:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Kafka-Conveyors--Equipment-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d72b41e23e8c9497e0ae7f737157d1a2f581e00a521528b12ca394353c259c08</i><br /><br />Threat actor <b>description</b>: <i>Kafka Conveyors & Equipment Inc., offers a variety of conveyor types and sizes, such as stacking conveyors, transfer conveyors, and stackable conveyors. We also offer to our customers recycling portable picking station and portable shingle feeders. All conveyors are custom designed and suited toward our customers' needs and different kinds of materials. Our conveyors are used in a variety of applications, transferring and stockpiling a wide range of materials, stone, sand & gravel quarries, asphalt, coal, salt, woodchips, topsoil, recycling, concrete recycling, and scrap yards. They are also used in the loading and unloading in rail yards, ship and barg docks.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Firelands-Scientific</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25304</link>
<guid>fdb0dfc7a10173835252be882819b650</guid>
<pubDate>Thu, 28 Aug 2025 18:02:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Firelands-Scientific</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b3982b24f09ff43000063a63af3b1e79b83781429fc8daebd77d2d7a3d19193</i><br /><br />Threat actor <b>description</b>: <i>Firelands Scientific</i><br />Target victim <b>website</b>: <i>firelandsscientific.com</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>summitcollege.eduUSA370GB</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25303</link>
<guid>1f8107db1348b9e5ddcf83489018a5d2</guid>
<pubDate>Thu, 28 Aug 2025 15:22:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>summitcollege.eduUSA370GB</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>86e30975a087781abd66e65269d1593d89b03aaeba0241a4e4be4b315411c743</i><br /><br />Threat actor <b>description</b>: <i>Unknown - Summit College</i><br />Target victim <b>website</b>: <i>summitcollege.edu/USA/370GB</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Colorado-Health-Network-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25301</link>
<guid>030d985224c7b144b7d3f3e57e912ed8</guid>
<pubDate>Thu, 28 Aug 2025 07:09:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cephalus</b> claims attack for <b>Colorado-Health-Network-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fbb02776acf6fe90861339942d21c4f9f8796a84460bdd9e88507f711dee6fc7</i><br /><br />Threat actor <b>description</b>: <i>900G+ data coming soon</i><br />Target victim <b>website</b>: <i>coloradohealthnetwork.org</i>]]></description>
<category>cephalus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Texas-Pregnancy-Care-Network</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25300</link>
<guid>049251c63a428a409b576d20a86ec031</guid>
<pubDate>Thu, 28 Aug 2025 02:40:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cephalus</b> claims attack for <b>Texas-Pregnancy-Care-Network</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>790650cb7caa995986ff2fd928c186d112f20524e476b364d12ef2e3c9ee848f</i><br /><br />Threat actor <b>description</b>: <i>coming soon</i><br />Target victim <b>website</b>: <i>texaspregnancy.org</i>]]></description>
<category>cephalus</category>
</item>
<item xmlns:dc='ns:1'>
<title>wilderlawfirm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25299</link>
<guid>8631f219500638a09ee08a3033f25f43</guid>
<pubDate>Thu, 28 Aug 2025 02:39:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cephalus</b> claims attack for <b>wilderlawfirm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1c50c95064d1cb2ecb57465f8cb96d669e81e71d10931b61d6cde3c95b3ae0f</i><br /><br />Threat actor <b>description</b>: <i>coming soon</i><br />Target victim <b>website</b>: <i>wilderlawfirm.com</i>]]></description>
<category>cephalus</category>
</item>
<item xmlns:dc='ns:1'>
<title>climaxportable.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25296</link>
<guid>bb97e7d1b0e54df5e1ab088ecdfb4079</guid>
<pubDate>Wed, 27 Aug 2025 23:40:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>climaxportable.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d1e4d19e467fa00cd80336d2acb7bd1895d637a2d7dfff46db8fb4dcdb5b74d9</i><br /><br />Threat actor <b>description</b>: <i>CLIMAX, founded in 1966 and headquartered in Newberg, OR., is a provider of portable machining, welding, and testing systems to optimize performance, efficiency, and safety within the Oil & Gas, Mining & Heavy Construction, Power Generation, Shipbuilding & Repair, and Transportation industries. Employees: 136 Revenue: $40 Million Industry: Industrial Machinery    Phone Number:(503) 538-2185</i><br />Target victim <b>website</b>: <i>climaxportable.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Smile-Spa</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25291</link>
<guid>6b17d006a2ed6f12f07c7ea60b8002b5</guid>
<pubDate>Wed, 27 Aug 2025 17:27:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>The-Smile-Spa</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>966af84ff5585d17f7a000353ddf53ed1200f7e88eaeb4bc7fe21c7d7f01fdf3</i><br /><br />Threat actor <b>description</b>: <i>At the Smile Spa in Baton Rouge, LA, Dr. Aimee Russo-Mounger provides a variety of dental and spa services. Schedule a dentist appointment or fun spa day.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>allmaxnutrition.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25294</link>
<guid>5d8dc5dbd84f605017f1c835da6031d7</guid>
<pubDate>Wed, 27 Aug 2025 15:39:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>allmaxnutrition.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9487a2a701da07f66bd459d442c8f63e3beffb090dee6a04af8f6f9dda53af55</i><br /><br />Threat actor <b>description</b>: <i>ALLMAX Nutrition is a professional grade supplements provider for advanced bodybuilding and training. The company is headquartered in North York, Ontario, Canada. Employees: 83 Revenue: $5 Million Industry: Retail    Phone Number:(416) 223-4561</i><br />Target victim <b>website</b>: <i>allmaxnutrition.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Weathercraft-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25286</link>
<guid>4b5fb5ef53ac99fb4961f6844ce0dd43</guid>
<pubDate>Wed, 27 Aug 2025 15:27:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Weathercraft-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f73efeb2135cf3869c6dab3d5c38d3f793795e8aebc17801b1856b308ea1449b</i><br /><br />Threat actor <b>description</b>: <i>Contractor Specializing in Roofing, Siding, Gutters, Windows, and Overhead Door Installation
In 1976, Weathercraft of North Platte was founded by Alan Erickson and Bill Livengood, branching out from Weathercraft of Lincoln, NE.


Weatherc            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dance-Brothers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25293</link>
<guid>77d40045c24c613463c3eef0732475f3</guid>
<pubDate>Wed, 27 Aug 2025 15:13:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Dance-Brothers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>edc327903b06315a3119a944239e704e838cb30bb0644da33d38128f2765e07b</i><br /><br />Threat actor <b>description</b>: <i>Dance Brothers, Inc. is a full service cast-in-place concrete contractor that specializes in commercial, industrial, and government projects. With over 40 years of experience, they have expertise in various structural concrete construction projects including heavy foundations, steel frame buildings, and high/mid-rise concrete frames. Their commitment to quality ensures that each project is completed to the satisfaction of owners, architects, and engineers. They offer a wide range of services, including concrete footings, walls, slabs, and precast structures.</i><br />Target victim <b>website</b>: <i>www.dancebrothers.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>ZCORP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25295</link>
<guid>5d7bec8c05ebb017758028aa34da27b1</guid>
<pubDate>Wed, 27 Aug 2025 15:12:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>ZCORP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c59fdfde978adedf6b69a546015fe4c34bde9ac5d97dc664878a54911d444bfa</i><br /><br />Threat actor <b>description</b>: <i>ZCORP ZCORP is a technology enterprise based in Princeton, NJ, specializing in providing innovative products, services, and tools to help clients navigate the challenges of a rapidly evolving marketplace.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Echo</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25287</link>
<guid>793a0cce41071c3362bed8fddeaa2b15</guid>
<pubDate>Wed, 27 Aug 2025 14:30:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Echo</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87845cc975a2d37cb5ea593f8f54ca62ab656c4000013c1701f0749bbbbec57f</i><br /><br />Threat actor <b>description</b>: <i>Echo is an industry leader in the design, marketing and distribution of home and fashion accessories. Echo is as diverse in its color palette and patterns as it is rich in its family heritage andhistory. Since 1923, Echo has focused on the principles of creativity, service, innovation and quality established by its founders, Edgar and Theresa Hyman.We are ready to upload more than 331GB files of essential corporate documents such as: financial data (audit, payment details, invoices), employees and customers information (driver's license, Social Security Numbers, phones, emails, death/birth certificate, medical information) confidential information, NDAs and other documents with detailed personal information so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bens-Asphalt</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25288</link>
<guid>b6f05a7baab2fe0eea07e59bd5b0b317</guid>
<pubDate>Wed, 27 Aug 2025 14:30:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Bens-Asphalt</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9d15571a03eb937ea54c024bcb198f9bdbcdd92df24f73d8fff43725decec952</i><br /><br />Threat actor <b>description</b>: <i>Ben's Asphalt is an asphalt maintenance & parking lot management company in Southern California with a national presence. The company was founded in 1961 and is headquartered in Santa Ana.We are ready to upload more than 100GB files of essential corporate documents such as: financial data (audit, payment details, invoices), employees and customers information (phones, emails, medical information) confidential information, NDAs and other documents with detailed personal information so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>brebeuf.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25285</link>
<guid>1ef039b8c360653698d917512eb41140</guid>
<pubDate>Wed, 27 Aug 2025 12:27:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>brebeuf.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d0717bc49f08e7f084c66cc33a2bc11ce7e43e8877a33a82db47553ee812412</i><br /><br />Threat actor <b>description</b>: <i>Brebeuf Jesuit Preparatory School, USA - cut off and in trouble with the law. A small Jesuit school in Indianapolis got attention in 2019 when it refused to fire a teacher who was in a gay marriage. The school was then cut from the Archdioces            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>singersf.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25284</link>
<guid>f331db13ff819dd8efd8319b48f4a66c</guid>
<pubDate>Wed, 27 Aug 2025 10:27:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>singersf.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f0ad46579348cd51c430a3f4b1e530d0df8d118b96a599c711548b31c5cf3a51</i><br /><br />Threat actor <b>description</b>: <i>Singer Associates, USA - Money has no odor. The company is cleaning up its reputation and washing other company's dirty laundry. It used to be done by laundresses and asenizers, now it's done by PR people. One of them, Sam Singer. He bought h            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Logan--Mencuccini</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25282</link>
<guid>6ee684091fe7cba88c97f114350cb2ea</guid>
<pubDate>Tue, 26 Aug 2025 18:47:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Logan--Mencuccini</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>62f816af9e90ae2013115b5ab7871f0e521b616f3228f9722ed81b6c6c621a7a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.torringtonlaw.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Edward-J-McKarski</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25281</link>
<guid>2b7a26a14d10d78513786ac0a0e811ed</guid>
<pubDate>Tue, 26 Aug 2025 18:46:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Edward-J-McKarski</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d8e2281f23f28ea73f84b0abce34cb1ff0465cd8cb6b7123b5cb423f61f72f8c</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.mckarski-law.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Banville-Wine-Merchants</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25280</link>
<guid>02c7b9e35b5abe16eff4721993beb0fd</guid>
<pubDate>Tue, 26 Aug 2025 18:45:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Banville-Wine-Merchants</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>586b77112643d5a962436a4c491c85a00ae1279480350886c36de447a69a7280</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.banvillewine.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Premier-Realty-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25278</link>
<guid>28144c5d22c74864cee1b3eedbce3c85</guid>
<pubDate>Tue, 26 Aug 2025 18:44:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Premier-Realty-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7119630aa8a19ffe2dec38661600b22a036c24860313b3101bc0c803f78605d9</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.premierrealtygroup.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Motor-Controls-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25250</link>
<guid>a4589a60ea90b98f8f75780b4c829e9a</guid>
<pubDate>Tue, 26 Aug 2025 15:23:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Motor-Controls-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>02fefbfb7203de0002e50319d65ec585fa58bb10a7212a65df20b5391b659815</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>txpregnancy.org---Fake-Abortion-Clinics-Exposed</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25277</link>
<guid>c64c7085e3ecb77c60caf49560a1ea67</guid>
<pubDate>Tue, 26 Aug 2025 15:03:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cephalus</b> claims attack for <b>txpregnancy.org---Fake-Abortion-Clinics-Exposed</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d0bab92aa20f2c96275d090ed0c59bc077ddfa2e84e1e63a8213890b958514da</i><br /><br />Threat actor <b>description</b>: <i>coming soon</i><br />Target victim <b>website</b>: <i>txpregnancy.org</i>]]></description>
<category>cephalus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lewis-Baach-Kaufmann-Middlemiss-PLLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25275</link>
<guid>40547606fba6796b5cded9cf8f7b6062</guid>
<pubDate>Tue, 26 Aug 2025 14:59:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cephalus</b> claims attack for <b>Lewis-Baach-Kaufmann-Middlemiss-PLLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b45300d51d4f204a2d57f882d3971856d34889b4d06f9b7b3ea21a05886941ef</i><br /><br />Threat actor <b>description</b>: <i>coming soon</i><br />Target victim <b>website</b>: <i>lbkmlaw.com</i>]]></description>
<category>cephalus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lee--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25269</link>
<guid>a3e03b54faf412c2ac7250d6974c15cb</guid>
<pubDate>Tue, 26 Aug 2025 14:58:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cephalus</b> claims attack for <b>Lee--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>17327630e0a4942da94f7f1758869f9b757c044fd324a0b86494370b03815ff7</i><br /><br />Threat actor <b>description</b>: <i>Lee & Associates DATA LEAK | (TB)</i><br />Target victim <b>website</b>: <i>lee-irvine.com</i>]]></description>
<category>cephalus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sherman-Silverstein-Kohl-Rose--Podolsky-P.A.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25274</link>
<guid>ca4e13f25e6ea38d8d1a263b675331f6</guid>
<pubDate>Tue, 26 Aug 2025 14:58:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cephalus</b> claims attack for <b>Sherman-Silverstein-Kohl-Rose--Podolsky-P.A.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db6bedd51b298e57442e8102c98e24ac8471d8785aab4bb828bc253312a2a1a7</i><br /><br />Threat actor <b>description</b>: <i>SSKRPLAW DATA LEAK | (5GB+ ZIP)</i><br />Target victim <b>website</b>: <i>sskrplaw.com</i>]]></description>
<category>cephalus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Guerrero-Mears-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25273</link>
<guid>cda81c6cc858986f2be6ad43c64e5c99</guid>
<pubDate>Tue, 26 Aug 2025 14:57:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cephalus</b> claims attack for <b>Guerrero-Mears-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f0012f2d69fd0b94ac7216ae16fc1a6a1e8af492dcde89d59cec4e4961f58079</i><br /><br />Threat actor <b>description</b>: <i>Guerrero Mears LLP DATALEAK | (FORGOT THE SIZE)</i><br />Target victim <b>website</b>: <i>gmllp.com</i>]]></description>
<category>cephalus</category>
</item>
<item xmlns:dc='ns:1'>
<title>LPL-Financial</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25268</link>
<guid>6b027466c3ca21b6d1a1d594d6820833</guid>
<pubDate>Tue, 26 Aug 2025 14:53:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cephalus</b> claims attack for <b>LPL-Financial</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e86e2d9a5acf284d46dc23171c1c5e35f2836994ef0b8941734c4385537821ee</i><br /><br />Threat actor <b>description</b>: <i>LPL Financial DATA LEAK | (I FORGOT THE SIZE,BUT ITS HUGE)</i><br />Target victim <b>website</b>: <i>balancedsolutions4me.com</i>]]></description>
<category>cephalus</category>
</item>
<item xmlns:dc='ns:1'>
<title>K-Strategies-Marketing-and-Public-Relations</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25267</link>
<guid>37c429609aa5ffe35484714281ebcb23</guid>
<pubDate>Tue, 26 Aug 2025 14:53:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cephalus</b> claims attack for <b>K-Strategies-Marketing-and-Public-Relations</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>76e3501a53b0abb1cba7b5b8b388d73a22877e7bedb75e1862b1df48476d8fa7</i><br /><br />Threat actor <b>description</b>: <i>K Strategies Marketing and Public Relations LEAK | 900+GB</i><br />Target victim <b>website</b>: <i>kstrategies.com</i>]]></description>
<category>cephalus</category>
</item>
<item xmlns:dc='ns:1'>
<title>BAR-Architects--Interiors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25266</link>
<guid>d54be4ff5a9dad8e016206a562bb7915</guid>
<pubDate>Tue, 26 Aug 2025 14:52:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cephalus</b> claims attack for <b>BAR-Architects--Interiors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1d0f9874d701801423f37a3cd6e07dfca2d782ab6f1c011a0902ac29ff29ad0</i><br /><br />Threat actor <b>description</b>: <i>BAR Architects & Interiors DATA LEAK | 1.5T+</i><br />Target victim <b>website</b>: <i>bararch.com</i>]]></description>
<category>cephalus</category>
</item>
<item xmlns:dc='ns:1'>
<title>CareSTL-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25264</link>
<guid>ac63ec3793010b4f6477df5e0006ca07</guid>
<pubDate>Tue, 26 Aug 2025 14:43:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cephalus</b> claims attack for <b>CareSTL-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f47c5a43f565e508d58a29691ed060d5a7c561c452456704ee6e664126168d13</i><br /><br />Threat actor <b>description</b>: <i>CareSTL Health DATA Leak | 500+GB | KAWA4096 STEALED our data</i><br />Target victim <b>website</b>: <i>carestlhealth.org</i>]]></description>
<category>cephalus</category>
</item>
<item xmlns:dc='ns:1'>
<title>phillips66lubricants.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25259</link>
<guid>8d189ff5977605432446d89c584d2464</guid>
<pubDate>Tue, 26 Aug 2025 09:48:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>phillips66lubricants.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd98da646eff557c3ac4d9d825171b313f58fb0efb37891319af3fac1bf6d4ac</i><br /><br />Threat actor <b>description</b>: <i>hillips 66 Lubricants is a leading U.S.-based manufacturer and supplier of industrial and automotive lubricants. As part of the larger …</i><br />Target victim <b>website</b>: <i>phillips66lubricants.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>rivertoncabinets.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25256</link>
<guid>bbadca995530ba3c915c375b8a110b77</guid>
<pubDate>Tue, 26 Aug 2025 09:46:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>rivertoncabinets.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38e20be03cc46c84855115700464e8215f82965db1b94306b664b8a823afa9d9</i><br /><br />Threat actor <b>description</b>: <i>Riverton Cabinet Company is a U.S.-based custom cabinetry firm in New Lenox, Illinois, known for its craftsmanship and personalized design …</i><br />Target victim <b>website</b>: <i>rivertoncabinets.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>gibbswire.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25243</link>
<guid>99f437d56c43aa49b37af39678cd04e7</guid>
<pubDate>Tue, 26 Aug 2025 01:27:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>gibbswire.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30b7c1dcee51dbd3024d64c76bc5e2584d0a62a7a5cb2a0a2ef742d0602a49ea</i><br /><br />Threat actor <b>description</b>: <i>Gibbs Interwire, USA, is the nation's leading processor and distributor of Strip Coil and Wire Products in Stainless Steel, Carbon Steel, Nickel Alloys, and Red Metals. The company is continually growing and increasing production capacity thr            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>hydrometrics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25244</link>
<guid>62747fb9b55ab4e37a8017a2f02e4440</guid>
<pubDate>Tue, 26 Aug 2025 01:27:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>hydrometrics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57176a838635e4025c6aae8f335b4ae348cfd8a0e1c42ec546d1625eec87072f</i><br /><br />Threat actor <b>description</b>: <i>Hydrometrics, Inc., USA delivers professional scientific and engineering services to various sectors including industrial, commercial, municipal, and private clients across the United States. With over 40 years of experience, the company spec            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.nuggetent.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25245</link>
<guid>8e0f0412f7f84bfb507fed3304cfe0e0</guid>
<pubDate>Tue, 26 Aug 2025 01:27:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.nuggetent.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e088470a4b2ea14e586af3a3bb8951c760ae173c03bd84ef705d46fbb1848909</i><br /><br />Threat actor <b>description</b>: <i>Nugget Enterprises, Inc. USA - We can't protect Your Data. The company develops software and provides servers for dozens of companies across the country. Is Your Data Really Secure? - That's the question hanging on the home page of the compan            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Security-First-Credit-Union</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25246</link>
<guid>873111dfe6a0f5f2008f00687567e5d8</guid>
<pubDate>Mon, 25 Aug 2025 22:52:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Security-First-Credit-Union</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b5ca40e218d9bd7b501d8f8081943746b68d36b68538f4d92ff95e32c306a654</i><br /><br />Threat actor <b>description</b>: <i>Security First Credit Union is the largest locally-based credit union in the Rio Grande Valley, focusing on providing financial services for the community. They offer a variety of products including savings and checking accounts, loans, mortgages, and mobile banking solutions. Their target clients are individuals and families in the Rio Grande Valley looking for accessible banking options and support. The credit union emphasizes community involvement and member benefits, aiming to enhance financial literacy through workshops and education programs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Huntwood-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25247</link>
<guid>6ab5309c61d84b1386faaf1eb27aff0c</guid>
<pubDate>Mon, 25 Aug 2025 20:19:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Huntwood-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>08f685b194dec5fe93c45c3fbdc5376eac11e96d94d1df6ab7b4ccd0ead649b0</i><br /><br />Threat actor <b>description</b>: <i>Huntwood Industries is a custom furniture manufacturer offering a selection of designs and finishes for residential spaces. Founded in 1988 in Liberty Lake, Washington, the company has grown to become the largest custom furniture manufacturer in the western United States.</i><br />Target victim <b>website</b>: <i>huntwood.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pocono-Farms-Country-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25242</link>
<guid>353b78669dd07c3d95ea4acbe7130488</guid>
<pubDate>Mon, 25 Aug 2025 18:50:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Pocono-Farms-Country-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2bbc21b503be1a856c04c6c2c98917198c61187efb113c2ca5d36707edb60e88</i><br /><br />Threat actor <b>description</b>: <i>Pocono Farms Country Club - is a vibrant community offering a combination of family fun, recreational opportunities, golf, dining, clubbing and home ownership! Has shown themselves to be bad, as they treat information security very poorly and have paid the price! Ordinary people and members of Pocono Farms Country Club have been affected! The list of all transactions, purchases, visits, bank transactions and people's sensitive data has been compromised! Also Pocono Farms Country Club has chosen a position of silence, so all the hidden data will be here!</i><br />Target victim <b>website</b>: <i>https:poconofarms.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>nrlassoc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25231</link>
<guid>95729d35a507b967329beec22743ec26</guid>
<pubDate>Mon, 25 Aug 2025 17:27:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>nrlassoc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c33dfc4c8fd0cf984216132f77e47184036d7bebfd426dc44d00cbc005d7ac68</i><br /><br />Threat actor <b>description</b>: <i>NRL Associates, Inc. USA. The company manufactures machine tooled parts for a variety of customers. 10 years ago, the company significantly expanded and moved into a new 55,000 square foot state-of-the-art facility. They now have the most mod            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Van-Hook-Dental-Studio</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25234</link>
<guid>e56dbe0f3e1c9cecf699a16e06a98cae</guid>
<pubDate>Mon, 25 Aug 2025 16:38:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Van-Hook-Dental-Studio</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc67b65eaca066f46d03690dba6dbc0f9f553c04c7054361f1dfaad959d528ab</i><br /><br />Threat actor <b>description</b>: <i>Van Hook Dental Studio is a privately-owned dental laboratory that serves as an extension to dental practices. With 40 years of experience, they offer a range of products including fixed, removable, and implant restorations. Their services encompass custom shades, imaging, clinical advising, and on-site assistance. All products are FDA cleared and manufactured in the U.S.A.</i><br />Target victim <b>website</b>: <i>www.vhdental.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>trico176.orgUSA180GB</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25240</link>
<guid>b61db6a910e3b66ec8c44f77a713aa37</guid>
<pubDate>Mon, 25 Aug 2025 15:13:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>trico176.orgUSA180GB</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce9401912d6e8b62feb22edad0e529c859e53ce5e0179812a3ea29f00b81e5e6</i><br /><br />Threat actor <b>description</b>: <i>Unknown - Trico</i><br />Target victim <b>website</b>: <i>trico176.org</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dynacast</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25237</link>
<guid>0d6c3328aca8283a680588b4b4ea566e</guid>
<pubDate>Mon, 25 Aug 2025 13:41:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>direwolf</b> claims attack for <b>Dynacast</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b60af2e171ee8f8d66aba4b44af43355b4d302e99bf34a56b8a2cfe18726956</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Dynacast is a global manufacturing company specializing in engineered metal components. It provides solutions using precision die casting, metal injection molding, and CNC machining. It caters to various sectors including automotive, healthcare, and consumer electronics. Established in 1936, Dynacast operates more than 20 manufacturing facilities in over a dozen countries.
</i><br />Target victim <b>website</b>: <i>dynacast.com</i>]]></description>
<category>direwolf</category>
</item>
<item xmlns:dc='ns:1'>
<title>diversifiedcpc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25229</link>
<guid>e5b2ab6f40f18e0a3ddd836595ce4e2b</guid>
<pubDate>Mon, 25 Aug 2025 12:27:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>diversifiedcpc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ca724645ab23e7ea8f67a799911277b9467e682d873dc47ef794ac01a297212</i><br /><br />Threat actor <b>description</b>: <i>Diversified CPC International, USA manufactures products whose name is not known to the general public. The company is a world leader in the development, manufacture and distribution of aerosol propellants, hydrocarbon refrigerants, biomass s            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>medosweet.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25227</link>
<guid>e5eaa4d331b90223644163f09df29c70</guid>
<pubDate>Sun, 24 Aug 2025 21:27:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>medosweet.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca3d190033c7c2feb29735e188497d970a5548f20c9939fd994b406ef15b059f</i><br /><br />Threat actor <b>description</b>: <i>Medosweet Farms provides a full range of distribution services for fresh and frozen locally produced dairy products, 
made from environmentally friendly materials, to food service businesses throughout the Pacific Northwest.
1.Full company             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Graphite-Construction-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25226</link>
<guid>31dd7223d9103a8b518281cc099139b8</guid>
<pubDate>Sat, 23 Aug 2025 16:28:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Graphite-Construction-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc4e5120cfff99cf4eedcf05fc245612089b55f3469fa4f086b90a4fa83c6843</i><br /><br />Threat actor <b>description</b>: <i>Graphite Construction Group is a commercial construction company that provides exceptional service and innovative design solutions that exceed expectations for quality construction.

It is Central Iowa's fastest-growing contractor.

In th            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>George-Haney--Son</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25223</link>
<guid>f34c1c12d462e8df1728610c4485db59</guid>
<pubDate>Sat, 23 Aug 2025 08:26:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>George-Haney--Son</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6d7e96dba887e1454efed4140503fcc0c00d66a5e2017e3627ac0e137caada71</i><br /><br />Threat actor <b>description</b>: <i>George Haney & Son Inc is a family-owned HVAC contractor based in Pasadena, CA, providing services to the San Fernando and San Gabriel Valleys. With a strong re...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>GEA-Consulting-Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25221</link>
<guid>5fc4698a9539a70b368c5aa9736c49eb</guid>
<pubDate>Sat, 23 Aug 2025 07:27:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>GEA-Consulting-Engineers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca8c52e2b8d9631632127602565289dd469e1a1eba854692ef6e81c37e083893</i><br /><br />Threat actor <b>description</b>: <i>(including financial documentation and client data) Founded in 1996, GEA Consulting Engineers is an engineering firm specializing in the design of mechanical, e...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wier-Boerner-Allin</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25220</link>
<guid>a97c37ca1941f04c8822733923adb673</guid>
<pubDate>Fri, 22 Aug 2025 19:12:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Wier-Boerner-Allin</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b5c871c57ee36d207421ed313fd2af7ff42e6fddaf497fd41b6240d49ef4f9e</i><br /><br />Threat actor <b>description</b>: <i>WBA provides comprehensive architecture, interior design, and planning services that are both sensible and artful, tailored to a variety of design challenges. The company's portfolio includes such notable projects as the Brandon Amphitheater, Daddy Noble Field Stadium, and Mississippi Trade Mart, demonstrating its expertise in creating facilities. The company primarily serves clients in the public sector, including municipalities and educational institutions.</i><br />Target victim <b>website</b>: <i>wbaarchitecture.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mark-Edward-Partners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25215</link>
<guid>4fe2f671070a7732be2a6781c96f665e</guid>
<pubDate>Fri, 22 Aug 2025 17:27:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Mark-Edward-Partners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4868d7b167294110f0757b50bc62f223193bdfcf17a0347a96361205eb1c2fd5</i><br /><br />Threat actor <b>description</b>: <i>Mark Edward Partners is an independent full-service internationalbrokerage firm that offers comprehensive insurance solutions to a diverse clients.We are going to upload about 6gb of corporate files. You will find lots of client information, some documents contain personal information, numerous confidentiality agreements and contracts, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hill-Peterson-CarperBee--Deitzler</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25209</link>
<guid>4abd325e59c9705044764303dc5845b0</guid>
<pubDate>Fri, 22 Aug 2025 14:27:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Hill-Peterson-CarperBee--Deitzler</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8a08e6e172769904cfd48dd56a5d1a346db1efe07987e2ee874b34151464911</i><br /><br />Threat actor <b>description</b>: <i>The Law Firm of Hill, Peterson, Carper, Bee & Deitzler, PLLC, began in 1980, when senior partner, R. Edison Hill, departed a largecorporate and insurance defense firm to begin a small personal injury practice. Today, our team of skilled attorneys engage exclusively in representing personal injury victims.We are going to upload company data soon. You will find financialdata (payment details, invoices),confidential information and other documents with personal information so on. A bit of personal files and customers data.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Exotherm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25210</link>
<guid>0243242e59fbaabc4d27962c7bf26a1d</guid>
<pubDate>Fri, 22 Aug 2025 14:27:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Exotherm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b53629f2925e011f9aad1ff0fa4d0f0dbe3e251e5baa7a9101346e29f48ccde</i><br /><br />Threat actor <b>description</b>: <i>Exotherm Corporation is a leader in the development and manufacture of custom-made heating devices. They produce Uniflux brand convection heaters.We are ready to upload more than 30GB files of essential corporate documents such as: financial data (audit, payment details, invoices), employees and customers information (Social Security Numbers, phones, medical information) confidential information, NDAs and other documents with detailed personal information so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hogan-Construction-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25212</link>
<guid>e649b6eb958a777ca96ee70f22c6b27f</guid>
<pubDate>Fri, 22 Aug 2025 14:27:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Hogan-Construction-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b2e0871419aa3f449f396128bb12ad5da004a817178692f9d2245d66bc465918</i><br /><br />Threat actor <b>description</b>: <i>Hogan Construction Group is a company that provides a comprehensive platform of value-based, client-focused construction management services. It offers interior renovations, design and bid-Build,historic restorations, and adaptive re-use.We are ready to upload more than 16GB files of essential corporate documents such as: financial data (audit, payment details, invoices), employees and customers information (Social Security Numbers, phones, emails, death/birth certificate ) confidential information and other documents with detailed personal information and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mobal-Trucking</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25211</link>
<guid>1d28749e710c723a89ef42b371356b11</guid>
<pubDate>Fri, 22 Aug 2025 08:20:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Mobal-Trucking</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e3e5441011349d0b5621488c315a4c0154f8563f3126dc91c8209f5ebb3613e3</i><br /><br />Threat actor <b>description</b>: <i>CONTACT INFORMATION OFFICE - 636-294-0770 MAL GREWAL MAIN NUMBER - 314-267-4288 {24 HOURS} FAX - 636-980-9719 EMAIL ADDRESS - MOBAL3855@YAHOO.COM</i><br />Target victim <b>website</b>: <i>-</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jacks-Lawn-Service-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25213</link>
<guid>25d6202ac9a813700f3660aafd2c59b8</guid>
<pubDate>Fri, 22 Aug 2025 08:19:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Jacks-Lawn-Service-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>265861dad6c460c344d99033d9554e80ad402f25cfe875d47164d6fc5e99818d</i><br /><br />Threat actor <b>description</b>: <i>Jack's Lawn Service, Inc., located in Monroe, Michigan, offers a comprehensive range of landscaping services for both residential and commercial clients. Their services include lawn maintenance, weed control, fertilization, insecticide applications, and small engine repairs among others. The company is dedicated to customer satisfaction and provides free estimates along with a 24/7 answering service for after-hour inquiries. Established in 1977, Jack's Lawn Service prides itself on earning the trust of its customers through high-quality service. https://www.zoominfo.com/c/jacks-lawn-service-inc/66176570</i><br />Target victim <b>website</b>: <i>www.jackslawnservice.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.greneker.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25206</link>
<guid>d976f9a7a2ee232ce4143426a181bd0a</guid>
<pubDate>Fri, 22 Aug 2025 01:27:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.greneker.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1529836fb656c5a94c7b77f0dfe85b7cf45b1a7bf70e8fd897ae6ec9bee82c48</i><br /><br />Threat actor <b>description</b>: <i>Greneker, USA - boobs and slaves. The company manufactures mannequins for clothing stores and entertainment centers. Its clients include major international brands such as Disney and Under Armour. The published date reveals the unpleasant sid            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.gillette-ac.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25195</link>
<guid>e8a31c08d0faff38f8bfa57c75d80828</guid>
<pubDate>Thu, 21 Aug 2025 21:27:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.gillette-ac.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d7ce758b570e5505cbb75120cc8c1384494a7992ceba8233892f0658e144ffd3</i><br /><br />Threat actor <b>description</b>: <i>Gillette Air Conditioning Company, USA specializes in air conditioning, heating, refrigeration, and boilers for commercial and industrial facilities. The company prides itself on safety, quality, and productivity, utilizing advanced technolog            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>TechSourceOne-IT-Solutions-Provider</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25197</link>
<guid>a70ef651f1086ff9a0a988e4ed93069a</guid>
<pubDate>Thu, 21 Aug 2025 21:27:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>TechSourceOne-IT-Solutions-Provider</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6e089e8825b1f88e6e15827d60c54b334705f9b95cb99b8f01de710f0b0d8a5b</i><br /><br />Threat actor <b>description</b>: <i>Email services & protection
Managed email services including SPAM filters, anti-virus, anti-malware protection.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sonitrol-Security-Solutions-SecureFL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25202</link>
<guid>dfb72f52212ce3e209fcaf3af7388a4d</guid>
<pubDate>Thu, 21 Aug 2025 21:27:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Sonitrol-Security-Solutions-SecureFL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa8d13d38fb558d57aacd0bc1487ec3190a57a3f22bb3b83a03af1911bb3f9fb</i><br /><br />Threat actor <b>description</b>: <i>Our mission is to provide the best in electronic security so that OUR community is a safer place to live and work.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Colmar-Industrial-Supplies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25204</link>
<guid>c98a3fedd72195a304fba80ebaa320fe</guid>
<pubDate>Thu, 21 Aug 2025 18:41:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Colmar-Industrial-Supplies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ae300447c93f32edfbefa26add6a3de9546b519a40a164ae30c14a26322665b4</i><br /><br />Threat actor <b>description</b>: <i>Colmar Industrial Supplies Inc. is a leading distributor of cutting tools and industrial supplies located in Chicagoland. They offer a wide range of products, including cutting tools, maintenance and repair supplies, workholding solutions, precision measuring instruments, and abrasives for grinding and finishing. The company is committed to providing innovative and cost-effective solutions, ensuring timely responses and efficient inventory management for their clients. Their expert customer service team is dedicated to minimizing downtime for manufacturers and guaranteeing quick delivery of essential products.</i><br />Target victim <b>website</b>: <i>www.colmarindustrial.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>Huron-Regional-Medical-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25205</link>
<guid>fb739f78a1b83ccad7886436e3146c77</guid>
<pubDate>Thu, 21 Aug 2025 17:09:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Huron-Regional-Medical-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c51b93802b4c2668bd4da37bd637b95618481e9d4634fb1505057adf720aa5e</i><br /><br />Threat actor <b>description</b>: <i>HRMC is a private, not-for-profit organization. When the ownership of Huron's hospital passed from the Fransciscan Sisters to a locally-owned, private corporation (Huron Regional Medical Center, Inc.) in 1978, those involved in the purchase wanted to ensure Huron's community hospital would be governed by a board of directors reflecting a broad-base of the community. The volunteer board consists of three members recommended by the medical staff, one recommended by the City of Huron and one recommended by the Beadle County Commission. The other board members are elected at-large. Each board member is elected for a three-year term and can serve up to three consecutive terms. The property, funds, affairs and business of HRMC are managed by the board of directors, which is vested with the powers and authority conferred by the laws of South Dakota.</i><br />Target victim <b>website</b>: <i>www.huronregional.org</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sofo-Foods</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25194</link>
<guid>d877cfa2690d0b688ded2759209edea3</guid>
<pubDate>Thu, 21 Aug 2025 15:35:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Sofo-Foods</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f583c254ba58d4cd300d722e6330660c58093fd59223ee5e00cb07906981b56c</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Sofo Foods is a family-owned food distribution company specializing in Italian and Mediterranean products. Founded in 1949, the company offers a wide range of products including deli items, produce, bakery items, meats, and cheeses. Sofo Foods mainly serves restaurants and retailers in the midwest and southeastern regions of the United States. It also provides catering services, food preparation tips, and recipes to its clients.</i><br />Target victim <b>website</b>: <i>sofofoods.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Blazer-Building</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25190</link>
<guid>d31b97335d631727f3e7be457307c3a9</guid>
<pubDate>Thu, 21 Aug 2025 15:27:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Blazer-Building</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac43d54bcda4f42dc0225148604d2669973049c87d3280debaf300b99788f27d</i><br /><br />Threat actor <b>description</b>: <i>Blazer Building is a general construction company that specializes in the expedited delivery of high-quality apartment homes.We are going to upload about 10gb of corporate files. You will find employees information (DOB, addresses, SSNs, phones, even petsnames and so on), HR files, detailed financial and accounting information (customers files), agreements and contracts, employee financial information, violation reports, police reports, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Burt-Process-Equipment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25191</link>
<guid>a66cefccf3f00265d7d3136e3008f5b9</guid>
<pubDate>Thu, 21 Aug 2025 15:27:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Burt-Process-Equipment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e95aaa669689a90679d7f538289f9da3e07cd8ec1e14982397f576af271a5db2</i><br /><br />Threat actor <b>description</b>: <i>Burt Process Equipment is a leader in the worldwide community of people, businesses, and organizations striving to create a betterenvironment through the innovative and responsible use of water and natural resources. We are going to upload about 19gb of corporate files. You will find employees information (DOB, addresses, SSNs, phones, emails and so on), HR files, detailed financial and accounting information(customers files, employee financial information, payment details), lots of scanned docs with personal data, agreements and contracts, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>All-Truck-Transportation-Co</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25186</link>
<guid>b3a6feac837e75982c8b2bc0997cec29</guid>
<pubDate>Thu, 21 Aug 2025 04:14:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>All-Truck-Transportation-Co</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f290a5e4cf6c0c8bdc9a898f3fc157d9acac1020e7f7ed1fdff0100274fcd0b</i><br /><br />Threat actor <b>description</b>: <i>All Truck Transportation Co, Inc. was founded in 1978 by CEO/Owner Mathew J. Alagna and is based in Chicago, IL. Over the years the company has grown steadily focusing on its commitment to provide qualified professional drivers and well maintained equipment with the latest technology. Each client’s needs are analyzed by their current transportation process. A customized solution is designed for each individual customer affording the companies maximum productivity to reduce their overall transportation costs.- Database- Financial documents- Personal information of employees and clients https://www.alltruck.com/</i><br />Target victim <b>website</b>: <i>www.alltruck.com</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fullerton-Surgical-Center-FSC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25182</link>
<guid>57be811f4915eea52686805835b070b0</guid>
<pubDate>Thu, 21 Aug 2025 00:27:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Fullerton-Surgical-Center-FSC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c03a459358b1d4ec0ae12f3acdfff8e34c4b90811e1ccdad4e162ac5e09460d</i><br /><br />Threat actor <b>description</b>: <i>Fullerton Surgical Center, USA, is a surgical clinic offering services in general surgery, orthopedics, otolaryngology, plastic surgery, pain management, urology, and gastroenterology. Of course, all these services cost a fortune, and the US             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ocean-Edge-Resort--Golf-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25173</link>
<guid>2bfcb7da18b6e9b885e9aeedadad7e12</guid>
<pubDate>Wed, 20 Aug 2025 21:27:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>Ocean-Edge-Resort--Golf-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fadf192ada021ae4fabeff4ac162a09bb3ff41aae5e3207f1cd8c77ba1149d31</i><br /><br />Threat actor <b>description</b>: <i>Ocean Edge Resort & Golf Club is a 429-acre resort in Brewster, Cape Cod (Massachusetts) featuring a historic mansion, luxury villas, golf, private beach access, and a wide range of dining, wellness, and recreational options.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>CBG-Surveying-Texas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25184</link>
<guid>36a3c31c3e6d065c50b3d80fd9ba39bf</guid>
<pubDate>Wed, 20 Aug 2025 19:43:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>CBG-Surveying-Texas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>08aadbd00d43fbb5d3d2ae0cfa42e1c8d1a3fdfb88921dc25458c6cd55823332</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.cbgtxllc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Omega-Global-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25183</link>
<guid>71bfbe458113bbc3b27576494be78972</guid>
<pubDate>Wed, 20 Aug 2025 19:06:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Omega-Global-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec685422df51876d57dd461e63ddfc418270dfa3868f529f68faece8ec8e5268</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.omegagti.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Greater-Pittsburgh-Orthopaedic-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25180</link>
<guid>dbcec7736b4d543d9251de81b4a9917f</guid>
<pubDate>Wed, 20 Aug 2025 18:12:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Greater-Pittsburgh-Orthopaedic-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbfbe20ce46d52ccb21403268702783923bd554bde324846c03788e78c7180dd</i><br /><br />Threat actor <b>description</b>: <i>Pittsburgh Orthopaedic Associates (GPOA), Pittsburgh’s oldest continuously-operating orthopaedic surgical associates. Our goal is to provide compassionate orthopaedic care to patients of all ages for an extensive variety of conditions.</i><br />Target victim <b>website</b>: <i>www.gpoa.com</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bizcom-Electronics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25156</link>
<guid>a9dbfcad63c454a4e096bbe334b8e45d</guid>
<pubDate>Wed, 20 Aug 2025 16:27:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Bizcom-Electronics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>993aa64c30ce11857e6fcf74560f16225419b5837aec5d272e2fd7cc5a7c4766</i><br /><br />Threat actor <b>description</b>: <i>izcom Electronics, Inc. is a service provider based in Milpitas, California, spe...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>lee-irvine.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25158</link>
<guid>856821bd2b5bc9082efb1f81f17ea132</guid>
<pubDate>Wed, 20 Aug 2025 16:27:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>lee-irvine.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>80ca79968e31088c9332bb82a913c93dacae422a220f43a0b580aec0c292cfa0</i><br /><br />Threat actor <b>description</b>: <i>Lee & Associates Irvine Inc. is a law firm specializing in representing clients in the acquisition, sale, and leasing of various commercial real estate properties, including industrial, office, retail, and medical properties.
1.The document             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>haaker.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25159</link>
<guid>73a28b73543c4fe7c22ef24532315015</guid>
<pubDate>Wed, 20 Aug 2025 16:27:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>haaker.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>13dced52ca729c5a3e51a21ff7901227d36fc03e88641735ac19f0bebf667763</i><br /><br />Threat actor <b>description</b>: <i>Haaker Equipment Company manufactures sweepers, sludge suction machines, and spare parts for them. The company was founded in 1972 and is headquartered in Los Angeles, California.
1.The document is invoice No. 3300290201 from Nilfisk Inc., i            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>netfusionconsulting.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25161</link>
<guid>a7a6b51b4da2a493f024aac42d94c7cd</guid>
<pubDate>Wed, 20 Aug 2025 16:27:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>netfusionconsulting.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa1d4a57f351bfcf386e779eafcc2ec6ab88d3e75c4ca87d886852a46be563a9</i><br /><br />Threat actor <b>description</b>: <i>NetFusion Consulting, Inc. is California's largest company specializing in IT integration in the medical and dental fields, specializing in IT consulting and integration specifically for dentists. The company offers a wide range of services,             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>garnertrucking.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25162</link>
<guid>53efc88b91116cc2a1c96cb17ddac5cf</guid>
<pubDate>Wed, 20 Aug 2025 16:27:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>garnertrucking.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>237aff47f38efa31defa9466905ef0fd25f4848a48a4eb4207897ea25e55cccb</i><br /><br />Threat actor <b>description</b>: <i>Garner is a company specializing in dry freight transportation, located in northwestern Ohio.
1.The document dated June 2, 2025, is the annual report on school tax withholdings in Ohio for 2021 for Garner Contract Maintenance.
2.The documen            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>RA-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25164</link>
<guid>7b4d37d410b3b267742787492c5cca46</guid>
<pubDate>Wed, 20 Aug 2025 16:27:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>RA-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ece6308cdcce83a36c1bba2f483faea4dba5beb4874711c48288757149f6afdd</i><br /><br />Threat actor <b>description</b>: <i>RA Services offer a comprehensive line of medical business solutions to help your practice or healthcare facility achieve its financial and strategic goals.We are ready to upload more than 15GB files of essential corporate documents such as: financial data (audit, payment details,financial reports, invoices), employees and customers information ( death certificate, passports,credit cards, medical information) A bit of personal files and customers data.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Steel-Encounters</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25165</link>
<guid>3773b6cf600f775304f7489130b3d7d1</guid>
<pubDate>Wed, 20 Aug 2025 16:27:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Steel-Encounters</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8df5a05801bab1b3e5d0ef540bce9b1a8ee157db4b05c38c736b279679a52ce5</i><br /><br />Threat actor <b>description</b>: <i>Steel Encounters is a commercial specialty subcontractor who provides steel joist and metal deck products and services, glazing, curtain wall, and architectural cladding systems to general contractors, architects, and building owners.We are ready to upload more than 21GB files of essential corporate documents such as: financial data (audit, payment details,financial reports, invoices), employees and customers information (passports, death/birth certificate, medical information, emails, phones) confidential information and other documents with detailed personal information so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>LandWorks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25166</link>
<guid>ceacaf9856f429dadabb36e45a45c7e2</guid>
<pubDate>Wed, 20 Aug 2025 16:27:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>LandWorks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e1a11bb835f87d0738857fc8a11a222e93b26fad6c66929c6381f007b83c3ac</i><br /><br />Threat actor <b>description</b>: <i>Landworks landscape & lawn care company. Providing Residential & Commercial services since 1995 to Johnson County & greater KansasCity area.We are ready to upload more than 30GB files of essential corporate documents such as: financial data (audit, payment details, invoices), employees and customers information (Social Security Numbers, phones, medical information) confidential information and other documents with detailed personal information and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>RAVEN-Mechanical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25167</link>
<guid>25485df232e188a3f3e514ee1c9de020</guid>
<pubDate>Wed, 20 Aug 2025 16:27:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>RAVEN-Mechanical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>99f353a378c8abfa7804031462c88f1074fcef5d76a2d7d5e78d76501a76c850</i><br /><br />Threat actor <b>description</b>: <i>Raven Mechanical is a family owned and operated commercial specialty construction company specializing in plumbing, HVAC, utility and specialty piping projects.We are going to upload company data soon. You will find financialdata (audit, payment details,financial reports, invoices), employees and customers information (passports, driver's licenses, SSCs, birth certificates ) and other confidential information, NDAs and documents with detailed personal information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advanced-Blending-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25168</link>
<guid>2eed49993f93259b52fe9ad0f9d0c190</guid>
<pubDate>Wed, 20 Aug 2025 16:27:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Advanced-Blending-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>90c52045a05a643ab8f0ab37974badf11bfcc7017eb9c6e931d8e732b0bceeba</i><br /><br />Threat actor <b>description</b>: <i>Advanced Blending Solutions is a leading designer, manufacturer, and supplier of blending and material convey equipment tailored for the plastics industry. We are going to upload about 352gb ( 10gb of SQL databases) of corporate files. You will find detailed employees information (DOB,DL numbers, addresses, SSNs, phones, and so on), HR files, detailed financial and accounting information, lost of agreements and contracts, credit card details, scans of documents with detailed personal information, customer financial and other information, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Elkhart-Independent-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25179</link>
<guid>64bac3ef8a6e27b02dc9d6d972b03795</guid>
<pubDate>Wed, 20 Aug 2025 15:16:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Elkhart-Independent-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97b8fe89c452ab29549d2c066c95888daa61bd6c53e21b175f1f53a9038f1fba</i><br /><br />Threat actor <b>description</b>: <i>Elkhart Independent School District Elkhart Independent School District is a public school district based in Elkhart, Texas (USA). The district is located in southwest Anderson County and extends into northern Houston County.    More</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>southweststone.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25154</link>
<guid>d21555f006e86254e92c2b77463def4f</guid>
<pubDate>Wed, 20 Aug 2025 09:07:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>J</b> claims attack for <b>southweststone.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5aab22c4f92fa75e4d799b70309552199e2d86d3b1edbfeda9808602a65dfc17</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>southweststone.net</i>]]></description>
<category>J</category>
</item>
<item xmlns:dc='ns:1'>
<title>Burger--Brown-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25146</link>
<guid>8c317a7c6c3e9bd6382554ce9f0811aa</guid>
<pubDate>Wed, 20 Aug 2025 00:18:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Burger--Brown-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1e4f1a98af21e2cd0cb1ef74697972fd60629145189ef8b36043ec42c9eedfb</i><br /><br />Threat actor <b>description</b>: <i>Burger & Brown Engineering, Inc. specializes in precision machining and injection molding services, serving clients in Kansas City and surrounding areas. The company's capabilities include precision CNC machining, high-speed micro milling, custom injection molding, and engineering design among others. Their clients span various industries, including the Department of Energy, medical, consumer products, and semi-conductor sectors. With a commitment to customer care and satisfaction, Burger & Brown aims to deliver manufacturing excellence and noteworthy quality in their services.</i><br />Target victim <b>website</b>: <i>www.burger-brown.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mutual-Screw--Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25147</link>
<guid>18318da7dae61a542729d9da994161be</guid>
<pubDate>Wed, 20 Aug 2025 00:18:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Mutual-Screw--Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>68b878e618f16c1f2780ad5cfbca62f721c75e8a2842e18f4bc6935dcf8788c6</i><br /><br />Threat actor <b>description</b>: <i>Mutual Screw & Supply is a leading distributor specializing in industrial fasteners and related accessories, offering a vast array of products including screws, nuts, bolts, washers, rivets, and safety equipment. Established in 1947, the company prides itself on providing high-quality products from reputable brands such as 3M, Starrett, and Irwin. Their services cater to a wide range of clients, enabling custom solutions, automated orders, and special pricing for bulk purchases. The company is dedicated to delivering exceptional customer service, ensuring that clients have easy access to the fasteners they need.</i><br />Target victim <b>website</b>: <i>www.mutualscrew.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Horizon-Hydraulics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25148</link>
<guid>861771f24543eab4b20bd2e057a44c39</guid>
<pubDate>Wed, 20 Aug 2025 00:17:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Horizon-Hydraulics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c054c9353c2af985939cbccd711d0eb19de85b9a70601248c6636c830ce33ba9</i><br /><br />Threat actor <b>description</b>: <i>Horizon Hydraulics is a full line hydraulic and pneumatic service center. They work across a wide array of industries and their services include both industrial and mobile hydraulics. Horizon Hydraulics is based in Oklahoma City, OK. Their experienced team of professionals is committed to providing the best fluid power solutions. We have a thorough process of diagnostic evaluation. Providing the right solutions for hydraulic maintenance and repair is not easy.  They have been providing our customers with the right solutions since 1983.</i><br />Target victim <b>website</b>: <i>www.horizonhydraulics.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stewart-Home-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25149</link>
<guid>2354ec2849bd2954df8dd2f2199d58a2</guid>
<pubDate>Wed, 20 Aug 2025 00:17:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Stewart-Home-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c2d13e4edd67ed148267477c905f43190de97f4a9be3443f8238490bb9a4806</i><br /><br />Threat actor <b>description</b>: <i>Stewart Home & School is a residential school located in Franklin County, Kentucky, dedicated to serving individuals with intellectual or developmental disabilities. With over 130 years of experience, the institution offers a nurturing environment that prioritizes personal growth, social development, and lifelong learning through various programs including academics, vocational training, and recreational activities. Their community supports students in building friendships and participating in enriching activities such as sports and equestrian programs. Stewart Home & School invites prospective families to visit and witness the joyful atmosphere where students thrive.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>TD-Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25150</link>
<guid>32600351773d885ac6fe1873947e7dfa</guid>
<pubDate>Wed, 20 Aug 2025 00:17:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>TD-Engineers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>313c3491c18d4f1e17e575bf883925288da1b2e31bbfefc055a00328d3d3fcf1</i><br /><br />Threat actor <b>description</b>: <i>T&D Engineers - Houston Texas. is a mechanical, electrical and plumbing (MEP) consulting engineering firm. They offer a diverse selection of engineering and design services for all phases of your building's lifecycle including initial planning and design, construction administration, ongoing upgrade and renovations and system troubleshooting.</i><br />Target victim <b>website</b>: <i>www.tdengineers.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>TRANTRONICS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25151</link>
<guid>fd2c18a27361dd16124f2780015b05f3</guid>
<pubDate>Wed, 20 Aug 2025 00:16:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>TRANTRONICS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cf02f6744f89a3c2f72ed11ffa0a2452b5088154eeb02cf5e44b21220a2ec646</i><br /><br />Threat actor <b>description</b>: <i>TRANTRONICS specializes in electronic assembly and quick turnaround of surface mount and thru-hole board assembly for prototype, pre-production and production orders. TRANTRONICS' mission is to be the recognized leader and highest quality provider of electronic contract manufacturing and services in the industry. Our goal is to provide superior quality work, on time delivery and competitive pricing. They understand and appreciate your sense of urgency and will provide the quickest turnaround available on quotations and assembly services.  They strive to exceed your expectations and to ensure the highest level of quality.  Trantronics is certified in ISO 9001:2008, ISO 13485.2003 and AS9100, which helps us in providing unparalleled quality, quick turn-around time and exceptional customer support. </i><br />Target victim <b>website</b>: <i>www.trantronics.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mediate-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25152</link>
<guid>dc61c1317e2c1637f0f8d2de7fd8da9b</guid>
<pubDate>Wed, 20 Aug 2025 00:16:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Mediate-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e32eb6109eadf478d1cb49fe2f68eab511c1ea7c8802d328e3d0daa2e334309e</i><br /><br />Threat actor <b>description</b>: <i>Mediate Management is a property management company based in Boston, Massachusetts, specializing in rental and condo property management. They aim to provide effortless homeownership and maximize property value through comprehensive services, including maintenance, cleaning, and project management. Their commitment to exceptional customer service ensures each property is treated with individualized care and support available around the clock. Mediate Management caters to various types of properties, leveraging extensive experience to address unique challenges in community living.</i><br />Target victim <b>website</b>: <i>mediatemanagement.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>MPOWERHealth</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25144</link>
<guid>208c538e54592a60bde61d93e10cde94</guid>
<pubDate>Tue, 19 Aug 2025 21:28:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>MPOWERHealth</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e51b2406e15da29a93e43be0e196df175ab11b2584531ec322c2a7ee489623f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>childrenscouncil.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25145</link>
<guid>be419cdf098bae8c8530ea4f19af3837</guid>
<pubDate>Tue, 19 Aug 2025 20:39:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>childrenscouncil.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>114d473013a9e743cfcd3c5ad544ab2f230093560dfcc4b54e859ad91da7edb2</i><br /><br />Threat actor <b>description</b>: <i>Children’s Council of San Francisco is a nonprofit organization with over 50 years of experience advocating for and facilitating high-quality …</i><br />Target victim <b>website</b>: <i>childrenscouncil.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bobcat-Central</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25141</link>
<guid>0b7127c966fa2dc3e83d3c9651e9d9b6</guid>
<pubDate>Tue, 19 Aug 2025 17:27:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Bobcat-Central</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d2ac65079ad31f2a82cdda9d0d9d0623ea009bf4809ba64ff6013703862c3b9e</i><br /><br />Threat actor <b>description</b>: <i>Bobcat Central, Inc. began operations in Stockton in 1976. The company is an equipment dealer offering parts, service, rental, andsales of Bobcat equipment, attachments, Doosan heavy equipment, Tigercat, and Towmaster trailers.We are ready to upload more than 12GB files of essential corporate documents such as: financial data (audit, payment details,financial reports, invoices), employees and customers information (driver's license, Social Security Numbers, medical information) confidential information, NDAs and other documents with detailed personal information .</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Electro-Tech</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25142</link>
<guid>9940dc91e5d2185602912ef38945fcea</guid>
<pubDate>Tue, 19 Aug 2025 17:27:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Electro-Tech</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f6d6d69585394df46398e5132c20969360beed401af033a852e6fc26a3d69a3</i><br /><br />Threat actor <b>description</b>: <i>ElectroTech, Incorporated is a manufacturers representative for electrical products.We are going to upload company data soon. You will find financialdata (audit, payment details,financial reports, invoices), NDAs and other documents with detailed personal information and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rare-Editions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25143</link>
<guid>bfc58c81e954a4ee8722992437a86d9d</guid>
<pubDate>Tue, 19 Aug 2025 17:27:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Rare-Editions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3d58ac3397e7788005337dae6a85dc80005643fdfc5efdce57ee77783541c77</i><br /><br />Threat actor <b>description</b>: <i>Rare Editions has been making dresses for girls for over fifty years. Their line consists of dresses for special occasions, including birthday dresses, christening dresses, and flower girl dresses.We are going to upload company data soon. You will find financialdata , employees and customers information. Lots of projects information with samples of their products and other details.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>True-World-Group-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25130</link>
<guid>2c6da25c244f420a938f030b17e22d3e</guid>
<pubDate>Tue, 19 Aug 2025 15:26:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>True-World-Group-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>118f3561ef16f851b56ec253f58c0200c0242c405505962660a2dfa9065c15ef</i><br /><br />Threat actor <b>description</b>: <i>True World Group is one of the nation’s leading, diversified seafood-products co...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Inotiv-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25129</link>
<guid>3393355454eebbeb6857ffa079e431ca</guid>
<pubDate>Tue, 19 Aug 2025 12:28:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Inotiv-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6eb87b9d3b42598fd7928f3b04b99529d9d95294a0429350c872ff9e922cac77</i><br /><br />Threat actor <b>description</b>: <i>Inotiv, Inc. is a publicly USA traded contract research organization (CRO) that provides nonclinical and analytical drug discovery and development services to the pharmaceutical and medical device industries.As a leading contract research org            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cain-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25138</link>
<guid>e8cc6d71668a336b1fae96066323a6ba</guid>
<pubDate>Tue, 19 Aug 2025 11:49:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Cain-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97537f1877b4d7f5555d7b13d688db34ed7ec7ef5b48ea590ac2daa3bff47e1e</i><br /><br />Threat actor <b>description</b>: <i>At Cain Electric, we provide a full array of different services for our customers. From electrical service repair to solar installation of residential solar panels, we offer the advanced electrical solutions you need. We also offer new construction electrical services, industrial electrical installation, commercial electrical maintenance, security camera system installation, and more. Get the trusted electrical services you need for your residential, commercial, or industrial property today</i><br />Target victim <b>website</b>: <i>www.mikecainelectric.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>godbyhearth.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25132</link>
<guid>c24c1162580cb8b37ff4815dda98f4c3</guid>
<pubDate>Tue, 19 Aug 2025 10:11:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>godbyhearth.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b3478eab864c0ace4988a1cae4ecf61c5bd0431253171d4480b0876016dc6652</i><br /><br />Threat actor <b>description</b>: <i>Operating in Indianapolis and Carmel, Indiana, Godby Hearth & Home is a premium provider of home comfort solutions with origins …</i><br />Target victim <b>website</b>: <i>godbyhearth.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>apderm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25126</link>
<guid>e3f2b325739bbe549d3875450b27a3a1</guid>
<pubDate>Mon, 18 Aug 2025 19:59:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>apderm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4b2d8907dc2ebdb99db0225f43e46603d975c45161596bf04386ddb58882693e</i><br /><br />Threat actor <b>description</b>: <i>APDerm is the largest physician-owned dermatology clinic in New England, with 25 locations in New Hampshire, Massachusetts, and Rhode Island. The company offers a full range of innovative medical, surgical, and cosmetic procedures to help pat            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advanced-Security-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25124</link>
<guid>f03a550c53b59ef2cb9970d9672c78da</guid>
<pubDate>Mon, 18 Aug 2025 12:43:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Advanced-Security-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>632d0bbab2f6c33693fff3225a36d54f51c8cec9f3ead91628fc956237ed5aa0</i><br /><br />Threat actor <b>description</b>: <i>Advanced Security Systems has been a leader in the security industry for over 45 years. It customs design, install and service: burglar and fire alarms, video surveillance, access control and home automation, controlling lights, thermostat, door locks and more all from the smart phone. It transmits fire and security alarm signals to its monitoring station in Eureka. Advanced Security offers the only local monitoring station on the Northcoast. It invested in building and staffing its own local central station instead of contracting with a third party out-of-the-area provider. Advanced Security has remained a family owned and operated alarm company since 1971.</i><br />Target victim <b>website</b>: <i>www.advancedsecuritysystems.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>IQgistics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25120</link>
<guid>65b5fc46fc82087ba24609b14f2dc4ff</guid>
<pubDate>Mon, 18 Aug 2025 08:40:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>IQgistics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ae0e784d0cb192e29bec5cb38b8d9e0a26cc6513a2a882cc70a3a726f3c281de</i><br /><br />Threat actor <b>description</b>: <i>IQgistics offers innovative GPS fleet tracking solutions designed to enhance logistics management for businesses of all sizes. Their comprehensive suite includes advanced tracking software and cellular products, providing tailored solutions that optimize fleet productivity and reduce operational costs. Utilizing cutting-edge technology, including AI-driven algorithms, IQgistics empowers clients to gain actionable insights and control over their logistics. With a dedicated support team, they ensure clients can focus on their core business while benefiting from scalable and flexible platform solutions.</i><br />Target victim <b>website</b>: <i>www.iqgistics.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rehabilitative-Health-Svc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25095</link>
<guid>875ffa7f896a4da039e296e2d1f54937</guid>
<pubDate>Sun, 17 Aug 2025 10:43:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Rehabilitative-Health-Svc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc5c8eb8391cefb6cd4bab2abecde1561b70de0c08b4acec260beab86f790894</i><br /><br />Threat actor <b>description</b>: <i>Rehabilitative Health Services (RHS) is a comprehensive medical and mental health facility located in Ammon, ID, offering a diverse array of services including Addiction and Recovery, Family Medicine, Therapy, Counseling, and Psychological Testing. Established to provide quality therapy options, RHS aims to help clients overcome past trauma and navigate various mental health challenges through professional counseling and support services. With over 25 years in the community, RHS is dedicated to addressing both the physical and mental well-being of clients from childhood to adulthood. The facility also emphasizes community support and operates programs specifically designed for youth and individuals with severe mental illnesses</i><br />Target victim <b>website</b>: <i>www.rhscares.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>accsnet.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25101</link>
<guid>940222ade2401c27cf112992065c8877</guid>
<pubDate>Sun, 17 Aug 2025 09:24:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>warlock</b> claims attack for <b>accsnet.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9803e9552fa376252152a55e7c471e2f581ad5cf755df037820b954b7feda807</i><br /><br />Threat actor <b>description</b>: <i>all data</i><br />Target victim <b>website</b>: <i>accsnet.com</i>]]></description>
<category>warlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>advion.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25102</link>
<guid>934ae3fe682fd9b04e9a8b15dd789911</guid>
<pubDate>Sun, 17 Aug 2025 09:23:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>warlock</b> claims attack for <b>advion.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0634849eb8bea5b4917e683e2db8e12b0150729a69fa268178c120cb263ae9b8</i><br /><br />Threat actor <b>description</b>: <i>all data</i><br />Target victim <b>website</b>: <i>advion.com</i>]]></description>
<category>warlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>atcmanufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25103</link>
<guid>d82604de52c7a4c0d104443d90790b81</guid>
<pubDate>Sun, 17 Aug 2025 09:22:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>warlock</b> claims attack for <b>atcmanufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>07c661b08a4e1d2a7c7cf88ad66eeaf62fa92a29a339ef990b79c16a4f3cc935</i><br /><br />Threat actor <b>description</b>: <i>all data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>warlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>brightwork.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25107</link>
<guid>b76226c0b9542b5fa7c4ff56ff755802</guid>
<pubDate>Sun, 17 Aug 2025 09:22:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>warlock</b> claims attack for <b>brightwork.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a977eaeeeeec358b2f880e94d46c750ca31a8c01fc03ca455109e6a3678b14b</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] BrightWork.com is a project management software company that provides solutions for teams and organizations to manage and track their projects. It offers templates, reports, role-based dashboards, risk management and work automation tools. BrightWork.com is designed to be integrated with Microsoft SharePoint, thereby bringing clarity, control, and simplicity to project portfolios.</i><br />Target victim <b>website</b>: <i>brightwork.com</i>]]></description>
<category>warlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>starsalliance.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25096</link>
<guid>e72f04340ba52eeb59aac43d472d1d31</guid>
<pubDate>Sun, 17 Aug 2025 09:21:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>warlock</b> claims attack for <b>starsalliance.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36d9eeac733ca4b37c702f6c4bdc3bf472b26a0fd801b447980f14f490492c4e</i><br /><br />Threat actor <b>description</b>: <i>The data has been purchased by other buyers</i><br />Target victim <b>website</b>: <i>starsalliance.com</i>]]></description>
<category>warlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>wytechnology.local</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25098</link>
<guid>1fe165377d4907f0ea45a5397520b85c</guid>
<pubDate>Sun, 17 Aug 2025 09:20:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>warlock</b> claims attack for <b>wytechnology.local</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>21198fa722280e3d0d9fd9c89984d699e6ea064927ed41c74c406976db36e60e</i><br /><br />Threat actor <b>description</b>: <i>The data has been purchased by other buyers</i><br />Target victim <b>website</b>: <i>wytechnology.local</i>]]></description>
<category>warlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>webcids.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25099</link>
<guid>bc4647bddd46ee572310781a51030572</guid>
<pubDate>Sun, 17 Aug 2025 09:20:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>warlock</b> claims attack for <b>webcids.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d8f51576c864474402bd839ac89ae165c3a52fb4d7e464d076976e5e549e81e</i><br /><br />Threat actor <b>description</b>: <i>all data</i><br />Target victim <b>website</b>: <i>webcids.com</i>]]></description>
<category>warlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>magcpa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25108</link>
<guid>97d59bbb0fa57e38380bf3415b38b044</guid>
<pubDate>Sun, 17 Aug 2025 09:19:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>warlock</b> claims attack for <b>magcpa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>553015fdbe483a724e9f8eaff56a10f469ef96ddee51aa4ed7d124c4dde29e89</i><br /><br />Threat actor <b>description</b>: <i>all data</i><br />Target victim <b>website</b>: <i>magcpa.com</i>]]></description>
<category>warlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>primrose.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25112</link>
<guid>f02e21c27440aef2e5c495ce615279e3</guid>
<pubDate>Sun, 17 Aug 2025 09:18:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>warlock</b> claims attack for <b>primrose.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c2bcd6fe5e6c77917208bf3b96a9041f10c917e6ebd066dd2832fa469f27335</i><br /><br />Threat actor <b>description</b>: <i>all data</i><br />Target victim <b>website</b>: <i>primrose.com</i>]]></description>
<category>warlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>clearybuilding.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25111</link>
<guid>821b7564a31a15c15f5670de9e5e127d</guid>
<pubDate>Sun, 17 Aug 2025 09:17:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>warlock</b> claims attack for <b>clearybuilding.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>83f5497c745b0c71804a395d11756e8389c1a771c37fb330723c297059eb759b</i><br /><br />Threat actor <b>description</b>: <i>all data</i><br />Target victim <b>website</b>: <i>clearybuilding.us</i>]]></description>
<category>warlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>mycpaconnection.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25083</link>
<guid>b0513535543a50eb3038a8e06541be1d</guid>
<pubDate>Sun, 17 Aug 2025 00:16:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>mycpaconnection.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>44e5a8688689c2d30a6342efe9985ab8b1aaa08b31e4df33c94ea2eaedfd5c54</i><br /><br />Threat actor <b>description</b>: <i>Employees: 25 Revenue:$5 Million Industry:Accounting Services   Phone Number:(704) 878-9541 SENSITIVE DATA_$</i><br />Target victim <b>website</b>: <i>mycpaconnection.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hytrol</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25082</link>
<guid>97e61f42dca54837f80794d0ea3bbc4e</guid>
<pubDate>Sat, 16 Aug 2025 16:28:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Hytrol</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d17a77985cfcbb21326dee87ae67d60951b9b1dad6c49a589f9e8e3ef6109d7b</i><br /><br />Threat actor <b>description</b>: <i>Hytrol Conveyor Company, Inc. was founded in 1947. The Company's line of business includes manufacturing conveyors and conveying equipment. The company is headquartered in Jonesboro, ArkansasWe are ready to upload more than 20GB files of essential corporate documents such as: financial data (audit, payment details,financial reports, invoices), employees and customers (and even relatives) information (Social Security Card, death certificate, medical information) and other documents with detailed personal information so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>THE-MILLENNIUM-GROUP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25081</link>
<guid>766b9a83afd8feba96ec3dcd724fe4d9</guid>
<pubDate>Sat, 16 Aug 2025 08:20:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>d4rk4rmy</b> claims attack for <b>THE-MILLENNIUM-GROUP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>481fd6f1e7898e41cd2a661f57d0acc9422a8e06a7bd6cf3a5d4d7b9ab723183</i><br /><br />Threat actor <b>description</b>: <i>https://www.tmgofficeservices.com The Millennium Group (TMG) is a global provider of document management and workplace services with more than 40 years of operations. TMG is certified as a Minority Business Enterprise (MBE) and a Woman-Owned Business Enterprise (WBE). The company operates…</i><br />Target victim <b>website</b>: <i>tmgofficeservices.com</i>]]></description>
<category>d4rk4rmy</category>
</item>
<item xmlns:dc='ns:1'>
<title>VINSON--ELKINS-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25080</link>
<guid>b0bad21adb7b77a1503abfc43a27f934</guid>
<pubDate>Sat, 16 Aug 2025 08:19:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>d4rk4rmy</b> claims attack for <b>VINSON--ELKINS-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>129d2ce0b7dde7b33687c6a40b4913d004746550c678f00ba9b740fb1769aaac</i><br /><br />Threat actor <b>description</b>: <i>https://www.velaw.com Vinson & Elkins is a century-strong global law firm that partners with leading companies across key industries on wide‑ranging, complex matters. Blending deep experience with forward‑thinking counsel and close client collaboration, the firm helps organizations pursue goals and navigate…</i><br />Target victim <b>website</b>: <i>www.velaw.com</i>]]></description>
<category>d4rk4rmy</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pequannock-Township-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25076</link>
<guid>0d3132155b700d53e2684d499a3c30f3</guid>
<pubDate>Fri, 15 Aug 2025 21:52:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Pequannock-Township-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>90ce67cc200fc44244ae483223eda40f57b66ce63a7b8fe73416cf781fddaad8</i><br /><br />Threat actor <b>description</b>: <i>The Pequannock Township School District is a comprehensive community public school district that serves students in pre-kindergarten through twelfth grade from Pequannock Township, in  Morris County, in the U.S. state of New Jersey. As of the 201819 school year, the district, comprised of five schools, had an enrollment of 2,123 students and 167.5 classroom teachers, for a studentteacher ratio of 12.7:1. The district is classified by the New Jersey Department of Education as being in District Factor Group "GH", the third-highest of eight groupings.</i><br />Target victim <b>website</b>: <i>pequannock.org</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grand-Rapids-Controls</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25073</link>
<guid>8141c60e393b72d67396df39cdda9c1e</guid>
<pubDate>Fri, 15 Aug 2025 18:47:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Grand-Rapids-Controls</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd132bcc4e7793d5ea0d6c3529dcfed93b5ca491692a298520222b126db81d00</i><br /><br />Threat actor <b>description</b>: <i>The 150 GB leak involves confidential documents and NDA agreements with companies such as Ford, Bentley, Lear, and others.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>ZMM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25065</link>
<guid>d45e74902b530325e95724b12df237c4</guid>
<pubDate>Fri, 15 Aug 2025 16:09:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>ZMM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7406a5fc2d5ced688134ee9857459b071b305d3c1605a139391e71e08fd71ef7</i><br /><br />Threat actor <b>description</b>: <i>ZMM Architects and Engineers is an award-winning design firm withoffices in West Virginia, Virginia, and Ohio, providing integrated professional services. They specialize in various sectors including education, healthcare, government, and commercial spaces, employing a holistic approach to building design that encompasses architecture, engineering, and sustainable design.We are ready to upload more than 50GB files of essential corporate documents such as: financial data (audit, payment details,financial reports), employees and customers information, confidential informationand other documents with detailed personal informationso on. You will also find such court hearings and other legal confidential docs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Philadelphia-Investment-Partners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25068</link>
<guid>f51f2cb97557b09a25b8ca407f1f3f29</guid>
<pubDate>Fri, 15 Aug 2025 15:09:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Philadelphia-Investment-Partners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>37dd7aca113a41ac0ca1ddac1f9fab8b4d91ba7e74ba65c2f0ca5e6ea209a538</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Philadelphia Investment Partners is a private investment firm that focuses on global and international equities. Tracing its roots back to the 1980s, the company seeks to provide high net-worth investors, corporate pension funds, endowments, and foundations with superior investment performance and service.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>MYVISAJOBS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25071</link>
<guid>8acac47f63dc5da08a77ff8eca8d3986</guid>
<pubDate>Fri, 15 Aug 2025 15:08:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>MYVISAJOBS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a8ebc58cc1f99d17363aa4e8a990b27bc59a803bac5cee20e657fcdec23f6fb</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] MYVISAJOBS.COM is a website that helps international students and professionals seeking work in the United States. The platform provides information about job sponsors, visa filings, employment, immigration attorneys, etc. Their data is collected from various U.S. federal agencies. The company aims to help immigrants secure suitable employment in the U.S. and navigate through the visa process efficiently.</i><br />Target victim <b>website</b>: <i>MYVISAJOBS.COM</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Karndean-International-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25066</link>
<guid>fa7fb9f1120429eafb496a431f96bc17</guid>
<pubDate>Fri, 15 Aug 2025 12:12:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>crypto24</b> claims attack for <b>Karndean-International-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee7b34e208c38596183d1b32fce0ba6bcc382c2d1443204c329f592a8fbe3816</i><br /><br />Threat actor <b>description</b>: <i>We have exfiltrated over 600GB of your most sensitive corporate data, including financial, technical, operational, and personal information covering customers, employees, and strategic business plans.</i><br />Target victim <b>website</b>: <i>karndean.com</i>]]></description>
<category>crypto24</category>
</item>
<item xmlns:dc='ns:1'>
<title>Norwest-Venture-Partners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25057</link>
<guid>157c6fd13f6ad2911c5ec3a97dfd4438</guid>
<pubDate>Fri, 15 Aug 2025 00:34:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Norwest-Venture-Partners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>382cfef732776e909c2ec123a2697734987a832aafa99bd95819fba1c4a45a75</i><br /><br />Threat actor <b>description</b>: <i>A top venture and growth equity investment firm, Norwest works side-by-side with the world’s most successful entrepreneurs, providing expert guidance and personalized resources every step of the way. Founded in 1961, Norwest Venture Partners is a global, multi-stage venture capital and growth equity investment firm. The company is headquartered in Palo Alto, California with offices in India and Israel.</i><br />Target victim <b>website</b>: <i>www.nvp.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.captrade.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25050</link>
<guid>914ceffcd6e7835cdc715e8ed99a6280</guid>
<pubDate>Thu, 14 Aug 2025 23:28:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.captrade.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee48422ed8cf9feeeabf2b17a92c09694e7548fa7ff0fa39e42f66f44e0999e4</i><br /><br />Threat actor <b>description</b>: <i>Capital Trade, Incorporated, based in Washington, D.C., is the real force behind the crazy policy of raising US tariffs. The company provides legal services in the field of international trade and litigation support. They help the US governme            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ABcom</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25056</link>
<guid>6ece1478634d078f9483620b74fb05f9</guid>
<pubDate>Thu, 14 Aug 2025 21:36:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>ABcom</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b022e96e3e5f61a6e6181f664b9448cb35feb44ed62e3a86fbcf52b7cc14681</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.abcomllc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Greenscape-Pump-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25055</link>
<guid>53b86c11c60dd11299ee3b0417d8f2ab</guid>
<pubDate>Thu, 14 Aug 2025 21:36:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Greenscape-Pump-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2d7cabd325c273083acf46afaad9921bc5b68f7c33082ca7b559f8dac19bca04</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.gpsiwater.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>eShipGlobal</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25054</link>
<guid>51ac771526c1909f0763cae561568011</guid>
<pubDate>Thu, 14 Aug 2025 21:35:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>eShipGlobal</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57383989ba9f3af1195ad81295e467afe400ec1cbb144b326cf05a3ce261212b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.eshipglobal.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>NextLabs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25053</link>
<guid>cedb7f24376214d5fe503683cac8ab74</guid>
<pubDate>Thu, 14 Aug 2025 21:34:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>NextLabs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1836020c97b1c79ba0b760550015b0734636136c24e0ee6a35dc7f7969f0d4bf</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.nextlabs.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ranshu-Meridian-Auto-Parts-VisionaireOmega-enviromenta-technologies-Ap-Air</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25052</link>
<guid>0d9f790e48d1c2850cc47db8af965495</guid>
<pubDate>Thu, 14 Aug 2025 17:17:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Ranshu-Meridian-Auto-Parts-VisionaireOmega-enviromenta-technologies-Ap-Air</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3cdebf1cd4fa493f37317b3070b8d20555a977eb5a2b874ad415dbca25d55a9</i><br /><br />Threat actor <b>description</b>: <i>We are going to upload about 47 gb of a bunch of companies. All o
f them are auto parts related. You will find detailed employees i
nformation (DOB, DL numbers and so on), HR files, financial and a
ccounting information, lost of agreements and contracts, drawings
, specifications, corporate credit card details, scans of documen
ts with detailed personal information, customer data and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Erdy-McHenry-Architecture</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25048</link>
<guid>2ca6b57ab35e4f00b28b0ed884f6e84a</guid>
<pubDate>Thu, 14 Aug 2025 15:48:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Erdy-McHenry-Architecture</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dab321a3a873d760769e64272273698e6d666b4ad4238792de393f011b6d2729</i><br /><br />Threat actor <b>description</b>: <i>Erdy McHenry Architecture specializes in a diverse range of archi
tectural services, including academic, cultural, agricultural inf
rastructure, commercial, housing, and health science projects.

We are ready to upload more than 26GB files of essential corporat
e documents such as: financial data (payment details, invoices), 
employees information. A bit of personal files and customers data
.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lundberg-Design</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25044</link>
<guid>bcea8e33f6a05964bdf4ac26c1aa89cf</guid>
<pubDate>Thu, 14 Aug 2025 11:46:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Lundberg-Design</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce1c2b04fdac5914d32147c5f31c3f59a6a56cac98f93eb33a636cf028ad2099</i><br /><br />Threat actor <b>description</b>: <i>Lundberg Design specializes in a diverse range of architectural p
rojects including residential, commercial, and public spaces. The
y offer services that encompass design for restaurants, hotels, r
etail spaces, and other urban and rural developments.

We are ready to upload more than 91GB files of essential corporat
e documents such as: financial data (audit, payment details,finan
cial reports, invoices), employees and customers information (pas
sports, driver's license) confidential information, NDAs and othe
r documents with detailed personal information so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rusin-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25043</link>
<guid>e8f4d8f59f34ac30a908af58d123135a</guid>
<pubDate>Thu, 14 Aug 2025 10:46:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Rusin-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c98541be52c698b531bbe478f94e3490ec391d51a79db42e3565bb3b0ccef6dd</i><br /><br />Threat actor <b>description</b>: <i>Rusin Law is a premier civil litigation defense firm specializing
in workers' compensation cases. Their services encompass a wide 
array of legal disciplines, including civil litigation, insurance
defense, employment law, and more.

We are ready to upload more than 134GB files of essential corpora
te documents such as: financial data (audit, payment details,fina
ncial reports, invoices), employees and customers information (bi
rth certificate,medical information) and other documents containi
ng confidential information. You will also find such documents as
police protocols, court hearings and other legal confidential do
cs.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Manhattan-Retirement-Foundation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25039</link>
<guid>4197c77706a5d5610d83f009209b00fe</guid>
<pubDate>Thu, 14 Aug 2025 08:19:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Manhattan-Retirement-Foundation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>82597528750ebf72cda8121afc3b65c278d78e28b1f68b480a3e99567c21290b</i><br /><br />Threat actor <b>description</b>: <i>Continuing Care Retirement Community in Manhattan Kansas serving Manhattan and the surrounding communities providing Independent Living, Assisted LIving, Healthcare and Transitional Care services.</i><br />Target victim <b>website</b>: <i>www.meadowlark.org</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>Barbas-Nunez-Sanders-Butler--Hovsepian</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25040</link>
<guid>c5c3478127f5e50e49b50a3846afe884</guid>
<pubDate>Thu, 14 Aug 2025 08:18:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Barbas-Nunez-Sanders-Butler--Hovsepian</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd6437b85fd9e375206bf7fea1dcb8defafea92d4a0bae31c8bcf64cbf0c0ab4</i><br /><br />Threat actor <b>description</b>: <i>Barbas, Nuez, Sanders, Butler & Hovsepian is a law firm based in Tampa, Florida, specializing in workers' compensation, personal injury, and social security disability claims. With over 150 years of combined legal experience, their team is committed to serving clients primarily in the Tampa Bay area, including Hillsborough, Pinellas, Pasco, and Polk Counties. They pride themselves on strong client relationships and personalized service, treating clients like family throughout the legal process. Established in 1989, the firm has a proven track record in helping clients obtain compensation for workplace injuries, personal injuries, and wrongful death cases</i><br />Target victim <b>website</b>: <i>www.barbaslaw.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>Comprehensive-Pain-Centers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25035</link>
<guid>099e842af821e68c6b90d20ddcfc0fc8</guid>
<pubDate>Thu, 14 Aug 2025 00:40:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Comprehensive-Pain-Centers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>98f1959995e25533b2d3812345d6559ae96f3e5de2df0dfb76c63af180933625</i><br /><br />Threat actor <b>description</b>: <i>We operate on a wellness-based system. We offer you medical care services that are local to your community at your work site, educational institution, senior care facility, mall, etc. We offer subscription-based plans that can be used as a replacement for and as a supplement to existing medical care services. No travel to a clinic. No fuss, no hassle, just you and your doctor.</i><br />Target victim <b>website</b>: <i>www.comprehensivepaincenters.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>J-Derenzo</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25036</link>
<guid>da383b7f4fb8b92bb70373274bfa6879</guid>
<pubDate>Thu, 14 Aug 2025 00:40:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>J-Derenzo</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8ac6fe727b7d86863a633716cb8e9c2c771a935d85b43509eb4013a70ba7a6e</i><br /><br />Threat actor <b>description</b>: <i>J. Derenzo Co. has been one of New England’s premier site work contractors for over 75 years. The team’s experience ranges from large scale rural site clearing to some of the most complex, tight-site, deep hole excavations in downtown Boston. Our diversity of expertise has been a key driver in amassing a portfolio of work that is second-to-none in the industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>One-Way-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25037</link>
<guid>4bbef9d1354586336831ab1b4e321f95</guid>
<pubDate>Thu, 14 Aug 2025 00:39:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>One-Way-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>778a1be09ee63584176a949a680ff5f4137926b18cf6030c807e09569d03a179</i><br /><br />Threat actor <b>description</b>: <i>Company is dedicated to taking the worry out of IT by providing outstanding computer support to Dental and Healthcare practices throughout Texas. While working closely with our clients we have resolved numerous distinct challenges with our hands-on technical approach. We are confident that our many years of offering our clients the best healthcare and dental information technology solutions available has resulted in increased efficiency and decreased overall costs for their practices.</i><br />Target victim <b>website</b>: <i>onewaysolutions.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>TELACU-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25033</link>
<guid>e12adf20632f7173b369b04f8e76a425</guid>
<pubDate>Thu, 14 Aug 2025 00:39:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>TELACU-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>646f30dda429c437460a82cc27d5ad5de1c2f044371278a8f05be3f328f847fb</i><br /><br />Threat actor <b>description</b>: <i>TELACU is a comprehensive organization focused on community development through various services such as construction management, real estate development, and financial services. They offer a wide range of housing solutions including family, mixed-use, and senior housing, alongside commercial and industrial development. TELACU also emphasizes education with foundations and programs aimed at college readiness and career success for diverse populations. Their intended clients include community members seeking housing, educational resources, and financial services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>ECM-Consultants</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25034</link>
<guid>31bc5644ae198ad96dd9f2438bfdae3a</guid>
<pubDate>Thu, 14 Aug 2025 00:39:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>ECM-Consultants</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>65c7bd9ad07a5f205b92551b2be313ea3034fb9b455a7eea25b82bb602a0d6ff</i><br /><br />Threat actor <b>description</b>: <i>ECM Consultants is an engineering, architectural, and construction management firm headquartered in Metairie, Louisiana serving the entire United States. ECM has offices in Baton Rouge and Lafayette, Louisiana and Houston, Texas.</i><br />Target victim <b>website</b>: <i>www.ecmconsultants.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advanced-HPC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25038</link>
<guid>8a58beb9988f8b83e2f4ad93576c2f6a</guid>
<pubDate>Wed, 13 Aug 2025 23:19:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Advanced-HPC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b8670029991696f4fc596beacb1c56933478e86b80a95332f515dd1957b470c</i><br /><br />Threat actor <b>description</b>: <i>Leakage of internal documents at a company engaged in the development and implementation of HPC systems for science and defence.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Charak-Center-for-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25030</link>
<guid>bb83d7c0cd2928b6da5d26ceb1a98753</guid>
<pubDate>Wed, 13 Aug 2025 17:29:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Charak-Center-for-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>64261911f5ae366c68176f33ee909b571fb136c99d89a36001a417e0772377f0</i><br /><br />Threat actor <b>description</b>: <i>Charak Health and Wellness Center, USA: an organization providing mental health services and treatment for alcoholism and drug addiction. The widest range of psychiatric services in northeastern Ohio. The publication of internal company data             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ffs.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25031</link>
<guid>52c2edca4131f0eeaff48a3f9a99bce0</guid>
<pubDate>Wed, 13 Aug 2025 17:29:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>ffs.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>88f3e4618e3f92e4433eddbf38dd2a0d126343bbfae37e52661b1e62553fb3b5</i><br /><br />Threat actor <b>description</b>: <i>Flavor & Fragrance Specialties is now a Lucta brand specializing in flavorings for coffee and other beverages. Our dedicated teams in the US will continue to provide unique market insights and customized flavor and fragrance solutions for our            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ahtna-Incorporated</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25026</link>
<guid>fe0437935a8eb2c42ac327ae401d8482</guid>
<pubDate>Wed, 13 Aug 2025 14:41:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Ahtna-Incorporated</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>afc54fd6cd10651f36c24ff3af28c5082c9d1ba62e0cfd97a627b7b24bf5e230</i><br /><br />Threat actor <b>description</b>: <i>Ahtna Inc., provides construction and integrated services. The company is headquartered in Glennallen, Alaska. Ahtna, Incorporated is Alaska Native Regional Corporations established by Congress under terms of the Alaska Native Claims Settleme            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cos-County-Family-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25028</link>
<guid>ca97f360a1f78cb7e0417131c8b3fc76</guid>
<pubDate>Wed, 13 Aug 2025 12:46:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>RunSomeWares</b> claims attack for <b>Cos-County-Family-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc5ad237ed5ab6261c5dd52dedb7885c84e8abd279e406b6d813d7a9d2efa204</i><br /><br />Threat actor <b>description</b>: <i>Coös County Family Health Services has provided comprehensive office-based primary care services for more than 10 years.</i><br />Target victim <b>website</b>: <i>coosfamilyhealth.org</i>]]></description>
<category>RunSomeWares</category>
</item>
<item xmlns:dc='ns:1'>
<title>Litchfield-Cavo-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25027</link>
<guid>0d346bf6310fdff1302c9d01fb713d51</guid>
<pubDate>Wed, 13 Aug 2025 10:39:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Litchfield-Cavo-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42fe1f86964bfbd4c4e5c9e4c65b43e692bd7a094a5d11abdcc5cf1b8b120328</i><br /><br />Threat actor <b>description</b>: <i>Litchfield Cavo LLP is a premier coverage and litigation defense 
law firm founded in 1998 on one principal - client service comes 
first.

We are ready to upload more than 300GB  files of essential corpor
ate documents such as: financial data (audit, payment details,fin
ancial reports, invoices), employees and customers information (d
river's license, Social Security Numbers, death certificate, medi
cal information ) confidential information, NDA  and so on. A lot
of personal files and customer data,also you will find a lot of 
court documents such as police reports, hearings and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Box-Elder-County</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25025</link>
<guid>8b57c0bb0564fe650d8ad45b7d7c1017</guid>
<pubDate>Wed, 13 Aug 2025 05:21:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Box-Elder-County</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a88151bbe53784a51897ed5b6c89a71d8b0152758e0dd6c4fd87749efe18905f</i><br /><br />Threat actor <b>description</b>: <i>Box Elder County is a county in the northwestern part of the state of Utah, USA. Located in the northern part of the state, the county is a place for wildlife viewing and recreation of all kinds.</i><br />Target victim <b>website</b>: <i>boxeldercounty.org</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hygrade-Components</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25020</link>
<guid>39e947eb63c8bac0a911b23ac881c9bb</guid>
<pubDate>Wed, 13 Aug 2025 00:39:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Hygrade-Components</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3925ca167b77448a39c90a8ddead9c756f5a64784bdada2883ceb90e2de3760</i><br /><br />Threat actor <b>description</b>: <i>Hygrade has provided custom roll formed products to a variety of industries since 1939. For precision roll formed shapes, frames and channels, come to Hygrade - the name that means High Quality. Whether it's angles, channels, special shapes, decorative trim, structural sections - whatever you need - Hygrade meets it with commitment to service and dedication to quality.</i><br />Target victim <b>website</b>: <i>www.hygradecomponents.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eagan-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25021</link>
<guid>4a6691c609e4d04769c91b4b6f2d5358</guid>
<pubDate>Wed, 13 Aug 2025 00:39:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Eagan-Insurance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e54cf3d22e5bdb246ddda7492c60ebc975874c99fe952bb3774235da4081b0ff</i><br /><br />Threat actor <b>description</b>: <i>Eagan Insurance Agency functions as an independent insurance agenciy in the New Orleans area that was established in 1954. Services provided by Eagan Insurance include Personal Insurance, Business Insurance, and Benefits. This agency offers a comprehensive commercial property and casualty department, a vital personal lines division with a unit specializing in the affluent client, and a rapidly growing employee benefits arena. </i><br />Target victim <b>website</b>: <i>www.eaganinsurance.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>bvasd.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25017</link>
<guid>db4af40394d17c2399d9b2becf0a961d</guid>
<pubDate>Tue, 12 Aug 2025 22:58:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>bvasd.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eb9e0b0d785794b10e30865305f2a8f28e06f4f3d610fc8ff1bd57ba3606e371</i><br /><br />Threat actor <b>description</b>: <i>The Belle Vernon Area School District (BVASD) is a medium-sized public school district located approximately 40 minutes southeast of Pittsburgh in Westmoreland and Fayette counties, Pennsylvania.Formed in 1965 through the merger of the Belmar            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>northernconstruction.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25018</link>
<guid>3e70babf4bcfb88ff496d2f8326ba174</guid>
<pubDate>Tue, 12 Aug 2025 22:58:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>northernconstruction.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>35390a525c63ec3d032c593098cab4e540619a906b012a13074721b8aa151c73</i><br /><br />Threat actor <b>description</b>: <i>Northern Construction Service, LLC is a Massachusetts-based general contractor specializing in bridge construction, construction site work, port and harbor work, concrete work, and utility services.
1.The document consists of two invoices fr            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>syncadd.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25019</link>
<guid>112473807df45853e16204788ce21e2c</guid>
<pubDate>Tue, 12 Aug 2025 22:58:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>syncadd.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1498556029223fce838f8c05db9ac8dfb3581da97d03e2ec753bf9a03956d44f</i><br /><br />Threat actor <b>description</b>: <i>SYNCADD is a technology solutions provider that delivers effective data and business results to customers worldwide, including divisions of the US Armed Forces. The company's wide range of services includes audit preparation, corporate soluti            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Assisted-Living-Pharmacy-Service-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25012</link>
<guid>b71faf915b91184a5c4dc56c7d6262da</guid>
<pubDate>Tue, 12 Aug 2025 16:57:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Assisted-Living-Pharmacy-Service-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8829c696492747a9483f18fe744227c35f0db50a19eafcca61b428133341ff20</i><br /><br />Threat actor <b>description</b>: <i>Assisted Living Pharmacy Service LLC operates in the field of providing medicines and assistance in selecting medications in WL, USA. The company states that “Our mission is to provide the best services in the industry at the highest level             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Epperson-Law-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25016</link>
<guid>7b080bac7a1e553d6da63936a525c619</guid>
<pubDate>Tue, 12 Aug 2025 16:39:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Epperson-Law-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7095e67e3c477ae2672a17b88d8d771d71a562a2b00353c402c750e5769e1cf3</i><br /><br />Threat actor <b>description</b>: <i>The law firm called "Epperson Law Group" paid with their safety and the safety of their clients, because they were negligent and indifferent to their safety! Many people's data was compromised, and the work in the system was completely broken!</i><br />Target victim <b>website</b>: <i>epplaw.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nutis-Press</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25011</link>
<guid>68e3bf852693ad8a72f32fdfe50dc6d4</guid>
<pubDate>Tue, 12 Aug 2025 13:57:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Nutis-Press</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a3b8d366b12b4c899a7c1ca91ad3618fe8b2ee9505b3c3e4c56904ea26db2b9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trans-Tex</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25010</link>
<guid>8cae5112c2129ad4b825e8388c749b3d</guid>
<pubDate>Tue, 12 Aug 2025 05:42:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Trans-Tex</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa127ee2bb8e11b08daad728c97202c13ae1415a81d0dd94d6c401df3aa46f7e</i><br /><br />Threat actor <b>description</b>: <i>Trans-Tex Trans-Tex has been the leader in narrow web dye sublimation printing for over 25 years.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-St-Paul</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25007</link>
<guid>4e21a35107f3ebeb38da1a3ee0a6d47f</guid>
<pubDate>Mon, 11 Aug 2025 18:50:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>City-of-St-Paul</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b842818d34d38548cbb626843e1a30ac65e643645d92dffa9cf1af1d6929656b</i><br /><br />Threat actor <b>description</b>: <i>The government of the city of Saint Paul, Minnesota, including its representatives and employees, is extremely careless and irresponsible about the security of their city, because of this, a large part of the infrastructure was damaged, brought a lot of losses and damage! Including in the worst position were residents whose data was compromised in the internet! Saint Paul, Minnesota, population is about 310,992 people. The city is part of the Minneapolis - Saint Paul metropolitan area.</i><br />Target victim <b>website</b>: <i>stpaul.gov</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Scharine-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25006</link>
<guid>1b4ee40ffb4c7cf07b1d29cb65862410</guid>
<pubDate>Mon, 11 Aug 2025 18:44:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>The-Scharine-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>faa29fc30232d888ab1e523abd79ea4ba90c027488437bd5ca3945eca06aa02f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.thescharinegroup.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bluewater-Yacht-Sales</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25005</link>
<guid>72a2c10a923eca15e8aee55da47a96f3</guid>
<pubDate>Mon, 11 Aug 2025 18:44:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Bluewater-Yacht-Sales</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>316594b08c3d951e70709223c973fadc6edf073e37a0b879cc67c207121908cb</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.bluewateryachtsales.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Travancore-Analytics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25004</link>
<guid>80b14a33b85fcee05b046edd635e27da</guid>
<pubDate>Mon, 11 Aug 2025 18:43:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Travancore-Analytics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>480dbf0dd95fd9973a10db869773eb03c5cdf87476ef619c5dad5e7ca36035d3</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ritetrack.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rite-Track</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25003</link>
<guid>652a805887302f460fa9d0f968fdee9d</guid>
<pubDate>Mon, 11 Aug 2025 18:43:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Rite-Track</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>13cf67c6d1d3c1fb53e6a3ae483a6df7c490e5036ad9c36209637b1b4ad89d0b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ritetrack.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wytech-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24984</link>
<guid>e103d1ed1d6c41b0f098ff377dde2966</guid>
<pubDate>Mon, 11 Aug 2025 15:39:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Wytech-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec6cdb22f1d31e46172625e90396392314b55b0c67eb3bf46a4387bdfb7875d5</i><br /><br />Threat actor <b>description</b>: <i>For nearly 50 years, Wytech has been committed to earning its pos
ition as the preferred development and manufacturing partner for 
straight and cut medical wire, complex catheter mandrels, and cor
e wires for medical device OEMs and contract manufacturing organi
zations (CMOs) as the leading medical wire and precision grinding
partner. 

We are ready to upload more than 42Gb files of essential corporat
e documents such as: financial data (audit, payment details, fina
ncial reports, invoices), employees and customers information (em
ail's, medical information and other documents), confidential inf
ormation, NDA  and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>TRS-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24994</link>
<guid>10e36ff70e75deadae36b7648dacd8ad</guid>
<pubDate>Mon, 11 Aug 2025 15:39:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>TRS-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>853e53593e2d8d9b29ae930cfcaf1be11cd5db6e8cb84ca7a62dda6e3e841586</i><br /><br />Threat actor <b>description</b>: <i>In summer 2025 our team managed to crack IT defenses of a large number of companies. Data of some of them hasn't been leaked, so we will just list company names.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sterling-Card-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24995</link>
<guid>f49a2479665b3bd13ec08d5d1a8bbe4c</guid>
<pubDate>Mon, 11 Aug 2025 15:39:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Sterling-Card-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30e50b402131ee1eef9c3cb8349a5b9441825f93a4851ae711a19f3166e9d762</i><br /><br />Threat actor <b>description</b>: <i>In summer 2025 our team managed to crack IT defenses of a large number of companies. Data of some of them hasn't been leaked, so we will just list company names.</i><br />Target victim <b>website</b>: <i>sterlingcardsolutions.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Law-Offices-of-Hicks--Demps</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24999</link>
<guid>ad2d8a4d8e8654a34f898980254af33f</guid>
<pubDate>Mon, 11 Aug 2025 15:39:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-Law-Offices-of-Hicks--Demps</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>487417c8b3189c6b6d381100e121538dc0bcf84afbf569425674af888090b980</i><br /><br />Threat actor <b>description</b>: <i>In summer 2025 our team managed to crack IT defenses of a large number of companies. Data of some of them hasn't been leaked, so we will just list company names.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Safti-First</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25000</link>
<guid>70f44538106c52ad2a01ffba924792e2</guid>
<pubDate>Mon, 11 Aug 2025 15:39:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Safti-First</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38316251bcffb451c259a2501843104f14548e04c54eafe2e55e5c1c41f9b92e</i><br /><br />Threat actor <b>description</b>: <i>In summer 2025 our team managed to crack IT defenses of a large number of companies. Data of some of them hasn't been leaked, so we will just list company names.</i><br />Target victim <b>website</b>: <i>safti.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aurora-Air-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25001</link>
<guid>330add99531b6d578cc1c18e8444b10a</guid>
<pubDate>Mon, 11 Aug 2025 15:39:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Aurora-Air-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3dfabee9091b356abcb306ab613c733eda5c3583c33b1a16d9845032fbb49ded</i><br /><br />Threat actor <b>description</b>: <i>In summer 2025 our team managed to crack IT defenses of a large number of companies. Data of some of them hasn't been leaked, so we will just list company names.</i><br />Target victim <b>website</b>: <i>auroraair.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sweetener-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=25002</link>
<guid>09d1d2fa86fbc25c85269b522d96b9a9</guid>
<pubDate>Mon, 11 Aug 2025 15:39:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Sweetener-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>73defcbd83afa099287ee9dcbd19ad73e0cc2ded055c10aa59979128c88b4817</i><br /><br />Threat actor <b>description</b>: <i>In summer 2025 our team managed to crack IT defenses of a large number of companies. Data of some of them hasn't been leaked, so we will just list company names.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>ESD</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24981</link>
<guid>9adbaadf095c8de0d2d0b53fe92a5dbb</guid>
<pubDate>Mon, 11 Aug 2025 15:08:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>ESD</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f0253586b88f60c576309b6201ef5c8d2ffac9a7312de70d90701d63b4de4d8</i><br /><br />Threat actor <b>description</b>: <i>ESD Inc. specializes in engineering and manufacturing a diverse r
ange of mechanical and electronic payment systems tailored for th
e multi-housing and laundromat industries. 

We are going to upload company data soon. You will find financial
data (audit, payment details,financial reports, invoices), emplo
yees and customers information (medical information, passports, d
river's license ) A bit of personal files and customers data.
</i><br />Target victim <b>website</b>: <i>esdcard.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Architectural-DesignWest</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24985</link>
<guid>f3062c61fcdbab5937095c1629b71d05</guid>
<pubDate>Mon, 11 Aug 2025 15:08:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Architectural-DesignWest</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0906c1408e2af717a1af4d2879744c79fffe79822031497f1dc046eb07829ccb</i><br /><br />Threat actor <b>description</b>: <i>Design West Architects specializes in architectural design, focus
ing on various sectors including educational and residential proj
ects. 

We are ready to upload more than 27GB files of essential corporat
e documents such as: financial data ( audit, payment details, inv
oices), employees and customers information (telephone numbers, e
mail's, medical information,driver's license, DLs and other docum
ents), confidential information, NDA  and so on.
</i><br />Target victim <b>website</b>: <i>designwestarchitects.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Spring-Footwear</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24986</link>
<guid>77b1ae6be955316d7234f2bc5a409cdd</guid>
<pubDate>Mon, 11 Aug 2025 15:08:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Spring-Footwear</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f9d9b36bb27502f701fcc80f42a332a53a9a0bb76936efe0d6e5b748fda783f</i><br /><br />Threat actor <b>description</b>: <i>Spring Footwear has dedicated itself to providing consumers with 
footwear. The company's brands are Spring Step, L'Artiste, Azura,
Flexus, Patrizia and Spring Step Professional.

We are ready to upload more than 23GB files of essential corporat
e documents such as: financial data (audit, payment details, invo
ices), employees and customers information (email's,driver's lice
nse,Social Security Numbers and other documents), confidential in
formation, NDA  and so on.
</i><br />Target victim <b>website</b>: <i>springfootwear.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Law-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24987</link>
<guid>cc8c609563d2b30f18b01c0fa9e684b3</guid>
<pubDate>Mon, 11 Aug 2025 15:08:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-Law-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4b13bd811cafa80e9730c612a6a561f1efc6fa0fbc3d880bd7c6f2c9c4e548aa</i><br /><br />Threat actor <b>description</b>: <i>The Law Company Inc provides commercial construction services for
vartious industries including retail, worship, industrial, educa
tion, corporate, healthcare, government, lodging, and cultural. 

We are ready to upload more than 14GB files of essential corporat
e documents such as: financial data (audit, payment details, fina
ncial reports, invoices), employees and customers information and
so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Anderson-Packaging</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24988</link>
<guid>228817faf36305ff344e4d7cbe4dc222</guid>
<pubDate>Mon, 11 Aug 2025 15:08:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Anderson-Packaging</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3fa08ee88636786d9fc8c75153149b99b019e1883d8a3ab18ec26a031838640b</i><br /><br />Threat actor <b>description</b>: <i>Anderson Packaging, LLC specializes in packaging and assembly ser
vices tailored for the aftermarket industry.

We are going to upload company data soon. You will find financial
data (audit, payment details,financial reports, invoices), emplo
yees and customers information, driver's license and a bit of per
sonal files and customers data.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Atlas-Transfer--Storage</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24990</link>
<guid>d2b6d861d66fa14bb7cf8c6112d13e0d</guid>
<pubDate>Mon, 11 Aug 2025 15:08:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Atlas-Transfer--Storage</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>88256a2bf8a510cfe940573ab51ffc80fe1117b33187c5de0f760acac35e0179</i><br /><br />Threat actor <b>description</b>: <i>Atlas Transfer & Storage not only handles residential and commerc
ial relocations, but we also provide premier storage solutions. 

We are going to upload company data soon. You will find financial
data (audit, payment details,financial reports, financial report
s, invoices), employees and customers information: driver's licen
se and a bit of personal files and customers data.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Insero--Co.-CPAs-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24991</link>
<guid>4b23f8dc9eb4ed500a662e396908d39b</guid>
<pubDate>Mon, 11 Aug 2025 15:08:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Insero--Co.-CPAs-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>134a9e7343b8a323b23f83deb418293499af5223b002329d58eff92f5018cb99</i><br /><br />Threat actor <b>description</b>: <i>Insero & Co. CPAs founded in 1973 and headquartered in Rochester,
New York, is a premier public accounting firm.

We are ready to upload more than 40GB files of essential corporat
e documents such as: financial data (audit, payment details,finan
cial report, invoices), employees and customers information (pass
ports, emails, driver's license and other documents), confidentia
l information, NDA  and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Louis-Tieu-DDS-MD</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24976</link>
<guid>6f7ed2665430436edf77b2c6d75740c7</guid>
<pubDate>Mon, 11 Aug 2025 11:14:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Louis-Tieu-DDS-MD</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2bc87c00c2e63227f222a4ed7749f3dad4516e32ec6e11dade22395fbef0271c</i><br /><br />Threat actor <b>description</b>: <i>Dr. Louis Tiu was born in Taiwan and raised in Rowland Heights, California. After graduating from the University of California, San Francisco (UCSF) School of Dentistry, he continued his education in oral and maxillofacial surgery, earning two degrees: one from the UCSF School of Dentistry and the other from the University of California, Davis (UCD) School of Medicine. After receiving his medical degree from UCD, he completed his residency at UCSF.  He is responsible for the leak of more than 500 pieces of personal data belonging to his clients</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Community-Services-of-Missouri</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24974</link>
<guid>f138e593207a9b63ce9a539aa94337bc</guid>
<pubDate>Mon, 11 Aug 2025 00:31:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>weyhro</b> claims attack for <b>Community-Services-of-Missouri</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a5a31ba3eaa858e6984a0f0067c8117f1aff115ad9cec1c8588b8180aa6bfb91</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Community Services of Missouri is an organization that provides a range of services to aid individuals and communities. These services include driver improvement programs, drug education and prevention programs, substance abuse traffic offender programs, and probation services. The organization focuses on fostering better understanding of safety, well-being, and responsible decision-making. Community Services of Missouri operates in various locations across the state of Missouri.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>weyhro</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chemtron-RiverBend</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24975</link>
<guid>ff10bdb362b3ea4aa07fae2dcd78cf79</guid>
<pubDate>Mon, 11 Aug 2025 00:30:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>weyhro</b> claims attack for <b>Chemtron-RiverBend</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>948c37c587ee54494d2f649f064ca855ec54863f74b761424209cdf7cd315125</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Chemtron RiverBend is a leading hazardous waste and non-hazardous waste management service provider. They specialize in providing effective and safe disposal and recycling of waste for a wide range of industries. They deliver waste management solutions with safety procedures and regulations, ensuring environmental protection and compliance.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>weyhro</category>
</item>
<item xmlns:dc='ns:1'>
<title>L3Harris-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24967</link>
<guid>b05f1c54b7595590394fdef928ede449</guid>
<pubDate>Sun, 10 Aug 2025 13:27:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>L3Harris-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f589eaf053c39962fe133edbdf44af6d296c0ecc06649fcba0f53559d718672</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>St-Thomas-More-Catholic-High-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24968</link>
<guid>081d5e994ab762a68f8c0546a8968b00</guid>
<pubDate>Sun, 10 Aug 2025 12:28:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>St-Thomas-More-Catholic-High-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>717d30edb9817a23d9549577030b1ff56304ba75aabc8644cf4992b0fbf0eee0</i><br /><br />Threat actor <b>description</b>: <i>St. Thomas More Catholic High School is one of the most famous and prestigious schools in Louisiana, USA. Every child in Lafayette wants to study here, and parents are willing to pay a lot to get their child into this elite environment. On th            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Howard-Financial--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24972</link>
<guid>2145031a345440c221d8992954a841db</guid>
<pubDate>Sun, 10 Aug 2025 12:10:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Howard-Financial--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c59b2849ac58fc14f38f404ea62b3252ce78b1a0b67a019d9d9a27049f435693</i><br /><br />Threat actor <b>description</b>: <i>Welcome to Howard Financial Corp Audit and compliance (LIP AUDIT 2023–2025) Customer databases (ACTIVE/INACTIVE blue files, customer lists) Internal procedures and templates (HOWARD FINANCIAL PROCEDURES) Working with partners (AIG, Allianz, Americo, etc.) Personal work logs and diaries Customer letter archives Financial and product materials Contracts and legal documentation You may also meet with one of the directors, Gregory P. Howard, and perhaps share his enthusiasm for homosexuality with Asian men. You will soon see everything.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>RHI-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24964</link>
<guid>ab7c5cdb20164d2d25769bddd2fe1493</guid>
<pubDate>Sat, 09 Aug 2025 18:38:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>RHI-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63ce80e1770bf2dd2f91836cf67fdaa7633fd5c9a0ffba5c087d7fcc1d72d5a7</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.rhisupply.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>CFI-Tire-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24963</link>
<guid>b4f6926d4794e9cdb293fa94a06b4577</guid>
<pubDate>Sat, 09 Aug 2025 18:37:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>CFI-Tire-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>82dc4cc0e974849b302a6f15e3dd701b5db3e959395ad3276ebb83ec439946b3</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.cfitire.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Drive--Shine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24954</link>
<guid>f915833c0979810086c2ea49db2993c6</guid>
<pubDate>Sat, 09 Aug 2025 02:54:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Drive--Shine</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46881cca61b32e4209ecf41785e82643637aa46684436a093677a6aed38df248</i><br /><br />Threat actor <b>description</b>: <i>Drive & Shine is a premier car care service that offers express car washes, inte...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>mauilodging.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24957</link>
<guid>e51e03b93afcc9032d56360fbfa2a47d</guid>
<pubDate>Fri, 08 Aug 2025 23:12:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>mauilodging.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4329aac2edb738339c86f37f65ecfd7e9d06d45c14d7fae7113e0695c1a059c1</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] MauiLodging.com is a property rental service company based in Maui, Hawaii. This firm specializes in providing a wide range of accommodation options as per user requirements, from luxury villas to economical vacation rentals. Tailored to cater to the varying needs of tourists, the firm assures quality amenities, scenic locations, and personalized customer services, making the trip to the island unforgettable.</i><br />Target victim <b>website</b>: <i>mauilodging.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pacific-HealthWorks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24950</link>
<guid>ea16c8ad502b00dd6eb031b3fd35d738</guid>
<pubDate>Fri, 08 Aug 2025 10:22:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Pacific-HealthWorks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91bcb4dbedd849773284b874b526e3015cdc2b723e60a2752fe7d310e225a328</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Pacific HealthWorks is a management services organization based in Los Angeles, United States. The company primarily provides comprehensive management, administrative, and support services to healthcare practitioners and facilities, including doctors’ offices, healthcare clinics, and other related medical entities. They focus on business and operational aspects so the medical professionals can concentrate on patient care.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>La-Perouse</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24952</link>
<guid>c9ce98a38ebb27ccdb0e5083f2cfcde7</guid>
<pubDate>Fri, 08 Aug 2025 10:22:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>La-Perouse</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e58e90006d5ff3231ff98c36e1555a4bbf6bfbaee9f7aae0f798dd504e58f610</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Main-Electric-Supply-Co.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24948</link>
<guid>4579b0511a0e6319628ffc17cc6b3998</guid>
<pubDate>Fri, 08 Aug 2025 00:13:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Main-Electric-Supply-Co.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bfc91a6f1cd23724295243eeda0cc440f35e472bf40a3e2442719eea80413a22</i><br /><br />Threat actor <b>description</b>: <i>Main Electric Supply Company was founded on October 14th, 1946 by Charles Vowels and Burt McCombs. From the very start, our company worked tirelessly to meet the growing demands of the electrical industry. Operating on a word of mouth basis and building a reputation for excellent service, it was not long before Main Electric Supply Company became a household name in the Los Angeles area.</i><br />Target victim <b>website</b>: <i>www.mainelectricsupply.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>ryeco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24936</link>
<guid>c0c29d6e2dd3f877b24a575d79081598</guid>
<pubDate>Thu, 07 Aug 2025 18:28:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>ryeco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46ee1ebf810ff0ae2a83f30be6138f11bd21aa838bdc0ec3bd8b91cf8895b635</i><br /><br />Threat actor <b>description</b>: <i>Ryeco is an international company that services and manufactures paper, hygiene products, and recycling materials such as paper, hygiene products, nonwoven materials, films, foil, labels, packaging, metals, plastics, printing, printing, glass            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>lpco.co</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24937</link>
<guid>3262c13088a37147f222c34b1a9029a4</guid>
<pubDate>Thu, 07 Aug 2025 18:28:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>lpco.co</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>44a65d7e5683a71dc6597641826d083c93f7d85b7d2b48badd6e48cae2cad73b</i><br /><br />Threat actor <b>description</b>: <i>Lawrence Paper specializes in the design and manufacture of corrugated boxes and packaging solutions. The company offers a wide range of services, including industrial boxes, retail-ready packaging, custom box manufacturing, as well as digita            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>eyeqmonitoring.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24938</link>
<guid>d830f71ff178b3698996fb6614751c91</guid>
<pubDate>Thu, 07 Aug 2025 18:28:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>eyeqmonitoring.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ca35c0d46c65682e1ee8a2f4b6e145595696a23174ed062450f9664af362688</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2007, EyeQ Monitoring is one of the largest providers of real-time video surveillance services in the United States. EyeQ installs and maintains state-of-the-art video surveillance systems throughout the United States and hires and            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>avosinamed.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24939</link>
<guid>f47dafa1b01fc67850d5576e5216df25</guid>
<pubDate>Thu, 07 Aug 2025 18:28:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>avosinamed.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd073e0a31b18c3447091e73cca16f9cc0ba6f66570f0bed7ea4672a192bfea2</i><br /><br />Threat actor <b>description</b>: <i>Avosina Healthcare Solutions specializes in providing comprehensive medical billing and IT services, striving to optimize the work of doctors.
1.The document is an official payslip for March 2025 for an employee of Avosina Medical Technologi            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>lodipd.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24941</link>
<guid>d8c2a05e8270406dcdd260a088902cb5</guid>
<pubDate>Thu, 07 Aug 2025 18:28:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>lodipd.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1694a81b2dc3df889e9daa6579b2cdaf9046b8185b541ae3081a92bfde9fa043</i><br /><br />Threat actor <b>description</b>: <i>The primary duty of the Lodi Police Department is to serve humanity, protect life and property, defend the innocent from fraud, the weak from oppression or intimidation, and the peaceful from violence or disorder, and to respect the constitut            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>csrepair.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24942</link>
<guid>9f882c9b443017597c70b4edaa542a0c</guid>
<pubDate>Thu, 07 Aug 2025 18:28:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>csrepair.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ef719e9f9c76c701dc4773046a39a325161b7ffb8f52335616a72857458d012</i><br /><br />Threat actor <b>description</b>: <i>CS Truck & Trailer is a comprehensive fleet service provider specializing in mobile repairs, preventive maintenance, and complex diagnostics for trucks and trailers.
1.The document is a notarized affidavit from Mason Jones confirming the acc            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>studebakersubmetering.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24943</link>
<guid>e6ec91cba600ca785d5e02beb0d0c8eb</guid>
<pubDate>Thu, 07 Aug 2025 18:28:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>studebakersubmetering.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1373e874921e7c5a3f9f0c0cc1ff4ef9d123687cbd8994ee33416de5928bc1fe</i><br /><br />Threat actor <b>description</b>: <i>The Belle Vernon Area School District (BVASD) is a medium-sized public school district located approximately 40 minutes southeast of Pittsburgh in Westmoreland and Fayette counties, Pennsylvania. Formed in 1965 through the merger of the Belma            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>sotaconstruction.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24944</link>
<guid>4ea59864816087bb60d6e5680c047a5e</guid>
<pubDate>Thu, 07 Aug 2025 18:28:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>sotaconstruction.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e773baaf665f034b208a54599756b0a246b199bf868c02e81ed72d70d41293e1</i><br /><br />Threat actor <b>description</b>: <i>Sota Construction Services is a leading provider of comprehensive and cost-effective construction services specializing in commercial and residential construction. The company emphasizes environmentally friendly construction methods and has b            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Prime-Beverage-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24928</link>
<guid>dd96eaef5612dd405d9d087ab539e38e</guid>
<pubDate>Thu, 07 Aug 2025 16:27:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Prime-Beverage-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>76e6aabee409bb4091572e4b3cc9f4f253c1a73b5b05818578307d5d3049a467</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>BRIDGEWATER-ASSOCIATES</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24935</link>
<guid>546b5e6a6dfe42925b8a87ebcac1a9cb</guid>
<pubDate>Thu, 07 Aug 2025 11:49:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>d4rk4rmy</b> claims attack for <b>BRIDGEWATER-ASSOCIATES</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea886636322e7c4dbc28d24714c1a3e894769bc004ce01309bf8dce3639bd83a</i><br /><br />Threat actor <b>description</b>: <i>https://www.bridgewater.com Bridgewater Associates is a premier asset management firm, focused on delivering unique insight and partnership for the most sophisticated global institutional investors. Our investment process is driven by a tireless pursuit to understand how the world’s markets and economies…</i><br />Target victim <b>website</b>: <i>www.bridgewater.com</i>]]></description>
<category>d4rk4rmy</category>
</item>
<item xmlns:dc='ns:1'>
<title>ONEX-CANADA-ASSET-MANAGEMENT-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24933</link>
<guid>942daac277daced487d09ddcbe753d73</guid>
<pubDate>Thu, 07 Aug 2025 11:48:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>d4rk4rmy</b> claims attack for <b>ONEX-CANADA-ASSET-MANAGEMENT-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da2f35d83d92779ecf4c88b07a4fb375666aadddd96ff881a5b8ecdf60f609ed</i><br /><br />Threat actor <b>description</b>: <i>https://onex.com Onex Partners is a private equity platform focused on the upper-middle market in the United States, Canada, and Europe. Our successful track record is built on deep sector specialization and a disciplined, hands-on approach to private equity investing. they…</i><br />Target victim <b>website</b>: <i>onex.com</i>]]></description>
<category>d4rk4rmy</category>
</item>
<item xmlns:dc='ns:1'>
<title>TSAI-CAPITAL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24932</link>
<guid>817fa9146e77f93396b5b4a108f58cfa</guid>
<pubDate>Thu, 07 Aug 2025 11:48:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>d4rk4rmy</b> claims attack for <b>TSAI-CAPITAL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a1ddbaaf975805f7543b3cd38156be7c47466c256e4fc0aa2e701af289fbd33</i><br /><br />Threat actor <b>description</b>: <i>https://tsaicapital.com Tsai Capital™ is an investment management firm focused on the preservation and long-term growth of capital on behalf of select families and organizations. With more than two decades of experience, and as a third-generation investor whose financial roots date…</i><br />Target victim <b>website</b>: <i>tsaicapital.com</i>]]></description>
<category>d4rk4rmy</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jamco-Aerospace</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24924</link>
<guid>4f9959469b99179f25fd5cf84f4cde62</guid>
<pubDate>Wed, 06 Aug 2025 19:30:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Jamco-Aerospace</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af7d3fb09d8ab522a1ad65f5c9af6cc008d8eab0eb5212998e82b476939c7c83</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.jamco-aerospace.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Emprise</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24923</link>
<guid>8fb4529686c80d0a7f8442f94024eb9f</guid>
<pubDate>Wed, 06 Aug 2025 19:29:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Emprise</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0bd98e0d6e307300405552c92df087b8ae584bea7c1204e0a52e0117d97405c1</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.emprise-usa.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brads-Bedding-Plants</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24922</link>
<guid>4badf6fce1fb568ba4d71e1645e5da27</guid>
<pubDate>Wed, 06 Aug 2025 19:28:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Brads-Bedding-Plants</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2dc9af2c001da01b59cfdff03f154b0292784f57a76f1414414089ee30d4ebc7</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.bradsbedding.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Magni-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24921</link>
<guid>8eb7be5a13cc39a3e56b78aba08b2039</guid>
<pubDate>Wed, 06 Aug 2025 19:28:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>The-Magni-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d0919a2a2df4ba01caf64588a3237021e1d40a8f3efdc5facc0025cfc1837568</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.magnicoatings.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>MGM-Transformer</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24905</link>
<guid>2708fba0dc4216ab4ab4de1fc0c49862</guid>
<pubDate>Wed, 06 Aug 2025 19:28:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>MGM-Transformer</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>518c17b8eadbbdf7bf05dc12e0ea3d66918e455d9c61a2704c9aa8ab18b70873</i><br /><br />Threat actor <b>description</b>: <i>MGM Transformers specializes in manufacturing a wide range of transformers, including medium voltage dry type, oil-filled, and custom-designed options, serving various sectors such as data centers, renewables, commercial industrial, and utilitiesWe are ready to upload more than 60GB files of essential corporate documents such as: financial data (audits, payment details, financial reports, invoices), employees and customers information (medical information, passports, driver's license, SSNs, DLs and other documents), confidential information, NDA and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>LEARN-is-a-Regional-Educational-Service-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24910</link>
<guid>1ca188ea50f3fc60a66b1aeec9622089</guid>
<pubDate>Wed, 06 Aug 2025 18:20:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacknevas</b> claims attack for <b>LEARN-is-a-Regional-Educational-Service-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bfd60204602bfba5e0cc861aee5dcdfe2d1650d8e2bcb303710b38e4d9e55887</i><br /><br />Threat actor <b>description</b>: <i>LEARN is a Regional Educational Service Center working with and for its member districts to improve the quality of public education for all learners</i><br />Target victim <b>website</b>: <i>www.learn.k12.ct.us</i>]]></description>
<category>blacknevas</category>
</item>
<item xmlns:dc='ns:1'>
<title>Quality-Data-Service-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24911</link>
<guid>669c35c595fa7abcc0b82d0ba7d90f66</guid>
<pubDate>Wed, 06 Aug 2025 18:16:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacknevas</b> claims attack for <b>Quality-Data-Service-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>03b8542e56d8f4cdc3f1e7ed131cc3741e3f6eced91d094474a1b7fde70a64e3</i><br /><br />Threat actor <b>description</b>: <i>Today, we’re opening the auction.Over the past several weeks, we’ve completed a full exfiltration from the infrastructure of Quality Data Service, Inc., Connecticut’s most “trusted” municipal software provider. The haul: approximately 300 GB of internal company data, including:SQL databases of client municipalities, tax departments, GIS records, and user credentialsGigabytes of PDFs, XLS files, DOC reports — many containing deeply sensitive financial, geographic, and personal data with contatsInternal emails, technical logs, software source code archives, vulnerability reports, and support ticketsMost importantly: comprehensive information on over 200 Connecticut municipalities, their operational structures, internal correspondences, and revaluation recordsThese aren’t just files. These are lives, towns, histories, and vulnerabilities — trusted to a company that no longer respects the responsibility it bears.Why Are We Doing This?We approached Quality Data Service, Inc. privately before publishing anything. Our intent was not destruction. But from the Founder &amp; President, to the CFO, Director of Assessor Support,ITs and others — we received silence, evasion, or worse: denial.They knew.They were warned.They did nothing.Their refusal to act wasn’t just negligence — it was an act of contempt for every municipality they serve.It’s not just about stolen data. It’s about a culture that prioritizes profit over protection, and PR over real recovery. And when cybersecurity “experts” are called in only to recommend burning what’s left — that’s not incident response. That’s malpractice.The AuctionWe are now offering:Full dataset: All stolen data, intact and complete (buyout option)Per-municipality packages: Tailored datasets for each town or districteQuality source code: Core application and modules available separatelyBuyers of individual municipality data will receive exclusive access — upon purchase, that data will be removed from general availability. (We believe in boundaries, even if others do not.)If You're a VictimIf your municipality is among the affected, you can contact us.We offer:Permanent removal of your data from our archives and auctionTechnical documentation proving the breachInternal evidence of the company’s failure to act, including logs and communications with their leadershipAssistance in legal proceedings to seek compensation from Quality Data Service, Inc.Names of involved individuals include:Vinny Crudele, Founder &amp; President VCRUDELE@QDS.BIZ 203-758-9446Leo Dinicola, Chief Financial Officer LDINICOLA@QDS.BIZ 860-417-3538	203-910-2316	leo_D@msn.comLinda Gordon, Director of Tax Support LGORDON@QDS.BIZIvana Crudele, Director of Assessor Support IVANA@QDS.BIZ 860-417-3617	203-518-1655David Crudele, Chief Operations Officer DCRUDELE@QDS.BIZ 203-758-9446	203-598-2692Bryan Reilly	 (IT) BMREILLY@QDS.BIZ 860-202-9557Tom Tanganelli	(IT)	860-456-2814	860-384-2449	tjtanganelli@gmail.comJeffery Johnson	(Sales) 860-643-8100	860-729-4551	jjohnson@qds.bizBruce Lavoie	(Programming)	860-620-0785	860-919-1343	bclhome@cox.netVicki Powell	(eQuality)		203-509-4255	powellcrudele@gmail.comWe take no joy in exposing them. But in the end, they chose convenience over courage.A Better WayYou may dislike what we’ve done — but it was never random.IT security is not a checkbox. It’s a culture. And we’ve seen firsthand how a failure to treat it seriously leads to the slow death of public trust. The worst thing about this breach is not the breach itself, but that it could have been prevented.We call on municipalities, CTOs, assessors, and public servants to work with real specialists who care more about solutions than headlines. The future belongs to those who build with integrity.listing https://gofile.io/d/5641ll</i><br />Target victim <b>website</b>: <i>www.qds.biz</i>]]></description>
<category>blacknevas</category>
</item>
<item xmlns:dc='ns:1'>
<title>FP-Georgia-Mfg-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24900</link>
<guid>1fbee9dc43156d20a7646ff826a8a219</guid>
<pubDate>Wed, 06 Aug 2025 17:28:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>FP-Georgia-Mfg-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f2e11a3b815df054ac4edfd4d9adfc69b6a9a677941f6f098b54b3901a4c065</i><br /><br />Threat actor <b>description</b>: <i>Tier-1 supplier of suspension components to the automotive industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Metro-Heating</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24897</link>
<guid>f2fe4479d8861f09946a28965a67d436</guid>
<pubDate>Wed, 06 Aug 2025 15:27:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Metro-Heating</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>115272a4d57053ab6815e8bc3e7a6181a20374f6db037c3316170898c155f541</i><br /><br />Threat actor <b>description</b>: <i>Site: metroheatingandair.com
														Industry: Commercial & Residential Construction
														GEO: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>Consumer-Electronics--Computers-Retail-Retail</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24906</link>
<guid>b8da1ad63c85d7d91338134ee7c6671a</guid>
<pubDate>Wed, 06 Aug 2025 13:24:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Consumer-Electronics--Computers-Retail-Retail</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f5a1e3bfc2a1772ab41f9bd621fb0dbe312e44772febe32f97852137cee6683</i><br /><br />Threat actor <b>description</b>: <i>Michelli Weighing & Measurement is a trusted provider in the Weighing & Measurement Industry since 1947 with thirty-seven locations throughout the US, offering ISO 9001 certified services. They specialize in calibration for precision instruments used in weighing, force, torque, pressure, dimensional, electrical, temperature, and frequency measurement. Michelli provides comprehensive scale services, maintenance, calibration, and equipment repair, with heavy capacity test trucks for convenient on-site services. They welcome clients across various industries and ensure seamless transitions with a dedicated team of experts.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Heart-of-America-Medical-Centr-HAMC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24898</link>
<guid>03710901f9d12f609ce37724a57987fc</guid>
<pubDate>Wed, 06 Aug 2025 10:28:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>Heart-of-America-Medical-Centr-HAMC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3472ae866b5f4c6ce45b4fb4fe3d423d44627a54c4c4ccb47905375545574a28</i><br /><br />Threat actor <b>description</b>: <i> About Heart of America Medical Center
A non-profit hospital offering comprehensive medical services, including emergency care, radiology/imaging, surgical cen... - I have your Data 800GB. I will post the data in three stages. You can view some of the files on the link from tor browse...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>Diversified-Project-Services-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24899</link>
<guid>5d147304859c2c8752cf5dedb4b50d49</guid>
<pubDate>Wed, 06 Aug 2025 09:14:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Diversified-Project-Services-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f2c05b64ac3f74623eaf6486c724c8eb462e0d3a7b09112ea1f9c0cba8e95868</i><br /><br />Threat actor <b>description</b>: <i>Diversified Project Services International, Inc. (DPSI) is a leader in engineering, geomatics (surveying), planning, permitting, inspection, energy management and construction management.</i><br />Target victim <b>website</b>: <i>dpsiinc.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Neff-Specialties</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24875</link>
<guid>4e85fa3a7bb64fffde3307ca72f2aeb5</guid>
<pubDate>Tue, 05 Aug 2025 21:44:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Neff-Specialties</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47cd8ed2e76ddd1d203e635c62f060fa0aafbaf9bbe5050feff6c5b33ceefd70</i><br /><br />Threat actor <b>description</b>: <i>Neff Specialties is a specialty sub-contractor that caters to the education, industrial, and commercial sectors across Pennsylvania, West Virginia, and Northern Maryland. The company designs, sells, installs, and services a variety of construction products, ensuring a hands-on and turnkey service to both public and private clients</i><br />Target victim <b>website</b>: <i>neffspecialties.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hamilton-Park</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24876</link>
<guid>e04f87e54ca47e7aac0fde5f55a2b928</guid>
<pubDate>Tue, 05 Aug 2025 21:43:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Hamilton-Park</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e3af77952417eb51524df09bee366f7b79f1bbbcd908c13c61d2f662e48f44b8</i><br /><br />Threat actor <b>description</b>: <i>Hamilton Park Interiors offers thoughtfully designed and quality home furnishings that reflect your style and your life</i><br />Target victim <b>website</b>: <i>hamiltonparkinteriors.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brookside-Homes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24877</link>
<guid>8f4131479defde8dc2f27d096c15d72f</guid>
<pubDate>Tue, 05 Aug 2025 21:42:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Brookside-Homes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0efc41b8f9e6bfd0a614d5acf529d7c52f1daad320055fa953e9ad4b9f8b866f</i><br /><br />Threat actor <b>description</b>: <i>Brookside Homes is a custom home builder renowned for delivering exceptional quality and service to discerning clients across Central Pennsylvania</i><br />Target victim <b>website</b>: <i>brooksidehomes.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clarkston-First-Baptist-Church</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24879</link>
<guid>52b8bc3917542528942a2d02a624d123</guid>
<pubDate>Tue, 05 Aug 2025 21:42:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Clarkston-First-Baptist-Church</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d278bb8aa97da18e46f983df6a44f48044c3584b088cecd7dfdafc49f25b306c</i><br /><br />Threat actor <b>description</b>: <i>From humble beginnings in 1881 and founded by former slaves on donated land, the Clarkston First Baptist Church stands today as a powerful, influential institution in the heart of Clarkston, Georgia</i><br />Target victim <b>website</b>: <i>clarkstonfbc.org</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bromack-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24880</link>
<guid>592f69eb8605faf19bb15d0b370cfac8</guid>
<pubDate>Tue, 05 Aug 2025 21:41:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Bromack-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ced93eb5c8a3bc52b6649dd41a619d26fed8414bdad649bcbdd39ce22feff592</i><br /><br />Threat actor <b>description</b>: <i>The Bromack Company was founded in Los Angeles, California by Donald K Polgrean in 1963. Mr. Polgrean specialized in fixtures and furnishings to the Banking Industry</i><br />Target victim <b>website</b>: <i>bromack.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ail-Hospitality-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24881</link>
<guid>d0a194dc29ee00d2f22ef573f2d7097f</guid>
<pubDate>Tue, 05 Aug 2025 21:40:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Ail-Hospitality-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48b74b98aba2ae5e1128e399c342915e8b0a6e6acb0cc602a3095bbd4e7004da</i><br /><br />Threat actor <b>description</b>: <i>AIL Hospitality manage a diverse portfolio of hotels located in states like West Virginia, Maryland, Ohio, and Pennsylvania</i><br />Target victim <b>website</b>: <i>ailhospitality.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Twin-Oaks-Presbyterian-Church</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24882</link>
<guid>32e0740fc318fc059523a2f830a5b248</guid>
<pubDate>Tue, 05 Aug 2025 21:40:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Twin-Oaks-Presbyterian-Church</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2db2f7e131cf7f0589685c17a1cbeb6cb2ba6a86cf45b3d58006dd847b86dbe6</i><br /><br />Threat actor <b>description</b>: <i>Twin Oaks Presbyterian Church focuses on worship, discipleship, and outreach</i><br />Target victim <b>website</b>: <i>twinoakschurch.org</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>ThinkBig-Health-Care-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24878</link>
<guid>519fab1c21e011cb83230c17046b5cf2</guid>
<pubDate>Tue, 05 Aug 2025 21:39:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>ThinkBig-Health-Care-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e752178d5a2b556db837ee81892a31bc000519df947be569123cb34f7f3de619</i><br /><br />Threat actor <b>description</b>: <i>ThinkBig Health Care Solutions specializes in providing comprehensive services to medical practices, including contract acquisition, billing, collections, and practice management</i><br />Target victim <b>website</b>: <i>thinkbighcs.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Preferred-Homes-Realty</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24885</link>
<guid>e62649f9871ea7bcf0923df1bb269578</guid>
<pubDate>Tue, 05 Aug 2025 21:37:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Preferred-Homes-Realty</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a0684365c5e0ddf6f5a56434a969bff615f53a12327d95ddb21bb7742a7fda3</i><br /><br />Threat actor <b>description</b>: <i>To Preferred Homes Realty you will find a wide variety of useful information and resources designed to help you buy or sell a home more effectively in the Elgin, South Elgin, West Dundee, Bartlett, Huntley, Hampshire, Gilberts, St. Charles, Geneva and other towns in the Fox Valley Area</i><br />Target victim <b>website</b>: <i>preferredhomesrealty.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Job-Shop</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24886</link>
<guid>0df6dca4c9db6381e0c4e523a3e0f42b</guid>
<pubDate>Tue, 05 Aug 2025 21:36:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>The-Job-Shop</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b5b1e3501fab0b865aee8ce276ec680e602081f9b2f518aa63c3c9070df8c2d3</i><br /><br />Threat actor <b>description</b>: <i>The Job Shop is where you come for the best talent and the best jobs. If you are looking for a job or looking for hiring or other staffing assistance in San Francisco or the rest of the Bay Area, contact us</i><br />Target victim <b>website</b>: <i>jobshopsf.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Danvers-Law-Offices</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24888</link>
<guid>121f112758e4254fd9b922dfa871720d</guid>
<pubDate>Tue, 05 Aug 2025 21:35:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>The-Danvers-Law-Offices</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>570890e30d155bb27dacc9b688a929518fd013fe672ef18ec4cf64e856093e00</i><br /><br />Threat actor <b>description</b>: <i>The Danvers Law Offices, LLC is a boutique personal injury law firm based in Danvers, MA, serving residents throughout Massachusetts and New Hampshire since 2005</i><br />Target victim <b>website</b>: <i>danverslawyer.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>U.S.-Battery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24890</link>
<guid>ec5df87779e995a54bde440633afb137</guid>
<pubDate>Tue, 05 Aug 2025 21:34:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>U.S.-Battery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e44a69cd8bb0ca116f5bddf55a76bbce57807738d700878a4bdfe6ceac710209</i><br /><br />Threat actor <b>description</b>: <i>Since 1926, U.S. Battery has been designing and manufacturing the world's highest quality deep cycle batteries</i><br />Target victim <b>website</b>: <i>usbattery.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>JWiz</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24891</link>
<guid>6547489ef6174ae02b6d87ee775b3950</guid>
<pubDate>Tue, 05 Aug 2025 21:33:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>JWiz</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8543a3bf04f3eb184a8307223cf3a6497c4a2801bcf73bb2232b279c30b88aa1</i><br /><br />Threat actor <b>description</b>: <i>JWiz offers marketing solutions including online advertising and sales promotion, lead generation, social media, website design, development, hosting and search engine optimization for small and local businesses Samples Posted</i><br />Target victim <b>website</b>: <i>jwiz.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hankin--Mazel-PLLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24892</link>
<guid>73715c097259c228af0648823d754407</guid>
<pubDate>Tue, 05 Aug 2025 21:32:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Hankin--Mazel-PLLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ae118344b70256759c59987ce2b568cf3cd5af9df0d8f266658dd7e9a0ed35f8</i><br /><br />Threat actor <b>description</b>: <i>The staff at Hankin & Mazel has been representing cooperative and condominium boards for over 30 years Samples Posted</i><br />Target victim <b>website</b>: <i>hankinmazel.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Garrison-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24887</link>
<guid>083e81455b9ce29d158420b35214c4df</guid>
<pubDate>Tue, 05 Aug 2025 21:30:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Garrison-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>117c6679959034637aaaf21d05ae9cce189cef1904a67f84108786118a8561d4</i><br /><br />Threat actor <b>description</b>: <i>Garrison Law Firm, LLC specializes in personal injury law, providing legal services to individuals who have suffered injuries due to accidents in Indiana, including car accidents, slip and fall incidents, and wrongful death cases</i><br />Target victim <b>website</b>: <i>garrisonlegal.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>ridgefield.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24895</link>
<guid>be336fabd87358b66fd4f9c864eb81f3</guid>
<pubDate>Tue, 05 Aug 2025 20:50:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>ridgefield.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>43fb545086a2d1130fc12b0e8ec4fa7e9b92a2fcb4abd75d0a19e649cb287305</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "Ridgefield.org" represents Ridgefield public schools in Ridgefield, Connecticut. It is a holistic platform providing comprehensive information about the school district, including individual public schools within the district. The site offers resources, news, and updates to students, parents, teachers, and staff, covering academics, sports, arts, and other school-related activities.</i><br />Target victim <b>website</b>: <i>ridgefield.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carrollton-Ear-Nose-and-Throat</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24873</link>
<guid>df3abfaa6336c64811b77e86b9cb17b0</guid>
<pubDate>Tue, 05 Aug 2025 18:13:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Carrollton-Ear-Nose-and-Throat</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a5dc374a71ea95331cf08b9ce2c950b3485d2a88866303cadf2950addd92f50</i><br /><br />Threat actor <b>description</b>: <i>Carrollton Ear, Nose and Throat, P.C. and the staff would like to welcome you to our website! We hope you find our website helpful when searching for information about our practice and your health needs. Our patients are very important to us and we want you to have the best possible experience while you are under our care. We are confident that you will find our staff dedicated to providing care of high quality and value. We look forward to serving you.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Origene</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24867</link>
<guid>cbec56ea8d7b1d9787f7c1297488c798</guid>
<pubDate>Tue, 05 Aug 2025 13:57:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Origene</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ff992be73ecf122ff50686a03ded8a304678fdc25cce532e543500a43f3dd03</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bucks-County-Opportunity-Council-INC.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24864</link>
<guid>55fabff23f874a140863187ec8ff4671</guid>
<pubDate>Mon, 04 Aug 2025 21:45:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>moneymessage</b> claims attack for <b>Bucks-County-Opportunity-Council-INC.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63200fb54c8073a8fa6a42fe6dd367f00d8e2ae4380a3e3a229d4760a319c24f</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] The Bucks County Opportunity Council, Inc. (BCOC) is a non-profit organization in Pennsylvania, USA. It is devoted to empowering low-income families to achieve economic self-sufficiency through their various programs. BCOC provides services like food assistance, adult education, financial coaching, and housing services, and designs community strategies to help foster economic stability in the region.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>moneymessage</category>
</item>
<item xmlns:dc='ns:1'>
<title>easternadjustment.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24855</link>
<guid>28614d9bc22c8a1ec4b6fafd953ef378</guid>
<pubDate>Mon, 04 Aug 2025 20:54:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>easternadjustment.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5824c78d5ad4754ac65f72170f33059801f7bd427231724cdd060c4d07c7315a</i><br /><br />Threat actor <b>description</b>: <i>Eastern Adjustment Company, Inc., is a locally owned Independent Adjusting firm designed to assist insurers primarily in the adjustment of losses and claims in fire, allied lines, marine and casualty. We specialize in personal and commercial             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Phoenix-Lighting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24862</link>
<guid>a6a4398accc1bec791a19e262725bee3</guid>
<pubDate>Mon, 04 Aug 2025 18:49:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Phoenix-Lighting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e47ae3dac4f1b5d93ade35eddc83639f4486f390eaa66d949e9d80b72e80e268</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.phoenixlighting.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Backstage-Library-Works</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24861</link>
<guid>4ee81d87959972ec4f7d90fae46639f5</guid>
<pubDate>Mon, 04 Aug 2025 18:48:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Backstage-Library-Works</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f407e9b6ff0aa855d0595c9c0a356fe55c708b55192a37c8a8e36476a44f6377</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.bslw.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>White-Horse-Packaging</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24860</link>
<guid>4ffdf96aa5173b68aa3ab0bdea4125f0</guid>
<pubDate>Mon, 04 Aug 2025 18:48:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>White-Horse-Packaging</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d13e19ffe90b8ae1cb5b9d6f8603b87c2db0792c9751bdf8bc53a5c6b2af635a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.thelatgroup.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Terillium</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24859</link>
<guid>416883f0d86711366e18b10cd0690f53</guid>
<pubDate>Mon, 04 Aug 2025 18:47:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Terillium</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e028a0ced82489dc174fbf4c0af77f231c6481d89071397047e3d8b0df6234f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.terillium.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Weisman-Childrens</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24858</link>
<guid>baa0cb562de48fbabbd65b0f85243dc2</guid>
<pubDate>Mon, 04 Aug 2025 17:35:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Weisman-Childrens</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>03e88258931c2a44c8868a35a6a2a38013fdfb0372409c3d9ade32e569192fa7</i><br /><br />Threat actor <b>description</b>: <i>Weisman Children's Rehabilitation Hospital is the leading provider of pediatric rehabilitation services in the Delaware Valley</i><br />Target victim <b>website</b>: <i>weismanchildrens.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Frontline-Bioenergy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24851</link>
<guid>f2935c67f1ed6bc5c498c86262d113c3</guid>
<pubDate>Mon, 04 Aug 2025 06:49:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Frontline-Bioenergy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0cec7d31b2e72e6b565b89046e5007e626594c0cf41d3ede95314a462dd06307</i><br /><br />Threat actor <b>description</b>: <i>Since 2003, Frontline BioEnergy has been designing systems and proprietary equip...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aggressive-Air-Compressor--co</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24848</link>
<guid>e4eea37faf446ffa7acd4ab006b3d53c</guid>
<pubDate>Sun, 03 Aug 2025 18:28:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Aggressive-Air-Compressor--co</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>21d0d5444b8e598e40a4a892b69e199fea7fc028f6d6c0b81bf5457e7d6f11a9</i><br /><br />Threat actor <b>description</b>: <i>We have full control of your systems, including:
✅ All invoices
✅ Customer databases (names, addresses, contact details)
✅ Scanned documents (IDs, driver’s licenses, confidential files)
✅ Financial records & other sensitive data            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>BIG-ROCK-RESORT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24846</link>
<guid>3b5d4919c43697e04ae8f965bc07acd1</guid>
<pubDate>Sun, 03 Aug 2025 11:43:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>d4rk4rmy</b> claims attack for <b>BIG-ROCK-RESORT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>455c36b0925e812ad738105488d75b9af5f240cb5e9be5ab18b502d87c576124</i><br /><br />Threat actor <b>description</b>: <i>https://www.bigrockresort.net/ Big Rock Resort features the only truly lakefront cabins in June Lake, CA. 8 fantastic cabins to choose from that accommodate individuals, couples, families, family reunions, weddings, and corporate retreats. Including 1, 1 bedroom cabin, 6, 2 bedroom cabins…</i><br />Target victim <b>website</b>: <i>www.bigrockresort.net</i>]]></description>
<category>d4rk4rmy</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clemens-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24839</link>
<guid>3aed873670ec4df5ec69019f310a2d19</guid>
<pubDate>Sat, 02 Aug 2025 15:27:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Clemens-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd7b464fbf0df4e53ae2d0cbeab883d37656dfd48173584a535ad9fa95b8568f</i><br /><br />Threat actor <b>description</b>: <i>(Banking, insurance, financial, and HR documentation. Audit. Client documentation.) Clemens Construction is a reputable construction firm based in Philadelphia,...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pitman-Farms</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24840</link>
<guid>c32e57398a4a3d95cb29ce12ae30e18f</guid>
<pubDate>Sat, 02 Aug 2025 15:27:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Pitman-Farms</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>21112d301c238fae31b8d10c35a2a27860bf35cf81c0f097c21501789925c4f5</i><br /><br />Threat actor <b>description</b>: <i>(Financial, banking, and audit documentation. Suppliers, clients, mail correspondence, and many more interesting things about how to significantly increase prof...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.pefco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24841</link>
<guid>ccc83cd199e289db77c9271ab00c35a0</guid>
<pubDate>Sat, 02 Aug 2025 12:06:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>www.pefco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e4ac66c119a35d2557ee2cfd9963a43c15da6aa19450b1a702a24784e07c8955</i><br /><br />Threat actor <b>description</b>: <i>PEFCO facilitates the financing of U.S. exports by supplementing what is available from commercial banks and other lenders. The company offers a variety of export finance programs, acting as both a direct lender and a secondary market buyer of export loans. To qualify for financing, loans must be secured with guarantees from the Export-Import Bank of the United States. PEFCO also has initiatives to support small businesses and address unique funding challenges for small exporters</i><br />Target victim <b>website</b>: <i>www.pefco.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cookeville-Regional-Medical-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24842</link>
<guid>9eeded30b547d25041d83e289ac8ae5f</guid>
<pubDate>Sat, 02 Aug 2025 11:17:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Cookeville-Regional-Medical-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa653f105f69acc34e7f3a40fdba91aeace7857b8b75f59473f0088744accfc2</i><br /><br />Threat actor <b>description</b>: <i>Cookeville Regional Medical Center At Cookeville Regional Medical Center, we are dedicated to providing the highest quality care to our patients and making a positive impact on our community.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lincoln-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24837</link>
<guid>e75b50aaf9e8125e58481a0cff44b539</guid>
<pubDate>Fri, 01 Aug 2025 23:27:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Lincoln-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>62b5de54120c0adc0f39dc056360882ddfa89f809589a452c7642e9cd2e6c01c</i><br /><br />Threat actor <b>description</b>: <i>Established in 2001 and headquartered in Orem, Utah, Lincoln Law is a law firm t...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>fortsmithschools.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24834</link>
<guid>e3133801456d68c42114514a81db864b</guid>
<pubDate>Fri, 01 Aug 2025 19:28:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>fortsmithschools.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7548b82294935b4f5f4a5d382b4138ca64361552fb9050a703e4b2d76746a7f</i><br /><br />Threat actor <b>description</b>: <i>The Fort Smith Public School district is a destination district built on relationships, collaboration, and a culture of excellence. With over 2,000 employees, FSPS is one of the largest employers in Fort Smith, Arkansas. Our qualified educato            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>chamberlainhuckeriede.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24838</link>
<guid>36f3776e5d1d89eed81547772a9d6a4f</guid>
<pubDate>Fri, 01 Aug 2025 19:27:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>chamberlainhuckeriede.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>622eadaa6b2ba99ad1ffd3725012921519d751efd2550908dd39464ea29425a7</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Chamberlain Huckeriede Funeral Home is a family-owned and operated business based in Lima, Ohio. They've been serving the community for over 100 years, offering a range of services including traditional funerals, cremations, and pre-planned funerals. They are known for providing compassionate and personalized services tailored to the individual needs of each family.</i><br />Target victim <b>website</b>: <i>chamberlainhuckeriede.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Herrman-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24829</link>
<guid>8a4d3214af1524fd478f2e338c9295f2</guid>
<pubDate>Fri, 01 Aug 2025 17:28:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Herrman-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b14ee198717bcd6c120ff4f173695d20e2b000bea59783605cb225385dfde0a3</i><br /><br />Threat actor <b>description</b>: <i>Herrman Law LLC, led by attorney Lynnette Herrman, specializes infamily law representation, offering aggressive and client-focused legal services.We are ready to upload more than 168GB files of essential corporate documents such as: financial data (audits, payment details, financial reports, invoices), employees and customers information (credit cards, medical information, passports, SSNs, DLs and otherdocuments), also you will find a lot of court documents such as police reports, hearings and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Great-Lakes-Carpet-Tile</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24831</link>
<guid>7273e671a40fa9f0d3867d1098d5ac6e</guid>
<pubDate>Fri, 01 Aug 2025 17:28:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Great-Lakes-Carpet-Tile</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>faf1d6d6a7a49ee4b546a201c9a6a1455eec2068b2286327a6ad102480635e76</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1991 and headquartered in Wildwood, Florida, Great Lakes Carpet & Tile is a distributor of flooring products offering avariety of brands.We are ready to upload more than 100GB/82794 files of essential corporate documents such as:  financial data (audits, payment details,financial reports, invoices), employees and customers information (phones, e-mails, addresses, credit cards, medical information, confidential, passports, SSNs, DLs and other documents), etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Radford-City-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24836</link>
<guid>bd44f20ee6ac130433c642094cecd336</guid>
<pubDate>Fri, 01 Aug 2025 15:58:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Radford-City-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a0b94c954839f3b303ed86d2e66a2a92310e1f1614cd15408aac3bee2ec98f1</i><br /><br />Threat actor <b>description</b>: <i>Radford City Public Schools is a public school district in Radford, Virginia, serving approximately 3,690 students in grades PK-12. It is a highly-rated district, with strong performance in math and reading proficiency. The district includes two elementary schools, an intermediate school, and Radford High School. 100Gb sensitive, medical and personal data will be published soon in our blog.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Franklin-Pierce-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24826</link>
<guid>193d44f2eece53cd474455b6ce4def37</guid>
<pubDate>Fri, 01 Aug 2025 15:42:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Franklin-Pierce-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>100ed79bda7ea96ae71ab94f599680ccb890ed9040b6b5e3e35241ada983f0c8</i><br /><br />Threat actor <b>description</b>: <i>Franklin Pierce Schools is a school district located in Tacoma, Washington. It is made up of 15 schools, which include nine elementary schools, two middle schools & four high schools. Franklin Pierce Schools corporate office is located in 315 129th St S, Tacoma, Washington, 98444, United States and has 658 employees. The total amount of data leakage is 821.30 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>White-Coffee-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24827</link>
<guid>b4591e1ef51fdd8a9a8e7e7659c1a702</guid>
<pubDate>Fri, 01 Aug 2025 15:41:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>White-Coffee-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8a86948326d0fc34d40a9a6e8dcb6a1a8bcd9f3584793bf5bdb262c7f4407e3</i><br /><br />Threat actor <b>description</b>: <i>White Coffee Corporation is a family-owned business with over 85 years of experience, specializing in coffee roasting and co-packing services for beverage brands, hospitality providers, and entrepreneurs. White Coffee corporate office is located in 1835 Steinway Pl, Astoria, New York, 11105, United States and has 90 employees. The total amount of data leakage is 88.40 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>PK-Contracting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24821</link>
<guid>4299f209da83da82b711f1d631cc607b</guid>
<pubDate>Fri, 01 Aug 2025 00:04:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>PK-Contracting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a3c2bc561ada29ed4a94fff9dcf5cade2f29564a247ab1abad38da5cf41c3f9</i><br /><br />Threat actor <b>description</b>: <i>PK Contracting is a leader in pavement marking services, offering a range of solutions including permanent and temporary markings, pavement marking removal, and polymerized cement surfacing. With over 40 years of experience, they utilize advanced technology and equipment to ensure safety and reliability for their clients. Their primary clients include road builders, government agencies, and motorists seeking high-quality pavement marking. PK Contracting is committed to craftsmanship and is recognized for their safety standards and skilled personnel.</i><br />Target victim <b>website</b>: <i>www.pkcontracting.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ieee-apscon.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24809</link>
<guid>cb40bc0ed14724e6f54a1f4a557807bb</guid>
<pubDate>Thu, 31 Jul 2025 22:19:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>flocker</b> claims attack for <b>Ieee-apscon.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f17d653689ea2ef1673ae28e17e2ad5ae335ba8c08704d43afa9bdcb0c2a9b0</i><br /><br />Threat actor <b>description</b>: <i>To The IEEE Sensors Council We Have Breached APSCON2025 Event And Full Attendees Guest List And Registry System And Global […]</i><br />Target victim <b>website</b>: <i>Ieee-apscon.org</i>]]></description>
<category>flocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>carolynmyoung.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24816</link>
<guid>9a2327a2fcc570914ce9c9e61581cbf8</guid>
<pubDate>Thu, 31 Jul 2025 20:28:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>carolynmyoung.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0111613366abfcc88b9032a521c35f01f1b6c0295ecda53ccfaf6a320beedf34</i><br /><br />Threat actor <b>description</b>: <i>CMY Fiduciary Services is a premier firm in Northern California, boasting over 30 years of experience and a team of three certified fiduciaries. The company is dedicated to assisting Sacramento Valley residents with their fiduciary needs, providing reliable and personable services. CMY focuses on ensuring safety and security for its clients, evident in their strong reputation and positive testimonials. Their new office location in Fair Oaks, Sacramento, signifies their commitment to the community Employees: 25 Revenue:$5 Million Industry:Finance   Phone Number:(916) 446-5555</i><br />Target victim <b>website</b>: <i>carolynmyoung.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>wvpca.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24814</link>
<guid>3348d3e16aad5fee83edb0995eec7002</guid>
<pubDate>Thu, 31 Jul 2025 19:48:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>wvpca.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0202cbce7ad9b52c3662a8d4998e4ba544723d0031ec0ed6ce63959916628623</i><br /><br />Threat actor <b>description</b>: <i>The West Virginia Primary Care Association (WVPCA) is dedicated to providing accessible and affordable healthcare services throughout West Virginia. They support over 550 Community Health Centers that offer a wide range of medical services including primary care, dental, and mental health services. Aiming to serve the healthcare needs of West Virginians, WVPCA focuses on patient-centered care and community health initiatives. With a commitment to advocacy and quality improvement, their vision is to enhance healthcare delivery in rural areas. Employees: 25 Revenue:$5 Million Industry:Hospitals  Phone Number:(304) 346-0032 Sherri Ferrell  (President & Chief Executive Officer)  Cell (304) 542-6114 Debra Boyd  (Chief Financial Officer/Chief Operations Officer)  Cell (304) 552-4477 Matthew Arthur  (Communications Coordinator)   Cell (304) 415-0024 Carolyn Canini  (Director of School Based/Behavioral Health Services )  Cell (304) 550-1435 Megan Diehl  (Communications Director)  Cell (304) 549-1147 Jessica Haas  (Director of Clinical Transformation)  Cell (304) 544-4281  Aaron Johnson  (Special Projects Director) Cell (304) 444-8602 Jessica Keathley  (Health Data Analyst) Cell (304) 972-7793 Scot Mitchell (Director of Value Based & Managed Care Services) Cell (970) 640-5171 Shannon Parker  (Director of Health Center Operations)  Cell (304) 661-5741 Ruby Piscopo  (Outreach & Enrollment Coordinator)  Cell (304) 561-8195  Amanda West  (Finance & Operations Manager)  Cell (304) 639-2273</i><br />Target victim <b>website</b>: <i>wvpca.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Thern</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24820</link>
<guid>24be14e19b1e7b795df17629e09533c7</guid>
<pubDate>Thu, 31 Jul 2025 19:25:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Thern</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f4ffc0518efdc612d7a04186555cc2d6dc5f809647307c3dcec3275d5220a0d0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.thern.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Quartus-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24819</link>
<guid>47e2a1d39ac1046c262ceab3aa9aaa81</guid>
<pubDate>Thu, 31 Jul 2025 19:24:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Quartus-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>edd67db6fc07cfda1202db764de03f09a570b9e4a764fe376f998f76a5a963a6</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.quartus.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>firstpresatl.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24813</link>
<guid>ba61ab7dab67e0845c2e530ba9fd5c2c</guid>
<pubDate>Thu, 31 Jul 2025 19:22:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>firstpresatl.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7af77e7a28280584f830f6254c97665eb7aa108fdc32a50fd5de2b1f3238bed7</i><br /><br />Threat actor <b>description</b>: <i>First Presbyterian Church of Atlanta is a Christian community dedicated to living by love, seeking transformation, and empowering servant leaders. It offers a wide range of services including children's and youth ministries, adult formation, and various community engagement initiatives. The church aims to create a nurturing environment for members of all ages, fostering a lifetime of faith and authentic relationships. Their mission extends beyond the church community, emphasizing missional living and the promotion of justice and dignity globally. Employees: 86 Revenue:$5 Million Industry:Organizations  Phone Number:(404) 892-8461</i><br />Target victim <b>website</b>: <i>firstpresatl.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>eFunda-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24818</link>
<guid>d9511037d3a058e1fc0b56e0d86f8ffe</guid>
<pubDate>Thu, 31 Jul 2025 19:16:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bqtlock</b> claims attack for <b>eFunda-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c650c07dfaa8cca90ef6272254e4b547faa5f2f94b62d725981e036a58c241d4</i><br /><br />Threat actor <b>description</b>: <i>efunda.com (270+ subdomains)</i><br />Target victim <b>website</b>: <i>efunda.com</i>]]></description>
<category>bqtlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>USA-Military-Alumni-Networks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24817</link>
<guid>d38d719f68f335deb774cc5ff8682ced</guid>
<pubDate>Thu, 31 Jul 2025 19:15:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bqtlock</b> claims attack for <b>USA-Military-Alumni-Networks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4918568ac3d098bed4966f1e6c05fd2fc4e5076884325a3ba39ea950655e3058</i><br /><br />Threat actor <b>description</b>: <i>isabrd.com, varsityo.com, letterwinner.com,  whoglue.net,  whoglue.com,  whoware.com,  mail.usna87.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bqtlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>lynkspot.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24810</link>
<guid>6def9da7f04a4bb4d727b97cb4c3d179</guid>
<pubDate>Thu, 31 Jul 2025 18:58:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>lynkspot.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>673f825d8d272b8ad9e7ebdd814cb100c3f1ef8aa87814cc550413c1a5598c66</i><br /><br />Threat actor <b>description</b>: <i>Lynk,® was founded in 1979, and for the past 35 years we have been dedicated to developing innovative and creative products that make organizing your home easy. A pioneer in the consumer storage category, our intelligent designs have been awarded over 80 United States patents. We focus on the details and believe that quality matters. At Lynk,® we work hard to help you organize your life. Employees: 25 Revenue:$5 Million Industry:Manufacturing Phone Number:(913) 492-1852</i><br />Target victim <b>website</b>: <i>lynkspot.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>deliastamales.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24811</link>
<guid>446ad38f7c9d99ca52e91605c574b864</guid>
<pubDate>Thu, 31 Jul 2025 18:57:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>deliastamales.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4eed76a82e1d006e01f56e915fef97fc3fde560f75f467abdca932c2d844fd8</i><br /><br />Threat actor <b>description</b>: <i>Delia's specializes in delicious tamales, becoming a beloved staple in South Texas and gaining nationwide popularity. Known for offering a variety of tamales including pork, chicken, and sweet cream cheese, the company operates six locations throughout the Rio Grande Valley. Customers can conveniently order tamales online for delivery, making it easy to enjoy Delia's signature flavors from anywhere. With nearly 30 years of history, Delia's has built a reputation as the go-to destination for authentic and tasty tamales. Employees: 28 Revenue:$38.6 Million Industry:Transportation Phone Number:(956) 961-4565 Alberto Trevino (Operations)  956-227-8260   (ext 216) Elsa Gonzalez (Risk Manager)	956-904-8411   (ext 215) Blanca Sierra (HR Manager)	956-904-8412   (ext 211) Lupita Franco (Regional Mgr.)   	956-227-8775 Luis Briones (Production)	956-212-8079 Anselmo Garza (Warehouse)	956-562-2415</i><br />Target victim <b>website</b>: <i>deliastamales.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>whiteconlee.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24812</link>
<guid>f36d576ded86c313dce14fa4b8e6c0d4</guid>
<pubDate>Thu, 31 Jul 2025 18:56:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>whiteconlee.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2d2f33a6842f36aa3b66672393b5cf0ca5e8269861c5976762dfb9ecee6daa88</i><br /><br />Threat actor <b>description</b>: <i>WC Development is a privately held real estate development and construction company based in San Antonio, Texas, primarily focused on the Austin, Dallas-Fort Worth, Houston, and San Antonio markets. Specializing in the multifamily sector, they offer services such as development, design-build, and general contracting, targeting upper-income renters with Class A and B communities. The company is committed to delivering high-quality residential environments, ensuring projects are completed on time and within budget, while also being environmentally conscious. With a robust management team and a focus on innovative financing solutions, WC Development aims to provide investors with above-average returns. Employees: 25 Revenue:$5 Million Industry:Commercial & Residential Construction Phone Number:(210) 492-1300 Matthew Conlee (Vice President Construction)  (210)-669-1888 Matthew Greenwalt  (General Superintendent Field)  (210)-669-6646 Steve Vinson (Field Superintendent)  (210)-788-9897 Todd Briscoe  (512)-552-3248 Mike Futterer   ((254)-541-3817)</i><br />Target victim <b>website</b>: <i>whiteconlee.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>iPROMOTEu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24804</link>
<guid>3041372c228449ada7c295d940697a3a</guid>
<pubDate>Thu, 31 Jul 2025 17:49:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>iPROMOTEu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0dce45b6b99d106467237e0c4383aded05260b02738762a840e0012389e16483</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "iPROMOTEu" is a US-based service provider in the promotional products industry. Established in 1999, it offers services such as order financing, supplier negotiation, and business development to promotional product distributors. The company aims to help these distributors increase their efficiency, reduce costs, and maximize their business potential, while also allowing them to retain their independence.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grayscale-Investments</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24805</link>
<guid>008bfef4efdd575ac3e9a5c0c43661e9</guid>
<pubDate>Thu, 31 Jul 2025 17:49:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Grayscale-Investments</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8082e9f93d138d63e4b7df901f10520f7086ddab0df99675459ea0a9f4a68584</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Grayscale Investments is a digital currency asset management company, founded by Barry Silbert in 2013. It provides secure access to the digital currency asset class through its single-asset and diversified investment products, including Grayscale Bitcoin Trust and Grayscale Digital Large Cap Fund. It operates in the US and has the distinction of managing the largest Bitcoin portfolio.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mailchimp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24806</link>
<guid>59af62180b0d04edd54a5f5ace7fb433</guid>
<pubDate>Thu, 31 Jul 2025 17:48:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Mailchimp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1ae29466317b66b8c127f7ec1f27726cc219f4aebbacd033fb94f1ae436c328</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Mailchimp is a leading marketing automation platform and an email marketing service. The platform allows businesses to design, schedule, and manage email campaigns, from large to small scale. With additional features like audience segmentation, dynamic content, and analytics, it caters to businesses looking to turn their audience data into actionable insights. It also grants users the ability to build websites and landing pages.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tooling-Systems-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24784</link>
<guid>587bc1927f599f98f888e9d244be8a17</guid>
<pubDate>Wed, 30 Jul 2025 14:56:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Tooling-Systems-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8680e8432f752116fd821bd60ddf924f0f95e272375e2d2555d25f8f4f0862f</i><br /><br />Threat actor <b>description</b>: <i>Advanced Tooling Systems (ATS)
 Concept Tooling Systems (CTS)
 Dienamic Tooling ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>fsl.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24795</link>
<guid>aba0ef6b58163530836522227f29688d</guid>
<pubDate>Wed, 30 Jul 2025 13:47:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>fsl.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8215fc362815e8700a7fec486b6ec8a66aa6b3998d83eaaa70c8d6131f544143</i><br /><br />Threat actor <b>description</b>: <i>Originally founded in Huntington in 1926 as a social service agency, Family Service League (FSL) has grown substantially since then to provide the support and security more than 60,000 Long Islanders rely on every day. With over 60 social service programs in more than 20 locations and committed staff and support personnel of approximately 700, they continue to serve Long Island’s most vulnerable citizens. From seniors seeking companionship and purpose and the homeless seeking shelter and nourishment to those suffering from addiction and mental illness and families working hard to stay together, FSL will continue to help their neighbors when they need it most. Family Service League became a victim of the data breach. 100Gb sensitive, medical and personal data will be published soon in our blog.</i><br />Target victim <b>website</b>: <i>fsl.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lee--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24790</link>
<guid>c573f25877c971c5ca3aa000f1edca35</guid>
<pubDate>Wed, 30 Jul 2025 10:43:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Lee--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>769dc86fc0265f5380f8e34cdb3f0eed5f4a2df1d1f40a50c08a1476b74d3f9a</i><br /><br />Threat actor <b>description</b>: <i>In 1979, Bill Lees vision became reality when he opened the first office of Lee & Associates in Orange County, California. Every Lee office is owned and operated by the real estate professionals, all of whom benefit from the sharing of real-time market intelligence that is vital to the delivery of superior commercial real estate services. The unique service platform has attracted some of the most experienced and talented real estate professionals in the industry, all of whom share Bills original vision of superior service through teamwork. Our offices offer a broad array of real estate services tailored to meet the needs of the companys clients in each of the markets it serves. They include commercial real estate brokerage, property management, valuation, asset management and finance. Now the largest firm of its kind in North America, the companys reach extends across the United States and Canada.</i><br />Target victim <b>website</b>: <i>www.lee-associates.com</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>Towne-Mortgage</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24788</link>
<guid>3e8d4729046f2c5b7688f79da3871068</guid>
<pubDate>Wed, 30 Jul 2025 10:43:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Towne-Mortgage</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b2daaa64b593f1547ab4a12991748972da607aace294313dabc744b548c9595</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1982, The Towne Mortgage Family of Companies has more than 40 years of experience in the mortgage industry. Passionate about our customers, our company and the communities we serve, Towne is actively involved with many non-profit organizations. Our community outreach initiatives are not just a side-effect of our business; they are the heart of it. We are, first and foremost, a local lender. Our commitment extends beyond outreach to the products we offer, including a program specifically designed to aid in the rehabilitation of struggling neighborhoods. So while we have experienced aggressive growth in the past 3 years, we continue to focus on areas often underserved by large, corporate lenders.</i><br />Target victim <b>website</b>: <i>www.townemortgage.com</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dollar-Tree</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24787</link>
<guid>e1f77a2c16cc54a43eb984f00fa27d14</guid>
<pubDate>Wed, 30 Jul 2025 09:56:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Dollar-Tree</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f25cd86455f5d521751967ed4ab88f0c905017240fdac7d6432764dbe192202</i><br /><br />Threat actor <b>description</b>: <i>Dollar Tree, a Fortune 200 Company, operated 16,774 stores across 48 states and five Canadian provinces as of February 3, 2024. Stores operate under the brands of Dollar Tree, Family Dollar, and Dollar Tree Canada. To learn more about the Company, visit www.DollarTree.com.  Dollar Tree, Inc. (NASDAQ: DLTR) announced that it acquired designation rights for 170 leases of 99 Cents Only Stores across Arizona, California, Nevada, and Texas. The deal was completed via two transactions in May that were approved by the United States Bankruptcy Court for the District of Delaware. As part of the transactions, Dollar Tree also acquired the North American Intellectual Property of 99 Cents Only Stores and select on-site furniture, fixtures, and equipment.  They became a victim of the data breach. 1,2TB sensitive and personal data will be published soon in our blog.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Winner-School-District-59-2</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24777</link>
<guid>6e7d63d4c467dd6145a0626cb68f4ec4</guid>
<pubDate>Tue, 29 Jul 2025 22:02:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Winner-School-District-59-2</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>72d61da19d3d628f3f994b91051d03384f6ad53c02542ad72021d3fc3a7c8667</i><br /><br />Threat actor <b>description</b>: <i>Winner is located in south central South Dakota along the Oyate Trail at the crossroads of SD Highway 44 and US Highways 18 & 183. Agriculture is the backbone of our community. Tripp County is the largest cattle producer in South Dakota. Our farmers & ranchers also harvest a great deal of wheat and corn. Our open prairies and rolling hills provide an excellent habitat for a sportsman's paradise. Winner is known for top-notch pheasant hunting. Deer, turkey, prairie dogs, grouse, prairie chicken, dove, and coyotes are also hunted in the area. The Winner Youth Fishing Pond is a wonderful way to spend the afternoon fishing. Should you desire to fish on the Missouri River, it is a scenic 30 mile drive. A couple of unique landmarks to Winner are Leahy Bowl and the Winner Drive-In Theatre. If you happen to visit Winner in the summer, you will not be disappointed with the events at each of these attractions. The Winner Drive-In Theatre is one of very few Drive-Ins left in the USA. Leahy Bowl hosts many baseball games each summer and is well preserved by the community. We have many events year-round and Labor Day is our big celebration. Whether you are here for a week or the weekend or are considering relocating to a hometown with an emphasis on community and quality of life, we look forward to meeting you!</i><br />Target victim <b>website</b>: <i>www.winner.k12.sd.us</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>Windsor-Realty-and-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24767</link>
<guid>8158a29c3b5e8d4e8d591d607cfe77b0</guid>
<pubDate>Tue, 29 Jul 2025 22:02:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Windsor-Realty-and-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9fdb72b4aa1484d3d6608c46c39738e6785b4f4f0370f8bf618f21a6f77f876</i><br /><br />Threat actor <b>description</b>: <i>Real Estate Windsor Management Corporation is a privately held, full-service commercial real estate company serving New York and Connecticut since 1944. Our operational and ownership philosophy is centered on creating value for our tenants, our employees, and the communities within which we conduct our business through reinvesting in property upgrades and providing top level tenant services. We employ a comprehensive hands-on approach to property management maximizing results and fine tuning efficiency. Our viewpoint is one of personal attention, open communication and strategic insight. Windsor Management focuses on cultivating associations and through our extensive network of professional contacts we have formed long term and mutually beneficial relationships with tenants and colleagues while maintaining dynamic and fluid environments.</i><br />Target victim <b>website</b>: <i>www.windsormanagement.net</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>Washington-Court-House</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24769</link>
<guid>c113616dedb792f022356b9a8295c00d</guid>
<pubDate>Tue, 29 Jul 2025 22:01:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Washington-Court-House</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e01b72ac8d815bb03751ab5babf152a90d57b86001132e4ea28d534c28f2c16a</i><br /><br />Threat actor <b>description</b>: <i>Washington Court House is a city in Fayette County, Ohio. It is the county seat of Fayette County and is located approximately halfway between Cincinnati and Columbus.</i><br />Target victim <b>website</b>: <i>www.cityofwch.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sani-Tech-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24770</link>
<guid>9c677bd9ead4ea4926c59a7d0467881d</guid>
<pubDate>Tue, 29 Jul 2025 21:59:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Sani-Tech-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6031c9efa909161bf5f498d0e56a75922e0929bd5e0fc3959c94a5f39580fd07</i><br /><br />Threat actor <b>description</b>: <i>At Sanitech Systems, we don't just build compactors-we set the standard. As the original auger compactor manufacturer, we've designed a solution that's smarter, stronger, and more sustainable than traditional hydraulic compactors. Our technology increases efficiency, reduces costs, and minimizes environmental impact. We take pride in being a trusted partner to our dealers and end users, delivering top-quality equipment and reliable support. When you choose Sanitech Systems, you're choosing proven performance, industry expertise, and a team that stands behind every compactor we make.</i><br />Target victim <b>website</b>: <i>www.sanitech.net</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>PROVAIL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24771</link>
<guid>4609a0cb0481252ab39445f70503e48f</guid>
<pubDate>Tue, 29 Jul 2025 21:58:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>PROVAIL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>815d26ea1a990b43a5c7e6345d8454d80d95ff688f443c2791eb0366a4a2946a</i><br /><br />Threat actor <b>description</b>: <i>PROVAIL is one of Washington State's largest, multi-service agencies dedicated to meeting the needs of children, youth, and adults with disabilities who need an integrated, complex set of services to live life according to their own choices. Serving primarily King and Snohomish Counties, PROVAIL offers a comprehensive range of services to support people, with even the most severe disabilities, in all major areas of life so they can live, work, play, and fully participate in the community of their choice.</i><br />Target victim <b>website</b>: <i>provail.org</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>JPS-Consulting-Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24765</link>
<guid>511a767823e5718ace2b93439cd79ac2</guid>
<pubDate>Tue, 29 Jul 2025 21:57:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>JPS-Consulting-Engineers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b83bd0794214828ff355f2c6676ecaf6fd11229a501e9fe25686b8dc55f7098b</i><br /><br />Threat actor <b>description</b>: <i>JPS Consulting Engineers is a group of dynamic site, civil and structural engineers based out of Indianapolis, Indiana. We have a combined 200+ years of design and consulting experience among us. We serve as a one-stop shop for all of your site, civil and structural needs-in Indiana, the Midwest and anywhere you do business. JPS is a certified Minority Business Enterprise (MBE). Our firm is distinguished by the ability to communicate complex technical issues in a way that our clients understand. Our employees are passionate about working in collaborative environments which help our healthcare, higher education, advanced technology, construction, and existing building clients to achieve outstanding project results. We believe in a holistic approach to structural design, construction means and methods, and risk consulting. We understand that our clients have competing demands for their projects.</i><br />Target victim <b>website</b>: <i>www.jpsconsultingengineers.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grand-Rapids-Metrology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24775</link>
<guid>32a9499124964b7f18c19a85d13c1a05</guid>
<pubDate>Tue, 29 Jul 2025 21:54:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Grand-Rapids-Metrology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>834feaf6fd454f939fbd51b8c6529d017e5cbb6ec6602bce686d61b697abbca0</i><br /><br />Threat actor <b>description</b>: <i>GR Metrology is a distributor and service provider specializing in weighing and measuring equipment, offering products and calibrated solutions to manufacturers. The company provides a range of services including installation, repair, and emergency service, as well as asset management and performance evaluation. Their target clients include businesses in need of precision measurement devices and process automation solutions. Established in 1922, GR Metrology has built a reputation for expertise and customer service in the measurement equipment industry.</i><br />Target victim <b>website</b>: <i>www.grmetrology.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>El-Paso-Quality-Dentistry</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24772</link>
<guid>28a9e012877103f89379467a0ceb53ea</guid>
<pubDate>Tue, 29 Jul 2025 21:52:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>El-Paso-Quality-Dentistry</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>566a645acbd1a62c9050f754af93de9617c1e852b31b29129c53a461635040a2</i><br /><br />Threat actor <b>description</b>: <i>Dental health moves through many stages. Dr. McLaughlin and Dr. Sosa in El Paso, TX offer a range of preventive, cosmetic, & functional care for every age at El Paso Quality Dentistry.</i><br />Target victim <b>website</b>: <i>www.elpasoqualitydentistry.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>Acheson-Doyle-Partners-Architects</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24774</link>
<guid>683a1c93fba8f45836af5ebf08c662f8</guid>
<pubDate>Tue, 29 Jul 2025 21:45:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Acheson-Doyle-Partners-Architects</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a827c74d4e78128f57f65f97cdd85ced30b368dc9ac77e6e1ee94dc3d6567364</i><br /><br />Threat actor <b>description</b>: <i>Architecture, Engineering & Design - New York, United States Acheson Doyle Partners Architects is a leader in the restoration, rehabilitation and adaptive-reuse of existing buildings. We believe it is wasteful to prematurely demolish structures and that an active revitalization strategy promotes preservation and leads to sustainability. We are committed to the responsible stewardship of our cultural and historic properties. Acheson Doyle Partners Architects is a federally registered Small Business</i><br />Target victim <b>website</b>: <i>www.adparchitects.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>2fORM-Architecture</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24779</link>
<guid>8271e0c5b2024644a262f19b0b629416</guid>
<pubDate>Tue, 29 Jul 2025 21:43:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>2fORM-Architecture</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>75014733aa5b90ac8ac094c40cc3a11dd48bdba264c5e1afc012d4632a6dfa87</i><br /><br />Threat actor <b>description</b>: <i>2fORM Architecture specializes in innovative sustainable architecture, offering design services for residential, commercial, and interior projects. Their portfolio includes a diverse range of developments, such as multi-family housing, health care facilities, and various remodels. The company aims to serve clients in the Pacific Northwest, including individual homeowners, businesses, and institutions. With a commitment to sustainability and creativity, 2fORM Architecture enhances the built environment through thoughtful design.</i><br />Target victim <b>website</b>: <i>www.2-form.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>Built-Environment-Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24780</link>
<guid>b628e37c03795232aea0b0addf6a192c</guid>
<pubDate>Tue, 29 Jul 2025 20:59:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Built-Environment-Engineers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7187bec5f0fcea19a49cf590fd6ae06e510b49d14bac2b3675c01c4e74e2944</i><br /><br />Threat actor <b>description</b>: <i>Built Environment Engineers is a mechanical, electrical, and plumbing consulting engineering firm that understands architecture and design. We are driven by the notion that excellent architecture is defined also by excellent engineering -  elegant, efficient, maintainable, and within the client’s budget.</i><br />Target victim <b>website</b>: <i>www.builtenvironmentengineers.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mid-West-Fabricating</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24782</link>
<guid>cfe8517a9ddcfdb2ae7c5832947c3833</guid>
<pubDate>Tue, 29 Jul 2025 20:59:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Mid-West-Fabricating</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46c41bb985499968a1e031dd676d400c8776678ea9daa60013fd7d0b0a040170</i><br /><br />Threat actor <b>description</b>: <i>Mid West Fabricating Company, Inc. provides special steel fasteners and formed rods for assembly into automotive and lawn and garden products, as well as various industrial and consumer items in highway construction, housing, utility, recycling, and irrigation markets. It offers closed die headers; guardrail nuts and bolts to large and small fabricators and installers; flattened u-bolts for water line hardware; and parts from wire rod using steels. Mid West Fabricating Company, Inc. was founded in 1945 and is based in Amanda, Ohio. The company has locations in Santa Fe Springs, California; and Lancaster, Ohio.</i><br />Target victim <b>website</b>: <i>www.midwestfabricating.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>KMDI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24781</link>
<guid>7a8ce750b58ea4593da1087db5a2c819</guid>
<pubDate>Tue, 29 Jul 2025 20:58:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>KMDI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d6262803836da5944b2a51f5b6b380721fb066c3db89d7091255e6aee2ee6a66</i><br /><br />Threat actor <b>description</b>: <i>KMDI is a leading manufacturer and installer specializing in custom architectural fabrications and designs, backed by over 40 years of industry experience. They serve a diverse range of clients, including top designers, architects, corporations, and various industries such as retail, hospitality, healthcare, and education. Their innovative MicroLite! material, along with their collaborative approach, enables them to deliver unique and tailored design solutions for any space. With a focus on turning design concepts into reality, KMDI is committed to enhancing brand experiences through exceptional custom decor.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>ingrammicro.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24763</link>
<guid>9e8375d4bea951a9e639cf4fa7efa3dd</guid>
<pubDate>Tue, 29 Jul 2025 17:56:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>ingrammicro.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba7f75fe01042f7f797635dae0ff1779e8a3b3eb5b0d060cf0838554d4078a30</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Ingram Micro is a global technology and supply chain services provider. The company, established in 1979, offers a broad range of solutions and services to businesses around the globe, including cloud, mobility, supply chain, and technology solutions. It serves markets including IT, telecommunications, consumer electronics, and others.</i><br />Target victim <b>website</b>: <i>ingrammicro.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hertz-Farm-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24761</link>
<guid>c4bd5c1e2ad0c73f8682c1719013b642</guid>
<pubDate>Tue, 29 Jul 2025 13:11:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Hertz-Farm-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>807183cac20fce4c85b34bb13b0c7595390b0e30c5825f627991049330e9002c</i><br /><br />Threat actor <b>description</b>: <i>Hertz Farm Management specializes in professional farm management
, land real estate services, and agricultural appraisals.

We are going to upload 9 GB of corporate documents. A huge number
of employee personal files (passports, DLs, birth certs and so o
n), NDAs, detailed financial data, client information, project in
formation and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mount-Vernon-Property-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24762</link>
<guid>dce4d150d598f12d9b87a16283857712</guid>
<pubDate>Tue, 29 Jul 2025 13:11:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Mount-Vernon-Property-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6e67a066de21026eb29ff9674fe69847b4d8f8cada27a0c7d2d6bc623d658d76</i><br /><br />Threat actor <b>description</b>: <i>Mount  Vernon Property Management specializes in property managem
ent services in Sarasota, offering tailored full-service solution
s for landlords and investors. 

We are going to upload company data soon. You will find inancial 
data (payment details, financial reports, invoices), A bit of per
sonal files (DLs) and customers data.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>First-Baptist-Church-of-Hammond</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24752</link>
<guid>4b73c0453607648d723ab59b5905f61d</guid>
<pubDate>Tue, 29 Jul 2025 04:47:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>First-Baptist-Church-of-Hammond</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>968cd01de0323dc60542f06d2e7b4bab135e35e355569d9a7ab306997f8abef0</i><br /><br />Threat actor <b>description</b>: <i>First Baptist Church of Hammond Established in 1887, The First Baptist Church was listed as 2009's 12th largest church in America in Outreach magazine.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>ci-Fabrics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24747</link>
<guid>5833f44355c400ad3efd00141ecca9a7</guid>
<pubDate>Tue, 29 Jul 2025 02:28:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>ci-Fabrics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec876dc6d05265118153df9834182c22a4ea3963bde19892b58c10c78d7d9a77</i><br /><br />Threat actor <b>description</b>: <i>Ci Fabrics has been assisting businesses in their growth for over 40 years, offe...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>premiersurfacesinc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24742</link>
<guid>76f3c5ffe7dcfd0b14841e7926dd832b</guid>
<pubDate>Mon, 28 Jul 2025 23:28:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>premiersurfacesinc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dce6685318334dc5671f14d346f6f047092dc3f046a8d972b6c2f4246e06230a</i><br /><br />Threat actor <b>description</b>: <i>Premier Surfaces revenue information is not publicly available. Premier Surfaces...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>VIRTUALWEB.US</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24751</link>
<guid>201d7a97aad11bd86a94e02edd95bebb</guid>
<pubDate>Mon, 28 Jul 2025 21:05:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>VIRTUALWEB.US</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>99f8d30d4cea439e0dfb35e33c54a7df26d43d9d406b7be124d73221a6103217</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>VIRTUALWEB.US</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>mortensenlawoffices.comUSA99GB</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24750</link>
<guid>7efeb6400e09756814e99049835fa47b</guid>
<pubDate>Mon, 28 Jul 2025 20:46:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>mortensenlawoffices.comUSA99GB</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>814a96480d2068eb56287e12cffa51fe13259c7559be6b31b79e08d26029065f</i><br /><br />Threat actor <b>description</b>: <i>Unknown - Mortensen Law Offices</i><br />Target victim <b>website</b>: <i>mortensenlawoffices.com/USA/99GB</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Albavision.tv</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24749</link>
<guid>4edd5677e5cd6bd28b12373f1a14a3f0</guid>
<pubDate>Mon, 28 Jul 2025 19:44:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>global</b> claims attack for <b>Albavision.tv</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8422b7dbe07ac71edd92136e5b3c3eb8126e33eff7249d82415a698c85ffb8ac</i><br /><br />Threat actor <b>description</b>: <i>Albavisión is a major Latin American media company founded by Remigio Ángel González. Headquartered in Miami, it owns numerous TV and radio stations across Latin America. The company is known for acquiring struggling media outlets and revitalizing them with popular programming like telenovelas and U.S. films. === 400GB stolen. ===</i><br />Target victim <b>website</b>: <i>Albavision.tv</i>]]></description>
<category>global</category>
</item>
<item xmlns:dc='ns:1'>
<title>Votava-Nantz--Johnson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24740</link>
<guid>9f1f4938963fa5f9ab4d57353afe2586</guid>
<pubDate>Mon, 28 Jul 2025 18:28:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Votava-Nantz--Johnson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>14786a48b9844be37e6de7038d47c04bd1b19c4034c493dd139f8c6f198bc9a8</i><br /><br />Threat actor <b>description</b>: <i>(Including customer data) VNJ Law is a prominent law firm in Kansas and Missouri that specializes in personal injury cases, including auto accidents, medical ma...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>DA-Whitacre-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24737</link>
<guid>33afb1e731c09273db55e8df1f2a3f94</guid>
<pubDate>Mon, 28 Jul 2025 17:27:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>DA-Whitacre-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2df15d50043263f19171bfe3530ca87319f44623c7accd5c29c3e6ac2327f00e</i><br /><br />Threat actor <b>description</b>: <i>D.A. Whitacre Construction, Inc. is a San Diego-based commercial construction firm with nearly 40 years of experience. The company specializes in framing and ha...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Blanco-Creek-Farms</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24741</link>
<guid>35e7132c1742eaa9dacfedd5607b5f94</guid>
<pubDate>Mon, 28 Jul 2025 15:08:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Blanco-Creek-Farms</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6def47fd726260a03a21ad0d4362a705d2367ae710d9d5de7314b0ef2d8cde4b</i><br /><br />Threat actor <b>description</b>: <i>Blanco creek farms is a food & beverages company based out of Uni
ted States.

We are ready to upload more than 24GB of essential corporate docu
ments such as:  financial data (audits, payment details, invoices
), employees and customers information (phones, e-mails, addresse
s, passports, SSNs, DLs and other documents), NDA  etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>tele-optics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24730</link>
<guid>5bf23052a73a9ccd5f3d5d82b4ba148a</guid>
<pubDate>Sat, 26 Jul 2025 20:51:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>tele-optics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25348c3fde009bc98f02607394450a521c77fee6a9419a88c5d70b36ba95871d</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>tele-optics.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>appsnw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24729</link>
<guid>1c88233ac30debaa338e6961c8bfaa14</guid>
<pubDate>Sat, 26 Jul 2025 20:50:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>appsnw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>058637a0727c50e61061e69f9c1d60a6c1db75f4e9127401053ae2cb8949b97f</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>appsnw.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>wta-inc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24728</link>
<guid>ebe44c013549fd1a935942582bea7b80</guid>
<pubDate>Sat, 26 Jul 2025 20:49:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>wta-inc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1cf3b6a0c215d4836c46c2f0919cbdaddf21a974bb7d539dab3d30e5c6dd1363</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Worldwide Travel Adventures, Inc. (WTASi) is a global travel agency specializing in customized travel packages for independent travelers. The company provides destination expertise and personalizes travel services to exotic destinations across the globe. The services include accommodation arrangements, flights booking, ground transportation, and exclusive tours. WTASi is known for its intimate knowledge of the locations and personalized services. Note: Please check the company's website for the most current information.</i><br />Target victim <b>website</b>: <i>wta-inc.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>bussepc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24722</link>
<guid>dc826746e1b7919b6275ea3f14c5e1bd</guid>
<pubDate>Sat, 26 Jul 2025 19:55:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>bussepc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b4951bdb2923dece98b5c302ddde4d00531256ac7df53a64661e02f633a09a2</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>bussepc.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>swfldermatology.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24727</link>
<guid>91d34433e0793908f20c5e6fdbcba61c</guid>
<pubDate>Sat, 26 Jul 2025 19:54:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>swfldermatology.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e5fb86e7b714666f2efe0f0b3bd3a64c03b52c2890b5c557778bc70e009a3b6</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Southwest Florida Dermatology is a professional healthcare practice offering a range of skin care services. Their team of certified dermatologists and skin care specialists provide treatments for various skin conditions including acne, psoriasis, eczema and skin cancer. They also offer cosmetic dermatology services like Botox, fillers, and laser treatments. It is dedicated to offering high-quality patient care in a compassionate environment.</i><br />Target victim <b>website</b>: <i>swfldermatology.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>havtechpa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24726</link>
<guid>6c275a693a0e1764550078ac710873cf</guid>
<pubDate>Sat, 26 Jul 2025 19:53:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>havtechpa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8366743c3542e89753fdc1c55b497e9f741dff737b474ac07701127c197540e7</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>havtechpa.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>appagroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24725</link>
<guid>bbeaf32ca49221a91a7ea7cf3e994069</guid>
<pubDate>Sat, 26 Jul 2025 19:52:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>appagroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5e2da48f5d8b4db9c0b3447edbf8f80f9343b2c9a88361cc2bfc9cd6d535c29</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Appa Group is an engineering and construction company that specializes in the engineering, procurement, and construction (EPC) of industrial plants and commercial buildings. They deal with varied sectors including oil & gas, petrochemical, power, infrastructure, and more. The company undertakes each aspect of the construction process in-house to ensure seamless delivery.</i><br />Target victim <b>website</b>: <i>appagroup.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>briar-group.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24724</link>
<guid>d744c4e196f729df5fa41bcb8df27eab</guid>
<pubDate>Sat, 26 Jul 2025 19:52:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>briar-group.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d7a6e88f941be8e31bb16d5097c84f97ed363bb89bcc6bbb8cbf27de62326e08</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] The Briar Group is a Boston, MA based hospitality company known for its commitment to great food, excellent service, and exceptional design and ambiance. The family-owned company operates a portfolio of various dining establishments, including bars, pubs, and restaurants all over the Boston area. From traditional Irish pubs to modern American eateries, the Briar Group offers diverse dining experiences.</i><br />Target victim <b>website</b>: <i>briar-group.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>teamsignal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24723</link>
<guid>c09461ce85141b05d3ee6f2aea257935</guid>
<pubDate>Sat, 26 Jul 2025 19:51:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>teamsignal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b4fd561412943f7a2b6e9701763053a38e1fcb969a0f91b9597aa7822059f3d</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "Teamsignal" is an employee engagement and ground intelligence platform for teams and organizations. It facilitates upward communication from staff to management and leadership, allowing organizations to gain real-time insights into performance, morale, and workplace climate. Teamsignal uses a data-driven approach to enhance employee wellbeing and boost productivity. Its core features include regular pulse surveys, data analytics, and comprehensive dashboard visualizations.</i><br />Target victim <b>website</b>: <i>teamsignal.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Morrow-Equipment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24712</link>
<guid>8807b21924d02314daeb3444bda8acbd</guid>
<pubDate>Sat, 26 Jul 2025 14:27:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Morrow-Equipment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c689d4573e4a8b21e71674ce53aed1ff00432712b3cccf7dbb0dbde70dc2887</i><br /><br />Threat actor <b>description</b>: <i>proof of attack</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>hptc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24713</link>
<guid>8a3e0404c419498a8636cf91c55edbe3</guid>
<pubDate>Sat, 26 Jul 2025 07:47:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>hptc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c942351ea3689e6a14a179628f260a67e670d123206e2d7861cbfa1a4984f95b</i><br /><br />Threat actor <b>description</b>: <i>High Point Treatment Center, based in New Bedford, Massachusetts, offers residential and outpatient services to prevent and treat chemical dependency and provides therapeutic services for mental health issues.</i><br />Target victim <b>website</b>: <i>hptc.org</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bouey--Black-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24710</link>
<guid>038831681b99600e276ab9b8c4e95ef0</guid>
<pubDate>Fri, 25 Jul 2025 23:01:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>Bouey--Black-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38692b18661aa3bdd0251fc9a723f2ed7cb8506e165f651e0b6665a8b9ef0c9e</i><br /><br />Threat actor <b>description</b>: <i>USA - Bouey & Black LLP</i><br />Target victim <b>website</b>: <i>Bouey & Black LLP</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dunlap-Codding</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24702</link>
<guid>26f6abfa0d7725fef678e371897d5df0</guid>
<pubDate>Fri, 25 Jul 2025 21:52:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Dunlap-Codding</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f7dce6ef70b5d1fe2c27b85de62bafd6a4aa8036ddb26c58c1ea4730a454194</i><br /><br />Threat actor <b>description</b>: <i>Dunlap Codding is a law firm, based in Oklahoma City, serves sophisticated international, national, and regional clients. We are ready to upload over 19 GB of corporate documents. Lots ofclient personal files, financial documents, project data, lots of patent documents, courts files, hearing notes, protocols, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Astro-Industries-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24701</link>
<guid>2e405b15462930fe38bd7ab3ca37869b</guid>
<pubDate>Fri, 25 Jul 2025 16:29:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Astro-Industries-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d7ae02bf73cdb406eb4e45865801126ece4f63cb1cd2d9dc2731eaf8e8cb41fa</i><br /><br />Threat actor <b>description</b>: <i>Astro Industries, Inc. is engaged in the manufacturing and distribution of Military and Commercial wire, cable, cable assemblies, shrink tubing, and value-added products and services. We also stock a variety of military and commercial knobs,             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crumbl</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24704</link>
<guid>1b04e3e4deb99316836eb317f939347a</guid>
<pubDate>Fri, 25 Jul 2025 14:47:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Crumbl</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c8f7465c289574066a97bb78b8d310d25256893ffbee4c82d876c3d7a64fa7f</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Crumbl is a popular bakery chain operating in the United States. Known for their gourmet cookies and unique rotating weekly menu, Crumbl offers delivery, catering, and in-store services. The company is loved for its large, warm, melt-in-your-mouth cookies, served in a signature pink box. Crumbl was established in 2017 and has rapidly expanded, with hundreds of locations across the U.S.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Emerson-Chiropractic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24699</link>
<guid>c44953f2f780be79d8f60e568c9bd1e4</guid>
<pubDate>Fri, 25 Jul 2025 11:27:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Emerson-Chiropractic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7bce34d630278b0d97ef46745333d5f1c697c7d429863c9094f34b3bf2142b5a</i><br /><br />Threat actor <b>description</b>: <i>Emerson Chiropractic has been serving the Southside of Indianapolis, Greenwood, and surrounding communities for over 25 years. Dr. Christian Carter is dedicated...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>salamanderresort.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24695</link>
<guid>0d6e3d4f4acc0e9bda9ac92a85810ad3</guid>
<pubDate>Fri, 25 Jul 2025 01:56:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>salamanderresort.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4dc7f3db61ad2ed3098f5f169b78e5ee95ec958312890585a36643cb48f93ca4</i><br /><br />Threat actor <b>description</b>: <i>Salamander Resort & Spa is a luxury vacation destination located in Middleburg, ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>teampostop.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24697</link>
<guid>15a31d27f7897f1c0e786e05e0007cc6</guid>
<pubDate>Thu, 24 Jul 2025 23:47:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>teampostop.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22d5da277fc5f04050323893fd0b7603b8801937803b227a8a9192f99c8202f1</i><br /><br />Threat actor <b>description</b>: <i>TPO is the exclusive provider in the State of Florida for the Climaware CryoThermic bracing line. Climware products allow for any patient to enjoy the therapeutic benefits of cold and heat therapy directly from the brace itself. TPO has performance guarantees trough quantitative measures producing high customer satisfaction. TPO services over 5,000 adult and pediatric patients annually and is one of the largest DME companies in the State of Florida. Team Post OP agrees to: Commit to fill levels of 100% within 48 hours - excluding custom and specialty products and as requested by you. In accordance with patients' Bill of Rights, Team Post OP agrees to properly instruct the patient and/or caregiver on the proper use and maintenance of products. 24 hour/ 7 days per week emergency service for any product or service rendered. Bilingual staff and service technicians. All service representatives are fingerprinted, and have level 2 clearance thru AHCA. Employees: 32 Revenue:$8.1 Million Industry:Retail Phone Number:(305) 252-0963</i><br />Target victim <b>website</b>: <i>teampostop.net</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>seasonsfour.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24696</link>
<guid>413610d3d97250aabb9ffb2683e07922</guid>
<pubDate>Thu, 24 Jul 2025 22:48:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>seasonsfour.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4558eb38610b0fd73a747a682c0aef5e9dbfb3086720403d6002a5264d90fe0b</i><br /><br />Threat actor <b>description</b>: <i>Seasons Four was established in 1970 in Lexington, Massachusetts. It is a family owned business begun by Arthur and Connie Georgaklis and operated by their daughter, Laura Hopkins for the past 25 years. The Seasons Four team emphasizes customer service above all, from an old foot cap inquiry to a multi piece installation; we are motivated by the desire to find the perfect solution for our clients. Referrals from family, friends and acquaintances confirm consistent customer satisfaction and are the best form of advertising. Recognized as the Outdoor Living Store in New England, Seasons Four offers an outstanding selection of casual furniture, accessories, garden plants, statuary and fountains. Our sustained success could not have been achieved without long term partnerships with valued manufacturers; the benefits of which we share with you, our customer. Employees: 25 Revenue:$5 Million Industry:Retail Phone Number:(781) 861-1200</i><br />Target victim <b>website</b>: <i>seasonsfour.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>morgan911.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24694</link>
<guid>386bb25138d5c75aaf86b0a6d4d8f772</guid>
<pubDate>Thu, 24 Jul 2025 22:25:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>morgan911.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea02384fd9c6f1e2769afdeaca24865f30192bb34747588bdb7c42a93532f79a</i><br /><br />Threat actor <b>description</b>: <i>Morgan County 911 provides emergency and non-emergency call dispatching services for the residents of Morgan County, Alabama. The organization is dedicated to ensuring public safety and operates a countywide radio system as well as an ambulan            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gallon-Takacs--Boissoneault</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24689</link>
<guid>0b7ff420be23b7bd97f7a687e6b8246b</guid>
<pubDate>Thu, 24 Jul 2025 14:46:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Gallon-Takacs--Boissoneault</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56e076adcf3803b4f2c083371ad561a01e492e7fb044ae73a727358c9032fa30</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "Gallon, Takacs & Boissoneault Co., L.P.A. (GT&B) is a full-service law firm based in Toledo, Ohio. Established in 1955, GT&B specializes in various legal fields, including personal injury, medical malpractice, workers' compensation, and family law. Known for its strong commitment to client advocacy, GT&B draws on decades of experience to offer comprehensive legal advice and representation, serving both individual and corporate clients.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Donlar-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24691</link>
<guid>642ad51faa492de9795844a2d0c6142f</guid>
<pubDate>Thu, 24 Jul 2025 12:49:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Donlar-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>44dc71a61bd07cef257c3b6408f3f06972577f7e72508cde7c417c86bde85e32</i><br /><br />Threat actor <b>description</b>: <i>Donlar Construction is a full-service construction organization t
hat offers Minnesota and the Upper Midwest unparalleled service a
s a General Contractor & Construction Manager.

We are ready to upload almost 50 GB of corporate documents. Emplo
yees personal information (DOB, address, phone, emails, medical i
nformation and so on), detailed financial data, project data, inc
ident reports, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Testa-Heck-Testa--White</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24692</link>
<guid>3e0ce87560cc1e32353de7d1eedb58f9</guid>
<pubDate>Thu, 24 Jul 2025 12:49:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Testa-Heck-Testa--White</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9240329d6d8d0cdcc9e29af1e72759ff92ff8ee453a296ff8bc3ab49cf3b84d4</i><br /><br />Threat actor <b>description</b>: <i>Testa Heck Scrocca & Testa, P.A. is a Southern New Jersey law fir
m with over 90 years of combined experience and an outstanding re
cord of success in the New Jersey Courts.

We are ready to upload 87 GB of corporate documents. You will fin
d a lot of personal information of their clients (DLs, birth\deat
h certs and other documents), court documents, orders, correspond
ence and a lot of another legal documents.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.entecheng.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24681</link>
<guid>5c0e88d109aca1e6539486d1091a5efc</guid>
<pubDate>Thu, 24 Jul 2025 01:51:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>www.entecheng.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bae5152728c0d538a04f9eaea8c951a3065eb4174ba30de4bc21a644c047b59c</i><br /><br />Threat actor <b>description</b>: <i>Entech Engineering, Inc. specializes in providing engineering design, planning, and consulting services, focusing on various sectors including civil, mechanical, electrical, and environmental disciplines.  Their services cater to a diverse clientele, including municipalities, educational institutions, healthcare facilities, and industrial manufacturers.  Adress: 201 Penn St Ste 300, Reading, Pennsylvania, 19603, United States  We downloaded a lot of important information: projects, budgets, information about partners Entech Engineering, Inc.! In the screenshots, only a small part of what we have!</i><br />Target victim <b>website</b>: <i>www.entecheng.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Palm-Bay-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24673</link>
<guid>77da6346955af7cc9c69c1003a412e8a</guid>
<pubDate>Wed, 23 Jul 2025 18:27:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>Palm-Bay-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29be919b2a7ef10198be4286517f6a4543cddcf690238f7747a409a5c7f78016</i><br /><br />Threat actor <b>description</b>: <i>One of the largest importers and distributors of wines and spirits in the U.S. market.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>APL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24674</link>
<guid>8921e04beb6f494b73e3c8fe8928807a</guid>
<pubDate>Wed, 23 Jul 2025 14:45:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>APL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab3e6d9710c3056527ac96506c0553a18c59adb1d179cb19b5d6feb4e5df6b4e</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] APL (formerly known as American President Lines Ltd.) is one of the world's leading ocean carriers providing comprehensive international container shipping services. It operates a modern fleet, managing supply chains, and delivering to more than 60 countries globally. A subsidiary of CMA CGM, it boasts over 170 years of transportation excellence.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpseagleonline.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24668</link>
<guid>70770f6b84b0221aad9863719ee8c2d4</guid>
<pubDate>Wed, 23 Jul 2025 13:27:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>httpseagleonline.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a93705b80c7586afa43428db87100d6ff2a783fc2d49a2a6ea2c490df33e3aef</i><br /><br />Threat actor <b>description</b>: <i>proof of attacks</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ka-Logistics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24672</link>
<guid>ebdbfa1c3de4d826bbe7fe360c211ecc</guid>
<pubDate>Wed, 23 Jul 2025 12:16:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Ka-Logistics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>094e71a624ee02313b82a4a59c1e1504297b9c86e6fd9a5feaa990806254cebf</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.kalogistics.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>DA-Whitacre-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24671</link>
<guid>1c107b00d900d3fabc39ecf95a0b2d0e</guid>
<pubDate>Wed, 23 Jul 2025 12:15:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>DA-Whitacre-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e97d3398897b37a5220e2e0ad3983c509dbce8f5a133f9c360d6dce7ce5fb7d0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.dawhitacre.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>blueridgesl.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24666</link>
<guid>8c87898e670d3f3a3647a118eb56e030</guid>
<pubDate>Tue, 22 Jul 2025 19:27:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>blueridgesl.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47c5e26ef5fa37e153e190252a2e5bceea5e2dc065cfcd31ef775f2952671670</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>blueridgesl.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>qtmi.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24664</link>
<guid>3937a8212b6186a70f430fc5aaa2fd29</guid>
<pubDate>Tue, 22 Jul 2025 19:25:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>qtmi.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b031bd2cfe9add98cf64c219a9b72b2ceea67d2ddb55cee6dbc95c4c1f26132d</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>qtmi.net</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>horanbarker.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24663</link>
<guid>0d5bfba0961e9c0427e3850c85b591a2</guid>
<pubDate>Tue, 22 Jul 2025 19:24:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>horanbarker.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>526d07c1915241e83fe3d58def9b7a533885b6126628aad8ee5eb4efc4bfcd24</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>horanbarker.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pinnacle-Woodwork</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24654</link>
<guid>de3e8951b9d4a040c9f681d419242f40</guid>
<pubDate>Tue, 22 Jul 2025 15:12:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Pinnacle-Woodwork</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d1b87dfb70ed350c81d69897b6a4e9d15afa36c00fdfb0bad0915dfcb2ff41c</i><br /><br />Threat actor <b>description</b>: <i>Pinnacle Woodwork is a store fixture manufacturer located in Germ
antown, WI.

We are ready to upload 24 GB of corporate documents. NDAs, client
data, financial data, complete employee data (DOB, address, phon
es, family members contacts).
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Able-Home-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24756</link>
<guid>2ca59fd9c3117f138e722e13597f2b0b</guid>
<pubDate>Tue, 22 Jul 2025 12:27:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Able-Home-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f008c8150e10b3fc3885f7868a90e47e84f3217065b476f469ff260a9ab53057</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>ARCTICGROUP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24642</link>
<guid>e17759324a651d0ae7f35e7cc00ddee5</guid>
<pubDate>Tue, 22 Jul 2025 10:27:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>ARCTICGROUP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f0b8748f72d60bf34becd63d506fab02ac2b1aa87148fb0b47a0609c7aa642b</i><br /><br />Threat actor <b>description</b>: <i>Arctic Glacier is North America’s leading manufacturer and direct-to-store distributor (DSD) of premium quality packaged ice, ice equipment and related services. Since its start in 1882, Arctic Glacier has grown significantly through strate            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>icmconv.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24644</link>
<guid>c9344998d1ecc002e56b572b310a2ab1</guid>
<pubDate>Tue, 22 Jul 2025 05:29:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kawa4096</b> claims attack for <b>icmconv.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>444cf4909d041285b1bbb764e101f96d995968a57d0d46c88d72825cee573327</i><br /><br />Threat actor <b>description</b>: <i>icmconv.com</i><br />Target victim <b>website</b>: <i>icmconv.com</i>]]></description>
<category>kawa4096</category>
</item>
<item xmlns:dc='ns:1'>
<title>carestlhealth.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24646</link>
<guid>87067b6ae6205be72c631e0f370391f7</guid>
<pubDate>Tue, 22 Jul 2025 05:28:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kawa4096</b> claims attack for <b>carestlhealth.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cbe621148053841e141874f1f71b162db025fdcfaaf1917ec9cfd3449406de4c</i><br /><br />Threat actor <b>description</b>: <i>carestlhealth.org</i><br />Target victim <b>website</b>: <i>carestlhealth.org</i>]]></description>
<category>kawa4096</category>
</item>
<item xmlns:dc='ns:1'>
<title>reizenlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24649</link>
<guid>a60c71bd110ebc4d6916e16b8ca24fda</guid>
<pubDate>Tue, 22 Jul 2025 05:26:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>reizenlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ae430140b5eb553f26af452569e744978af76496ece8f6b674ee20b05d5a215</i><br /><br />Threat actor <b>description</b>: <i>At The Reizen Law Group we focus exclusively on personal injury law. This means that we have the skills, experience and insight necessary to aggressively advocate on behalf of accident victims. Whether you have been injured in a car accident, truck accident, motorcycle accident, slip and fall accident, boating accident, dog bite, or any other accident, we have the know how and experience necessary to maximize your recovery. Employees: 25 Revenue:$5 Million Industry:Legal Services Phone Number:(248) 554-3440</i><br />Target victim <b>website</b>: <i>reizenlaw.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>sbamh.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24634</link>
<guid>7f8e971121fea7afbe5297935b4546ea</guid>
<pubDate>Tue, 22 Jul 2025 04:50:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kawa4096</b> claims attack for <b>sbamh.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29a6fafb73196c36bc0a44bd8ecd394ba99ff82fa8e4d314a3fc429c819a028f</i><br /><br />Threat actor <b>description</b>: <i>sbamh.org</i><br />Target victim <b>website</b>: <i>sbamh.org</i>]]></description>
<category>kawa4096</category>
</item>
<item xmlns:dc='ns:1'>
<title>hitachi-tds.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24639</link>
<guid>181571ac9869dc652878903429ff5465</guid>
<pubDate>Tue, 22 Jul 2025 03:55:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>hitachi-tds.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d7a3632a1c0d92982dbc416f780dc89d56a297fbd23e582bfab86aecb5bd118</i><br /><br />Threat actor <b>description</b>: <i>Hitachi T&D Solutions, Inc. is a premier international supplier of electrical equipment including dead tank high-voltage circuit breakers, gas-insulated switchgear, transformers, and generator main circuit breakers. One of the company's recent accomplishments is the creation of the industry's first environmentally conscious high voltage vacuum circuit breaker, a 72.5kV dry air insulated solution that eliminates SF6 gas. It provides exceptionally low maintenance and operation costs, and poses no threat to the environment as the insulating dry air can be released into the atmosphere with no adverse consequences. Hitachi T&D Solutions, Inc. is dedicated to continuing the expansion and integration of its present products while developing new and improved product solutions to meet future energy demands. Employees: 120 Revenue:$69.5 Million Industry:Manufacturing Phone Number:(770) 495-1755</i><br />Target victim <b>website</b>: <i>hitachi-tds.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>csaas.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24638</link>
<guid>8bdd659454df000dda6721e217aaa204</guid>
<pubDate>Tue, 22 Jul 2025 03:20:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>csaas.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3df00663648214717b4d7d72f1d16866b68ad42ec0a3730e913974588a9ef701</i><br /><br />Threat actor <b>description</b>: <i>CSaaS offers custom hosted software solutions and managed IT services, focusing on delivering quality Net-Native technology solutions tailored to individual clients. With nearly 30 years of experience, they provide support for businesses with complex IT needs through managed IT services, remote backups, and more. Their offerings include software solutions for event management, CRM, data tracking, and telecom services. As a Microsoft Silver Independent Software Vendor, CSaaS prides itself on developing custom applications and innovative IT solutions that help businesses operate faster and more securely. Employees: 25 Revenue:$5 Million Industry:Software Phone Number:(864) 248-4957</i><br />Target victim <b>website</b>: <i>csaas.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>nboat.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24636</link>
<guid>9357e8d9b96de4920a57ba55651c5687</guid>
<pubDate>Tue, 22 Jul 2025 02:47:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>nboat.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a0a8b424523e64b7a48f7673cc4a0a22a1aff95b6864b3eb54d4fde2885820d3</i><br /><br />Threat actor <b>description</b>: <i>Established in 1984, the National Boat Owners Association (NBOA) aims to accommodate all aspects of the boating lifestyle. They offer towing memberships with industry benefits as well as discounted boating safety products and specialty items on their online ship's store LifejacketsPlus.com. In addition to its membership base, NBOA is one of the largest marine insurance agencies in the country (NBOA Marine Insurance), providing every one of its customers with A+ rated coverage and affordable premiums. Employees: 27 Revenue:$9.6 Million Industry:Insurance Phone Number:(941) 360-6777</i><br />Target victim <b>website</b>: <i>nboat.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>dtxstudio.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24637</link>
<guid>03563342055be6220e63583085516728</guid>
<pubDate>Tue, 22 Jul 2025 02:46:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>dtxstudio.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>411052a29a91a12cd2f81ccdaa6cb731d9939790bc503a093355c8799a6f4612</i><br /><br />Threat actor <b>description</b>: <i>DTX Studio is a company that provides software for dental professionals that keeps imaging data together for diagnostics, treatments, and follow-ups. They are based in Brea, California. Employees: 324 Revenue:17.8 Million Industry:Software</i><br />Target victim <b>website</b>: <i>dtxstudio.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>iBUYPOWER</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24630</link>
<guid>5349b04f18ab7fbe289988507bb1ea35</guid>
<pubDate>Tue, 22 Jul 2025 02:27:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>iBUYPOWER</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>926f205985286112bd23a4fcf1cb73896193ded04e7c20022b3c3f53790a5446</i><br /><br />Threat actor <b>description</b>: <i>Since 1999, iBUYPOWER has embodied its core beliefs of Perseverance, Unity, Stre...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>heartlineoklahoma.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24635</link>
<guid>8e4b04b37c4cf6dcb568578085893ead</guid>
<pubDate>Tue, 22 Jul 2025 02:22:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>heartlineoklahoma.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91544d3b075186de1692c914195db3b8df96381fe8d67791ddc1f8b4b6c24182</i><br /><br />Threat actor <b>description</b>: <i>HeartLine OK provides a comprehensive resource platform designed to help individuals find various services, programs, and facilities related to health and wellness. They offer access to an extensive library of articles and interactive tools covering topics such as mental health, substance use, and chronic diseases. Their intended clients include community members seeking assistance with health, housing, employment, and other essential services. HeartLine OK aims to empower users by facilitating access to critical care coordination and support resources. Employees: 26 Revenue:$5 Million Industry:Organizations Downloaded: 20GB</i><br />Target victim <b>website</b>: <i>heartlineoklahoma.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>danielslawgroupllc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24629</link>
<guid>8b2aee999ceaffac3be063b1db40b076</guid>
<pubDate>Mon, 21 Jul 2025 23:55:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>danielslawgroupllc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>226129947255e05d79be96874a6b3c3ff0a98188d6568447172579144fac44c0</i><br /><br />Threat actor <b>description</b>: <i>Daniels Law Group LLC is a results-oriented law firm located in Grand Junction, Colorado, specializing in civil law with an emphasis on domestic relations, including complex divorces and family law matters. The firm serves clients across the             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>scaffoldsolutions.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24633</link>
<guid>151c79acb52fe49af21cff6035b13cf3</guid>
<pubDate>Mon, 21 Jul 2025 23:53:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>scaffoldsolutions.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>643a845e48af28483343e9df57232fbf0213ccf8170531573485e66070169aa9</i><br /><br />Threat actor <b>description</b>: <i>Scaffold Solutions Inc. is a premier provider of commercial and industrial scaffolding products, renowned for its high level of service, expertise, and reliability. The company offers a diverse range of scaffolding solutions, including frame scaffolds, Cuplok systems, shoring, platforms, trash chutes, stair towers, and pedestrian canopies. Their services extend to safety compliance, training, drug testing, and audits, ensuring adherence to industry regulations. Scaffold Solutions primarily caters to clients in the commercial and industrial sectors, seeking reliable scaffolding solutions. Employees: 66 Revenue:$9.2 Million Industry:Manufacturing Downloaded: 19GB Phone Number:(707) 561-7712</i><br />Target victim <b>website</b>: <i>scaffoldsolutions.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bronze-Craft</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24612</link>
<guid>76969f7fee96b8295e430c80528fa01b</guid>
<pubDate>Mon, 21 Jul 2025 21:55:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Bronze-Craft</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96f61375108b88886482a040e6e4090c2125c24c37f7639d57b147fdd92f7839</i><br /><br />Threat actor <b>description</b>: <i>The company has failed to negotiate with us. New files will be published every 12 hours.

File directory: http://securo45z554mw7rgrt7wcgv5eenj2xmxyrsdj3fcjsvindu63s4bsid.onion/BronzeCraft/

-- Files of interest --</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>chainstoreguide.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24607</link>
<guid>a01714e27a8e1f5c5b9b72593d46e9d6</guid>
<pubDate>Mon, 21 Jul 2025 18:52:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>chainstoreguide.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c158f9351a78378a85473d5cc886797a413388d104504f8f78c03b4d3a3b642</i><br /><br />Threat actor <b>description</b>: <i>Chain Store Guide is the leader in Retail Foodservice sales leads, market research, and geocoded locational data, offering a 7-day free trial access to company profiles and contact information. With 97.6% data accuracy and 15 years of histori            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ThompsonHanson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24631</link>
<guid>eb3cee21198139fa6a21866d764cc4b8</guid>
<pubDate>Mon, 21 Jul 2025 18:06:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>ThompsonHanson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3f7fb97e136225d60e452b9ccdddc848a1d6f9c966399258919fcb6e7cf889b</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Thompson+Hanson is a landscape architecture firm specializing in personalized garden designs. The company, established in 1985 in Texas, blends architecture with horticulture to create unique outdoor spaces. They also have garden shops and a cafe, offering a diverse range of plants, garden essentials, and unique artifacts.</i><br />Target victim <b>website</b>: <i>thompsonhanson.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Coalinga-Regional-Medical-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24615</link>
<guid>af454808bc3f90fc29155bf1660465ee</guid>
<pubDate>Mon, 21 Jul 2025 14:11:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Coalinga-Regional-Medical-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1433e6f647955a25050cb3e44e17a7f4411dae4defcfad3b78eeaa27bbc9946a</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Coalinga Regional Medical Center is a healthcare facility based in Coalinga, California. This non-profit organization is dedicated to providing medical care to the local community. It offers a variety of medical services such as surgery, emergency care, diagnostic imaging, and rehabilitation services. Despite facing financial difficulties, it continues its operations, remaining focused on improving the health and welfare of the residents in the region.</i><br />Target victim <b>website</b>: <i>www.crmcmed.org</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Somotsoft</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24608</link>
<guid>5d9248a9f8990c54868347de2e6246d7</guid>
<pubDate>Mon, 21 Jul 2025 14:10:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Somotsoft</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>accd0841a2235a14ea31f5b95a560bb0a8784d7309fa78ed6a5f43a0df2212bc</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Somotsoft is a technology company specializing in custom software development, consulting and technology services. Established in 2002, they address the IT needs of businesses across various industries. Using their own methodology known as the "Somotsoft Way", they provide solutions to clients by leveraging the latest technologies. They also offer IT managed services and mobile application development. Their operations are global, with offices in the USA and Vietnam.</i><br />Target victim <b>website</b>: <i>www.somotsoft.com</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Integrated-Silicon-Solution-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24610</link>
<guid>1854d53411f679b70028085267ceb762</guid>
<pubDate>Mon, 21 Jul 2025 14:09:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Integrated-Silicon-Solution-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b849ef8a42ee1eaed5f1c11d3390c29231957c23f3ee7154a2b45586c2d37c15</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Integrated Silicon Solution Inc. (ISSI) is a technology company specialized in the design and development of semiconductors for tech industries. It produces a wide range of integrated circuits, including dynamic and static random access memory chips, flash memory, and digital and analog integrated circuits. Founded in 1988, it serves clients globally from sectors such as automotive, networking, telecommunication, and digital consumer.</i><br />Target victim <b>website</b>: <i>www.issi.com</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>TCI-Doors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24625</link>
<guid>edf5344746876114b61eaee7652037c5</guid>
<pubDate>Mon, 21 Jul 2025 14:06:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>TCI-Doors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4354ef718a6de14b361898a96f8b36b79a0d380fc020328b6ce06065c870ab9a</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] TCI Doors is a family-owned and operated business specializing in door manufacturing and distribution. They offer commercial and residential doors, including storm doors, patio doors, and steel entry doors. TCI Doors provides quality products tailored to meet its customers' unique needs. The company emphasizes excellent customer service, focusing on quick response times and personalized attention. They are known for delivering a versatile range of products with an efficient process.</i><br />Target victim <b>website</b>: <i>tcidoors.com</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Proactive-Engineering-Consultants</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24623</link>
<guid>3c567b3a11dc09983b9b265d43f27563</guid>
<pubDate>Mon, 21 Jul 2025 14:02:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Proactive-Engineering-Consultants</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cbdf90aa1e30dd31b0cdbd1933292e1bedc46fd3eba8549bc48d20f3c4467a00</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Proactive Engineering Consultants is a proficient and effective professional service firm that provides a wide range of engineering solutions. Offering services in the areas of civil, structural, and stormwater engineering, as well as land surveying, they are committed to applying sound, progressive thinking to each project. Renowned for their client-focused approach, they aim to apply a forward-thinking and collaborative strategy, ensuring high-quality results.</i><br />Target victim <b>website</b>: <i>www.proactiveengineering.net</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Racine-Olson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24622</link>
<guid>5cd39efd738459cf272922df6ef67cea</guid>
<pubDate>Mon, 21 Jul 2025 14:01:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Racine-Olson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>117bd746953ccc4e26544c71d79822e015733c3505d62ed0078d8bac0cfa5bb6</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Racine Olson is a full-service law firm based in Idaho, founded in 1940. It is one of the state's leading law firms with a broad range of legal services including commercial litigation, personal injury, real estate, family law, estate planning, and bankruptcy. The firm prides itself on providing top-quality legal service, applying a unique mix of tradition, innovation, and commitment to its clients.</i><br />Target victim <b>website</b>: <i> www.racinelaw.net</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Becker-Robotic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24616</link>
<guid>810fe53c836906ad7edb141de30cb383</guid>
<pubDate>Mon, 21 Jul 2025 14:00:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Becker-Robotic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bcdff28031a2d8d6438eab32b9e72670c1128d814695bb356c5db127e800054f</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>www.becker-robotic.com</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Operation-PAR-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24609</link>
<guid>882132e4d6bca5186438b69d496890d3</guid>
<pubDate>Mon, 21 Jul 2025 13:59:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Operation-PAR-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b94baa9585e5e8450beb6261a8880ed426cab3ebd4089cc8309a16a4d33dd1cc</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Operation PAR, Inc. is a non-profit organization that offers integrated addiction recovery and mental health services. The Florida-based agency offers a variety of services, from prevention and intervention to outpatient and residential treatment. It operates with a family-focused approach, emphasizing the importance of healing for not only the individual affected but also their family.</i><br />Target victim <b>website</b>: <i>www.operationpar.org</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>NPK</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24614</link>
<guid>a13338b336ac58abe821c72b19b08159</guid>
<pubDate>Mon, 21 Jul 2025 13:58:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>NPK</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e715552c68cd369b57d45415bd935ebafd4e3dc0176cc6d3c6c32748067d01c8</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] NPK is an international company that manufactures construction equipment, hydraulic attachments, industrial compactors, and other industrial products. Founded in 1923, the company has worldwide recognition and its global presence extends to more than 155 countries. Its primary products include hammer, breaker, and compactor attachments for excavators, mini excavators, backhoe loaders, and skid steers. NPK is recognized for quality, durability, and innovation.</i><br />Target victim <b>website</b>: <i>www.npkce.com</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dell-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24628</link>
<guid>4b59d913666682dd15f4516872e7f4ac</guid>
<pubDate>Mon, 21 Jul 2025 13:55:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Dell-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b32e9b10ff3f87dd2365216a578bc4089c2a98fcbd5be9b6071b912c9cb9ee5</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Dell Technologies is a multinational tech company based in the United States. Founded by Michael Dell in 1984, the company develops, sells, and supports computers and related technology products. Its portfolio includes cloud services, data storage, networking, and software, among other offerings. Dell is one of the largest technology companies in the world, renowned for its innovations in supply chain and electronic commerce.</i><br />Target victim <b>website</b>: <i>www.dell.com</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Thomas-Bennett--Hunter</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24624</link>
<guid>432f8237bc52bc0892172e3b01991fe2</guid>
<pubDate>Mon, 21 Jul 2025 13:54:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Thomas-Bennett--Hunter</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1fb0a3176a51ca7693c66e06d7de8134a483c1b641bd02314a4c00d80a792b05</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Thomas Bennett & Hunter is a construction company based in Westminster, Maryland, USA. Founded in 1914, the firm specializes in providing ready-mixed concrete, paving, and infrastructure solutions for various projects. The company operates several concrete plants and maintains its own fleet of mixer trucks. It caters to commercial, residential, industrial, and governmental construction projects.</i><br />Target victim <b>website</b>: <i>www.tbhconcrete.com</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kentfield-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24611</link>
<guid>bd8ccf7a72b695c2392b5adaf3e78a58</guid>
<pubDate>Mon, 21 Jul 2025 13:53:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Kentfield-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7acb6da832450b6b583215eea3920c127f87e3dd0a17cc16ee01681281d5b3ab</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Kentfield Hospital is a long-term acute care and rehabilitation facility providing specialized care for patients recovering from serious illnesses, surgeries, and injuries. This includes treatment for conditions such as strokes, spinal cord and brain injuries, and respiratory and cardiac diseases. The hospital has locations in San Francisco and San Rafael in the U.S. state of California.</i><br />Target victim <b>website</b>: <i>www.kentfieldhospital.com</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Greeniverse</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24596</link>
<guid>d30710eda505b38e92b01617a4702d80</guid>
<pubDate>Sat, 19 Jul 2025 18:28:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Greeniverse</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>306034827e6f9a28ae2a92736ddcfd6af2fe8ffeca276ca3c3f97ca272a722c7</i><br /><br />Threat actor <b>description</b>: <i>Greeniverse is a leading solar system company that assists to design and install a solar system to meet the needs of homes and businesses.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>erniesinceresco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24595</link>
<guid>70b508afd336fb9317ab2736cd128e1d</guid>
<pubDate>Fri, 18 Jul 2025 22:58:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>erniesinceresco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a95ac242f738bb3f7a663d2be95c5bcacdc671c0179543e904ae8145b759c08</i><br /><br />Threat actor <b>description</b>: <i>We offer a wide selection of furniture, mattresses, flooring, appliances and electronics from the most popular brands. Come and visit us today! See our exclusive selection on Ashley, Smith Brothers,England, Flexsteel, Sealy, Tempur-pedic, Beautyrest, Serta, Liberty, La-Z-Boy, Hunter Douglas Window Fashions, LEES, Karastan, Whirlpool, GE, Samsung, Sony, Kinetico water systems and much more! © 2017 Ernie's Store Inc. All Right Reserved. Website powered & designed by Tailbase. Prices, configurations, promotions, and in-store availability may change without notice. All product photos are for illustrative purposes only. Photos displayed on website may contain optional items that are not included in the default configuration for that system. Actual Furniture may vary in design. Employees: 88 Industry: Retail Downloaded: +30GB Phone Number:(402) 665-3151 </i><br />Target victim <b>website</b>: <i>erniesinceresco.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Anderson--Karrenberg</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24594</link>
<guid>022823b8aa03cffdb1189da300c18b25</guid>
<pubDate>Fri, 18 Jul 2025 20:47:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Anderson--Karrenberg</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1cd82a6550762b97f9354ee22c05fabcb6f67e3f6062bd3bf6951c4f691d6111</i><br /><br />Threat actor <b>description</b>: <i>Anderson & Karrenberg is a law firm that focuses on representing its clients' interests and achieving results for them. The firm uses its collective knowledge and experience to provide legal services. The firm serves clients who expect high standards and results. The firm is based in Salt Lake City, Utah.</i><br />Target victim <b>website</b>: <i>aklawfirm.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>CB-Quality-Machining--Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24593</link>
<guid>d6ed7418057a4f121f9423f936767a3e</guid>
<pubDate>Fri, 18 Jul 2025 20:46:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>CB-Quality-Machining--Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ae2b15939433a55418076c1a6d66df4d31c48a22bfc95c44bbe7fce50df54e4</i><br /><br />Threat actor <b>description</b>: <i>CB Machining & Engineering specializes in providing contract manufacturing services, including contract milling, turning, assembly, and supply chain management. Located in Buffalo, Minnesota, the company serves customers in industries such as aerospace, defense, medical, and energy.</i><br />Target victim <b>website</b>: <i>cbmachining.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Peabody-MA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24592</link>
<guid>f4d14394131f4d839de58f4e37150de6</guid>
<pubDate>Fri, 18 Jul 2025 20:45:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>City-of-Peabody-MA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34bc7068804477d5c17bcc1407dfc2d0b7e02102e82cc24abbe1cdca7e93a82d</i><br /><br />Threat actor <b>description</b>: <i>CB Machining & Engineering specializes in providing contract manufacturing services, including contract milling, turning, assembly, and supply chain management. Located in Buffalo, Minnesota, the company serves customers in industries such as aerospace, defense, medical, and energy.</i><br />Target victim <b>website</b>: <i>https:peabody-ma.gov</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Burnham-Nationwide</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24583</link>
<guid>381476ddd3f32431fcab00d7cc68d791</guid>
<pubDate>Fri, 18 Jul 2025 16:32:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Burnham-Nationwide</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f5c3b6b2a11c0026fb5fdef2f5f9b40c5ce238b09cf1b07754ba096ed87a627</i><br /><br />Threat actor <b>description</b>: <i>20</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sensical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24584</link>
<guid>d60aef7f82617ea585bb8b57bbe57732</guid>
<pubDate>Fri, 18 Jul 2025 16:32:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Sensical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f4698e7059e92848a8bf262a74911f588b3f0dddd282791d410bf6a56ea0ce55</i><br /><br />Threat actor <b>description</b>: <i>20</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ritenour-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24578</link>
<guid>c5020a0ea9c329b35bbf2eae076dd0aa</guid>
<pubDate>Fri, 18 Jul 2025 14:32:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Ritenour-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e14f9c4b782c6a0cc9b7a7c1053f4f08b6413a4232c3af56d536e56444487f3c</i><br /><br />Threat actor <b>description</b>: <i>The Ritenour School District, located in Northwest St. Louis County, is one of the oldest districts in the metropolitan area. They have grown from that one room cabin into 10 schools, an early childhood center and a large adult community prog            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Souleret-EngineeringLSSE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24585</link>
<guid>c9ce4c2325ee078ee17e3a108180fe1f</guid>
<pubDate>Fri, 18 Jul 2025 12:21:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Souleret-EngineeringLSSE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bfb84926a5bc3cc9df4a7461927b79410f7913a3f146627b053fbc563667c7be</i><br /><br />Threat actor <b>description</b>: <i>Lennon, Smith, Souleret Engineering, Inc. is a civil engineering 
and surveying company, serving various markets including municipa
l, commercial, industrial, residential, utilities, and energy sec
tors.

We are ready to upload more than 14 GB of corporate documents. Lo
ts of contracts and agreements, documents with personal informati
on, project documents, financial files, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Home-Solutions-of-Iowa</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24576</link>
<guid>7f2bbe4bef9df4c8b49a5603e31b0022</guid>
<pubDate>Fri, 18 Jul 2025 04:34:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Home-Solutions-of-Iowa</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e4b9246f303b77277fddd846120b15abfcfe96a41ecdedae6c20ded3bc3ff973</i><br /><br />Threat actor <b>description</b>: <i>Home Solutions of Iowa is a comprehensive exterior remodeling company that specializes in offering high-quality LeafGuard® gutters, roofing solutions, and insul...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>GreenVest</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24567</link>
<guid>f59db0df527cd9bc7b7d71b6e35ee6d7</guid>
<pubDate>Thu, 17 Jul 2025 12:42:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>GreenVest</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2132dffddf5d49b14cf8f626887cb8b2d5322c0086c85e85972918d92d5ce470</i><br /><br />Threat actor <b>description</b>: <i>GreenVest is an environmental development and consulting firm, sp
ecializing in ecological restoration, mitigations services and su
stainable land planning.

We are ready to upload more than 7 GB of corporate documents. Fin
ancial data, projects, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Goldberg--Osborne</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24566</link>
<guid>fe56468d0a4575b7aa9eca5f72a60ae4</guid>
<pubDate>Thu, 17 Jul 2025 12:42:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Goldberg--Osborne</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eaa46bbe4d56624145b9d885d3f2d0d9f99db0fdeac55159b2e148019120fa4a</i><br /><br />Threat actor <b>description</b>: <i>Goldberg & Osborne attorneys provide comprehensive legal services
for Plaintiff injury victims.

We are ready to upload more than 150 GB of essential corporate do
cuments. You will find personal docs of all their clients (more t
han 200 ppl), passports, medical records, DLs and so on, financia
l data, NDAs, court documents, protocols, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vitec</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24561</link>
<guid>cae120afc9fda7ccb696a5510ddd45ea</guid>
<pubDate>Thu, 17 Jul 2025 10:20:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Vitec</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c595eeddc348bc1ef169a0ae2933f257420d48dc2d12250d9cd6f3d3bd5c8eb7</i><br /><br />Threat actor <b>description</b>: <i>VITEC's suite of contact center solutions can help you optimize customer satisfaction, service, training, and improve the overall experience of your center.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>lawforpersonalinjury.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24559</link>
<guid>64744829a161fdb5d0fb42af83c627cd</guid>
<pubDate>Thu, 17 Jul 2025 08:32:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>lawforpersonalinjury.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19fec5592d0636c5313af1b86c962ea1874999e11cec224907d4b8e3f5268523</i><br /><br />Threat actor <b>description</b>: <i>Prince & Schmidt Personal Injury Lawyers specializes in personal injury law, representing clients in cases such as medical malpractice, vehicle accidents, civil rights violations, and premises liability. Based in Santa Fe, NM, the firm serves            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ashland.k12.ma.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24557</link>
<guid>0b6cf75f58aca50278bdcfc9c46576f4</guid>
<pubDate>Wed, 16 Jul 2025 21:52:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>ashland.k12.ma.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>90acff064a79a2068643d0e7d5f8122b880eddc5d6d63f907b1afdf79179edc9</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>ashland.k12.ma.us</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>GreenLight-Biosciences</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24552</link>
<guid>da7959e6f2817d4a557c3ae995265eea</guid>
<pubDate>Wed, 16 Jul 2025 21:27:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>GreenLight-Biosciences</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26c3abf1108e96fa60265a407ec13ea58b801c15f6a3e2805c37843b870f5d51</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2008, GreenLight Bioscience is a pre-commercial stage synthetic biology company with a proprietary cell-free ribonucleic acid (RNA) production platform for the discovery, development and commercialization of high-performing products. The company is based in Medford, Massachusetts.</i><br />Target victim <b>website</b>: <i>greenlightbiosciences.com</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>Allstarmg</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24549</link>
<guid>34e7699f0f909a1ca5bdee2d9cdd626c</guid>
<pubDate>Wed, 16 Jul 2025 21:26:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Allstarmg</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22980d8c2215544bcce9f137f013394a29ff25059a672bf40c39ff47be93d38e</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1999, Allstar Marketing Group is a Performance Marketing company that has been directly responsible for some of the most successful consumer products in history. Allstar works with brands who are on the precipice of becoming a household name, but are unable to market and distribute to retail at a larger scale.</i><br />Target victim <b>website</b>: <i>allstarmg.com</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>Helpsonv</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24548</link>
<guid>6dc5e880d0cbf7b811e5083f7242b044</guid>
<pubDate>Wed, 16 Jul 2025 21:25:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Helpsonv</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6e9b184652519a678b6d9d64d64dbdde7960be6a2ff258266c38a667adbb720f</i><br /><br />Threat actor <b>description</b>: <i>HELP of Southern Nevada provides assistance to families and individuals in overcoming barriers to self-sufficiency through various direct services, training, and referrals to community resources. Their offerings include adult and family housing programs, behavioral health services, and a diaper bank, among others.</i><br />Target victim <b>website</b>: <i>helpsonv.org</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>C3-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24535</link>
<guid>6080b4a414292cce8d1c1b197708fefb</guid>
<pubDate>Wed, 16 Jul 2025 19:31:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>C3-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7062a7acf1c9f6f78c78c23ce9f220fe330cdb931315d05d9d2ae79a641935da</i><br /><br />Threat actor <b>description</b>: <i>C3 Group is a large, well-established engineering company offering a wide range of services, from restoration and industrial injection to water treatment and geotechnical projects.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Joni-L-Janecki--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24532</link>
<guid>eb28374f4802e292833308d4ce74b69f</guid>
<pubDate>Wed, 16 Jul 2025 16:33:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Joni-L-Janecki--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04ea87b9a6da8d6e150c8cfa9f9055baab367df5c81b81102a58074ddc2a1394</i><br /><br />Threat actor <b>description</b>: <i>Joni L. Janecki & Associates has been designing ecologically restorative and award-winning outdoor environments for over 30 years, fostering connections to natu...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Waverly-Cabinets</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24533</link>
<guid>c8f37e5d946dd3d2c1fdb4c9e0bf7b27</guid>
<pubDate>Wed, 16 Jul 2025 16:33:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Waverly-Cabinets</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>01c57a2c3446f8a5e730056785ba9f8f20492842a1e39bd1e3e5017b51b72d8d</i><br /><br />Threat actor <b>description</b>: <i>Waverly Cabinets specializes in providing affordable, high-quality Ready-To-Assemble (RTA) cabinets and related products, including vanities and flooring. Their...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Burnett-and-Son-Meat</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24534</link>
<guid>ab842558180de2e1578442390863f022</guid>
<pubDate>Wed, 16 Jul 2025 16:33:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Burnett-and-Son-Meat</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ca1978c561ca8ed9f309132549d303ea673fe84bed58b7d704c364278f59fdf</i><br /><br />Threat actor <b>description</b>: <i>Burnett and Son Meat Company develops ready-to-eat microwaveable meats and meals using a unique blend of culinary proficiency, food trend knowledge, food scienc...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Artemis-Healthcare-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24536</link>
<guid>1cfcf0911a356ff7dec8682d2c5cdbaa</guid>
<pubDate>Wed, 16 Jul 2025 16:28:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>crypto24</b> claims attack for <b>Artemis-Healthcare-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>463b995eab333e97fa1fd460a7f7badaefa623b593f30648c556986b6e60a320</i><br /><br />Threat actor <b>description</b>: <i>It contains sensitive personal data, including medical records, official documents, and imaging files of millions of patients, as well as various databases.</i><br />Target victim <b>website</b>: <i>www.arianadx.com</i>]]></description>
<category>crypto24</category>
</item>
<item xmlns:dc='ns:1'>
<title>Morrison-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24545</link>
<guid>36c21b6db36f2c7f7791373c93ca8d20</guid>
<pubDate>Wed, 16 Jul 2025 15:36:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Morrison-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>64f0d388711bf03c6e6c031c1b8277f4be849ce724d2cb292217d1454860b281</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.morrison-usa.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>IMSSA-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24544</link>
<guid>845561665f33c461be03db0a1aeddf76</guid>
<pubDate>Wed, 16 Jul 2025 15:35:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>IMSSA-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42a8d499347d949096f1a5667b4204aeb94579eec2a457cd336ff0cdb7b8eed0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.imssa1.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Title-XI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24542</link>
<guid>b9b30a509250079ed5b2b1773e829db0</guid>
<pubDate>Wed, 16 Jul 2025 13:17:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Title-XI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1250edff9e2a51429337726a55c30d00a7f3cf2891deb316a49b3167331da9c0</i><br /><br />Threat actor <b>description</b>: <i>Title XI Software Solutions is a software and support company sup
plying secure cloud based case management software as well as ele
ctronic discovery and litigation support to bankruptcy trustees, 
fiduciaries and professionals.

We are ready to upload more than 50 GB of essential corporate doc
uments. Huge amount of customer personal information (claims, fin
ancial statements, passport/DL/ssn scans and so on), employee inf
ormation, financial data, court documents, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>PEPRO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24543</link>
<guid>0aa2946c67f639237f396261b8a894ab</guid>
<pubDate>Wed, 16 Jul 2025 13:17:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>PEPRO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>94898a37c506949602b50048560b5b265c0fd2c5fabdb3c1dcbc35c7ea300ca9</i><br /><br />Threat actor <b>description</b>: <i>PEPRO LLC is a leading manufacturer specializing in patented EMP 
EMI shielded enclosure systems tailored for mission-critical and 
remote communication applications.

We are ready to upload more than 15 GB of essential corporate doc
uments. Employee personal documents, customer information, accoun
ting and financial data, agreements and contracts, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Specialty-Components</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24531</link>
<guid>f2ac7f02dacc8e59ec6cf110b4fe83ba</guid>
<pubDate>Wed, 16 Jul 2025 12:32:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Specialty-Components</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8f5800b28a0640786ca0d00d21cdf181f05d4b1222d0c52ad9a560801bc400f</i><br /><br />Threat actor <b>description</b>: <i>Specialty Components incorporated has over 30 years experience in designing and manufacturing precision air bearings for semiconductor manufacturing, machine components and metal optics.  Our standard product lines include linear, spherical a            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Halvorsen-Family-Law-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24525</link>
<guid>68be68a4c8ce0d9d97e5259a649ce6a4</guid>
<pubDate>Tue, 15 Jul 2025 23:33:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Halvorsen-Family-Law-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7e15d26b71d215e877b3a4d3b485bd73a2103559400195c457e823be948fbdaa</i><br /><br />Threat actor <b>description</b>: <i>At Halvorsen Family Law, we understand that family is everything. When legal issues arise, you need someone who cares about your family as much as you do.
We value our clients as we passionately represent them before, during, and even after             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Young-Adjustment-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24528</link>
<guid>5c7368d5679563a902701bf8b46575fc</guid>
<pubDate>Tue, 15 Jul 2025 22:50:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>moneymessage</b> claims attack for <b>Young-Adjustment-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aef056feacc55f6576f1b68061d893c6d8c3d2b3d6c33ff5e5f94362dbbb1b6f</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Young Adjustment Company is one of the leading independent insurance claims adjusters in the US. Established in 1927, the company offers comprehensive public adjusting services to businesses, homeowners, and governmental entities. Their professionals assist clients through the entire insurance claim process, ensuring the highest possible settlement. They handle claims related to property damage, fire, water damage, and more.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>moneymessage</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.pomerandboccia.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24527</link>
<guid>aa00b07e9b911a4cbf011a4c345819b1</guid>
<pubDate>Tue, 15 Jul 2025 21:17:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kraken</b> claims attack for <b>www.pomerandboccia.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a989e1e369b0e4b7d063ca50dd28737f14f4f1463ffc25cedf9decaf72380d8</i><br /><br />Threat actor <b>description</b>: <i>Pomer & Boccia has been in business since 1989 and operates a debt recovery division located in Woodbridge, Ontario near the int...</i><br />Target victim <b>website</b>: <i>www.pomerandboccia.com</i>]]></description>
<category>kraken</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-American-Funding</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24526</link>
<guid>0b0ec6cad67953b011ceb4e83e6b18e7</guid>
<pubDate>Tue, 15 Jul 2025 21:14:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>New-American-Funding</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2072bac9e643a1e6e82fe61579793af58de32ce8730a726d4a13c0b8338ebf44</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] New American Funding is a family-owned mortgage lender with a nationwide presence. Since its founding in 2003, the firm has been dedicated to helping Americans finance their homes. They offer a variety of loans including FHA, VA, HARP, and Conventional loans. The company is known for its efficient processes, exceptional service, innovative use of technology, and strong commitment to providing equal housing opportunities.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>WH-Rogers-Sheet-Metal</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24522</link>
<guid>850972b9b9e9e1d869107e2498745386</guid>
<pubDate>Tue, 15 Jul 2025 20:31:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>WH-Rogers-Sheet-Metal</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea36af9673a7f9087c09f8209923f9af065ded8b0f0f9c603674c652697032ce</i><br /><br />Threat actor <b>description</b>: <i>WH Rogers Sheet Metal has specialized in the custom fabrication of metal parts for over 50 years, serving the Carolinas with advanced computerized technologies. They offer services based on client designs or with assistance from their CAD dep            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Green-River</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24512</link>
<guid>9324bc62c6decea7edb29b0ab1269d72</guid>
<pubDate>Tue, 15 Jul 2025 19:33:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>City-of-Green-River</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b32a9df8e9773163ce152804193930c7296854bdc8b8a48b4bff0fcae7fd7b67</i><br /><br />Threat actor <b>description</b>: <i>The City of Green River, Utah providing information about community, recreation, events and government to visitors, the local community, employees, business, and government</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Paul-Wilkinson-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24514</link>
<guid>e9c1f3f42d92dc3d6f18596cb04e307f</guid>
<pubDate>Tue, 15 Jul 2025 18:33:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-Paul-Wilkinson-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>95a707b69be21f699078e1a382fcfd5ee2415a12537b4f9349f4e09c3d87c085</i><br /><br />Threat actor <b>description</b>: <i>The Paul Wilkinson Law Firm is a Denver-based personal injury law firm that specializes in helping victims of car, truck, motorcycle, and other motor vehicle accidents. Led by Paul Wilkinson, the firm provides legal representation to clients             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>MEDIALAB</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24524</link>
<guid>5ab1b34149fefd65f4d8029d5feb5b8c</guid>
<pubDate>Tue, 15 Jul 2025 16:50:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>MEDIALAB</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>35394f41f8a2d3d6771172f076db9a338c124eaaa39ebe6659f2b86f46d15c2f</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] MediaLab is a tech company that owns and operates a portfolio of leading digital brands, including Whisper, Kik, Datpiff, Worldstar Hip Hop, among others. Their brands serve over 60 million users every month. They focus on acquiring, investing in, and building sustainable, user-centric, data-driven, and mobile-first internet properties.</i><br />Target victim <b>website</b>: <i>medialab3dsolutions.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>ProActive-Solutions-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24510</link>
<guid>91a378e125753ad74b033e94c7b12706</guid>
<pubDate>Tue, 15 Jul 2025 16:31:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>ProActive-Solutions-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b38d58e06f48853e0261e68120eb2470bfd5c4a6368e179c86643f34834e236</i><br /><br />Threat actor <b>description</b>: <i>Based in Green Bay, Wis. ProActive Solutions USA, LLC is a privately held, ISO 9001 company that is a manufacturer of sanitizers, cleaning chemicals and herd health products for the farm and food industries. They are also a distributor of com            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cardinal-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24521</link>
<guid>ecab3a41264bb6ecc6a0ba7faec476fb</guid>
<pubDate>Tue, 15 Jul 2025 14:52:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Cardinal-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>110b864c949bfaaee966e88cb846418a28627360084216c6b2e8e9efae215bb2</i><br /><br />Threat actor <b>description</b>: <i>Cardinal Services Cardinal Services was established by Bud and Gail Freeman in Coos Bay, Oregon in 1984, and we've been helping local business owners and job seekers achieve marketplace success ever since.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Progressive-Auto-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24504</link>
<guid>0cb15d2da6aeb47c10fee170ae37ec89</guid>
<pubDate>Tue, 15 Jul 2025 13:31:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>Progressive-Auto-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8a3f9b1f253414903df19300654b1a0e40409573b141dc1cd0f101a6988027da</i><br /><br />Threat actor <b>description</b>: <i>Sale of new cars of famous brands: Chevrolet, Chrysler, Dodge, Jeep, Ram. Sale of used cars, budget cars. Service and repair. Registration of loans, leasing.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Colgin-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24518</link>
<guid>26dafde7993caa5c22711946e18316e9</guid>
<pubDate>Tue, 15 Jul 2025 13:18:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-Colgin-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2fc81a6c35257f7a77b24ad9f36e723af33560af6c3831c5e4a3912e6588fcf7</i><br /><br />Threat actor <b>description</b>: <i>Colgin offers authentic liquid smoke sauces, bringing the true Te
xas smokehouse flavor to its clients. The company provides eight 
bold flavors including hickory, mesquite, pecan, and apple.

We are going to upload company data soon. Clients files, contract
s, agreements and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Culvers-Lawn--Landscape-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24493</link>
<guid>40098d4af08a53198bca329e718d901d</guid>
<pubDate>Mon, 14 Jul 2025 21:32:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Culvers-Lawn--Landscape-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d59c615d5285e26c630cdc58cf2487ab3b26dab673b53aadc312f15486d278c2</i><br /><br />Threat actor <b>description</b>: <i>Culver’s Lawn & Landscape began in 1982, when entrepreneur Todd Culver started a lawn mowing business at the age of 12 in Dallas, Texas. Originally from Iowa, Todd moved back to Cedar Rapids in 1984 where he continued his lawn & landscaping            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>inspiredbeauty.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24498</link>
<guid>79bfd663e0be2a5171a183b3356ec9a3</guid>
<pubDate>Mon, 14 Jul 2025 17:53:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>inspiredbeauty.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e03d40b97a526650ecd8cc254992256bd169bb91fdc65f2e08b407cdde0d0fde</i><br /><br />Threat actor <b>description</b>: <i>USA - www.inspiredbeauty.com</i><br />Target victim <b>website</b>: <i>inspiredbeauty.com</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>loraincountyauditor.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24494</link>
<guid>233d73b48e58f468c7ba79c07a84cbca</guid>
<pubDate>Mon, 14 Jul 2025 15:47:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>global</b> claims attack for <b>loraincountyauditor.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fbcf43dfb394ba8372efd9daf5eed4305881b24430d8a17949f38e7f32ea3848</i><br /><br />Threat actor <b>description</b>: <i>Lots of private information. Bank accounts and more.</i><br />Target victim <b>website</b>: <i>loraincountyauditor.gov</i>]]></description>
<category>global</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hulberg--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24497</link>
<guid>46d5c1db68612dea4b66fcd011a313e0</guid>
<pubDate>Mon, 14 Jul 2025 15:21:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Hulberg--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5daa2e9d0820ea6781af9a4e8bcd01d3aa4503d5e2404d45d31484c9adfb8c7c</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.hulberg.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rockrose-Development</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24496</link>
<guid>f24f568a412be9ac8614ed1cd7e90e2f</guid>
<pubDate>Mon, 14 Jul 2025 15:21:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Rockrose-Development</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8f7e3eac7ee1d7a1fd9534522a0829c3e7baf1340e2b54a1c66b2863c41e9151</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.rockrose.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Belk</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24491</link>
<guid>d210a16321048afb41103cccd097d9eb</guid>
<pubDate>Mon, 14 Jul 2025 14:31:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Belk</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7d09a001b017c739f238c2853b483d1a36169c5fb93a80c886b3419fa754413</i><br /><br />Threat actor <b>description</b>: <i>Headquartered in Monroe, North Carolina, Belk is a department store that offers apparel, shoes, accessories, cosmetics, home furnishings and wedding registry on...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>National-Institute-of-Water-Resources</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24490</link>
<guid>8d68054999f057b3eded106aa379bec9</guid>
<pubDate>Mon, 14 Jul 2025 01:20:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>National-Institute-of-Water-Resources</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>66c19c8f1be229e7a90b50d079d7676e8134a20de3b4a62641dd51d13ac75fda</i><br /><br />Threat actor <b>description</b>: <i>The National Institute of Hydraulic Resources (INDRHI) is the entity responsible for conserving and efficiently using water resources.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>pinnacle-Roofing-and-Exteriors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24479</link>
<guid>589ea909454046646ff91c5ecac646ea</guid>
<pubDate>Sun, 13 Jul 2025 14:52:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>pinnacle-Roofing-and-Exteriors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2eec9f532e9b14c4ccad2ef06407fa36cca4474d61f5867ef0b7463113a124a8</i><br /><br />Threat actor <b>description</b>: <i>Pinnacle Roofing and Exteriors, Inc. is a roofing and exteriors company located in Charlotte, NC, specializing in a variety of roofing solutions including metal, slate, and traditional shingles, as well as gutter services and custom metal fab            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>North-Country-HealthCare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24478</link>
<guid>a633795cebee6473d1aae96d5a28df15</guid>
<pubDate>Sun, 13 Jul 2025 07:35:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>North-Country-HealthCare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4840ace8be3b5f669827fd48aadd6257c7d13bf62613b756227acc2582fb846</i><br /><br />Threat actor <b>description</b>: <i>Health information for 600,000 patients has been accessed from the North Country Health (NCH) care</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dansoft</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24476</link>
<guid>396bfe5c1ae70eab245ac40824b412ec</guid>
<pubDate>Sun, 13 Jul 2025 00:01:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>Dansoft</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3445675f2cb7a71d2e2157fc8c21cee25393d44757f133c40593c5a333431b66</i><br /><br />Threat actor <b>description</b>: <i>Dansoft, established in 1989, originally focused on defense projects but shifted to develop ERP and enterprise software systems across various industries. The company offers IT executive, cloud hosting...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>Intercommunityct.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24465</link>
<guid>8d7c30cf7b10b49f854c2a295a5c9413</guid>
<pubDate>Sat, 12 Jul 2025 10:35:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>teamxxx</b> claims attack for <b>Intercommunityct.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb0b5a390a85c2f8b21cffd75bc7ae694a9a34b49eadf2c0158a139124ce1f19</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Intercommunityct.org is associated with InterCommunity Inc., a community-based health organization in Connecticut that caters to the needs of local residents. The organization provides a range of comprehensive, high-quality, and easily accessible health services including mental health and addiction services, primary care, recovery and wellness programs. They focus on supporting individuals and families in the community to achieve their fullest potential through these services.</i><br />Target victim <b>website</b>: <i>Intercommunityct.org</i>]]></description>
<category>teamxxx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tulsat</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24463</link>
<guid>eee75242a3b87751a71bfb6ebce5cad0</guid>
<pubDate>Sat, 12 Jul 2025 10:18:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Tulsat</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ff5172dd22782f520abb7d1464c7e33e8608830687c1c1bce77d564738018a4</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.tulsat.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>EIA-Global</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24470</link>
<guid>37b47bc2fe01ddcb1c4673a4419c7e13</guid>
<pubDate>Sat, 12 Jul 2025 09:59:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>EIA-Global</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1054456834f97494aed90000c66e5e2d50b4cbf65f2d8e447764459a5e8ed99</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.eia-global.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>CyberlinkASP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24469</link>
<guid>cd53dd33e57a598301a7c1c07e35a8d6</guid>
<pubDate>Sat, 12 Jul 2025 09:58:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>CyberlinkASP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe3455b4bc63d55447a7ea9a092ec2f9ff770f99dcf1de4f88fcb9828ed033f1</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.cyberlinkasp.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>FormWood-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24468</link>
<guid>73a3d9df0329c89f402ea26d5fd86da8</guid>
<pubDate>Sat, 12 Jul 2025 09:57:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>FormWood-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>716290def340221c78efa3d965514459c60604a435fdbda9e4421d4d7ba1ca0c</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.formwood.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>k12albemarle.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24471</link>
<guid>07246f1add4748b2c3c031e2ec9262e0</guid>
<pubDate>Sat, 12 Jul 2025 09:25:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>k12albemarle.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>50d4b61791fb3ce5bb2a796b40868c1a66dee26876831256dea9c44fe293fec6</i><br /><br />Threat actor <b>description</b>: <i>Working together as a team, we will end the predictive value of race, class, gender, and special capacities for our childrens success through high quality teaching and learning for all. We seek to build relationships with families and communities to ensure that every student succeeds. We will know every student. Working together as a team, we will end the predictive value of race, class, gender, and special capacities for our childrens success through high quality teaching and learning for all. We seek to build relationships with families and communities to ensure that every student succeeds. We will know every student. Working together as a team, we will end the predictive value of race, class, gender, and special capacities for our childrens success through high quality teaching and learning for all. We seek to build relationships with families and communities to ensure that every student succeeds. Employees: 1,339 Industry: Education Downloaded: 229GB Phone Number:(434) 972-4001</i><br />Target victim <b>website</b>: <i>k12albemarle.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Genesis-Billing-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24460</link>
<guid>d6139184e17e1909941ebb7bd7e4793d</guid>
<pubDate>Sat, 12 Jul 2025 04:53:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Genesis-Billing-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb3972f523403f65dcb5542665fbfc3297351592cd58165a5a9eeb360d008b46</i><br /><br />Threat actor <b>description</b>: <i>Genesis Pathology Billing Service specializes in pathology billing, offering robust software solutions designed to optimize financial outcomes for pathology groups and labs.We are ready to upload 3 GB of corporate documents. Lots of clients financial files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wegley-Higginbotham--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24461</link>
<guid>f5733e3aa5817cf1e0efbc00fee0133b</guid>
<pubDate>Sat, 12 Jul 2025 04:53:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Wegley-Higginbotham--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca04ee174aa58ce77452b24495681a68178a46ea1a75dab6f8e8e2d44762b941</i><br /><br />Threat actor <b>description</b>: <i>Wegley, Higginbotham & Associates PLC is a firm of certified public accountants dedicated to providing superior client service. They offer a variety of professional services and resources aimed at assisting their valued clients.We are ready to upload 8 GB of essential corporate documents. Clients and employees personal files, detailed financial data (payment details), NDAs, contracts and agreements, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Darien-Telephone</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24458</link>
<guid>a6796dbc0e26e42775f1ab72b9fa1b3b</guid>
<pubDate>Fri, 11 Jul 2025 20:31:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Darien-Telephone</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dde834a1e25dcb8e6d70a120d0f9e978c051ba2eea9638a5c19b14cbf2debb34</i><br /><br />Threat actor <b>description</b>: <i>Darien Telephone Company is a family-owned independent communications provider that offers high-speed internet, telephone, and cable services. They cater to both residential and business customers with a focus on rural community needs. Their             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.intereum.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24456</link>
<guid>a2d336f869edef8188482ec691bb0a8d</guid>
<pubDate>Fri, 11 Jul 2025 16:32:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.intereum.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1d63e8205b53a5dba5320261f7428a159a9eb84106c0c05230caad641e2e753</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1980, Intereum is a provider of furniture, audio and visual solutions, and wall systems. Intereum products and services include modular walls, audiovisual integration, and space planning for the corporate, healthcare, education, an            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>fuld.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24454</link>
<guid>0af03ed6bc08aa81017a8453e36cdfa9</guid>
<pubDate>Fri, 11 Jul 2025 15:34:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>fuld.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5003d38264d99c5420df4d8c683579ea088286d6eaaf272a4fb141bd85557a87</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1978 and headquartered in Boston, Massachusetts, Fuld + Company LLC is in the practice of Financial research, Analytics and Competitive intelligence to support competitive strategyhelping executives understand the intricacies of th            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Keene-NH</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24453</link>
<guid>660724e3d5d5352745be10a2b89a1f84</guid>
<pubDate>Fri, 11 Jul 2025 12:31:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>City-of-Keene-NH</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ae2017b456582c4847d591ad2ad681dbc8c74bcf8abbd039f6ca02b7ccf748c</i><br /><br />Threat actor <b>description</b>: <i>Keene is a city in Cheshire County, New Hampshire, United States. The population was 23,409 at the 2010 census. It is the seat of Cheshire County. Keene is home...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Websterhenry.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24455</link>
<guid>b290a635641f585b3dd6b95fd42dc267</guid>
<pubDate>Fri, 11 Jul 2025 07:52:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>teamxxx</b> claims attack for <b>Websterhenry.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b604abbc55536512eb266f47a50dcf0aa0c1775c82f9c78e3040d9fe5bd31ee1</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>Websterhenry.com</i>]]></description>
<category>teamxxx</category>
</item>
<item xmlns:dc='ns:1'>
<title>PACIFIC-BIOLABS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24445</link>
<guid>d63cc273ce120d9294c13a73a8aac01a</guid>
<pubDate>Thu, 10 Jul 2025 21:35:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>PACIFIC-BIOLABS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>27f2fd79a00726c6e2c7aa8224a01a5956ae30d77bd3371f9501ea49aced1ed6</i><br /><br />Threat actor <b>description</b>: <i>3</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>Accu-Reference-Medical-Lab</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24442</link>
<guid>783efccaaa732b206beec7bf11885866</guid>
<pubDate>Thu, 10 Jul 2025 19:32:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Accu-Reference-Medical-Lab</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a03c86ebc434ab6c6b40d275bf0ca0f4c04a969d1a141bd86eaec8116e3ddb0</i><br /><br />Threat actor <b>description</b>: <i>About Accu Reference Medical Lab
Accu Reference is a state-of-the-art medical testing laboratory service that provides a complete range of tests for diagnosis, screening or evaluation of diseases and health conditions. We are certified under            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>brennytransportation.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24448</link>
<guid>0c2bbe26550a66bdd0d4e74673f058aa</guid>
<pubDate>Thu, 10 Jul 2025 18:58:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>brennytransportation.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>648dd632798dee59040d232698a5b16d850ab5e19eb5e36437981af44b5edc59</i><br /><br />Threat actor <b>description</b>: <i>Brenny Transportation, headquartered in Central Minnesota, is a premier transportation and logistics company specializing in the safe and efficient delivery of goods to businesses and individuals across the nation. They offer a wide range of services, including long-haul trucking, last-mile delivery, and logistical solutions tailored to the unique needs of their clients. The company serves various customers, from manufacturers and distributors to retailers and individuals, and is dedicated to providing reliable, timely, and cost-effective transportation services. With a focus on grand champion customer service and a commitment to safety, Brenny Transportation is well-equipped to handle all transportation challenges Employees: 73 Revenue:$18.3 Million Industry: Transportation Downloaded: 45GB Phone Number:(320) 363-6999</i><br />Target victim <b>website</b>: <i>brennytransportation.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>bayviewci.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24450</link>
<guid>271117ee875c80c7e9e912c23b6469a4</guid>
<pubDate>Thu, 10 Jul 2025 18:56:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>bayviewci.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>421847052a3d8156ff08806fde69664fdb0814268dd8fc3a8776a7cec3748521</i><br /><br />Threat actor <b>description</b>: <i>The Bayview Hunters Point Foundation empowers the community through various education and health initiatives, focusing on social justice and community health services. Established in 1971, it addresses critical issues such as behavioral health, homelessness, housing, food insecurity, and incarceration reintegration. The foundation primarily serves multicultural disadvantaged individuals and families in San Francisco, promoting healing, empowerment, and justice. With a dedicated approach, the organization aims to provide dignity and fulfillment to its clients and the broader community. Employees: 58 Revenue:$5 Million Industry:Medical Downloaded: 15GB Phone Number:(415) 468-5100</i><br />Target victim <b>website</b>: <i>bayviewci.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>communitycareresources.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24451</link>
<guid>cd49f7f7616e5661b97901dc688b4385</guid>
<pubDate>Thu, 10 Jul 2025 18:55:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>communitycareresources.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca90e9d4856b7ff513a953650b79965d12125f999993190a070861ae8803687e</i><br /><br />Threat actor <b>description</b>: <i>Community Care Resources (CCR) Wisconsin is a private foster care agency dedicated to providing hope and healing for children in the foster care system. They support families across Wisconsin by educating, training, and licensing foster parents to care for children, including sibling groups, with trauma histories. The agency emphasizes trauma-informed care and offers comprehensive 24/7 support services to foster families. CCR Wisconsin aims to match hundreds of children in need with loving foster homes, ensuring that children from various backgrounds feel safe and loved. Employees: 33 Revenue:$5 Million Industry:Non-Profit Downloaded: 12GB Phone Number:(800) 799-0450</i><br />Target victim <b>website</b>: <i>communitycareresources.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>SPANN-Roofing--Sheet-Metal</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24446</link>
<guid>0447abe5b3fbb484f70517e8a1091b4e</guid>
<pubDate>Thu, 10 Jul 2025 15:46:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>SPANN-Roofing--Sheet-Metal</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ea8a8c1b85684c9037098457aa7cbab9f190c9f7f9a480aad4d542a954ee685</i><br /><br />Threat actor <b>description</b>: <i>Spann Roofing & Sheet Metal is a provider of installation, mainte
nance and repair services for commercial, industrial, institution
al and residential roofing systems in the eastern sections of Nor
th and South Carolina. 

We are going to upload data of this company. Complete data of all
the employees (DOB, SSN, address, phone, email, driver license a
nd so on), agreements, detailed financial data, customer data, et
c.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.georgeallenconstruction.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24443</link>
<guid>2d8b6c92b659a90e7ef716f811d8bba1</guid>
<pubDate>Thu, 10 Jul 2025 14:28:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kraken</b> claims attack for <b>www.georgeallenconstruction.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c30ec4f8c7aa4eb61b912d08526b9123fff9d9d3e65a6d6b4436f94e8769b64c</i><br /><br />Threat actor <b>description</b>: <i>George Allen Construction specializes in providing innovative solutions for railroad construction projects, 
catering to the un...</i><br />Target victim <b>website</b>: <i>www.georgeallenconstruction.com</i>]]></description>
<category>kraken</category>
</item>
<item xmlns:dc='ns:1'>
<title>Computer-Ingenuity-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24436</link>
<guid>77b7032b2e237ae78e3c520b9a0fd5fa</guid>
<pubDate>Wed, 09 Jul 2025 22:13:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>Computer-Ingenuity-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5765167a5cf3b1424bec4618949f31c3f1816485ff82669a9126f933bf9bb0ab</i><br /><br />Threat actor <b>description</b>: <i>CIA Solutions are hotel consultants who specialize in software designed to help owners and operators manage profit, labor, budgets, and forecasts effectively. Their innovative solutions...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mack-Energy-Corp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24429</link>
<guid>6991aa40ef4b66fb372bd171ba9ad7f2</guid>
<pubDate>Wed, 09 Jul 2025 21:31:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Mack-Energy-Corp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df0f37da3c11e587314df8eb563741cae362e4db5791963f7419ddae3f995855</i><br /><br />Threat actor <b>description</b>: <i>28</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>Microf</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24430</link>
<guid>e0eda8d7f3e989da400a82781def8eac</guid>
<pubDate>Wed, 09 Jul 2025 21:30:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Microf</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa43e7182fd05256efae1bf4130fb38f6a496af4ff6b1d9f54976d2f81643de6</i><br /><br />Threat actor <b>description</b>: <i>Microf specializes in HVAC and water heater financing solutions with lease-to-own options, particularly catering to homeowners with challenged credit. The company offers a simple application process, quick approvals, and flexible payment plan            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>PPC-Mechanical-Seals</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24431</link>
<guid>021abae3121d08e68ec099d8a2a7531d</guid>
<pubDate>Wed, 09 Jul 2025 21:30:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>PPC-Mechanical-Seals</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cfb3a652933c4302ee09c69418939337b61a97301c0a5071d9d103b70e0e06b9</i><br /><br />Threat actor <b>description</b>: <i>PPC Mechanical Seals was founded in 1958 in Baton Rouge, Louisiana and was one of the first mechanical seal companies to provide repair service on all types of ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Emphail.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24433</link>
<guid>4ab7331b2a992a4c4fa54280bc7b50de</guid>
<pubDate>Wed, 09 Jul 2025 16:47:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>global</b> claims attack for <b>Emphail.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29341d0c3f32f8521a6f65286a7c652ea2ab41c4b1b1d2bc869024fb73897514</i><br /><br />Threat actor <b>description</b>: <i>Unknown</i><br />Target victim <b>website</b>: <i>Emphail.com</i>]]></description>
<category>global</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ace-Wire-Spring--Form</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24424</link>
<guid>9628ca5c148265131af3b23839ff01e9</guid>
<pubDate>Wed, 09 Jul 2025 12:42:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Ace-Wire-Spring--Form</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4a27d9af75a1a4b896bab00f106ff7b0f88c0b02f6c951903ac608ea9e0f9e4</i><br /><br />Threat actor <b>description</b>: <i>Ace Wire Spring & Form Company, Inc. is a leading spring manufact
urer of Compression Springs, Extension Springs, Torsion Springs a
nd Wire Forms.

We will soon upload corporate data of the company. Lots of employ
ees (current and dismissed) files with personal information (addr
ess, DOB, SSN, passport), NDAs, detailed financial data, numerous
customers contracts and agreements, completed medical forms and 
so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stratascorp-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24425</link>
<guid>aa89c65eacea54244a447353ff659509</guid>
<pubDate>Wed, 09 Jul 2025 12:42:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Stratascorp-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>969034bef5f5f7df062fb23a30b7ababe1cc4d71b18f045fe2130bed83dea5d2</i><br /><br />Threat actor <b>description</b>: <i>StratasCorp is a global provider of information technology servic
es dedicated to meeting the federal government and defense sector
needs for land, sea, air, and space missions. 

We will soon upload corporate data of the company. There are 200 
scans of passports and drive licenses, other documents containin
g personal information, NDAs and other contracts and agreements.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Providence-Warwick-Convention</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24421</link>
<guid>f1ab4591a72bfca2da721ca61a6e9569</guid>
<pubDate>Wed, 09 Jul 2025 02:31:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>The-Providence-Warwick-Convention</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af0be3a4ad51e365c4f005fd7aa17e2ebd4b324484e9527ed17bd3141423a609</i><br /><br />Threat actor <b>description</b>: <i>Providence Warwick Convention & Visitors Bureau is a creative capital community....</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>UPG-Enterprises</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24419</link>
<guid>c12437a105d67a1e5fc09827346e2b49</guid>
<pubDate>Tue, 08 Jul 2025 20:20:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>direwolf</b> claims attack for <b>UPG-Enterprises</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d6c6190bc0ab083d3635d3ff0474dd39ac1479580d2b4d0583a973a3b6d6d43a</i><br /><br />Threat actor <b>description</b>: <i>UPG Enterprises is a privately held operator of industrial companies that focus on steel, lamination, rail products and metal-wares.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>direwolf</category>
</item>
<item xmlns:dc='ns:1'>
<title>snapav.com--resideo.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24414</link>
<guid>c933697660243185652bf51a75f9001a</guid>
<pubDate>Tue, 08 Jul 2025 19:24:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rebornvc</b> claims attack for <b>snapav.com--resideo.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5d102f4197ab00933920c8a5086d9ecb8ddc8041095e438ae5a630cf2de74e57</i><br /><br />Threat actor <b>description</b>: <i>Snap AV / Resideo has suffered a major data breach.
                    Despite multiple attempts to contact them to keep the incident private, they have chosen to ignore us.
                    They are now free to pay the price with their own reputation.
                    You are risking big fines from the Federal Trade Commission by not securing your data and that of your partners.
                    We have all your proprietary and confidential documents, private tests of your programs,
                    your drawings and surveillance schemes, private communications and much more. 
                    The whole set of documents is for sale!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rebornvc</category>
</item>
<item xmlns:dc='ns:1'>
<title>Milberg</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24407</link>
<guid>f0e74f09295841e202946abdc1829518</guid>
<pubDate>Tue, 08 Jul 2025 17:30:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Milberg</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e717e2d682dfbb82bd70ef74fa21d31b9b4da9d7c6599543216837a597f0d33f</i><br /><br />Threat actor <b>description</b>: <i>Site: milberg.com
														Industry: Law firm
														GEO: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wfmt</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24413</link>
<guid>9e04a739ebd144fa784a334e6365bdc1</guid>
<pubDate>Tue, 08 Jul 2025 17:17:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Wfmt</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81babda151686dad0891f17b799e18c115e2e593358ae5eead7f113332de32c5</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.wfmt.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wood-Patel--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24412</link>
<guid>a11bda17f8522e39a9bcf3cad3794341</guid>
<pubDate>Tue, 08 Jul 2025 17:17:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Wood-Patel--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c57b31990aebd17170854bfe95e9e463c6ed31ddd9a54cc7fb9d87c0f18220d0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.woodpatel.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tyree-Oil</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24411</link>
<guid>6b542509805b2618d880d79d813a51e9</guid>
<pubDate>Tue, 08 Jul 2025 17:16:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Tyree-Oil</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a60b04d7c3e6a3126425ca3b92ec98e6d82431dc21a0ee952637a08a0dd8788</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.tyreeoil.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Florida-Hand-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24410</link>
<guid>fd5323cdf77a30f8ccc4f468be401563</guid>
<pubDate>Tue, 08 Jul 2025 15:26:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Florida-Hand-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6579855d577d1bd828ec576e9862c069784c04baf0f1a9a165751ff1e019ce76</i><br /><br />Threat actor <b>description</b>: <i>Florida Hand Center Florida Hand Center specializes in non-surgical and minimally invasive treatments for hand, wrist, and elbow conditions, serving patients in Punta Gorda, Port Charlotte, and Fort Myers, Florida.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cahill-Seeds</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24371</link>
<guid>d62e62abe24dcaa94f9e1b3678477b51</guid>
<pubDate>Tue, 08 Jul 2025 00:31:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Cahill-Seeds</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>83445b4fec87f1a267bfd9ed14a9eab086a6c2c3625b01ac1ba297c45cd09476</i><br /><br />Threat actor <b>description</b>: <i>Cahill Seeds is one of the largest seed growers in eastern Montana, established in 1996. The company specializes in identifying, testing, and multiplying seed g...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>silverdalebc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24400</link>
<guid>c32ad30e23618c4355f0e46477e395c6</guid>
<pubDate>Mon, 07 Jul 2025 22:53:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>silverdalebc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0aee1c7f06e4b092fb8324173c09f05d769ebaed6d2787e2160e0553952ed9c0</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>silverdalebc.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>lowcostspayneuterindiana.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24398</link>
<guid>0ae0787e280680f966defdcfeff02553</guid>
<pubDate>Mon, 07 Jul 2025 22:51:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>lowcostspayneuterindiana.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81bed93c6c6a62c469079cd03779985d3ef7428a61d195e4e21389de7071b7e6</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] LowCostSpayNeuterIndiana.org is an organization based in Indiana that aims to control the pet population and reduce euthanasia rates by providing affordable spay and neuter services. They cater to cats, dogs, and feral cats, providing medical services like vaccinations, heartworm testing, and microchipping in addition to population control measures.</i><br />Target victim <b>website</b>: <i>lowcostspayneuterindiana.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>wmat.nsn.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24395</link>
<guid>cf6c7f1ee880bbf7d446252f8ee27959</guid>
<pubDate>Mon, 07 Jul 2025 22:48:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>wmat.nsn.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e8faabf6e3f63c6960d6a8e606e397729349e777a1a31f6b7ddc844816c5955</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>wmat.nsn.us</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>cascobay.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24394</link>
<guid>dbd3ccc6bb3d99345bc4854a3eeb014f</guid>
<pubDate>Mon, 07 Jul 2025 22:48:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>cascobay.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>493f5d2e56542e4a1601b033c079ad743d40606d2185e411a5eda7e75beee2af</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Casco Bay is a conservation organization based in Maine, United States. The primary aim of the company is to improve the water quality of the Casco Bay. They conduct research, advocate, and implement protective measures for combatting pollution. Their initiatives include Clean Water Act enforcement, green infrastructure promotion, education programs about pollution prevention, water quality monitoring, and baykeeping for Casco Bay.</i><br />Target victim <b>website</b>: <i>cascobay.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>profile-ind.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24393</link>
<guid>e7a493b9b2145a9a61cbd4a62c12b171</guid>
<pubDate>Mon, 07 Jul 2025 22:47:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>profile-ind.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f79d32dc5618aafc4cf9b3054f543f80b365b1ebb55cdcf3a80c9d4b3e0940c</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>profile-ind.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>relucent.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24392</link>
<guid>98be9e207e9bba228f761a4d6f203738</guid>
<pubDate>Mon, 07 Jul 2025 22:47:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>relucent.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dca7eb0d7230c81bf6a002a16663076aab430f6d6142edb8cd919845d4d80346</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>relucent.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>ppa-eng.com.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24390</link>
<guid>40d300970074f93e6a14657860750219</guid>
<pubDate>Mon, 07 Jul 2025 22:46:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>ppa-eng.com.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>931c3c5ce5ab9bb44c0bcb9c335a7e0f958ca5e168bd30e7b08f4c3aa564f7f4</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>ppa-eng.com.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Belmont-Engineered-Plastics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24377</link>
<guid>5f448492911af2123c1a32544b82f572</guid>
<pubDate>Mon, 07 Jul 2025 22:31:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Belmont-Engineered-Plastics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>092b404f36d518821bcae54bd973d4be7106610d908e2b96e1a64bda3563fad4</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Belmont Engineered Plastics is a manufacturing company located in Belmont, Michigan. It specializes in producing high-quality plastic products through injection molding, heavy gauge thermoforming and other complex processes. The firm caters to a wide range of industries, including automotive, medical, consumer products and more. In addition to manufacturing, they also provide design, engineering, and assembly services, ensuring a comprehensive solution for clients.</i><br />Target victim <b>website</b>: <i>beplastics.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gateway-Community</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24372</link>
<guid>24a13b72fc2a34c2eb4d78dfb243b712</guid>
<pubDate>Mon, 07 Jul 2025 22:19:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Gateway-Community</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f0d24b44f91da3cf5a5aa9ee55f3a8bc9b6a161cf876f13e6dbdd88f4a5c312</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Gateway Community, also known as Gateway Community Services, is a non-profit organization based in the U.S. Their mission is to provide comprehensive and effective services for individuals and families affected by addictive diseases, mental health disorders, and homelessness. They offer assistance through education, prevention, treatment, and housing programs.</i><br />Target victim <b>website</b>: <i>gatewaycommunity.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arch-Con-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24373</link>
<guid>293d736c1212c7c34e3bb276fb6f27e4</guid>
<pubDate>Mon, 07 Jul 2025 22:18:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Arch-Con-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a397cb0001778809c3c56f07a07385737ce53c9472e78cc91ef2d0f806caa41</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Arch-Con Corporation is a Texas-based general contractor offering construction services for multiple industries. Its expertise spans commercial, industrial, retail, healthcare, hospitality, community, and corporate interiors. Besides traditional construction services, Arch-Con offers pre-construction planning such as feasibility studies, value engineering options, and constructability reviews.</i><br />Target victim <b>website</b>: <i>arch-con.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>CR-Architecture--Design</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24375</link>
<guid>6e5abe0d4fa331e82877a04cc0ea52dd</guid>
<pubDate>Mon, 07 Jul 2025 22:16:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>CR-Architecture--Design</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>93fb7c59599da5ad755c3d7284d82fc8ac02730e2e7f0bbe9338be0924235302</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] CR Architecture + Design is a US-based company that specializes in providing architectural and design solutions. The firm delivers expertise across various sectors including housing, education, hospitality, and government. The team of architects, interior designers, and graphic designers work together, drawing on their different perspectives to create both functional and innovative spaces. They balance aesthetic concerns with practical requirements, ensuring successful project outcomes.</i><br />Target victim <b>website</b>: <i>cr-architects.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Institute-of-Culinary-Education</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24376</link>
<guid>63fe39fe847136db0711febec3c79d7e</guid>
<pubDate>Mon, 07 Jul 2025 22:16:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Institute-of-Culinary-Education</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>444cbc83db9b7426fb3d6206b65e5456e6db69954365371980138901aadca7c5</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] The Institute of Culinary Education (ICE) is a reputable culinary school based in New York City, USA. Founded in 1975, ICE offers a wide range of professional certificate programs in culinary arts, pastry & baking, hospitality management, and culinary technology, among others. The Institute is known for its modern facilities, experienced faculty, and strong industry connections.</i><br />Target victim <b>website</b>: <i>ice.edu</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crenshaw-Community-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24388</link>
<guid>ff2215a000e99595af6fc38cdee94f23</guid>
<pubDate>Mon, 07 Jul 2025 22:15:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Crenshaw-Community-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dfe828d06cd20f701439081167beaf6ec2d5f327c3460c272e07aefa0928215d</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Crenshaw Community Hospital is a medical facility based in Luverne, Alabama. Established in 1967, it offers a wide range of comprehensive health care services. In addition to an emergency department, the not-for-profit hospital operates outpatient clinics, laboratory and radiology services, and rehab facilities. The hospital remains committed to meeting the healthcare needs of Crenshaw County and the surrounding communities.</i><br />Target victim <b>website</b>: <i>crenshawcommunityhospital.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lee-Publications</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24384</link>
<guid>0367c7fbf44f81ee71fcc18f6e748fcc</guid>
<pubDate>Mon, 07 Jul 2025 20:17:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Lee-Publications</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26b41c5f35e2681e7e9013fc3466d411611b8daad7e3c90f313938a6c5926f66</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.leepub.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Allied-Steel-Buildings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24383</link>
<guid>4a3ef7e06bb4020500bbd7e86dc71429</guid>
<pubDate>Mon, 07 Jul 2025 20:17:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Allied-Steel-Buildings</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>01d338df6cacd23ca5d0585aeb723ed7097bc42a2aa41d53a833c4ebf1cc8f5d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.alliedbuildings.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advance-Ready-Mix</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24382</link>
<guid>e80d4e20bea58e20d925e45e6fb7aab8</guid>
<pubDate>Mon, 07 Jul 2025 20:16:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Advance-Ready-Mix</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>942ff1dacd795f463728a82186cd98113de0f8d13c3cce1046396e81639c8b87</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.advancereadymix.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>gatewaycsb.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24368</link>
<guid>8e51f47b4a54c6f6f63b4311eaac256c</guid>
<pubDate>Mon, 07 Jul 2025 14:54:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kawa4096</b> claims attack for <b>gatewaycsb.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>103cb9d75d59354e59044277fcf925889954383b170b96c9eb3e978fae6e8d7c</i><br /><br />Threat actor <b>description</b>: <i>gatewaycsb.org</i><br />Target victim <b>website</b>: <i>gatewaycsb.org</i>]]></description>
<category>kawa4096</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpsthesandersfirm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24359</link>
<guid>35945d8cd07da384dcfcc5f2e2658ef0</guid>
<pubDate>Mon, 07 Jul 2025 14:32:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>httpsthesandersfirm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9bf742332612ee378466b8a707a2f755fa742011d96b0255c77afbf24b391ab0</i><br /><br />Threat actor <b>description</b>: <i>Site: https://thesandersfirm.com/
														Industry: Law Firm
														GEO: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>tsaworld.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24360</link>
<guid>9f8038b075d4a63d1835e671c2ff9b2e</guid>
<pubDate>Mon, 07 Jul 2025 10:47:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>tsaworld.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6d52979c23454f8297631334cb30bedef7bb88c5682580dad1e8f02130718e33</i><br /><br />Threat actor <b>description</b>: <i>TSAworld Inc. specializes in providing a wide range of office equipment and supplies including projectors, printers, copiers, and scanners, as well as their associated parts and maintenance kits. Their products cater to clients seeking technical expertise and quality office solutions. The company also offers resources such as credit applications and an exchange program to enhance customer support. Operating from Peachtree Corners, GA, TSAworld emphasizes customer service and support for all their offerings. Employees: 25 Industry: Retail Downloaded: 25GB Phone Number:(770) 417-2323</i><br />Target victim <b>website</b>: <i>tsaworld.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>jubileejobs.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24361</link>
<guid>472d0b916c0de531fd1eb7ec1b961288</guid>
<pubDate>Mon, 07 Jul 2025 10:46:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>jubileejobs.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a0c6c7c2be85002725267aea4d622fc8ea2db134b9e88f7fa7fbe66367e77387</i><br /><br />Threat actor <b>description</b>: <i>Jubilee Jobs is one of the longest-serving and best non-profit workforce development providers in the Greater Washington Region. Jubilee Jobs programs offers hope for jobseekers all over Washington, DC as they strive to overcome often extensive barriers that result from unemployment, learning disabilities, former incarceration, and alcohol/substance abuse. Some individuals desire to leave behind reliance on public subsidies. Others start with little work experience, large gaps in work history, communication or language barriers, low education or weak job proficiency. Jubilee Jobs sees beyond these circumstances and assists every applicant as they take steps toward a better life. At Jubilee Jobs, we pride ourselves on encouraging every applicant throughout the entire job process. The process begins with initial meetings with job counselors, moves to workshops (interviewing skills, conflict resolution, goal-setting) and ends with the individual obtaining a job. Employees: 32 Revenue:$5 Million Industry: Business Services Downloaded: 10GB Phone Number:(202) 667-8970</i><br />Target victim <b>website</b>: <i>jubileejobs.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Whim-Hospitality</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24356</link>
<guid>8e8005fe9e75607ca4be6bc2cc0e1e2d</guid>
<pubDate>Sun, 06 Jul 2025 11:10:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Whim-Hospitality</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5eff178db578f5f1cdf5bbc1ccc42b2629548b84b1c6d95ba00cd09a84667873</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.whimhospitality.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southwest-CARE-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24353</link>
<guid>b6b9f0ec953b73acf8cff183f3739e99</guid>
<pubDate>Sun, 06 Jul 2025 10:38:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Southwest-CARE-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba6aeb1f51592b95b4d99169cd34f1f82f6ade928e85d44e2045ba8b65f0629a</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1996, Southwest CARE Center (SCC) is well known as a center of excellence for the care and treatment of people living with HIV in New Mexico. SCC is the largest provider of treatment for people living with Hepatitis C in northern New Mexico. SCC is also the largest clinical research site in New Mexico for studies of new treatments for both HIV and Hepatitis C. In September of 2015 SCC opened its doors in Albuquerque providing the same high standard of HIV care SCC is known for. Southwest CARE Center's focus is to provide a compassionate, patient-centered environment where everyone can feel comfortable and respected while receiving the highest quality health care available.
company is headquartered in 901 W Alameda Street Santa Fe, NM 87501. The total amount of data leakage is 143.9 GB</i><br />Target victim <b>website</b>: <i>southwestcare.org</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sermo</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24354</link>
<guid>b93e662b3e5e06be3555e0e087a2acb8</guid>
<pubDate>Sun, 06 Jul 2025 10:38:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Sermo</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2143e9501a0367f96f2cfc5935aa436f33255b7f5f7378f4783b7bd60106cb64</i><br /><br />Threat actor <b>description</b>: <i>Sermo is an exclusive online community for licensed physicians, offering a platform for peer-to-peer collaboration, medical crowdsourcing, and real-time discussion of clinical cases. Sermo provides healthcare professionals with tools to connect globally, share insights, and improve patient care through collective knowledge.
Sermo's corporate office is located at 3 Times Square, 12th Floor, New York, NY 10036, United States, and has 450+ employees.</i><br />Target victim <b>website</b>: <i>sermo.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Prosecuting-Attorneys-Council-of-Georgia</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24355</link>
<guid>1aa559737cd37f919f3fb11a7b5b1c69</guid>
<pubDate>Sun, 06 Jul 2025 10:38:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Prosecuting-Attorneys-Council-of-Georgia</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c220cf26a9a7564eeda5118356d78e7a2172df66a3b6568b00be1f895050bf25</i><br /><br />Threat actor <b>description</b>: <i>The Prosecuting Attorneys' Council of Georgia (PAC) The Prosecuting Attorneys' Council of Georgia (PAC) is the overarching judicial branch government agency supporting Georgia prosecutors and their staff.</i><br />Target victim <b>website</b>: <i>pacga.org</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>gotec.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24344</link>
<guid>98e1ff0ad03ae763072891200763b408</guid>
<pubDate>Sat, 05 Jul 2025 21:40:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>gotec.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3dad041c3fad36d4c3f48181352e56080637df18aa46971eff20fb2c3be9214e</i><br /><br />Threat actor <b>description</b>: <i>6450000 USD</i><br />Target victim <b>website</b>: <i>gotec.com</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hana-Financial</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24343</link>
<guid>e3f13237b715269ec481842bfccbeebe</guid>
<pubDate>Sat, 05 Jul 2025 19:23:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sinobi</b> claims attack for <b>Hana-Financial</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4eec06a62e76a580b857601168ce3578e920da62761b4ecf165280a8eb3761ba</i><br /><br />Threat actor <b>description</b>: <i>Hana Financial, Inc. is a premier specialty commercial finance company based in the United States, focused on providing factoring, asset-based lending, and SBA lending services. Founded in 1994, it ranks among the top ten largest factoring companies in the U.S. and is one of the most active SBA 7(a) lenders nationwide. The company serves a diverse range of clients, offering trade finance and transportation finance solutions tailored to their needs. With over $1.5 billion in annual factoring volume and loan originations, Hana Financial exemplifies a commitment to supporting businesses through innovative financial services.</i><br />Target victim <b>website</b>: <i>www.hanafinancial.com</i>]]></description>
<category>sinobi</category>
</item>
<item xmlns:dc='ns:1'>
<title>Silver-Lining-Herbs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24339</link>
<guid>f3dd08766d77cdc18433fcbaa385d289</guid>
<pubDate>Sat, 05 Jul 2025 16:32:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Silver-Lining-Herbs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7425b438a8d860c54fbdb1a0ed6ec4c89e05e1c62dcfb01e9c7ca46a163e875b</i><br /><br />Threat actor <b>description</b>: <i>Silver Lining Herbs specializes in herbal supplements for horses, dogs, and humans, providing natural health products aimed at enhancing the well-being of both ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sh.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24338</link>
<guid>a69e3de1a47cc1ed26314347076d2f94</guid>
<pubDate>Sat, 05 Jul 2025 09:46:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>flocker</b> claims attack for <b>Sh.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1eabe99525e2d024d6535f4f8e77847c5561b832037e0546e939cd92ee49e8b</i><br /><br />Threat actor <b>description</b>: <i>The Board Of S******h S**w LLP You Operate one of the world’s largest firms With approximately 900 lawyers across 18 […]</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>flocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Your-Building-Centers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24337</link>
<guid>d2c51ac4b6aa9b39dd1f6cc4b680289b</guid>
<pubDate>Fri, 04 Jul 2025 23:13:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Your-Building-Centers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cfb56a7a90e13c973d2c5191c763259a5d7a7b48f0844898fde24c9dcc794dac</i><br /><br />Threat actor <b>description</b>: <i>Your Building Centers (YBC) is a Pennsylvania-based company with 14 locations throughout Central Pennsylvania. For generations, they have been supplying contractors, builders, remodelers and amateur enthusiasts with name brand building materials. With roots dating back to the early 1900s, YBC and its predecessor companies have created a legacy deeply connected to the communities they serve. Their commitment goes beyond selling materials - they have become the backbone of local neighborhoods, growing with the people and businesses they support. Moving forward, they remain focused on maintaining that connection in the 21st century.</i><br />Target victim <b>website</b>: <i>ybconline.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>cityofgardendale.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24333</link>
<guid>edb636f69bf78b885117a47ec1a455d4</guid>
<pubDate>Fri, 04 Jul 2025 18:48:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>cityofgardendale.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>166bb2cb14310997ccfc723e600ce5d25177194d8b700a1d72d17f79d2dbc9ce</i><br /><br />Threat actor <b>description</b>: <i>Gardendale Fire and Rescue is currently providing services to our community with a roster consisting of a fulltime Fire Chief, Fire Marshal and eighteen (18) Fire/Medics. The Department provides all fire, medical ALS [Advance Life Support] and various technical services to our community of approximately 50 square miles. The Department currently operates out of Fire Station #1 located at 1811 Decatur Highway. Fire Department administrators and city officials are working towards the construction of two additional satellite stations in the western and eastern areas of the city to cover the growing number of new subdivisions and businesses we are experiencing. Through the dedication, knowledge and experience within our department staff, we feel we can provide the citizens and patrons of Gardendale with the finest protection, best services, and the highest quality of life possible.Revenue: $5 Million Employees: 91 Industry: Government Downloaded: 45GB Phone Number:(205) 631-8789</i><br />Target victim <b>website</b>: <i>cityofgardendale.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Corinthian-Media</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24331</link>
<guid>1a795f72604e4e1d35075019929d5b95</guid>
<pubDate>Fri, 04 Jul 2025 17:53:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Corinthian-Media</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bcaff61461e5955f49716ada83bb25160bbd1d0173e7e6e6bc7d75d515693900</i><br /><br />Threat actor <b>description</b>: <i>Corinthian Media is a service-driven, results-oriented media buying and planning company.We are ready to upload more than 7 GB of corporate documents. Detailed financial data, credit card scans, personal documents scans, medical information, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>DKN-Hotels</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24332</link>
<guid>e8d2fc41fb98705874a309ed648806a0</guid>
<pubDate>Fri, 04 Jul 2025 16:50:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>DKN-Hotels</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a926a1c7da54801079bce2d6f600be53592d30867a6445ee64ebea9bc5a7344</i><br /><br />Threat actor <b>description</b>: <i>DKN Hotels is a leading hotel and hospitality management company,offering comprehensive hotel management services.We are ready to upload more than 30 GB of corporate documents. Numerous financial files, confidentiality agreements, personal documents and other personal data (DOB, address, driver license and so on), lots of project docs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Apntelecom.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24330</link>
<guid>aa799ad70bea3029d4141c7b773c1a46</guid>
<pubDate>Fri, 04 Jul 2025 09:05:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>IMNCrew</b> claims attack for <b>Apntelecom.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12f240913012a4227ef73f3d124879d9ac9f89284a2ccae1db6b919cb33ba50c</i><br /><br />Threat actor <b>description</b>: <i>Asia Pacific Network is a Texas-based, Premier Provider of VoIP services to the US and all major continents around the globe. We utilize Tier-1 Carriers and a top-of-the-line, carrier-grade setup to provide consistent and reliable service to our customers connecting through our facility in One Wilshire Building, in the high-tech heart of downtown Los Angeles, CA, where over 220 carriers are similarly housed. We also have offices and representatives in the Philippines to better cater to the booming Call Center industry in the country.</i><br />Target victim <b>website</b>: <i>Apntelecom.com</i>]]></description>
<category>IMNCrew</category>
</item>
<item xmlns:dc='ns:1'>
<title>C-B-King-Memorial-Schoolbranch</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24326</link>
<guid>4c8c1946e71215e6e30d5f5de3f473ef</guid>
<pubDate>Fri, 04 Jul 2025 01:25:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>C-B-King-Memorial-Schoolbranch</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7abaea3651febcbf0d11501f722769aaffb630aeb5f7cd8caaba09c631b6f003</i><br /><br />Threat actor <b>description</b>: <i>C.B. King Memorial School, Inc. is a private, nonprofit agency that provides services to persons with developmental delays or disabilities. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>JFC-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24322</link>
<guid>b13c180ba3b4c0afdd38ed2cb91fc498</guid>
<pubDate>Thu, 03 Jul 2025 15:22:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>JFC-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d96be196bd9269035ab5030ddbec3d8d3cce86162bf04e9afcc20d894d4ed39b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.jfcelectric.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lydig-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24318</link>
<guid>9154498493d8e734d9c7489c2b6b26d7</guid>
<pubDate>Thu, 03 Jul 2025 15:20:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Lydig-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b81faa688625784e7770bddd610ec6ded363c6f07e5e43843754cf7ab4dc3bc0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.lydig.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sanderling</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24313</link>
<guid>01fd22ffdf9a9b247cbd1227c897ef48</guid>
<pubDate>Thu, 03 Jul 2025 13:32:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Sanderling</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>43989478aae132abdea49d9ab79451e4c077b5c260dfe5dc3f504a3bb36f5f8b</i><br /><br />Threat actor <b>description</b>: <i>Site: sanderlinghealthcare.com
														Industry: Healthcare
														GEO: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>Universal-Softare-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24311</link>
<guid>656176b089fee49ce4e725eafe97ac8a</guid>
<pubDate>Thu, 03 Jul 2025 08:11:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>Universal-Softare-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e9700d3f2b11d8f4df72aa1a210ca9cd5b9bbad3a60c4546c61a0988d117607</i><br /><br />Threat actor <b>description</b>: <i>About UsAt Universal Software Solutions, we are passionate about revolutionizing the way healthcare professionals manage infusion therapy. Our mission is to streamline and enhance the infusion process, ensuring patients receive the best possible care with the utmost efficiency and safety.Who We AreFounded in 2000, Universal Software Solutions is a leader in infusion software solutions, dedicated to transforming healthcare delivery through innovative technology.Our team of experts combines extensive experience in software development, healthcare, and infusion therapy to create cutting-edge solutions that address the complex  challenges faced by clinicians and patients alike.What We DoOur flagship product, Healthcare Data Management System (HDMS), is designed to simplify and automate the infusion software and HME/DME software workflows.With features like automated processes and customizable features, our software enhances accuracy and supports better clinical decision-making. By leveraging advanced technology and user-friendly design, we make it easier for healthcare professionals to focus on what matters most: patient care.Our ValuesInnovation: We are committed to pushing the boundaries of technology to provide cutting-edge solutions that address the evolving needs of the healthcare industry.Collaboration: We believe in working closely with our clients and partners to understand their needs and deliver solutions that exceed their expectations.Excellence: We strive for excellence in everything we do, from product development to customer service, ensuring that our solutions are reliable, efficient, and effective.Why Choose Us?Expertise: Our team brings together a wealth of knowledge in both software development and healthcare, ensuring that our solutions are not only technologically advanced but also clinically relevant.Customer-Centric Approach: We prioritize the needs of our clients, offering personalized support and tailored solutions that address specific challenges and requirements.Commitment to Quality: We adhere to rigorous quality assurance processes to ensure our products are reliable, secure, and meet the highest industry standards.--SQL DB ( including information about end customers: name, surname, date of birth, address, insurance number, telephone, etc. )-Personal information of employees and clients-Documents-Other files https://universalss.com/</i><br />Target victim <b>website</b>: <i>universalss.com</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>corpdvs.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24304</link>
<guid>300968290eea2002367f032ffa8daf61</guid>
<pubDate>Wed, 02 Jul 2025 23:32:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>corpdvs.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>354021287e8382e0f0216f3b2dceca8e0e11ebbcb873dfd96ee14a275aa7c701</i><br /><br />Threat actor <b>description</b>: <i>Corporate Data Voice Solutions is a leading systems integrator and technology consultant with over two decades of industry leadership experience. The company specializes in providing companies with customized, future-ready IT solutions that i            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>conlonproducts.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24305</link>
<guid>b0d3e132c23529b08ae2b24fba1f86f5</guid>
<pubDate>Wed, 02 Jul 2025 23:32:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>conlonproducts.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d7ba48134effa95e4f9ace59271a6c98e2cb12b933dccf1c65cb6e82a5a19c08</i><br /><br />Threat actor <b>description</b>: <i>We offer a solution. As you know, Conlon Products is a local, family-owned, wholesale distributor of paper products, cleaning supplies, safety products and janitorial equipment serving the Merrimack Valley for over 50 years. We have great pro            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpswww.injusa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24306</link>
<guid>4c75be1151d04f3cbdfeeb09922be0ab</guid>
<pubDate>Wed, 02 Jul 2025 23:32:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>httpswww.injusa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>297b9b5c31b5f5a9fd604600cea2315d2dad7d485d1c0a50ea45d530ac913bfa</i><br /><br />Threat actor <b>description</b>: <i>INJUSA was born as a family business, and we can say today that it still preserves that spirit of unity, teamwork, and continuous improvement. This spirit is evident in the results of the more than 850,000 toys it produces each year, in its d            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>atlantissubmarines</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24308</link>
<guid>d7243874a7b55c8ae90bbc0f39129c32</guid>
<pubDate>Wed, 02 Jul 2025 23:32:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>atlantissubmarines</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f339f56b9198aada5a9dcdebb21dcb0a0ec7f6263bb0a9468e50b093844156e</i><br /><br />Threat actor <b>description</b>: <i>Atlantis Submarines is a pioneering leader in passenger-carrying submarine technology, established in 1985, and known for developing the world's first tourist submarine. The company has safely completed over 580,000 dives, carrying over 18 mi            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Allegheny-Answering-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24300</link>
<guid>d1baab7ffae45100860a3825fa29b7e1</guid>
<pubDate>Wed, 02 Jul 2025 20:31:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Allegheny-Answering-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e48804f86d85904d8135d1931973b706a013602957ef41b6ed7b4eec782266b6</i><br /><br />Threat actor <b>description</b>: <i>Allegheny Answering Service offers a diverse range of communication solutions including answering services and call center services, operating 24/7/365 from the...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>HKG-Duty-Free</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24301</link>
<guid>168a051c1147d504f832ac8a0a1ebdd1</guid>
<pubDate>Wed, 02 Jul 2025 20:31:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>HKG-Duty-Free</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7ab5df3a379d773fbc4d200856371234af61cff3e18d3454c5761db39d81d68</i><br /><br />Threat actor <b>description</b>: <i>(database dumps inside) HKG Duty Free is the market leader in electronics, but also now developing comprehensive fashion brand portfolio including Mont Blanc, F...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>JCC-Rockland</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24302</link>
<guid>726bdcdade105126e55aa931ab12d3f1</guid>
<pubDate>Wed, 02 Jul 2025 20:31:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>JCC-Rockland</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6fc517cd63cd19dda60e92f1fb9fb391225628103c58bc554dc92984235b536c</i><br /><br />Threat actor <b>description</b>: <i>The JCC Rockland is dedicated to the enrichment and continuity of Jewish life and to the preservation and celebration of our rich heritage. The center shall str...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Oxford-Universal-Corp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24309</link>
<guid>e6ef568b114d2c91db0320578e50e0dd</guid>
<pubDate>Wed, 02 Jul 2025 17:13:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacklock</b> claims attack for <b>Oxford-Universal-Corp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff9f685b39a5a2e5e418872d55d166f9c3a48b2722d04c201ed0ce24f11c65f9</i><br /><br />Threat actor <b>description</b>: <i>Oxford Universal Corp is a real estate company based out of 1541 Sunset Dr, Miami, Florida, United States.
Employees 5
Revenue $6.8 million.</i><br />Target victim <b>website</b>: <i>oxforduniversal.com</i>]]></description>
<category>blacklock</category>
</item>
<item xmlns:dc='ns:1'>
<title>alereon.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24299</link>
<guid>cbcf11a11d4483e4df3d13be179580c1</guid>
<pubDate>Wed, 02 Jul 2025 14:15:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>alereon.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7cc39589a9e8b4f77feb00c6370354baad9e86664b896293678e9a76d93b463</i><br /><br />Threat actor <b>description</b>: <i>Alereon is a global leader in ultrawideband (UWB) wireless solutions, providing high-speed, short-range wireless technology for various industries. They design and fabricate UWB chipsets and offer a range of products and services, including wireless modules, reference designs, and custom hardware and software development. Their solutions cater to a diverse clientele, including consumer electronics, medical devices, and military applications that require reliable, high-speed wireless communication. Established in 2004, Alereon has built a strong reputation for meeting customers' high-speed wireless needs through innovative and customized solutions===> Revenue: $25.4 Million Employees: 92 Industry: Manufacturing Downloaded: 116gb Phone Number:(512) 345-4200</i><br />Target victim <b>website</b>: <i>alereon.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>fcsserves.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24296</link>
<guid>da0363008e38c474bbae40f8ea22d370</guid>
<pubDate>Wed, 02 Jul 2025 10:30:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>fcsserves.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>49f0e3b3ed73f9a9644af5ce45cda9414640abd9bbb71dbdd8280fae4ebc0edb</i><br /><br />Threat actor <b>description</b>: <i>Family & Community Services, Inc. is a non-profit corporation headquartered in Portage County, Ohio. The agency began in 1941 as the Catholic Charities Bureau of the Ravenna Deanery with just two programs and two staff members. Today, FCS ope            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mainetti</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24297</link>
<guid>5d0710c088e6556e16b7da2430dd9b1d</guid>
<pubDate>Wed, 02 Jul 2025 10:30:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Mainetti</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5abac4e026db77540783b47e522ed2137308ae6ea1a6ca0393a256078ad23fcd</i><br /><br />Threat actor <b>description</b>: <i>Headquartered in The Scottish Borders, United Kingdom, Mainetti is a manufacture and supplier of packaging for the fashion industry and a provider of smart retail solutions.For over sixty years, Mainetti has been a trusted partner to the worl            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>dossenterprises.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24295</link>
<guid>4260ccc84d7f06c14d2f4d6ca383f0cc</guid>
<pubDate>Tue, 01 Jul 2025 21:53:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>dossenterprises.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>00cc96e9bb6afa7df6a405bdfa2615ea41035a4d9960158653282dfa6120ca72</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>dossenterprises.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>lafayettefamilyymca.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24294</link>
<guid>eb3ab47df27cce338589cb34d7042621</guid>
<pubDate>Tue, 01 Jul 2025 21:52:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>lafayettefamilyymca.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b841a79df9d2030b0a673dfb290931cb684988d6e8c426c61b3ac3ae4bf1e762</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] The Lafayette Family YMCA is a non-profit community organization based in Lafayette, Indiana. They offer a wide range of programs such as youth development, healthy living, and social responsibility initiatives. Programs include child care, fitness training, swimming lessons, summer camps, and more. The Lafayette YMCA strives to nurture the potential of every kid, promote healthy living, and foster a sense of social responsibility.</i><br />Target victim <b>website</b>: <i>lafayettefamilyymca.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>villagecoin.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24288</link>
<guid>561abb177528d5bf95d40838809a7cf6</guid>
<pubDate>Tue, 01 Jul 2025 21:31:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>villagecoin.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>78d7aae77fadd1a7120b1ec835927e6f27adf0ed2b4c09ce81622bf08e42fe4b</i><br /><br />Threat actor <b>description</b>: <i>Village Coin Shop specializes in providing a wide variety of numismatic products.The store is also recognized as a dealer of US Mint bullion and Royal Canadian Mint bullion.
1.Client lists
2.File is an invoice from SilverTowne (STLP) to Vil            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>capmark.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24290</link>
<guid>b0099c9e085ffd780c1ba9d144caae56</guid>
<pubDate>Tue, 01 Jul 2025 20:33:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>capmark.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97f37a3367d757d89e1ee32725bfd8a200f798a8bd614bcd8f44a4eb1dcee539</i><br /><br />Threat actor <b>description</b>: <i>An independent registered municipal advisor dedicated to providing public jurisdictions with comprehensive advice on planning, 
structuring and issuing bonds, notes and lease debt to meet their capital and cash flow needs. Their prospective             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alert-Medical-Alarms</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24285</link>
<guid>d095e9553703cc6e3d058c3b70e8e6ce</guid>
<pubDate>Tue, 01 Jul 2025 18:32:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Alert-Medical-Alarms</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f0dfcc4ccbf00f2c01b65bc0b2b0628abbc85b9a389b7e96152b8e54699d6ea</i><br /><br />Threat actor <b>description</b>: <i>Alert Medical Alarms is a nationwide leader in Personal Emergency Response Systems (PERS), bringing over 25 years of healthcare expertise to deliver innovative, life-enhancing solutions. Our mission is to empower individuals and support manag            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Watermark-Marine-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24291</link>
<guid>530f49aa780e4bb3a605e586094008e7</guid>
<pubDate>Tue, 01 Jul 2025 16:08:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Watermark-Marine-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7ebe201081cec1bef77214702a65090f3db2ff5b526e687e2af8bf76514e285</i><br /><br />Threat actor <b>description</b>: <i>Watermark Marine Systems is a full-line marine contractor serving
the Lakes Region of New Hampshire since 1990. They offer a compl
ete range of shorefront construction services with crews working 
year-round using mobile equipment to perform work on any of New H
ampshire’s lakes or ponds.

We are ready to upload more than 10 GB of corporate documents. Em
ployee information, confidentiality agreement, financial informat
ion (audits, reports, invoices, so on), NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>exhibits-intl.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24283</link>
<guid>46d09c503b30980ffc325cc243e1c0f5</guid>
<pubDate>Tue, 01 Jul 2025 15:31:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>exhibits-intl.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a94e79750a87698374d3813a25735839b1ce9aa913ea4cb8262a85dde3397fc0</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1961, kubik maltbie produces experiences for museums, visitor centers, and exhibition projects. It offers fabrication and installation services, exhibit design and production, and creation of interactive exhibits. The company is he            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cameron-Hodges-Coleman-LaPointe</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24280</link>
<guid>f25f9cde8fd9b4c2e25c79efcf188f22</guid>
<pubDate>Tue, 01 Jul 2025 10:30:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Cameron-Hodges-Coleman-LaPointe</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a03d24bfa7860fa7c5a8d0139862bcf011b8c0a12cf14ae5c04eedc19998513</i><br /><br />Threat actor <b>description</b>: <i>Site: cameronhodges.com
														Industry: Law Firms & Legal Services 
														GEO: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>coruzcitywndata</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24275</link>
<guid>681e639bc756a64940c20e80ca055ae5</guid>
<pubDate>Tue, 01 Jul 2025 01:53:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>coruzcitywndata</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d156c4f41ea3a526e7cbb56b17c2441cdba5d37cbae35a3d0bb67f909d4d046e</i><br /><br />Threat actor <b>description</b>: <i>Thomasville is a city in Davidson County, North Carolina, United States. The city was once notable for its furniture industry, as were its neighbors High Point and Lexington. We have 250gb data, lots of financial information about all the services in your city</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>simmons-Boardman-Publishing-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24265</link>
<guid>e2eb6eaf5e7fa94597ab62963aac1884</guid>
<pubDate>Mon, 30 Jun 2025 23:32:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>simmons-Boardman-Publishing-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>75441153ac6f0121008ecd4517c9f90f18859b46303147b5f520b95a4219dd99</i><br /><br />Threat actor <b>description</b>: <i>Simmons-Boardman Publishing Corporation is one of the oldest, most well-respected, privately held B2B publishers. Our diverse portfolio of print and digital products includes magazines, books, directories, email newsletters, conferences, webs            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.nuphoton.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24267</link>
<guid>e08f95ac7139a0cce6cb31f578bbf025</guid>
<pubDate>Mon, 30 Jun 2025 22:32:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.nuphoton.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f92b795372bc3617e0abb30921135cd4939f585221d349fb301a0a4fbca173f0</i><br /><br />Threat actor <b>description</b>: <i>Nuphoton Technologies, Inc. is a pioneer in fiber lasers and fiber amplifiers with applications covering industrial, defense, aerospace, biomedical, telecommunications and research areas. The company is in operation since 1996 using proprieta            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.malonebailey.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24270</link>
<guid>d436cae949c81b9970593a225df2d479</guid>
<pubDate>Mon, 30 Jun 2025 21:32:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kawa4096</b> claims attack for <b>www.malonebailey.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6673882d782b9269a9daea0352161b59b7bce7ae95bccd892540adcd0c8e37c4</i><br /><br />Threat actor <b>description</b>: <i>www.malonebailey.com</i><br />Target victim <b>website</b>: <i>malonebailey.com</i>]]></description>
<category>kawa4096</category>
</item>
<item xmlns:dc='ns:1'>
<title>Murex-Petroleum</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24262</link>
<guid>32b4b94134ad4c54ddbd013ec2564deb</guid>
<pubDate>Mon, 30 Jun 2025 14:12:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Murex-Petroleum</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>71c93c15eb3eba0519ba746224b8890441d77f1c2c6baf7e2bfe60e47a13a958</i><br /><br />Threat actor <b>description</b>: <i>Murex Petroleum Corporation is engaged in the acquisition, develo
pment and operation of oil and gas properties in North America.

We are ready to upload 25 GB of documents. Lots of confidential d
ocuments, employee information (SSN, DOB, address, passport/SSN/D
L scans), detailed financial information (reports, invoices, so o
n), NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>HRConnects-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24263</link>
<guid>d78456fce3bebc84d9320fa2f9cf9e2a</guid>
<pubDate>Mon, 30 Jun 2025 13:07:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>HRConnects-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7710df50c835325a1e4478b140d53b01b4b88d746c72f0c8df4f8cdc193c25b4</i><br /><br />Threat actor <b>description</b>: <i>HRConnects, LLC is a leading provider of human resource and staff
ing services.

We are ready to upload 4 GB of documents. Employee information (S
SN, DOB, address, passport/SSN/DL scans). Financial information (
reports, invoices, so on), confidential docs, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Budget-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24260</link>
<guid>9d253ace7cf557b2f1f99d319649e74f</guid>
<pubDate>Sun, 29 Jun 2025 17:47:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Budget-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8267187d7bc515e899686a3052570bb9a8bfcd826576e24dde536b62d7e343e6</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.budget-e.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Epcatalogs-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24259</link>
<guid>b84931d049a63cf56e0a47379c26c5cf</guid>
<pubDate>Sun, 29 Jun 2025 17:45:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>Epcatalogs-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>85cf4bc5362f66b3774243b884e39e8eca60db7a4287ca45a6e8f8d7976d6f5d</i><br /><br />Threat actor <b>description</b>: <i>​​​​​EPCATALOGS specializes in providing electronic spare part catalogs, workshop manuals, and diagnostic software for the automotive and heavy machinery industries...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>ClockWorkAdmin</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24258</link>
<guid>19873725ed76e249281f495eb7d547ac</guid>
<pubDate>Sun, 29 Jun 2025 16:24:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>handala</b> claims attack for <b>ClockWorkAdmin</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>098d199062b7e6de047d8ab8abdf9631ff02278d55338c57844ca0623a0cb4c9</i><br /><br />Threat actor <b>description</b>: <i>ClockWorkAdmin Hacked To the management of Clockwork Admin, This is not a test. This is not a drill. Your entire infrastructure has been compromised. From backend databases and cloud storage to internal communications and investor-related documentation , we are inside. Every fund file, KYC archive, transaction trail, compliance log, and internal memo has been accessed,…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>handala</category>
</item>
<item xmlns:dc='ns:1'>
<title>Landscape-Hawaii</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24256</link>
<guid>e62f08e80dc2abefd52476b25ca29cee</guid>
<pubDate>Sun, 29 Jun 2025 16:10:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Landscape-Hawaii</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be56c9b767cd3b8137731a339a8f44a34a58c0baedccb66d7c0c3b8f560acfaa</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Landscape Hawaii is a professional landscaping company offering high-quality services in Hawaii. They provide comprehensive solutions that may include landscape design, installation, and maintenance. Their work range from residential to commercial projects. With their experience and knowledge of local flora, they create sustainable, aesthetically pleasing landscapes that reflect the unique beauty of the Hawaiian islands.</i><br />Target victim <b>website</b>: <i>landscapehi.com</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dynamic-Netsoft</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24257</link>
<guid>13ac6fa08d39e7879e9962ffdabe7502</guid>
<pubDate>Sun, 29 Jun 2025 16:08:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Dynamic-Netsoft</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b7019d2ac2b5e5b28c727f689e1a1a05781f30a22c9f6631c4f9f9ab6d3fa41</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Dynamic Netsoft is an IT solutions provider initiated in 2002. It specializes in ERP solutions, custom application development, IT consulting, and software services. The company offers services for industries like real estate, banking, healthcare, and education. Its reputed services include solutions for Microsoft Dynamics, Mobile Applications, Azure Applications. It operates in the US, Middle East, and India.</i><br />Target victim <b>website</b>: <i>www.dnetsoft.com</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>NK-Customer-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24252</link>
<guid>2f93b699c738691d0b53d82ed1e25817</guid>
<pubDate>Sun, 29 Jun 2025 10:12:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacklock</b> claims attack for <b>NK-Customer-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>370780652e8d3b4587eb4f377598433aedcba32d61694757478cdfc2dddb6b3a</i><br /><br />Threat actor <b>description</b>: <i>Business Services
North Carolina, United States
107 Employees
NK Customer Solutions Ltd offers a range of outsourcing services including customer service, data entry, billing and collections, order entry, and sales/marketing surveys. The company specializes in nearshore call center solutions, providing efficient operations with a focus on high-quality service and rapid deployment.
Revenue <$5 Million</i><br />Target victim <b>website</b>: <i>nkcustomer.com</i>]]></description>
<category>blacklock</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.prival.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24248</link>
<guid>c17e8738e3ff4451eff7d670d9ab9c63</guid>
<pubDate>Sat, 28 Jun 2025 06:20:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kraken</b> claims attack for <b>www.prival.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>00850e788aa701b343f738039a23bff4ae6bb7d37ddf9ad189c9f43ec06b8e17</i><br /><br />Threat actor <b>description</b>: <i>Banking · Panama

http://yjsknaecbmhvrsagrcwqelpojnbcllt6v27vxebxhnotd3wu67onc5qd.onion...</i><br />Target victim <b>website</b>: <i>www.prival.com</i>]]></description>
<category>kraken</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.skcounsel.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24247</link>
<guid>b0545e6b6d8155dbab4bed76d44bf754</guid>
<pubDate>Sat, 28 Jun 2025 06:19:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kraken</b> claims attack for <b>www.skcounsel.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e22db37fe6a24a6e4704c5cac89b5b545384c911e10be8bb4a50d0b09c70c72e</i><br /><br />Threat actor <b>description</b>: <i>Scott & Kraus, LLC is a boutique law firm located in Chicago specializing in commercial finance. 
The firm serves a diverse ran...</i><br />Target victim <b>website</b>: <i>www.skcounsel.com</i>]]></description>
<category>kraken</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.continental.aero</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24243</link>
<guid>c01fde2578043635c831a96524f9b679</guid>
<pubDate>Sat, 28 Jun 2025 06:18:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kraken</b> claims attack for <b>www.continental.aero</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c325a75928fee6fd3017ebd6418f4a817160d9a46a200bdae442f78b9d31d5b</i><br /><br />Threat actor <b>description</b>: <i>Continental Aerospace Technologies is a global leader in General Aviation. 
They are the only company to offer a full range of ...</i><br />Target victim <b>website</b>: <i>www.continental.aero</i>]]></description>
<category>kraken</category>
</item>
<item xmlns:dc='ns:1'>
<title>elpasoglass.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24225</link>
<guid>0d14e3ef9e05269b449abdfcf5c8c60a</guid>
<pubDate>Fri, 27 Jun 2025 21:32:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>elpasoglass.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e458a212119f9887e908185ac277284cc74fcdba6e7ababa62671f1d4ae765f3</i><br /><br />Threat actor <b>description</b>: <i>We are commited to being one of the best and highest quality commercial contract glazing firms in the rocky mountain region. While specializing in Curtainwall, Storefront and Commercial windows we understand how important scheduling and compl            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>greatcdltraining.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24226</link>
<guid>b12651683fc3724a483ce32818a4068a</guid>
<pubDate>Fri, 27 Jun 2025 21:32:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>greatcdltraining.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>161ce4485151cd72af83295ba2bccf9c266432992d44666f7acc7deeb1556a9e</i><br /><br />Threat actor <b>description</b>: <i>Over more than 30 years, Driver Solutions has specialized in providing affordable driver training and quality trucking job opportunities to new drivers.  We do this by offering a company-sponsored CDL training program that allows new drivers             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>broadleafgame.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24227</link>
<guid>f8bf0d84e9b0e57f01008c4827d7fda5</guid>
<pubDate>Fri, 27 Jun 2025 20:31:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>broadleafgame.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bbdc446b8a9b33160655cfc39db5589146d2440f2244082b8ca7380fce705aff</i><br /><br />Threat actor <b>description</b>: <i>Broadleaf is a family-owned food distribution company supplying high-quality meats and deli meats to distributors and retailers throughout the United States and abroad.Founded in 1988, Broadleaf entered the U.S. market as a major importer and            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>buffalomarine.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24228</link>
<guid>f9551cee2739490faff3eaf3a36d7cd1</guid>
<pubDate>Fri, 27 Jun 2025 20:31:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>buffalomarine.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dfc04e7f8f0b2faa989efc8ff1fe87efa51d28b65d10afd48e891a45e31b2213</i><br /><br />Threat actor <b>description</b>: <i>Buffalo Marine Service, Inc. founded in 1935, is a bunkering and marine transportation company specializing in inland waterway towing with a focus on the Intracoastal Waterway System.
1.The document is a Professional Services Agreement (Prof            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>artexmanagement.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24223</link>
<guid>7c4e2c89a4054ce79d83c88031174b3d</guid>
<pubDate>Fri, 27 Jun 2025 19:30:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>artexmanagement.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b52717cac88eeeb651ef315a966fb2030179f7b0093105e445c7d80204f6aab9</i><br /><br />Threat actor <b>description</b>: <i>Artex Management was founded in 2005 to meet the industry's demand for reliable and hassle-free property management.Our mission is to achieve the standard of living you desire for each property.
1.The document is a Payment Agreement (Payment            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carter-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24241</link>
<guid>2d712c9e2f4f353c2108751e0eeea05a</guid>
<pubDate>Fri, 27 Jun 2025 18:49:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Carter-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>302efc9bd01fa3752ad4bf245e7a8f363fb857efc6fef58589a5833db6f0cb8a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.carterbearings.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Emtech-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24240</link>
<guid>ef239417f3ff79261005a11fe4b25651</guid>
<pubDate>Fri, 27 Jun 2025 18:48:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Emtech-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6161abd2326c3516f845dc6e2509db305c2b571018541eb5632054065b763148</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.em-techinc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sunrise-Springs-Spa-Resort</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24237</link>
<guid>680c256fb6e2c27e27a9d268e8379690</guid>
<pubDate>Fri, 27 Jun 2025 18:45:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Sunrise-Springs-Spa-Resort</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f75ade4c6f2fe38f470f01b11b8aa1686c6bccb3b4fb690eb14f999c0bd9a2f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ojosparesorts.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>CGPH</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24236</link>
<guid>5e0096402339448552f8dff7015d901d</guid>
<pubDate>Fri, 27 Jun 2025 18:44:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>CGPH</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>344685287cfc607487d601d08a1de8783adcc71a43b61079930688c532e76da1</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.cgph.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Associated-Packaging</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24234</link>
<guid>11037e6cef90d5fdf6c811475be4b253</guid>
<pubDate>Fri, 27 Jun 2025 18:43:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Associated-Packaging</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>578b10ae317f821641702bb50c57648833573f91ce58ed9f19c565e2a3596792</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.associatedpackaging.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dickow-Cyzak-Tile</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24224</link>
<guid>709f9b6bebbf6b83d059f97a0fd5faa0</guid>
<pubDate>Fri, 27 Jun 2025 16:01:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Dickow-Cyzak-Tile</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12417773bf63b7cb687a30d8bd57cf037655ad153dff862a43038f4f16768167</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.dickowcyzak.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Morningsideservices</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24229</link>
<guid>3211768f6a03691dec62ef85cf89b74a</guid>
<pubDate>Fri, 27 Jun 2025 14:17:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kawa4096</b> claims attack for <b>Morningsideservices</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12f295c99a3d7ef892961662a9e494e3101b6b6082eb58c036a48d17f195d840</i><br /><br />Threat actor <b>description</b>: <i>www.morningsideservices.com</i><br />Target victim <b>website</b>: <i>Morningsideservices.com</i>]]></description>
<category>kawa4096</category>
</item>
<item xmlns:dc='ns:1'>
<title>PILOTTHOMAS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24218</link>
<guid>20c2353f84c70aee669d3af094e1f056</guid>
<pubDate>Fri, 27 Jun 2025 06:32:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PILOTTHOMAS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>82b2feeae35dd9be2640a134aa64c087bcf0f5cba36822014d19444ce79eef85</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dealmed-Medical-Supplies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24214</link>
<guid>52f0ab576a3efd4c9e6f71fcab5ecdba</guid>
<pubDate>Thu, 26 Jun 2025 23:26:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Dealmed-Medical-Supplies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>604e11b8e94db6c0256e6b195ffe54029f69c63e0f0cb56d3571490accfd5fa3</i><br /><br />Threat actor <b>description</b>: <i>(Data of the entire group of companies) Dealmed provides a comprehensive range of medical supplies designed for healthcare professionals. Their products cater t...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Martin-Showers-Smith-McDonald</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24210</link>
<guid>5e57e76cd6ebcdd544ce5dd30faa95db</guid>
<pubDate>Thu, 26 Jun 2025 20:28:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Martin-Showers-Smith-McDonald</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c16d14610b87bf0c4f1646d78e196cd4d557fe22851403c443765c2a852b72a</i><br /><br />Threat actor <b>description</b>: <i>Martin, Showers, Smith McDonald, LLC is a law firm specializing in civil litigation, trial law, personal injury, and family law.We are ready to upload more than 8 GB of documents. More than half of the data are scans of client personal documents (passports, SSNs, death/birth certificates, DLs and more), employee information, confidential documents, court reports.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Imblum-Law-Offices</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24211</link>
<guid>5fc78eaa477c004f02bd794d43e3c378</guid>
<pubDate>Thu, 26 Jun 2025 20:28:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Imblum-Law-Offices</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1ad2f0154384533b18b7e980299f1f7032f84fa40ac36afbba05354885f427e</i><br /><br />Threat actor <b>description</b>: <i>Imblum Law Offices PC specializes in bankruptcy law, offering services such as Chapter 7, Chapter 11, and Chapter 13 bankruptcy filing, as well as foreclosure defense and debt relief. We are ready to upload more than 20 GB of documents such as: client personal documents (passports, SSNs, death/birth certificates,financial information), court hearings, protocols, employee information, other confidential documents.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Johnstone-Supply-Dallas-Fort-Worth</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24212</link>
<guid>2aed7be01bfae8763e78deedbeaa8b01</guid>
<pubDate>Thu, 26 Jun 2025 20:28:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Johnstone-Supply-Dallas-Fort-Worth</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b46fea52dee6dd34f40f91c0ba623d19a7f420fe85067ef97e7adc213b1e56a6</i><br /><br />Threat actor <b>description</b>: <i>Our team is driven by the opportunity to deliver outstanding service to everyone who may visit our stores. Ethics, partnership and integrity are the main values...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Antigo-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24213</link>
<guid>75f8f7a9ced8da0635e455405200f2e8</guid>
<pubDate>Thu, 26 Jun 2025 20:28:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Antigo-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4af4afddf73935ad6858c048e621db2a2057a7e971a7aa5da1afe9012641564f</i><br /><br />Threat actor <b>description</b>: <i>(including email) Antigo Construction is located in Antigo, Wisconsin, and is the company headquarters for the North American and international business operati...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Merlin-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24216</link>
<guid>ec23187ecc4e0c6eb40cd187db4a865c</guid>
<pubDate>Thu, 26 Jun 2025 18:55:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Merlin-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>50d5ca034e60e57287b7735374b8b1a9581fed8852f7826f9e413d818167d3f2</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.merlinindustries.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>mcparlane.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24215</link>
<guid>8feeb5ed0776e02943859128347dc015</guid>
<pubDate>Thu, 26 Jun 2025 18:29:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>mcparlane.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a51ed3d9bfdd6f3a06420685c82d50fb20c73e5a1111c3b1d1eb2f08ad7fc21</i><br /><br />Threat actor <b>description</b>: <i>USA - McParlane & Associates</i><br />Target victim <b>website</b>: <i>mcparlane.com</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>MultiStone</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24205</link>
<guid>8b1d4dae4314191be293526cf052e257</guid>
<pubDate>Thu, 26 Jun 2025 12:12:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>MultiStone</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1d98d26be2181ba3d4de5256cfaf9e53281f2783ec06e9a7150a718d559aad1</i><br /><br />Threat actor <b>description</b>: <i>MultiStone is the Low Country's leader in fabrication and install
ation of Natural and Engineered stone countertops. 

We are ready to upload more than 8 GB of documents such as: emplo
yee documents, financial data, lots of projects, confidentiality 
agreements, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pay-Tel-Communications</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24201</link>
<guid>30d4acd988cebcb9d2142e2af7a9dbaf</guid>
<pubDate>Thu, 26 Jun 2025 10:16:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Pay-Tel-Communications</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8431c49f39807986def5d3b1a89f7bc56ae05b84f407e494f92e2a6416e07baa</i><br /><br />Threat actor <b>description</b>: <i>Pay Tel Communications, Inc. specializes in providing technology solutions designed to enhance safety and efficiency within confinement facilities and support the needs of incarcerated individuals. Their product offerings include secure communication platforms, educational resources, and multi-function tablets aimed at improving the lives of detainees.
The data includes:
10,000+ video call recordings
10,000+ audio call recordings
20,000+ scans of physical mail
70,000+ work-related documents

The list of facilities affected by the breach:
Alexander County NC
Alleghany County Jail NC
Alleghany Covington Regional Jail VA
Anderson County SC
Ashe County Jail NC
Barnwell County Jail SC
Bartow County GA
Beaufort County Detention Center NC
Bertie Martin Regional Jail NC
Bleckley County Jail GA
Bradford County Jail FL
Burke Catawba NC
Burke County GA
Burke County Jail NC
Butts County GA
Carteret County Detention Center NC
Caswell County Detention Center NC
Catawba County NC
Chatham County GA
Citrus County Jail
Colleton County Jail SC
Columbia County GA
Coweta County GA
Crisp County Jail GA
Currituck County Detention Center NC
Dare County Jail NC
Davidson County Detention NC
Davie County Jail NC
Dooly County Jail GA
Dorchester SC (St George and Summerville)
Duchesne County Detention Center UT
Duplin County Detention Center NC
Eastern Shore Regional VA
Edgecombe County Jail NC
Elbert County Jail GA
Emanuel County Jail GA
Fauquier County Det Center VA
Flagler County Jail FL
Florence County Jail SC
Forsyth County Jail GA
Forsyth County Jail NC
Franklin County Jail FL
Franklin County Jail GA
Franklin County Jail MO
Franklin County Jail NC
Gadsden County FL
Gilmer County Jail GA
Glynn County Detention Center GA
Gordon County Jail GA
Granville County Jail NC
Greene County NC
Guilford County Juvenile Center
Guilford County NC
Halifax County Jail NC
Haralson County Jail GA
Heard County Jail GA
Hertford County Jail NC
Hertford County Jail NC
Holmes County FL
Houston County Jail GA
Jasper County Jail GA
Jefferson County Jail FL
Jones County Jail GA
Jones County Jail NC
Laurens County Jail GA
Lee County Jail NC
Levy County Jail FL
Liberty County Jail GA
Lincoln NC
Lumpkin County Jail
Madison County Jail GA
Marion County Jail SC
McDowell County Detention Center
Marlboro County Jail SC
Martinsville City Jail VA
McDowell County Detention Center NC
McIntosh County Jail GA
McKinley County Adult Detention Center NM
McKinley County Juvenile Detention Center NM
Meigs County Jail TN
Meriwether County GA
Mitchell County Jail GA
Monroe County Jail GA
Montgomery County, OH
Montgomery County, OH
Murray County Jail GA
Nash County NC
Newton County Jail GA
Northampton County Jail NC
Oconee County Jail GA
Okanogan County Corrections Center WA
Onslow NC
Orange County Jail NC
Orangeburg County Jail SC
Page County VA
Pamlico County Detention Center NC
Pamunkey Regional Jail Authority VA
Peach County Jail GA
Pickens County Jail GA
Pierce County Jail GA
Pitt County NC
Pittsylvania County Jail
Polk County Jail NC
Pulaski County Jail GA
Putnam County Jail GA
Randolph County Jail GA
Randolph County Jail NC
Richmond County Jail NC
Robeson County Jail NC
Rockbridge Regional Jail VA
Saluda County Jail SC
Sampson County Detention Center NC
Schley County Jail GA
SCORE – South Correctional Entity
Siskiyou County Jail CA
Stanly County NC
Stokes County Jail NC
Taylor County Jail GA
Telfair County Jail GA
Thomas County Correctional Institution GA
Toombs County Jail GA
Treutlen County Jail GA
Twiggs County GA
Vance County Jail NC
Wake County Jail NC
Walton County Jail GA
Washington County GA
Washington County FL
Washington County NC
Wayne County Jail GA
Wayne County Jail NC
White County Jail GA
Whitfield County Jail GA
Wilkes County Jail Main NC
Wilkes County Female Annex NC
Williamsburg County Jail SC
Wilson County Jail NC
Worth County GA
Wyandotte County Detention Center KS
Yadkin County Jail NC
York County Prison SC</i><br />Target victim <b>website</b>: <i>paytel.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Habitat-for-Humanity-of-Greater-Sioux-Falls-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24199</link>
<guid>c7fdc5f5c63fbdc92af9e5df3721ed6b</guid>
<pubDate>Thu, 26 Jun 2025 00:16:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Habitat-for-Humanity-of-Greater-Sioux-Falls-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42476bd895a15983363f893004ba079f265bca4bf50148795b753e0f1317b5c4</i><br /><br />Threat actor <b>description</b>: <i>We build, preserve & advocate for affordable housing.
Habitat for Humanity of Greater Sioux Falls is committed to improving the quality of life, health and economic prosperity of our community through shelter. Eligible residents of Minnehaha            ...</i><br />Target victim <b>website</b>: <i>siouxfallshabitat.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>AEROBLOX</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24192</link>
<guid>45c279002a2f09dafffe35f3ca26f309</guid>
<pubDate>Wed, 25 Jun 2025 21:36:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>AEROBLOX</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30655b157ac20593b92ea4dd8a684968a91904909373d5d1532aac30c0e4d877</i><br /><br />Threat actor <b>description</b>: <i>Optimizing for What’s Next
 

The AEROBLOX platform is currently undergoing optimization to better serve your tokenized assets.  Smart contracts are syncing. Protocols are refining. Value engines are recalibrating.

Your wealth is safe            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wilsonville-Toyota-Scion</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24195</link>
<guid>2200c4dbfad5f09e8d6af066c26e2863</guid>
<pubDate>Wed, 25 Jun 2025 15:20:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Wilsonville-Toyota-Scion</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>424e2fdd0bdf19caad425f45f7a9eaab921daee297162224484330c9c86aa916</i><br /><br />Threat actor <b>description</b>: <i>Wilsonville Toyota-Scion is a new and used car dealership company. It provides a variety of vehicles, including coupes, convertibles, hatchbacks, sedans, and passenger vans. The company was formed in 2007 and is based in Wilsonville, Oregon</i><br />Target victim <b>website</b>: <i>wilsonvilletoyota.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Positive-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24194</link>
<guid>4b4053f74ead8706cc643fccdbb9c85c</guid>
<pubDate>Wed, 25 Jun 2025 15:20:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Positive-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>006b812c9ce7b848e94bebba5dc0df8c2efc0a8d172effc10dc770e19a2a16d2</i><br /><br />Threat actor <b>description</b>: <i>Positive Solutions High School offers a flexible learning environment with a split session format and a College Credit Program, enabling students to earn college credits while completing high school. The school empowers students with resources for future employment and personal success, emphasizing academic excellence and student accountability.</i><br />Target victim <b>website</b>: <i>https:positivesolutions.school</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Medical-Center-of-Marin</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24185</link>
<guid>e7c3bf43a683b8e7d5e4f103b16de6e7</guid>
<pubDate>Wed, 25 Jun 2025 14:47:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Medical-Center-of-Marin</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d22a9742d87dd12cd38ead82f09d6cce23b08fe6c1eeeb0017ec83f8d9162bb7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tecore</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24189</link>
<guid>d778dda0358a70c62a4ee6e61f33829d</guid>
<pubDate>Wed, 25 Jun 2025 14:44:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Tecore</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>69cdebad59b303086a8346c466914d492040d53953721eba77b6f094a6bf7b42</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1991 and headquartered in Hanover, Maryland, Tecore Networks has been a supplier of 2G, 3G, 4G and 5G-ready wireless network infrastructure. Tecore Solutions
Tecore Networks is a global supplier of All-G mobile networks that provi            ...</i><br />Target victim <b>website</b>: <i>www.tecore.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cutcliffe-Archetto--Santilli</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24191</link>
<guid>b4839d20c9a13ccf4a0a61b863bdd56c</guid>
<pubDate>Wed, 25 Jun 2025 14:10:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Cutcliffe-Archetto--Santilli</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a790bdff027a90e54f8613e1d5f31cd39f8c4f937b658e350a1a1294b775c2a</i><br /><br />Threat actor <b>description</b>: <i>Cutcliffe Archetto & Santilli is a prominent law firm b
ased in Providence, RI, offering a range of comprehensi
ve legal services.

Here is the access to 4GB of essential corporate data. 
You will find a lot of documents with client personal i
nformation as DOB, DOD, SSNs, phone, address, emails, c
redit cards, medical reports and so on.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

   Open uTorrent, or any another torrent client.
   Add torrent file or paste the magnet URL to upload 
the data safely.
   Archives have no password.

MAGNET URL:
magnet:?xt=urn:btih:1B1781318DD708B8E816F251702CFD59643
875E8&dn=caslawri.com&tr=udp://tracker.openbittorrent.c
om:80/announce&tr=udp://tracker.opentrackr.org:1337/ann
ounce
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pennant-Park</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24186</link>
<guid>e65e15c993a8ecd9e90f3d243203a2a4</guid>
<pubDate>Wed, 25 Jun 2025 12:12:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Pennant-Park</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0095612a9a874b813362c872f5b85bc93d5b3616f0bef7c2539850d2f142d8b7</i><br /><br />Threat actor <b>description</b>: <i>PennantPark is an independent middle market credit provider speci
alizing in targeted exposure to core middle market credit.

We are ready to upload more than 6 GB of documents such as: emplo
yee documents (SSNs, IDs, passports, DLs, and so on), financial d
ata, confidential reports, client data, etc.
</i><br />Target victim <b>website</b>: <i>pennantpark.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>CMI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24184</link>
<guid>85fb8f045570014b485523879fc3ab0b</guid>
<pubDate>Wed, 25 Jun 2025 10:36:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>CMI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e920bc21c177ad9678dd97e6dba577b05dba75cb4d4dd5724de32d91dc58a073</i><br /><br />Threat actor <b>description</b>: <i>Credit Mediators Inc. specializes in commercial B2B debt recovery and collection services, offering solutions such as direct collect, letter series, outsourcing, and bankruptcy turnaround services. With over 40 years of experience, CMI serves            ...</i><br />Target victim <b>website</b>: <i>www.cmiweb.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>tdunhamcpa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24179</link>
<guid>e17d574a9ac6743fda8847722a2ce8c3</guid>
<pubDate>Tue, 24 Jun 2025 21:13:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>tdunhamcpa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fee738ca538d81c179b2ec593f5b9e0db903983bebf7ff50484edf193a9dff80</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "tdunhamcpa.com" represents the online presence of Tracy Dunham, a Certified Public Accountant (CPA) based in Jackson, Wyoming. She specializes in tax preparation, planning, and representation for small business owners, individuals, estates, and trusts. Her services also extend to bookkeeping, payroll, QuickBooks consulting, and financial planning.</i><br />Target victim <b>website</b>: <i>tdunhamcpa.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>lurie-glass</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24168</link>
<guid>ff67b4f15981e27c157d955922c4e509</guid>
<pubDate>Tue, 24 Jun 2025 19:34:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>lurie-glass</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>867247b949050635847ae6f849a91de84c756a4e379edc4e7d002c3bdfa8ca45</i><br /><br />Threat actor <b>description</b>: <i>Lurie Glass has been providing high-quality glass and glazing services to southe...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.covenanthealth.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24169</link>
<guid>e59dbe69c119b5d59e91b9b630dadc05</guid>
<pubDate>Tue, 24 Jun 2025 19:34:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.covenanthealth.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ee50f8214edc464c5dd7a669e836febc684c65b1f8e3568ad8caecba345c6a4</i><br /><br />Threat actor <b>description</b>: <i>Covenant Health of Tewksbury, Mass, an innovative, Catholic regional health delivery network and a leader in values-based, not-for-profit health and eldercare. Covenant Health consists of hospitals, skilled nursing and rehabilitation centers,            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Datrose</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24172</link>
<guid>69a439a315090bb3660bf73909829363</guid>
<pubDate>Tue, 24 Jun 2025 19:34:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Datrose</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe6a3797ff8a9c753cc7c7a37a3afce62bf814c1cbfa2eed189512e3ef34a9f3</i><br /><br />Threat actor <b>description</b>: <i>Datrose, founded in is a business outsourcing company that offersdocument management, mail services, contact center solutions, accounts payable, and staffing services.We are ready to upload more than 5 GB of corporate documents suchas: confidentiality agreements, numerous docs containing personal employee information (SSNs, DOB, emails, address), financial data (payment details, invoices), NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Integrity-Mortgage</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24173</link>
<guid>945beadd1794ee1affd8a65dad8b844e</guid>
<pubDate>Tue, 24 Jun 2025 19:34:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Integrity-Mortgage</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1cd408410c462b0503e9638ec305a71e1f83bb5991b239f75b3c176bc98e6691</i><br /><br />Threat actor <b>description</b>: <i>Integrity Mortgage operates under the MAC 5 Mortgage umbrella andhas an A  rating with the Better Business Bureau.We are ready to upload more than 8 GB of essential corporate documents such as: detailed personal client data (scans of passports,SSNs, DLs, credit cards and so on), detailed company financial data (audits, payment details, reports, invoices), correspondence,etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Keystone-Shipping</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24174</link>
<guid>16db7db24367bf438df20ad57112c8e0</guid>
<pubDate>Tue, 24 Jun 2025 19:34:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Keystone-Shipping</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da1736ef67989c7bd27d8f7b2b9eae4c53ed6d07659ad7692e62a819b00367c8</i><br /><br />Threat actor <b>description</b>: <i>Keystone is a U.S. shipowner and operator founded in Philadelphiain 1909.We are ready to upload corporate documents such as: personal information of employees (DOB, phone, email and so on), detailed financial data (payment details, reports, invoices, salaries, bonuses), corporate NDAs, cargo ship blueprints, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>hawaiiunified.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24175</link>
<guid>2a3eac42d756ec782ecca7dcd94259d7</guid>
<pubDate>Tue, 24 Jun 2025 15:45:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>hawaiiunified.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bde240009be8f006b14b7e6f9aa5c46b4ebfe25ca6b2b2147e1a5cdbeef3efb1</i><br /><br />Threat actor <b>description</b>: <i>HAWAI'I UNIFIED is a licensed General Contractor, Electrical Contractor, Plumbing Contractor, Steel Door Contractor, and Fencing Contractor providing services t... - We hacked Hawai'i Unified. Today, we disclose 65 GB of data.
</i><br />Target victim <b>website</b>: <i>hawaiiunified.com</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Lowell-Hotel-New-York</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24177</link>
<guid>2e99e68e7c01590f28bf0b64e645f856</guid>
<pubDate>Tue, 24 Jun 2025 15:17:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>metaencryptor</b> claims attack for <b>The-Lowell-Hotel-New-York</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>70745da999329c5eabbe2d68e8089c0f2e863e855f7950c2bab646d99d3e7201</i><br /><br />Threat actor <b>description</b>: <i>The Lowell is a New York legacy and a landmark luxury hotel, located near Central Park and all the wonderful shops of Madison Avenue. Established in 1927.</i><br />Target victim <b>website</b>: <i>www.lowellhotel.com</i>]]></description>
<category>metaencryptor</category>
</item>
<item xmlns:dc='ns:1'>
<title>Access-Financial</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24165</link>
<guid>2bd0503ff12d7a8e6873ba059ea0a2c3</guid>
<pubDate>Tue, 24 Jun 2025 11:41:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Access-Financial</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>022c7d52ad5ec7197b088eacfe8e6ad165314f890529877115709c1be5479f8b</i><br /><br />Threat actor <b>description</b>: <i>Access Financial is the leading global provider of contract manag
ement, outsourced payroll and umbrella services.

We are going to upload another 13 GB of corporate data. Confident
ial agreements, correspondence, personal documents of employees (
passports, death\birth certificates, other hr files), financials 
(audits, payment details, reports), NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Myrtue-Medical-Center-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24164</link>
<guid>63515bad9f509b6783009bc4bca0162e</guid>
<pubDate>Tue, 24 Jun 2025 09:15:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Myrtue-Medical-Center-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f89d0a3ca8e5a0c768fd019b27554ac88611d8db5980d5a3e08322dfaaa3989</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Myrtue Medical Center Hospital is a healthcare facility located in Harlan, Iowa. It offers a wide range of services, including general medical and surgical care, emergency services, lab testing, radiology, and rehabilitation. The hospital is part of Myrtue Medical Center, which also includes clinics and home health services. They are committed to providing high-quality, personalized healthcare to the community they serve.</i><br />Target victim <b>website</b>: <i>www.myrtuemedical.org</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lexington--Richland-County-School-District-Five</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24163</link>
<guid>d8c3b11e26ab89d9712734aac8765677</guid>
<pubDate>Tue, 24 Jun 2025 07:47:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Lexington--Richland-County-School-District-Five</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>68a8549335e0d4b15313f9299fe7aa9336fcb1fa78d2dd662720e54993c6349a</i><br /><br />Threat actor <b>description</b>: <i>School District Five of Lexington & Richland Counties, commonly referred to as District Five, was organized by action of the Lexington County Board of Education in 1951 and the Richland County Board of Education in 1952. The school district has three attendance areas: Chapin, Dutch Fork, and Irmo. District Five operates elementary schools, intermediate schools, middle schools, high schools, a Center for Advanced Technical Studies and an alternative school.</i><br />Target victim <b>website</b>: <i>lexrich5.org</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arlington-Occupational-Health-and-Wellness</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24160</link>
<guid>d61bc8a71e83b3799b433cf0b29a36e4</guid>
<pubDate>Tue, 24 Jun 2025 02:25:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Arlington-Occupational-Health-and-Wellness</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3fc917505a8cc7f47727b7da0accdcf7b691c8108623d878a4aa5058321d00e3</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Arlington Occupational Health and Wellness, located in Arlington, Virgin, offers a comprehensive array of health services to businesses. Their services include fitness-for-duty evaluations, immunizations, and health exams that are designed to improve and maintain workplace health and safety. Their team of healthcare professionals is dedicated to providing customized, efficient, and high-quality health solutions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Katz--Doorakian-Law-Firm-P.L.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24158</link>
<guid>8e0c4a20ac8766a81dd8d74bb236e889</guid>
<pubDate>Tue, 24 Jun 2025 02:24:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Katz--Doorakian-Law-Firm-P.L.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da2d15b69badd8d210f4cc00a8575521131bc2bf9dff294f767fd10c17672bc9</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Katz & Doorakian Law Firm, P.L. is a law firm based in Northville, Michigan. Their team of experienced attorneys specializes in a wide range of legal areas including business law, criminal defense, family law, real estate law and estate planning. They are dedicated to advocating for their clients' rights and guiding them through the legal process. They pride themselves on their personalized and thorough approach to their clients' legal matters.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Avantic-Medical-Lab</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24156</link>
<guid>9dc69f4a9d78d28dc1ba5697a159c546</guid>
<pubDate>Tue, 24 Jun 2025 02:23:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Avantic-Medical-Lab</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>70e13a4fb9267f445f0dafdaa02f3830772305fb82db604cb139cbfed7bc0283</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "Avantic Medical Lab" is a state-of-the-art diagnostic laboratory specializing in providing high-quality medical lab testing services. They use the latest technologies for accurate and timely results. Services include blood tests, urinalysis, microbiological testing, molecular diagnostics, and more. Their experienced team emphasizes patient care and data security, providing services for individuals, healthcare providers, and corporations.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fishman-Larsen--Callister</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24157</link>
<guid>ae5e5d97ec37b67fcd007bb1657f879b</guid>
<pubDate>Tue, 24 Jun 2025 02:23:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Fishman-Larsen--Callister</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da58dc7a0290f19ec13c5f3cedf0b0b3c0716267d620258f8f0e9dc3b345a427</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "Fishman, Larsen & Callister" is a full-service law firm based in Fresno, California, USA. Their team of experienced attorneys specializes in several areas of law, including corporate, real estate, litigation, labor & employment, and estate planning. The firm is dedicated to providing the highest quality legal services, emphasizing professionalism, integrity, and attention to detail.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>hy-vee.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24155</link>
<guid>045020ae3a56c185c69e8984ecf61415</guid>
<pubDate>Mon, 23 Jun 2025 22:27:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>hy-vee.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>09d94b1387a12095c78de5c08d69754440f6594d4b8f6c28d91050d0e1dac482</i><br /><br />Threat actor <b>description</b>: <i>Access to Hy-Vee’s environment was obtained through compromised Atlassian accounts, including tools such as Confluence and Jira.
                             Internal documents, infrastructure diagrams, employee data, training materials, and technical information related to several operational systems were extracted. These include:</i><br />Target victim <b>website</b>: <i>hy-vee.com</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>mccn.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24154</link>
<guid>1eebbb55fd7a6ade3787002e5f87ceab</guid>
<pubDate>Mon, 23 Jun 2025 21:14:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>mccn.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e09b6cf21e83a03f51f5f3b0a724c2041311c823c6a043ebe86992abf18977df</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>mccn.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Scherzinger</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24150</link>
<guid>8ec959b57278128ac65607f07812f0fd</guid>
<pubDate>Mon, 23 Jun 2025 20:53:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>Scherzinger</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e97f2688141f839a3da51fcf5488218ff05da64f6a9a6da3a5ace0d420d111e8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Estes-Forwarding-Worldwide</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24144</link>
<guid>0fbdcafcce2cb11f51c99c4d667b1488</guid>
<pubDate>Mon, 23 Jun 2025 19:32:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Estes-Forwarding-Worldwide</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3785f044072d26c98e9a92d050c9fe47ce190e0dfbdc092fbe7bb815da93e73d</i><br /><br />Threat actor <b>description</b>: <i>Estes Forwarding Worldwide (EFW) is a leading provider of high-touch, door-to-door logistics and freight forwarding solutions. Headquartered in Richmond, Virginia, and a subsidiary of Estes—the largest privately held freight transportation             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>mlderm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24152</link>
<guid>27f0681af3b501d1a5e313be097da0a6</guid>
<pubDate>Mon, 23 Jun 2025 19:21:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>mlderm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad285a5a6e5edb5841e2ebfd50cc5e5097f324f8d06655b8581c472f3f413453</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] MLDerm is a beauty product online store specializing in skincare products treating Melasma. It utilizes various technologies to achieve its goal of restoring and maintaining healthy skin. The company prides itself on using scientific research, allowing it to develop effective and safe products. With a team of aesthetics professionals, they provide continuous improvement and new developments in their product line.</i><br />Target victim <b>website</b>: <i>mlderm.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Agganis-Driving-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24145</link>
<guid>598a3242360f1b7afc0b59475de711f7</guid>
<pubDate>Mon, 23 Jun 2025 18:32:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Agganis-Driving-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>07b03946e7c4b815503c80f43cffc6599b0f59a64f2b2a0d21d673948cb12014</i><br /><br />Threat actor <b>description</b>: <i>Agganis Driving School offers a comprehensive driving program that includes classes, road tests, and specialized training such as defensive driving techniques. ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hilliard-Enterprises</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24146</link>
<guid>712ac39ad32d1f36e2afc3388d9dec86</guid>
<pubDate>Mon, 23 Jun 2025 18:32:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Hilliard-Enterprises</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>672b12b419cac7d02f90228ee048f8557d0c719c23050bcb4bef79b0d538b82d</i><br /><br />Threat actor <b>description</b>: <i>Hilliard Enterprises, Incorporated specializes in the worldwide sale, service, and parts supply for used locomotives and marine engines. They pride themselves o...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brown--Winters</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24147</link>
<guid>16ed29ce607dd940ec33787f09b61d93</guid>
<pubDate>Mon, 23 Jun 2025 18:32:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Brown--Winters</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6369fcc9299cffd5a8aed79427e54eda969e83484500415302b933c3a922a5f6</i><br /><br />Threat actor <b>description</b>: <i>(Including customer data and email) Brown & Winters is a specialized environmental and environmental insurance law firm operating in California, serving public ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brown--Brown-PC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24148</link>
<guid>4cf7fbdf88b8e8dc6f99b975754493e4</guid>
<pubDate>Mon, 23 Jun 2025 18:32:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Brown--Brown-PC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>15847693de2203a1781bfdfa1b4df77ec097a5eaf3a354706ddc76dfe26764aa</i><br /><br />Threat actor <b>description</b>: <i>(Including data of several thousand customers) Brown & Brown, P.C., provides the comprehensive legal service and personal, life-long attention of a general prac...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ovalstrapping</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24139</link>
<guid>9c3cfdc8a01e0b6d22a4cec0ab80440a</guid>
<pubDate>Mon, 23 Jun 2025 01:59:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Ovalstrapping</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b02af8dd359467d241fa0832936c2c7d1dc14719dfd78436f51057b8cff8aedd</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Telcom-Insurance-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24140</link>
<guid>542b9ce5413bbceea136fecb513df4c3</guid>
<pubDate>Mon, 23 Jun 2025 00:15:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Telcom-Insurance-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0418b092a5163569e7d4c207dc2aad86e24a269798c941db36dc997e10fcc282</i><br /><br />Threat actor <b>description</b>: <i>Telcom Insurance Group specializes in providing business insurance solutions tailored for the telecommunications industry, including cybersecurity, worker's compensation, and directors and officers insurance. The company offers comprehensive property and casualty products through partnerships with reputable insurance providers. Their services also include risk management consulting, loss prevention, and claims advocacy, ensuring clients receive customized and trusted support. Telcom Insurance Group aims to support rural telecommunications organizations with quality service and competitive premiums.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fisher59</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24137</link>
<guid>c1474f1081f34c3e501e95ac5e9627e9</guid>
<pubDate>Sun, 22 Jun 2025 22:44:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Fisher59</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7db52e83ffe30bd5c31a1aa4671214647873e9f0b70faad9983e14f6294b7c02</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dairy-Farmers-of-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24136</link>
<guid>4285f654d1785debf268b92614923237</guid>
<pubDate>Sun, 22 Jun 2025 20:45:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Dairy-Farmers-of-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d54a13f4a9c6c1328da2d0b2047b732deb587bcd1413a6f0c6215853a8659046</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>etoscapitalasia.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24138</link>
<guid>91caf8baf768a5cc1a69f73a26e173dd</guid>
<pubDate>Sun, 22 Jun 2025 20:15:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>teamxxx</b> claims attack for <b>etoscapitalasia.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d013eb3ada76767041c55e53e144f24d36710df03e23d172ae0e2dc977851f5e</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>etoscapitalasia.com</i>]]></description>
<category>teamxxx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wisconsin-Judicare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24131</link>
<guid>6e4150c261d1fa9881f7f90ea71f0f23</guid>
<pubDate>Sat, 21 Jun 2025 20:43:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>silent</b> claims attack for <b>Wisconsin-Judicare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>483d7e688b2849c522b474c1f4952a69b89be3ba1b2d6ad67ac6408afaf5ad98</i><br /><br />Threat actor <b>description</b>: <i>Country: United States | Revenue: 7.10M USD | Employees: 35 | Tags: </i><br />Target victim <b>website</b>: <i>judicare.org</i>]]></description>
<category>silent</category>
</item>
<item xmlns:dc='ns:1'>
<title>rioglass-solar</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24129</link>
<guid>78c58f11547724e65c6fde2ddc7dfdfc</guid>
<pubDate>Sat, 21 Jun 2025 19:24:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>rioglass-solar</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>51b374d391000e657548b8444d8f0f69a3cc3a5c71adf63b2b438e1b6f53abc5</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2007, Rioglass Solar is now the largest CSP mirror supplier in the world with cutting edge production facilities in Spain, the United States and South Africa. Rioglass Solar has supplied worldwide more than seven million mirrors fo            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>OAK-PARK--RIVER-FOREST-HIGH-SCHOOL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24127</link>
<guid>635b616c7d29a7c2a118dc59a578d053</guid>
<pubDate>Sat, 21 Jun 2025 13:03:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>OAK-PARK--RIVER-FOREST-HIGH-SCHOOL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbb6a7e00a086f34a1d3f91ce6dacbb337fae10ecee1114e5b834b851ed7372e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Collision-amp-Classics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24124</link>
<guid>bab5a177611b396bd0a930cafb6b1c54</guid>
<pubDate>Sat, 21 Jun 2025 06:52:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>Collision-amp-Classics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>745e765592bbb8ca2efaf10174046184df4a55effc7191321ec1e05e2eecf34e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Levinzon-CPA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24123</link>
<guid>b16a9e8de58c95b427b29472b1eca130</guid>
<pubDate>Sat, 21 Jun 2025 02:26:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Levinzon-CPA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52e227b55c2a39b069252b79f0fcd757a5583376b7919995c612b3778ef56d9c</i><br /><br />Threat actor <b>description</b>: <i>Whether you're an employee relocating to the U.S, a domestic or foreign investor...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>doradosoftware.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24122</link>
<guid>251b4805008712ec04e69c6569bfb189</guid>
<pubDate>Fri, 20 Jun 2025 22:50:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>doradosoftware.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b86a815da1d2aa3cbf6a1df3fd55dbdadeb91a3404f882967b7077cd01348db0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>AXT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24113</link>
<guid>5d2592e8bab5112c7d161e133eade524</guid>
<pubDate>Fri, 20 Jun 2025 13:23:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>AXT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ede4f0d2aacb881b39f2a4910a50d51dbc8a7221ffc2bdfb533a0cfdaff4f77</i><br /><br />Threat actor <b>description</b>: <i>AXT, Inc. designs, develops, manufactures, and distributes compound and single element semiconductor substrates. The company offers indium phosphide for use in ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>cisin.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24115</link>
<guid>cf3064dbc013dc19f7f5d954436cd3a8</guid>
<pubDate>Fri, 20 Jun 2025 12:37:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>J</b> claims attack for <b>cisin.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>78cd4311bbcb4b4a2990e6ad14d479cf7111b1e8a6eead7928d412ea1b64a655</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Cyber Infrastructure Pvt. Ltd. (CIS), known as cisin.com, is an IT service provider company that develops and delivers customized solutions in software development, mobile app development, AI, and cloud solutions. With the help of its 1000+ experts, CIS offers a unique blend of offshore and onshore client engagement models for startups, SMEs, and large enterprises worldwide. It is headquartered in India with multiple global offices.</i><br />Target victim <b>website</b>: <i>cisin.com</i>]]></description>
<category>J</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vacation-Myrtle-Beach</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24106</link>
<guid>eb95aa2ba2ac0cb7a0fac8c427efdd4a</guid>
<pubDate>Thu, 19 Jun 2025 20:48:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Vacation-Myrtle-Beach</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ec93bd8603204a64118460c2232b98656ada4538bfb5e9c8170db9cae33d9fd</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>taoscounty.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24108</link>
<guid>5ccfc67c31fa6a9d5c29bc3a093bf779</guid>
<pubDate>Thu, 19 Jun 2025 20:15:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>taoscounty.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ab6104a5b90a80e3fda91af90d5744ac0d4852e7b8f546ac102e3466edf5a06</i><br /><br />Threat actor <b>description</b>: <i>USA - Taos County</i><br />Target victim <b>website</b>: <i>taoscounty.org</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Place-Homes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24100</link>
<guid>f29c0f1c5f3cc955ceed26b4a4d6e1d9</guid>
<pubDate>Thu, 19 Jun 2025 18:53:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Place-Homes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a2709d1fcdc1d5803fdfe561bc53a43f9e39b5c627b1b2e0cfe93f9325a3c691</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>glwholesale.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24098</link>
<guid>c13aa14c57d4ad455bc0694eb98ea14b</guid>
<pubDate>Thu, 19 Jun 2025 18:22:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>glwholesale.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22a49da067e5cb6eab2081038da7ee0cb0d13d8635360c905f2872988163abe9</i><br /><br />Threat actor <b>description</b>: <i>Great Lakes Wholesale Group is a retail store supplier providing quality wholesale Health & Beauty, Household, General Merchandise, OTC, Pet, Grocery and other wholesale merchandise for local, national and international discount, convenience            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Highlands-Oncology-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24095</link>
<guid>f0716095e731ef88a54661b5041006b6</guid>
<pubDate>Thu, 19 Jun 2025 17:37:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Highlands-Oncology-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e40eb74bfc914c1173ec64778d5d160f223079e73a1bae167472f6f5b2942e31</i><br /><br />Threat actor <b>description</b>: <i>Highlands Oncology Group provides healthcare services in the scope of cancer treatment. (https://www.highlandsoncology.com/) Company is headquartered in 60 E Monte Painter Dr, Fayetteville, Arkansas,... Some of the services they provide include chemotherapy, diagnostic imaging, radiation therapy, and more.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpswww.ilesfuneralhomes.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24099</link>
<guid>dc7e93f32b3083f13ad7fe95f4966d93</guid>
<pubDate>Thu, 19 Jun 2025 16:51:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>httpswww.ilesfuneralhomes.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bfd7fdb61c6a88c5587933f5e7ceb2659ebf4e56abc9d1d03dcac821944785f1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>RW-Engineering-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24092</link>
<guid>e0ecb3873e6e419111b667b4a9e80467</guid>
<pubDate>Thu, 19 Jun 2025 15:15:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>RW-Engineering-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c8ed2270c929933beeb091d8c6b9d827d9143af01c1f34601823ad8976f0b75</i><br /><br />Threat actor <b>description</b>: <i>R&W is an engineering company. (https://rweng.com/) Company is headquartered in 9615 SW Allen Blvd., Suite 107 Beaverton, OR 97005. The total amount of data leakage is 676.5 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>fiestafranchise.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24086</link>
<guid>4a55dbdc6c16615070050599ef141d44</guid>
<pubDate>Wed, 18 Jun 2025 22:23:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>fiestafranchise.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>187fa7be453b943289d5a0400fda0370171bb21a8ca86a7dfc14901d0962617a</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 30.06.2025.Founded in 1999 and headquartered in Santa Ana, California, Fiesta Auto Insurance Centers operates as an insurance brokerage firm. The firm offers auto insurance and tax pr            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>nardinifire.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24077</link>
<guid>7c183cc9f054941affeb40a2029fa871</guid>
<pubDate>Wed, 18 Jun 2025 21:23:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>nardinifire.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d136da68787465dc26ec49b1319cfb1fdc6fdfb2cdbba64e3f51bd953dc11c76</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 28.06.2025.Nardini Fire Equipment is a family owned and operated company based in Minnesota and North Dakota, specializing in complete fire protection solutions for businesses of all             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>hparchitecture.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24078</link>
<guid>aa0792521918c87688e46598dd2171cc</guid>
<pubDate>Wed, 18 Jun 2025 21:23:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>hparchitecture.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d541abee35273638898382285da3aaaa9040eb265c9d3e599198722b8f8224ae</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 30.06.2025.A Chicago-based architectural, planning and interior design firm that has been in business nationally since 1987.
1.A memo from the architectural and development team sent            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>accu-search.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24081</link>
<guid>75b3ce485b8e53892347e39b6b00ee89</guid>
<pubDate>Wed, 18 Jun 2025 21:23:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>accu-search.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>13dc40d37a8e94f2442b532f04bf1eb48e18b076fd551fff9e8742606ee47ba3</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 30.06.2025.Established in 1984, Accu-Search Inc.'s Edmonton and Calgary offices have grown to become the largest provider of NUANS® corporate name search and incorporation services i            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-Jersey-Association-on-Correction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24083</link>
<guid>fbcb037387e821a6b1898467b076c0d5</guid>
<pubDate>Wed, 18 Jun 2025 18:57:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>New-Jersey-Association-on-Correction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3f1aca1c8a5b7b2d37ef4570667aad72305c95750e6de4564805b10bb38d00c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>West-Texas-Oral-and-Facial-Surgery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24067</link>
<guid>e9947b970456f26dd9fe5f427ded41fa</guid>
<pubDate>Wed, 18 Jun 2025 01:53:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>West-Texas-Oral-and-Facial-Surgery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6253579ba0a8394992a8a604fbfde9db9a4a5f37f1d43a7c32dbf1070009d39e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Huesman-Schmid-Insurance-Agency</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24059</link>
<guid>ae4a7f24198fdd65303c7b5b7744c229</guid>
<pubDate>Tue, 17 Jun 2025 22:23:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Huesman-Schmid-Insurance-Agency</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d52d3c4cdc231ac31d61a18f8623150460968ad413326d800dc286401faff2c</i><br /><br />Threat actor <b>description</b>: <i>(including client documentation and email) Huesman Schmid Insurance Agency is a company that operates in the Insurance industry. It employs 10to19 people and ha...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trackside-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24061</link>
<guid>f0413389b899baa7224d3b3343160f5f</guid>
<pubDate>Tue, 17 Jun 2025 22:23:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Trackside-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ebe2fd26a5eec6b00de9931529eab414cdb1f44e96a6bc322795408348b26dd</i><br /><br />Threat actor <b>description</b>: <i>Trackside Services, Inc. manufactures and sells new and remanufactured hydraulic and pneumatic braking systems that eliminate human error, reduce car damage, mi...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clayton-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24062</link>
<guid>ebd83293e15f358a34de4f3e805d8469</guid>
<pubDate>Tue, 17 Jun 2025 22:23:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Clayton-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7be3657a08527ce7e7a146a23c1e7a0a34e31020c7997f80202934e0c2088bc</i><br /><br />Threat actor <b>description</b>: <i>Clayton Construction Company, Inc. is a leading general contractor in the southeast, boasting over forty years of experience in delivering high-quality construc...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Strait-Steel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24063</link>
<guid>f51cf26546d2015352cabae5d9b01b81</guid>
<pubDate>Tue, 17 Jun 2025 22:23:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Strait-Steel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1350f713a9962c144f6822db6fb7d56d10d831192407dd81bc10a8e389f75e49</i><br /><br />Threat actor <b>description</b>: <i>Strait Steel Inc - an AISC Certified Company - specializes in structural steel fabrication with projects varying from 500 tons to 3500 tons, and single projects...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>membersourcecu.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24068</link>
<guid>a67ff68fb34113ac300af9dde46b8aec</guid>
<pubDate>Tue, 17 Jun 2025 22:16:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>membersourcecu.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>43e02e78a940e81c9a735c618d9da341cf3b6c445147a6d8a89e0523f24b6153</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] MemberSource Credit Union is a not-for-profit financial cooperative based in Texas, USA. It provides a wide range of tailored financial services to its members, including savings and checking accounts, consumer loans, credit cards, mortgages, and investment services. It is member-owned and committed to providing competitive rates and fees.</i><br />Target victim <b>website</b>: <i>membersourcecu.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alaffia</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24054</link>
<guid>042237eae50957fe509d3de0ea08f7e1</guid>
<pubDate>Tue, 17 Jun 2025 21:22:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Alaffia</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8475d9ff6900b338dbe6d0a19f6172046d4ee6087e746d03370b6013dd84f01</i><br /><br />Threat actor <b>description</b>: <i>Alaffia was founded in 2003 in the Olympia, Washington garage of husband and wife team, Olowo-n'djo Tchala and Prairie Rose Hyde. Alaffia crafts popular beauty ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>TSE-Industries--WHK-Biosystems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24055</link>
<guid>14842d88d35923228fc2b4d02d744dd2</guid>
<pubDate>Tue, 17 Jun 2025 21:22:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>TSE-Industries--WHK-Biosystems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af1a262af48269fdf87f5cde5da800e1ca1cd52a9033c9a7ed702e7666ce58cb</i><br /><br />Threat actor <b>description</b>: <i>TSE Industries Inc is a manufacturer of custom-molded plastics, rubber parts, and elastomers. It is based in Clearwater, Florida.
Established in 2012, WHK BioSy...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>TN-CPA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24056</link>
<guid>82c3cf12914d43d34d8883ec88307da2</guid>
<pubDate>Tue, 17 Jun 2025 21:22:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>TN-CPA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac45106e36ce50abf87da48df42a9183cee18f1b77b360dfa019990bec2f1f0c</i><br /><br />Threat actor <b>description</b>: <i>(including databases and email) TN CPA offers expert financial solutions and accounting services tailored for businesses in Texas. Their services include tax pl...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>macedonia.oh.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24066</link>
<guid>6546822e37fb3be79b5fe7e92e11087c</guid>
<pubDate>Tue, 17 Jun 2025 19:44:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>macedonia.oh.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1553aefb543fe033226efa4f95aa4df7262f43b1fdaa8ac5b6ea0f13810387b</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>macedonia.oh.us</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ess-Brothers--Sons</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24050</link>
<guid>9a8bf55dbb149d31677a2bb1a3370224</guid>
<pubDate>Tue, 17 Jun 2025 19:22:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Ess-Brothers--Sons</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29d2d40ecaccc34ebb5ad299103c2b2eebde79a509474188734aa1b0765bad30</i><br /><br />Threat actor <b>description</b>: <i>Ess Brothers and Sons' mission is to provide products and services, in an honorable way, that exceed the expectations and needs of each and every one of our cli...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Metropolis-Country-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24051</link>
<guid>f0838b2ebfc6440a474eabdc326bf31a</guid>
<pubDate>Tue, 17 Jun 2025 19:22:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Metropolis-Country-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4327320c1fd6461ab791a23d19a30bc1888af5651cd45723e2546a3a058df16</i><br /><br />Threat actor <b>description</b>: <i>Metropolis Country Club offers a variety of membership options and recreational activities including golf, racquets, and aquatics. The club features a golf cour...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Durant-City</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24046</link>
<guid>3cdc0a294d55c26d6d656877c731d24d</guid>
<pubDate>Tue, 17 Jun 2025 14:51:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Durant-City</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6e89049ed6aad589bcbe1d519194bb750a6dc5900d2e8fc4ea479f9a841b756b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Academic-Urology--Urogynecology-of-Arizona</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24045</link>
<guid>ffad99a1f556e0e0595aec7b8060662d</guid>
<pubDate>Tue, 17 Jun 2025 13:07:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Academic-Urology--Urogynecology-of-Arizona</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5af922310aafb7b099cdb9d1db7a24066310f45bf79c7949a22e9a33a253fcbf</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tufton-Capital-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24039</link>
<guid>f331c4fbb503a896dc1ad1614a663b9b</guid>
<pubDate>Mon, 16 Jun 2025 21:28:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Tufton-Capital-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b642baafaea58ab233804ef034144901b74e54396db3f071684e76bb7bd614c4</i><br /><br />Threat actor <b>description</b>: <i>Tufton Capital Management is an independently owned wealth management and investment advisory firm serving high net worth individuals, families and institutions.We are going to upload about 3GB of corporate data. Numerous docswith client personal information as DOB, phone, address, emails are inside. Employee passports, driver licenses and other information can be found as well. Contracts, agreements and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>NF-Stroth--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24041</link>
<guid>109673a937086b08c10d3e25d277b682</guid>
<pubDate>Mon, 16 Jun 2025 20:48:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>NF-Stroth--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0577e5a5f963b50f5ea5c84825b9175a192b5533bb020715c1c965f33f20b3df</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jasper-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24040</link>
<guid>f4d4c95a4336cebe07df62e614f602f5</guid>
<pubDate>Mon, 16 Jun 2025 19:00:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Jasper-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1fd50326f374e4baa9e32cf5954fa442cb6fb1306384cb1333547f3e388cc4cd</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cutcliffe-Archetto-Santilli</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24036</link>
<guid>251713b2559f797b13ec939ab7550ac6</guid>
<pubDate>Mon, 16 Jun 2025 13:39:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Cutcliffe-Archetto-Santilli</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed652e9cab656fff5e50420d6f4351d9aa716d1438a9b55deef55d579e6fa356</i><br /><br />Threat actor <b>description</b>: <i>Cutcliffe Archetto & Santilli is a prominent law firm based in Pr
ovidence, RI, offering a range of comprehensive legal services. 

We are going to upload about 4GB of essential corporate data. You
will find a lot of documents with client personal information as
DOB, DOD, SSNs, phone, address, emails, credot cards, medical re
ports and so on.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clark-Mechanical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24031</link>
<guid>8474b8609e772af467ac0fc4acad4dd4</guid>
<pubDate>Mon, 16 Jun 2025 13:29:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Clark-Mechanical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f10d4d786904177657758b583243ff5c8d8bfc7efd0f80bc76cec250caa9b12</i><br /><br />Threat actor <b>description</b>: <i>The Clark Mechanical Company, LLC. is a privately owned, full service HVAC contracting firm. We provide a wide range of HVAC and plumbing services to commercial...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>CNPC-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24034</link>
<guid>c618f687f58d6f25fc50970accaa8fe6</guid>
<pubDate>Mon, 16 Jun 2025 13:04:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>CNPC-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>694ee8d5b8baf823ad5f9d5d4f38e604d4288032d5fb6370f70b2c33a50be357</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Strafford-County-NH</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24032</link>
<guid>1fb425070298bc615c24b69845387662</guid>
<pubDate>Mon, 16 Jun 2025 12:29:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Strafford-County-NH</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9028727c8d26ac4e2bc118634863698fda03364a5cb821ac6ae62c2af5ce019f</i><br /><br />Threat actor <b>description</b>: <i>Strafford County is a county in the U.S. state of New Hampshire. As of the 2020 census, the population was 130,889. Its county seat is Dover. Strafford County w...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Freedman-HealthCare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24029</link>
<guid>383d86008edae3a3a7e68c59c0da6dbe</guid>
<pubDate>Sun, 15 Jun 2025 21:44:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Freedman-HealthCare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8c1c18fdd3a302b290a56ccefeab22c8b0b78a460e4d4df81d590bdf1beadc35</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Freedman HealthCare is a Massachusetts-based consulting firm offering services in health policy development and strategic planning. Their primary mission is to advance healthcare systems to improve the quality, transparency, accessibility of health data and information. Their services span areas like health analytics, performance measurement, health information technology, and state health policy.</i><br />Target victim <b>website</b>: <i>freedmanhealthcare.com</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>spg.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24026</link>
<guid>803d1665f18163c7851eadf4f7ed6120</guid>
<pubDate>Sun, 15 Jun 2025 19:22:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>spg.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b6b60e3a3f97d122fb3b3e11d641836a8c704f7029e15fddac6157a68db7828</i><br /><br />Threat actor <b>description</b>: <i>The full leak will be published soon, unless a company representative contacts us via the channels provided. SPG Construction LLC specializes in heavy industrial construction and process systems for capital-intensive projects across the Unite            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>moserengineering.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24027</link>
<guid>544c335154f6eaf79e2dff463a852e78</guid>
<pubDate>Sun, 15 Jun 2025 19:22:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>moserengineering.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b64de5fdbd4f79f2939b12628d914f86a2e5e440fd6749cb553a61de92751f52</i><br /><br />Threat actor <b>description</b>: <i>The full leak will be published soon, unless a company representative contacts us via the channels provided. Moser Engineering manufactures and sells High Performance Rear-ends, drive-line components, brakes and suspension parts to the afterm            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rollex</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24020</link>
<guid>03b059d4abd989c7cc2d79e8fc008cea</guid>
<pubDate>Sat, 14 Jun 2025 22:45:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Rollex</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7eebaadcfe5310f9e0c92bd6dd8a3de09c2a63d658aef57f65ee55e491292c46</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brett-Robinson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24021</link>
<guid>82b9fe6d15e5952e1f5e597833d5fd95</guid>
<pubDate>Sat, 14 Jun 2025 22:13:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Brett-Robinson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb94219b85d60bf7cff8b643332904b6a86e5ee1f1a95868ee8d57fdaeac6368</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Brett-Robinson is a real estate development company based in the Gulf Shores and Orange Beach area of Alabama, United States. Founded in 1983, the company is known for its quality construction and resort-style beachfront condominiums. Besides real estate development, Brett-Robinson also provides vacation rental management and sales services.</i><br />Target victim <b>website</b>: <i>www.brett-robinson.com</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sacred-Heart-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24023</link>
<guid>1ea5e6f2837d15cbe7a9989bb9ff07af</guid>
<pubDate>Sat, 14 Jun 2025 19:19:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Sacred-Heart-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4537267700b5e63debd07f251d666abfa74240ca73364e7214d9e985c5c2ce8c</i><br /><br />Threat actor <b>description</b>: <i>Sacred Heart School this is a catholic school with about 25 employees. Sacred Heart School fosters the religious, academic and social developmen. In school, serving students of all faiths within a Christian atmosphere and school fosters the continuous growth of the faculty, the parents and the students.</i><br />Target victim <b>website</b>: <i>shscullman.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>SH-Express</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24022</link>
<guid>b2dc43f5ceef31610d294fa01c6e7399</guid>
<pubDate>Sat, 14 Jun 2025 18:56:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>SH-Express</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06b702501e4037cccfbe9db5c6036294ac5c2f9c5c883d0101c10ac1a4a2f7d7</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.sandhexpress.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>packagesteel.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24018</link>
<guid>72e7e3fda05043527dfd3e7376ff239c</guid>
<pubDate>Sat, 14 Jun 2025 18:13:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>packagesteel.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eaf8baaea829c5f60a7911c1f7b3d822331fe5d403f1b07d4ae8ec080fd572a2</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Package Steel Systems Inc. is a company based in Sutton, Massachusetts, which specializes in designing and fabricating steel buildings. They offer various products, such as custom-engineered buildings, barns, garages, and warehouses. They also provide services such as construction management, building erection services, and pre-construction services.</i><br />Target victim <b>website</b>: <i>packagesteel.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>hohmannoilandplumbing.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24014</link>
<guid>ff010d3f8d01254e4634b161432071c0</guid>
<pubDate>Sat, 14 Jun 2025 14:46:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>hohmannoilandplumbing.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d26d5cc7f401354f36960974ac97ec0d29a43e58ca527d7201f69d4b303ed673</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>hohmannoilandplumbing.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>cs-groupllc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24013</link>
<guid>e7758fe5b033ed143e73a3cbafa3ff2f</guid>
<pubDate>Sat, 14 Jun 2025 14:45:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>cs-groupllc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de75705bee4b963d3c0b16eec1f24ef7b9b93c44ac48f2d04b611c618a7cf5b8</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>cs-groupllc.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>pzsarchitects.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24012</link>
<guid>907781cf76579f09be5b3697c14733b8</guid>
<pubDate>Sat, 14 Jun 2025 14:44:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>pzsarchitects.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ae9ebcdd8d5a1f0173187bf1b572aa1206efecd49df20ce5501d0961ffdc643f</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] PZS Architects is a Philadelphia-based architectural firm that specializes in planning, interior design, and architectural design. With a commitment to sustainable design practices, the company offers a wide range of services across various sectors, including residential, commercial, cultural, educational, and healthcare. PZS Architects combines efficiency, aesthetics, and functionality in every project, aiming to enhance communities through innovative design.</i><br />Target victim <b>website</b>: <i>pzsarchitects.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>welcometosedgebrook.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24011</link>
<guid>2baec31fde8a031a2b64ca6254f8726c</guid>
<pubDate>Sat, 14 Jun 2025 14:43:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>welcometosedgebrook.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>09f14fc502f5523264f6d12052929ee5ed3124e6b79f6a2fbd7dc0fd48fc836d</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>welcometosedgebrook.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>moffett-towers-club.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24010</link>
<guid>d9395b105f23926e3c4f09453e018893</guid>
<pubDate>Sat, 14 Jun 2025 14:43:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>moffett-towers-club.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e33e06edf19c35c1695c8a862120c9ed3146118105b8c2dbf1f7112e4e7b63b</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>moffett-towers-club.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>liberty-township.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24009</link>
<guid>3ce5f6d8606512ad3b1217e43072b9dc</guid>
<pubDate>Sat, 14 Jun 2025 14:42:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>liberty-township.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c6dc2401979bdf9cb4c40995b441c63f1ac3dcbb226182861105dd430db6347</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>liberty-township.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>rusindustries.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24007</link>
<guid>1ee9bee2c7227c35ac1ca90f2e4fb172</guid>
<pubDate>Sat, 14 Jun 2025 14:40:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>rusindustries.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed893295a27f470d401002ac1935819e800c88bbb7719284c8723e1fb41cdd38</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>rusindustries.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>theoverheaddoorco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24006</link>
<guid>e982e209dbe04a35a3a0cdd444cd2a49</guid>
<pubDate>Sat, 14 Jun 2025 14:39:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>theoverheaddoorco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22cb32e13ac212020da40c31e70319478e7b250e3a8eaf407a9cb5898d0f11e0</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] The Overhead Door Company is a premier garage door service provider in the US, specializing in residential and commercial garage door installation, maintenance, and repair. Their product line includes a wide range of overhead and garage doors and operators, as well as related accessories. They also offer customizable designs to meet specific aesthetic or functional needs, and are known for their reliability and professional service.</i><br />Target victim <b>website</b>: <i>theoverheaddoorco.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>bristolhose.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=24003</link>
<guid>397c337a4b3bba159bae4f99c9700e48</guid>
<pubDate>Sat, 14 Jun 2025 14:37:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>bristolhose.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f8b838f746b21cbcd9449662b959e7e331541ea62ea0b35b72e004fb57aabdbb</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "Bristol Hose & Fitting" is a company that specializes in providing high-quality industrial and hydraulic hoses, fittings, and accessories designed for a wide range of applications. The company also offers custom services to clients for specific needs. With an extensive inventory and a dedicated team, the company ensures they meet the unique requirements of each customer.</i><br />Target victim <b>website</b>: <i>bristolhose.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>NewGen</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23994</link>
<guid>972c16f442eba60469680bf869dd6a89</guid>
<pubDate>Sat, 14 Jun 2025 01:21:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>NewGen</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a96ee112b79b447013f40021633911fc19173390042172f40a256a81a73004dc</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>nglogisticsllc.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Central-Point-School-District-6</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23991</link>
<guid>292f541e86a2c616f7dad12cd9c820b8</guid>
<pubDate>Fri, 13 Jun 2025 19:18:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Central-Point-School-District-6</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c08bf3c5896c29067b16dc97a399dcbe1b97a63534201149acd579a76df432a5</i><br /><br />Threat actor <b>description</b>: <i>Central Point School District 6 is a school district in Oregon that operates schools in the communities of Central Point, Gold Hill, and Sams Valley. There are 11 schools and 4,861 students in Central Point School District 6. Central Point School District 6 spends $11,800 per student each year. Its annual revenue is $66,555,000.</i><br />Target victim <b>website</b>: <i>district6.org</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>isd1.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23982</link>
<guid>00653e1c588c7b4bc7e9a6be7a43a843</guid>
<pubDate>Thu, 12 Jun 2025 23:22:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>isd1.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d328ee473a92ef1c44dc822c18e62ac3fda804e8adfc00a969efbc8a2908833</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 25.06.2025.Aitkin Public Schools is a company that employs 20 to 49 people and has revenue between 1M and 5M. It is headquartered in Aitkin, MN.
1.The document is a notice of commenc            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ramlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23988</link>
<guid>e0abd6e6385c00b0960a292aa8522351</guid>
<pubDate>Thu, 12 Jun 2025 21:18:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>ramlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9acdc035d2b3b7efcd1cbca802d261da09ae47d103081ec7f5a24e6dc70564a6</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>ramlaw.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bowles-Womack--Company-P.C</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23985</link>
<guid>17f5185b19985f0cf7188661e54814f6</guid>
<pubDate>Thu, 12 Jun 2025 20:49:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Bowles-Womack--Company-P.C</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>371c8bb2579af3513d890a83b23b22e43457c1f0726dd4c9b21c9ba56d0b9070</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Bowles Womack & Company, P.C is an accounting firm based in Texas, US. It specializes in delivering comprehensive accounting services to business owners, individuals, and executives. Their services range from basic tax management and accounting services to more in-depth services such as audits, financial statements, and financial planning. They emphasize professionalism, responsiveness, and quality in their work.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Frazier--Bowles</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23974</link>
<guid>bcf72cf0c11264b5bd65830efe8feaf8</guid>
<pubDate>Thu, 12 Jun 2025 18:30:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Frazier--Bowles</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>72f59fd6c2e9e10784223b129e9863d3babc8fef63d6c1d1739b750eb4b0a400</i><br /><br />Threat actor <b>description</b>: <i>Frazier Bowles is a full-service law firm specializing in Real Estate, Business ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>550madison.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23963</link>
<guid>0958560bd45062d115debadb6bca3183</guid>
<pubDate>Thu, 12 Jun 2025 17:22:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>550madison.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a28e71c6642ac6fb8de1c7e82796d670a73de5ef6dc249eeb960a901e2d90ad8</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 23.06.2025. 550 Madison is an architectural landmark in New York City, a building managed by The Olayan Group(https://olayan.com/)
Anticipated clients include companies seeking a pre            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>talismancivil.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23964</link>
<guid>3a8fcf2a8e88e290cf69a9b95726187a</guid>
<pubDate>Thu, 12 Jun 2025 17:22:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>talismancivil.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec6ad92d4bad9e70bc1a47bebe31274b1850dcfdad11fccbf7b361629362d30a</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 23.06.2025.Talisman Civil Consultants is a full-service design and surveying firm,based in Salt Lake City, specializing in civil engineering, land surveying and innovative design solu            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sweeney</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23980</link>
<guid>05c09437e3f4568b28e8fa7e2d64cc48</guid>
<pubDate>Thu, 12 Jun 2025 16:40:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Sweeney</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>720199a79f6237722ccb43c102f474fc9fc8c3725e69fcecfc4fc159ca719ca5</i><br /><br />Threat actor <b>description</b>: <i>Sweeney is an always open and transparent residential design-buil
d remodeling firm that caters to homeowner professionals in Dane 
County, specifically Madison, Stoughton, Fitchburg, Maple Bluff, 
McFarland, Middleton, Monona, Oregon, Shorewood Hills, Sun Prairi
e, Verona, and Waunakee.

We are going to upload about 200(!)GB of corporate data. Just a f
ew financial files.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>lakebook.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23965</link>
<guid>99c21323790ff1b0d80e980918d15f0b</guid>
<pubDate>Thu, 12 Jun 2025 16:32:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>lakebook.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47344e1ac6c4b708dc4aa540a451865848ad0a6cf9ca9327042965d0a0b74ac1</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 22.06.2025.Lake Book has been in the book production business for over 45 years. Our history and experience allows us to provide the most complete and comprehensive service to the boo            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>upstartpower.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23966</link>
<guid>9a22f904bc902481db6183d9e70e12d3</guid>
<pubDate>Thu, 12 Jun 2025 16:32:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>upstartpower.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f21d5b7ddc91549b925860a915f2c79ec5765cffb0a047330ec6576055b24921</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 23.06.2025. Upstart Power was founded in 2018 with a mission to design and manufacture solid oxide fuel cell (SOFC) generators that will make a sensation in the market, are reliable,             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>dcinvestors.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23967</link>
<guid>b31c224efdd8c42b02a6c95086af9694</guid>
<pubDate>Thu, 12 Jun 2025 16:32:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>dcinvestors.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>71ad24b1340a1dea971b6d86f28cb78ecc324b09aef27efa13f8e54b6f17d6b4</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 24.06.2025.Duff Capital Investors is a conglomerate of more than 20 companies operating in a variety of sectors, including trucking, tires, automotive, construction, energy and insura            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>haydist.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23969</link>
<guid>d157d577520c2e9085acc55d3d794007</guid>
<pubDate>Thu, 12 Jun 2025 16:32:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>haydist.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c8db5380b5a09ebd69cdbdeda84641332362f0a97b603bff7496727aae8b3ea</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 26.06.2025.Hayward is a family-owned, two-stage distribution company focused on dealers in the outdoor power equipment, small engine, farm equipment, construction, forestry, furnace a            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>wilsonappliance.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23970</link>
<guid>9d82620296a1e1fb76c64302dc3d77ba</guid>
<pubDate>Thu, 12 Jun 2025 16:32:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>wilsonappliance.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5ad4a2e0790582323a1b49a135f592001e543915a58ae33b96202aa33b403ff4</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 24.06.2025.Wilson AC & Appliance was founded in 1949 by J. W. Wilson, Jr. and his wife Lurleen. After returning from service in the Pacific during World War II, J.W. decided to explor            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>garmonandcompany.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23971</link>
<guid>d3fe63d904ee975a2297184b62c6ae60</guid>
<pubDate>Thu, 12 Jun 2025 16:32:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>garmonandcompany.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63697ec9f76a866a1adc2508c58fa7590a6271a72c77783a7f657e18e13ca700</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 26.06.2025.Garmon & Company specializes in commercial flooring designed specifically for businesses looking to expand their reach and impact. The company prides itself on understandin            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>skirball.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23961</link>
<guid>351b6724e9da25bca879759d192c0f25</guid>
<pubDate>Thu, 12 Jun 2025 15:23:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>skirball.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd0df70004a433e82906b9bcf92ac16a6864676289f7c74779263bfce5e34169</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 22.06.2025.Skirball Cultural Center is a meeting place guided by the Jewish tradition of welcoming the stranger and inspired by American democratic ideals of freedom and equality.
1.            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lake-Region-Healthcare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23977</link>
<guid>64179b3eb67988583d803807ca305acf</guid>
<pubDate>Thu, 12 Jun 2025 14:02:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Lake-Region-Healthcare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea37d92728917b8ceb6d75a4272b4d795909d26e3384d77c7e6858397910a9e7</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Lake Region Healthcare is a health care provider based in Fergus Falls, Minnesota. It offers comprehensive health care services including emergency and trauma, orthopedics, heart and vascular, oncology, obstetrics and gynecology, radiology, and rehabilitation. The organization is committed to proving personalized, compassionate, and quality care to their patients.</i><br />Target victim <b>website</b>: <i>www.lrhc.org</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Patron-Insurance-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23975</link>
<guid>a5537a7ededd2ffe4de474cc615ef5be</guid>
<pubDate>Thu, 12 Jun 2025 13:40:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Patron-Insurance-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57433f90c3dbfbb79a905818575b4ba7f2574fbd39ec05b932bb3bbf06a83774</i><br /><br />Threat actor <b>description</b>: <i>Patron Insurance Services has been serving its clients’ needs thr
oughout the Metropolitan Washington D.C. area including Maryland,
Virginia, and Washington D.C. since 1984.

We are going to upload about 7 GB of corporate data. Lots of docu
ments with client personal information (DOB, Emails address, addr
ess, phones, driver licenses), detailed financial data, contracts
and agreements, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>nucamprv.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23956</link>
<guid>92e9ee85b2a0843ab8dfe06a2e51adee</guid>
<pubDate>Thu, 12 Jun 2025 13:21:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>nucamprv.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cbb43c3ecf5c7f0400aab14525acaafecbc721fd867a242c35f283c1fd42ce53</i><br /><br />Threat actor <b>description</b>: <i>The full leak will be published soon, unless a company representative contacts us via the channels provided.nuCamp RV (http://nucamprv.com) manufactures the highest quality recreational vehicles on the market today. Integrity lies at the core            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>McCracken-Financial-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23958</link>
<guid>5990653da56b4075bff360efcc52383f</guid>
<pubDate>Thu, 12 Jun 2025 13:21:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>McCracken-Financial-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4809f3de942bdbeca6a3d6283361249e9606f12ff415f7abf5b903d33604c94c</i><br /><br />Threat actor <b>description</b>: <i>McCracken Financial Solutions Corporation offers commercial loan servicing software that automates the entire lifecycle of loans, including origination, servicing, accounting, and asset management. Their comprehensive system integrates variou            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>lawyersmutual.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23959</link>
<guid>33a4315c94f5a3ff05b17129a296a733</guid>
<pubDate>Thu, 12 Jun 2025 12:30:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>lawyersmutual.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fb8aa1d92df45b5a70396914ad0ad0a1f08bd5fcf793e0f647c58d4cbac5be64</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 16.06.2025.Lawyers Mutual Insurance Company is a key provider of legal malpractice insurance designed specifically for California lawyers, boasting five decades of reliable service. T            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>apollomd.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23960</link>
<guid>1203cc3f3328867009eb7d59cf5e12f6</guid>
<pubDate>Thu, 12 Jun 2025 12:30:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>apollomd.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7f4f24f3b18a04a085714b4d7c92b91fc5817dcff6bb2c117b342b66b55a8c5</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 16.06.2025.ApolloMD is a fully integrated and coordinated national group practice,that partners with more than 100 leading medical facilities across the country to provide multidiscip            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.waveny.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23954</link>
<guid>631d68dbc136873f091d6049807c09ae</guid>
<pubDate>Thu, 12 Jun 2025 11:30:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.waveny.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a399d7ccb791032a31306e11cddee1e4809906404680a69ee7e36800c5038b6</i><br /><br />Threat actor <b>description</b>: <i>Committed to our community for over 50 years as a trusted nonprofit, Waveny has sought to provide the highest quality care since 1975. From independent, assisted and memory care living, to at-home and in-patient short-term physical rehabilita            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Christian-Brothers-Academy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23972</link>
<guid>e5a7acc236abc42d5e11afede4915282</guid>
<pubDate>Thu, 12 Jun 2025 11:12:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Christian-Brothers-Academy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f37cb1763c8627d99fbc06a97710adc02b92cb4b57da1bbfa2b1316c8241618</i><br /><br />Threat actor <b>description</b>: <i>Christian Brothers Academy is a Catholic college preparatory school in Lasallian that educates young people of many faiths and cultures. CBA offers a wide range of Advanced Placement courses. The school is ranked as the number one Catholic high school in upstate New York, providing many opportunities for college scholarships and student development.</i><br />Target victim <b>website</b>: <i>cbasyracuse.org</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.kerrvilleisd.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23949</link>
<guid>73a2e4a4721851fab207428a7288f46e</guid>
<pubDate>Wed, 11 Jun 2025 21:22:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.kerrvilleisd.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>977edbfe4ce70d8b579d09559aba942c82c0304cb21dc1c399079eb9543e704f</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1890, Kerville Public School District is an accredited 5-A school district located in Texas Hill Country. The District is home to seven traditional campuses, one early childhood center, and an academic alternative high school. The             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>fasse.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23948</link>
<guid>089f0d154017a38ee15a7b8b96d5106c</guid>
<pubDate>Wed, 11 Jun 2025 18:23:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>fasse.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>88bcdd384dc30a80fe0a00c9d5aeee3b8521f8dc3f08ba12940d035cfe3c3bf6</i><br /><br />Threat actor <b>description</b>: <i>Fasse Valves specializes in precision motion control, offering a wide range of hydraulic valves and controls engineered for demanding applications. Their products cater to industries such as agriculture, construction, lawn and turf care, and             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>AR-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23951</link>
<guid>ea9fc8d30e6b9f8b602408282041c51d</guid>
<pubDate>Wed, 11 Jun 2025 15:26:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>AR-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2baab7e2330bb2e02b9d2dceca9eb0f0244d904e98f5f006065876888b6d3f03</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "A&R Engineering" is a company specialized in the manufacturing and supply of high-quality automotive parts. They provide a range of services including precision engineering, machine assembly, and product design. This company is known for its commitment to quality and precision, adhering to strict controls and standards in their processes. From small to large scale clients, they have earned a reputation for their reliable and quality-centric offerings in the market.</i><br />Target victim <b>website</b>: <i>arengr.com</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Center-for-Clinical-Research</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23952</link>
<guid>58f9067fdaf69fdde42cf95d8daacfde</guid>
<pubDate>Wed, 11 Jun 2025 15:26:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Center-for-Clinical-Research</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22ad10716c61464b02d0c2047954acf3feacf04aeea0b4933555662c6d4fe5b2</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] The Center for Clinical Research (CCR) is a global healthcare organization specialized in conducting clinical trials and research in various medical fields. CCR provides services like clinical trial management, patient recruitment, and data management. They work with pharmaceutical companies, biotech industries, and medical device companies to contribute to the development of novel treatments and interventions for numerous medical conditions.</i><br />Target victim <b>website</b>: <i>www.centerforclinicalresearch.com</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rosewood-Farm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23930</link>
<guid>0971892e4440a22b812d649b7c4fdb3a</guid>
<pubDate>Wed, 11 Jun 2025 12:05:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>global</b> claims attack for <b>Rosewood-Farm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87080ec390c459262ff479cb7aa31dbd229ca1446605aa0bca60dcd30a1d57cb</i><br /><br />Threat actor <b>description</b>: <i>Rosewood Farm, located in Sugar Grove, Illinois, was established in 2019 by Julie, who is dedicated to reconnecting culinary practices with agricultural roots. Spanning approximately 6 acres, the farm specializes in naturally grown vegetables and vibrant flowers, focusing on sustainable farming practices. Rosewood Farm aims to promote farm-fresh goodness and community involvement, providing updates on events through their email list.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>global</category>
</item>
<item xmlns:dc='ns:1'>
<title>Skyline-Dubuque</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23933</link>
<guid>1a5292fc914139fab8b9e7e26cf30af6</guid>
<pubDate>Wed, 11 Jun 2025 12:05:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>global</b> claims attack for <b>Skyline-Dubuque</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7fd228aec45c5893dbb974d59895ab322221a18cf8ec313be8f9ef9823678f16</i><br /><br />Threat actor <b>description</b>: <i>Skyline Dubuque, also known as Skyline Salt Solutions, is a family-owned business based in Dubuque, Iowa, specializing in snow removal and salt distribution. Founded by Mark Arthofer, the company emphasizes community involvement and a strong commitment to service excellence. Skyline offers a range of products and services related to snow management, including the patented Sky-Link Mix Master, which treats bulk road salt for improved effectiveness.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>global</category>
</item>
<item xmlns:dc='ns:1'>
<title>Capitol-Taxes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23935</link>
<guid>b8536aaea46484dd753df6bab1641dc7</guid>
<pubDate>Wed, 11 Jun 2025 12:05:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>global</b> claims attack for <b>Capitol-Taxes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>270606ed545cca107be329a66ba15aff93232aa5ac6904a7ca76d274b28b184c</i><br /><br />Threat actor <b>description</b>: <i>Established since 2014, Financial Services, Business Tax Preparation, Nationwide Services, Articles of incorporation. Voted #1 for most recommended Tax Services company by Local Chamber of Commerce</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>global</category>
</item>
<item xmlns:dc='ns:1'>
<title>ssi-mi</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23944</link>
<guid>3012e67b541ccf0e10a27a5a9db4b2a6</guid>
<pubDate>Wed, 11 Jun 2025 11:51:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>warlock</b> claims attack for <b>ssi-mi</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b527027a2e1ce73af6d48b183e4a21804996efcd3b83781ce51c52f9be0bc2f8</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>warlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>taos</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23939</link>
<guid>c707fcaa3ec072bc292233ce2983ddae</guid>
<pubDate>Wed, 11 Jun 2025 11:51:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>warlock</b> claims attack for <b>taos</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>28442cba3f61710b42b5c939ca686beb9181f727bd48de45f34378dc4530698a</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Taos is a technology services and consulting firm that specializes in cloud, DevOps, and security solutions. Headquartered in San Jose, CA, they work with clients across various industries, including finance, healthcare, and technology. Their services range from strategic consulting to managing IT infrastructure. Their goal is to help businesses adopt new technologies and practices to improve their operations and deliver better results.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>warlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arch-con</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23937</link>
<guid>4b5151a24a91df8c2304e36fc117dfb6</guid>
<pubDate>Wed, 11 Jun 2025 11:51:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>warlock</b> claims attack for <b>Arch-con</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>11c15dc664d04b1eed9810006af2ef036d980897300c833862780a007edacac4</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Arch-Con Corporation is a commercial construction company based in Houston, Texas. They work across various market sectors such as office, retail, healthcare, hospitality, industrial, and many more. Arch-Con offers construction management services at the risk of the constructor, providing guaranteed maximum prices to establish budget certainty. Their goal is to exceed client expectations using their experience, talents, and resources.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>warlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>peterpauper</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23903</link>
<guid>f073cd45cff903b9a6e8a810ecda129b</guid>
<pubDate>Tue, 10 Jun 2025 23:25:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>teamxxx</b> claims attack for <b>peterpauper</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8eab26311ca5c2c4c683f1ef0614586b105fe895314a10be352c3706dcd09797</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>eterpauper</i>]]></description>
<category>teamxxx</category>
</item>
<item xmlns:dc='ns:1'>
<title>event-medical.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23906</link>
<guid>735fba15cd27a45a0489108c2a2a70e9</guid>
<pubDate>Tue, 10 Jun 2025 23:23:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>teamxxx</b> claims attack for <b>event-medical.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d21cbf41f9facd9806dd3c5ca846503a0d00f0dffbe50e7367a30879fc209fcf</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Vent-Medical is a healthcare company specializing in respiratory care and artificial ventilation. They offer medical devices like nasal pillows, full-face masks and other respiratory equipment mainly for healthcare professionals and hospitals. Their mission is to improve patient care by offering high-quality ventilation solutions.</i><br />Target victim <b>website</b>: <i>vent-medical.com</i>]]></description>
<category>teamxxx</category>
</item>
<item xmlns:dc='ns:1'>
<title>webberrestaurantgroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23909</link>
<guid>0ca72f0a1292ede31400ee464c5c6cbe</guid>
<pubDate>Tue, 10 Jun 2025 23:21:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>teamxxx</b> claims attack for <b>webberrestaurantgroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f705c6cb7c3f976d6125dbf93fa5ae435f1d804d49560ace865d81f9219c2cd5</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>ebberrestaurantgroup.com</i>]]></description>
<category>teamxxx</category>
</item>
<item xmlns:dc='ns:1'>
<title>belkorpAg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23908</link>
<guid>84f2e494266e3d8bff012509c07be604</guid>
<pubDate>Tue, 10 Jun 2025 23:20:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>teamxxx</b> claims attack for <b>belkorpAg.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d40b86704e7ba871c79d22697b3dd7a9c06e8cad8cacd1cc1025abdb19762ab</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>elkorpAg.com</i>]]></description>
<category>teamxxx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Parkway-Construction-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23910</link>
<guid>16f8455ffee11d28c48dca19d52ab537</guid>
<pubDate>Tue, 10 Jun 2025 23:14:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Parkway-Construction-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0eafbe47878351b28c1980ef118a5c9418bfb9011ab48929221ce1624aaa0936</i><br /><br />Threat actor <b>description</b>: <i>Blueprints of L3Harris, General Atomics and Virgin Galactic.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mount-Rogers-Community-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23897</link>
<guid>d337961ae3a865e12888d8785f8032d8</guid>
<pubDate>Tue, 10 Jun 2025 20:58:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Mount-Rogers-Community-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>94eaead2d33df2f67a2f25fba5e2d6166af8503d194b47e0a0695115e8aece10</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ha.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23893</link>
<guid>1f3ecb87f576752202975d3e0b868bdc</guid>
<pubDate>Tue, 10 Jun 2025 19:08:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apos</b> claims attack for <b>Ha.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a0329ee9a268a20034d3d7277fab6407037294acf5f69b291a040b8832d6f293</i><br /><br />Threat actor <b>description</b>: <i>Ha******.us
5000000
United States
we exfiltrate all the data Ha******.us from server SSN, FINANCIAL RECORD, MEDICAL RECORDS,PERSONAL DATA,if ransom not paid we can publish all the data or sale to competitors</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>apos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Homestead-Gardens</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23884</link>
<guid>0e87a5d79df981f751c88e0bf91fc6ee</guid>
<pubDate>Mon, 09 Jun 2025 22:44:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Homestead-Gardens</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b74776b5ac5f1cce7f83e5fbebca3e9ea2000231049a666b767d2c6239b96c12</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>electro-seal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23885</link>
<guid>8121d2d0b97161cdc78238818b1dfee6</guid>
<pubDate>Mon, 09 Jun 2025 21:48:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>electro-seal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9d76e0364b0d805abde47117ddab6040238ab536428e98647672ccdfd2a32653</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "Electro-Seal" specializes in inspection, maintenance and repair services for the oil and gas industry. They focus on deploying safe, efficient, and cost-effective solutions to manage asset integrity and longevity. The company offers an extensive range of services including pipeline inspections, corrosion protection, industrial coatings, and risk assessments. Their mission is to ensure continuous operation of assets by minimizing downtime and optimizing productivity.</i><br />Target victim <b>website</b>: <i>electro-seal.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Community-Choice-Credit-Union</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23883</link>
<guid>8bb6fe84b8bba85343f415936f15e878</guid>
<pubDate>Mon, 09 Jun 2025 20:52:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Community-Choice-Credit-Union</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25b7bc3a06ec707319223c7a7c0aef1cb8625ed096c129629c287fa194317bdb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hartwig-Mechanical-Inc-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23880</link>
<guid>2f8a5cbf6ee1f3467c49a3a7439fa48e</guid>
<pubDate>Mon, 09 Jun 2025 20:14:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Hartwig-Mechanical-Inc-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5d3267eb70d5a8b5406b89c1898115174e75026f42f93632da9a6e50a6b396a0</i><br /><br />Threat actor <b>description</b>: <i>Hartwig Mechanical Inc is a company that operates in the Commercial & Residential Construction industry. It employs 10to19 people and has 1Mto5M of revenue. The company is headquartered in 20800 E. Brink Street Harvard, IL 60033 The total amount of data leakage is 456 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>San-Jose-Country-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23881</link>
<guid>81a5659cadae764d2cea250c130164a2</guid>
<pubDate>Mon, 09 Jun 2025 20:14:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>San-Jose-Country-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7cd800ae7a64e0ee9fbfe86f7cb1b13cc5fd68062e03891eaab92eac96627c6</i><br /><br />Threat actor <b>description</b>: <i>San Jose Country Club is a premier family-friendly private golf club located in Northern California, established in 1899 and known for its rich tradition. The club offers year-round golf, dining options, and various social activities, making it a sought-after destination for members in the Bay Area. It features a newly remodeled clubhouse and event facilities for hosting weddings and special events. Catering to golf enthusiasts and families alike, the club emphasizes superior service and exclusive dining experiences. company is headquartered in 15571 Alum Rock Ave San Jose, CA 95127 The total amount of data leakage is 117.5 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>mercercapital.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23872</link>
<guid>8b23716b7bceb1123ebe2457a756dc13</guid>
<pubDate>Sat, 07 Jun 2025 17:41:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>mercercapital.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d8134aaa9c369dccceb8049e42f820b628fc916204ef91bf9b2ce2746856bbf3</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Mercer Capital is a business valuation and financial advisory services firm. With expertise in providing business valuation services, this US-based company also offers financial reporting, tax compliance, corporate advisory services, and litigation support. Other services include portfolio valuation and investment banking. Their clientele is diverse, including public and private businesses, financial institutions, and high-net-worth individuals.</i><br />Target victim <b>website</b>: <i>mercercapital.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>triangleheatingcooling.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23871</link>
<guid>bbb8f66a204ee518c9a971fcc7492cef</guid>
<pubDate>Sat, 07 Jun 2025 17:40:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>triangleheatingcooling.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff0821b2deb449c526db861710f054374a0e8dba72ca3b9bd83d0c675eb72223</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Triangle Heating & Cooling is a heating and cooling service provider, renowned for their commitment to high-quality work and customer satisfaction. The company operates throughout Randolph County, WV, offering various HVAC services, including installations, repairs, and maintenance of cooling, heating, and indoor air quality systems. They are dedicated to providing comfortable living environments for their clients.</i><br />Target victim <b>website</b>: <i>triangleheatingcooling.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hudson-River-Housing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23865</link>
<guid>7238f09eded4ff476195b2c3e8fbe436</guid>
<pubDate>Sat, 07 Jun 2025 14:42:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Hudson-River-Housing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbe50b132e5b074ff0fdcd1ccba96f012ba310c26385bbaf03a123996c6b2472</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>AntFarm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23866</link>
<guid>75194bcd73e801e52d3937040b1067c8</guid>
<pubDate>Sat, 07 Jun 2025 12:15:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>AntFarm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ef175a357b43f77d269acd0ff620a9d47a9e1674220be6804d9ddb844723cf3</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] AntFarm is a business incubator based in Mumbai, India. It focuses on developing early-stage businesses, including start-ups, in the digital media and technology sectors. AntFarm helps companies grow by providing resources, tech support, mentorship, and funding. Its portfolio includes companies like Stylista, Fork Media, and Propelld.</i><br />Target victim <b>website</b>: <i>antfarmservices.com</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>InTech-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23862</link>
<guid>dcd2ea9f54e3502ba7738f748f7f9a26</guid>
<pubDate>Fri, 06 Jun 2025 23:20:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>InTech-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9725f40b2e0e490475b37e5f140620d54ab52c62e8ad1243d8cc4132ae23d241</i><br /><br />Threat actor <b>description</b>: <i>InTech Industries, Inc. specializes in full-service manufacturing, offering services such as 3D printing, design, tooling, injection molding, and precision CNC machining. They serve a wide range of industries, including life sciences, medical devices, dental, and personal safety. Their clients include businesses in a variety of sectors, such as pharmaceuticals, home care devices, and the optical industry.</i><br />Target victim <b>website</b>: <i>intech-ind.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ticketmaster</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23861</link>
<guid>031a2f22d6a36d878fc136c3b170276f</guid>
<pubDate>Fri, 06 Jun 2025 23:12:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>arkana</b> claims attack for <b>Ticketmaster</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a142ff7c3d2f557b80a52735e9f033d6d6d7cb508f1c611c5cb6efa95780a28e</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Ticketmaster Entertainment, Inc. is an American ticket sales and distribution company headquartered in Beverly Hills, California. It operates in more than 20 countries, delivering over 100 million tickets annually. They provide services for worldwide events including concerts, sports events, theatre performances, and family shows. Apart from ticket distribution, Ticketmaster offers marketing and support for event organizers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>arkana</category>
</item>
<item xmlns:dc='ns:1'>
<title>TC-Wilson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23856</link>
<guid>16a9298bcdf23042692df2d17c7e8a0a</guid>
<pubDate>Fri, 06 Jun 2025 17:09:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>global</b> claims attack for <b>TC-Wilson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>900d7ab8ed1177f0cbf3d73bea3cdd4178651598a0a374c7d877ad455cc234c0</i><br /><br />Threat actor <b>description</b>: <i>For nearly 100 years, Thomas C. Wilson – known as TC Wilson – has taken pride in crafting the finest products for tube cleaning, tube expanding, boiler and heat exchanger maintenance. Our knowledgeable staff understands the industry, and knows how to help you find the right equipment for your application and your budget.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>global</category>
</item>
<item xmlns:dc='ns:1'>
<title>Optima-Tax-Relief</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23858</link>
<guid>3aca5559a842cac6011c4fa97180a5f0</guid>
<pubDate>Fri, 06 Jun 2025 17:07:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>Optima-Tax-Relief</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a1f122f162c26ebca0b5f1b7714e212cbd2f27681de16c37c949f4f875c7e45</i><br /><br />Threat actor <b>description</b>: <i>Operating in the state of California, Optima Tax Relief LLC provides consulting services. The company also offers tax liability investigation and resolution, tax preparation and compliance, settlement and negotiation services.</i><br />Target victim <b>website</b>: <i>optimataxrelief.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Synopsys</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23854</link>
<guid>ba7f4fbe78b8a3c4618a5eaf93dce218</guid>
<pubDate>Fri, 06 Jun 2025 17:05:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>arkana</b> claims attack for <b>Synopsys</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0e5844a2f8d640e255dae8ac85c2a7878af521cd6491e0c5c2bc99f8a494ecf</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Synopsys is a leading company in electronic design automation (EDA) and semiconductor IP. It also provides software integrity tools. Founded in 1986 and headquartered in Mountain View, California, Synopsys offers innovative solutions that help designers manage complexity, develop high-quality, and high-performance silicon, meet critical time to market and power consumption requirements, and avoid costly redesigns.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>arkana</category>
</item>
<item xmlns:dc='ns:1'>
<title>Homeyer-Consulting-Services-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23857</link>
<guid>728af2fb27f319c4be373ea371e0aba4</guid>
<pubDate>Fri, 06 Jun 2025 17:01:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Homeyer-Consulting-Services-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ed4987cbd788f1d8c8f707665f8e3530bce31ee6d6908c5dbad40112c275962</i><br /><br />Threat actor <b>description</b>: <i>Homeyer Consulting Services, Inc. is a global water consulting fi
rm. We have a multimillion dollar laboratory dedicated to testing
treated water, and a structured team of field consultants who co
nsult to over 6,800 sites worldwide.

We are going to upload about 169 GB of corporate data. There are 
a lot of employee personal documents (passport scans of each empl
oyee), lots of confidential contracts, agreements correspondence,
detailed financial data (audits, payment details, reports), clie
nts data, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nunez-Dental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23850</link>
<guid>bab2a4505dc27efff8e4c894be13c29d</guid>
<pubDate>Fri, 06 Jun 2025 16:55:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Nunez-Dental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>59f3e51b0c1d7f51a0d54e8a0373a351f230b5dd1406f8428d5aee7d884edbb7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Productionsaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23848</link>
<guid>8dd99f719edf43e07427cc78a3549648</guid>
<pubDate>Fri, 06 Jun 2025 16:38:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Productionsaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33f358291c3c5379e826a14d823fcc007a4ea5a0c8c97953caf70a4270176f0d</i><br /><br />Threat actor <b>description</b>: <i>Country: USA
Views: 164</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>quenotedeporten</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23844</link>
<guid>77ee059ad6403fbcfb6d50000da594db</guid>
<pubDate>Fri, 06 Jun 2025 15:33:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>quenotedeporten</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53070c25584007314c4f78be9fccd1a93f8effde263f8766b2faa2979ffe789d</i><br /><br />Threat actor <b>description</b>: <i>Law Office Of Omar O Vargas is a company that operates in the Law Firms & Legal ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kittery-Police-Department</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23847</link>
<guid>dcd38e1b67396751a80e9e69f5ccf1b1</guid>
<pubDate>Fri, 06 Jun 2025 13:07:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Kittery-Police-Department</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cbea26f761284039a26879ca6d071b67609a1932ec3f99969c5ea4d6976ee320</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>regen.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23831</link>
<guid>6bbbbb2a10edb63babf298ec360b299b</guid>
<pubDate>Thu, 05 Jun 2025 23:35:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>regen.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec11ab93f592bbb53bb430c9fced1bbfa56b27d3fb1703f2e89c435e4393c3a4</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 16.06.2025.Celebrating 40 years, since 1983, ReGenerating Solutions, a privately held technology consulting firm, has built and maintained a reputation for delivering to customers the            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>regentscapital.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23832</link>
<guid>d5c59c68680ca73714e8192c86cbe178</guid>
<pubDate>Thu, 05 Jun 2025 23:35:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>regentscapital.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c05dc75c460086195a7e22b22d03c06c3c15fb27f8156bdf47123c35e68149f</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 17.06.2025.Regents Capital Corporation is a rapidly growing independent commercial equipment finance firm committed to changing the way companies finance equipment. Regents believes i            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>cityofbelvedere.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23833</link>
<guid>66e96398da90a8d37c3c67d6e136fb03</guid>
<pubDate>Thu, 05 Jun 2025 23:35:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>cityofbelvedere.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be1ee937f9a3183fab98da551597ddc8ebcc720f0330c8f5ea277706eee087c2</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 18.06.2025.Belvedere is one of the smallest and oldest cities in California. It was incorporated in 1896 and is located north of San Francisco across the Golden Gate Bridge in Marin C            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>healthtrust.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23835</link>
<guid>99794ade09cc058d0249ae0c41cb4971</guid>
<pubDate>Thu, 05 Jun 2025 23:35:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>healthtrust.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9855e2f5d485417cc3d2423996791836c1fbd760c15a9dc93a2473405339192d</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 17.06.2025.In 1996, The Health Trust was formed through the sale of a local not-for-profit hospital system to a for-profit corporation. Since then, we have been serving the Silicon Va            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>brucknertruck.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23836</link>
<guid>bd0feb7098b8bf044d4f6eece41e349a</guid>
<pubDate>Thu, 05 Jun 2025 23:35:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>brucknertruck.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53dc55dfe55573cad7408f860a9c9f924c469528711c99fdeca2b9927d367ee1</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 18.06.2025.Founded in 1932, Bruckners Truck & Equipment offers a wide range of trucks and trailers, semi-trailer repair, and an extensive parts catalog. The company is headquartered i            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>britteninc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23837</link>
<guid>35d4f69ad714757ec15987abf27fbf05</guid>
<pubDate>Thu, 05 Jun 2025 23:35:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>britteninc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29b4f54013da2c3fed55c07cffc704177d4c6a68f28b115cb420ea277fda47ae</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 19.06.2025.Britten is a creative production house dedicated to creating innovative signage, displays and event branding solutions that set our clients apart from the crowd. Utilizing             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>accuvein.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23838</link>
<guid>fc4128d00c371e949ce07a2cdc1bfd3d</guid>
<pubDate>Thu, 05 Jun 2025 23:35:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>accuvein.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d8078d635fdbd350b83156411fc97a2513b16d29851ec4b25274f1fe88a4596e</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 19.06.2025.AccuVein Inc. - the world leader in vein imaging technology. AccuVein's flagship product, AccuVein, is the world's only portable, non-contact vein illumination solution. Th            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Triumph-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23842</link>
<guid>61e93e57223c88f7e75d968443eb49b5</guid>
<pubDate>Thu, 05 Jun 2025 22:45:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Triumph-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa5342a91397be939cd4cd2bde352389f7360a08fba43582e5529e327d9527df</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Veethree</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23843</link>
<guid>e3cbb2b5450e080ca960e2958f20e0ee</guid>
<pubDate>Thu, 05 Jun 2025 20:23:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>Veethree</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>02f56cfb96fade06d465f0b38a40d8f018bdf8d719734ab6f1b2b5beaa5c3be5</i><br /><br />Threat actor <b>description</b>: <i>The Veethree Group is an alliance of companies, driven by common technologies and innovation. Today the group of companies has employees worldwide, with sites over 4 continents, serving 100’s of OEM customers.

Those companies include:
    Indication Instruments Ltd – India
    Veethree New Zealand – New Zealand
    Veethree North America LLC – USA
    Veethree Electronics & Marine LLC – USA
    Veethree Technologies (CANtronik Ltd) – UK</i><br />Target victim <b>website</b>: <i>veethree.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>LS-Proline</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23841</link>
<guid>1c1b844e81f60edc6af816d8949a07b0</guid>
<pubDate>Thu, 05 Jun 2025 17:22:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>global</b> claims attack for <b>LS-Proline</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e67c6b143c582c7f5f19c1bad846a11bd732aa3b3403858a388da9edcad7ffb2</i><br /><br />Threat actor <b>description</b>: <i>L&S Proline is a Texas-based company providing turnkey equipment and fabrication solutions for the oil and gas industry, including flow measurement systems, custom enclosures, and structural supports—all built in-house for quality and reliability.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>global</category>
</item>
<item xmlns:dc='ns:1'>
<title>Barnhartcrane.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23828</link>
<guid>213fc014f650fdfb0403e75c6d750fe5</guid>
<pubDate>Thu, 05 Jun 2025 17:21:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>Barnhartcrane.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>98b8eb0b8fc235b7e6106cf58c41528f1271f1ae96710790dd1c78fe934cc2cb</i><br /><br />Threat actor <b>description</b>: <i>Started in 1969 and headquartered in Memphis, Tennessee, Barnhart is a heavy lift and heavy transport company. The company offers a variety of heavy lift and transport services across the United States, including operated crane rental, rigging services, component replacement solutions, industrial storage, and more</i><br />Target victim <b>website</b>: <i>www.zoominfo.com/c/barnhart-crane--rigging-co/11865517</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Western-Insurance-Marketing-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23819</link>
<guid>863f26505ec22ffe51927c6aef85b648</guid>
<pubDate>Thu, 05 Jun 2025 16:33:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Western-Insurance-Marketing-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>373404355d48a9a63cc147c6adb1f51bfee7776e3e003e81f65a44e0a60df41c</i><br /><br />Threat actor <b>description</b>: <i>Site: western-insurance.net
														Industry: Insurance
														GEO: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sturdevants-Auto-Parts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23822</link>
<guid>df6206a85a959857407d534df2e7e7f4</guid>
<pubDate>Thu, 05 Jun 2025 14:18:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Sturdevants-Auto-Parts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e8ea35a62456122e2b1ab1b7e53990b73d20112a75b6ba91ab33d99fdc502fd</i><br /><br />Threat actor <b>description</b>: <i>Sturdevant's Auto parts is the regions largest automotive parts &
accessory business with 40  locally owned stores in SD, ND, Iowa
, Minnesota & Nebraska.

We are going to upload about 16 GB of corporate data. Personal do
cuments, lots of contracts and agreements, client data, financial
data (audits, payment details, reports), etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>AMS-Paving</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23824</link>
<guid>1e57feec7e1cc9adf0c96bea4b7d753a</guid>
<pubDate>Thu, 05 Jun 2025 13:12:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>AMS-Paving</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8f23d8f2acca21febc23000ef13ba39a69198288954907937e28a3d20bdf1f84</i><br /><br />Threat actor <b>description</b>: <i>AMS Paving, Inc. has been providing quality paving and maintenanc
e services throughout Southern California since 1981.

We are going to upload about 17 GB of corporate data. Employee pe
rsonal information (DLs, DOB, addresses, credit card details and 
so on), lots of contracts and agreements, client data, financial 
data, accounting and financial data, payment details, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>FORT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23817</link>
<guid>8f20fe72886d5849926d898864c46523</guid>
<pubDate>Thu, 05 Jun 2025 09:51:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>crypto24</b> claims attack for <b>FORT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>68d657bab435a76694277354f9b9d0709b76bf7c6d6ba68fb39dcfeb68810e77</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] FORTÉ is a fitness-focused technology company that provides a subscription-based streaming platform. It offers live and on-demand access to boutique fitness classes led by top fitness studios and professionals. The platform is designed for multiple devices, allowing users to participate in the fitness classes from anywhere. Workouts range across a variety of styles, including yoga, cardiovascular exercises, strength training, and cycling among others.</i><br />Target victim <b>website</b>: <i>www.ourforte.com</i>]]></description>
<category>crypto24</category>
</item>
<item xmlns:dc='ns:1'>
<title>all-nations-health-center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23809</link>
<guid>bc59e38bc67f18b4ab36cd450302b8c6</guid>
<pubDate>Wed, 04 Jun 2025 20:47:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>global</b> claims attack for <b>all-nations-health-center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aae46339a1b66ea0b1c9a7fd6216a79241a32b1293050f5537681267c076b3a9</i><br /><br />Threat actor <b>description</b>: <i>all-nations-health-center</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>global</category>
</item>
<item xmlns:dc='ns:1'>
<title>Davies-Mcfarland--Carroll</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23802</link>
<guid>cf566487133f1f538e02da96f9a16b18</guid>
<pubDate>Wed, 04 Jun 2025 19:32:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Davies-Mcfarland--Carroll</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06fe5ec285f189bae002c1983cbf77b9e30b52537bc6d537865e0e61fa78a8fb</i><br /><br />Threat actor <b>description</b>: <i>Davies, McFarland & Carroll.
 We were attacked in May 2025. 
 They claim to be l...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>DALB</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23803</link>
<guid>11f4d42b4cdfa5e9835ef754c2d022c2</guid>
<pubDate>Wed, 04 Jun 2025 15:46:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>DALB</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d1beb218c98cb90891cbcc385f051d732cc2c6282474e3d2d64ccc50cbaa1982</i><br /><br />Threat actor <b>description</b>: <i>DALB a global leader amongst the decorative and functional plasti
cs manufacturing companies.

We are going to upload about 25 GB of corporate data. Employee pe
rsonal information (DLs, DOB, addresses, SSNs and so on), financi
al data, contracts and agreements, client data, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>J-Kraft</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23806</link>
<guid>5b6f6f2df2bd1f461a19c19f65161223</guid>
<pubDate>Wed, 04 Jun 2025 15:26:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>J-Kraft</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7f1f6dc0729ba7e0182e7c2111da681d5e2a8e3a281603f1d091701dabd1926</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] J-Kraft, Inc. is a manufacturing company based in Houston, Texas. They produce high-quality, custom-made doors and millwork for both residential and commercial applications. Since 1990, they've combined advanced technology with skilled artisanship to deliver superior products. They value customer satisfaction, quality craftsmanship, and attention to detail.</i><br />Target victim <b>website</b>: <i>www.jkraftinc.com</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kettering-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23799</link>
<guid>39dcd6ada1d4637541f550101c5beead</guid>
<pubDate>Wed, 04 Jun 2025 09:18:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Kettering-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>82b6ecb4d16455570e185680c25c3fc2a5eb614faaeb4c9885d7b4c53d59078d</i><br /><br />Threat actor <b>description</b>: <i>Kettering Health - is an organization headquartered in Kettering, Ohio, that operates hospitals, freestanding acute care facilities, clinics, and Kettering College. Kettering Health serves residents of Greater Dayton and surrounding communities. It includes nine hospitals, 12 freestanding acute care facilities, 188 clinics, more than 1,900 physicians, and more than 14,000 employees.</i><br />Target victim <b>website</b>: <i>ketteringhealth.org</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>FLOE-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23787</link>
<guid>b0485292cde20d8a76cca37410a9f115</guid>
<pubDate>Tue, 03 Jun 2025 23:32:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>FLOE-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd8b15f5dff5e04eba7aa0e8fcc0b954de053f131f4ae0bd1686639109c47058</i><br /><br />Threat actor <b>description</b>: <i>FLOE International, Inc. engages in the manufacture of aluminum docks, boat lifts, and trailers. It offers modular docks, roll-in docks, floating docks, dock accessories, boat lift accessories, snowmobile trailers, enclosed trailers, utility             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Myer-Auto</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23792</link>
<guid>a3e8b5e0becdbfb1b1c706b452b6c388</guid>
<pubDate>Tue, 03 Jun 2025 22:54:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>Myer-Auto</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a57da577a26baefc863dcc2e680d35fc2c43447efc387fa1c59399bf6ccfb246</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>ochsinc.org.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23791</link>
<guid>9096403cb29da13bc9bf505a6d6a30d7</guid>
<pubDate>Tue, 03 Jun 2025 22:53:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>ochsinc.org.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bcfd4702a86218261a80a3bfa540890c2e8713acf477eeb989981f2d972c5d82</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>ochsinc.org.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>digitalwarroom.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23790</link>
<guid>1b7daa728437662c5bd6dc21528b7831</guid>
<pubDate>Tue, 03 Jun 2025 22:52:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>digitalwarroom.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3fb6f63bf501d023f93d449e7c4f6443d2830fa82b772ba25fa7821077c785db</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Digital WarRoom is a software company that specializes in providing e-discovery solutions. They offer tools to investigate, process, review, mark and produce electronic documents. Their services are geared towards in-house legal teams, law firms, corporations and government institutions to aid in litigation, HR inquiries, investigations and audits. They offer both cloud-based and on-premise solutions.</i><br />Target victim <b>website</b>: <i>digitalwarroom.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sorter-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23789</link>
<guid>70c278e66c9bc7683f0ad2748f694b43</guid>
<pubDate>Tue, 03 Jun 2025 22:50:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Sorter-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c0f8e4507352247d926b5e138e25f640498670d0748cd7fafb67bbd1c49b189</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rochon</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23788</link>
<guid>06e71b23d4924dfdfc2dd1e217ab4b01</guid>
<pubDate>Tue, 03 Jun 2025 20:54:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Rochon</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8018070ed3c0dc62c766f4f601fe3b2805a07353f6cb28f5825f9bfd6be46658</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>North-American-Lighting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23786</link>
<guid>2ad300658065a941d949d0d181c7f626</guid>
<pubDate>Tue, 03 Jun 2025 15:38:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>North-American-Lighting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>baf4b8003ddc77bc3aa368b40ed1b1ed558fd3e1ffb9c2fcde4c0d0963619fbb</i><br /><br />Threat actor <b>description</b>: <i>North American Lighting manufactures automotive lighting products
. The company offers turn signal, clearance, fog, rear, center hi
gh-mounted stop, and license plate lamps.

We are going to upload about 22 GB of corporate data. Employee pe
rsonal information, financial data (audits, payment details, repo
rts, invoices), contracts and agreements, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dynamic-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23782</link>
<guid>deb23c20e7307c4c07ff41423ea0902c</guid>
<pubDate>Tue, 03 Jun 2025 14:49:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Dynamic-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec108f60b09927d96a3ce7883d527155db81f6672a5c3d0aa36620d90635b32f</i><br /><br />Threat actor <b>description</b>: <i>Dynamic Engineering provides best maintained production machine s
hop equipment available. 

We are going to upload about 7 GB of corporate data. Employee (an
d relatives) personal information, financial data, projects info,
client data, contracts and agreements, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Observer-Media-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23783</link>
<guid>dc8ea2d055557e14585d74fc6c1033b2</guid>
<pubDate>Tue, 03 Jun 2025 14:49:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Observer-Media-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ff2dc9c8b276b30f3ee236789db7a52fa2694f94dcc4dc7133703f01c8cd5bb</i><br /><br />Threat actor <b>description</b>: <i>Observer Media Group Inc. is a multimedia company with seven news
papers, four websites, four quarterly lifestyle magazines and 100
employees serving multiple communities around Florida.

We are going to upload about 8 GB of corporate data. A lot of fil
led out forms with personal data and credit card details, employe
e personal information, financial data, client data, contracts an
d agreements, etc. 
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sleepy-Hollow-Country-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23784</link>
<guid>f3c952bcd6acff0deec623a8593bc698</guid>
<pubDate>Tue, 03 Jun 2025 14:49:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Sleepy-Hollow-Country-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a31d32511976661e600c3973f27a9ce154ac1f85d32779a1fcd9f77d2cd39261</i><br /><br />Threat actor <b>description</b>: <i>Sleepy Hollow Country Club is a private country club located in S
carborough, New York.

We are going to upload about 14 GB of corporate data. Confidentia
l agreements, a lot of employee personal information (DOB, passpo
rts, social security cards, addresses, phones, emails, and so on)
, detailed financial data, a bit of client data, contracts and ag
reements, NDAs, etc. 
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sandhills-Medical-Foundation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23774</link>
<guid>4fefed995eb187fe7d0c0e4e2351f82a</guid>
<pubDate>Tue, 03 Jun 2025 13:10:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Sandhills-Medical-Foundation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c123142683ee3ad0bcdd693653e9e6c292f484bc9804651395559469f7593d1a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Navesink-Rehab</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23779</link>
<guid>cba43dc5d1fc0796ffd171b784487c37</guid>
<pubDate>Tue, 03 Jun 2025 11:17:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacklock</b> claims attack for <b>Navesink-Rehab</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a1849b8a12ff61316fd28fc301edc119f9595fb909bdbd8a67ff2be24233950</i><br /><br />Threat actor <b>description</b>: <i>Hospitals & Physicians Clinics
New Jersey, United States
<25 Employees
Navesink Rehab is a multidisciplinary rehabilitation center located in Red Bank, New Jersey, offering a range of services including physical therapy, chiropractic care, acupuncture, and treatment for auto accident injuries.
Revenue <$5 Million</i><br />Target victim <b>website</b>: <i>navesinkrehab.com</i>]]></description>
<category>blacklock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lumenation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23781</link>
<guid>5ecc8c3764f3a67054971fce2dd566b4</guid>
<pubDate>Tue, 03 Jun 2025 11:14:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacklock</b> claims attack for <b>Lumenation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91850b4feb846be19926eb8e525af1f4305241c0a27f745c392b0214658a9e89</i><br /><br />Threat actor <b>description</b>: <i>Manufacturing
Kentucky, United States
<25 Employees
Lumenation is a lighting sales agency serving Kentucky and southern Indiana, specializing in commercial and industrial lighting since 1960.
Revenue <$5 Million</i><br />Target victim <b>website</b>: <i>www.lumenation.net</i>]]></description>
<category>blacklock</category>
</item>
<item xmlns:dc='ns:1'>
<title>WC-Smith</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23773</link>
<guid>0415089c6d09cb4eccd7a314f9610301</guid>
<pubDate>Tue, 03 Jun 2025 02:46:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>WC-Smith</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f86fe477344420f57dcbe19c97b457c80f8cca66ce80786021ea53f6bcbf3c4</i><br /><br />Threat actor <b>description</b>: <i>WC Smith is headquartered in Washington, DC, and founded in 1969, is a multidisciplinary real estate firm providing real estate services to the Washington metropolitan area. We provide you with up-to-date databases SAGE, MySql. Also contracts and personal data of employees, enjoy viewing.</i><br />Target victim <b>website</b>: <i>wcsmith.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>FLOE-Internationa</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23770</link>
<guid>14bc3485c0d01cc69c3d9b14c9a7926c</guid>
<pubDate>Tue, 03 Jun 2025 01:56:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>FLOE-Internationa</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b518caae339cd4354a9fdf2f1d1305a2c84d82f2d983137d1c5ca8b0513fbf7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Capital-Trade</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23765</link>
<guid>82ce994baf8f5e47f62f12b35adecf03</guid>
<pubDate>Mon, 02 Jun 2025 22:48:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Capital-Trade</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2b93e1a5c365c07c47d464495259a7502919b67d7a16eb1902b0897243329f2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>jerichofd.comUSA157GB</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23771</link>
<guid>d8c5a0341cfbe616d33c7657d5b71568</guid>
<pubDate>Mon, 02 Jun 2025 22:16:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>jerichofd.comUSA157GB</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12abf0945efa050f3207e80449c3448045f42c4974c7b2ce1f5ca1d12d4e2f97</i><br /><br />Threat actor <b>description</b>: <i>Unknown - Jericho Fire Department</i><br />Target victim <b>website</b>: <i>jerichofd.com/USA/157GB</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rechler-Equity-Partners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23769</link>
<guid>1c51851b7a12eed5c6ddbee10e6ea94c</guid>
<pubDate>Mon, 02 Jun 2025 20:49:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Rechler-Equity-Partners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8cf20f595cac36d88d61747ff1a7e1f8de8704ae7ddd297c1afc9f54752215b</i><br /><br />Threat actor <b>description</b>: <i>Headquartered in Plainview, New York, Rechler Equity Partners offers a wide range of services and capabilities, including: leasing, property management, site development and planning, architecture, construction, environmental and Green technology, IT services, asset management and finance.</i><br />Target victim <b>website</b>: <i>rechlerequity.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Family-Health-Specialists</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23768</link>
<guid>c7529b8e425f81f2d9b65a162002f19d</guid>
<pubDate>Mon, 02 Jun 2025 20:47:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Family-Health-Specialists</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>185ae0b2168921ad74fdf1d2722119c77d7205d5f93308beff389bdaaa6819de</i><br /><br />Threat actor <b>description</b>: <i>Texas Digestive Specialists is a leading gastroenterology practice in South Texas, specializing in digestive, colon, and rectal health. They provide a wide range of diagnostic and therapeutic services, as well as advanced weight loss solutions, with a focus on patient-centered care. With multiple locations in McAllen, Brownsville, and Harlingen.</i><br />Target victim <b>website</b>: <i>texasdigestive.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Naper-Grove-Vision-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23767</link>
<guid>d6ea02b23d9ba70ecc548116b406c851</guid>
<pubDate>Mon, 02 Jun 2025 20:46:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Naper-Grove-Vision-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8c4478094ad505c065e1ee559e2e14b00ec757f0bd1c5097a8aa59225accd0b8</i><br /><br />Threat actor <b>description</b>: <i>Naper Grove Vision Care offers eye care accessories as well as the most comprehensive eye care services. Optometrists in Naperville and Downers Grove providing eye care services.</i><br />Target victim <b>website</b>: <i>napergrove.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Riverdell-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23766</link>
<guid>98ed037c165c8ff9f4afefbe86f08c84</guid>
<pubDate>Mon, 02 Jun 2025 19:11:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacklock</b> claims attack for <b>Riverdell-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ae7cc1b0257e0570f90512439223b073a2d7a6697007156dade981b8e5f3e075</i><br /><br />Threat actor <b>description</b>: <i>Commercial & Residential Construction
Oregon, United States
<25 Employees
Riverdell Construction is a premier custom home builder based in Southern Oregon, specializing in luxury custom homes and high-end residential properties across Medford, Jacksonville, Ashland, and Applegate.
Revenue <$5 Million</i><br />Target victim <b>website</b>: <i>riverdellconstruction.com</i>]]></description>
<category>blacklock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kansas-City-Aviation-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23760</link>
<guid>9bd90fed98b9f7f1e9024b13e758c45a</guid>
<pubDate>Mon, 02 Jun 2025 13:09:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Kansas-City-Aviation-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f93c32189d7a9d979100b395bdfbdabac97df262ddad13b81ab8f4b0df4cc48</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1968, the Kansas City Aviation Center offers a range of aviation services. The center helps in search for new and pre-owned Pilatus, Piper and Diamond aircraft. It specializes in late model, high-performance and single-engine aircraft that are under warranty periods. The center s flight training school provides pilot safe training, as well as aircraft on rent. The Kansas City Aviation Center s aircraft maintenance department offers maintenance, repair and inspection services. The center provides avionics equipment from various distributors, including Universal, Garmin and Honeywell. It also offers a range of cabin entertainment systems. The center is an authorized distributor for aircraft parts from Rapco, Trimcraft and McCreary. The Kansas City Aviation Center is located in Olathe, Kan</i><br />Target victim <b>website</b>: <i>www.kcac.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>valuestoreit</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23756</link>
<guid>10caad252666c9992275b6be2555dc6e</guid>
<pubDate>Mon, 02 Jun 2025 03:51:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>valuestoreit</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eec9f78baa1cd3742cc57564ea1920a0cdd2e8b8f9a862b9b6c37e25c714e373</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wilkie-Sanderson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23754</link>
<guid>7df552440682aa175b6ba97ff4522ad8</guid>
<pubDate>Mon, 02 Jun 2025 03:33:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Wilkie-Sanderson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d1ff71ebe435751bc6b067da3b3ac88fd96525c07b0934ab8ceeb160197404f</i><br /><br />Threat actor <b>description</b>: <i>On time. Every time.
 Customer enthusiasm is built on a foundation of integrity,...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dcsdev.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23743</link>
<guid>9b732cc38e40261d900b8008bf9c596e</guid>
<pubDate>Sun, 01 Jun 2025 06:56:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>flocker</b> claims attack for <b>Dcsdev.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b5faa49e39df81c98af041930434fded91a036366b4f005b61a65e4f5deca066</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>flocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>nokotapackers.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23737</link>
<guid>37fa3f03f7327c7115d706e0ac58170d</guid>
<pubDate>Sun, 01 Jun 2025 00:55:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>J</b> claims attack for <b>nokotapackers.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>76a5f5fcdb71ee63cf77ae248006e6d82988710720c28c56f785b3a52a141566</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "N/A"</i><br />Target victim <b>website</b>: <i>nokotapackers.com</i>]]></description>
<category>J</category>
</item>
<item xmlns:dc='ns:1'>
<title>Baileys</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23739</link>
<guid>aca32b8b77023b56de7d479add89e4f5</guid>
<pubDate>Sun, 01 Jun 2025 00:44:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Baileys</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b5131fdd0034b636063864ea121adaabcb5a299ccbde8c417dfef928ebe075ee</i><br /><br />Threat actor <b>description</b>: <i>Bailey's the company provides catering services including both home cooking and gourmet menus. Bailey's Catering is part of a family of restaurants that include Bailey's Seafood and Grill and Ema's Restaurant in Lafayette, Louisiana. Bailey Support Services corporate office is located in 3639 Ambassador Caffery Pkwy Ste 408, Lafayette, Louisiana, 70503, United States and has 14 employees. </i><br />Target victim <b>website</b>: <i>baileyscss.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Presort-First-Class</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23740</link>
<guid>15d1a876d2bf59243be3bf0c95124747</guid>
<pubDate>Sun, 01 Jun 2025 00:43:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Presort-First-Class</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1bd92461471c213c442847cd1eab538f0e35d153994ecd3eecccf7136a9a78f</i><br /><br />Threat actor <b>description</b>: <i>Presort First Class - offer a complete array of design, print, and mail services. Presort First Class corporate office is located in 2621 SE 15th St, Oklahoma City, Oklahoma, 73129, United States and has 85 employees. The total amount of data leakage is 279.30 GB</i><br />Target victim <b>website</b>: <i>presortfirstclass.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>REMAX</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23741</link>
<guid>5580d031cccd368c6cd90bc0999c207e</guid>
<pubDate>Sun, 01 Jun 2025 00:42:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>REMAX</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b9f6240d21d6c9e3ad5c0cfb804ede849ad9b6bf826b33c9f1ebd7c066f50f2c</i><br /><br />Threat actor <b>description</b>: <i>RE/MAX (founded in 1973) is the global real estate franchisors and a subsidiary of RE/MAX Holdings.RE/MAX corporate office is located in 5075 S Syracuse St, Denver, Colorado, 80237, United States and has 140,000 employees. The total amount of data leakage is 151.80 GB</i><br />Target victim <b>website</b>: <i>remax.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Town-of-North-Providence-Rhode-Island-corporate-office</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23742</link>
<guid>2d1bafe55b0b49961617e5b71cbb1292</guid>
<pubDate>Sun, 01 Jun 2025 00:41:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Town-of-North-Providence-Rhode-Island-corporate-office</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56cf7b89754ac8e772807464ebd0e19d7f79346a6cb8bd2e1c67b833a7ee78f9</i><br /><br />Threat actor <b>description</b>: <i>The Town of North Providence provides a variety of municipal services to its residents, including online permitting, tax payment options, and community events. Town of North Providence Rhode Island corporate office is located in 2000 Smith St, North Providence, Rhode Island, 02911, United States and has 40 employees. </i><br />Target victim <b>website</b>: <i>northprovidenceri.gov</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>universityacademy.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23735</link>
<guid>957ddea273c4065ba71829725db9f50b</guid>
<pubDate>Sat, 31 May 2025 21:10:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>universityacademy.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7d565b6a2b49eb4bce026644641ab703fc6f9f602eb5d504985e48f983aa3ea</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>universityacademy.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chrisman-Commercial</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23730</link>
<guid>f87b7d1f666a0a1d86568485a520bffa</guid>
<pubDate>Sat, 31 May 2025 14:35:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Chrisman-Commercial</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f921bc37b733dc1e33c0c17db8f6522b8d6b033e2636a961f30b98b9d110682</i><br /><br />Threat actor <b>description</b>: <i>Chrisman Commercial is a professional Boulder Commercial Real Estate firm specia...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Synergy-Investments</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23725</link>
<guid>0ace141f8779c77b60cdc66fa22da900</guid>
<pubDate>Sat, 31 May 2025 04:42:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>weyhro</b> claims attack for <b>Synergy-Investments</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c30030a1a5a5c1e9cb3967a4b06c27cf2a2f965962c5e2b411ecddc39afc6c64</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Synergy Investments is a prominent real estate investment firm. Established in 1997, it focuses on acquiring and revitalizing office properties in the Boston area. It manages over 30 buildings, combining for 4 million square feet of space. The company's philosophy centers around tenant satisfaction, proactive property management, and meticulous standard of operational excellence.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>weyhro</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rousseau</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23715</link>
<guid>eb154f8b4a8349231dfd09537615c9a3</guid>
<pubDate>Sat, 31 May 2025 00:35:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Rousseau</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aba4c91f0ad76c4547dc09a40f8271b758bdd542a63788f04275bb9f340a0cfd</i><br /><br />Threat actor <b>description</b>: <i>Rousseau Farming Company specializes in providing fresh, locally sourced produce...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>mysfa.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23716</link>
<guid>d9e834c333498cfdfc276179353ea600</guid>
<pubDate>Fri, 30 May 2025 22:48:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>mysfa.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b21c6351cef47db33830f735dd21ea3a0ce2c14225ba24590e983b4e637d25a5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>meeksgroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23722</link>
<guid>0ec15baa9437436fff3e5fdbb4a7cae3</guid>
<pubDate>Fri, 30 May 2025 20:22:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>meeksgroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3630cb26194cff78c35c6cc53bd48e1e27452f6014d746eaa225fb93a222cc69</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] The Meeks Group is an Oklahoma-based company that specializes in providing various advertising services to businesses. Their service range includes graphic design, digital printing, exterior and interior signage, promotional items, and direct mail marketing. They aim to aid businesses in enhancing their brand visibility and reaching their target audience effectively.</i><br />Target victim <b>website</b>: <i>meeksgroup.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>sfhumanesociety.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23721</link>
<guid>6f240678a0a4b55d7f4046426b637fec</guid>
<pubDate>Fri, 30 May 2025 20:20:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>sfhumanesociety.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc111a1550b57de55d0a7a5ced8f61594d9676b0f54ec471fafb926d10367461</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Founded in 1868, sfhumanesociety.org is associated with the San Francisco Society for the Prevention of Cruelty to Animals (SFSPCA). As one of the world's pioneer animal welfare organizations, its mission is to save and protect animals, provide care and treatment, advocate for their welfare, and enhance the human-animal bond. It offers services including animal adoption, veterinary care, and community education.</i><br />Target victim <b>website</b>: <i>sfhumanesociety.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>donowentire.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23720</link>
<guid>283062995206f8cbf7c0b50216b9623e</guid>
<pubDate>Fri, 30 May 2025 20:19:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>donowentire.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f337340fddca54e0b75dfb5ce98e1cfd4818945f7e2172a41324ba5cc026bcc3</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Don Owen Tire Service, Inc. is a locally owned tire and automotive service provider based in Bloomington, Illinois. Founded in 1986, the company offers tire sales and services including alignment, rotation, and flat tire repair. Additionally, they provide comprehensive auto repair and maintenance services like brake repair, oil change, and battery replacement.</i><br />Target victim <b>website</b>: <i>donowentire.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>iicil.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23719</link>
<guid>1a944d032cfa82fd3fccb56ba18fb914</guid>
<pubDate>Fri, 30 May 2025 20:17:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>iicil.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b24628f4d02f81642bfed2b843706dca00dd7321613f88c612a3a5d39b2d1179</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>iicil.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tri-Point-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23712</link>
<guid>8b9322a8dde2e93f4cf2a9a2035e10bc</guid>
<pubDate>Fri, 30 May 2025 19:03:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Tri-Point-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8cf41e8de71aaba38d75294d1018df74d313178d646107d1b430fa4900529f3f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Anchor-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23710</link>
<guid>07db8d8b0ac1f36c817ca394f9c44744</guid>
<pubDate>Fri, 30 May 2025 16:55:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Anchor-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b849142de59c27925836ff6204988cabcfcb03f1aa5b01af9bbc4fa9538ac0a7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>W.E.-Bowers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23713</link>
<guid>03f396a359ef22a21e37b7b45f4d9979</guid>
<pubDate>Fri, 30 May 2025 15:38:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>W.E.-Bowers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>871fdaa6fd3253279297194866caaea75eb1ff1a3a03ae0a80bde6d3e4853baa</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.webowers.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Acorn-Sales</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23702</link>
<guid>14ea332d0684051d9fef033a5f1607dd</guid>
<pubDate>Fri, 30 May 2025 10:56:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>arcusmedia</b> claims attack for <b>Acorn-Sales</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e52ac7ef84bb864db2474fd73a56aec10342052fd522cc238860845d41ed3630</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>arcusmedia</category>
</item>
<item xmlns:dc='ns:1'>
<title>MCM-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23705</link>
<guid>4e5bda9137acc28a03969f32fcad74cc</guid>
<pubDate>Fri, 30 May 2025 10:46:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacklock</b> claims attack for <b>MCM-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d2a5d24a669b261afb59725641ddb1926e6632a296c13e6a1d7c6cb3c5edaf0</i><br /><br />Threat actor <b>description</b>: <i>Commercial & Residential Construction
California, United States
<25 Employees
MCM Construction is a leading bridge construction company in the USA, known for building over 1000 critical structures across the West.
Revenue $26.1 Million</i><br />Target victim <b>website</b>: <i>mcmconstructioninc.com</i>]]></description>
<category>blacklock</category>
</item>
<item xmlns:dc='ns:1'>
<title>MampH-Electric-Fabricators</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23698</link>
<guid>32ce0810156d354c895196cef68b2762</guid>
<pubDate>Fri, 30 May 2025 03:41:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>MampH-Electric-Fabricators</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec3b980b46c539e0a69eab79e6dcaf562f59f2478999279e3ab2a1af2c8cfa47</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jordan-Drug</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23693</link>
<guid>c02b1e8c39e84057c1a17d0eea9c8bba</guid>
<pubDate>Fri, 30 May 2025 01:50:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Jordan-Drug</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>255af3853b3f938115f185c732f13be3ee60969f9e3e1668efb8766dc170cab6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>murraybuildingcompany.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23695</link>
<guid>597e056a5873db884c0fe266918c9f07</guid>
<pubDate>Thu, 29 May 2025 22:18:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>murraybuildingcompany.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>996d84bca0bf193f79e0cbd37dc452e3e45af0e5ecd7689ed5bc4cce69fc1542</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Murray Building Company is an experienced construction management and general contracting firm based out of Birmingham, Alabama. They specialize in commercial construction in sectors including healthcare, retail, office, educational and industrial. Known for their commitment to quality, safety, and integrity, they offer a range of services from pre-construction planning to post-construction support.</i><br />Target victim <b>website</b>: <i>murraybuildingcompany.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>usmortgage.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23692</link>
<guid>ffa55e61e1dc6fbc5e6f1047a2060859</guid>
<pubDate>Thu, 29 May 2025 20:13:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>usmortgage.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4c19988b8bae728e77cddc0747ac3c6864f58b10986edb3958cb900ae40eed3e</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] USMortgage.com is a financial service provider located in the United States, specializing in home mortgages. The company offers a variety of loan products, including conventional, FHA, VA, USDA, and jumbo mortgages. It seeks to harmonize technology with customer service to streamline home financing and refinancing processes for borrowers. USMortgage.com prides itself on transparency, education, and personalized customer support.</i><br />Target victim <b>website</b>: <i>usmortgage.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>McKenzie-Commercial-Contractors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23689</link>
<guid>b68a713024cffc3a59c2936e3bc3f6e8</guid>
<pubDate>Thu, 29 May 2025 16:41:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>McKenzie-Commercial-Contractors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b61056a1d1ee5b49fa0a164c6f3ca46ee04cb54024db260a94f25589753ff72</i><br /><br />Threat actor <b>description</b>: <i>McKenzie Commercial delivers high-quality, cost-effective commerc
ial construction services, while fostering a supportive work envi
ronment for employees who provide exceptional workmanship.

We are going to upload about 42 GB of corporate data. Employee pe
rsonal information (DOB, passports, addresses, phones, emails, an
d so on), financial data, client data, lots of project data, cont
racts and agreements, confidential documents, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>bcps.k12.va.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23667</link>
<guid>3e4b663e94e918f8f9fdf1ddef046564</guid>
<pubDate>Thu, 29 May 2025 16:35:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>bcps.k12.va.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0bc282dbe1faa6b96b22d7e08e5ca230e4416b4b11f626524dcd2aea1a4835dd</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 12.06.2025.The mission of Botetourt County Public Schools is to provide all students with the quality learning experiences necessary to grow, adapt, and meet the challenges of respons            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>personalassistants.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23668</link>
<guid>84fbd798e127f7f700c17213662213ce</guid>
<pubDate>Thu, 29 May 2025 16:35:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>personalassistants.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26455b20abaa7351b62ea99a8fc30574378bd0ca2b0bc024279c940b24174e86</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 10.06.2025.In 2004, Dallas-based entrepreneurs Adam Alfia and Kfir Alfia co-founded Maestro Personal Assistants, which focuses on providing personal assistance and concierge services             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>teamhorner.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23670</link>
<guid>235d345c2ab5e66d05754f2129ed5c06</guid>
<pubDate>Thu, 29 May 2025 16:35:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>teamhorner.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6d208ca9d929d65f2d708268f96ee8786d519a3d0ea1cf0a065ee3e5d1c5785d</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 11.06.2025.Team Horner is a family of companies operating in various fields in the pool and spa industry worldwide. Founded in 1969, Team Horner is an integrated manufacturer, wholesa            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>logan.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23671</link>
<guid>d39e083be3c4b3073a3e6b25ac210c2d</guid>
<pubDate>Thu, 29 May 2025 16:35:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>logan.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>10395290db7bb37dc2df5dc848f554a3b376fea52621c72687b4cb7d13ba2aab</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 13.06.2025.Logan University is a private university specializing in chiropractic and health sciences located in Chesterfield, Missouri.
1.Part-time employment agreement between Logan            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>cpshawaii.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23672</link>
<guid>36880d4600935fcb2e721c7e7b03cc4f</guid>
<pubDate>Thu, 29 May 2025 16:35:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>cpshawaii.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f9ee81496c2509036a93dd31feef60e6a616b297a9356026d5caf6370f56087</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 12.06.2025.ControlPoint Surveying, Inc. - a recognized leader in topographic, hydrographic and cadastral surveying in Hawaii and the Pacific Rim. The name of the firm is associated wi            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ccllabel.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23673</link>
<guid>52f0afbaba42e4345bd027cb91ffc52d</guid>
<pubDate>Thu, 29 May 2025 16:35:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>ccllabel.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a08063b8bed1f547ebd507debadd176f7e86933cf1d33f482ecffb69018bf30f</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 12.06.2025.Operating in the packaging and advertising industry for over sixty years, CCL is a global leader in the supply chain of innovative, high-quality packaging, promotional medi            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>tmcousa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23674</link>
<guid>57ed2a56d827a1db93294f32c443b57c</guid>
<pubDate>Thu, 29 May 2025 16:35:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>tmcousa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ceaae29914c4f47d9f03c472efd6501cafc7005083cbe190c91088f0e3fc744</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 09.06.2025. TMCo, Inc. - an Oklahoma corporation specializing in the manufacture of orifice fittings for natural gas metering.The company was founded in September 2003 and has manufac            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>hallmarknameplate.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23675</link>
<guid>366c7be95b6644ce0d3ce9744d15a99b</guid>
<pubDate>Thu, 29 May 2025 16:35:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>hallmarknameplate.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18999bdc52f0403dc5f95adfb7ab8a601605348e56079aadeacafa51fd1e0ddd</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 14.06.2025.Hallmark Nameplate is located in a 30,000 square foot manufacturing facility in the heart of Central Florida. Since 1957, our engineering and manufacturing teams have been             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>mhmlawgroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23676</link>
<guid>b37b55cfd264be85453811ac5df63760</guid>
<pubDate>Thu, 29 May 2025 16:35:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>mhmlawgroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e4fbf975234ba876807cd46b3e489e0f2f75cfe89924cd65a232b91dc2f2bca9</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 10.06.2025. MHM Law Group is one of the fastest growing law firms in California. The firm handles all personal injury, immigration, and criminal defense matters.
1.The document is a             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ASC-Machine-Tools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23688</link>
<guid>1595ff9d30722c171e13e74e4a1455c2</guid>
<pubDate>Thu, 29 May 2025 13:29:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>ASC-Machine-Tools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba59219cc0c95ff757f6848f52c25d18ee70ad1dd368a6f802235910812ae206</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] ASC Machine Tools is a prominent manufacturer of high-quality, innovative, and dependable equipment for the metal building and steel processing industries. The company was established in 1949 and has been serving clients with their proficiency and experience in designing and manufacturing machine tools. Their product offerings include roll forming machines, panel lapping machines, and other assorted equipment.</i><br />Target victim <b>website</b>: <i>www.ascmt.com</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>radsports.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23684</link>
<guid>090793f7ac0ed3232628dbbcef5f9928</guid>
<pubDate>Thu, 29 May 2025 12:52:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>radsports.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f11741acf5716e28ee9f7ec8136bedb4bfc45876c9a1c0d4f08f54f16d41300</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>radsports.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>hennertanklines.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23682</link>
<guid>e958f912f1f1fea31e254d8a9af1825a</guid>
<pubDate>Thu, 29 May 2025 12:49:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>hennertanklines.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>64617ef38035ed898517081c8cb1b6784bf0bec8cc8a911aa85590d382ddc793</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>hennertanklines.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>metromont.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23680</link>
<guid>818d7d2cdff6df969894d2fdcd9b48ca</guid>
<pubDate>Thu, 29 May 2025 12:18:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>metromont.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a42ec8b1c1d6573c75e40a2302a823808db81a709994c995f041ec0526a2e601</i><br /><br />Threat actor <b>description</b>: <i>Commercial & Residential Construction.</i><br />Target victim <b>website</b>: <i>metromont.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Inns-of-Aurora</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23679</link>
<guid>e8334a82a2f76237442a44494eaa7a1f</guid>
<pubDate>Thu, 29 May 2025 12:17:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Inns-of-Aurora</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4c2e29c46b78a229fce96f151fd3e93b42b4da3b651bc92d182402fc27010fc5</i><br /><br />Threat actor <b>description</b>: <i>Inns of Aurora</i><br />Target victim <b>website</b>: <i>www.innsofaurora.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>codylawfirm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23664</link>
<guid>ab59511d026575e380bffdf3e6ad451f</guid>
<pubDate>Thu, 29 May 2025 02:48:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>codylawfirm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b4d48e8319a5c71f50eb1c5c13f138f2d935f6cd8fdd4bc83c9b165b6c3a58d</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>codylawfirm.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>spring-green.competbutler.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23663</link>
<guid>991b499bc45394c77e00daa945bf9353</guid>
<pubDate>Thu, 29 May 2025 02:47:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>spring-green.competbutler.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56db67782a18044b5c542cdc544b0aa37c69180db841fe9918f21c4dcedba124</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Spring-Green.com / PetButler.com are two distinct services operating under Spring-Green Lawn Care Corp. Spring-Green.com is a lawn care service provider that caters to the needs of residential and commercial lawns since 1977. On the other hand, PetButler.com provides professional pet waste cleanup and removal services to homeowners and community management.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>paynecountyok.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23662</link>
<guid>e90472e9ea9853ecd17b1c9ab92b1c86</guid>
<pubDate>Thu, 29 May 2025 02:45:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>paynecountyok.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3317b731c8380fd3709dbb38474d33dd0b3ae14b6f403f331cfb75830883b298</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>paynecountyok.gov</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>KDV-Label</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23660</link>
<guid>bea3ffc1d96446a163e19bb227167508</guid>
<pubDate>Wed, 28 May 2025 22:53:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>KDV-Label</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4cf1f581964574554e2b717f7e9019a16617cba2c3cb925babcafa6585331ecd</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eliel-Cycling</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23657</link>
<guid>6c73721a871329829847f6285edeb2e9</guid>
<pubDate>Wed, 28 May 2025 20:52:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Eliel-Cycling</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c68c39f53a6e612f87c58c5041da0dd9bea196dc6c02d0fe782a88ee53c03b9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>innovasystems.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23652</link>
<guid>7d13726bb9469494463cbbacda798767</guid>
<pubDate>Wed, 28 May 2025 19:35:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>innovasystems.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d91574a23130d7713306593a8b5a832ee4d9c8d4d0f8dab97bea9a2bbedf2578</i><br /><br />Threat actor <b>description</b>: <i>InnovaSystems, Inc., based in Mooretown, New Jersey, was founded by John Waters (President) and Nick Schreier, in 1989 as a technology engineering company. InnovaSystems provided then, and continues to provide now, a single source for clients            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cator-Ruma--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23656</link>
<guid>21a750226c83e601b384a7a0152d016a</guid>
<pubDate>Wed, 28 May 2025 18:57:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Cator-Ruma--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f54768eacae723dfec12ba185bdf650bc11df00c9753baf3a84f23cd286c0754</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Quick-Frames-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23658</link>
<guid>0aff028f25c8fe99cfb354019e09ffb2</guid>
<pubDate>Wed, 28 May 2025 18:46:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacklock</b> claims attack for <b>Quick-Frames-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a07169f150cd56fa14a36539e0f27a97bbc19acd24c8b4c5fddccb8898c9c12</i><br /><br />Threat actor <b>description</b>: <i>Internet Service Providers,
Website Hosting & Internet-related Services
Arizona, United States
<25 Employees
QuickFrames specializes in manufacturing innovative steel components for the commercial construction industry, offering products like bolt-in and drop-in roof frames.
Revenue <$5 Million</i><br />Target victim <b>website</b>: <i>quickframes.com</i>]]></description>
<category>blacklock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Neurosurgeons</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23659</link>
<guid>87ec75e4dbff0ddfc685a412e5784a8b</guid>
<pubDate>Wed, 28 May 2025 18:44:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacklock</b> claims attack for <b>Neurosurgeons</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc531209f32a34fe203bc2bc5e41ecf34d496812ffd63c741b480dae9e0684d8</i><br /><br />Threat actor <b>description</b>: <i>Hospitals & Physicians Clinics
New Jersey, United States
65 Employees
Neurosurgeons of New Jersey is a highly rated medical practice specializing in neurosurgical care, including conditions related to the spine, brain, pediatrics, and cerebrovascular systems.
Revenue $7.6 Million</i><br />Target victim <b>website</b>: <i>www.neurosurgeonsofnewjersey.com</i>]]></description>
<category>blacklock</category>
</item>
<item xmlns:dc='ns:1'>
<title>High-Grade-Materials</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23654</link>
<guid>cb16e9966ff8b9db87d4ab07b1d9c117</guid>
<pubDate>Wed, 28 May 2025 14:45:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>High-Grade-Materials</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8c48662dd3004aee7045b8c63eb2c2b9c1e167f2851ae28c7c901448bb9bfc2b</i><br /><br />Threat actor <b>description</b>: <i>High Grade Materials is a Michigan-based company specializing in 
concrete and concrete-related products.

We are going to upload about 20 GB of corporate data. A lot of em
ployee information (DOB, passport number, address, phone and so o
n), detailed financial data (audits, payment details, reports, in
voices), contracts and agreements, death/birth certificates, NDAs
, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lasercam</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23639</link>
<guid>ba96dac54c2c763e2bd077c7753ce6c1</guid>
<pubDate>Tue, 27 May 2025 21:37:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Lasercam</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96577451cc4b15ed51813a901954e50d467631d792c7ed7944239269667201b4</i><br /><br />Threat actor <b>description</b>: <i>Lasercam specializes in providing advanced milling machines and a variety of cutting tools including dies, blanking tools, and stripping tools. Their products cater to industries that require precision machining and tool-making solutions. Whi            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cape-Robbin-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23640</link>
<guid>fb9498c98b58294f190a52c37c2972d9</guid>
<pubDate>Tue, 27 May 2025 21:37:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Cape-Robbin-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e3f9188fa376f468fbdfff2ad3b328ef53b6addfffcae84f6a3073262f53bea</i><br /><br />Threat actor <b>description</b>: <i>Cape Robbin is the ultimate runway-inspired fashion brand for women’s shoes, offering a combination of style and affordability. Featuring bold heels and chic sandals, each designed with the fashion-conscious woman in mind. Cape Robbin is a             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Flagship-Bank</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23641</link>
<guid>09c1279b01289fa282367675519325a1</guid>
<pubDate>Tue, 27 May 2025 16:37:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Flagship-Bank</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab24b675527c6af9ef17457c6d8c5a4a491e16438070648def963256f8b232bc</i><br /><br />Threat actor <b>description</b>: <i>Flagship Bank was founded by a local Board of Directors, owned by
committed local shareholders and operated by successful, local b
ankers with deep roots in our community.

We are going to upload about 40 GB of corporate data. A lot of cl
ient information (DOB, SSN, passport number, address, DLs, phone 
and so on), detailed financial data, contracts and agreements, ce
rtificates, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Valiant-Energy-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23644</link>
<guid>22b13941c56521821183db80d815f772</guid>
<pubDate>Tue, 27 May 2025 16:13:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Valiant-Energy-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3ebe7bced80bdc7758bf0283710d4b9828839e0de985e5bf1e64ebed1a9008e</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Valiant Energy Solutions is a company specializing in energy-efficient home improvements. Their services include insulation, solar panel installation, and HVAC systems upgrades aimed for energy savings and improved home comfort. They provide a comprehensive energy audit, identifying areas where energy is wasted and recommending solutions accordingly.</i><br />Target victim <b>website</b>: <i>valiantenergy.com</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>AC-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23638</link>
<guid>38df353da59fb1e8073e120c9c0f9482</guid>
<pubDate>Tue, 27 May 2025 13:47:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>AC-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c2f00b0e69b2523d710bd8d03892f1d6b47272c41b7e6df81577965020690f3</i><br /><br />Threat actor <b>description</b>: <i>A/C Supply, Inc. is a leading wholesale distributor of HVAC-R products in southern Louisiana and Mississippi. With twelve branches in Louisiana and Mississippi, A/C Supply employs highly qualified staff with the integrity and dedication you expect from a third-generation family business. At the same time, they take their cybersecurity and their customers seriously.</i><br />Target victim <b>website</b>: <i>ac-supply.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brackett--Ellis</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23637</link>
<guid>e7d12fcc90af55f987e5f7017880e9c1</guid>
<pubDate>Tue, 27 May 2025 13:39:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Brackett--Ellis</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c32d3bb5736e8e353eb684101531e857b91c9c6535fb0eef71a1befd95359d4</i><br /><br />Threat actor <b>description</b>: <i>Brackett & Ellis provides legal advice for private businesses of 
all sizes, governmental entities and non-profit organizations. 

We are going to upload about 40 GB of corporate data. Lots of cli
ent information, financial data and payment details, contracts, e
mployee personal documents, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wrap--Send-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23635</link>
<guid>e3bb9fa75d0ae7da40a40c4e3f2f3fd4</guid>
<pubDate>Tue, 27 May 2025 11:54:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Wrap--Send-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a0488718fc86cbeb85757a924f659d4a3ea6c29638e30f1b0340fd9c16ab625</i><br /><br />Threat actor <b>description</b>: <i>Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>wrapandsend.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sylvania</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23623</link>
<guid>100173f99f8fbdbf4ed1b56e6cf50f9d</guid>
<pubDate>Tue, 27 May 2025 03:47:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Sylvania</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f70fcac638b6d73b13f6301b783c7b2f030f7f97b1074be9d1454762f8f2ef0</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Sylvania is a leading designer and manufacturer of lighting systems and specialty products with operations and sales worldwide. It offers a wide range of products including, incandescent, fluorescent, and HID lamps, as well as LEDs. The company was originally established in 1901 as the Novelty Incandescent Lamp Company. The American brand is now owned by the Austrian company LEDVANCE, part of the Chinese lighting company MLS Co. LTD.</i><br />Target victim <b>website</b>: <i>www.sylvania-lighting.com</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>A-M-King</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23621</link>
<guid>33c1551e32887aef85c6007466e667a0</guid>
<pubDate>Tue, 27 May 2025 01:48:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>A-M-King</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>27576699d88179623435e9a3add88c5e92baf1c453ce5b892c42d6f9919c1314</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] A M King is a comprehensive design-build firm primarily serving the food processing, distribution, and industrial-manufacturing sectors with construction, engineering, architecture, and property consultation services. With offices in several US states, they focus on delivering high-quality facilities to enhance their clients' operational efficiency and business growth.</i><br />Target victim <b>website</b>: <i>www.amkinggroup.com</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>labbeemint.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23618</link>
<guid>80d4c0e3d8705d1ae4cfd19dd89fa34a</guid>
<pubDate>Mon, 26 May 2025 20:53:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>labbeemint.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91cbd6dc2f99aa3d3e4ec43c641a921174b27492176de08e466bdbe41fc30724</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Labbeemint Inc. is a global trader and exporter of mint and related products. It is based in the Yakima Valley, WA, USA. They specialize in providing top-quality mint oils such as peppermint oil and spearmint oil. They are committed to achieving customer satisfaction by providing high-quality products from a sustainable and environmentally friendly business operation.</i><br />Target victim <b>website</b>: <i>labbeemint.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>servicecentermetals.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23617</link>
<guid>807f390d98ca80c5d0d8f508f26b8656</guid>
<pubDate>Mon, 26 May 2025 20:51:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>servicecentermetals.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f19f42d02578cabeb16aad0e7f103af86cdbf9c94e209543753c378b40d12e4</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Service Center Metals is a leading producer of extruded aluminum products in the US, headquartered in Prince George, Virginia. The company provides a variety of aluminum billets, rods, bars, pipes, and tubes to manufacturers and service centers. It aims to deliver high-quality products with top-tier customer service, rapid lead times, and competitive prices.</i><br />Target victim <b>website</b>: <i>servicecentermetals.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>ozarkah2o.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23616</link>
<guid>50ae0ce8c27842532dcd83c3678302bc</guid>
<pubDate>Mon, 26 May 2025 20:50:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>ozarkah2o.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa3ed8c29f9948cc220412d27cc55ee8158cfd668605dbee57693770971fa00d</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "Ozarkah2o.com" is the official website for Ozarka, a Texas-based company that specializes in providing bottled spring water sourced from three natural springs in Texas, USA. They also provide a home and office delivery service. Their product range includes various sizes of bottled water and refreshing flavored water. Excelled in maintaining purity, hydration, and tradition, the company emphasizes sustainable bottling practices.</i><br />Target victim <b>website</b>: <i>ozarkah2o.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fredericks-Machine--Tool-Shop</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23613</link>
<guid>f66d6e86ad128c934d9f1c3ea9d19155</guid>
<pubDate>Mon, 26 May 2025 20:42:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Fredericks-Machine--Tool-Shop</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>01689ffe6d17714523f296f2505adb84dc440d26ec5cb21b05dd18db82426c57</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.fredmach.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>dcbflegal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23610</link>
<guid>d0310f4638328873adcc399bca91eb4e</guid>
<pubDate>Mon, 26 May 2025 19:48:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>dcbflegal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ced6d4f5a979d2b91d982103c57b63970df80bfd3d1abb7e4e30fa1b0ba2293c</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>dcbflegal.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Siena-Hotel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23596</link>
<guid>eede2d28a4d05ac58f8b79102668ad34</guid>
<pubDate>Mon, 26 May 2025 18:43:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Siena-Hotel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>207f5431c0d1f9a77e35e9ddae5157afbcf3ef02bea80546306d2f4e6f49fef6</i><br /><br />Threat actor <b>description</b>: <i>Siena Hotel (United States)</i><br />Target victim <b>website</b>: <i>laketahoereno.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>allstarflooring.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23586</link>
<guid>cd5e6ee3930e5d315f8139d1a87bb106</guid>
<pubDate>Mon, 26 May 2025 01:55:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>allstarflooring.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fbb52015760933369a355ab866bb0bbced395174b831662e3ec4a2d4d5f53ac0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>Constructive-Building-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23589</link>
<guid>0eb0cfb54e452e7c8110cd04ad6588dd</guid>
<pubDate>Sun, 25 May 2025 23:19:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Constructive-Building-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eaddea35db6ac50e3ad87a37a366e74e367f4747ec83d7b65b2f7226072b5f85</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>constructivebuildingsolutions.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>oxparkrec.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23585</link>
<guid>a415f28ee13ec97d6219867fbc7bbadb</guid>
<pubDate>Sun, 25 May 2025 22:47:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>oxparkrec.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ef8d4bbac65ec7ebc37cf6b907dc125e1ee3ad60c2cf3af1b0d4419e7c14f85f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Reliance-Heating</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23587</link>
<guid>9113d1fb04f713f1aeb47559f70d98d0</guid>
<pubDate>Sun, 25 May 2025 21:18:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacklock</b> claims attack for <b>Reliance-Heating</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d93434d990dc9920f0f26bef14c0fea93a573cdb43440c5f1a56f9e3e9b94a6</i><br /><br />Threat actor <b>description</b>: <i>Reliance Heating and Air is a repair, service, replacement, and maintenance company specializing in heating, cooling, air conditioning, heat pumps, ductless mini-splits, refrigeration, and furnaces. They serve residential and commercial clients in the Metro Atlanta and Nashville areas.
Revenue: $21.7 Million</i><br />Target victim <b>website</b>: <i>www.reliance-hvac.com</i>]]></description>
<category>blacklock</category>
</item>
<item xmlns:dc='ns:1'>
<title>iss-na.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23584</link>
<guid>27554b4e74f998f4d3ba09d6ad8a7298</guid>
<pubDate>Sun, 25 May 2025 19:00:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>iss-na.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a10fd0545c34fffe98101e5b27e4aba391e3a022afe2723d4f9a0d0247357431</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2007. Industrial Service Solutions is headquartered in Houston, Texas. Industrial Service Solutions processes equipment across a set of industrial markets and servicing and inspections.</i><br />Target victim <b>website</b>: <i>iss-na.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>icgad.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23582</link>
<guid>bb8bf48a4f86fb1a77d0d0953d87958e</guid>
<pubDate>Sun, 25 May 2025 18:58:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>icgad.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec51655a13362358442aff0bda7f4fc43982f9b0cffee5b3a5986f7a1c0394f1</i><br /><br />Threat actor <b>description</b>: <i>Interstate Commercial Glass and Door, Inc. is a glass and glazing subcontractor serving primarily Northwest Ohio and Southeast Michigan, specializing in new builds and renovations for schools, hospitals, and office buildings. With over 18 years of</i><br />Target victim <b>website</b>: <i>icgad.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>dbhcares.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23581</link>
<guid>8b95884dcc6ea520e0095f32f54e7064</guid>
<pubDate>Sun, 25 May 2025 18:56:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>dbhcares.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce419803973750cdc7182dd12dd30d00180ed778b7f8ec794a568991401c0312</i><br /><br />Threat actor <b>description</b>: <i>Desert Behavioral Health (DBH) was founded in 2009 based on the Bio-Psycho-Social integrated mental health services model. In the past years, DBH has provided outpatients mental health services for thousands of clients in Southern Nevada.   Desert</i><br />Target victim <b>website</b>: <i>dbhcares.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>icmtx.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23580</link>
<guid>f7cfa8780f43a33e8c7cb304363bbe08</guid>
<pubDate>Sun, 25 May 2025 18:55:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>icmtx.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c05b202dc982fd79ab2c2de658c1ddd358c4853620dc93dd3eb560fd79bc38bb</i><br /><br />Threat actor <b>description</b>: <i>TICM specializes in designing and building control panels. That is our focus and our expertise. This allows us to meet deadlines, provide competitive pricing, and provide panels that truly meet the needs of the customer. We understand what is invo</i><br />Target victim <b>website</b>: <i>icmtx.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>jastreet.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23576</link>
<guid>4c5bc9874d7876f9b7b6959d3c555f45</guid>
<pubDate>Sun, 25 May 2025 18:53:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>jastreet.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4bef7ea90cc83b9b87dec6bb5fbe45187bb5c22a861bfc97dfbacc3e627e166a</i><br /><br />Threat actor <b>description</b>: <i>J.A. Street & Associates is one of the most respected General Contracting firms in Northeast Tennessee and Southwest Virginia. The company has grown over the years by providing our clients with the best fully-integrated service available and have</i><br />Target victim <b>website</b>: <i>jastreet.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>neffendorfblockercpa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23579</link>
<guid>c8a52336a75c71009c0809142766eb24</guid>
<pubDate>Sun, 25 May 2025 18:52:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>neffendorfblockercpa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e91e9af4ad543ed3d60ac7f7f34c81894122dd66ce4c7a4618d0b2307e0b2b90</i><br /><br />Threat actor <b>description</b>: <i>Neffendorf & Blocker, PC is a full-service, licensed accounting firm operating in the Texas Hill Country. We bring personal attention and care to our work with each of our clients.
We value your privacy very highly. Please read this Privacy Policy</i><br />Target victim <b>website</b>: <i>neffendorfblockercpa.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>gosvt.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23578</link>
<guid>235e750be0043b6784a3f0d91f4bbd23</guid>
<pubDate>Sun, 25 May 2025 18:50:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>gosvt.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e91f88e3358e9ca7a999fbc359b05b85c88325d8f94cd96d0a30f0349ea3c22</i><br /><br />Threat actor <b>description</b>: <i>SVT specializes in designing, engineering, commissioning, and servicing turn-key commercial audio/video systems including IT, audio/video distribution, digital signage, surveillance & security, broadcasting and a host of other technology systems.</i><br />Target victim <b>website</b>: <i>gosvt.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>vazirilaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23577</link>
<guid>1822a750b7c610a4749911c916422dc7</guid>
<pubDate>Sun, 25 May 2025 18:49:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>vazirilaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>98dee2eca753c37d60b8b4949c36be4b15a4c96cde94e9b9f34ceac02b82d685</i><br /><br />Threat actor <b>description</b>: <i>Vaziri Law Group has the expertise, dedication and experience combines extensive experience, deep knowledge of the law and dedication to protecting the rights of accident victims to get you justice. Whether you were the victim of a personal injury</i><br />Target victim <b>website</b>: <i>vazirilaw.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>Coweta-County-School-System</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23572</link>
<guid>6c7a9f7314e184c928cd9fd0efd3b659</guid>
<pubDate>Sun, 25 May 2025 00:33:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>Coweta-County-School-System</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0fbb59b36f467040fb144eb01f9727d8c80eecf5df33df3aaa58620327e0678</i><br /><br />Threat actor <b>description</b>: <i>The Coweta County School System (CCSS) is the primary educational organization in Coweta County, Georgia, United States. It serves more than 23,000 students in grades pre-kindergarten through 12th grade and includes 34 educational institutions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>South-Atlantic-Federal-Credit-Union</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23563</link>
<guid>d0bed3a3e689d20f4f3fd0b5eecd2d4b</guid>
<pubDate>Fri, 23 May 2025 22:50:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>South-Atlantic-Federal-Credit-Union</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1136859d4d98be3016cc449d2f0f1c657d7cb21db1b45bb925ab1ba3e2f45cea</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kalamazoo-Public-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23567</link>
<guid>273cfc835c96d80d6f1f254d6a8f0ffa</guid>
<pubDate>Fri, 23 May 2025 22:16:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Kalamazoo-Public-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d5f8af764b8c274cb6a106394bb7fb2d3d11c1d4c55e454e6fbcf74f7a0cc4da</i><br /><br />Threat actor <b>description</b>: <i>Kalamazoo Public Schools oversees 25 public schools in the district . Provides educational services for students ranging from preschool to high school. The district offers diverse programs including adult education, special education, and various extracurricular activities to support student growth. It aims to serve the local community by fostering academic excellence and personal development among students. Additionally, it collaborates with various community organizations to enhance educational outcomes and support for families.</i><br />Target victim <b>website</b>: <i>kalamazoopublicschools.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vernon-Milling</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23566</link>
<guid>ebb884f6fc4d14827b8c55d8411d8213</guid>
<pubDate>Fri, 23 May 2025 20:43:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Vernon-Milling</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca0843963200f0b40d83311660be34dc45af0e13132aa8a485d9194ee72e0340</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.vernonmilling.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.paragonradiology.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23558</link>
<guid>73ed442a8eafbb129543b88781c73b74</guid>
<pubDate>Fri, 23 May 2025 11:43:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>www.paragonradiology.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77a96a3c073e17577c22b351ae8e5eeb87dfdb964110e4ec8cfcf161aa586f34</i><br /><br />Threat actor <b>description</b>: <i>200k USD</i><br />Target victim <b>website</b>: <i>www.paragonradiology.com</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.bestop.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23552</link>
<guid>9338acdf75d9aba376431a59973effaa</guid>
<pubDate>Fri, 23 May 2025 00:37:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.bestop.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>abb26f3b785d9442fba7501d928cb3783cf34959d8980e200ba3994fab323811</i><br /><br />Threat actor <b>description</b>: <i>In the shadow of the Rocky Mountain foothills in 1954, Tom Bradley started Bestop in a small upholstery shop in Boulder, Colorado. He envisioned a Jeep top that could easily open up to let in the pine-scented air and warm sun, making his driv            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bronx-Pro-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23550</link>
<guid>a40dd893c0c55a729d56d7b96c2d1963</guid>
<pubDate>Thu, 22 May 2025 15:08:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Bronx-Pro-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ede3099581cd6ee34c5ad58aaca531ad1c5b892f9bc102f81c1fbc281fdad2d</i><br /><br />Threat actor <b>description</b>: <i>Bronx Pro Group is a neighborhood-based firm that employs approxi
mately 100 professional and support staff engaged in real estate 
development, construction, property management, and residential s
ervices.

We are going to upload about 269 GB of corporate data. Numerous e
mployee personal documents (SSNs, passports, driver licenses, add
resses medical documents), contracts and agreements, client infor
mation, detailed financial data, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Haymond-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23548</link>
<guid>f3951984ba66822371d22499b47cef00</guid>
<pubDate>Thu, 22 May 2025 14:18:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-Haymond-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>82ef2f1bcfc75ba96bed851307b9f67c143819b21b41db9d145656ad02134e8e</i><br /><br />Threat actor <b>description</b>: <i>The Haymond Law Firm specializes in personal injury law, providin
g expert legal representation for clients injured in accidents in
cluding auto, motorcycle, medical malpractice, and slip and fall 
cases. Any many of their clients will be able to find their docum
ents and photos in our blog soon.

We are going to upload more than 20 GB of essential corporate doc
uments such as: a lot of clients personal documents (passports, d
river licenses, photos, documents with personal information inclu
ding SSNs), court records, police reports, medical records, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Professional-TestingCorporation-PTC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23549</link>
<guid>c4caeed371d0e0dc4a6ea62b9e297914</guid>
<pubDate>Thu, 22 May 2025 14:18:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Professional-TestingCorporation-PTC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d8a5eaf9b5e61b584dd4b6b9718c7b9a8d0dd9744d133a4a09c633502b2ffd25</i><br /><br />Threat actor <b>description</b>: <i>Professional Testing Corporation (PTC) is an established global l
eader in testing and assessment services.

We are going to upload about 5 GB of corporate data. Employee per
sonal documents, medical records, confidentiality agreements, con
tracts, client information, detailed financial data, project data
.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>piercecountylibrary.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23546</link>
<guid>c1aa157f9e8516370e3345f226ef62fc</guid>
<pubDate>Thu, 22 May 2025 13:15:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>piercecountylibrary.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3072b99b542354c2f717d57caf4ffbb79152fb287d24b029ecf47502360c25c3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Curewell-Pharmacy-amp-Surgicals</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23542</link>
<guid>860f5834f8e7f8e2834fc2957042760e</guid>
<pubDate>Thu, 22 May 2025 09:01:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>Curewell-Pharmacy-amp-Surgicals</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea77678aa7ad63ebf5e99c3cb5bc437c56f54d8fa330eb5fa8ea112e5fcd85a8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Coca-Cola</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23541</link>
<guid>ac4e60ea6e45a09da42c7e8fb15ce613</guid>
<pubDate>Thu, 22 May 2025 04:45:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Coca-Cola</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63dc2100affc40fc0d1e89ba54b4ec037ad45e04dc3fb54c49811eeca16c3586</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Founded in 1886, Coca-Cola is a world-renowned beverage corporation and manufacturer headquartered in Atlanta, Georgia. It's widely recognized for its flagship product, Coca-Cola, although it offers more than 500 brands in over 200 countries. In addition to its namesake soda, its portfolio includes beverages like tea, coffee, water, juice, and energy drinks.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>CNHI-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23536</link>
<guid>9bf8d7d48a8543f9d4e60aa9da5e9ef9</guid>
<pubDate>Thu, 22 May 2025 01:55:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>CNHI-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc5b7b115e351c6a74c65fdb968bd4325f331b2ba68f6dfe281aba90a5e18333</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-HolidayAdult-Care-Community--Retirement-Homes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23522</link>
<guid>6a8ceeefa2c42b104a67547efbe79c9d</guid>
<pubDate>Wed, 21 May 2025 23:35:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-HolidayAdult-Care-Community--Retirement-Homes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>05f37ac2ca0e8fa808827de377f62f6542a1ed1e85cd67e2a21ef16ac0b89c86</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 29.05.2025.Holiday Skilled Nursing and Rehabilitation Center in Manville is a family-owned facility that has been proudly serving Northern Rhode Island since 1973. Our team is compose            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>AttainX</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23525</link>
<guid>cadc5ec64be94f3e60c8d3e5cc0c6051</guid>
<pubDate>Wed, 21 May 2025 22:48:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>AttainX</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8cb40a7bfbbbff546ede8e97f2ef0238f9ca01f4efd6e4f7a0fc4bf0a4fca17</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Greater-Seattle-Concrete</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23537</link>
<guid>324e9b29cffceb04eadde72f374f201c</guid>
<pubDate>Wed, 21 May 2025 21:39:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Greater-Seattle-Concrete</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5bf156114c64b24f8d184d615d560985b57665546be3894a086b739ae5e93cda</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.gsconcrete.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>servicedecorating.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23532</link>
<guid>419e4410da152c74d727270283cb94ce</guid>
<pubDate>Wed, 21 May 2025 20:53:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>servicedecorating.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9061bc7d40ebdc804cb759121d3b8c6c1b33954c95cc2354c8cef5d29e5d0b0b</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>servicedecorating.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>proctorlane.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23528</link>
<guid>d9b4a06254d114b216a6f17cbaec726a</guid>
<pubDate>Wed, 21 May 2025 20:47:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>proctorlane.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ffc88b1f0e19b66c635b18d72fcfd1c71a1803e253d0cc91d841edac2e1febb2</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>proctorlane.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Neighborhood-Development-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23521</link>
<guid>0d38fd270d6f28bb2fc45ec2571b758e</guid>
<pubDate>Wed, 21 May 2025 19:06:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>Neighborhood-Development-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97cee09f118adeccc674dc4ac97762e25bc1f09b0eed79482ec7db7d69044513</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.seashoremotel.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23520</link>
<guid>cbc3f6f4fc0be8be1ac4e89bd93caf69</guid>
<pubDate>Wed, 21 May 2025 11:55:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>www.seashoremotel.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e018e7deea7faa2ef40aaee5b96f1c93059dcf598390d46652a3543f3892330</i><br /><br />Threat actor <b>description</b>: <i>A large amount of valid banking card data from various sources – customer information from ID cards, passports, and driver's licenses – email addresses, phone numbers, full names – and selfie photos.</i><br />Target victim <b>website</b>: <i>www.seashoremotel.com</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>Semple--Cooper</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23512</link>
<guid>7ef56a612dc07386bb19c2fb68d015bf</guid>
<pubDate>Wed, 21 May 2025 00:20:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Semple--Cooper</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>70f6d3a6625f93a334c2c3bd650d5a01112f2090d7a9022eaf743f7101676e4f</i><br /><br />Threat actor <b>description</b>: <i>Semple, Marchal & Cooper, LLP is a leading regional Certified Public Accounting firm based in the Southwest, offering a range of professional services including accounting, auditing, tax planning, compliance, and management consulting. The firm is dedicated to serving various sectors such as technology, healthcare, retail, and non-profits, emphasizing innovation and personalized solutions for each client.</i><br />Target victim <b>website</b>: <i>https:semplecpa.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Florida-Lung</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23508</link>
<guid>05d446b21e401cdc44ea5ddb67ff0031</guid>
<pubDate>Tue, 20 May 2025 20:57:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Florida-Lung</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0ebe7bf4e39c1133fa066e59545ac567e58c16b029a5e7b47cf1f11cc6fb84a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Durham-Arts-Council</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23507</link>
<guid>91728cf7dae9380f099fa6bd25969680</guid>
<pubDate>Tue, 20 May 2025 19:01:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>Durham-Arts-Council</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>830c49c7a0fb61775661f44cf062d46be33c5f9a140873cceecccc7a28ad98b2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Reece-Noland--McElrath-Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23745</link>
<guid>860fe1a72849de8657e95c3fbd819233</guid>
<pubDate>Tue, 20 May 2025 18:46:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Reece-Noland--McElrath-Engineers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f809062a22a3b42f0fac14bad1c87c4e59ec26ef185316ec1544bdfce45c3ae4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>rnm-engineers.com</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>tennsco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23506</link>
<guid>37cb321154312a5a2f4c9e0e507e9a4c</guid>
<pubDate>Tue, 20 May 2025 18:33:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>tennsco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6c3cab2a89981efb7597554828f6a8f126424ab294bd868d66e951391b1e541</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 1.06.2025.Founded in 1961, Tennsco manufactures and supplies storage and archiving systems, steel office furniture, industrial and institutional systems, shelving, lockers, and commer            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rommels-AcRommel-ElectricRommel-Harley---Davidson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23502</link>
<guid>bc9ebb08357dd4ea859912a69b5f9a0a</guid>
<pubDate>Tue, 20 May 2025 17:30:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Rommels-AcRommel-ElectricRommel-Harley---Davidson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f914332343aea40bf1388404411fb245ea9b1c8e5d4827956188505d513e5819</i><br /><br />Threat actor <b>description</b>: <i>Rommel's Ace is part of Rommel Holdings, Inc., a mid-sized holding company located in Fruitland, MD. Rommel Holdings has owned andoperated a variety of businesses dating back to the 1950's.We are going to upload about 2 GB of corporate data. This is not much but there is so much personal information of almost every employee including terminated ones. Passport numbers, addresses, personal emails, SSNs, medical records and is on. You will also find a lot of accounting and projects files of Rommel Electric and Rommel Harley - Davidson companies.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Making-Tech-Happen</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23499</link>
<guid>950a9f7312a63246f7e96fe4d17a4fc6</guid>
<pubDate>Tue, 20 May 2025 15:35:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Making-Tech-Happen</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ddad8af78dfffa68963d655a0b734b60c5ba32c4661d9d1b3a1f83c7de2cc8c8</i><br /><br />Threat actor <b>description</b>: <i>Making Tech Happen is a software solutions provider based in Santa Rosa, CA.We are going to upload more than 8 GB of corporate documents suchas: employee personal documents (passports, driver licenses, SSNs), accounting files, lots of projects files, etc. A diary recordof one of employees as a bonus.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Vascular-Experts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23504</link>
<guid>0cac8ef0217411b26be6840a65e14e88</guid>
<pubDate>Tue, 20 May 2025 14:50:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>The-Vascular-Experts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d88ff42d266c3fbf23e54bfe34f2d06f39542d1470d51bc361af3c47f03d5b2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tri-State-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23501</link>
<guid>85bea3bb05e27edacbfd0a70ef277160</guid>
<pubDate>Tue, 20 May 2025 13:15:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Tri-State-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2db48b8b43929d0375115ec2589623741255735d6614eb7b6106174922869891</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Landmark-Properties</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23505</link>
<guid>f8ee3bdb4999cd30c1d8931585db1a7b</guid>
<pubDate>Tue, 20 May 2025 11:38:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>morpheus</b> claims attack for <b>Landmark-Properties</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b9625f595f103bc82ae09f542512778204e7a4978da8a733a842855de2f6e60b</i><br /><br />Threat actor <b>description</b>: <i>**Website**: landmarkproperties.com

**Revenue**: $1.5 Billion

Landmark Properties is a fully integrated real estate firm specializing in development, construction, management, investment, and consul</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>morpheus</category>
</item>
<item xmlns:dc='ns:1'>
<title>K--K-Fence</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23493</link>
<guid>f32d17a18e87b47c0dea1db1ee53774a</guid>
<pubDate>Mon, 19 May 2025 20:54:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>K--K-Fence</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22dc783dc36d0eeaf34e945a11d9d964338c66efb49113d283eade5cf39adab4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>DMG-Contractors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23751</link>
<guid>8b48e30332fc417534491ce3fda913b9</guid>
<pubDate>Mon, 19 May 2025 18:57:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>DMG-Contractors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4024fcbd3dbb733a185755b28ec75561c393eed1d0cde4123296631c65e700c2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>dmgcontractors.com</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>Strand-Ag-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23750</link>
<guid>e4ad3061dc592b68a36c62b7681e2e0e</guid>
<pubDate>Mon, 19 May 2025 18:55:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Strand-Ag-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc6430b22623d2a2a87e22c6f23d653e397b8f496762f8d09773cc0847fe533b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>strandagsupply.com</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>Buford-Ranches</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23747</link>
<guid>8708cc4b4fd657032eddc86555279921</guid>
<pubDate>Mon, 19 May 2025 18:50:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Buford-Ranches</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a4f22001e62cc7f785affd002a41ff0d8d3bb43c38eff5876af5f9544909b476</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>bufordranches.com</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>edgeanalytical.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23483</link>
<guid>cb9233ed32223e52344649be4f3d1147</guid>
<pubDate>Mon, 19 May 2025 16:29:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>edgeanalytical.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a8a76fc2982ed32334c542e4b5c4292292c26c629c70e2ee6bf7853d08f1546</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 28.05.2025.Edge Analytical provides comprehensive laboratory testing services including organic, inorganic, microbiological analyses and specialty testing for drinking water, soils, b            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Williams-Patent-Crusher--Pulverizer-Co.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23484</link>
<guid>2a354897d7fb1623d7f90eb60c9f6a4d</guid>
<pubDate>Mon, 19 May 2025 16:29:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Williams-Patent-Crusher--Pulverizer-Co.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e17996b5c23c9781e53dd6b1cbaa1043b778a11ec0c5187e8bb2a0f48bbdac81</i><br /><br />Threat actor <b>description</b>: <i>Williams Patent Crusher & Pulverizer Co. offers a vast product line including Roller Mills, Pulverizers, Hammer Mills, Primary & Secondary Crushers, Impact Dryer Mills, Impact Crushers, Refuse Shredders, Shear Shredders, Nife Hogs, Nife Granulators, Wood Hogs,Chippers, Apron Pan Feeders, Feeder Breakers, Air Classifiers, Single & Double Roll Crushers, and so much more.We are going to upload more than 33 GB of essential corporate documents such as: employees personal emails, passport, driver license, SSNs, personal emails and home addresses, confidentiality agreements, projects data, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>DSI-Tech</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23479</link>
<guid>6f7790bb54a7c5d3dea27385488a604a</guid>
<pubDate>Sun, 18 May 2025 16:25:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>DSI-Tech</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>10087a3653634dcb66c04569bb9ccb88ca3c46c63334753f780b78fb3a575a01</i><br /><br />Threat actor <b>description</b>: <i>DSI Tech (founded in 1991) is a certified minority-owned small business that has grown into a it value-add reseller and service provider of industry vendor products and solutions. DSI Tech corporate office is located in 44670 Cape Ct Ste 100, Ashburn, Virginia, 20147, United States and has 223 employees. The total amount of data leakage is 399.10 GB</i><br />Target victim <b>website</b>: <i>dsitech.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>ngca.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23463</link>
<guid>871507605e87e9fbe8db5459252c5416</guid>
<pubDate>Sat, 17 May 2025 18:48:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>ngca.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1c9cf80f2d11fb9e487a8da96e7a55c504495584ac978facf09d09d2dc20afd</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>ngca.net</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>redsquaredentalcare.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23461</link>
<guid>2c4e561715e3181ffd2433227eebcdd6</guid>
<pubDate>Sat, 17 May 2025 18:45:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>redsquaredentalcare.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>725f2e1f7a0ab037b09cc88a33823c27675b6199c10c249aa78c9144089db067</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>redsquaredentalcare.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>overheadtyler.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23460</link>
<guid>cb04be454f5055701000fbd9a7c0dd15</guid>
<pubDate>Sat, 17 May 2025 18:43:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>overheadtyler.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3018d0cab8aabed3d5fae3738e7fe0a1f8108688781479716abce94e8092b9f4</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>overheadtyler.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>clarkmechanicalinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23459</link>
<guid>4dac9d9b526cdbea9414ef6408fde364</guid>
<pubDate>Sat, 17 May 2025 18:42:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>clarkmechanicalinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>532e210ee2ea6cea7169dba78e219f9a8c10220163b62ab1abc0c22967395a8f</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Clark Mechanical, Inc. is a mechanical contracting company based in California. They specialize in offering various commercial and industrial heating, ventilation, and air conditioning (HVAC) services. Their services include HVAC design, installation, repairs, and maintenance. They are dedicated to providing quality workmanship and exceptional customer service. They have been in the business for over 25 years.</i><br />Target victim <b>website</b>: <i>clarkmechanicalinc.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>aplusmachining.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23457</link>
<guid>3e84320349c4aa9794519561dca5d550</guid>
<pubDate>Sat, 17 May 2025 18:38:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>aplusmachining.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>27019d805c779c7056ccd1882a2d54932d94a8113ddcb64579cda06d5fa8f6ee</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] A Plus Machining is a US-based company that specializes in precision CNC (Computer Numerical Control) machining. They handle an assortment of metals and plastics, providing services such as milling, turning, surface grinding, and wire EDM. Known for their high-quality services, they serve industries like aerospace, automotive, medical, and more. Their customer-focused approach ensures end products meet specific needs.</i><br />Target victim <b>website</b>: <i>aplusmachining.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gearhiser-Peters-Elliott--Cannon</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23452</link>
<guid>f0b9c7828b267d70641098732aaca656</guid>
<pubDate>Sat, 17 May 2025 02:45:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Gearhiser-Peters-Elliott--Cannon</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd97d4d758c5bd1ac16d626e5ff98a3d7c0c4fb9f4724eae58109e6270ce50e9</i><br /><br />Threat actor <b>description</b>: <i>Gearhiser, Peters, Elliott & Cannon, PLLC provides a wide range of general and s...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>blainemn.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23438</link>
<guid>15d81ef95dd64458c70c72fce3f193f3</guid>
<pubDate>Fri, 16 May 2025 23:33:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>blainemn.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8bde6138d868ba61835a58a625b77a02e15bb3d32edec5f309f5f48fefe9ca9f</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 28.05.2025. The Parks Department provides a comprehensive, year-round recreational activity program for residents of all ages. Parks is the focal point for residents seeking informati            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>abilenetx.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23439</link>
<guid>91695dc00bccc36deb3f97431368f380</guid>
<pubDate>Fri, 16 May 2025 23:33:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>abilenetx.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3facb003ff520e48da53179356d639468689045e8c710c7768682970f3f02d06</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 27.05.2025.The Abilene Housing Authority (AHA) provides affordable housing options to 20 counties in West Central Texas.AHA administers two rental subsidy programs for the U.S. Depart            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>gmb.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23440</link>
<guid>24664885f97cee26dacdb223f35f76db</guid>
<pubDate>Fri, 16 May 2025 23:33:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>gmb.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a58e86ba4a640a31403355af819fb9c55913c5f0c3b0ec3e354712b737cf4e8</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 25.05.2025.GMB Architecture + Engineering is a full-service architecture and engineering firm of approximately 90 professionals,with offices in Holland, Michigan; Grand Rapids, Michig            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>chreynolds.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23441</link>
<guid>220ef58ed3dc5807d767593835583c5f</guid>
<pubDate>Fri, 16 May 2025 23:33:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>chreynolds.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d64d96c2f1f8b275287a21428c3e8143a6cfddd931f9baa4146e1093f7e9a19</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 27.05.2025.Founded in 1983 as an electrical contracting firm, CH Reynolds (CHR) now provides a comprehensive portfolio of electrical, data construction, managed IT services. We share             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>cwcglobal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23442</link>
<guid>c45bdebae9b7a7d8fe14bea207da4b25</guid>
<pubDate>Fri, 16 May 2025 23:33:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>cwcglobal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df9d737bece3261c7ee67c89a3b9a5870c7c97aef29539af3c2591c15351b292</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 29.05.2025.Provider of industrial supplies and packaging solutions. The company serves a variety of industries, including agriculture, construction, warehousing, marine and food proce            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>aldersonlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23445</link>
<guid>2b3c63c6c00ff7f8ea6323be685a2dbc</guid>
<pubDate>Fri, 16 May 2025 23:33:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>aldersonlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cf6b4d6e64043dc4ed3996a539a7e7d3f23cbb6389bf5316b9f6e2b10183765a</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 27.05.2025. Alderson Law Firm is a full-service law firm located in Topeka, Kansas, founded in 1983. The firm specializes in various areas of law, including administrative law, busine            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carney-Badley-Spellman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23450</link>
<guid>3eb1fb86a545217701e4eb161200aefb</guid>
<pubDate>Fri, 16 May 2025 22:48:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Carney-Badley-Spellman</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cda7bbc64fde43863fba3fa62e97156d99dc33c6415a40de07470060b09ec5ef</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>zvaonline.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23454</link>
<guid>e6a6f0de57ba06b57e8d4a5120ce75b5</guid>
<pubDate>Fri, 16 May 2025 21:15:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>zvaonline.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f65068c7f58e63645485eb5d7c72a345392988b871be9f9c82ba6a74e9c68ef</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>zvaonline.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>npfy.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23448</link>
<guid>b220745bc6d3dfc50abc81790741b113</guid>
<pubDate>Fri, 16 May 2025 17:55:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>npfy.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>041a1ed2d75b2d4d7fa01ff5d055182ca66b2642ebd5ba77694f777c522f63f7</i><br /><br />Threat actor <b>description</b>: <i>New Pathways for Youth is dedicated to transforming the lives of youth in Phoenix, AZ, through a comprehensive mentorship program. The organization focuses on providing holistic development, individualized mentoring, and essential resources to empower young people to achieve their goals. With a commitment to closing the opportunity gap, they aim to support students in graduating high school and pursuing post-secondary education. They invite potential mentors to join their mission and make a meaningful impact in the community ===> Revenue: $5 Million Employees: 33   Industry: Organizations Data:70GB Phone Number: (602) 258-1012 </i><br />Target victim <b>website</b>: <i>npfy.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.davisdavisco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23449</link>
<guid>e96822f795a48a236359926ee499b783</guid>
<pubDate>Fri, 16 May 2025 17:52:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>www.davisdavisco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>95eb1904e51544d680894ee83d1213afdd1a75f74661e852d66be158fe9448ab</i><br /><br />Threat actor <b>description</b>: <i>Davis & Davis Company specializes in providing products and systems for Oil, Natural Gas, and Liquid Measurement. Established in 1941, the company offers technical sales support and a wide range of measurement controls and instrumentation, including flow meters and control valves. Their intended clients include those in the energy sector, specifically targeting companies involved in natural gas and oil production. Davis & Davis is committed to enhancing accuracy and efficiency in measurement technology ===> Revenue: $5 Million Industry: Manufacturing Data:60GB Phone Number:  (303) 935-4694 Brian - 	    307-315-7277 Cheryle - 	    303-548-3151 Dan - 	        303-949-7518 Daniel Davis - 	435-790-3093 Estevan - 	    303-667-8390 Greg - 	        303-898-7699 Jesse - 	    720-217-1327 Jon - 	        406-672-9589 Kris Ann - 	    720-690-6417 Kylee -    	    720-427-2628 Martin - 	    720-355-6723 Matt -   	    303-882-6108</i><br />Target victim <b>website</b>: <i>www.davisdavisco.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>ccrcda.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23408</link>
<guid>e9581708455f019cff55c757b2f36ccd</guid>
<pubDate>Fri, 16 May 2025 16:54:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>ccrcda.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ae5fd83385acfa012a6733b112828c99ab4d7357d30315d396cc4902a53e3642</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pacific-Summit-Energy-Sumitomo-Corporation-affiliate</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23433</link>
<guid>67d01a0cf030839a8b0fae6273976367</guid>
<pubDate>Fri, 16 May 2025 14:44:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Pacific-Summit-Energy-Sumitomo-Corporation-affiliate</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>21fe6469715b876d9515d12fa8550ff317fe14bac78f2fa5505da84c4e32703f</i><br /><br />Threat actor <b>description</b>: <i>As an affiliate of Sumitomo Corporation, Pacific Summit Energy of
fers global resources and local experts in natural gas, power, cr
ude oil, and LNG.

We are going to upload more than 163GB of corporate data. Detaile
d employee personal information (passports, driver licenses, cred
it card details and so on), numerous Sumitomo Corporation interna
l files, financial data (audits, reports, invoices), client data,
confidential agreements, project information, lots of NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Maruichi-Leavitt-Pipe--Tube</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23381</link>
<guid>eb72d013ce941d098d78e1ed837a7b92</guid>
<pubDate>Fri, 16 May 2025 14:35:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Maruichi-Leavitt-Pipe--Tube</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b06ba365a9b892e10fddbebfd212b84d20fec197c64b86734d36eb915610b72</i><br /><br />Threat actor <b>description</b>: <i>Part 1</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>olympusaero.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23378</link>
<guid>0226aa5193c66d9906300c6cf2bc45df</guid>
<pubDate>Thu, 15 May 2025 22:41:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>olympusaero.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6914fecd43e4e5046f11bc36f7a172437b499851fd4a87aac19d66bc3eb61f3f</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Olympus Aero Group is an international aerospace company that specializes in sourcing and supplying aftermarket, commercial and regional aircraft engines, as well as aircraft engine material. They also provide strategic engine leasing, engine trading and engine material consignment services. Their partnerships cover a global network of airlines, maintenance providers, lessors and traders.</i><br />Target victim <b>website</b>: <i>olympusaero.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>wnyenergy.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23376</link>
<guid>0ead717779244d9aab5c1699308850d2</guid>
<pubDate>Thu, 15 May 2025 20:55:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>wnyenergy.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab05d33ecd5d6c76788605a8e08b9199d84ebc153ab89cb4be4499721bfdb1d9</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] WNY Energy is an energy company based in Western New York, USA. It operates a 115 million gallon per year ethanol plant that produces clean-burning, renewable fuel and various byproducts including CO2 and wet and dry distillers grain that are used in food and feed products. The company focuses on innovative technology and practices for transforming local corn into efficient, sustainable biofuels.</i><br />Target victim <b>website</b>: <i>wnyenergy.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vezina-Lawrence--Piscitelli</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23374</link>
<guid>ddcd0c0f094cd80726fd6d6567a1a01b</guid>
<pubDate>Thu, 15 May 2025 18:42:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Vezina-Lawrence--Piscitelli</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7fc83bff5603dd0d90a223991467c81556856156dfcce5d5fd78db5171bb9fde</i><br /><br />Threat actor <b>description</b>: <i>Vezina, Lawrence & Piscitelli, P.A. provides legal services on be
half of contractors, concessionaires and other public-private par
tnership parties, design firms, sureties, and owners.

We are going to upload more than 80GB of corporate data. Numerous
court records, confidential settlement agreements, employee pers
onal documents, lots of documents with client data, financials, N
DA, etc.
</i><br />Target victim <b>website</b>: <i>vlplaw.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gloucester-County-Virginia</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23372</link>
<guid>5001e11e24d2f4e723a67feb678f4e27</guid>
<pubDate>Thu, 15 May 2025 11:42:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Gloucester-County-Virginia</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3bb7b146b82b331e43a9d32ae69f0e87bc56599c0ffe0be0d4d7bddad2a6c4e7</i><br /><br />Threat actor <b>description</b>: <i>The Committee is comprised of residents of Gloucester County who are appointed by the Gloucester County Board of Supervisors to serve for a term of 2 years. Meetings are held the third Wednesday of each month in the first floor conference room of County Building One, 6467 Main Street. (The Committee generally does not meet in July and the December meeting is to be announced.) Meetings start at 6:30 PM and are open to the public. Those interested in Committee activities are encourage to attend. Prior to attending, please call the Clean Community Office to verify the location and time of the meeting. Proceedings of the Committee are governed by its Bylaws. The program is administered by a Clean Community Coordinator and supported by hundreds of Gloucester residents and businesses who give generously of their time to help keep the County of Gloucester beautiful, clean, and litter free.</i><br />Target victim <b>website</b>: <i>www.gloucesterva.gov</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>GARDNER-ORTHOPEDICS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23369</link>
<guid>4ee8fc10f6bc212f5729276168ba9d12</guid>
<pubDate>Thu, 15 May 2025 03:44:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>GARDNER-ORTHOPEDICS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63ddcfe46e8886446c0522e0bb539f77b19b31a007bec5d176a1de1c007a786f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Royal-Chemical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23365</link>
<guid>a797a65aa8651d8b93208615c6e0d01f</guid>
<pubDate>Wed, 14 May 2025 20:34:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Royal-Chemical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d331fe8974f9a435a1b23ef4f8ee452ccb71b832d2e13f468cfabe8983fe5158</i><br /><br />Threat actor <b>description</b>: <i>Royal Chemical Company, Ltd. operates as a chemical blender, and toll and contra...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grafton-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23366</link>
<guid>072e81e77edf6f7370bc290b32c9bb81</guid>
<pubDate>Wed, 14 May 2025 19:01:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Grafton-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3079703fb78fa6925f18612ee2f8c4b3c2f00eb24868f3dfdbb2791770f3bf74</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Murphy-Pearson-Bradley--Feeney</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23364</link>
<guid>a487e1344b14e77fd3894b4e43464bd5</guid>
<pubDate>Wed, 14 May 2025 13:17:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Murphy-Pearson-Bradley--Feeney</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1dfdf059a88a7f7b78c7bea5de022fae27e28a0636a4f8729924b57a543b2a2</i><br /><br />Threat actor <b>description</b>: <i>Murphy Pearson Bradley & Feeney is an accomplished law firm speci
alizing in trial practice, litigation and business counseling.

We are going to upload more than 182 GB of essential corporate da
ta. A lot of detailed employees and clients personal information 
(birth/death certificates, passport, DLs and so on), NDAs, confid
entiality agreements, confidential court records, financial data,
etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>PDI-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23360</link>
<guid>0bdc3edd84a5ad81660345686552f38b</guid>
<pubDate>Wed, 14 May 2025 01:46:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>PDI-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ca7046c64dc05a763e14070915ee5c9333f12b8dc89c7c324d0419ee4672e93</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] PDI Health is a leading mobile healthcare service provider that offers solutions ensuring the safety and well-being of workplaces. They specialize in preventive care, including COVID-19 testing, vaccinations, and mobile clinics, to workplaces, communities, and individuals. Their mission is to create healthier environments by providing convenient access to necessary healthcare services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dishaka</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23357</link>
<guid>6171f623206dfd1e35a131bd2d9e74ac</guid>
<pubDate>Tue, 13 May 2025 22:59:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Dishaka</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>482894b4374ad2140563cca5b70f6fcf7166e3a5cd5b1f7103561ce04c6d6a47</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nottingham-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23355</link>
<guid>f31c62b1be87ee00a16b9e51482263a7</guid>
<pubDate>Tue, 13 May 2025 22:44:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Nottingham-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>59bd87ab3c98731cd853f06ff4ddd273ccf64aeb433c242046921489634b1d13</i><br /><br />Threat actor <b>description</b>: <i>Nottingham Construction was established in 1989 then Incorporated in 1998 performing commercial carpentry and becoming a General Contractor serving National Retail Companies from New York to Virginia. Nottingham Construction corporate office is located in 375 Ivyland Road Unit 10 Warminster, PA 18974, USA and has 21 employees. The total amount of data leakage is 252.50 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>DeVita--Associates-Inc.-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23356</link>
<guid>1c3c7c861862dbd98e6b1d7a11bfa9f9</guid>
<pubDate>Tue, 13 May 2025 22:43:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>DeVita--Associates-Inc.-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4942e5eee7aa472037fbb527ceb94f02227ca06c1bfcdb6d3b937da26da6c89d</i><br /><br />Threat actor <b>description</b>: <i>DeVita & Associates, Inc. ( founded in 1984) provides a full range of mechanical, electrical, and structural engineering services, including specialized structural precast design and detailing. DeVita & Associates corporate office is located in 1150 E Washington St, Greenville, South Carolina, 29601, United States and has 114 employees. The total amount of data leakage is 618.40 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Superior-Steel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23354</link>
<guid>877e6815653b6f89f652dd3da06b9f3a</guid>
<pubDate>Tue, 13 May 2025 13:41:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Superior-Steel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ce67f616615d4c2547924aeae1079186c507ec7c7d699107df2a8805d747b7b</i><br /><br />Threat actor <b>description</b>: <i>Superior Steel is experienced in all manners of contracting arran
gements including competitive bid, negotiated contract, design bu
ild and fast track projects.

We are going to upload more than 6 GB of corporate documents. Emp
loyees passports, DLs, NDAs, confidentiality agreements, financia
l data of clients, projects, documents containing personal inform
ation, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Precision-Tax-Relief</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23353</link>
<guid>18ef374dbe0ed691838cdf06d109e6cd</guid>
<pubDate>Tue, 13 May 2025 13:41:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Precision-Tax-Relief</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2947020464a097263c966160b0bda858c499be073ef5abea1edd716389c6fd36</i><br /><br />Threat actor <b>description</b>: <i>Precision Tax Relief is an established tax debt resolution firm, 
owned and operated by licensed, experienced and top-performing ta
x professionals. 

We are going to upload more than 123GB of essential corporate doc
uments. Passports, DLs, confidentiality agreements, financial dat
a of clients, lots documents containing personal information, etc
.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Just-Concrete--Masonry</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23344</link>
<guid>9c151d7c2d511dfec70f3fd53171b5db</guid>
<pubDate>Mon, 12 May 2025 22:54:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Just-Concrete--Masonry</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>84a9e723505724dbf4e228048a1c753dc5bb519d4eea507914a6b96e6423a6ae</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>EIZO-Rugged-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23340</link>
<guid>5b774adc5ebc68abbd976c852cee460a</guid>
<pubDate>Mon, 12 May 2025 20:55:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>EIZO-Rugged-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ced83545bf42fc3eb5973a130821c8c702a500f97a94dccb9dc7aa27463d67b3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Operative</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23345</link>
<guid>452e59f6084d94442fd8f653932afcb8</guid>
<pubDate>Mon, 12 May 2025 19:41:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Operative</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da5031797b31bf50c75847cea73d8c5b991aedc6a72abb927d5fbb5f6d763096</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.operative.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>loopergoodwine.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23343</link>
<guid>38b8e8fe30cd2f6f7e79f6be6905fabb</guid>
<pubDate>Mon, 12 May 2025 18:23:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>loopergoodwine.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b9d7fed6aa59dd2a367893676ca0004366a013836c19afa3efb7b15b966fddef</i><br /><br />Threat actor <b>description</b>: <i>USA - Looper Goodwine</i><br />Target victim <b>website</b>: <i>loopergoodwine.com</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trindel-Insurance-Fund</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23329</link>
<guid>5a460d084470e30fa2ef883c10b34ad5</guid>
<pubDate>Mon, 12 May 2025 13:27:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Trindel-Insurance-Fund</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>702dd62b835a86459e91ace325db9a8255e53abfe62d01ede1d4890be530de27</i><br /><br />Threat actor <b>description</b>: <i>Trindel Insurance Fund provides specialized risk management and insurance services for rural counties in Northern California. Trindel Insurance Fund corporate office is located in 51 Arbuckle Ct, Weaverville, California, 96093, United States and has 29 employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>moorecoal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23323</link>
<guid>b35b31a24acc2da3bd9e3feb30fc7e79</guid>
<pubDate>Sun, 11 May 2025 22:06:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>moorecoal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc743f70321cb66713603b80451a0bbaa091d6514b170858eeb944d8caa94346</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>moorecoal.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>lifesafeservices.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23320</link>
<guid>de8a069560656b3d77389be76a8e09c3</guid>
<pubDate>Sun, 11 May 2025 22:01:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>lifesafeservices.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a73944ae154861be0cd1d970b7a81b4e2bb9f6c0acce0f53de2899b082ed9738</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Lifesafe Services specializes in providing a comprehensive range of safety solutions to both commercial and government outlets. Their services include life-saving equipment, safety training, preventive maintenance & repair services, corporate compliance, and safety program management. They cater to various markets including education, hospitality, construction, healthcare and more. Their aim is to create a safe working environment for their clients.</i><br />Target victim <b>website</b>: <i>lifesafeservices.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>maxusgroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23311</link>
<guid>228a0da874304dbc5274014bf3575244</guid>
<pubDate>Sun, 11 May 2025 21:55:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>maxusgroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e1988178798b46db1a45710b177fc89e82ce49f4bb8cc9bb4e9053bfc64ecd1</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>maxusgroup.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Beaumont-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23288</link>
<guid>16cc85a8b7069a9e10783e3152cf2203</guid>
<pubDate>Sat, 10 May 2025 21:37:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Beaumont-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ddddb588430d14495425a3dbfcc260a59751d2895466ea191ce9b575e4fd95df</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1991, Georgia, Beaumont Products Inc. manufactures consumer products designed for air care, specialty cleaning and personal care. Located in Kennesaw...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>citrusmagic.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23292</link>
<guid>ecacd215c0e820d5407b32369cd33b9b</guid>
<pubDate>Sat, 10 May 2025 21:00:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>citrusmagic.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fcb5496d5757d9d86848c934d1f0600f1d18a3e277eeb130453e257321609242</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>statesmanbiz.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23289</link>
<guid>33167d87a754f4de9f8673a9744bfb6b</guid>
<pubDate>Sat, 10 May 2025 19:02:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>statesmanbiz.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c82003c4788f6ad59b6c09b93c3b832b9d208fa2ef02f1f36179282db18eb76e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sweet-Shop-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23282</link>
<guid>7d5660b9274696a075ea0ad6a4018e02</guid>
<pubDate>Fri, 09 May 2025 22:55:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Sweet-Shop-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6c6d0c6fa6219e80ff8ed00a93241ff8a76b83641cd9da637bd27bef0e73b79</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gistic-Research</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23276</link>
<guid>88cc8890c7a0d462b0c6335788aa67f2</guid>
<pubDate>Fri, 09 May 2025 20:59:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Gistic-Research</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ca805c1c63b2d1138e69dbc1407fcb7f5ada7f717d90b7853c8b54ca437cfb9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Verrex</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23283</link>
<guid>74ff3b6fab96793bdf130c309628c4b4</guid>
<pubDate>Fri, 09 May 2025 19:16:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Verrex</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bbcf7641aad750ee93d577640607706fe62689dc3d50c5687b1b6665704cd7be</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.verrex.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>North-Kitsap-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23277</link>
<guid>d600a2c0f0abaa265941e3c4c2510c26</guid>
<pubDate>Fri, 09 May 2025 18:21:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>North-Kitsap-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>86a8ff45ec113dc55e559acf87b004a184f576366184f6a7fe9142646ade3682</i><br /><br />Threat actor <b>description</b>: <i>North Kitsap School District (USA)</i><br />Target victim <b>website</b>: <i>nkschools.org</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>CHECKCITY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23281</link>
<guid>9691dfa05ec69e3e254c31bd3cdeb063</guid>
<pubDate>Fri, 09 May 2025 17:54:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CHECKCITY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6a4bc089e16cc1254c6ba6ae4dabb79da68d35b05ce5181f1ba1bb5ee133bb1</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] CheckCity.com is a financial services company based in Provo, Utah. It offers a variety of services, including payday loans, cash advances, title loans, and check cashing. It also provides money orders, wire transfers, tax services, and prepaid debit cards. Founded in 1986, CheckCity operates both online and through physical branches. It serves clients across multiple states in the US.
</i><br />Target victim <b>website</b>: <i>CHECKCITY.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lake-Shore-Paving</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23278</link>
<guid>f7d231711d490bcbf845df42c7eb6096</guid>
<pubDate>Fri, 09 May 2025 17:45:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Lake-Shore-Paving</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c2860bb9440f7f6a04c98f597a16e181c838cc0d59068e8e740ecafeca115c42</i><br /><br />Threat actor <b>description</b>: <i>Lake Shore Paving (founded in 1998) - services for excavation, utility, asphalt paving and concrete paving needs. Lake Shore Paving corporate office is located in 7 Osmer St, Jamestown, New York, 14701, United States and has 19 employees. The total amount of data leakage is 112.30 GB</i><br />Target victim <b>website</b>: <i>lakeshorepaving.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Russell-Child-Development-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23279</link>
<guid>5d70e41830fc49ffb65095fd1185cd1e</guid>
<pubDate>Fri, 09 May 2025 17:44:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Russell-Child-Development-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d15da9af280788cfb5a3f8b47802ae8c4dbdcf1b33f421607ebd5d05bcb75389</i><br /><br />Threat actor <b>description</b>: <i>Russell Child Development Center is a community-based non-profit organization that serves early childhood programs across 19 counties in Southwest Kansas. The center offers a variety of services including early intervention, targeted case management, and support programs for families and child care providers. Russell Child Development Center corporate office is located in 2735 N Jennie Barker Rd, Garden City, Kansas, 67846, United States and has 30 employees. The total amount of data leakage is 215.50 GB</i><br />Target victim <b>website</b>: <i>rcdc4kids.org</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bervar-and-Jones</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23275</link>
<guid>5c433f641035b3ad5ddf980703370657</guid>
<pubDate>Fri, 09 May 2025 15:19:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Bervar-and-Jones</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9082a820fea9c7764f5c651298a8198e23daf681efde6fe53d169d9779d7acd6</i><br /><br />Threat actor <b>description</b>: <i>Ward D. Jones has practiced law in Hawaii for 30 years and handle
d trials in state courts on all of the islands, Hawaii federal co
urt, as well as Hawaii arbitrations.

We are going to upload more than 102GB of essential corporate doc
uments. You will find a lot of client information (medical record
s, drivers licenses, passports, birth\death certificates), court 
confidential files, financial data of clients, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mountain-View-Mushrooms</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23272</link>
<guid>cdb92ec0533bcff4c694651b05263e11</guid>
<pubDate>Fri, 09 May 2025 13:20:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Mountain-View-Mushrooms</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>adf7463790c3c6630c602ba106deede2be12366de00e5ebee4d5fc1c3a6be438</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>hennessyfunds.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23270</link>
<guid>fde238a4fcb7d56461fa0850bd28c86b</guid>
<pubDate>Fri, 09 May 2025 11:03:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hennessyfunds.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>80bb54835bb5d1ba57a1d33bda17c4cf98fe5e130ba5eb694c51f46c13f90d0b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>101-Arch-Street</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23269</link>
<guid>f0a2c0f5474cbe314b3682c9325dc4f4</guid>
<pubDate>Thu, 08 May 2025 21:21:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>weyhro</b> claims attack for <b>101-Arch-Street</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d1d1aaa0a6baef03cdd36a91703b336cfbbf6b62129e21cc7af34d75b27ddd12</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>101archstreet.info</i>]]></description>
<category>weyhro</category>
</item>
<item xmlns:dc='ns:1'>
<title>SHRADERLAW</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23265</link>
<guid>1ded5b4a39ea7331757bd9ae8bd5b9dd</guid>
<pubDate>Thu, 08 May 2025 20:41:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>SHRADERLAW</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ee8386751a2ba8fe8bd742cf33c5a09f9a1ba0b57e708f1d9fce9a1b2e37e3a</i><br /><br />Threat actor <b>description</b>: <i>Shrader & Associates, L.L.P. is pleased to recognize Roberts' and Romani's contributions with this well-earned promotion. As a firm with national recognition by the likes of CNN and CBS, each attorney on its roster must meet extremely high st            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.hcsheriff.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23266</link>
<guid>416d82333549f01f83244e2439bedc6f</guid>
<pubDate>Thu, 08 May 2025 20:41:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.hcsheriff.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d03bcc2bd9d493b274fce8683d6f2aceed8c8db5c081e25bc871e045ec93faa2</i><br /><br />Threat actor <b>description</b>: <i>Hamilton County, TN In anticipation of this weekends July 4th festivities, the Hamilton County Sheriffs Office would like to offer the following safety reminders to ensure the citizens of Hamilton County enjoy a safe and meaningful holiday. J            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Amtech-Software</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23259</link>
<guid>521eb79803f9895ff14332c010d518be</guid>
<pubDate>Wed, 07 May 2025 20:53:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Amtech-Software</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>141cf4b4dc10fb5f9e89a48749734cbd2592cafec9fb6eb0d0812d63ab457c54</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>mdgny.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23179</link>
<guid>178fd725f2be67a85fd2d73cc13cb753</guid>
<pubDate>Tue, 06 May 2025 22:42:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>mdgny.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b82dbba45a7f3d8af68ea22d510adbe187dc4a17ef8f46fea7daf0ef7118d3ff</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 16.05.2025.MDG Design & Construction is a leading affordable housing-only contracting and development firm specializing in the rehabilitation and new construction of affordable reside            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>clinpath.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23180</link>
<guid>db782d22265fd45c6af25f3bb5fc6a1a</guid>
<pubDate>Tue, 06 May 2025 22:42:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>clinpath.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>381c054eeadd9c68ab1e40b58350b5731b5ecd80268294489920a55a96d70561</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 16.05.2025.Founded 50 years ago, the breadth and depth of expertise of Clin-Path associates is unmatched statewide. Professional and laboratory services are provided to hospitals, phy            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>gslelectric.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23181</link>
<guid>a249084ad4bce339b204ab436db2d902</guid>
<pubDate>Tue, 06 May 2025 22:42:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>gslelectric.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf09b0a362952549c42f3719694a7ea910ccbf03a141c15632c318c85ba6a5c5</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 16.05.2025. GSL Electric Inc. performs a wide range of projects for public and private clients, including commercial, industrial, institutional, manufacturing, utility, transmission l            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>jbanksdesign.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23182</link>
<guid>d01dbd2e917a9cef58db618303f1e8f8</guid>
<pubDate>Tue, 06 May 2025 22:42:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>jbanksdesign.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>10728c63e33eee486130fb8735a014c80126268445c4626454a2ada3dcfdf596</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 16.05.2025. J. Banks Design is a full-service interior design firm with over 55 employees, a leader in residential and hospitality design. For over thirty-six years, our certified des            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>gates-cooper.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23183</link>
<guid>88e6967421e9586bafe31e2927b59c25</guid>
<pubDate>Tue, 06 May 2025 22:42:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>gates-cooper.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ab461cd2a35dbe39cb43d1344a34c4a375decf89e9ccf3f3f9a52452a18b3e8</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 16.05.2025. Gates & Cooper LLP is an intellectual property law firm specializing in providing high-value patent prosecution and related intellectual property legal services to large c            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ehlers-inc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23168</link>
<guid>121b4a4ad27e13bb351226eeb2eb3adb</guid>
<pubDate>Tue, 06 May 2025 19:38:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ehlers-inc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9959e8dbc39743ef81c23dce01fd87d3258ba6c4b49035c9f50a332979511899</i><br /><br />Threat actor <b>description</b>: <i>Ehlers is an industry-leading municipal advisory firm serving Minnesota, Wisconsin, Colorado, Illinois and Kansas. We leverage centuries of combined experience and specialized expertise to deliver innovative, fully integrated public finance solutions...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Elmore--Bunn</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23256</link>
<guid>194e9674ab9c0440b37a421b42b6c5c7</guid>
<pubDate>Tue, 06 May 2025 18:17:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Elmore--Bunn</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb325e10949364d65371f26cde33594736e1113ba28a9a48331b0f53350baa07</i><br /><br />Threat actor <b>description</b>: <i>Chadwick, Washington, Moriarty, Elmore & Bunn P.C.  is a Virginia and D.C. law firm that offers compli…</i><br />Target victim <b>website</b>: <i>chadwickwashington.com</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Dominguez-Firm-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23255</link>
<guid>c209163f3e310b6c0a9a2c6489e22a8e</guid>
<pubDate>Tue, 06 May 2025 18:17:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>The-Dominguez-Firm-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a279120282b851c392a125285aa4fec9435ac953cbe9d759d76c440c4c8ed8e</i><br /><br />Threat actor <b>description</b>: <i>With a legal staff of over 120, The Dominguez Firm is a proven powerhouse personal injury law firm wit…</i><br />Target victim <b>website</b>: <i>dominguezfirm.com</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>USClaims</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23254</link>
<guid>a2a5e1dc29759ed291e5ba5ecf1d6cbd</guid>
<pubDate>Tue, 06 May 2025 18:17:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>USClaims</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>07d7b9fc52b13734db373e7da9e7086b2b0d859af2bc2f19edb37c2bf64e4840</i><br /><br />Threat actor <b>description</b>: <i>Operator of a pre-settlement financing firm intended to provide financial assistance during lawsuits. …</i><br />Target victim <b>website</b>: <i>usclaims.com</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dean--Fulkerson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23253</link>
<guid>71416c0cccf03457e0b1ad83059a9e68</guid>
<pubDate>Tue, 06 May 2025 18:17:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Dean--Fulkerson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>914cda319f8a28ab0b29eb0e9fc09c461000e78d3f486e27059c72f3c9c0b79b</i><br /><br />Threat actor <b>description</b>: <i>Dean & Fulkerson P.C has received an SBA PPP loan for $350,000-1 million from PNC Bank, National Assoc…</i><br />Target victim <b>website</b>: <i>dflaw.com</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pajcic--Pajcic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23252</link>
<guid>6872fbd4d9c2156c2cf1230e206e6578</guid>
<pubDate>Tue, 06 May 2025 18:17:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Pajcic--Pajcic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>201c713bd77e80fe09b9b9fe5c00ec3e2cd3d4281b0318a9a0ccc0287d5054d1</i><br /><br />Threat actor <b>description</b>: <i>Pajcic & Pajcic is a Jacksonville-based personal injury law firm with over 50 years of experience in a…</i><br />Target victim <b>website</b>: <i>pajcic.com</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shutts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23251</link>
<guid>4b657671b583d45e63cada58d6f555dc</guid>
<pubDate>Tue, 06 May 2025 18:16:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Shutts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>722ecf585a9b4b06d5c3b089bdbcc1a8dc1c5c76542f0b7a44eea0a52d245aa1</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1910, Shutts is a full-service business law firm that specializes in litigation, constructi…</i><br />Target victim <b>website</b>: <i>shutts.com</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>McLaughlin--Stern</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23247</link>
<guid>2fbd6324c519b0e1271d104bd6885bff</guid>
<pubDate>Tue, 06 May 2025 18:16:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>McLaughlin--Stern</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bbd3262267066fd41bd0e3d1bbfcc32ac10051c2f0e7488d88efa19c1e8f5dcf</i><br /><br />Threat actor <b>description</b>: <i>McLaughlin & Stern, LLP is a full-service law firm founded in 1898 with more than 100 attorneys repres…</i><br />Target victim <b>website</b>: <i>mclaughlinstern.com</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Roger-Keith-and-Sons-Insurance-Agency</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23246</link>
<guid>5de01f00bcca93c51daf6bbd95613abf</guid>
<pubDate>Tue, 06 May 2025 18:16:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Roger-Keith-and-Sons-Insurance-Agency</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b93f8b54862a1780afa05816bd517d799bde105c48c1e5b3254997a013a36f54</i><br /><br />Threat actor <b>description</b>: <i>For over 150 years, Roger Keith & Sons Insurance has been providing quality insurance services to clie…</i><br />Target victim <b>website</b>: <i>rogerkeith.com</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advantage-Group-GA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23245</link>
<guid>1499cf7e1457d36260a142aebe350065</guid>
<pubDate>Tue, 06 May 2025 18:16:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Advantage-Group-GA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>88d320fd04fda211862c78d9b787bdbda7c72d795468b1e3acaa068a1d57044a</i><br /><br />Threat actor <b>description</b>: <i>Schofield Insurance Company is a full-service general agency that specializes in voluntary, ancillary,…</i><br />Target victim <b>website</b>: <i>advantagegroupga.com</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cors--Bassett</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23244</link>
<guid>3f566d40129873e5c1fccede4a4e0a92</guid>
<pubDate>Tue, 06 May 2025 18:16:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Cors--Bassett</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22a0c595516c44ede75d2e456b22636ebfbf6d9bfadbf09a20ca86b8552ccff6</i><br /><br />Threat actor <b>description</b>: <i>Cors & Bassett has a long, rich history that spans many decades. The firm has been a member of the bus…</i><br />Target victim <b>website</b>: <i>corsbassett.com</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>IFG-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23243</link>
<guid>e3ba5e1de6265fca66dbc625213132b2</guid>
<pubDate>Tue, 06 May 2025 18:16:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>IFG-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f22cc95cab82845e872504890b02e0607f86ee57b8781b1ab5559036bf24d012</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1985, IFG Companies is a privately held insurance group based in Hartford, Connecticut. IFG…</i><br />Target victim <b>website</b>: <i>ifgcompanies.com</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kisling-Nestico--Redick</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23242</link>
<guid>86ee663c363fb2819cc78dc2ea1181f9</guid>
<pubDate>Tue, 06 May 2025 18:16:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Kisling-Nestico--Redick</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>edc0f45bae501e9a481b431faa587f28bf3eebb7e8f5a2ae517cf0e477f703ae</i><br /><br />Threat actor <b>description</b>: <i>About Kisling, Nestico & Redick: Kisling, Nestico & Redick provides sophisticated injury law represent…</i><br />Target victim <b>website</b>: <i>knrlegal.com</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>NCheng</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23241</link>
<guid>ec967833951ea475033e1edc0b28783c</guid>
<pubDate>Tue, 06 May 2025 18:16:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>NCheng</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6988280be2f28567a6275de303c08002741f1811e0a543760e65740baef7f8dc</i><br /><br />Threat actor <b>description</b>: <i>NCheng LLP was founded in 1989 in New York City. Our practice is dedicated entirely to serve the not-f…</i><br />Target victim <b>website</b>: <i>ncheng.com</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>ADM-LAW</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23240</link>
<guid>af1ec08928fca5b339eab2cc1e39c851</guid>
<pubDate>Tue, 06 May 2025 18:16:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>ADM-LAW</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>710de249261be6d009ca428f2be4945b752027f8dd969ecc728b6623aae15b8e</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1983 and headquartered in New York, New York, Ahmuty, Demers & McManus (ADM) is a full-serv…</i><br />Target victim <b>website</b>: <i>admlaw.com</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>First-Financial-Equity</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23238</link>
<guid>dc0a565de8ec1b879c64056a6124e6ff</guid>
<pubDate>Tue, 06 May 2025 18:16:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>First-Financial-Equity</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>64d6c0c4dcf37382f4fc064269a569b18fc61f32e8d10c8e3ab08e795e82c9f3</i><br /><br />Threat actor <b>description</b>: <i>First Financial Equity Corporations (FFEC) primary objective is to provide personalized customer servi…</i><br />Target victim <b>website</b>: <i>ffec.com</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Barst-Mukamal--Kleiner</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23237</link>
<guid>b44935b0197276d34abb43e13153efc5</guid>
<pubDate>Tue, 06 May 2025 18:16:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Barst-Mukamal--Kleiner</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2efac958d42141436020db0bf8aef30aa36008000e041f97dc236acdd975ecdc</i><br /><br />Threat actor <b>description</b>: <i>Barst Mukamal & Kleiner LLP is an international immigration law firm based in New York City. Founded i…</i><br />Target victim <b>website</b>: <i>barstlaw.com</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Olinsky-Law-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23236</link>
<guid>fdd1938f71bfe82123fa12ace87f83c1</guid>
<pubDate>Tue, 06 May 2025 18:16:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Olinsky-Law-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f08f16ee5bb5c75331b396bd712b04854786dceb5291229140334cd3fa54b3a8</i><br /><br />Threat actor <b>description</b>: <i>Olinsky Law Group specializes in Social Security Disability, Appeals Council, Federal Court, and Long-…</i><br />Target victim <b>website</b>: <i>windisability.com</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pembrook-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23235</link>
<guid>d5b8786f4dea41ac9a605b5a068a8069</guid>
<pubDate>Tue, 06 May 2025 18:16:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Pembrook-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f33c4bcc9b740f6df9b82929eab35447c9ab435237429a7307aa8fbb2a99552a</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2006 by Stuart J. Boesky, Pembrook Capital Management (Pembrook) is a real estate investmen…</i><br />Target victim <b>website</b>: <i>pembrookgroup.com</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Colucci-Law-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23234</link>
<guid>4654bbe0a0074175fd24c997805831cf</guid>
<pubDate>Tue, 06 May 2025 18:15:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Colucci-Law-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3e2ce4d82fa6ae35699f5577212a45e2bbec9ed92b2362f36122b91270f5842</i><br /><br />Threat actor <b>description</b>: <i>Colucci Law Group provides comprehensive legal support in Florida, focusing on areas such as property …</i><br />Target victim <b>website</b>: <i>coluccilawgroup.com</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>GreatFlorida-Insurance-Holding-Corp.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23233</link>
<guid>b515e49e1faaf698fb98bafb1105aa16</guid>
<pubDate>Tue, 06 May 2025 18:15:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>GreatFlorida-Insurance-Holding-Corp.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ef74672aea23e9cabb3dce5c851e8dfccef964210e1ab948e822c83822d8b0d9</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1991 and headquartered in West Palm Beach, Florida, GreatFlorida Insurance is a network of …</i><br />Target victim <b>website</b>: <i>greatflorida.com</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Paycor</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23232</link>
<guid>eac93fc0e5bfbe34e7ec3ab68738f26e</guid>
<pubDate>Tue, 06 May 2025 18:15:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Paycor</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>548014545c0e606149db03dc6721e2ef93df0d48b23abec6b14eddea5d4481d8</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1990, Paycor is a human capital management company that provides HR and payroll technology …</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Baxter-Baker-Sidle-Conn--Jones</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23231</link>
<guid>8f7fe48f0ffd0d5572f0d34af4723004</guid>
<pubDate>Tue, 06 May 2025 18:15:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Baxter-Baker-Sidle-Conn--Jones</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0895ca964f98ddb4b8811e11f303abd419df5b446ea4d6a8d42b3cdef3843eba</i><br /><br />Threat actor <b>description</b>: <i>Baxter Baker is a legal firm based in Baltimore and Annapolis, Maryland, offering a range of services …</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chicago-Atlantic-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23230</link>
<guid>9403726f748a529821f7df4779ea9578</guid>
<pubDate>Tue, 06 May 2025 18:15:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Chicago-Atlantic-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bff2d313b34f1b170f74a6d2d8ea393de119d8537935fbd9439089978b781db0</i><br /><br />Threat actor <b>description</b>: <i>Chicago Atlantic Real Estate Finance, Inc. (Chicago Atlantic) is a commercial real estate finance comp…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mauldin--Jenkins</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23229</link>
<guid>6e1daf7c8796af0fb9827612e600a219</guid>
<pubDate>Tue, 06 May 2025 18:15:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Mauldin--Jenkins</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c4415d9ccc16684d5af36074c61ae1e0a4aecebb1ea5511a27121fa5217a871</i><br /><br />Threat actor <b>description</b>: <i>Mauldin & Jenkins has provided audit, accounting, tax, and consulting services since 1918. Our culture…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Miller-Canfield</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23228</link>
<guid>7c56c456f0bf44cc23ecb6792768cf87</guid>
<pubDate>Tue, 06 May 2025 18:15:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Miller-Canfield</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df171d971bd89521addc68e42412934527582d0ebe84cd0dcf3ba9eac1b3adcc</i><br /><br />Threat actor <b>description</b>: <i>Miller Canfield, headquartered in Detroit, Michigan, is a law firm that provides services for bankrupt…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>CRC-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23227</link>
<guid>448ea1e596840cfabdf8e0dcdaee48f3</guid>
<pubDate>Tue, 06 May 2025 18:15:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>CRC-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac3a96c37f3903d9b3670daec9109fbb77eb347e65667a404649a0e85e3dcc2f</i><br /><br />Threat actor <b>description</b>: <i>CRC Group is a wholesale and specialty insurance distributor in the United States. Founded in 1914, th…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>44North</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23226</link>
<guid>3f3267d02dea7f94781bd5a437733db3</guid>
<pubDate>Tue, 06 May 2025 18:15:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>44North</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee732fb3b5901f9d8ff3d1b84843840cd095ef70f51a6c55ecb0389135192e9e</i><br /><br />Threat actor <b>description</b>: <i>44North, headquartered in Cadillac, Michigan, provides health benefit consulting and plan design. Thei…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>EW-Smith-Insurance-Agency</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23225</link>
<guid>daf719b7ee191a3d78bd90603c7a1860</guid>
<pubDate>Tue, 06 May 2025 18:15:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>EW-Smith-Insurance-Agency</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1990ae09db64ae8dfbdd7d0b9f73c70320c8980584d1be01d5dc3989eed4ae88</i><br /><br />Threat actor <b>description</b>: <i>If longevity is a trusted sign of success, the E.W. Smith Insurance Agency proves to be one of Wyandot…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Anders-CPAs--Advisors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23224</link>
<guid>6022b0e29ba3493b5041f9c92e62174c</guid>
<pubDate>Tue, 06 May 2025 18:15:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Anders-CPAs--Advisors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8cacdc7f5ba4b5644bbf42c54bdd704d52a8913a853d4c581718c16b3aafd5dc</i><br /><br />Threat actor <b>description</b>: <i>Accounting Services

Founded in 1965, Anders is headquartered in St. Louis, Missouri. They are a CPA…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Black--Bashor--Porsch</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23223</link>
<guid>b679aa6ac5fd06c4465b5b78511e2546</guid>
<pubDate>Tue, 06 May 2025 18:15:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Black--Bashor--Porsch</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9694860864b790c6fce9ed1c4fd47034320139a6b40ca8810bf7a722b273ea41</i><br /><br />Threat actor <b>description</b>: <i>Accounting Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shea-Barclay-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23222</link>
<guid>341cd8064bf4c9916fd60639ee7a5a9b</guid>
<pubDate>Tue, 06 May 2025 18:15:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Shea-Barclay-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4bc343669ff6c4ed41c5418fdaf31d816de1eb0bc5ecb29f7c8afba077ed41dd</i><br /><br />Threat actor <b>description</b>: <i>Insurance</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>ATLAS-CPAs--Advisors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23221</link>
<guid>654425b5a1258aad138981579e10dc3f</guid>
<pubDate>Tue, 06 May 2025 18:15:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>ATLAS-CPAs--Advisors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bae3361d605c38228db0fcbaea01dfc8c84af64e970856f73c744122e3a897ae</i><br /><br />Threat actor <b>description</b>: <i>Accounting Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Klehr-Harrison-Harvey-Branzburg</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23220</link>
<guid>2a280dacaf20368422ae235bd3bb4a9c</guid>
<pubDate>Tue, 06 May 2025 18:15:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Klehr-Harrison-Harvey-Branzburg</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>152450a80cb856e714ac78a83f57a62652a2327af499b5e0240090989572fe91</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Inspere-Insurance-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23219</link>
<guid>3963a8bf5fefec02bbc4b8597985fa25</guid>
<pubDate>Tue, 06 May 2025 18:15:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Inspere-Insurance-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ad92230b375f3d2a2796bac10738044e7c8bd1ca9eec8a8f5c26c4bd5c28094</i><br /><br />Threat actor <b>description</b>: <i>Insphere Insurance Solutions, Inc. is one of the fastest growing insurance distribution companies in A…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cross-Valley-FCU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23218</link>
<guid>ff5eb3449d63c62a5cf39e171bb717a3</guid>
<pubDate>Tue, 06 May 2025 18:15:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Cross-Valley-FCU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca93a997a641b633b70747524e5e16d6b0adfb62eeecc2ebafbbfd8aea84ad6e</i><br /><br />Threat actor <b>description</b>: <i>Established in 1969, Cross Valley Federal Credit Union is headquartered in Wilkes-Barre, Pennsylvania.…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Metro-Public-Adjustment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23217</link>
<guid>3bbec3082c0c4bdbddd9a517ab704d06</guid>
<pubDate>Tue, 06 May 2025 18:14:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Metro-Public-Adjustment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a233996283720444ededa5195b85a2bfc1bbae876451d5de946418e5ca37cf38</i><br /><br />Threat actor <b>description</b>: <i>Since 1994, Metro Public Adjustment, Inc. has been an advocate for the rights of you, the property own…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Palomar-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23216</link>
<guid>fc05a696edc4fa925284853ac123c69e</guid>
<pubDate>Tue, 06 May 2025 18:14:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Palomar-Insurance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>44743a7296b2b983c473398fee647d9b4fbb1b123ac25dc0d9e2ae092312edce</i><br /><br />Threat actor <b>description</b>: <i>Palomar Insurance Corporation delivers tailored insurance programs to small and large companies in the…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Liberty-Tax-Service-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23215</link>
<guid>fb32646a7f6fadd206cf32ecd2dd0ca8</guid>
<pubDate>Tue, 06 May 2025 18:14:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Liberty-Tax-Service-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>98547b45f53c8d87ac629dab37568042edd39d6493f6a3223833e1227a49a5b7</i><br /><br />Threat actor <b>description</b>: <i>Liebert Cassidy Whitmore provides legal advisory services. The firms practice areas include labor rela…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kotz-Sangster-Wysocki</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23214</link>
<guid>e2bc7a52e896193e43a2e15df870c4e2</guid>
<pubDate>Tue, 06 May 2025 18:14:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Kotz-Sangster-Wysocki</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec59b5d019ae33de9769ff503edecd6a52555ab011d252ae3af26b534d6756e5</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Marriott-International-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23213</link>
<guid>549ce24fb62238d013a6e222cb4d41d8</guid>
<pubDate>Tue, 06 May 2025 18:14:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Marriott-International-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f5f2dde986331af566233c8d7295282d566ca42601a1def8bc584708053918bb</i><br /><br />Threat actor <b>description</b>: <i>Marriott International, Inc. operates, franchises, and licenses hotels and timeshare properties worldw…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cantey-Hanger-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23187</link>
<guid>21fb6e8345fe6db0c1b7bc9ccb4a9bff</guid>
<pubDate>Tue, 06 May 2025 18:14:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Cantey-Hanger-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38e9cad842564d3104ac776645e982529642149dea54353aee0e1202597da36a</i><br /><br />Threat actor <b>description</b>: <i>Cantey Hanger LLP, established in 1882, is a full-service firm based in Texas, with offices in Fort Wo…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Prime-Consulting-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23211</link>
<guid>f49b08642a7567558ff925a4fecac826</guid>
<pubDate>Tue, 06 May 2025 18:14:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Prime-Consulting-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>69b2dff4d6c645d864864bb250505644bdcf540655cbac0856f9d31476b8b162</i><br /><br />Threat actor <b>description</b>: <i>Prime Consulting Group, Inc. is a full-service property and casualty insurance services company</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ball-Eggleston-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23210</link>
<guid>3b0d4794b8ffc47ee0a61cdaaada3224</guid>
<pubDate>Tue, 06 May 2025 18:14:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Ball-Eggleston-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b65cc403a246d617af5fd0896a53fbc6ecf5d87ec38690b57ad3a5a958564b40</i><br /><br />Threat actor <b>description</b>: <i>Ball Eggleston is a full-service law firm providing legal services for many types of cases, including …</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tetra-Technologies-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23209</link>
<guid>536e03bc7e3df1cfeaab8944f0823a30</guid>
<pubDate>Tue, 06 May 2025 18:14:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Tetra-Technologies-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f5902ee145a5ff5b9bf10677c125c96e8a6db0b8f48abca34bd371778371320</i><br /><br />Threat actor <b>description</b>: <i>TETRA Technologies delivers leading solutions to the upstream energy industry for completions fluids, …</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lincoln-Investment-Planning-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23186</link>
<guid>99932f26d3cd5ee34eea395bef353677</guid>
<pubDate>Tue, 06 May 2025 18:14:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Lincoln-Investment-Planning-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a19358fa2d3555d878c29a9213eed495c204ee256b9865edd45589c82043d37</i><br /><br />Threat actor <b>description</b>: <i>Lincoln Investment was founded in 1968. This company provides investment advice and banking services. …</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Quintairos-Prieto-Wood--Boyer-PA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23208</link>
<guid>a79eb1040b0ea4b55f7f436d6a3d0444</guid>
<pubDate>Tue, 06 May 2025 18:14:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Quintairos-Prieto-Wood--Boyer-PA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8a3c41034883f2653012410e46b03a1051bfbf40822476a6c34bfcec5e74c46b</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2006 and headquartered in Miami, Florida, Quintairos Prieto Wood & Boyer, P.A. is a law fir…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bass--Berry--Sims-PLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23207</link>
<guid>be9abc9bf1e0e873174ec50b60542e34</guid>
<pubDate>Tue, 06 May 2025 18:14:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Bass--Berry--Sims-PLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ccada29bcafedfe23c9aafab53a8d3bb4ace88e72b43e8caffcc8a642507be3</i><br /><br />Threat actor <b>description</b>: <i>Bass, Berry & Sims is poised to guide clients through complex legal matters.Focused on their interests…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Essex-Property-Trust</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23206</link>
<guid>6802ac2b9aea82a7d56af8b899befea9</guid>
<pubDate>Tue, 06 May 2025 18:14:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Essex-Property-Trust</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7b5c3a629e3c7082deffe6afe2eefb7d986ff5f9b9e225bf9dba17f897892da</i><br /><br />Threat actor <b>description</b>: <i>Established in 1987, ESSEX REALTY MANAGEMENT is a privately owned real estate management and investmen…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Davenport--Company-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23205</link>
<guid>909ba8dfdaa6ead78161b58f48b4dd12</guid>
<pubDate>Tue, 06 May 2025 18:14:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Davenport--Company-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>73780c801e0637db48bbfd1555037701862c192f40661118af9e92bfa8ea99f3</i><br /><br />Threat actor <b>description</b>: <i>Davenport offers a wide range of investment services for individuals, corporations, institutions, and …</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>AG-Adjustment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23204</link>
<guid>a46620e9cddf3d9cb73def57e25ec158</guid>
<pubDate>Tue, 06 May 2025 18:14:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>AG-Adjustment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>65adb6a3f49467db72775745ba35ee8bd48bc6ec32fe7cd25ed032547e663070</i><br /><br />Threat actor <b>description</b>: <i>AG Adjustments is a commercial collection agency. It offers small business B2B debt collection, AR man…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jacobs-Entertainment-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23189</link>
<guid>2e02c190c1158d58c19ba6dceb02a5b8</guid>
<pubDate>Tue, 06 May 2025 18:12:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Jacobs-Entertainment-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ddeac07cc646da1ead33b9bd1ca2ba9dfdb50c248ef66e3c864a0382c1aab7e4</i><br /><br />Threat actor <b>description</b>: <i>Jacobs Entertainment, Inc. (JEI) is a developer, owner and operator of gaming and entertainment facili…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lane-Gorman-Trubitt</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23202</link>
<guid>4fd3f5fed2d59efc8c49d0bb97b85ad9</guid>
<pubDate>Tue, 06 May 2025 18:12:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Lane-Gorman-Trubitt</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db9c65cdde57535266781bd8d1d7eb8f44d3921bf9e9ecb321efb11f33acce54</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1950, Lane Gorman Trubitt, PLLC (LGT) is one of the largest certified public accounting fir…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Integrity-Home-Mortgage-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23200</link>
<guid>f7c6acf162be013e0555167876a20c73</guid>
<pubDate>Tue, 06 May 2025 18:12:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Integrity-Home-Mortgage-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f801dadaf8c780e6717508a0be40c9e41bac99e4fd8d70fc4c279714f40ac98</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2005, Integrity Home Mortgage is a financial service company specializing in home purchases…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>TWFG-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23198</link>
<guid>e42072ee175d6f0583c68ec2aab69fa2</guid>
<pubDate>Tue, 06 May 2025 18:12:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>TWFG-Insurance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af99e612cd2f1406048019650f437ef36d7bf2b788c85b8a7ae091e54559375b</i><br /><br />Threat actor <b>description</b>: <i>TWFG Insurance services the Lagrange area and throughout the state of Georgia. At TWFG Insurance, thei…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Geocon-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23197</link>
<guid>a05b8b200f2d0a95117b8db1418c6d44</guid>
<pubDate>Tue, 06 May 2025 18:08:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Geocon-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a6600894bce01c3083f3a50464ff6640eaae4335d371334123d90fb6920f5d9</i><br /><br />Threat actor <b>description</b>: <i>	Geocon Inc.
REVENUE:	$63M
TOTAL DOWNLOADS:	162
COMPANY INFO:	
Architecture, Engineering & Design · California, United States · 289 Employees. Founded in 1971, Ge…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Liebert-Cassidy-Whitmore-Attorneys</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23196</link>
<guid>51c7f8da872acc240369448db3c13dee</guid>
<pubDate>Tue, 06 May 2025 18:07:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Liebert-Cassidy-Whitmore-Attorneys</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a0036d03bbca006e868f8a87031f66bee25e5365914f4c9403bb58f9af0eb3b</i><br /><br />Threat actor <b>description</b>: <i>REVENUE:	$82M
TOTAL DOWNLOADS:	164
COMPANY INFO:	
Liebert Cassidy Whitmore is California's premier labor, education, and employment law firm. We provide…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rosenbauer-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23195</link>
<guid>dcd68320d762579423e846dea3179930</guid>
<pubDate>Tue, 06 May 2025 18:07:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Rosenbauer-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7afecaa724051fb0c3c3f22388b1dc7234609fa1f99c7808764a991504dcb9d</i><br /><br />Threat actor <b>description</b>: <i>	Rosenbauer America
TOTAL DOWNLOADS:	157
COMPANY INFO:	
Rosenbauer is the world's leading manufacturer of firefighting vehicles and equipment. In North Americ…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Haynie--Company-PC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23194</link>
<guid>d3b724e14dfe42f0a53c86dc5aafd20f</guid>
<pubDate>Tue, 06 May 2025 18:07:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Haynie--Company-PC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>54606519df9eb2b90488b5a30dcf2cfe79a7db1018127dff77ea9b99a423cf1b</i><br /><br />Threat actor <b>description</b>: <i>REVENUE:	$57.5M
TOTAL DOWNLOADS:	165
COMPANY INFO:	
Haynie & Company was founded in 1960 and is headquartered in Salt Lake City. They offer tax services, …
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Williams-Kastner--Gibbs-PLLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23193</link>
<guid>543f040479c7e7c41bbabd257c13ef2d</guid>
<pubDate>Tue, 06 May 2025 18:07:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Williams-Kastner--Gibbs-PLLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c78252929fae1b9458c4071088149d04647a4db60305eee2e213d8b16e02cee</i><br /><br />Threat actor <b>description</b>: <i>REVENUE:	$25.2M
TOTAL DOWNLOADS:	172
COMPANY INFO:	
Williams Kastner provides legal advisory services. The firm focuses on areas including federal litigat…
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sanchez-Daniels--Hoffman-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23188</link>
<guid>6642423ec0eeccca6fb0a7f46b75b19c</guid>
<pubDate>Tue, 06 May 2025 18:07:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Sanchez-Daniels--Hoffman-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa21926fc77be3ab0c5bd94c4dca52705776adb006d2717919185dbf3fac335d</i><br /><br />Threat actor <b>description</b>: <i>REVENUE:	$18.9M
STATUS:	LEAKED
DOWNLOAD LINK:	
> Click to download <
TOTAL DOWNLOADS:	159
COMPANY INFO:	
Sanchez Daniels & Hoffman LLP is a full service civil practice law firm with the top AV Martindale-Hub…
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Managed-Benefits-Advisors-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23192</link>
<guid>98a361c41dd6204d4ac5952d215a4157</guid>
<pubDate>Tue, 06 May 2025 18:07:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Managed-Benefits-Advisors-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>21504385d667e5cd3c7376c88e1846d37208a693c54aaeab05c651153d978faa</i><br /><br />Threat actor <b>description</b>: <i>REVENUE:	$7.4M
STATUS:	LEAKED
DOWNLOAD LINK:	
> Click to download <
TOTAL DOWNLOADS:	160
COMPANY INFO:	
Managed Benefits, Inc. (MBI) is a privately owned consulting firm serving the Mid-Atlantic States and …
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ted-A-Greve--Associates-PA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23191</link>
<guid>5194b07beb1d4a9c1ab854cc5621ea12</guid>
<pubDate>Tue, 06 May 2025 18:07:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Ted-A-Greve--Associates-PA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa82f3ad4181848f19d192057add106741a21df7c2eac7a2f866e9265b224278</i><br /><br />Threat actor <b>description</b>: <i>
REVENUE:	$6.5M
STATUS:	LEAKED
DOWNLOAD LINK:	
> Click to download <
TOTAL DOWNLOADS:	160
COMPANY INFO:	
he law firm of Ted A. Greve & Associates, P.A. is dedicated to providing professional and personalized…
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jardim-Meisner--Susser-PC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23190</link>
<guid>e8f5b62d67c6264012aa8ab2475a2a37</guid>
<pubDate>Tue, 06 May 2025 18:07:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Jardim-Meisner--Susser-PC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a5af98e05f50dafc0b9b8bc2d16d5bd48de92b55950d703d0e2a66b733c564ea</i><br /><br />Threat actor <b>description</b>: <i>REVENUE:	$6.2M
STATUS:	LEAKED
DOWNLOAD LINK:	
> Click to download <
TOTAL DOWNLOADS:	162
COMPANY INFO:	
Law firm</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>dosjm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23176</link>
<guid>34bdff731c6a777c9c6393a9a0a39a0d</guid>
<pubDate>Tue, 06 May 2025 16:40:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>dosjm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>862c48db03bf492578d92d433a1b39ba8b53745e921d108cf7ec436b69d5a66c</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>dosjm.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>biglevel.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23175</link>
<guid>b6fd4efa02854bdd51b5f8695a8422c1</guid>
<pubDate>Tue, 06 May 2025 16:39:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>biglevel.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a6ed51d36b9de02da95bf15ef2b28ffb1e518936f2f551ca16acdc00d2912d8</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>biglevel.net</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>bloomfamilyeyesurgeons.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23174</link>
<guid>f846d4364ff30b692d4d6f1d8ddc407e</guid>
<pubDate>Tue, 06 May 2025 16:37:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>bloomfamilyeyesurgeons.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd177966635fb324640c5a5208a12cde3b7ffbb3596b53266d7fe687bcb7f200</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "Bloom Family Eye Surgeons is a leading ophthalmology practice located in Newport News, Virginia. The company focuses on providing comprehensive eye care services including eye examinations, cataract surgery, glaucoma care, diabetic eye care, contact lens fitting, and emergency eye care. The experienced team of eye surgeons and optometrists are committed to helping patients improve and maintain their vision through various advanced treatments and procedures."</i><br />Target victim <b>website</b>: <i>bloomfamilyeyesurgeons.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>dreng.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23172</link>
<guid>156e69a7c54f0826cd83d4f9ab4b338a</guid>
<pubDate>Tue, 06 May 2025 16:34:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>dreng.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18eaee5ddb57148af023237d8c93a55a34926b66082889fd8cf52e1f4a178d07</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>dreng.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>mooregiles.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23171</link>
<guid>70e5fb7f1bcc0a685867be864eacce56</guid>
<pubDate>Tue, 06 May 2025 16:32:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>mooregiles.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>427241e7b76c4dc742e8ceba460785ba925d05bd691d5465907a60a8b4c376c2</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Moore & Giles is a Virginia-based company specializing in the design and distribution of high-quality leather and luxury home furnishings. Founded in 1933, they collaborate with tanneries worldwide. The company not only serves the high-end residential, hospitality and aviation markets, but also offers handbags, luggage and accessories in its product line. They are known for innovative designs and commitment to environmental accountability.</i><br />Target victim <b>website</b>: <i>mooregiles.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Balance-Diagnostics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23170</link>
<guid>56582fc8a333b912901b6f3c771bd60f</guid>
<pubDate>Tue, 06 May 2025 16:24:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Balance-Diagnostics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8efabef223c0982231f62b7778d8a8e6d17fbdbfb263b79c25fbae5134bbf34</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Balance Diagnostics is a medical technology company that specializes in developing advanced healthcare technologies for the diagnosis and treatment of balance disorders. These include dizziness, vertigo, and other balance-related health problems. The company's proprietary diagnostic tools and technologies are used by healthcare professionals all over the world to improve patient outcomes.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Daniels--Taylor-P.C</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23169</link>
<guid>79758bdca5ae09bc59b4d6d2eccd0d09</guid>
<pubDate>Tue, 06 May 2025 14:46:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Daniels--Taylor-P.C</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77fbe08f0e1f3641a45ee1384df77eb15f97d74bb99a59c0f65bf5d3350952e0</i><br /><br />Threat actor <b>description</b>: <i>Daniels & Taylor, P.C. is a full-service law firm in Lawrencevill
e that has been serving clients thorough Gwinnett County

We are going to upload more than 70GB of essential corporate docu
ments such as: a lot of detailed client personal information and 
documents (passports, medical records, drivers licenses), confide
ntial court files, financial data of clients, NDAs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rand-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23148</link>
<guid>76a46a2fef5c9dd7e70f675e2d783d7f</guid>
<pubDate>Tue, 06 May 2025 06:58:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Rand-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7da89579a52f683e2e089b9d0b6e9b85cb321f49b72a0afee231a7b535a4c51a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Marine-Technical-Surveyors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23144</link>
<guid>3060a8dbca7beb6e2403c555ede5e742</guid>
<pubDate>Tue, 06 May 2025 03:38:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Marine-Technical-Surveyors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1db3206e5f064fcefe0d2b3c332dd757e406af4bbfb7323e627e9b3f6d8585a4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Downtown-Travel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23143</link>
<guid>912575c953fa7add432c5c9db31fae70</guid>
<pubDate>Tue, 06 May 2025 01:52:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Downtown-Travel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c4ac5875f7371ca348dc91a4f3c4b59dde2b67c0063ee912b45927f5f9765336</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>SNS-SYSTEM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23162</link>
<guid>82454fe25499989ff1d8dc03bcfed1a6</guid>
<pubDate>Mon, 05 May 2025 23:05:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>SNS-SYSTEM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec8618baf1ddfb26d9076c44438d844e94e3b3584cb5b2f1a9d663a5bc6b8e85</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>snssystem.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Derp.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23158</link>
<guid>321f53d23aaed0465f1288b5b3deeeeb</guid>
<pubDate>Mon, 05 May 2025 20:09:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>IMNCrew</b> claims attack for <b>Derp.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>84659b5c7f3c9838a29b47ab8ae1c3c72cdf08f4de6aaf93bacc8e8e8c6fcc43</i><br /><br />Threat actor <b>description</b>: <i>We’re the Denver Employees Retirement Plan (DERP). Your partner in building, planning, and living a secure retirement future while serving the city you love. DERP was established January 1, 1963, to provide a defined benefit plan for eligible City and County of Denver employees in the Career Service, certain employees of the Denver Health and Hospital Authority, and DERP staff. We provide a monthly DERP Pension Benefit payment to more than 10,800 retirees and beneficiaries, and are an essential element of the future financial security for almost 10,000 active members.</i><br />Target victim <b>website</b>: <i>Derp.org</i>]]></description>
<category>IMNCrew</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vnakc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23156</link>
<guid>50f56096d5641c9ca95b522805a32cb7</guid>
<pubDate>Mon, 05 May 2025 20:08:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>IMNCrew</b> claims attack for <b>Vnakc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47f7a11531116b4fbc830dfaf9794f12a0ebcc6dee3a3c1fd54bec078bd13de8</i><br /><br />Threat actor <b>description</b>: <i>Established in 1891, Visiting Nurse Association (VNA Home Health) is a nonprofit home health agency. We offer a wide range of in-home services for people in and around Kansas City. Our legacy of more than 125 years of excellence in home health comes from our belief that people not only need someone to care for them, they also need someone to care about them. That’s what we do at VNA, and our patients say it’s one of many things that set us apart. As the oldest home health agency in Kansas City and the sixth oldest in the United States, we have history and experience patients can trust. We are governed by a volunteer board of directors that includes many of Kansas City’s most influential business and civic leaders. VNA nurses and therapists average more than ten years of patient care experience, with three to five years experience in home health care. Through our dedication to the health and wellness of this community, we deliver positive clinical outcomes that exceed national averages. We use the latest technology available to meet the changing needs of our community.What we do for our patients may be complex, but our mission is simple: to bring exceptional health care into the homes of everyone we serve.</i><br />Target victim <b>website</b>: <i>Vnakc.org</i>]]></description>
<category>IMNCrew</category>
</item>
<item xmlns:dc='ns:1'>
<title>Goodson.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23155</link>
<guid>27e7d2d0048122fae0f4eb401077df0d</guid>
<pubDate>Mon, 05 May 2025 20:07:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>IMNCrew</b> claims attack for <b>Goodson.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>adcba700c662e2e70ef5854a7873e761458d555bc10c67cdefeb4d23fa5e7389</i><br /><br />Threat actor <b>description</b>: <i>Goodson is the premier supplier to engine rebuilders around the world . Founded in 1945, Goodson has been providing the finest quality tools, supplies and technical information to the automotive aftermarket ever since. Today, Goodson is 100% Employee-Owned.</i><br />Target victim <b>website</b>: <i>Goodson.com</i>]]></description>
<category>IMNCrew</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trybus</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23153</link>
<guid>b39e0454a95c993bd9388d2605e035a2</guid>
<pubDate>Mon, 05 May 2025 19:05:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Trybus</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c83528b2252340e3a580d6737b99f3905043478981edf1285dfad9f743d53495</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.trybus.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sugar-Lake-Lodge</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23152</link>
<guid>76c2f1b4a1f0bfbbff4a4789d9d82630</guid>
<pubDate>Mon, 05 May 2025 19:03:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Sugar-Lake-Lodge</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d33b5a448e86a9e6b916f6892a72d9668076ee98ebefc93fc414212a52e7be5d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.sugarlakelodge.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>ATI-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23137</link>
<guid>8857f91319bfa23d6fa43b632b4e1163</guid>
<pubDate>Mon, 05 May 2025 18:58:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>ATI-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>35d46d4cb6ef318155af2294b788256d87fd6bb664b0e8358d3231c77a090767</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Technical-Die-Casting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23150</link>
<guid>12616f69e1fed7eabfd7b87bf2bdccb0</guid>
<pubDate>Mon, 05 May 2025 17:28:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Technical-Die-Casting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8b0f1657e29f6a0935946b8fa3de2fdb37aca4bf401129c62be3e29f009b091</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.tech-die-casting.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sioux-Chief</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23149</link>
<guid>0e4f9b51a861eb5a8e419cb96f1087a1</guid>
<pubDate>Mon, 05 May 2025 17:02:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Sioux-Chief</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96a66a40fa0cbd384774f30ca3038342238c5a82418745f5d06474b1ec6493ea</i><br /><br />Threat actor <b>description</b>: <i>Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>www.siouxchief.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hire-Velocity-lan.hirevelocity.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23133</link>
<guid>370788cc0285655036887afcc4d30c4c</guid>
<pubDate>Mon, 05 May 2025 13:34:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Hire-Velocity-lan.hirevelocity.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>115ba6d6ec2332c022b2583b7da80aab88baf51b0dad9da070a189811ed57735</i><br /><br />Threat actor <b>description</b>: <i>Hire Velocity designs talent strategies that build great teams and great busines...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pulmonary-Physicians-of-South-Florida-Clinics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23139</link>
<guid>38eccc0332510627fb3458b2a800f8dd</guid>
<pubDate>Mon, 05 May 2025 10:39:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>Pulmonary-Physicians-of-South-Florida-Clinics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>760720a28d01885ca958ab09b6bf80408a243327b1863f2ba497e2d495c358d6</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cocoon</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23132</link>
<guid>e1549f7b56377c935b1c29794a8da341</guid>
<pubDate>Sun, 04 May 2025 20:56:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>silent</b> claims attack for <b>Cocoon</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ccc8111cbc650b548bf5d8626a70b873c983149bedff54219d70bcb01a0ec92b</i><br /><br />Threat actor <b>description</b>: <i>Country: United States | Revenue: 16.30M USD | Employees: 29 | Tags: </i><br />Target victim <b>website</b>: <i>cocoon-inc.com</i>]]></description>
<category>silent</category>
</item>
<item xmlns:dc='ns:1'>
<title>Defiance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23130</link>
<guid>d6686469a29701048799005b5ebb1529</guid>
<pubDate>Sun, 04 May 2025 11:34:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Defiance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>734fa13385416807068e39b3dc34d724a64817ca4e0d193b3c806f903b17aca8</i><br /><br />Threat actor <b>description</b>: <i>Site: defiancellc.com
														Industry: Energy, Utilities & Waste
														GEO: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>CabinC.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23125</link>
<guid>5595d5735eb1f5e775f86979f81dfb2e</guid>
<pubDate>Sun, 04 May 2025 05:33:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>CabinC.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>66fc5e94513e49a1dba2a4c66d47f7c814dcec73e26bc8d345bdcb6408133ce8</i><br /><br />Threat actor <b>description</b>: <i>Cabin Crafters has been serving the corporate aviation community for more than 2...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>soundtransit.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23124</link>
<guid>075a3a646faea7bfa9cd8b86c51a026b</guid>
<pubDate>Sun, 04 May 2025 01:55:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>braincipher</b> claims attack for <b>soundtransit.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dead2fd766172d6109c48abfa3ec3a396959306c3dd7cd8e7591952e62c688c2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>braincipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Eagle-Logistics---Press-Release</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23115</link>
<guid>8a29a411e91931b2c009daf000f9ed7d</guid>
<pubDate>Sat, 03 May 2025 13:04:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>American-Eagle-Logistics---Press-Release</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>50ac2e02e034e8de87a66239fd710a36b280c4fafb20e463d03bccfd96a45cf0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fowler-Elementary-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23114</link>
<guid>fa9ea71089fa4eb8a84f37659675d601</guid>
<pubDate>Sat, 03 May 2025 00:25:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Fowler-Elementary-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3359c8df297e97280fddc4b7f7702e62df0c2049e5c366fadf6518d6f6db79b6</i><br /><br />Threat actor <b>description</b>: <i>The Fowler Elementary School District is an elementary school district in southwest Phoenix, Arizona. It operates six schools: two middle schools and four elementary schools.</i><br />Target victim <b>website</b>: <i>fesd.org</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>rosekennedygreenway.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23098</link>
<guid>56440f1f4118e270e5e6cee92ed220c3</guid>
<pubDate>Fri, 02 May 2025 07:28:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>J</b> claims attack for <b>rosekennedygreenway.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7e0c38fbb053b4f368c1e4a538e0aec0610f46299c204b48e1e874988301d6e</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] The Rose Kennedy Greenway is a contemporary public park in Boston, Massachusetts. Named after Rose Fitzgerald Kennedy, it fuses organic and architectural beauty across several acres of landscaped gardens, promenades, plazas, fountains, art, and specialty areas. It is managed by the non-profit Greenway Conservancy. It is renowned for offering free WiFi, mobile eateries, and community programs all year-round.</i><br />Target victim <b>website</b>: <i>rosekennedygreenway.org</i>]]></description>
<category>J</category>
</item>
<item xmlns:dc='ns:1'>
<title>mygoalseek.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23104</link>
<guid>d1aad48723acc40982b008f41d334de0</guid>
<pubDate>Fri, 02 May 2025 07:19:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>J</b> claims attack for <b>mygoalseek.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d2e6a882969eac928e04f9e7f3b1f1e407aaf21336f95316290fa7cc09c7339</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>mygoalseek.com</i>]]></description>
<category>J</category>
</item>
<item xmlns:dc='ns:1'>
<title>kll-law.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23081</link>
<guid>89493b928bb483d5a802a8ab1135159e</guid>
<pubDate>Fri, 02 May 2025 01:33:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>kll-law.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c3d3c6b37d7466b9b395e9c600cd1db456b9d66269213603ac8a0bdb2334230</i><br /><br />Threat actor <b>description</b>: <i>Kagan Lubic Lepper Finkelstein & Gold, LLP is a full-service AV–rated law firm providing practical and legal counsel to clients for over forty years.  A substantial portion of our practice is centered on real estate and cooperative and condominium la...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>arc-com.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23082</link>
<guid>874652a830c04985d23bef8ea1c584c1</guid>
<pubDate>Fri, 02 May 2025 01:33:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>arc-com.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a056d94db0939901b49990d5c636a06f48245982f2b364050830b65920d7a04e</i><br /><br />Threat actor <b>description</b>: <i>A leading designer, manufacturer and supplier of design-driven, high-performance textiles and wallcoverings.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>pdcm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23083</link>
<guid>57ba5f17ed6198b54e4ccf755c6749be</guid>
<pubDate>Fri, 02 May 2025 01:33:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>pdcm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e25d43df55fef478fcbd829b2116ddcfcb41ce4260920cf6536c4be6d59cac06</i><br /><br />Threat actor <b>description</b>: <i>We offer a range of insurance types from business and group insurance to individual life and health.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>cobbcounty</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23076</link>
<guid>51b540b0b9be01c3be311155d0ff6fd5</guid>
<pubDate>Thu, 01 May 2025 21:34:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>cobbcounty</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a690febe15381570307b455a10d9f18e05832e66842a7a8234849165874aa60</i><br /><br />Threat actor <b>description</b>: <i>Cobb County is a county in the U.S. state of Georgia, and is a core county of the Atlanta metropolitan area in the north-central portion of the state. 

We also publish a full dump AD. 

400.000+ files. over 150gb.

All data will be rel            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dedicated-Web-Consultants-Inc-USA---dwcusa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23088</link>
<guid>493a60bf6b8a9882908f0e15960fd628</guid>
<pubDate>Thu, 01 May 2025 21:02:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>skira</b> claims attack for <b>Dedicated-Web-Consultants-Inc-USA---dwcusa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b04b3dfd39c9696f2d766d759234973e99cd04f4f1bb3db44eb7ffef8dd159c2</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>dwcusa.com</i>]]></description>
<category>skira</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.newseason.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23077</link>
<guid>7370c9e9884d2dedfef9cfa696f286f8</guid>
<pubDate>Thu, 01 May 2025 20:35:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.newseason.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>62b3c4d011d65e9d1662f62fc5740bad2aa185fa4ba56f1b9cd80e2b296ff88c</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1986, New Season provides opioid drug addiction treatment. It offers medication-assisted treatment, counseling, and medical services. It is headquartered in Maitland, Florida.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ECOM-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23087</link>
<guid>cd7adf7555f811fa22deff50759e73a0</guid>
<pubDate>Thu, 01 May 2025 20:25:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>ECOM-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4cfe97735d1addd069332a2c1e49fd10632cb7b8d1ee5c94afe84d958faa6115</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ecomusa.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southern-Fidelity</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23086</link>
<guid>26adbe9d22d735666aa3800c798872fc</guid>
<pubDate>Thu, 01 May 2025 20:24:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Southern-Fidelity</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d04fb1e8917127f03a4a2d9f22e18fc5c5bac53f37d9d486e7bbfc8f26bdcf2b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.southernfidelityins.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Seydel-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23085</link>
<guid>339e1f3c4cfdd33fa17637c74bf5df09</guid>
<pubDate>Thu, 01 May 2025 20:21:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>The-Seydel-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>15a49dd07fb064a6553d0396cb8bb9f83ce081d0fe58ebd42b0bfab0692147a0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.seydel.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Weil-Construction-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23074</link>
<guid>6f83ec67962a671eafd2e888e6a90dda</guid>
<pubDate>Thu, 01 May 2025 18:53:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Weil-Construction-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab3812f6834540b3b3dc6eaa4c22410a32fe667734d89bc8c5180330f1493e9b</i><br /><br />Threat actor <b>description</b>: <i>Weil Construction, Inc. - company specializing in construction services for the federal government, non-federal public organizations, educational institutions, and private commercial organizations. Weil Construction corporate office is located in 3344 Princeton Dr NE, Albuquerque, New Mexico, 87107, United States and has 75 employees. The total amount of data leakage is 118.60 ПИ</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.ancc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23075</link>
<guid>0df840aed5f513a02964d0c27bc4f277</guid>
<pubDate>Thu, 01 May 2025 18:32:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.ancc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5985febf1258fbf68fd63fda0e9a5b224aa4d1e4324b71e19d1045caa98687b6</i><br /><br />Threat actor <b>description</b>: <i>Started in 1861, the Army Navy County Club offers golfing, swimming, use their fitness center, and golf and tennis Pro Shops to its members.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Marsicovetere--Levine-Law-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23078</link>
<guid>d3cba56280a207ddd1f58c8614ac13ce</guid>
<pubDate>Thu, 01 May 2025 15:45:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Marsicovetere--Levine-Law-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c8cb479acda57a514c5c23438103f5608b05fc1a020102984215d4a0568e5fa</i><br /><br />Threat actor <b>description</b>: <i>Marsicovetere & Levine Law Group, P.C. investigates and defends s
erious felony and misdemeanor criminal allegations, DUI/DWI, and 
motor vehicle-related cases.

We are ready to upload 20 GB of corporate documents such as: a lo
t of legal cases with detailed personal data of customers, medica
l records, detailed police reports, arrest warrants, numerous con
fidential documents, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Insight-Pipe-Contracting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23079</link>
<guid>22c25c4f633efd5c33709cc12e60ac9b</guid>
<pubDate>Thu, 01 May 2025 15:45:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Insight-Pipe-Contracting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>462ab0756e7b1abf65021fb370694a3ffb61dbd39c228fb77915e11c3513dfb1</i><br /><br />Threat actor <b>description</b>: <i>Insight Pipe Contracting is a leading provider of trenchless main
tenance and rehabilitation services for wastewater, stormwater, a
nd other underground utilities.

We are ready to upload 7 GB of corporate documents such as: perso
nal files of employees, client data, projects info, financial dat
a (audits, tax statements, payment details, reports, lots of invo
ices), corporate NDAs, agreements, confidential internal document
s, etc.
</i><br />Target victim <b>website</b>: <i>insightpipe.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>maywdef</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23062</link>
<guid>6706f0da72316a555818858ae81eb84e</guid>
<pubDate>Thu, 01 May 2025 03:46:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>maywdef</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>98066db6f10788fd63e7215c1767b8a9fe3c7593232b139e2ec4c7c19ccb1285</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>SIMCO-Electronics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23063</link>
<guid>8b90da18aa2fee81ae89d07845fcba11</guid>
<pubDate>Wed, 30 Apr 2025 19:24:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bert</b> claims attack for <b>SIMCO-Electronics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac8ff8b576f3cee808ea0fdff162c3d1fcb1f9b7a5c8799d8a787b753b8e06fb</i><br /><br />Threat actor <b>description</b>: <i>SIMCO Electronics is a leading provider of calibration and software solutions for technology companies. Founded in 1962 to serve NASA and Silicon Valley firms.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bert</category>
</item>
<item xmlns:dc='ns:1'>
<title>Telco-Intercontinental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23058</link>
<guid>e626fbeea3ece898dfb0e5f651839d12</guid>
<pubDate>Wed, 30 Apr 2025 18:56:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Telco-Intercontinental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fcd4ced5bb17207372eff848e991cb764b18230fa5225ff87d03c639f4f1439c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Matrix-New-World-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23061</link>
<guid>186b9c4e15d0dfece1765c0a5cfb8e33</guid>
<pubDate>Wed, 30 Apr 2025 18:35:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Matrix-New-World-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>609a9ce67467f31d9c8312a2a10db081950b06f164943abc801c6211ccc126f3</i><br /><br />Threat actor <b>description</b>: <i>Matrix New World Engineering is a company of engineering and science experts who focus on some of the nation's most pressing long-term challenges, including climate change, resiliency, ecological restoration, contamination studies, water supp            ...</i><br />Target victim <b>website</b>: <i>www.mnwe.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>FCC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23057</link>
<guid>5fb04d1ce991c11c0fb16a6777163629</guid>
<pubDate>Wed, 30 Apr 2025 16:56:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>FCC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1546d0ce28bfdde1df1b6a1b662ff86e15d74a53ca62659f6918235775c42e65</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Digestive-Specialists</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23051</link>
<guid>9a9ca45c1a515ab0b82445bedc0563d3</guid>
<pubDate>Wed, 30 Apr 2025 14:50:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Digestive-Specialists</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4a558625d2ed23e5ea852ae1406194d41cae13f6ee7f7de6dae6869b99954f5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southwood-FinancialSWF-FUNDING-LLC-EduCap-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23060</link>
<guid>3d8fe53b02cd5791092fcb7cad6d117c</guid>
<pubDate>Wed, 30 Apr 2025 14:39:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Southwood-FinancialSWF-FUNDING-LLC-EduCap-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea078ee026abbe171b1bf3e8fffa9143454594f18185bcc5d0ca7145224ea10a</i><br /><br />Threat actor <b>description</b>: <i>Southwood Financial specializes in private student loan solutions
and debt settlement services aimed at helping borrowers achieve 
financial stability. SWF FUNDING LLC and EduCap Inc. have also be
en impacted and lost their data.

We are going to to upload more than 370 GB of these companies. In
the archives you will find the following: personal information o
f employees and borrowers (SSNs, passports and so on), financial 
data (audits, payment details, reports), a lot of corporate NDAs,
etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>mossyoak.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23052</link>
<guid>eaebf0b618a31bc735037646eacf7867</guid>
<pubDate>Wed, 30 Apr 2025 11:14:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>mossyoak.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f75c436b39af8493dd278c636a0f5b4b2504b20a09d7cb41433e37ed43f24357</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 11.05.2025.It’s not a passion, it’s an obsession. Every day at Mossy Oak, we live and breathe the outdoors — from hunting and conservation, to stewardship and legacy efforts. Si            ...</i><br />Target victim <b>website</b>: <i>www.mossyoak.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>dlcid.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23053</link>
<guid>185c61d8cf01c01ddf5f7ba337f72084</guid>
<pubDate>Wed, 30 Apr 2025 11:13:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>dlcid.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87e4ac5fa9586f40d0c127cf4021898a1dfc672dc94f9ed128aee711736e3f81</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 11.05.2025.Founded in 2015 by Jon de la Cruz, De la Cruz Interior Design (DLC-ID) is a distinguished residential and hospitality design firm based in San Francisco. At his namesake fi            ...</i><br />Target victim <b>website</b>: <i>dlcid.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>bostonconveyorandautomation.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23054</link>
<guid>97adbcd253402895e56cdeceb5f4ca29</guid>
<pubDate>Wed, 30 Apr 2025 11:11:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>bostonconveyorandautomation.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91d7a5f0a0e68fd4d1c8a01b9c40ac3f46fc9bc346136d2708c6c93cb010472c</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 11.05.2025.BCA, Boston Conveyor & Automation took its name from a city with a revolutionary history that has shaped itself into a world-class, technology-driven metropolis. Like that             ...</i><br />Target victim <b>website</b>: <i>bostonconveyorandautomation.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>rfsd13.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23056</link>
<guid>9fbcbcb41e52efd7dbcb96e8a5c4cb63</guid>
<pubDate>Wed, 30 Apr 2025 11:08:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>rfsd13.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed845b52083cad4f856c419a193f390eb58230d316a362aa9404131490e4b595</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 11.05.2025.Rock Falls Elementary School District #13 is a PreSchool through 8th grade district. Our Elementary district is the largest of three elementary school districts that attend            ...</i><br />Target victim <b>website</b>: <i>rfsd13.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gorham-Sand--Gravel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23044</link>
<guid>855e5174548682b7a505e1ae43ba96b5</guid>
<pubDate>Wed, 30 Apr 2025 01:48:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Gorham-Sand--Gravel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>526343f5c38e651be41d4d89f548b5a8572e2f176615a16885dfeca2f281fbb9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cooper-Global-Chauffeured</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23043</link>
<guid>3d4a20644de04c214240d6125c8d5a8d</guid>
<pubDate>Tue, 29 Apr 2025 22:48:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Cooper-Global-Chauffeured</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f3ebf2690a6484d0a59f67c605ff27352ee8c44dcb58cb8841625b603657ab0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>National-Steel-City</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23049</link>
<guid>d5a9ee07f24fb62f40781d00df2d47db</guid>
<pubDate>Tue, 29 Apr 2025 20:18:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>National-Steel-City</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>98d95fa68f8387234fd8e65cfc41b6fa78a0f1c956147a547ed4343aaa1638bf</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.nsc-us.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>PermaCold-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23048</link>
<guid>174ef86b57d96cc97c185dfcdaf12858</guid>
<pubDate>Tue, 29 Apr 2025 20:16:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>PermaCold-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba139befb6f65b85ad5de38941b573161573dc4d4031291930ff6921e4f719ba</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.permacold.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Missouri-Pipe-Fittings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23047</link>
<guid>74d1e312f2320de5a6c94d0bece3923e</guid>
<pubDate>Tue, 29 Apr 2025 20:14:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Missouri-Pipe-Fittings</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f615897e970e11fda558047a56c7904ff3a983f85ec27f1d922ff0ddb08d58d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.mopipe.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>southernagllc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23046</link>
<guid>940933a3808de5a280648f1a8fd1ae74</guid>
<pubDate>Tue, 29 Apr 2025 19:58:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>southernagllc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>07950ccb0d6032d5051cf7fd597df563a9a0b285488ff6d5ea8b8fccf8829952</i><br /><br />Threat actor <b>description</b>: <i>Southern Ag LLC is a company that specializes in providing consulting services for the agricultural industry, offering expertise in various areas like crop management, Precision Ag, and sustainable farming practices. They also provide a range of on-farm services that aim to improve customer's return on investment. Additionally, Southern Ag LLC offers a variety of equipment for game plot development and other applications. </i><br />Target victim <b>website</b>: <i>southernagllc.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>SoloVue</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23042</link>
<guid>723c26b3460897d11db04474db0e0501</guid>
<pubDate>Tue, 29 Apr 2025 17:11:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>SoloVue</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a4639c7b11c6ee1f8cef79fba241e049f2a8f635a69e16c8c28397a9aba52ef</i><br /><br />Threat actor <b>description</b>: <i>SoloVue is a cutting edge, revolutionary new software service that is now available to the wholesale distribution industry. Developed by Solo Business Systems Inc., a Costa Mesa, CA based company, SoloVue provides a managed business solution             ...</i><br />Target victim <b>website</b>: <i>www.solovue.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>David-Mills-CPA-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23039</link>
<guid>2563f41ff7c8f1b9ead213bbf8e1cb1e</guid>
<pubDate>Mon, 28 Apr 2025 17:52:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>David-Mills-CPA-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>58d80e8d3b6e6b889b4f2d8990c38856ca64df1331d2b17b7940b2b6bf15b8a2</i><br /><br />Threat actor <b>description</b>: <i>David Mills C.P.A. has over 30 years’ hands-on experience in roles of a controller, business owner and in upper management of (2) franchises. David specializes in tax planning, preparation and consulting for businesses and individuals. He graduated from the University of Illinois-Springfield and has a Certificate of Financial Planning from Kansas State University. He is also a member of the Illinois CPA Society and the American Institute of Certified Public Accountants (AICPA) as well as the National Association of Tax Professionals. David Mills CPA LLC provides the small and medium business market access to financial information in a way that you can understand and implement in your business.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kramer-Green-Zuckerman-Greene-and-Buchsbaum</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23037</link>
<guid>4c2aeb849fab47239887f8bf9c8e6278</guid>
<pubDate>Mon, 28 Apr 2025 15:51:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Kramer-Green-Zuckerman-Greene-and-Buchsbaum</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2d353bac533078245d10d2784202277155320c77de9ebbd4b934c0aeccb3c654</i><br /><br />Threat actor <b>description</b>: <i>Kramer, Green, Zuckerman, Greene & Buchsbaum, PA is a law firm in
Hollywood, FL, specializing in asset protection, estate planning
, corporate legal matters, and business transactions. 

We are going to upload more than 80 GB of essential corporate doc
uments such as: personal docs of employees and clients (lots of),
client financial data (audits, payment details, reports), corpor
ate NDA’s, court hearings records and other numerous confidential
documents.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tolerance-Masters</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23038</link>
<guid>65d21a7a6d0b2a830a6984823f17d4ce</guid>
<pubDate>Mon, 28 Apr 2025 14:15:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Tolerance-Masters</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8d1dfb6793102379cbc8cbf7f76dfc0bbc054b13129ea74e1acfe73b5db408ed</i><br /><br />Threat actor <b>description</b>: <i>Tolerance Masters company manufactures impellers and wheels in cu
stom configurations to meet the exact requirements of their clien
t specifications.

We are going to upload 18 GB of essential corporate documents suc
h as: personal information employees, a bit of customers informat
ion, financial data (audits, payment details, reports), corporate
NDA’s, confidentiality agreements etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>LaBella-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23011</link>
<guid>7ac87615974cf475233fff33102414a7</guid>
<pubDate>Mon, 28 Apr 2025 13:05:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>LaBella-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87389593fd052d7660ca2cd882c8819463161c5877f909259f252c19a527c497</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>CCHC-Healthcare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23022</link>
<guid>8f0c515e934bbf18ceaff7e9782be37e</guid>
<pubDate>Mon, 28 Apr 2025 13:01:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>CCHC-Healthcare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3330d65c45b8a9f2540168c2a6a13f44a7c5bcb3bca9c5502e4c59dbad1e5391</i><br /><br />Threat actor <b>description</b>: <i>All data will be published online on Apr.08. CCHC is a multi-specialty group practice with a strong base of primary care providers located in New Bern, NC. CCHC's mission is to promote the health of our patients by providing high quality, com            ...</i><br />Target victim <b>website</b>: <i>www.cchchealthcare.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>nccer.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23013</link>
<guid>8549c938065011dc634e597bacb611de</guid>
<pubDate>Mon, 28 Apr 2025 12:53:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>nccer.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2eb7f642067eddfcfa5686bebdb70d1b7a00d8b57dc9d3d8c87dc5404c09152a</i><br /><br />Threat actor <b>description</b>: <i>With nearly 30 years of expertise in building craft training and assessments, NCCER has added Construction Leadership to its portfolio. These online programs go beyond field experience, focusing on essential leadership skills. Offering flexib            ...</i><br />Target victim <b>website</b>: <i>www.nccer.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dermatologists-of-Birmingham</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23019</link>
<guid>0c66ecade1fe6cf8e9c92080459986ff</guid>
<pubDate>Mon, 28 Apr 2025 12:51:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Dermatologists-of-Birmingham</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>02d561e450409a34a3f07eaf8afc2bbf9399f4b3212bc1f110900cc52e791e17</i><br /><br />Threat actor <b>description</b>: <i>Our team managed to breach and encrypt Dermatologits of Birmingham's network. 
Once we have breached the network we have managed to download 141GB from there. 

What kind of data was taken: 
- patients data 
- medical data 
- employee d            ...</i><br />Target victim <b>website</b>: <i>www.dermatologistsofbirmingham.com/birmingham-dermatologist</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.latouchepediatrics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23020</link>
<guid>98050d16424bad1b20a11b80951999c3</guid>
<pubDate>Mon, 28 Apr 2025 12:47:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.latouchepediatrics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45fcad4e9fa70436cc8a5d276213583e4d9aaf773fdc143bd7b33eeba6388fdf</i><br /><br />Threat actor <b>description</b>: <i>LaTouche Pediatrics, LLC is the largest private pediatric practice in Alaska. We offer full spectrum pediatric care from birth through adolescence. As a leader in the medical communities throughout the state, we have been a training site for             ...</i><br />Target victim <b>website</b>: <i>www.latouchepediatrics.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Whitley-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23008</link>
<guid>120abfb5a563189d592cc152d803eb58</guid>
<pubDate>Mon, 28 Apr 2025 08:35:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Whitley-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a0bba00af7eb037e85931ef2857f7af486db618fa29ebd785808e1e5b255896</i><br /><br />Threat actor <b>description</b>: <i>All data from that law office (approx. 2800 clients for 10 years) will be published 5-7 MAY 2025. 
When you have been injured, there are laws that protect your rights and interests. At Whitley Law Firm in North Carolina, we have a great resp            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Minnesota-Lawyers-Mutual-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23009</link>
<guid>87b40a685b8d392c78eb59778f0ff2b5</guid>
<pubDate>Mon, 28 Apr 2025 07:01:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Minnesota-Lawyers-Mutual-Insurance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc833915ae296317e7c88aa33a59f16210d563309c6d2f965d51bfee2ac3f683</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Haas--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23004</link>
<guid>63e1a16224c2f0b2e6d3349e593be014</guid>
<pubDate>Mon, 28 Apr 2025 01:52:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Haas--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4582f935410bb2c8a6e3f960a589b14d7cb756cd7d565b924314642f0f3b8982</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>FMT-Consultants</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23003</link>
<guid>8d30d5cc8f42a400472f1b1a9ae7a1db</guid>
<pubDate>Sun, 27 Apr 2025 22:51:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>FMT-Consultants</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>984383d2df3129f49dd4bd5aeea636892de18ca20a628d767ffc6979153369cc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mantel-Machine-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23006</link>
<guid>bb5d0eba11f7e244ba7a89b5d2bc36f6</guid>
<pubDate>Sun, 27 Apr 2025 20:49:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Mantel-Machine-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bdf8f6ab4a8ad1fbed0ac78bce82bcef674127647ca1052059623490e2543773</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.mantelmachine.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crawford-Door-Sales</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22997</link>
<guid>ae4b60a20b0fe8582450c458ed35a28b</guid>
<pubDate>Sun, 27 Apr 2025 20:48:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Crawford-Door-Sales</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc41b3467515e2258111826f771f7213ff980578694bbb3bbe71127880480f5f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Scientel-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23005</link>
<guid>f45fa6602838b826f62e4e8552bda5c0</guid>
<pubDate>Sun, 27 Apr 2025 20:48:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Scientel-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>76d84f149d13c7fbe2a0647bfa38bdae5d8b8fe13c3d2edeb4622783d478b9e2</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.scientelsolutions.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.southlandscs.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22995</link>
<guid>44ae4524880502f96721515663652d04</guid>
<pubDate>Sun, 27 Apr 2025 18:35:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.southlandscs.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cca089ad61ea70d12b3eab78c3def0fa651fb7c043bd6ad56888e5c6febe6245</i><br /><br />Threat actor <b>description</b>: <i>Southlands Christian Schools is a top tier K-12th private Christian school that boasts academics that consistenly rank in the top 10% of schools in the nation.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>liftsolutionsinc.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22993</link>
<guid>69cbcac314bb900159c38306bf58441e</guid>
<pubDate>Sun, 27 Apr 2025 17:33:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>liftsolutionsinc.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79819e015d21914007f8d415335870af43326d08106b7b9639b88f527e77ccf0</i><br /><br />Threat actor <b>description</b>: <i>For over 40 years, we at Lift Solutions have prided ourselves on providing our customers with the best products and services available. For our team of highly trained and experienced material handling experts, there is no project too big or t            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Phelps-United</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22999</link>
<guid>66afde749f0cf270c25dfad35df0554b</guid>
<pubDate>Sun, 27 Apr 2025 17:10:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Phelps-United</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b48d29d7a9eb6c6676e3f46b44aa561d8bdbceaad266ad508b74fadfd9d0957</i><br /><br />Threat actor <b>description</b>: <i>Phelps United is a ecommerce accelerator, IT channel enablement platform, and marketplace agency. Phelps United corporate office is located in 4852 E La Palma Ave, Anaheim, California, 92807, United States and has 46 employees. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Conditioned-Air-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23000</link>
<guid>528bb31d2f60c13e960ca57785ba4ac5</guid>
<pubDate>Sun, 27 Apr 2025 17:09:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Conditioned-Air-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>86641fee6a92d09ba47da8bf6d21f543dd3a901d2944aa8181ea1cb830bbf4fc</i><br /><br />Threat actor <b>description</b>: <i>Conditioned Air Corporation, Inc. (founded 1962) has been providing high quality air conditioning and heating services in Bradenton, Naples, Sarasota, Fort Myers & Venice. Conditioned Air Corporation, Inc. (founded 1962) has been providing high quality air conditioning and heating services in Bradenton, Naples, Sarasota, Fort Myers & Venice.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Appalachian-Regional-Commission</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23001</link>
<guid>fff6f444c0fd08f8cca7eb254a216565</guid>
<pubDate>Sun, 27 Apr 2025 17:08:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Appalachian-Regional-Commission</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>07e08ccdc506609bedc8dd70aa3b1dedfbd823b8210d53f969fb35a4d38fd7ae</i><br /><br />Threat actor <b>description</b>: <i>Appalachian Regional Commission is an economic development agency of the federal government and 13 state governments focusing on 423 counties across the Appalachian Region. Appalachian Regional Commission corporate office is located in 1666 Connecticut Ave NW Ste 700, Washington, District of Columbia, 20009, United States and has 110 employees. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>shgcpa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22977</link>
<guid>dcce3baa3d05a6ea93ccf94e05819312</guid>
<pubDate>Fri, 25 Apr 2025 18:33:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>shgcpa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b54b1f67f8768bbc4330ce885f2d4d68456443085d25b1771e19a4aca964b2a8</i><br /><br />Threat actor <b>description</b>: <i>At Sheheen Hancock & Godwin, LLP, we believe in the value of relationships. We v...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>corporateflight.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22974</link>
<guid>2c71be4ade90cdba9da419a58e8dcc5a</guid>
<pubDate>Fri, 25 Apr 2025 17:35:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>corporateflight.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77fc5591d788411f79c0be5e6ea07b7b89953e94dc6cd832c12fb384c2650abd</i><br /><br />Threat actor <b>description</b>: <i>Corporate Flight specializes in private jet charters, offering services that pri...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Penn-Emblem-penn.local</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22979</link>
<guid>02a1926072939e93b7dd59b9427c07d3</guid>
<pubDate>Fri, 25 Apr 2025 14:14:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Penn-Emblem-penn.local</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f80212d69c21887e3ec5c5f41a40b93e8a674d14be8c8475ba7fd984614f6c7</i><br /><br />Threat actor <b>description</b>: <i>For over 100 years, Penn Emblem has been providing custom embroidered emblems and patches for our national and international customers. Our products include the highest quality in the industry. We offer: Label Tape (all types) Embroidered Emblems and Patches Ink Jet Emblems Sublimated Emblems Custom Embroidered Emblems machine embroidery patches industrial uniform patches Custom High Visibility Emblems Custom Flame Resistant Emblems Custom Appliqué Emblems</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Santa-Cruz-Properties</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22982</link>
<guid>7f9f1c8d90c069f16dc638b529ba03ba</guid>
<pubDate>Fri, 25 Apr 2025 12:45:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Santa-Cruz-Properties</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9b81be2ea8f2fdde5ede1b0264ca4c5565719460b0ff492b1323cabf7435ea22</i><br /><br />Threat actor <b>description</b>: <i>Santa Cruz Properties company emphasizes exceptional service and 
personal guidance, ensuring clients navigate the buying and selli
ng process smoothly.

We are ready to upload 15 GB of essential corporate documents suc
h as: personal information of employees, some information about c
ustomers, financial data (audits, payment details, reports), nume
rous contracts, corporate NDA’s, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cohn-Lifland-Pearlman-Herrmann-and-Knopf</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22983</link>
<guid>d3e632e0af5200fc0e75485fb6db422f</guid>
<pubDate>Fri, 25 Apr 2025 12:45:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Cohn-Lifland-Pearlman-Herrmann-and-Knopf</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d63445c1068023effb33eadd02419529e0d5cb7d864192796fc89e284d5a6534</i><br /><br />Threat actor <b>description</b>: <i>These respected guys didn't seem to have much respect for their c
lients, as a huge amount of personal information was almost unpro
tected. We took 110 GB of files where a lot of client information
can be found: passports, driver's licenses, birth/death certific
ates, correspondence, addresses, contacts and more. There is also
a lot of data about the firm in the form of financial statements
and other documents, and many of them are confidential. The most
interesting thing about this case is that these guys didn't want
to pay even with an active cyber insurance policy. We will uploa
d the files shortly.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>DaVita</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22986</link>
<guid>f98aea1a7f1f5baef69a73b9a5e5d956</guid>
<pubDate>Fri, 25 Apr 2025 11:32:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>DaVita</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>08401fa3933653646a91638fd9f61e003cb5d665926cc2a1ebe50f069e011ece</i><br /><br />Threat actor <b>description</b>: <i>DaVita Inc. provides kidney dialysis services for patients suffering from chronic kidney failure in the United States. The company operates kidney dialysis centers and provides related lab services in outpatient dialysis centers. It also offers outpatient, hospital inpatient, and home-based hemodialysis services; operates clinical laboratories that provide routine laboratory tests for dialysis and other physician-prescribed laboratory tests for ESRD patients; and management and administrative services to outpatient dialysis centers. In addition, the company offers integrated care and disease management services to patients in risk-based and other integrated care arrangements; clinical research programs; physician services; and comprehensive kidney care services. Further, it engages in the provision of acute inpatient dialysis services and related laboratory services; and transplant software business.</i><br />Target victim <b>website</b>: <i>davita.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Madison-School-District-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22985</link>
<guid>f72b5935d3c9a1dbc4dc2cb5bd078cd8</guid>
<pubDate>Fri, 25 Apr 2025 11:31:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Madison-School-District-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1bcb0dbd4986cf7e31057ffcf30e2e3f939eae4aa17d92f5ff5b8e1fb57785d</i><br /><br />Threat actor <b>description</b>: <i>Madison School District is dedicated to providing caring, innovative, and academically strong experiences for our students. Madison School District Schools is a company that employs 250to499 people and has 10Mto25M of revenue. The company is headquartered in Phoenix, Arizona</i><br />Target victim <b>website</b>: <i>madisonaz.org</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advanced-Simulation-Technology-inc.-ASTi</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22970</link>
<guid>d8f7af3c0b3c873650931eb1f1d1d1a8</guid>
<pubDate>Fri, 25 Apr 2025 06:38:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>silent</b> claims attack for <b>Advanced-Simulation-Technology-inc.-ASTi</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>14f1dabc0bf7e70600709f41dd6c7a53f068f6a1267ad0b195f6845362387715</i><br /><br />Threat actor <b>description</b>: <i>Country: United States | Revenue: 11.80M USD | Employees: 36 | Tags: </i><br />Target victim <b>website</b>: <i>asti-usa.com</i>]]></description>
<category>silent</category>
</item>
<item xmlns:dc='ns:1'>
<title>buildingmaterialspecialties.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22963</link>
<guid>712711c4792aae089713c1858fbe2f6e</guid>
<pubDate>Fri, 25 Apr 2025 01:35:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>buildingmaterialspecialties.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>41750c036c917bde7a0d89866dff481554a8cef2f09b56afc3360c2e68c877c7</i><br /><br />Threat actor <b>description</b>: <i>When time is of the essence- Building Material Specialties has a large inventory...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>friscochamber.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22964</link>
<guid>5e3873608c09c533cf44270bae01c6fe</guid>
<pubDate>Fri, 25 Apr 2025 01:35:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>friscochamber.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c42957310418b6d1f7106402706ffaf2eb18ac335de6d1b1556883a72f1a417</i><br /><br />Threat actor <b>description</b>: <i>The Frisco Chamber of Commerce is a 4-Star Accredited Chamber of Commerce that c...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>greatplainstransport.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22965</link>
<guid>b236326e0bebcea6064f88b2fe71a080</guid>
<pubDate>Fri, 25 Apr 2025 01:34:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>greatplainstransport.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dab35325d4b95c2bdcfee8eb479264ec3bd5f44d9fed1da85c8d233155da3e07</i><br /><br />Threat actor <b>description</b>: <i>Great Plains Transport specializes in temperature controlled commodities, and ou...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>pay4freight.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22966</link>
<guid>42573ea1cc52356b2fcfed8d43b6db2f</guid>
<pubDate>Fri, 25 Apr 2025 01:34:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>pay4freight.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d1ba7c4aa102add5b0c335d13a9525d854bdf6485c33bc5976684c3d79f454c</i><br /><br />Threat actor <b>description</b>: <i>Pay4Freight is a highly rated freight factoring company specializing in providin...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pacific-Metallurgical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22969</link>
<guid>e77d11d5a1d68816f2439e6bb526894b</guid>
<pubDate>Thu, 24 Apr 2025 19:01:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Pacific-Metallurgical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>515c52ea39f1aa7b229955e60ed73659f52f90abed71d84158b352c47a64b694</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Pacific Metallurgical is a manufacturing company in Kent, Washington which offers heat treating solutions. They provide several services including vacuum heat treating, brazing, aging and hardening for various industries such as aerospace, medical, and tooling. They pride themselves in using advanced technologies and maintaining the highest standards in their processes.</i><br />Target victim <b>website</b>: <i>www.pacmet.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Fortune-Society</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22968</link>
<guid>31f0b956cab7d9c07abd3155a56843f6</guid>
<pubDate>Thu, 24 Apr 2025 19:00:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>The-Fortune-Society</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd2eaf71b93a0e8689664952966cd70c6ffcec6a8bd489b65e9c059841d64b1c</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] The Fortune Society is a non-profit organization based in New York, dedicated to supporting successful reentry from prison and promoting alternatives to incarceration. They provide a range of services, including counseling, employment services, housing, education, and advocacy. They strive to reduce the impact of mass incarceration on individuals, families, and communities.</i><br />Target victim <b>website</b>: <i>fortunesociety.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>end2endtechnologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22959</link>
<guid>f4d6030a34f2d2fe887f570fb64ea8d9</guid>
<pubDate>Thu, 24 Apr 2025 17:39:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>end2endtechnologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab9accc3e8e7d42c8395d67f5ecf712ad0b28b7d87ce2b1ff6a64f871654f5d5</i><br /><br />Threat actor <b>description</b>: <i>End 2 End Technologies was founded 1999, as a low-voltage cabling company. Since...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Oversea-Casing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22961</link>
<guid>fe87868f12f0555a133f616eabd8c721</guid>
<pubDate>Thu, 24 Apr 2025 15:46:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Oversea-Casing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>85f18b2293a620417bbd5b724b10028ac28a9c3bbb969f14c5211127099eeeb2</i><br /><br />Threat actor <b>description</b>: <i>Oversea Casing Company has been operated for more than three gene
rations and enjoys a strong working partnership with Superior Far
ms, a leading purveyor of sustainably-raised American lamb, which
allows them to produce high quality consistent casings.

We are ready to upload corporate documents such as: information o
f employees and customers, financial data (audits, payment detail
s, reports), contracts, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fogelman-Management-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22960</link>
<guid>7e4a87d1535b45ecbf1bdcc74aeae875</guid>
<pubDate>Thu, 24 Apr 2025 15:46:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Fogelman-Management-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1cd583f66903cb2b9c973559bf18e06e66fed69582e2c1398f7c9453ac22b346</i><br /><br />Threat actor <b>description</b>: <i>Fogelman is a multifamily investment and property management firm
.

We are ready to upload than 12GB of essential corporate document.
The most interesting are ~4000 files filled with personal inform
ation of employees (SSN, DOB, phone, email and so on), financial 
data (audits, payment details, reports), corporate NDA’s, confide
ntial trial documents, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>arkansasprimarycare.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22953</link>
<guid>b63fa9ae0ee5487c7f993fe98ec974ad</guid>
<pubDate>Thu, 24 Apr 2025 10:50:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>arkansasprimarycare.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b9d4b2a754aebbc6fa52f42b3b1faa6f45a9e74b39ee8571b6388f60f26267e5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rayle-Electric-Membership-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22937</link>
<guid>c27216bb9c450c0c529a5d3a837dc817</guid>
<pubDate>Wed, 23 Apr 2025 19:30:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Rayle-Electric-Membership-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ebd861b053d644f7372b3ae42ed7e1cc02deb62d85f78e2f9b972d9c52a93fe0</i><br /><br />Threat actor <b>description</b>: <i>Rayle Electric Membership Corporation is a member-owned electric cooperative which provides electrical power to the rural areas ofall or parts of ten northeast Georgia counties.We are ready to upload more than 30GB of essential corporate documents such as: personal information of employees, financial data (audits, payment details, reports), corporate NDA’s, confidentialtrial documents, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>coloradopulmonary.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22946</link>
<guid>4e5faa13470ff88efde9f0ed6a1ed316</guid>
<pubDate>Wed, 23 Apr 2025 18:39:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>coloradopulmonary.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed6af115ace613ea6362931c9715e9cbd06b5845b11f37f57e701cfaf8359c9d</i><br /><br />Threat actor <b>description</b>: <i>USA - Colorado Pulmonary Intensivists</i><br />Target victim <b>website</b>: <i>coloradopulmonary.com</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Two-Kings-Casino-Resort</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22945</link>
<guid>68f077fd30f6037c4136792d9f91f54c</guid>
<pubDate>Wed, 23 Apr 2025 17:45:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Two-Kings-Casino-Resort</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>37f33fa5f3f44b14046384358b76974520e63dc334091ac6b20a402494fc8dbf</i><br /><br />Threat actor <b>description</b>: <i>Leaked ultra-detailed blueprints of a casino that plans a grand opening in 2026.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>RRS-Foodservice</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22936</link>
<guid>e79bd2741d69ea13a0b6e1b5c5a05e61</guid>
<pubDate>Wed, 23 Apr 2025 16:24:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>RRS-Foodservice</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5a96073b34abb13d824ae75e587d7b64fe7faae28125b025e0b3d90a8b510da</i><br /><br />Threat actor <b>description</b>: <i>www.rrsfoodservice.com

201 Haley Rd, Ashland, Virginia, 23005, United States

25.94 GB
Description

RRS Foodservice has all of the products you need to successfully operate your Quick Serve Restaurant, Deli, or Convenience Store. We can supply you with the best products to accommodate fast service, as well as a full line of take out supplies to keep your customers on the go. Benefits of RRS Foodservice: We can accommodate all of your menu needs, including paper supplies, chemicals, and produce We offer online ordering for your convenience In addition to your sales consultant, we have a helpful inside sales support team Free rebate tracking and reporting
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>ESP-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22940</link>
<guid>778a547f86b9926eed381d68c9cbebdd</guid>
<pubDate>Wed, 23 Apr 2025 12:34:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>silent</b> claims attack for <b>ESP-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81bf2bdb2f93fd8bffcf9d8d916e7fea6b279e4b251565ad9c13120a9b2d4830</i><br /><br />Threat actor <b>description</b>: <i>Country: United States | Revenue: 76.20M USD | Employees: 655 | Tags: Vickrey</i><br />Target victim <b>website</b>: <i>espassociates.com</i>]]></description>
<category>silent</category>
</item>
<item xmlns:dc='ns:1'>
<title>Versa-Networks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22952</link>
<guid>627b85aca59dc271fec1eff019a2558e</guid>
<pubDate>Wed, 23 Apr 2025 12:34:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>silent</b> claims attack for <b>Versa-Networks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>20c34f5d48bf8fe43e81d1342d4972793e9c07d100eecb61a37fde1a01f85540</i><br /><br />Threat actor <b>description</b>: <i>Not claimed yet </i><br />Target victim <b>website</b>: <i>versa-networks.com</i>]]></description>
<category>silent</category>
</item>
<item xmlns:dc='ns:1'>
<title>Springer--Steinberg</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22922</link>
<guid>3dd6195e97200112e1a769f118b4fa6f</guid>
<pubDate>Tue, 22 Apr 2025 21:28:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Springer--Steinberg</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b76d8b10c888634bb185d51f512434da7be2c0e0f522589a334d86bb7adc12b5</i><br /><br />Threat actor <b>description</b>: <i>363gb of confidential corporate and customer data will be released within 10 day...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Diedrich-Coffee</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22920</link>
<guid>4cce5f26b0d8be7e4bdba716c2f50259</guid>
<pubDate>Tue, 22 Apr 2025 19:29:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Diedrich-Coffee</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b3ee560b5d6f533cc86455ffbdab0f99c84b7487699ce96ea587ef67228276d3</i><br /><br />Threat actor <b>description</b>: <i>Diedrich Coffee specializes in sourcing, roasting and selling theworld's highest quality coffees. The company markets its three leading brands of specialty coffees, Diedrich Coffee, Coffee People and Gloria Jeans Coffees, through office coffee service distributors, restaurants, and specialty retailers, and via the company's web stores. We are ready to upload more than 15 GB of corporate documents such as: various files of employees and customers, financial data (audits, payment details, reports), corporate NDA’s, confidential contracts, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>NESCTC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22927</link>
<guid>91980b0a3fd0e1b6dab65d5ad3397876</guid>
<pubDate>Tue, 22 Apr 2025 19:15:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>NESCTC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9b3c23a1b69142d7982ff0a1d11f97eee97cd57dbedfd64d83e5fc517c226747</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.nesctc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Human-Bean</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22931</link>
<guid>f1069383b6b5aab8ca543a35e9c65c87</guid>
<pubDate>Tue, 22 Apr 2025 19:14:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>The-Human-Bean</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e3113d37234a29a56825ac555e51d0a8986036ea2eeee0859bef1083ce053f56</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.thehumanbean.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lantronix</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22926</link>
<guid>9352bfb0cb8ca3110212a0aa2499da39</guid>
<pubDate>Tue, 22 Apr 2025 19:12:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Lantronix</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9fe1ed047f8e4bef774b7af203c5c19633f2ffa8595e5c88f89bae1886f95818</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.lantronix.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Suburban-Carting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22930</link>
<guid>dc80df84c09ee9d090df898030eb0b46</guid>
<pubDate>Tue, 22 Apr 2025 19:09:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Suburban-Carting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>51f316fbf494826096f3320ecc8fcf3eea8eb8d2a66be0131807e9442fd52ddc</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.suburbancarting.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>All-Book-Covers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22923</link>
<guid>94944b200934137ce827029c962b3e0f</guid>
<pubDate>Tue, 22 Apr 2025 19:00:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>All-Book-Covers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6dbe6f56e3a38f1da91ab5358737fe6a2d66c4ae0d72b5d0169ae62e222c403c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>franklin-nursing-home</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22921</link>
<guid>2bda5fb0df736b39d5b12f4d9e357cbf</guid>
<pubDate>Tue, 22 Apr 2025 16:55:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>franklin-nursing-home</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd87945cfc9df33a9c61a5bc50a85ba3f5d5b1ed19d73275f1dfe8765380f163</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>RN-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22913</link>
<guid>9d5a197b365fa7a34ba672e92d784640</guid>
<pubDate>Tue, 22 Apr 2025 14:01:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>RN-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6bd9610172b6865472d143943586222efaa44ad0c03368c2cf4085430247202d</i><br /><br />Threat actor <b>description</b>: <i>R & M Manufacturing Inc is a company that operates in the Furniture industry. It...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>parrishleasing.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22914</link>
<guid>a42842566668bba588b678752f1cceb2</guid>
<pubDate>Tue, 22 Apr 2025 14:01:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>parrishleasing.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1d74f91c59a1ce2a0f8ebec7d1feeb850af26fbb8999344a1ce095b5d7d3908</i><br /><br />Threat actor <b>description</b>: <i>The files will be published on 1/05/2025.We are a third-generation family owned and operated business, founded in 1968 by Don Parrish Sr. We currently have two locations in Fort Wayne, IN, and specialize in:
    Outstanding customer service.            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Richmond-PA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22900</link>
<guid>a28194c69e15903af56413e0eb219852</guid>
<pubDate>Mon, 21 Apr 2025 17:29:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Richmond-PA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a31e45def18873403d7b759d247e357d3329374da941734aac8c9f7a5e2428d</i><br /><br />Threat actor <b>description</b>: <i>All data (around 300Gb) of Richmond Company CPA will be published fully on 28 Arpil, if Richomnd CPA refuse to pay ransom. We are a full-service Accounting firm licensed in WV. We offer a broad range of services for business owners, executive            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>MASHBURN-CONSTRUCTION</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22904</link>
<guid>63737972b84c4b64087649e2b45eba01</guid>
<pubDate>Mon, 21 Apr 2025 15:09:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>MASHBURN-CONSTRUCTION</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3b96634282d37ca2b6f54190ca512f09f27807fa1bef1eb2fcc551e242e6b48d</i><br /><br />Threat actor <b>description</b>: <i>Mashburn Construction is a full-service construction company prov
iding construction management, design-build, preconstruction and 
general contracting services. 

We are ready to upload more than 162 GB of essential corporate do
cuments such as: personal documents of employees, financial data 
(audits, payment details, reports), projects, a lot of confidenti
al agreements, corporate NDA’s, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-law-firm-of-Rochelle-McCullough-L.L.P</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22905</link>
<guid>cd9840da1d1e99d7a4455acf36785fc6</guid>
<pubDate>Mon, 21 Apr 2025 14:44:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-law-firm-of-Rochelle-McCullough-L.L.P</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1990bacfaf1cc982363483d57daeb0cf6e069fd0a4e6f656a0679f9aa9bc39b4</i><br /><br />Threat actor <b>description</b>: <i>The law firm of Rochelle McCullough, L.L.P. primarily focuses its
practice on: matters involving corporate bankruptcy and individu
als with substantial business-related obligations; assistance and
counsel to financially distressed business entities and individu
als with significant business-related responsibilities; commercia
l and individual Chapter 11 reorganizations and creditor rights.

We are ready to upload 21 GB of essential corporate documents suc
h as: personal information of employees and customers, financial 
data of the firm and its clients (audits, payment details, report
s), confidential agreements, trial documents, corporate NDA’s, et
c.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>TrussWorks-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22903</link>
<guid>9dcb6feace6c0d8d79ca29db1bcc5dd2</guid>
<pubDate>Mon, 21 Apr 2025 14:44:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>TrussWorks-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cf55af5bfcda7fc88c2a97fae0d6de2e92488d2222c6ed4f560fb7320b8d0445</i><br /><br />Threat actor <b>description</b>: <i>TWI can engineer, design, fabricate, machine, paint, and pre-asse
mble all aspects of your project in house, which gives us complet
e control over quality, schedule, and budget. 

We are ready to upload more than 13 GB of essential corporate doc
uments such as: contact numbers and e-mail addresses of employees
and customers, SSNs, phones, addresses, driver's licenses and so
on. You will also find their and their clients financial data (a
udits, payment details, reports), corporate NDA’s, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Michelson-Organization</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22895</link>
<guid>3111b2ff56ac8be7960156e3f116821b</guid>
<pubDate>Mon, 21 Apr 2025 03:29:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-Michelson-Organization</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a14f22fa2b0545ea70192f12fc83474deca723addc3909b67fc43dd273c5268</i><br /><br />Threat actor <b>description</b>: <i>Michelson Commercial Realty and Development L.L.C. and Knapp Development have managed the development of Sumner Park since its inception. The development team has extensive experience in developing real estate on a national basis. Since 1927,            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Za.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22884</link>
<guid>7d65939039592cca91c51ef731f768e4</guid>
<pubDate>Sat, 19 Apr 2025 01:46:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>flocker</b> claims attack for <b>Za.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ae5858c55104d5633050375abbeb9a87d42dc6500395d04df2ce367bd0eeaa60</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>flocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>dhsmithco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22872</link>
<guid>fc7cfd2933b72661ba56cf39e0b3eb9d</guid>
<pubDate>Fri, 18 Apr 2025 17:31:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>dhsmithco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>655edeb0198864c51ce7d3b022b2537380a9d503c01df2b966dc006d7fbb4dd5</i><br /><br />Threat actor <b>description</b>: <i>dhsmithco.com is a company that operates in the Commercial & Residential Constru...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Tech-Interactive</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22875</link>
<guid>fcd91dd50d34c125ee7b1b5efe659b90</guid>
<pubDate>Fri, 18 Apr 2025 16:51:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>moneymessage</b> claims attack for <b>The-Tech-Interactive</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c54d0d9505bd415fd00360c30efc361cdea32c500d3dc3e6ffe56114957bb20</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>moneymessage</category>
</item>
<item xmlns:dc='ns:1'>
<title>Independent-Title-Agency-LLC-ITA-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22881</link>
<guid>282da3b8ccda1203a2b8d6668f014365</guid>
<pubDate>Fri, 18 Apr 2025 16:49:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>skira</b> claims attack for <b>Independent-Title-Agency-LLC-ITA-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>141095c38b84625aa1da4983463d970926bb825fe719228123169f6fbf9a0dee</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] ITA (Independent Title Agency, LLC) is a US-based company specialized in providing comprehensive title insurance services. They ensure a property title is legitimate, protecting potential homebuyers and mortgage lenders from financial loss due to title defects such as fraud or errors. The agency may also facilitate closing of real estate transactions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>skira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Orl.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22864</link>
<guid>6016c49ed12f15bad85a5d3156de5f11</guid>
<pubDate>Fri, 18 Apr 2025 15:51:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Orl.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd0a708fc578a3f6d71af3513c0eb5cd751f882eba4c395a411d723c9f625d71</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22866</link>
<guid>f8af0bab23e8ab96d873acc7e40eec1f</guid>
<pubDate>Fri, 18 Apr 2025 15:51:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Pc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a3f4c366eb8c4cd8c188748ed0e8b302d32d2ecb4bdc4e2e8ea11bbb1ae2e77</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Iris-ID</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22867</link>
<guid>84355995e19b7637d42b96f220b47c92</guid>
<pubDate>Fri, 18 Apr 2025 15:51:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Iris-ID</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46851decc3aaec987f1c3260e0866c4ad13f99785353023a2e149ef3012b04c5</i><br /><br />Threat actor <b>description</b>: <i>Iris ID Systems develops, markets, sells, and distributes iris recognition technology products worldwide. The company also offers access control, time and atten...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Grove</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22869</link>
<guid>55670a220c71ceab2e42e57a56c26ae8</guid>
<pubDate>Fri, 18 Apr 2025 15:51:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>City-of-Grove</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b441e36e828bf93b2fbd73a90fda26a5d70ffd4508378e96c10e6d988df29834</i><br /><br />Threat actor <b>description</b>: <i>City of Grove is a company that operates in the Government industry. It employs 10to19 people and has 500Kto1M of revenue. The company is headquartered in Grove...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hubbard-McIlwain-Brakefield-P.C.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22878</link>
<guid>9b2a58460f62362e00c904e25d784e47</guid>
<pubDate>Fri, 18 Apr 2025 14:16:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Hubbard-McIlwain-Brakefield-P.C.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab30c8d4f45a77b81e9398599eddf2546a8eeaab68fd624ecbf35d2c1e51a9d5</i><br /><br />Threat actor <b>description</b>: <i>Hubbard, McIlwain, & Brakefield, P.C. is one of the most well-res
pected and successful firms in Alabama.

We are ready to upload more than 4 GB of data. Not much but inter
esting: trial documents, a lot of client data such as financials,
personal docs, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hayward-Quartz-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22874</link>
<guid>e5060c47839ae5b62a327be0310f7981</guid>
<pubDate>Fri, 18 Apr 2025 11:47:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Hayward-Quartz-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df0640d9da3aa7a28ad1c5621a5cc9507debfd5e36f78552ce828b0013e0919f</i><br /><br />Threat actor <b>description</b>: <i>Hayward Quartz Technology started in Hayward California with a si
mple goal of supporting quartz fabricators with high quality mach
ined quartz products. 

We are ready to upload more than 50 GB of corporate documents suc
h as: employee details, financial data, corporate NDA, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>1sthealthinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22856</link>
<guid>34cd5b26e973507b09fb7d4216b75a9e</guid>
<pubDate>Fri, 18 Apr 2025 00:32:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>1sthealthinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa2a2c33bb604354f46b803cba62de83363476e0fd70d37ce45b6c8666cdbe45</i><br /><br />Threat actor <b>description</b>: <i>1st Health Inc provides world-class care to individuals involved in automobile accidents. We provide prompt, professional medical care, from X-Rays and massage to therapeutic modalities. To make your life easier after an accident, we'll even             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wilmington-Personal-Injury-Lawyer---DPLAW</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22859</link>
<guid>8c6609017eb196817ebf7bb4af7e52b0</guid>
<pubDate>Thu, 17 Apr 2025 23:42:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Wilmington-Personal-Injury-Lawyer---DPLAW</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dfc1b4e67849aeb9d4f130a4b87251fe342712f248989769b1284813a50c39e3</i><br /><br />Threat actor <b>description</b>: <i>Wilmington Personal Injury Lawyer - DPLAW(US)</i><br />Target victim <b>website</b>: <i>www.dplaw.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Compliance-Consulting-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22858</link>
<guid>6da34b3a75a27bbe3b81721aa110647b</guid>
<pubDate>Thu, 17 Apr 2025 23:42:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Compliance-Consulting-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>beb996e99297351f131fcc34c8151dff6f754e74b0fdf46a0d911f3f3a43bd20</i><br /><br />Threat actor <b>description</b>: <i>Compliance Consulting Group (US)</i><br />Target victim <b>website</b>: <i>www.compliancecg.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mid-America-POOL-RENOVATION-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22857</link>
<guid>a74e18755ac9197a540cecc5b0256935</guid>
<pubDate>Thu, 17 Apr 2025 23:41:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Mid-America-POOL-RENOVATION-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>188d6b41c796c63affd4a910cf3baf458a5335255ccb8749787435e9699e45f1</i><br /><br />Threat actor <b>description</b>: <i>Mid-America POOL RENOVATION, Inc (US)</i><br />Target victim <b>website</b>: <i>poolrenovation.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sally-B-Gold</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22855</link>
<guid>b94909c45ed96a5a5c25378254116b57</guid>
<pubDate>Thu, 17 Apr 2025 23:31:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Sally-B-Gold</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d935b983bfdd63bf0666a10863d7efb28811d410a3b63030023a4a31d1e3a97e</i><br /><br />Threat actor <b>description</b>: <i>Law Offices of Sally B. Gold, LLC is a law firm based in downtown Baltimore, Mar...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>universalwindow.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22850</link>
<guid>fc1e3dffd084c769d4484fea849fa704</guid>
<pubDate>Thu, 17 Apr 2025 12:31:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>universalwindow.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e084d381dd71c511aebbffb9512d0638ce0021fb3addf8d1f61ae1dd146ae4b0</i><br /><br />Threat actor <b>description</b>: <i>Universal Window and Door, LLC engages in the design, manufacture, and supply of custom window solutions for historic restoration and new commercial construction projects. The company offers steel replica, historic, projected/casement, double            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>bertie.k12.nc.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22843</link>
<guid>cc2933d7ced9d1be040d2167ebaf0540</guid>
<pubDate>Thu, 17 Apr 2025 11:32:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>bertie.k12.nc.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e47c2b843060cddec9832ea64ef6ff8d87b7688de97a6b41d17c4a1e234d09a8</i><br /><br />Threat actor <b>description</b>: <i>Bertie County Public Schools is committed to ensuring that every child in our community receives the best possible education. We are dedicated to nurturing and supporting our students from Pre-K to 12th grade, providing them with the resource            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>yankeetrails.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22844</link>
<guid>ae6a757b965961ebbec156a82c5c9f40</guid>
<pubDate>Thu, 17 Apr 2025 11:32:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>yankeetrails.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>026e198bb4eb1871f56c3ab7e660fb32da9db705ee60cb9940f69e1c61792ee6</i><br /><br />Threat actor <b>description</b>: <i>In 1957, Yankee Trails opened its doors with the goal of providing safe, affordable motor coach transportation to patrons in and around Upstate New York. Shuttle service between Albany and Vermont put the company on the map and continues to o            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Schultz-Industries-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22846</link>
<guid>49f925ccf67d449d8ca3ad8b5b8fea76</guid>
<pubDate>Thu, 17 Apr 2025 10:32:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Schultz-Industries-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7341cc5eeaf58af2b7da07d609d23aacd58f04d24552e4edb1cb77e68a40fe01</i><br /><br />Threat actor <b>description</b>: <i>Site: schultzindustries.com
														Industry: Landscape maintenance and installation company
														GEO: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kaye-Lifestyle-Homes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22841</link>
<guid>5221291cf666b52f47a3f60d8fdc3025</guid>
<pubDate>Thu, 17 Apr 2025 09:34:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Kaye-Lifestyle-Homes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f48e03514b6a24e8030d1d603ae63c145474e46fee5688810d8d0e6d5ae6311</i><br /><br />Threat actor <b>description</b>: <i>Site: kayelifestylehomes.com
														Industry: Commercial & Residential Construction
														GEO: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.nelson.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22820</link>
<guid>69a23c56e38a32ba6bd726d47e722e9f</guid>
<pubDate>Wed, 16 Apr 2025 20:30:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.nelson.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9bea81531d55a5ceac13d9f8b5ae17a9ff8159f1915a29e709ec839c7478ef7f</i><br /><br />Threat actor <b>description</b>: <i>Data from Nelson University contains thousands of personal employee and students records. All data will be published fully on 24 April 2024. If management of University will not pay ransom .Nelson is a publisher of educational products. They             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>jackpotjunction.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22814</link>
<guid>946925ef4c997f8bf8e08661f5161452</guid>
<pubDate>Wed, 16 Apr 2025 19:31:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>jackpotjunction.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9d6fee24b0cf5c74a7ff4b07931ce7d53710f7815309f386ccab6ce592dbe528</i><br /><br />Threat actor <b>description</b>: <i>Cash in on big wins this tax season! Every hour from 5 - 9 pm, one lucky winner will snag $1,040 in CASH or Free Play! Earn just 25 points, print your voucher at a kiosk, and drop it in the drawing barrel for your shot at a hefty payout!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Feldman--Lopez</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22815</link>
<guid>d33c10c1a53c1e860a631c00f02d748a</guid>
<pubDate>Wed, 16 Apr 2025 19:30:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Feldman--Lopez</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa4c769ef249042634fc38b3e6865d11f6085b71edd8ba57c897ba79b5bf0361</i><br /><br />Threat actor <b>description</b>: <i>Feldman & Lopez, P.A. is a boutique law firm located in the heart of South Flori...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hyalogic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22816</link>
<guid>e22ce4d908a59a1903c9c815ef4bfb03</guid>
<pubDate>Wed, 16 Apr 2025 19:30:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Hyalogic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4dbf51c98a02e54f575c3f88bc8df6e767c335c68def469453b409c498fd281d</i><br /><br />Threat actor <b>description</b>: <i>Hyalogic, the leader in premium high molecular weight hyaluronic acid, offers jo...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Red-Chamber</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22827</link>
<guid>37aa66e8794da1302fecd980928e950a</guid>
<pubDate>Wed, 16 Apr 2025 18:36:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Red-Chamber</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>16e339561a03895b015fc002e829720714bfd05d4ec746668599fd9aa92a3cd1</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.redchamber.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Seneca-Gaming--Entertainment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22812</link>
<guid>8bf3f860fa23e2eb4345c900d1b2e22f</guid>
<pubDate>Wed, 16 Apr 2025 17:31:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>Seneca-Gaming--Entertainment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36c9c566cb59ecc9fbd74b51879d609312b895afe693ab988be69c00ecefc4bc</i><br /><br />Threat actor <b>description</b>: <i>The corporation operates Class III casino gaming properties in Western New York. Seneca Gaming & Entertainment focuses on providing a variety of gaming and entertainment experiences at its three locations: Irving, Salamanca, and Oil Spring.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dale-Partners-Architects</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22821</link>
<guid>778d63d69b0812d7d961118992c21da0</guid>
<pubDate>Wed, 16 Apr 2025 16:13:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Dale-Partners-Architects</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc7c7fc20679dd487241a23506d4780e2c578a701da01e3785488e08e6414096</i><br /><br />Threat actor <b>description</b>: <i>Dale | Bailey, an Association is a joint venture of Bailey Archit
ecture Education, P.A.and Dale Partners Architects P.A. The assoc
iation was formed in August 2008 to create a firm with unsurpasse
d experience in educational facility planning, design and constru
ction.

We are ready to upload over 148 GB of essential corporate documen
ts such as: contact numbers and e-mail addresses of employees and
partners, employee personal files, detailed financial data (audi
ts, payment details, reports), corporate NDA’s, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>McElwee-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22807</link>
<guid>e1bad13934791680a1d90abb4abb26e2</guid>
<pubDate>Wed, 16 Apr 2025 12:31:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>McElwee-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>01e15723249efceeb188d457f9e14c5444ecd00ba76b10e7bea6fc5b7701cc42</i><br /><br />Threat actor <b>description</b>: <i>McElwee Firm PLLC is a company that operates in the Law Firms & Legal Services i...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pryor-Morrow</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22809</link>
<guid>04f82a7b2f5afd90b0e0672f7cbbf2da</guid>
<pubDate>Wed, 16 Apr 2025 08:25:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Pryor-Morrow</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7b2d9ac7ec12c1338aff761a933ba6ac77ea18d29006aa014a5071580257793</i><br /><br />Threat actor <b>description</b>: <i>Pryor Morrow is a firm specializing in architecture, engineering, and interior design, focused on serving schools, governments, and recreational facilities. With a commitment to building strong relationships, the company prioritizes client needs and aims to create impactful community spaces that enhance people's lives. Their experienced team, boasting over 200 years of combined experience, strives to deliver exceptional results while mentoring the next generation of designers. By designing innovative structures, they aim to leave a lasting legacy for future generations.</i><br />Target victim <b>website</b>: <i>pryor-morrow.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pratt-Homes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22810</link>
<guid>34ce7c7c929def87490d7326d2a2b70f</guid>
<pubDate>Wed, 16 Apr 2025 08:24:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Pratt-Homes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>996bc8443dac0a86f1dd5287be21077213b60c1a0aa2485db437b38240599d59</i><br /><br />Threat actor <b>description</b>: <i>Check out the videos below to learn more about our home selection, design, and building processes. Our company has always been a family affair ever since Uncle Doug moved into the first official Pratt Home in Scandia in 1973. Each newly married and with student loans to pay off, brothers Len and Lowell banded together, determined to create a legacy. They hired relatives and school friends as their business grew through the first start-up years. Now, nearly 1,000 families have chosen to make their dream homes with us, and we feel a deep sense of pride knowing that each home was built to our high standards and with our philosophy of quality construction and customer satisfaction. In 1976, the Pratts began the development side of their business with five homes in Forest Lake. Three years later, they commenced with their first large-scale project: Birch Lake Woods, building over 60 single family homes and 128 multiple condo units in White Bear Lake.</i><br />Target victim <b>website</b>: <i>pratthomes.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Setpoint-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22811</link>
<guid>bbf94d74de13fcaf245901d4a69d129c</guid>
<pubDate>Wed, 16 Apr 2025 08:22:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Setpoint-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b112eb9c260252e7b782dc160962eca4f1536806c7d6b23072c983e1151491c</i><br /><br />Threat actor <b>description</b>: <i>Setpoint Systems is a lean automation integration firm providing engineering, design, build, and controls experts for turn key custom automated solutions using the Toyota Production System (TPS) methodology. Since 1992 Setpoint has designed, manufactured, and marketed automated manufacturing equipment to increase productivity and quality for companies in a variety of industries. Setpoint has developed a methodology and system that mitigates customers risk and maximizes the customers return on investment.</i><br />Target victim <b>website</b>: <i>www.setpointsystems.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>a-1freeman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22800</link>
<guid>d209802512dcc915ce919fd10a63ce62</guid>
<pubDate>Tue, 15 Apr 2025 23:34:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>a-1freeman</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3b3a9eb0e06756e0dd48f532701c9897ae4d53724262e22ba181e661b0d123e4</i><br /><br />Threat actor <b>description</b>: <i>A company is only as strong as its roots, and A-1 Freeman Moving Group's roots are firmly planted in a culture of honesty, integrity, and hard work. In 1974, Jim Freeman founded A-1 Freeman Moving Group in Oklahoma City, OK on a belief that h            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Astra-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22801</link>
<guid>2362184faf3bec25af1f7e04eceb6388</guid>
<pubDate>Tue, 15 Apr 2025 22:32:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Astra-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>54132a54e40455022cd9c445600140349d220a05a28216211147b2c28f80f1cd</i><br /><br />Threat actor <b>description</b>: <i>Astra Products of Ohio is a supplier to the window covering industry.  We do not...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lake-HVAC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22802</link>
<guid>f88fd559aa8b904a69f005519dbf55dc</guid>
<pubDate>Tue, 15 Apr 2025 22:32:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Lake-HVAC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f22d448193d9cf65caaf17dc469c703e5cbfcb40ca9aec28ceb153588ca4fc8</i><br /><br />Threat actor <b>description</b>: <i>Lake HVAC was founded in 1975. For more than 40 years, Lake HVAC has built and m...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.clubcar.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22794</link>
<guid>f2f1b76be94a0f77093068ba5bf54106</guid>
<pubDate>Tue, 15 Apr 2025 20:31:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.clubcar.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9adfe22e1487630faf293758b1ee050dee247e43f27d23bc3650a03aed6fe3af</i><br /><br />Threat actor <b>description</b>: <i>Club Car boasts a 60+ year history of industry-leading innovation and design, initially focused on golf cars and then expanding to commercial utility vehicles and personal-use transportation.

Every detail of design, fabrication and assembl            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>nevadareadymix.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22791</link>
<guid>6b7e80fb125280eae868d5bd1a9e441d</guid>
<pubDate>Tue, 15 Apr 2025 19:32:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>nevadareadymix.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0d9ce008e761d06814025d9229ddd2983f7e29bc16acd0f5b90cc679386c4ca9</i><br /><br />Threat actor <b>description</b>: <i>Nevada Ready Mix was founded in 1960. The company offers concrete for residentia...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>spscompanies.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22793</link>
<guid>e3b9e77152a2095d72521d1898764e2d</guid>
<pubDate>Tue, 15 Apr 2025 19:32:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>spscompanies.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81bcf9da13e842a803d3902fe1cb1ec2588fe96d72d64b5cf01fb65cca729011</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1951 and headquartered in St Louis Park, Minnesota, SPS Companies is ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>iescomm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22799</link>
<guid>cdc65480cfdc7050e405953f036e4a15</guid>
<pubDate>Tue, 15 Apr 2025 16:55:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>iescomm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a64d10781b8ce51add8367d11d02d520a48e623e6e3fbaee9b822d76a801a641</i><br /><br />Threat actor <b>description</b>: <i>904.6 Million | Commercial & Residential Construction
IES Communications, LLC (Integrated Electrical Services) We are the national leading provider of communications technology, systems, and services. IES Communications, LLC; The right team to get the job done</i><br />Target victim <b>website</b>: <i>www.zoominfo.com/c/ies-communications/1147732740</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>King-Industries-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22797</link>
<guid>6cbe986b041b57e3a1b492f5df823aff</guid>
<pubDate>Tue, 15 Apr 2025 13:47:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>King-Industries-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57c321343d31ddf54c3c6303b6736fbd3c98e61af583b43e25fda03c81ccc3df</i><br /><br />Threat actor <b>description</b>: <i>King Industries, Inc. designs, manufactures, and distributes addi
tives for small to large companies throughout the world who make 
their own branded products we all know and use like engine oils, 
greases, hydraulic oils, paints, coatings, and rubber goods.

We are ready to upload more than 260 GB of essential corporate do
cuments such as: corporate NDA’s, passport scans, medical documen
ts, contact numbers and e-mail addresses of employees and custome
rs, financial data (audits, payment details, reports), etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>PEA-BRIONES-MCDANIEL--CO.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22798</link>
<guid>0d7a39e44fef86b3d8aec172f109bdb1</guid>
<pubDate>Tue, 15 Apr 2025 13:47:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>PEA-BRIONES-MCDANIEL--CO.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ffd65aedc58e14b47bed70a6bb0ad675fafa500e6ea2ae16cc34a331b1088f8</i><br /><br />Threat actor <b>description</b>: <i>PEÑA BRIONES MCDANIEL & CO. offers a wide range of accounting, ta
x, assurance, and consulting services across Texas and New Mexico
. Their clientele includes individuals, non-profits, governments,
financial institutions, and businesses from various industries. 

We are ready to upload more than 34 GB of essential corporate doc
uments such as: marriage licenses, corporate licenses, agreements
and contracts, personal passport scans, driver licenses, contact
numbers and e-mail addresses of employees and customers, financi
al data (audits, payment details, reports), etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Inductors-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22790</link>
<guid>cc719b12b8e59374f0e46577533f22fb</guid>
<pubDate>Tue, 15 Apr 2025 12:17:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Inductors-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b5819492649a2f33d8e0e36c6cbada6aa8b618ce3cf01d9e5a0aef60999bf4d</i><br /><br />Threat actor <b>description</b>: <i>Inductors Inc. is the premier franchised distributor of inductive
components specializing in power and RF products. 

We are ready to upload more than 6 GB of essential corporate docu
ments such as: corporate NDA’s, corporate licenses, agreements an
d contracts, financial data (audits, payment details, reports), i
nsurance documents, etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>trocaire.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22788</link>
<guid>42d286c8e91f0a431127fd942c40f0fe</guid>
<pubDate>Tue, 15 Apr 2025 09:33:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>trocaire.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>07f2cf4f60d907b94239ca3a5db607e609e1a0bc6654a1bc0343d2cc1ff2b658</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1958 in the Buffalo, NY by the Sisters of Mercy, Trocaire College is a private, career-oriented Catholic college that strives to empower students toward personal enrichment, dignity and self-worth through education. A career-oriented institution, Trocaire offers bachelor's degrees, associate degrees and certificate and workforce development programs in healthcare, business, hospitality and technology. Recognizing the individual needs of a diverse student body, Trocaire College provides life learning and development within a community-based environment, preparing students for service in the universal community. ===> Phone Number:  (716) 826-1200 Revenue: $24.6 Million Industry: Education Employees: 217 Data: 310gb </i><br />Target victim <b>website</b>: <i>trocaire.edu</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Oregon-Department-of-Environmental-Quality</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22789</link>
<guid>44f2e2502a583effcea0a0fa61203035</guid>
<pubDate>Tue, 15 Apr 2025 08:45:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Oregon-Department-of-Environmental-Quality</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0bdf6ec6966d64b666a2e751e50c50134995c1d50e329056686caad58201a346</i><br /><br />Threat actor <b>description</b>: <i>Oregon Department of Environmental Quality They think their data hasn't been stolen. They're sorely mistaken.Over 2.5 terabytes of unique data. (SQL, employee data and more)We are waiting for your suggestions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pawnee-Heights-Unified-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22774</link>
<guid>b42a80c01d9b3bb5bb385d4fba81a0c5</guid>
<pubDate>Tue, 15 Apr 2025 01:07:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Pawnee-Heights-Unified-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3078a8d75f891985d773bf7c1ae5018e684f4a14189dbf07bd5ab3d6df1b5653</i><br /><br />Threat actor <b>description</b>: <i>Pawnee Heights Unified School District ( founded 1949 ) a school district located in Rozel, Kansas. It provides academic services from elementary and secondary level. Pawnee Heights Unified School District corporate office is located in 100 Grand, Rozel, Kansas, 67574, United States and has 129 employees. The total amount of data leakage is 498.10 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cortez-Resources</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22775</link>
<guid>5067cd967516f7ee90d0e763afc36f27</guid>
<pubDate>Mon, 14 Apr 2025 22:45:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Cortez-Resources</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f4fc8a22c61f225ad2d2e6009d0819da4da3130656ff8a56b03ddcfba1aee011</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>NL-Olson--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22778</link>
<guid>12fb22dc8c218ee27d53d2d42bfc1ffe</guid>
<pubDate>Mon, 14 Apr 2025 21:23:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>NL-Olson--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1876018c87a106892621629a30837f1375bbb261b23c013276287ccdc11a3fb</i><br /><br />Threat actor <b>description</b>: <i>Company has 24 hours to contact us .

N.L. Olson & Associates maintains at all times, $1,000,000 E & O insurance and $1,000,000 general liability insurance. Careful consideration must be given to the selection of a firm to perform design an            ...</i><br />Target victim <b>website</b>: <i>lolson.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Waller</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22786</link>
<guid>16eeeb491080ff779eefceb3565812db</guid>
<pubDate>Mon, 14 Apr 2025 21:19:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Waller</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b26add55fca7f7edf7d2402c4d4b925d9948f2d4801b8444f25e926e49a116f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.wallercorporation.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Miller-Boskus-Lack-Architects</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22776</link>
<guid>ce3fe4cab8dd692261dbed5dd38cd056</guid>
<pubDate>Mon, 14 Apr 2025 21:17:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Miller-Boskus-Lack-Architects</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1cc8ef2b10582bd5ef77da05f8185b88e636bb4dc9ee444717cdaaa664b66107</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.mbl-arch.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Merri-Makers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22785</link>
<guid>c1eccdf067b52bfcb30436ce7f6f3c9f</guid>
<pubDate>Mon, 14 Apr 2025 21:13:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Merri-Makers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9fdc78e907346c91b4b97f8bd9605478b7949573d8e3d1e07e97e96a25e3e0f0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.merrimakers.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>OBrien--Ryan</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22784</link>
<guid>21b49d9441391d620b8ececd6a402dc7</guid>
<pubDate>Mon, 14 Apr 2025 21:11:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>OBrien--Ryan</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6808e1c24c4d7d08084165185aed372a266fad24993a886f899f74eb4b4753d7</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.obrlaw.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Voigt-Abernathy-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22783</link>
<guid>f2d35b2542b90a729646e3503a790669</guid>
<pubDate>Mon, 14 Apr 2025 21:10:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Voigt-Abernathy-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b659fa1af34a63a2f6d4f7a346ba35e040e7aff611b49707922d95a06e0b3ac8</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.voigtab.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>James--Sons-Fine-Jewelers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22782</link>
<guid>ed4059c872fc39292f0049516c670fc3</guid>
<pubDate>Mon, 14 Apr 2025 21:07:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>James--Sons-Fine-Jewelers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7a70a5a11d8036147fe658c99b5f9ca8bac52b572e5e6777844a6f8f465f1aa</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.jamesandsons.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Comport-Technology-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22773</link>
<guid>1f75943068ed444fb245bf2a6a291c0c</guid>
<pubDate>Mon, 14 Apr 2025 20:44:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Comport-Technology-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>127fec5d69cef8cac94e12479eab08768905d73bf60f879773e128312476dc4a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Caputo</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22781</link>
<guid>334d3bd3e5a6b1b08ef6cda3ab7243c9</guid>
<pubDate>Mon, 14 Apr 2025 17:17:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Caputo</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c86b6d77f0fa2d894aeabe2487ea0a18d25b0ef073d9769a69133a248400aab</i><br /><br />Threat actor <b>description</b>: <i>The firm assists businesses in small business accounting, tax pre
paration, strategic business planning, part-time Chief Financial 
Officer Services, and assistance in loan proposal preparation to 
banks among others.

We are ready to upload more than 20 GB of essential corporate doc
uments such as: corporate NDA’s, personal SSN’s, internal corpora
te correspondence, contact numbers and e-mail addresses of employ
ees and customers, driver licenses, corporate licenses, agreement
s and contracts, financial data (audits, payment details, reports
), etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Orthopaedic-Specialists-of-Connecticut</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22769</link>
<guid>5ac08e3fa749b84b33a2b89b3ea34359</guid>
<pubDate>Mon, 14 Apr 2025 14:46:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Orthopaedic-Specialists-of-Connecticut</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a5f67617d8bb9beced76ab1be5375a4a3433117bed925a2850e5908bab65dda</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Oklahoma-Steel--Wire</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22771</link>
<guid>93340b9f07438b9d11154ca439351b16</guid>
<pubDate>Mon, 14 Apr 2025 11:52:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Oklahoma-Steel--Wire</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b1ad6c6f3d09a62fe14cbf65f16ad04befbb93f6cd3b10e4ea2648a1c7ab452</i><br /><br />Threat actor <b>description</b>: <i>Oklahoma Steel & Wire Co Inc. offers a complete line in both agri
cultural and industrial wire products.

We are ready to upload more than 129 GB of essential corporate do
cuments such as: corporate licenses, agreements and contracts, co
ntact numbers and e-mail addresses of employees and customers, fi
nancial data (audits, payment details, reports), etc.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>MENTAL-HEALTH</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22767</link>
<guid>cba8e1ca4c1c625ac80696ae492d69a0</guid>
<pubDate>Mon, 14 Apr 2025 08:48:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>MENTAL-HEALTH</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe10a00863b76779468855f093a2c8d6d3017c1b4c38114d45206ef15f83e9a9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>CALTON.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22761</link>
<guid>d264b72ca33f79489e025913eadcdc3a</guid>
<pubDate>Sun, 13 Apr 2025 20:53:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CALTON.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>deef9b97308a9ac4192c41bc63722ce72c799d17fb48e27db4383832be3578d4</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] N/A</i><br />Target victim <b>website</b>: <i>CALTON.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>InterLOGIC-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22746</link>
<guid>0178653660403a821a543d63efe814ba</guid>
<pubDate>Sun, 13 Apr 2025 20:35:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>InterLOGIC-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a807b51f872c8d555dae648455a4106f9844d8ab97eeba4d14de3b54d0c4fc7</i><br /><br />Threat actor <b>description</b>: <i>InterLOGIC Inc(US)</i><br />Target victim <b>website</b>: <i>www.interlogicinc.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>intelliloan.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22744</link>
<guid>5ebd5ccc464411ffe414dd5729c9c835</guid>
<pubDate>Sun, 13 Apr 2025 20:31:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>intelliloan.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad95fde70836fc100a148975e36483136ae892c629edb51a633c88323c73f14f</i><br /><br />Threat actor <b>description</b>: <i>Experience the Intelliloan difference! Get expert guidance on home loans, refinancing, and mortgage solutions. Learn how our innovative approach and dedicated team can help you achieve your financial goals. Announcements. Login. Make a payment. 833 9...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Condista</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22749</link>
<guid>eb698350c502ff82503875dba13f5f88</guid>
<pubDate>Sun, 13 Apr 2025 20:28:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Condista</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b309df0a6150a24481eb6456057c65521260a397840f5b055739d4ba8f0eb44b</i><br /><br />Threat actor <b>description</b>: <i>Condista specializes in Spanish language pay TV and caters to the U.S. Hispanic and Latin American markets. They offer a diverse portfolio that includes traditional TV channels, fast channels, SVOD platforms, and extensive ad sales services aimed at maximizing ROI. The company represents nearly 30 TV stations from Latin America and Europe, targeting the expanding Hispanic community in the U.S. Additionally, Condista provides media services through Condista Labs, supporting global content providers to enhance their distribution.</i><br />Target victim <b>website</b>: <i>www.condista.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Precision-Textiles</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22752</link>
<guid>68b7407a2379f6a314b9c0730f1864d5</guid>
<pubDate>Sun, 13 Apr 2025 20:26:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Precision-Textiles</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ba9419bb2f2bbe4acc2acf59421bbfa5f9c4a03654c00ceaebc760a8c9d54dd</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1987, Totowa, New Jersey-based Precision Textiles is a global supplier of coated fabrics, nonwovens and laminates for companies in the mattress, home furnishings, automotive and health care industries, as well as military apparel. With a specialized emphasis on flame retardant compliant materials designed for use in mattresses and sleep products, the company manufactures its family of products at its 250,000-square-foot headquarters that includes a state-of-the-art laboratory, factory and warehouse. The company also holds four additional warehouses strategically located in the U.S., as well as a warehouse in Asia.</i><br />Target victim <b>website</b>: <i>www.precisiontextiles-usa.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Miller--Caggiano</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22756</link>
<guid>7fbe4099ee6be0eef38dc1a983619b8c</guid>
<pubDate>Sun, 13 Apr 2025 20:23:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Miller--Caggiano</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8255ff9417a74f569370d7af4c98cf543c5f74a05a086e249fc36c259af4cd43</i><br /><br />Threat actor <b>description</b>: <i>Miller Caggiano & Kaplan, LLP. is a law firm that was created out of a deep-rooted desire to assist the injured and disabled worker with the sometimes frustrating legal process associated with disability claims. Before embarking on their legal careers, the partners at Miller Caggiano & Kaplan had vast experience with organized labor. This experience included working within labor unions such as the Sheet Metal Workers International Association Local 137 and the Communication Workers of America Local 1104. In fact, Greg Caggiano was a shop steward with Local 1104 for many years and brings this experience in working towards protecting the rights of injured workers and their families. The attorneys at Miller Caggiano & Kaplan, LLP. have dedicated their entire legal careers to advocating for the injured and disabled.</i><br />Target victim <b>website</b>: <i>millercaggiano.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Harris-Steel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22758</link>
<guid>8bf9e40efcdb369a498342e2bb0ae9f2</guid>
<pubDate>Sun, 13 Apr 2025 20:20:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Harris-Steel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30d7d8989aa2b8a4b1f2667738cab4ba16931390ce6a48b35328fad269806ffd</i><br /><br />Threat actor <b>description</b>: <i>Harris Steel Company is a steel slitting and processing manufacturer that has been operating since 1950, focusing on building long-term relationships with customers and suppliers. The company emphasizes the importance of competing in the market and continuously improving its knowledge of products and capabilities. Harris Steel is dedicated to maintaining a reputation for consistent performance aligned with its business philosophies. The company aims to elevate standards through ongoing improvement at both individual and company levels.</i><br />Target victim <b>website</b>: <i>www.harrissteelco.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>McFarland-Commercial-Insurance-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22755</link>
<guid>99632f8a814e38a9f2e8d2f37dab6d9e</guid>
<pubDate>Sun, 13 Apr 2025 20:17:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>McFarland-Commercial-Insurance-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3cf318eee01dfbb8b8c651d0ed31771a5e392690ff6b1e6f4e16540fc5695a6</i><br /><br />Threat actor <b>description</b>: <i>McFarland Commercial Insurance Services specializes in offering insurance solutions for various commercial risks. McFarland Commercial Insurance Services corporate office is located in 833 Mistletoe Lane, Suite 102 Redding, Ca 96002, US and has 25 employees. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fall-River-Public-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22759</link>
<guid>562d7db19b56dba0a0e320d0a7f0aa00</guid>
<pubDate>Sun, 13 Apr 2025 20:12:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Fall-River-Public-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f4f1000ed85074b72777f09c7ad34d16dd00dedd97fb5727151f57fc0e3ead3</i><br /><br />Threat actor <b>description</b>: <i>Fall River Public Schools (FRPS) contains 17 schools and 10,521 students. Fall River corporate office is located in 417 Rock Street, Fall River, MA 2720, United States and has 720 employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>visionproducts.llc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22736</link>
<guid>1113e8fb0e36a8c6304bb7c1f63f3f00</guid>
<pubDate>Sat, 12 Apr 2025 15:31:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>visionproducts.llc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a17a2721f02cd5ea718e3cfd3c1cd96ba43673fc8038f13b0cbab84ae6a72aa</i><br /><br />Threat actor <b>description</b>: <i>Sed ultricies, diam et lacinia dapibus, diam dui semper nisl, ut dignissim diam lacus nec purus. In vitae volutpat velit, vitae rutrum enim. Ut tincidunt facilisis urna, eget dictum enim tincidunt vel. Fusce vestibulum sagittis augue, sed egestas era...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>acimfunds.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22737</link>
<guid>57750683947a2891662f18320e8d476b</guid>
<pubDate>Sat, 12 Apr 2025 15:31:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>acimfunds.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>58a651cd880049422fb91c126cdb719ff4c8d6a0dcde55c08b67df2b8b89cb03</i><br /><br />Threat actor <b>description</b>: <i>Managing capital on behalf of institutional investors, family offices, and high net worth individuals. We focus on niche commodities strategies with an emphasis on the energy transition.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Restaurant-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22726</link>
<guid>1cf33fc29c5a7f169cb51d7afe381553</guid>
<pubDate>Fri, 11 Apr 2025 15:54:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Restaurant-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9b12be9601c95670334f06d80196946488b7ba3f361f305565a3bf370b8f88f</i><br /><br />Threat actor <b>description</b>: <i>Caribbean’s leading restaurant management company. Fast food franchises like Bur...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Colmar-Industrial-Supplies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22727</link>
<guid>244e62774eb39a5919a6eeaa82e54e7c</guid>
<pubDate>Fri, 11 Apr 2025 15:54:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Colmar-Industrial-Supplies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ee023136a940ea0e18b6fcded177e449611af8071d42893cd0615c185e7b1ef</i><br /><br />Threat actor <b>description</b>: <i>Colmar Industrial Supplies Inc. is a trusted distributor of industrial cutting t...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Batesville-ProductsInc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22728</link>
<guid>991c016c602257061e08f52d57a8606c</guid>
<pubDate>Fri, 11 Apr 2025 15:54:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Batesville-ProductsInc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77a2ba92eefce63e0ed3c0526d13102128b26cabf76aa400e83ae877d16497b7</i><br /><br />Threat actor <b>description</b>: <i>BPI is a full-service, custom aluminum casting supplier headquartered in Lawrenceburg, IN.We are ready to upload more than 7 GB of essential corporate documents such as: contact numbers and e-mail addresses of employees and customers, corporate NDA’s, financial data (audits, payment details, reports), corporate licenses, agreements and contracts, personal SSN’s, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Codinter</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22717</link>
<guid>647243eef6c49fd215161ff12ac35c0c</guid>
<pubDate>Fri, 11 Apr 2025 01:45:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Codinter</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>14d1e3fdb48d6c27bafa86beffe9e4ef189bb45109ea61225d7a5502ae46e740</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Imagineering-Finishing-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22725</link>
<guid>52f244f9df0168a1f9b62b9e17b3e963</guid>
<pubDate>Fri, 11 Apr 2025 01:25:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Imagineering-Finishing-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8366b470b6af7a5a8fd3750b3009f7dfe3b8122f3936f0a33fc64775780668d5</i><br /><br />Threat actor <b>description</b>: <i>Imagineering Finishing Technologies (IFT) is the industry KnowledgeSource for metal finishing solutions. Through our commitment to the principles of Total Quality Management, IFT provides high-performance surface finishing solutions for a robust range of markets that address the most exacting application requirements. Our focus on quality, accountability, applications expertise and integrity is trusted and relied upon by leading manufacturers and OEMs. IFT facilities are certified to world-class quality and environmental standards, and we are one of the first metal finishing companies in the world to achieve TS-16949, ISO 9001, AS 9100 and Nadcap quality program accreditations, in addition to attaining the ISO 14001 Environmental Management System certification.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cane-Creek-Cycling-Components</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22715</link>
<guid>bc7dcd53d7e23cf2e0e61ef748c905b0</guid>
<pubDate>Thu, 10 Apr 2025 22:52:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Cane-Creek-Cycling-Components</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8138024a3988e29fcc7ea7f9821acdd8f3c0c62cf471f7e566fc49af0f2a72c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sfrent.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22723</link>
<guid>a6683e4f659943ba9342149f446c98c0</guid>
<pubDate>Thu, 10 Apr 2025 21:49:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Sfrent.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c9e85eda402e80a9e2f35431055c442521016bcb5ea8054b058af231146d00f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.sfrent.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Study</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22722</link>
<guid>697f31b39c120bea0d95112b65484d3f</guid>
<pubDate>Thu, 10 Apr 2025 21:47:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>The-Study</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7786b49fe638580c7af2781b3b56de24b41d680b8f9c78cf9d8a99914e8ca7a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.studyhotels.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>PAC-Strapping-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22721</link>
<guid>19415392e1213854f465b52ba2abf0ed</guid>
<pubDate>Thu, 10 Apr 2025 21:44:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>PAC-Strapping-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d9177a4d865eeb22ceb235ca0d05f0d3a9ea1ff65f6136d597ead02628c059f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.strapsolutions.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-York-Sports-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22720</link>
<guid>5a0e4f7fb541ed701eeec28589733f1e</guid>
<pubDate>Thu, 10 Apr 2025 21:43:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>New-York-Sports-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b2eb31c18ed8923c596d396ed2d7b8bbedf63d49f077305eb518baf4a484e08</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.newyorksportsclubs.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>KER-Custom-Molders</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22718</link>
<guid>6f314ed40774aac5b6f1dd47756e91c5</guid>
<pubDate>Thu, 10 Apr 2025 21:40:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>KER-Custom-Molders</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b0f40102573957244a730aebbe2a6455e215d5d3a02dc5309e9cc9993d9b598</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.kermolders.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bonick-Landscaping</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22713</link>
<guid>64ec9b72454858cf22b819d0bce64fbd</guid>
<pubDate>Thu, 10 Apr 2025 20:51:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Bonick-Landscaping</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b235119f7db3609feb89938ac1c95c99593eacf4dcf834031265efbe26736c88</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>hasbco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22714</link>
<guid>ebb2f6ac7f9ba659ac28c0b0433c7ce1</guid>
<pubDate>Thu, 10 Apr 2025 18:38:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ralord</b> claims attack for <b>hasbco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>577ce95601df8d5fdf7c23a64bc5b6c57b32e222ac39e24df4b22bfeb3269e53</i><br /><br />Threat actor <b>description</b>: <i>​​​​​​​​​​​Hasbco is a company that operates in the Grocery Retail industry. It employs 5to9 people and has 1Mto5M of revenue. The company...</i><br />Target victim <b>website</b>: <i>hasbco</i>]]></description>
<category>ralord</category>
</item>
<item xmlns:dc='ns:1'>
<title>Potomac-Financial-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22704</link>
<guid>dbda540cbe93e1f3f57f6f132550ba79</guid>
<pubDate>Thu, 10 Apr 2025 07:29:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hellcat</b> claims attack for <b>Potomac-Financial-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>acea332141f3d5cb231942868a3e6a029928cf50e44dce27fc0358c239cd8397</i><br /><br />Threat actor <b>description</b>: <i>We have breached a U.S.-based financial services firm. 381GB of sensitive data has been secured. The name will be made public in a few hours. This is a warning.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>hellcat</category>
</item>
<item xmlns:dc='ns:1'>
<title>chesterfieldtwp.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22701</link>
<guid>dc81a7d8256ff4a530df1a66f9768592</guid>
<pubDate>Thu, 10 Apr 2025 01:43:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>chesterfieldtwp.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b683e791bb2a056046639185d92e3538d413f6269a66bf359f99a5ae5b1c812</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>silocaf.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22703</link>
<guid>a10b19021b183eb10c5adfe9ff5b525a</guid>
<pubDate>Wed, 09 Apr 2025 23:54:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>silocaf.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>859800ac31376e8d0635a61733ebb4911ae1b27d88741a70defa9a23a7c756c2</i><br /><br />Threat actor <b>description</b>: <i>Silocaf of New Orleans, Inc. is an experienced coffee processor, translating thorough product knowledge into high standards and superior performance. They utilize the most advanced techniques to weigh, clean and blend coffee according to each client's unique specifications. They have also developed processes which enable them to upgrade an individual coffee's quality by eliminating certain defects. They were founded in New Orleans in 1993. Silocaf of New Orleans is a subsidiary of Pacorini S.r.l. of Trieste, Italy. ===> Phone Number: (504) 896-7800 Revenue: $83.4 Million Employees: 333 Data:178gb Contact: Maurizio Zaves | President & C.E.O. Silocaf USA, LLC One Coffee Plaza - 5240 Coffee Drive New Orleans-LA 70115-7755 - U.S.A. T +1 504 896 7800  I M +1 504 382 760 I F +1 504 896 7834   E m.zaves@silocaf.com</i><br />Target victim <b>website</b>: <i>silocaf.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dumont-Telephone</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22700</link>
<guid>36ab2a6162713cc28168f2ccd171caae</guid>
<pubDate>Wed, 09 Apr 2025 21:55:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Dumont-Telephone</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba1810f683b39ea67e150362220e1bea7429099964ba677faae5b2203dfe2118</i><br /><br />Threat actor <b>description</b>: <i>Dumont Telephone is a proven leader in technology and a proud supporter of regional economic development. We give our customers small-town service with products that rival big-time tech companies, including broadband internet, streaming video, telephone, and business services.We are ready to upload more than 6 GB of essential corporate documents such as: financial data (audits, payment details, reports),insurance documents, corporate licenses, agreements and contracts, personal SSN’s, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>North-Platte-Natural-Resources-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22690</link>
<guid>d3547395bd58fd67456dffd021f65181</guid>
<pubDate>Wed, 09 Apr 2025 19:59:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>North-Platte-Natural-Resources-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>906dd70d92692fbf43051823531947bc76b109dbb6f4e0223856bc83d01ef973</i><br /><br />Threat actor <b>description</b>: <i>The North Platte Natural Resources District is committed to protecting Nebraska's natural resources, focusing on water quality, forestry, soil management, and conservation practices. Serving the local community, they provide resources and pro            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Helitek-Company-Ltd.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22692</link>
<guid>da8bc789c7582001a3d883d8120179f5</guid>
<pubDate>Wed, 09 Apr 2025 19:59:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Helitek-Company-Ltd.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89d8ae099d84a0983f6df14e3891a573c9f8ad20483ff8f24a067d5ed48d4bf9</i><br /><br />Threat actor <b>description</b>: <i>Helitek Company Ltd. manufactures silicon wafers. The Company's products include prime wafers, single and double side polished wafers, test wafers, silicon ingots, dopants, and backside treatments. Helitek sells its products in the United Sta            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>MHT-Partners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22698</link>
<guid>89dfb67cf0445a39987f674f56a492ce</guid>
<pubDate>Wed, 09 Apr 2025 18:23:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>MHT-Partners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ec023e55280a941102ef3f816f064bc305c6890cb04e83f3da35bf6d218fc19</i><br /><br />Threat actor <b>description</b>: <i>MHT Partners  is a leading national middle market investment bank focused on representing industry leaders in growth markets. The team at MHT Partners assists clients with seller advisory, acquisition advisory, corporate finance and strategic            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ccso2014.localsheriffs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22686</link>
<guid>252e3464440ac1e060d3abc4cc60bda6</guid>
<pubDate>Wed, 09 Apr 2025 13:03:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>ccso2014.localsheriffs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c3a949eb20771eff388994225450f38c13a29de9afc6aaafc478728c348fcf8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>physiciansmedicalbilling.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22677</link>
<guid>35e8998a79d8bd7ffc28aff80acfc441</guid>
<pubDate>Wed, 09 Apr 2025 00:29:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>physiciansmedicalbilling.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9862f5e24775aea6b1a4f0a4f7a2ff5e8124c3da800aaa14d31db92bd5625a76</i><br /><br />Threat actor <b>description</b>: <i>Greetings!

Today we are posting here the new company, "Physician's Medical Billing Inc".

Company Description: Physicians Medical Billing (PMB) is a full-service medical billing and accounts receivable management firm, whose true goal is maximum...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>gramoll.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22678</link>
<guid>bea65a5d4303b90f2d29322ea14aeffb</guid>
<pubDate>Wed, 09 Apr 2025 00:29:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>gramoll.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aebe965273893d7e8dc2439d2a721809e94d7753dffaeff583e11fca71bfa180</i><br /><br />Threat actor <b>description</b>: <i>Phone Number: (801) 295-2341
 Revenue: $5 Million
 Employees: 25
 Industry: Cons...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>farmerbros.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22679</link>
<guid>def405c93fa429646ff5be759b5b9ae8</guid>
<pubDate>Tue, 08 Apr 2025 20:14:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>farmerbros.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff643d6a6a330008aedc2510e7b1ec25edbe408a4219366a4e110b10449118c0</i><br /><br />Threat actor <b>description</b>: <i>Food & Beverage | 341.1 Million
Founded in 1912, Farmer Brothers is a national coffee roaster, wholesaler, equipment servicer and distributor of coffee, tea and culinary products. The companys product lines, include organic, Direct Trade and sustainably produced coffee. With a robust line of coffee, hot and iced teas, cappuccino mixes, spices and baking/biscuit mixes, Farmer Brothers delivers extensive beverage planning services and culinary products to its U.S.-based customers. It serves a wide variety of customers, from small independent restaurants and foodservice operators to large institutional buyers, such as restaurant, department and convenience store chains, hotels, casinos, healthcare facilities and gourmet coffee houses, as well as grocery chains with private brand coffee and consumer branded coffee and tea products, and foodservice distributors</i><br />Target victim <b>website</b>: <i>www.zoominfo.com/c/farmer-bros-co/45469309</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>RFMS-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22674</link>
<guid>e4b868e56d6409924b97560bf2758cd2</guid>
<pubDate>Tue, 08 Apr 2025 18:54:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>RFMS-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>55bf67468221dd39029b73d8f83ab3ea3088550db673a6d60b8627cfa72231da</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>National-Association-for-Stock-Car-Auto-Racing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22671</link>
<guid>690875cea78285fe8770082c6d35d04f</guid>
<pubDate>Tue, 08 Apr 2025 18:05:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>National-Association-for-Stock-Car-Auto-Racing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d82f3a6f1caa2c5427633723a8ab40cd2d66aba831b6f38163bcac6c086430b3</i><br /><br />Threat actor <b>description</b>: <i>National Association for Stock Car Auto Racing (NASCAR) is the sanctioning body for the No. 1 form of motorsports in the United States and owner of 16 of the nation's major motorsports entertainment facilities. NASCAR corporate office is located in 1 Daytona Blvd, Daytona Beach, Florida, 32114, United States and has 8,734 employees. The total amount of data leakage is 1038.70 GB </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Coulter--Tateoka</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22672</link>
<guid>e74381ceac0d5d783fe71c15bb24fb7e</guid>
<pubDate>Tue, 08 Apr 2025 18:03:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Coulter--Tateoka</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8f7541af4e859dea43f93ca8edd65bef524c93a61b533879fb3a4bfcbdf8db14</i><br /><br />Threat actor <b>description</b>: <i>www.dac-law.com

11576 S State St Ste 503, Draper, Utah, 84020, United States

103.44 GB
Description

Coulter Tateoka Attorneys At Law is a law firm based in Draper, Utah, specializing in Business and Real Estate law. They offer a wide range of legal services to individuals and small businesses across Utah and the West, including estate planning and personal injury assistance. The firm is dedicated to providing personalized service to meet the legal needs of their clients and to assist in both preventive and dispute resolution strategies. With a focus on cost-effective solutions, their experienced attorneys aim to achieve the best outcomes for their clients.

</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpswww.thirdave.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22673</link>
<guid>cb03c49012a597f2dcd23bc978567b71</guid>
<pubDate>Tue, 08 Apr 2025 16:55:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>metaencryptor</b> claims attack for <b>httpswww.thirdave.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b3eb939dd11bb3b6b96337c15a07aca4fb1fe58a78d8292750bc1d6de60206c1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>metaencryptor</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.gchd.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22665</link>
<guid>005f441a9cc1899a77591ccf67fd8cf7</guid>
<pubDate>Tue, 08 Apr 2025 16:22:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.gchd.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4b912305071f66f6dcaa2683c171184a779e50fb3751a9bd1a916d25b428e5f0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>crystal-d.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22663</link>
<guid>c552d8ac4662b89375926e15727fc7ed</guid>
<pubDate>Tue, 08 Apr 2025 14:29:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>crystal-d.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7342fbc77749db0f8ab613e2c693fc2be47ecc9eab7ac0cab57f0b7bfe651919</i><br /><br />Threat actor <b>description</b>: <i>At Crystal D, we have been manufacturing corporate gifts, recognition awards and crystal promotional products for more than 20 years.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Andretti-Indoor-Karting--Games</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22657</link>
<guid>6fad979b110cf06be6f19e542b117e98</guid>
<pubDate>Mon, 07 Apr 2025 23:36:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Andretti-Indoor-Karting--Games</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba68a29fb757e6bd3e23915b842f063cf67142eea82ed72353a62e30492148ce</i><br /><br />Threat actor <b>description</b>: <i>Andretti Indoor Karting and Games was established in 2001 and is based in Orlando, Florida. They currently have four state of the art entertainment and event destinations located in Florida, Georgia and Texas. Two additional locations will be opening in 2020 in The Colony, Texas and Katy, Texas. Andretti Indoor Karting and Games has undergone exponential expansion over the last four years and will be debuting several more of their legendary entertainment centers across the United States in the near future. Their locations feature varying entertainment options all under one roof including high-speed super-karts, multi-level tracks, state of the art arcade, cutting edge virtual reality attractions, challenging ropes obstacle courses, unique two-level laser tag arenas, boutique bowling and custom high-tech mini-golf. Each location also offers a fresh, hand-crafted menu, a full bar and in-house gourmet catering to over 10,000+ square feet of event and meeting space.</i><br />Target victim <b>website</b>: <i>andrettikarting.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Air-Conditioning--Heating</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22647</link>
<guid>3d43cb0230c4f1ab6b9700689a881ec5</guid>
<pubDate>Mon, 07 Apr 2025 23:29:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>American-Air-Conditioning--Heating</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c50b59077261b23b9c92174e7fc111580c75cc5a53447cb74c352fcfe8cf8673</i><br /><br />Threat actor <b>description</b>: <i>At American Air Conditioning and Heating Co., we pride ourselves on providing quality service to both residential and commercial customers in the San Antonio area. One of our top priorities is saving you money, and we firmly believe a system             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Spring-Creek-Golf--Country-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22652</link>
<guid>28846bbee2bc821b9029e0f0877fa022</guid>
<pubDate>Mon, 07 Apr 2025 23:29:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Spring-Creek-Golf--Country-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7e7b962b37818a42b5badafa6913a621aedab5bb3e4a1d44780509c85e4c8fe7</i><br /><br />Threat actor <b>description</b>: <i>Spring Creek Golf Country Club offers golf services and a variety of membership options for enthusiasts. The club provides a vibrant social atmosphere, hosting events such as weddings, business meetings, and gatherings for its members. It is             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Galesburg-Area-Chamber-of-Commerce</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22654</link>
<guid>a5e48462a4b1598a5ad81fbdac50ed23</guid>
<pubDate>Mon, 07 Apr 2025 20:50:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>Galesburg-Area-Chamber-of-Commerce</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b3669c4fdf6c306036c3578d490f223136a876a0afe9281692ab9f67a3508add</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hewsco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22636</link>
<guid>de13900036d092edc37a217d406f143e</guid>
<pubDate>Mon, 07 Apr 2025 17:25:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Hewsco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04edc262992cac3897d3f67d9d59fefbccfe0fd1b79a1dce4d61ae98a0503198</i><br /><br />Threat actor <b>description</b>: <i>Hews Company, LLC is a family-owned and Equal Opportunity Employer headquartered in the Greater Portland area for over 85 years. We offer a competitive Wage and Benefits Package, including health and dental coverage, a 401K retirement plan, a            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Metal-Sales-Manufacturing-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22655</link>
<guid>7cdbd065970b910fec28b95d9ff39bb7</guid>
<pubDate>Mon, 07 Apr 2025 17:08:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>morpheus</b> claims attack for <b>Metal-Sales-Manufacturing-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b713a4d81d7e5723c5a521e7193c6cfd3a6445602c3ee6ddfed99261fa181d0b</i><br /><br />Threat actor <b>description</b>: <i>**Website**: metalsales.us.com

**Revenue**: $270.1 Million

Metal Sales  is the largest manufacturer of metal roofing, wall, and building systems in the United States, also offering metal fabrication</i><br />Target victim <b>website</b>: <i>metalsales.us.com</i>]]></description>
<category>morpheus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Phil-Smith-Automotive-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22621</link>
<guid>3fb5bb321738f743b4dc240f7aa5ea23</guid>
<pubDate>Sun, 06 Apr 2025 23:39:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Phil-Smith-Automotive-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd242030f4d07b278f7df05c9ac0ff56f310e49534b028a0b34bf319f0105a4e</i><br /><br />Threat actor <b>description</b>: <i>www.philsmithauto.com

4250 N Federal Hwy, Lighthouse Point, Florida, United States

358.43 GB
Description

Phil Smith Automotive Group, headquartered in Lighthouse Point, Florida, is a dealership that sells and services Acura, Kia, Dodge, Jeep, Subaru, Chevrolet, Chrysler, Toyota, Mercedes-Benz, Ford, Lincoln, Hyundai, Nissan, and Ram vehicles.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dermatology-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22622</link>
<guid>e51ba02c4a70ef8a1a52a987473f3dee</guid>
<pubDate>Sun, 06 Apr 2025 23:35:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Dermatology-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c6a8e54a10086e72d0cd2859334e74363b910d3e45185d30062a4c8342a859a</i><br /><br />Threat actor <b>description</b>: <i>www.dermatologysolutions.com

14071 Metropolis Ave, Fort Myers, Florida, 3391 United States

78.38 GB
Description

At Dermatology Solutions, we provide the highest quality dermatology care, aesthetic and cosmetic dermatology, and now Mohs surgery to the community of Fort Myers, Florida and surrounding areas. Our office specializes in skin care to help you attain healthy and beautiful skin. Whether you are seeking medical care for a problematic skin condition or you simply want to preserve and enhance your skin's youthful glow, our team of medical professionals is committed to providing you with exceptional care for your skin care needs</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>National-Electronic-Transit-N.E.T</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22623</link>
<guid>87a8152387ccb007cb00a495744d6372</guid>
<pubDate>Sun, 06 Apr 2025 23:34:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>National-Electronic-Transit-N.E.T</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8a6f64a41e84d4c64517a69422415836d49c1bd5b3e7a57de9418cd7f8bef07a</i><br /><br />Threat actor <b>description</b>: <i>www.net-move.com

230 Clay Ave, Lyndhurst, NJ 07071, USA +1 201-939-6500

78.79 GB
Description

Located in Lyndhurst, NJ, National Electronic Transit (N.E.T) specializes in high-value specialized delivery and print production logistics</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Altara</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22624</link>
<guid>b3133a87202471a4cb08fed2f088ef1f</guid>
<pubDate>Sun, 06 Apr 2025 23:33:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Altara</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a396df3848a0299fcfd46958bed0dd5c86d168531af4a5ed3e043a609bd91575</i><br /><br />Threat actor <b>description</b>: <i>www.altara.com

3430 American River Drive, Suite 200 Sacramento, CA 95864 US Contact: Gregory Kaeser (877) 374-4377 x3712

99.17 GB
Description

Altara is a global Microsoft Dynamics Gold Certified partner recognized for providing outstanding ERP & CRM implementations and Microsoft expertise. Our relentless pursuit of customer satisfaction and ability to implement customer specific solutions backed with unparalleled support places us in the top Microsoft Dynamics partners worldwide. What makes Altara a leading Microsoft® Dynamics  provider also makes us a valuable partner in furthering the success of our clients’ businesses.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Texla-Energy-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22626</link>
<guid>3ada268dec01dab0f6434c3ef50ec89f</guid>
<pubDate>Sun, 06 Apr 2025 23:31:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Texla-Energy-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>388507a933138c5923c93328cbe4cac58f2aea99ef68b48cccfbd11378bb15e5</i><br /><br />Threat actor <b>description</b>: <i>www.texlaenergy.com

1100 Louisiana St Ste 4700, Houston, Texas, 770.

9.64 GB
Description

Texla Energy Management, Inc. is a privately-held energy marketing company based out of Houston, Texas</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Texas-Construction-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22631</link>
<guid>6a15d788e8354aced3066e0ee6be8b8c</guid>
<pubDate>Sun, 06 Apr 2025 22:31:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>devman</b> claims attack for <b>Texas-Construction-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>70121613f1c8a055d3124d48f5747e21708736d27149d821320a22b594935eac</i><br /><br />Threat actor <b>description</b>: <i>Name disclosed soon</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>devman</category>
</item>
<item xmlns:dc='ns:1'>
<title>IDS-Infotech</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22628</link>
<guid>eef6a11d6c02f4443cf9c5e91947536d</guid>
<pubDate>Sun, 06 Apr 2025 18:51:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>IDS-Infotech</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8715f4936ee4d6dcae7268240a498df1606c7b7ecbff48d4253f9709c279781c</i><br /><br />Threat actor <b>description</b>: <i>Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>idsil.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>National-Ticket-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22619</link>
<guid>5ece532b576a8f4c677f0f89bac52a65</guid>
<pubDate>Sun, 06 Apr 2025 10:41:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bert</b> claims attack for <b>National-Ticket-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4374b1a7ec3f0a24adbc7b07d2770f1e6301becfe8c5dd3b61d80ee121c3204d</i><br /><br />Threat actor <b>description</b>: <i>National Ticket Company – Tickets and wristbands since 1907.</i><br />Target victim <b>website</b>: <i>nationalticket.com</i>]]></description>
<category>bert</category>
</item>
<item xmlns:dc='ns:1'>
<title>Csm-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22611</link>
<guid>8919e501cd754dd65fb0a3f88c11c25e</guid>
<pubDate>Sat, 05 Apr 2025 20:48:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Csm-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1363648112813cfebdc5f0f1bcb3b8e3566d4234a5f7a5b9cf9ac7f4244f457</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Baltimore-Steel-Erectors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22610</link>
<guid>93b0c77e03911a3114e8b308df3fc15d</guid>
<pubDate>Sat, 05 Apr 2025 18:54:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Baltimore-Steel-Erectors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e18188a3ccbfe3a0211c6fd60ea23e580de342fa0627b50428bacab740523866</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hawk-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22612</link>
<guid>f029b6966e347f598bde7d37a5f655b3</guid>
<pubDate>Sat, 05 Apr 2025 17:12:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Hawk-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a23f34bb6a534df36b3a7ad70700db09fdcd46d8232364680b3333cbcca5c4e0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.hawktechnology.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>ABITL-Finishing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22607</link>
<guid>737d3708ec65e41cf504aee654131672</guid>
<pubDate>Sat, 05 Apr 2025 16:48:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>ABITL-Finishing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3f14c2db56d4a69616bda2c97e7487d01806cc16a0a89d0149a2cf440aebc20</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>HighWire-Press</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22599</link>
<guid>bf6a723c914499b98f1b1e8898719b05</guid>
<pubDate>Sat, 05 Apr 2025 12:27:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hellcat</b> claims attack for <b>HighWire-Press</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>537f1e739cfeaa3b127565251d0b613d8dc4d733eab01254338842730caa5d1b</i><br /><br />Threat actor <b>description</b>: <i>Jiraware <<3 !! We hold sensitive data from HighWire Press, a leading platform serving scholarly publishers. The data includes internal documents, communications, and materials that could impact both HighWire and its publishing partners.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>hellcat</category>
</item>
<item xmlns:dc='ns:1'>
<title>Racami</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22601</link>
<guid>2071adba0cf125db1dcc14562137d5a5</guid>
<pubDate>Sat, 05 Apr 2025 12:27:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hellcat</b> claims attack for <b>Racami</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b607e44530979e242f47992dfd84d02231bc9af50d3aa0e54ba52a6cc63f4a4d</i><br /><br />Threat actor <b>description</b>: <i>Jiraware <<3 !! We have breached Racami’s internal systems. The data in our possession poses a serious threat to their business continuity, reputation, and client trust.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>hellcat</category>
</item>
<item xmlns:dc='ns:1'>
<title>Apex-Logistics-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22595</link>
<guid>e0132a0ce408b645b9636d5ab4707f7b</guid>
<pubDate>Sat, 05 Apr 2025 10:26:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Apex-Logistics-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d41419e26af46e842b14ee837c4c7a164c677f6866cda1616fa5c0c23b27c475</i><br /><br />Threat actor <b>description</b>: <i>Site: apexglobe.com
														Industry: Freight & Logistics Services
														GEO: Singapore (office)</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>Blackmon-Mooring</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22597</link>
<guid>0f3cb4cc8c7d6da35362e70ba50cf923</guid>
<pubDate>Sat, 05 Apr 2025 08:49:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Blackmon-Mooring</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e5275f6b26e22d80164d7c26e16ac67350dafa1e5ebe3c9cdb0e4ae24dd59712</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Latronica-Law-Firm-P.C</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22598</link>
<guid>d79bc606792288b59c64959c6bcbf5d5</guid>
<pubDate>Sat, 05 Apr 2025 05:38:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>morpheus</b> claims attack for <b>Latronica-Law-Firm-P.C</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8675def94dc6a40e0bbc792ee649fae884adc01e3a1bcb4adc4b3e24ceb13abc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>morpheus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Massachusetts-Municipal-Wholesale-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22593</link>
<guid>bee591b8364d3cabc206bb2dab22be3e</guid>
<pubDate>Fri, 04 Apr 2025 22:55:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Massachusetts-Municipal-Wholesale-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>300ec7f0781cb723ca7ea8e3bde06afe965aaecd81ff7106716b9b1d2505818c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.mmwec.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Royal-Glass</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22592</link>
<guid>acaf560f85092ac1e43b57340fd30d8d</guid>
<pubDate>Fri, 04 Apr 2025 22:44:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Royal-Glass</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a9c2d5df4e8ffe6ebcb97e4cf9a940e4707c64c12ee65b039d6be732a2990b1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fraser-Trebilcock</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22589</link>
<guid>d479d9a70cc8ef8d85152c28a1619b69</guid>
<pubDate>Fri, 04 Apr 2025 20:52:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Fraser-Trebilcock</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3139e0b29fd93b2eee1021b58e77bc870e91abf88d03bfa65a18a4cb37009ec6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Drive-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22591</link>
<guid>7a8d63122e7a60daa2fc89fb0ab231bb</guid>
<pubDate>Fri, 04 Apr 2025 18:32:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Drive-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4b348af1904f00e28e29dfd3d013b07a51ffd87deecf80be5f187a558b8fa65f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>driveproducts.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>amourgis.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22576</link>
<guid>a5311ea250c069821a160b1badc69ab8</guid>
<pubDate>Fri, 04 Apr 2025 18:28:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>amourgis.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1be3171657bded2663fa4903a130bf07fbb31978dcfe2c7ce33c4d755f2eacb3</i><br /><br />Threat actor <b>description</b>: <i>Amourgis & Associates is an experienced Ohio Personal Injury and Bankruptcy Law firm with offices in Cleveland, Akron, Canton, Toledo, Columbus, Cincinnati and Dayton. Amourgis & Associates handle personal injury cases caused by auto accident            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sansone-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22574</link>
<guid>4eb9407d63d543de5afcd082d88280f4</guid>
<pubDate>Fri, 04 Apr 2025 14:48:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Sansone-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d6beea29ef92bd5d733aea7fe661b2b868cd97894e9d777a411a7b38d2ccfa7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Parker-Fabrication-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22586</link>
<guid>477b047835877f0cb70b5a6f97a8e8d1</guid>
<pubDate>Fri, 04 Apr 2025 13:42:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Parker-Fabrication-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a0af39b2d8e95054e2c3fcf773622e8db8a249f0fc84ec80a4fffc85a89fd8a7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Henna-Chevrolet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22587</link>
<guid>5fc72e0ec25a475df97961888efcd78a</guid>
<pubDate>Fri, 04 Apr 2025 13:42:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Henna-Chevrolet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4cf626c4126ce759e9c1dde7962fbe1c33ac96aa9a229e4abeae022c96187d89</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>National-Sign-corp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22570</link>
<guid>50f3c73883917b44d9109375d6e9c37c</guid>
<pubDate>Fri, 04 Apr 2025 13:07:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>National-Sign-corp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9bdbcd8549c7c7738a946bbf8994bf38e32c85a10512c499c9734546e997c3d5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>raymurray.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22567</link>
<guid>c64350c9477e1ea35aa37a5a73d4e042</guid>
<pubDate>Fri, 04 Apr 2025 12:27:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>raymurray.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9b3357f2685e64896136b16951f037142265e9560d0326ff6180493f720deca5</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 14.04.2025. Since its humble beginnings in 1973, Ray Murray, Inc. (RMI) has grown into one of the largest distributors of propane gas equipment and appliances in the United States.  F            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Woodmen-Valley-Chapel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22564</link>
<guid>4b0625ac29f46fc1d6e19b62b01ff10e</guid>
<pubDate>Fri, 04 Apr 2025 09:26:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Woodmen-Valley-Chapel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ca4dca1f77d3debfeed70459ccadf0912504bdf4df30feb0b913a9336346dcc</i><br /><br />Threat actor <b>description</b>: <i>Site: woodmenvalley.org
														Industry: Organizations
														GEO: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cherokee-County-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22563</link>
<guid>8548f76db3195b7b3bbe1791092dd99e</guid>
<pubDate>Fri, 04 Apr 2025 01:00:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Cherokee-County-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3795853909d75a14bb5e2a2a54da196d49740b3e7c133e3daaff75bb79cc30dc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>cherokee1.org</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gem-Dandy-Accessories</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22556</link>
<guid>45c85c0abd8d53bf0feabce6ba8ede80</guid>
<pubDate>Thu, 03 Apr 2025 23:20:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Gem-Dandy-Accessories</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>14cf351718b49e39436f4d65f5bbe05336f4baf43c32874dff197bcc3e9adffb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fulfillment-Plus</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22543</link>
<guid>2d1a8576a32b4278fdaa86ddd9341276</guid>
<pubDate>Thu, 03 Apr 2025 01:44:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Fulfillment-Plus</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c766ba09d6e3d879fcb963a81a6c15aa99954abb915f4d297339dbf64ed59200</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Krypton-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22527</link>
<guid>44c2630eab1d5a8bea8cef42cac127cd</guid>
<pubDate>Wed, 02 Apr 2025 21:49:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Krypton-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed0684d4205cf8fbb2f290e982c26abc42a03a09d7ce7055091fc64536db9861</i><br /><br />Threat actor <b>description</b>: <i>Krypton Solutions is a provider of rapid prototyping and low/medium volume turn-key contract manufacturing services to the semiconductor, medical, defense and telecommunications industries. Krypton Solutions corporate office is located in 3060 Summit Ave, Plano, Texas, 75074, United States and has 141 employees. The total amount of data leakage is 244.30 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alton-Steel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22529</link>
<guid>ebfa1b41f4b42d1c0b703182ef4aaf1d</guid>
<pubDate>Wed, 02 Apr 2025 21:28:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Alton-Steel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4976235d6e71b22fb63a2e0416107fb6f0eb8cc8287868bba677420fe18968d1</i><br /><br />Threat actor <b>description</b>: <i>Alton Steel Inc. is an American steel manufacturing company founded in 2003 and ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hop-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22548</link>
<guid>7940afa57337177ffc2907f935b4aab3</guid>
<pubDate>Wed, 02 Apr 2025 21:18:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Hop-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b4f470bf855ee571cf1c1d880e19d17b2051b0611b61dcb2b1521b3e3ae089c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.hopindustries.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Parvin-Clauss-Sign-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22546</link>
<guid>f2a4d34f5e4caeab38d3d6b5720e7e48</guid>
<pubDate>Wed, 02 Apr 2025 21:15:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Parvin-Clauss-Sign-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d971ec17245b36e94256e76b3db053814931a38f7fca1cdf2c9a0e3c40fcba44</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.parvinclauss.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>OTA-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22545</link>
<guid>b8fa7fd38331444b05aa54244bd029b1</guid>
<pubDate>Wed, 02 Apr 2025 21:13:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>OTA-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b3a60dcce8e541c7b655eb252a6646a2f49ea7fdcb487e6bc5331ae217c73e18</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.otallc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>cesaroni.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=23477</link>
<guid>270a009cf37d7723c38fff4a2ef7eb57</guid>
<pubDate>Wed, 02 Apr 2025 18:55:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>cesaroni.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8c0ca60ccb2d8081a73f5ae450b9fa733fe973567c5bb3fe9370ac437c6aa96</i><br /><br />Threat actor <b>description</b>: <i>Our team was able to breach the IT defenses of a huge number of c ompanies. Among them are:  | csur.net | alghisi.net | minoas.gr | grandimolini.it | transpor tescarvalho.com.br | cesaroni.com |   Everyone who agreed to cooperate with us did not appear on this l ist. The data of the others have been made publicly available or  disclosed here.  We always act honestly and try not to disclose the fact of data l eakage until the very last moment. Therefore, it is in your best  interest not to be on this list and contact us immediately.</i><br />Target victim <b>website</b>: <i>cesaroni.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Entech-Sales--Service-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22534</link>
<guid>56dbbe315d23b2567750127f17457a86</guid>
<pubDate>Wed, 02 Apr 2025 15:19:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Entech-Sales--Service-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a01aeba3b583bd0bd53bd761c49fa78463898488b1a0634e685962109a327bd5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clarity-Ventures</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22525</link>
<guid>ea9c39a35857068756c18d8a47ac9c33</guid>
<pubDate>Wed, 02 Apr 2025 14:49:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Clarity-Ventures</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>21916a699d8a7c691c7a2e95fe6846f3eaa914eed9961d0cb97f1b010556e7e5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>crownlaboratories.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22524</link>
<guid>4e59c5d1cdd26cf09c95106c59ddfa9e</guid>
<pubDate>Wed, 02 Apr 2025 13:06:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>crownlaboratories.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0dda1481d169385b75ca4358c4e482ae32bc43c326b5e35403b369bdc0d393a6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>caliendoarchitects.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22518</link>
<guid>6ee6d45b879fa47440575ce69b9b5a18</guid>
<pubDate>Wed, 02 Apr 2025 10:27:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>caliendoarchitects.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47639f31ea3bb025eec47da2fc3679e12c2da6fef77de5f9b0a9ac6ed0bb5bf0</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 12.04.2025.Born and raised in Queens, Gerry Caliendo has been an active member of his community for over 20 years. His active contributions include being appointed to the Queens Commu            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Collective-Architecture</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22521</link>
<guid>a9a6bc8f86138d7b4c7a186ceb947b62</guid>
<pubDate>Wed, 02 Apr 2025 07:55:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Collective-Architecture</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25fbbcc0b6c16fb11c0fa4a43d2a2bb8a028ff5929db646e737eac29d12cd072</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>collectivearchitecture.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>US-BioTek-Laboratories</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22519</link>
<guid>7961483e4bc7be3729c46f24a33d88c4</guid>
<pubDate>Wed, 02 Apr 2025 06:27:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>US-BioTek-Laboratories</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b080f36a775d4a4c0077907d3e847be06eda323a195aba5cfd31c64c48699abe</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>usbiotek.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>DG2-Design</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22514</link>
<guid>67f098b0f09ef0f126d271764cf270fc</guid>
<pubDate>Tue, 01 Apr 2025 20:22:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>DG2-Design</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22a8f293c575a7968996c51e967c9906c3f7e7c9483125fb5888b2fe25ac9e7b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Loretto-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22509</link>
<guid>1e88294e34f2278bd1e0392f4493a3eb</guid>
<pubDate>Tue, 01 Apr 2025 16:52:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>The-Loretto-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ec943b598b770fbe38624376da3ea9272fbeaada210c0780cd4e0d62489dbb7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bamar-Plastics-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22511</link>
<guid>3e5f370ac4b574fbf4c10f16d112919f</guid>
<pubDate>Tue, 01 Apr 2025 15:16:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Bamar-Plastics-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1515c728f1c42eafd13c3177a78be59d638e3140f29599d7e5170f3c81c4ee54</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mercury-Integrated-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22512</link>
<guid>aee4436ebf66b868354f054ab2681c0e</guid>
<pubDate>Tue, 01 Apr 2025 15:16:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Mercury-Integrated-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>41118cb60a6f4967716f5ce53bc97c632a145c19b0baf03f0bf7348979fb4b79</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alora-Pharmaceuticals-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22510</link>
<guid>e920bc273550d472a0c9e84b037f2592</guid>
<pubDate>Tue, 01 Apr 2025 13:15:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>morpheus</b> claims attack for <b>Alora-Pharmaceuticals-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f4cab1cdca968321085ab3bb4f96c219845b7c70ca01e5d015ee0e67b972a8eb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>morpheus</category>
</item>
<item xmlns:dc='ns:1'>
<title>BenefitElect</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22507</link>
<guid>99bddc0e3c7548714c48171b8595faac</guid>
<pubDate>Tue, 01 Apr 2025 08:08:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>BenefitElect</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>767c10c851ff0728961d225085204952e66feca0fffb2958ae9cbec7898b6077</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>benefitelect.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Testima-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22503</link>
<guid>7b7df56f467d96c8f817d24e6c75fb51</guid>
<pubDate>Tue, 01 Apr 2025 06:42:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Testima-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>05187c14b63adce3d45664b479e694c3ac3adcd79cbf1c9009dbc20766f9260d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>testima.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brella</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22502</link>
<guid>a156157cd75f67392de1d62057f29f41</guid>
<pubDate>Tue, 01 Apr 2025 06:40:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Brella</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9b516b5012e1f9e5aeb7c13a725c2418099ba72cfc0a94b7b10dafcb376285ec</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>brella.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>intellioan.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22491</link>
<guid>38e5bf5321bdce9f0d059c44c09e040a</guid>
<pubDate>Tue, 01 Apr 2025 03:39:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>intellioan.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec2feb9ebb658e948df5e3235e1946d5d25d301d9da36035ac91d12d96d20139</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>jackpotjunction.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22489</link>
<guid>38225eda9bcf2606642402111288fc24</guid>
<pubDate>Tue, 01 Apr 2025 01:53:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>jackpotjunction.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d1febae2451059bae9ac1cb7e0c7ea8033ab62b9c402a2681469636415e42c20</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>AAPG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22496</link>
<guid>c3b1a3529d687c274fd7844301c7ab79</guid>
<pubDate>Tue, 01 Apr 2025 00:07:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>AAPG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6457a516f7c5816593f6ad931eebbb42f786e1a4393ed3d62e3bfaf107b5bbd</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>aapg.org</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hanna-Global-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22495</link>
<guid>16a60161dde5bc7860b6e6d6ee27c5fd</guid>
<pubDate>Tue, 01 Apr 2025 00:06:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Hanna-Global-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97548a62ccef5a41deaf88094fe29d1a8585c369ede9d63499a96601dbd56fb8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>workforcejunction.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Flagship-Press-Flagship-Press</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22494</link>
<guid>5aa6584299748debdefd752a99e94e4e</guid>
<pubDate>Tue, 01 Apr 2025 00:04:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Flagship-Press-Flagship-Press</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5aced6c2eaf368c3dc600ac56f976c6a707d04fd4c0becab71df68fc67160812</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>flagshippress.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>attorneykohm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22493</link>
<guid>e6dad0d5e6efdb6f79c443dcb3002ad0</guid>
<pubDate>Mon, 31 Mar 2025 23:40:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>VanHelsing</b> claims attack for <b>attorneykohm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8851d609a564da09726b545eafe5616a85d2754395525f59058a9af25f25a0a3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>attorneykohm.com</i>]]></description>
<category>VanHelsing</category>
</item>
<item xmlns:dc='ns:1'>
<title>alertenterprise.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22492</link>
<guid>7b2660ee82b81ee11f6fd5017297c7ca</guid>
<pubDate>Mon, 31 Mar 2025 23:15:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>VanHelsing</b> claims attack for <b>alertenterprise.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1fb619043f88ac88694f88ae60c6910e9d11f9aa319c1a2ceb059962c94c0832</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>alertenterprise.com</i>]]></description>
<category>VanHelsing</category>
</item>
<item xmlns:dc='ns:1'>
<title>delta-life.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22490</link>
<guid>199232257dffb88971fd8755abf20863</guid>
<pubDate>Mon, 31 Mar 2025 21:38:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>delta-life.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1bf88040b0ec2e88262ca8e77604934ef71ff9868fbb7184f3da030b0d2b9fbe</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>delta-life.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Regency-Outdoor-Advertising</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22482</link>
<guid>89a8a462f5d9555ff8df960ea08d60dc</guid>
<pubDate>Mon, 31 Mar 2025 20:17:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Regency-Outdoor-Advertising</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>783e1d9b2dd61066ee7ae48baaf6fc9407ca00688daae9f2d5d4d1e8c1c1f977</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Atlanta-Plastic--Reconstructive-Specialists</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22483</link>
<guid>6c5eb9a660d5b3ae277726c6ec098192</guid>
<pubDate>Mon, 31 Mar 2025 19:21:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Atlanta-Plastic--Reconstructive-Specialists</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3c6efaa0adfead5d26f2e9ed55840ef06dc69a54a9de6202817383fc4b24c4b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>atlplasticsurgeon.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>stattorney.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22487</link>
<guid>6722ded7e9ade26e99c8c945190a490e</guid>
<pubDate>Mon, 31 Mar 2025 19:01:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>stattorney.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7efa9659d5ed1377b934514a5dc3d5d5061b8a07f21e44d4a0be5387f4257c1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>stattorney.org</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Talley-Metal-Fabrication</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22484</link>
<guid>3204765835133b3580b0f603a5c3b625</guid>
<pubDate>Mon, 31 Mar 2025 18:58:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Talley-Metal-Fabrication</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>190c089313f87f3dadb25e84e2f069c575649b3defed681be81cbe4b1b223031</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>jtalleycorp.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southern-Avionics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22485</link>
<guid>0981a060af516a1cb54f2f9a1ed5473e</guid>
<pubDate>Mon, 31 Mar 2025 18:57:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Southern-Avionics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e3508d9bed1c244a21e641d7df13f302b29453bfcd90ce0226189afc25cebbd1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>southernavionics.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Industrial-Dynamics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22486</link>
<guid>c1bc72568d36176da6f0bb5c451d90aa</guid>
<pubDate>Mon, 31 Mar 2025 18:56:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Industrial-Dynamics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>83991ddb2b82f4d5e931ed9d0adaeb4d4b23a4b40891496a3e308a016b14f9c2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>industrialdynamics.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bunger-Steel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22463</link>
<guid>59bf3958a6ff253e596c3a9bb9ecd1f2</guid>
<pubDate>Mon, 31 Mar 2025 18:36:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Bunger-Steel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7e27d9c41ed05e64bca0f497d0222a22e80767e31c58fb7629b53bca1127707d</i><br /><br />Threat actor <b>description</b>: <i>Company has 24 hours to contact us .

Bunger Steel is a quality, full-service manufacturer of all kinds of steel buildings including Commercial, Industrial, Residential, Institutional, Agricultural, Airplane Hangars, Mini Storage, Churches,            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>goosehead.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22480</link>
<guid>e6c3b7801e77407973c6e466f619fbe7</guid>
<pubDate>Mon, 31 Mar 2025 18:31:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>goosehead.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c46bc6f0acb26c7874052938b4335e833f7177e26e797099697b53b4ecddfe2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>goosehead.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pak-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22479</link>
<guid>c6b9468ce732c6ead632ea051c4e9743</guid>
<pubDate>Mon, 31 Mar 2025 18:30:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>Pak-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce6fa04e219c78fe286afb5a8a3456bb78f70bcebf375dfdd8678bd77c6b296a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>paktech.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Evans-Distribution-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22478</link>
<guid>7d757465b17e6b28ef00f9f1551d5689</guid>
<pubDate>Mon, 31 Mar 2025 18:28:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>Evans-Distribution-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>973b2806212870c90e564a6fd8372c97bfdfaebdea30f52489fd4fe8e6c8fa5b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>evansdist.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Transcore</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22477</link>
<guid>d0e75b8f07d27b89c46b4191ab723943</guid>
<pubDate>Mon, 31 Mar 2025 18:26:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>Transcore</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cfee5b27241cadc905ff734f705623dfe803f2c89d2598687ccea7cd74319227</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>transcore.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lee--Sakahara-Architects</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22474</link>
<guid>a49aafb53dc77f6d4a96ce9a34911561</guid>
<pubDate>Mon, 31 Mar 2025 16:11:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Lee--Sakahara-Architects</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c8db067dcdcf462834fd76f044f7e7e95bfc011bd25abe7d6f2cef597945589</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>leesak.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Design-Design</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22472</link>
<guid>5053f99d12400ffb9eebe6992bf56e82</guid>
<pubDate>Mon, 31 Mar 2025 16:08:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Design-Design</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0283f466f1bc18e7a5c0bd451cac13a1798907c4d95d347da4c12c0623f744a3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>designdesign.us</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Meridian-Senior</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22470</link>
<guid>8a75ebcceac93e3df7b191f522e597ff</guid>
<pubDate>Mon, 31 Mar 2025 15:57:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Meridian-Senior</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>158f03d37ce32811c872511e158b4c0050aaa2127594b10ef47c6f18f1f4631a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Saunders-and-Saunders</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22469</link>
<guid>028bc2ada185ef84c7c64afa42793352</guid>
<pubDate>Mon, 31 Mar 2025 15:56:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Saunders-and-Saunders</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87c07432fbba944f17ff1453e88edb5ced5bb09ffd413172ddcac31bdee74bda</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sonrisas-Dental-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22468</link>
<guid>01634584b864f5f64d799199643f06d1</guid>
<pubDate>Mon, 31 Mar 2025 15:55:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Sonrisas-Dental-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>059e760733770593d0db81d4629fee4f744cf8159a70084dfd869ad25e9d921a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>REPROHAUS-Corp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22464</link>
<guid>9c8780d93f7077ed38cdc242778f7fdc</guid>
<pubDate>Mon, 31 Mar 2025 14:17:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>REPROHAUS-Corp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2586183a68f8c85c227088a0d40206489fc0992b715c762447415bd5ab6a1adf</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Virserius-Studio</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22465</link>
<guid>11af6b055e34d4ab516d9cea9c12a359</guid>
<pubDate>Mon, 31 Mar 2025 13:38:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Virserius-Studio</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>138f82f8ad67a8814aeae5edfdd4aa8364ba0c262510a640a155576df640d75e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>vinylvisions.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22445</link>
<guid>d243d09058c40e2862d04960adc86d85</guid>
<pubDate>Sun, 30 Mar 2025 03:58:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>vinylvisions.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>23ea9b15dd72a78aad1bdc64cabffe38a5a0dadcadef53229bbea31d80fddabf</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>vinylvisions.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>alpsteel.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22441</link>
<guid>275c8bcb2fd8fa798e3f55703bb8c40d</guid>
<pubDate>Sun, 30 Mar 2025 03:57:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>alpsteel.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a2ac5c2f32bec7fdbbb545ae847b816c349c9e47d38e531a50447bcbb9adc385</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>alpsteel.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>metalogicinspection.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22436</link>
<guid>fa3395b241c4665f95f2f71a5b59cb74</guid>
<pubDate>Sun, 30 Mar 2025 03:51:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>metalogicinspection.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f70a44b396ee3ffe40b7d6268ecb3fd84eef05867e307e0184d58553140d5e9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>metalogicinspection.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>vcvitanzasons.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22434</link>
<guid>5434dc43a6abf2555ab0489a105fcca4</guid>
<pubDate>Sun, 30 Mar 2025 03:48:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>vcvitanzasons.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>030aff2adaef01bfd62b9fbee6c846a5b384fed3ba988b3436bd212ecb4d7279</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>vcvitanzasons.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>westwarwickwelding.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22429</link>
<guid>c5bb37ccd660045a83ee860888899102</guid>
<pubDate>Sun, 30 Mar 2025 03:43:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>westwarwickwelding.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>907f4e91398792dd7f6466d09ae4eef9485ff0b4cb4d1d2caa75a389e0eea760</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>westwarwickwelding.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>prestigeer.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22428</link>
<guid>9f8a07606c788bbd332cd54a63a3c628</guid>
<pubDate>Sun, 30 Mar 2025 03:41:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>prestigeer.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c725a4bce2f07c72b13e8891cef9f0ada962991274d536e81cb25e76ced27b41</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>prestigeer.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>ecconstructors.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22427</link>
<guid>8e1f647f0d7d91df0cf3c7d10b37a236</guid>
<pubDate>Sun, 30 Mar 2025 03:41:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>ecconstructors.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e326ee27da16a1d406f3478b41fac30dcee2dcf12199353f15b60c714ef95533</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>ecconstructors.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>wrm.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22426</link>
<guid>a6eebd6e1eacc99527ab6b85235e8500</guid>
<pubDate>Sun, 30 Mar 2025 03:40:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>wrm.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c9b6bfa495f4d35917ef90b9f2c835d0085a42588fb34ff67a670aba036fc93</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>wrm.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>adolphelawgroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22423</link>
<guid>71f78523376fc3eb23be9316f6f6126e</guid>
<pubDate>Sun, 30 Mar 2025 03:35:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>adolphelawgroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8461c0aa145c0f0a8d758288c3fdcc5df8aca97ac73819df777695e7586c5ad5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>adolphelawgroup.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>mayaassurance.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22420</link>
<guid>756b244dd05219f3008e147474125ee8</guid>
<pubDate>Sun, 30 Mar 2025 03:34:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>mayaassurance.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2dfe4fc43cd012f4a3b7043692ecb65d01c4be40c80a2279053015fb92a21b4e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>mayaassurance.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>importantsteps.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22415</link>
<guid>809c33ece92310241f9c12af3fa34d04</guid>
<pubDate>Sat, 29 Mar 2025 22:43:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>importantsteps.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0484e51a53afc88cd4a05f0e0f878c62427345462e6ebb5cff8b766c247cccee</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>National-Defense-Corp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22419</link>
<guid>5d944358f99554eb0ce6e66402f77404</guid>
<pubDate>Sat, 29 Mar 2025 21:57:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>National-Defense-Corp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>32f8b5651580df715c79719022224e30bbf4713f43d147918788bcc2b9eccccb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>nationaldefensecorp.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>dapope.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22417</link>
<guid>0f6d11a5f98dbcc41bdcd0c970a63d3f</guid>
<pubDate>Sat, 29 Mar 2025 20:30:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>dapope.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e49a1df68e45680402142e7905f17398accef2746a603caa56d2de3467443c4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.dapope.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>OShea-Builders</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22412</link>
<guid>b45311f6bdaa61572b3331d17248b980</guid>
<pubDate>Sat, 29 Mar 2025 16:32:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>OShea-Builders</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e18c84fb1a9ece7db3aff7a6f97598f2540da44bea2270977872cae6b7725f01</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>osheabuilders.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>hardmanjohnston.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22404</link>
<guid>1ed3f6c5e3c6aad50b5e8a32f3a05d61</guid>
<pubDate>Sat, 29 Mar 2025 12:28:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>hardmanjohnston.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3aabfcb9c50e7d3f92b3e05fac0e3efd7123d44a676566721a856fb45192185c</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 08.04.2025. Hardman Johnston Global Advisors is an independent, global equity boutique investing in high-quality growth companies at value prices.For over three decades, we have follo            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>blue-hive.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22406</link>
<guid>ab1062ab25eb85eb767d2d376dec519e</guid>
<pubDate>Sat, 29 Mar 2025 12:28:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>blue-hive.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e3861d4d5c33d9eaa0eda07664c5f10e82f37edd282816a0dd04721d68428cca</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 08.04.2025. BlueHive Exhibits is a bold creative force that helps brands create engaging environments and experiences to connect with their customers and make an impact, from the even            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>bedfordma.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22408</link>
<guid>57d69b8c4d53a3fdcae582b026285ca9</guid>
<pubDate>Sat, 29 Mar 2025 12:28:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>bedfordma.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e69f20b3f416a022e7240cb8d731a65f1aab5a0f1ab3092d09edb98565d553f</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 08.04.2025. Bedford is located on the map of Massachusetts in Middlesex County-about fifteen miles northwest of Boston near the junction of routes 3 and 95 [128]. The Town may be acce            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>frazerllp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22409</link>
<guid>74633dc3ab2e714eeba0bd6624b0799d</guid>
<pubDate>Sat, 29 Mar 2025 12:28:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>frazerllp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9727abcda1efb82b4bd446f6fad77d1d3c15591a62825115293601eada3d939c</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 08.04.2025. At Frazer LLP we believe in relationships. When you are a client of our firm we are With You and For You in all of your endeavors, at all the moments of your life. We know            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>mmmbs.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22410</link>
<guid>7e44f6169f0ae75b943cafb5acdb4449</guid>
<pubDate>Sat, 29 Mar 2025 12:28:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>mmmbs.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77a04868bbd3972e074ff6bdeda5ca1a7ef5af01d1ae8e7b4d457e4a02bda5be</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 08.04.2025. Mid Michigan Medical Billing Service, Inc. is a full spectrum revenue cycle management company offering Medical Billing, Medical Transcription, Records Management, and Con            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>solaroptimum.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22388</link>
<guid>aa6bd2e165570e4e692173ebf219c803</guid>
<pubDate>Sat, 29 Mar 2025 01:28:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>solaroptimum.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9db61578c5050f5bc59ace5672237717e3b82f5d9607317b9f13fa8dee5fc215</i><br /><br />Threat actor <b>description</b>: <i>Solar Optimum, Inc. is a Los Angeles-based company that provides renewable solar...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Forrest-City-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22386</link>
<guid>63f4c74d449b38fdb47718aca03c8af3</guid>
<pubDate>Fri, 28 Mar 2025 22:44:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Forrest-City-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>325dc9ae54081924443363fc1975fb53eb70be32b3a8fbab9597c21701cfa3b5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>phaus.usampphakr.comampphabodysystems.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22382</link>
<guid>1d2416bb6788d3434832c039cc00e3d7</guid>
<pubDate>Fri, 28 Mar 2025 20:47:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>phaus.usampphakr.comampphabodysystems.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a43e6bc269d0e61134037287d9be839853fc1810582a498b9fdeaaa35a28d9df</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Martin-Mechanical-martin.local</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22375</link>
<guid>ac66722e68274048bd8cc378b8517436</guid>
<pubDate>Fri, 28 Mar 2025 19:27:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Martin-Mechanical-martin.local</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0448333d34aa724d93bff87c72110068cf9b536d93c09bcd1d733d2465d9189a</i><br /><br />Threat actor <b>description</b>: <i>Martin Mechanical Contractors Inc. is a Kansas City-based mechanical contracting...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>AJF-Inspections--Engineering-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22376</link>
<guid>714c846cbf4b9b78e37968fae5a6a0f1</guid>
<pubDate>Fri, 28 Mar 2025 19:27:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>AJF-Inspections--Engineering-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c421396f1c95f1936b54264029d30bc7cc29f3712d2d9a125c45f9162791fb7d</i><br /><br />Threat actor <b>description</b>: <i>AJF Inspections provides professional property inspections including home, comme...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Commercial-Concrete-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22377</link>
<guid>9e5085b1a8633688490ba0fe7fe2862f</guid>
<pubDate>Fri, 28 Mar 2025 19:27:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Commercial-Concrete-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>00eb461c4b4cd22e034fb6300b7dbdedcf934431596176c7f32226c19323ffd1</i><br /><br />Threat actor <b>description</b>: <i>Commercial Concrete Systems is the cutting edge leader in structural concrete co...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Superior-Forge--Steel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22379</link>
<guid>7f349530eb0d119150526e8efe0fc845</guid>
<pubDate>Fri, 28 Mar 2025 16:14:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Superior-Forge--Steel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96f397c59b6cdbd81b65eb4e50fed805fe4b9614eeac44d0622aec618580324e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>S.S.-White</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22380</link>
<guid>24402d5ee440a37f41903da55be81848</guid>
<pubDate>Fri, 28 Mar 2025 16:14:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>S.S.-White</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b92ed134eb5c43d58a57155d5816d9a8e96ebc9b756ad5a554b3aebd730a042</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kaspar-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22373</link>
<guid>f67204d4ca3474c58368df9fb5f0f6bc</guid>
<pubDate>Fri, 28 Mar 2025 14:44:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Kaspar-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f636b54567721fc9bc55a07d88b651ece6047e9466e16bceb0044e51904f4dd</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>entandallergy.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22369</link>
<guid>a77fee56f3b23fc8cb33e04f4d05132a</guid>
<pubDate>Fri, 28 Mar 2025 10:45:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>entandallergy.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad11bf2fe14c66d5612acc56a3dd6798d092989e8bf109d937062b05df8faa59</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wildeck-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22362</link>
<guid>0378944aa0da95a0e9bf1edcf0f447ee</guid>
<pubDate>Fri, 28 Mar 2025 00:28:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Wildeck-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>890a9e74d2e8fb9f69d1733f552f54248c2214f9b44ee2f96f7d05465769ee49</i><br /><br />Threat actor <b>description</b>: <i>Over 500 GB of files downloaded from their servers . Company has 48 hours to contact us before we publish the data .

Wildeck, Inc. headquartered in Waukesha, WI, is a subsidiary of Holden Industries, a 100 percent employee-owned company.              ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>brattenelectrictn.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22359</link>
<guid>5b1e2ac88089bded4f4926a74b303bab</guid>
<pubDate>Thu, 27 Mar 2025 18:52:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>brattenelectrictn.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d0796205e7bf97a31fd16b48b07e2a36a9794f5b8706280db5f93a0df273fa28</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>amatechinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22356</link>
<guid>db93e1f9860b074ef224878a047a5407</guid>
<pubDate>Thu, 27 Mar 2025 17:29:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>amatechinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d59beb94a70efb926d77d7b844d3beea29cb440c9010c13ed5f9f211f6d47837</i><br /><br />Threat actor <b>description</b>: <i>Engineering, Prod, Proto, Purchaising, Sales, Scan, Business Development</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Manning-Materials-Corp.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22361</link>
<guid>26460222e144ead3c218fd4a4eb84a80</guid>
<pubDate>Thu, 27 Mar 2025 17:12:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Manning-Materials-Corp.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9c1ebbfa14efae04ece8338f002bf74e50d3c991925f2a3fcec08bb46c598bb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>NAI-Earle-Furman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22360</link>
<guid>3aa032c050c662b5a61369eea82681c1</guid>
<pubDate>Thu, 27 Mar 2025 15:43:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>NAI-Earle-Furman</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46aab4b5207eed4fec727116abd0038d5a7dc991d127607161916fa50ce93e47</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>REIMERS-FURNITURE-MFG-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22358</link>
<guid>fc4c3b5809a65c60642bc8f144321208</guid>
<pubDate>Thu, 27 Mar 2025 14:14:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>REIMERS-FURNITURE-MFG-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c041c03f4fa73feaf88b63678bbe89f27edb31751a97921228a6ec8facd0f069</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>rfmseating.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>NEW-JERSEY-CPA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22354</link>
<guid>ba0d287efe0f3236fb8e30cf8c42df98</guid>
<pubDate>Thu, 27 Mar 2025 13:02:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>NEW-JERSEY-CPA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>135e814b5b5be62851f2e707b60d81d90f5446e6e3020236cfae10c02d214b51</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ebassi.com-E.B.-Archbald-and-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22340</link>
<guid>3e4ad5698e12b6ac4241a6c144dc822e</guid>
<pubDate>Wed, 26 Mar 2025 23:28:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Ebassi.com-E.B.-Archbald-and-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>140e94d554d05c7d52e2729c2b0e684dec0aa5f3f6aa24f9f9dc5bbc0484b681</i><br /><br />Threat actor <b>description</b>: <i>Over 700GB of data downloaded from their servers ( both local servers and CLOUD SERVERS ) . Company has 48 hours to contact us if not we will make the data available for download .

SSI combines state of the art technology with professional            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>alliedwoundcare.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22348</link>
<guid>1454d28ea121df29e7684f5b7b0d9bd7</guid>
<pubDate>Wed, 26 Mar 2025 22:57:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>babuk2</b> claims attack for <b>alliedwoundcare.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d7576e5dbf2ad62fe8992ba41ee8039724ad21eb67e1ad69e6d9babffb5d4ece</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>alliedwoundcare.com</i>]]></description>
<category>babuk2</category>
</item>
<item xmlns:dc='ns:1'>
<title>conterra.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22339</link>
<guid>900245b439fc98341ca28d3323241e7d</guid>
<pubDate>Wed, 26 Mar 2025 16:28:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>conterra.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06b79441098a23ba6f6b76cbf25c8945a5258c428ff304efad93aaa92025a66d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>conterra.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>TriCity-Family-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22335</link>
<guid>c23d948bcd53050e2ee2ef6b524d4fbf</guid>
<pubDate>Wed, 26 Mar 2025 14:48:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>TriCity-Family-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>983e38b08375cdd3d94afed18056f707c87801b99fdce826eae75247c1317f1d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Oregon-Surveillance-Network---OSN</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22336</link>
<guid>5edd7a7c6dc18a9daec4e9f57d516d87</guid>
<pubDate>Wed, 26 Mar 2025 13:12:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>arkana</b> claims attack for <b>Oregon-Surveillance-Network---OSN</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d6291580587be6a8546064aeb0b5173be55f8ba4f1e17b9d4f63021419a37e28</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>arkana</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.DSelectrical.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22334</link>
<guid>3d4dfbd0d8945ad89353db19b564ebca</guid>
<pubDate>Wed, 26 Mar 2025 07:16:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.DSelectrical.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d46eb5102de11b1946c3191908dff09abf4488999406d62ee908ed8f91e0f051</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.DSelectrical.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Direct-Traffic-Control</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22320</link>
<guid>a448e9bc07513a63d834e64009143178</guid>
<pubDate>Wed, 26 Mar 2025 01:27:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Direct-Traffic-Control</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a2c95e53879ce8039cc6c276466912bd43dbde3eb66a199a1db24be57fcf2114</i><br /><br />Threat actor <b>description</b>: <i>Direct Traffic Control, Inc., an Oklahoma owned and operated corporation, is an ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>usCalibration</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22319</link>
<guid>7b4ffb2fc1a3c0876a64ce876e623068</guid>
<pubDate>Tue, 25 Mar 2025 20:39:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>usCalibration</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f8311b0429c446bc2ebb32b5711e6bb397272eedb318f7d2cfe0bc92d37689c7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.uscalibration.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>gettys.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22302</link>
<guid>5a6ce3e53bbfb06dd5822fe254494010</guid>
<pubDate>Tue, 25 Mar 2025 18:28:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>gettys.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed440f490fb984629d70a0ca4060adf35cf2294a44947db1bccea0fd13e78f63</i><br /><br />Threat actor <b>description</b>: <i>The Gettys Group is a family of hospitality-focused companies dedicated to creating the inspired moments that stay with guests and the defined details that enrich brand. For more than 30 years, they have guided developers, operators, and bran            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Primary-Flow-Signal-Flow-Meters--Flow-Measurement</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22303</link>
<guid>2bc33f317d4f25b10e2a2a55392b11cb</guid>
<pubDate>Tue, 25 Mar 2025 18:28:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Primary-Flow-Signal-Flow-Meters--Flow-Measurement</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4992658d399e17e0d71634a695ea31ed9457138c3cb5d1bd0ac17e47c0c5ff9c</i><br /><br />Threat actor <b>description</b>: <i>Primary Flow Signal has been producing flow meters for over 30 years, since its founding by Hungarian immigrant, Dezsoe (Dezi) Halmi, and has emerged as the preeminent industry player in North America, with a reputation for reliability, accur            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.carolinaac.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22307</link>
<guid>63cd917a58c3fa3c2aef0de3480f9b5f</guid>
<pubDate>Tue, 25 Mar 2025 15:03:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.carolinaac.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>283460b1bc4e108910b6d741c54399cd9cf3d72a63815adbbd58316691bee282</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.carolinaac.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.garbinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22308</link>
<guid>4b6e16d36f691eec61154d01871cec76</guid>
<pubDate>Tue, 25 Mar 2025 15:01:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.garbinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1abcf18ce593d26a3c4dc2b6e4f74857124539021f4f470be3fe7960a7dd8d08</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.garbinc.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.mododoc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22309</link>
<guid>9978f8c43c1e939caf27c50179266b55</guid>
<pubDate>Tue, 25 Mar 2025 14:58:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.mododoc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>421e5eea6c422044446e0334b21500552bf35c7a3c56b6a2996bf95a0ae808e1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.mododoc.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.argentosc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22310</link>
<guid>102e333dd822c1d9e0592ecf075e4bf4</guid>
<pubDate>Tue, 25 Mar 2025 14:56:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.argentosc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a0be1668e479ae672d39dce982237e63b31225dc599b74f4bd798dfeb60c5ea3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.argentosc.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.ripplejunction.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22311</link>
<guid>01f302980181fb494f4524da6f6e62ea</guid>
<pubDate>Tue, 25 Mar 2025 14:54:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.ripplejunction.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3536404830900335787892b75e05d6a598226eb0ce469c5cc066b568c4609e67</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.ripplejunction.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.creativelogisticservices.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22312</link>
<guid>40ea1761f24e6f9ace3ef78d0d5e9ea4</guid>
<pubDate>Tue, 25 Mar 2025 14:53:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.creativelogisticservices.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4cfe7d42be1a35a0063b1ce0d25c9043a165cf4cc21440f85bfb15a57da1c97e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.creativelogisticservices.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.lions-online.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22315</link>
<guid>6b5fe66046d3b7a976474329e9c4f781</guid>
<pubDate>Tue, 25 Mar 2025 14:47:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.lions-online.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff006afe49ded807a042ababcebec0e331121e17cbb0f909f29fcf6cc646dd62</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.lions-online.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Primex-Farms-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22298</link>
<guid>8b6093b183c7d539ff2417f9ca13de54</guid>
<pubDate>Tue, 25 Mar 2025 14:25:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Primex-Farms-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1a8deac74f32b9fc4b16b94f0187a518db6ee8113e87c5cc72a2926c57fb06e</i><br /><br />Threat actor <b>description</b>: <i>Primex Farms is a manufacturer of nuts and dried fruits. We are ready to upload more than 25 GB of essential corporate documents such as: corporate NDA’s, personal driver license scans, passports and other employee and customer documents, financial data (audits, payment details, reports), corporate licenses, agreements and contracts, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wide-Open-West---WOW</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22304</link>
<guid>c92e246cb8b8116a8760a8515cf1c493</guid>
<pubDate>Tue, 25 Mar 2025 13:33:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>arkana</b> claims attack for <b>Wide-Open-West---WOW</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a4e3692671cffd2f1b3b9a3e0135ba83819fc1284318b68a2a11efad07a7aa0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>wowway.com </i>]]></description>
<category>arkana</category>
</item>
<item xmlns:dc='ns:1'>
<title>Okeene-Elementary-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22290</link>
<guid>9078b6ab964bbd26efdfdabfab95428d</guid>
<pubDate>Tue, 25 Mar 2025 06:52:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Okeene-Elementary-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0f3622b84e1c7d1c48a87c7c474b0fef09109a2fa28787fa5ec65ec9063a0be</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>McMillan-James-Equipment-Company-MJEC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22293</link>
<guid>76ab12f5994611f58427902b1b1d50aa</guid>
<pubDate>Tue, 25 Mar 2025 06:25:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>weyhro</b> claims attack for <b>McMillan-James-Equipment-Company-MJEC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c195b8464e2ee7f2e48e207ef2c78d17c93376d3c98c3a298ff0347cc9e0fbaa</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>mjec.com</i>]]></description>
<category>weyhro</category>
</item>
<item xmlns:dc='ns:1'>
<title>Montgomery-Little--Soran-PC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22294</link>
<guid>4a3fbb554776d17dfb5d37c37d0799fc</guid>
<pubDate>Tue, 25 Mar 2025 06:24:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>weyhro</b> claims attack for <b>Montgomery-Little--Soran-PC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>51898e5a6a0fb565f177ddeeba0bfdf5b7a92f9bc03ea28c9b871b97eb3d4b86</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>montgomerylittle.com</i>]]></description>
<category>weyhro</category>
</item>
<item xmlns:dc='ns:1'>
<title>texascompressionservices.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22257</link>
<guid>c95cb8f9ba156ee10602195efd5fb6fa</guid>
<pubDate>Tue, 25 Mar 2025 01:47:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>texascompressionservices.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c5eac7c5f65a43102ae3788f251878d349a50eb3d6a86ec7c557c43c98f73b7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.s3s.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22252</link>
<guid>707651f9a32dd3ad7a65723c4e42ff84</guid>
<pubDate>Mon, 24 Mar 2025 21:47:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.s3s.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a321034c52cb556b4fb2ecf0c691d4725e198e750928db8c1e09a043c04b8e91</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.s3s.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.rivaldt.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22284</link>
<guid>803815bbe0f321b3e4476f9af5fbe16f</guid>
<pubDate>Mon, 24 Mar 2025 21:46:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.rivaldt.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45413eec9236293a627d89b1044a1b69155e31cf0109987fc4799ce6eaa78e0c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.rivaldt.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>cisd.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22287</link>
<guid>e7cd22624d2439f832cbd30d91600da6</guid>
<pubDate>Mon, 24 Mar 2025 21:42:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>cisd.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>37407691eb798e00a8b5e415f88967dfa1a8119ddfadf8dc62f37e85d1598645</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>cisd.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Family-Health-Services-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22245</link>
<guid>702155b162d67f1d32c68e3054b82a57</guid>
<pubDate>Mon, 24 Mar 2025 21:40:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Family-Health-Services-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ecd708d2144652f29ce1263ca4111a440b281b7d9f9769b1a6e149b9c121259</i><br /><br />Threat actor <b>description</b>: <i>Family Health Services, Inc. (FHSI) is dedicated to providing reproductive health and family planning services for the residents of Lincoln, NE, and Southeastern Nebraska. Family Health Services corporate office is located in 630 N Cotner Blvd Ste 204, Lincoln, Nebraska, 68505, United States and has 11 employees. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>TMT-Clam-Dredger</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22247</link>
<guid>f69ca3d113bd72c9ef29940383e7e941</guid>
<pubDate>Mon, 24 Mar 2025 20:46:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>TMT-Clam-Dredger</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3840848d23a92eed926b56f5e82aeb8b1e02e8b138d99f416981c72d7e29b11</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wheels-and-Deals</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22243</link>
<guid>f1b3192eb719b96fd0f4ae89e0c97476</guid>
<pubDate>Mon, 24 Mar 2025 19:27:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Wheels-and-Deals</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>306149525b020c9d37a9530927ddd4d845c8602e7ef4f8296465563c8d728bf0</i><br /><br />Threat actor <b>description</b>: <i>Wheels and Deals is a FREE 112 page automotive magazine located in Central Illinois. We are a local, family owned publishing group that’s been established since 1978. Wheels and Deals Magazine is published weekly and offered FREE at over 1,            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>AmeriKen-Die-Supply-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22253</link>
<guid>0959768e03df8e636579e41f3f9d2ea2</guid>
<pubDate>Mon, 24 Mar 2025 19:24:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>frag</b> claims attack for <b>AmeriKen-Die-Supply-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>078ba9015e1176358584501ec0ea49713b19023a7bf5859136fe1bfcbc3d4ddd</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>ameriken.com</i>]]></description>
<category>frag</category>
</item>
<item xmlns:dc='ns:1'>
<title>Andrew-Davidson--Co.-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22254</link>
<guid>8709c68806a55ca2b12db80514b8e3c8</guid>
<pubDate>Mon, 24 Mar 2025 19:24:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>frag</b> claims attack for <b>Andrew-Davidson--Co.-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4d62a9746e7ff17445379515d7db7fac493a00e83173d9af1060377a5a74825</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>ad-co.com</i>]]></description>
<category>frag</category>
</item>
<item xmlns:dc='ns:1'>
<title>AeroWorx</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22255</link>
<guid>96e76cc974cf7bdcc09b86bfad3eee35</guid>
<pubDate>Mon, 24 Mar 2025 19:24:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>frag</b> claims attack for <b>AeroWorx</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b7f14d76b14c8fa95becf55a6952f6dd6296b57efd6dc2e2ec783b1ccc7b9558</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>aero-worx.com</i>]]></description>
<category>frag</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bunting-Capital-Management-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22256</link>
<guid>6b3829244a3cb6ef04f4f11733faa5a2</guid>
<pubDate>Mon, 24 Mar 2025 19:24:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>frag</b> claims attack for <b>Bunting-Capital-Management-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>899c9be5072224922563a699b8d60278d648efc838a4ed463adf5750320faebb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>frag</category>
</item>
<item xmlns:dc='ns:1'>
<title>California-Gasket-and-Rubber-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22258</link>
<guid>dd7d646241a0fb880caf9525f709215c</guid>
<pubDate>Mon, 24 Mar 2025 19:24:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>frag</b> claims attack for <b>California-Gasket-and-Rubber-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>402a6078f11898557bae1dbce0fc6c89c7ae5d3545e62986143c16175e8680f5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>californiagasket.com</i>]]></description>
<category>frag</category>
</item>
<item xmlns:dc='ns:1'>
<title>Community-Management-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22259</link>
<guid>f9e613692de084cee0631e4f3831f1a8</guid>
<pubDate>Mon, 24 Mar 2025 19:24:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>frag</b> claims attack for <b>Community-Management-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>72e2671335e3c6309b13bd8843a96123fda16377632bbc280e3d5dc9fe61100f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>communitymgt.com</i>]]></description>
<category>frag</category>
</item>
<item xmlns:dc='ns:1'>
<title>Texas-Fifth-Wall-Roofing-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22261</link>
<guid>c76aee81096b61d20e04c6fcde1da3bb</guid>
<pubDate>Mon, 24 Mar 2025 19:24:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>frag</b> claims attack for <b>Texas-Fifth-Wall-Roofing-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c9b61a5a77879cfc73ae45f0bab1d27317ebda6cfea1a93b0b9952095708c5c5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>fifthwallroofing.com</i>]]></description>
<category>frag</category>
</item>
<item xmlns:dc='ns:1'>
<title>FRANKLIN-PRODUCTS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22262</link>
<guid>8879a11ef809928b1ae4d14894ef8c2e</guid>
<pubDate>Mon, 24 Mar 2025 19:24:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>frag</b> claims attack for <b>FRANKLIN-PRODUCTS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>826a992fa6dcfe63444f8a2345e18ea1316b2ffa1caed74bc20c3daeb0bf02ef</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>franklinproductsinc.com</i>]]></description>
<category>frag</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kontane-Logistics-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22263</link>
<guid>832f64b04453d8697cd600b74b14a1ad</guid>
<pubDate>Mon, 24 Mar 2025 19:24:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>frag</b> claims attack for <b>Kontane-Logistics-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f88aea5b4261a9da3934d10c998c0b3644a497c2ac586315e8dcd4f984b27b27</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>kontanelogistics.com</i>]]></description>
<category>frag</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lake-Beverage-Corp.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22264</link>
<guid>6830bfbdb545d5f230744b3cce1f44c6</guid>
<pubDate>Mon, 24 Mar 2025 19:24:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>frag</b> claims attack for <b>Lake-Beverage-Corp.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ddf5614e976cba6e546543bed9b7fda7d567e914f70cad9911e257a2cfac316</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>lakebeverage.com</i>]]></description>
<category>frag</category>
</item>
<item xmlns:dc='ns:1'>
<title>Maine-Highlands-Federal-Credit-Union</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22265</link>
<guid>e7b6ef072f6959b5f4e092e4d8f0749f</guid>
<pubDate>Mon, 24 Mar 2025 19:24:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>frag</b> claims attack for <b>Maine-Highlands-Federal-Credit-Union</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d54a3a7f4f52d5ca4bf8f4db633e4d965f6e2c4316cf3f82dad1dfed1d14550</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>mhfcu.com</i>]]></description>
<category>frag</category>
</item>
<item xmlns:dc='ns:1'>
<title>Red-Credit-solution-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22266</link>
<guid>41ccbca6e720ff8cd93b17057f2fe0d9</guid>
<pubDate>Mon, 24 Mar 2025 19:24:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>frag</b> claims attack for <b>Red-Credit-solution-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6eb731029b7334c65898898589b1fa07b3cca036b6928f4eb1fde0c18f27f43a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>redcreditsolutions.com</i>]]></description>
<category>frag</category>
</item>
<item xmlns:dc='ns:1'>
<title>iTEK-Services-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22268</link>
<guid>a6796468415ad36c01489f48c573cf7b</guid>
<pubDate>Mon, 24 Mar 2025 19:23:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>frag</b> claims attack for <b>iTEK-Services-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3906ede4220cc3ba47ee2c5e281046b10b39b5f5456b4cec54c071d70497d125</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>itekservices.com</i>]]></description>
<category>frag</category>
</item>
<item xmlns:dc='ns:1'>
<title>Komoto-Healthcare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22269</link>
<guid>ff123d85a4be88e6892cc57e1e73d77f</guid>
<pubDate>Mon, 24 Mar 2025 19:23:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>frag</b> claims attack for <b>Komoto-Healthcare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>801f7d2b55e5202c3fa1fd5268f0cc74b1d9a9d54ebb75952444913be70ed1f5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>komotohealthcare.com</i>]]></description>
<category>frag</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rahnama-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22272</link>
<guid>7bc902d4d27006cef0abade4a1b80b3e</guid>
<pubDate>Mon, 24 Mar 2025 19:23:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>frag</b> claims attack for <b>Rahnama-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>351b3a3f67c6496c947fc4b6cec0925905a4c5d739acc32114e40e9895a1f825</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>rahnamalaw.com</i>]]></description>
<category>frag</category>
</item>
<item xmlns:dc='ns:1'>
<title>QUILTCRAFT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22273</link>
<guid>8b6041792aeeeef69b5ba034cb7577b7</guid>
<pubDate>Mon, 24 Mar 2025 19:23:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>frag</b> claims attack for <b>QUILTCRAFT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e70ef4fb917679862c00a719fcd2fe51082d547031d564fb40ecd76f9201419</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>quiltcraft.com</i>]]></description>
<category>frag</category>
</item>
<item xmlns:dc='ns:1'>
<title>Salvi-Schostok--Pritchard-P.C.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22274</link>
<guid>9f12f0dc21dfa09b139fd01c4045481d</guid>
<pubDate>Mon, 24 Mar 2025 19:23:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>frag</b> claims attack for <b>Salvi-Schostok--Pritchard-P.C.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b3a61ff2de05b5435cb597e894e3780dbe8aab02738fa6b2b2663b326f2e160</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>salvilaw.com</i>]]></description>
<category>frag</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southwest-Inspection-and-Testing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22275</link>
<guid>3b41f13b014afedf7837484559960da6</guid>
<pubDate>Mon, 24 Mar 2025 19:23:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>frag</b> claims attack for <b>Southwest-Inspection-and-Testing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>74ad00ef07421643e13e5bf47292b9d05edea99372547fe649fab0f5c140cd66</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>southwestinspection-field.com</i>]]></description>
<category>frag</category>
</item>
<item xmlns:dc='ns:1'>
<title>STATEWIDE-ENTERPRISES</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22276</link>
<guid>891c97c0ef7bb88206fdd3b81b6d990f</guid>
<pubDate>Mon, 24 Mar 2025 19:23:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>frag</b> claims attack for <b>STATEWIDE-ENTERPRISES</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd05d461052095bb26d76fabd3672e0ba06c79141e0fbaeeeb111695b5a87044</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>statewideenterprises.com</i>]]></description>
<category>frag</category>
</item>
<item xmlns:dc='ns:1'>
<title>Superior-Technology-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22278</link>
<guid>01600ecc17d3094eb9669cd6a4feb8a8</guid>
<pubDate>Mon, 24 Mar 2025 19:23:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>frag</b> claims attack for <b>Superior-Technology-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed40904fc71f88c0d5588a7b809e59e9d90bd9c0e2961b96b2d979fb1cce91a3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>superiortech.org</i>]]></description>
<category>frag</category>
</item>
<item xmlns:dc='ns:1'>
<title>Woodbine-Hospitality</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22279</link>
<guid>503440008c1a25ad5ad968c1458533bc</guid>
<pubDate>Mon, 24 Mar 2025 19:22:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>frag</b> claims attack for <b>Woodbine-Hospitality</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38d63b3fa71768c10283e782fe7f656a337df4ad7a197eaf6602fc12bb33f46d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>woodbinehospitality.com</i>]]></description>
<category>frag</category>
</item>
<item xmlns:dc='ns:1'>
<title>SEAQUEST-SEAFOOD</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22280</link>
<guid>f06e6286105961a312e5bd9b1b714a24</guid>
<pubDate>Mon, 24 Mar 2025 19:22:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>frag</b> claims attack for <b>SEAQUEST-SEAFOOD</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e4c43fd418f69ec21448c78cf72ac8dca7dbadde90699101d6d326af44468226</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>sqseafood.com</i>]]></description>
<category>frag</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.solventacentroamerica.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22248</link>
<guid>c647f2a6f34278b30c28af729766bdd4</guid>
<pubDate>Mon, 24 Mar 2025 18:06:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.solventacentroamerica.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f66f3b04c23a49ec23c0b75b2b2c79346b9278fda8c34c24952cb41c4a8aab44</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.solventacentroamerica.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Johnson-Fitness</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22242</link>
<guid>21b6529de735e29783012ab4f9ce604d</guid>
<pubDate>Mon, 24 Mar 2025 13:55:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>crazyhunter</b> claims attack for <b>Johnson-Fitness</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>90fda0e612fc61cd68d4e3069122f1b3b9424156b45a64863342c7731ecc5893</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>crazyhunter</category>
</item>
<item xmlns:dc='ns:1'>
<title>General-Formulations</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22240</link>
<guid>fa8cdd11992647240408bc1d3c09bc82</guid>
<pubDate>Sun, 23 Mar 2025 18:32:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>General-Formulations</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38439bf431fcc81ac045a5fb3ebb58851f78c3b3cb48cb98d9463804defa7cfd</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>generalformulations.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Precision-Accounting-Intl</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22238</link>
<guid>c63617a9a72525823735487489f14ac5</guid>
<pubDate>Sun, 23 Mar 2025 17:00:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Precision-Accounting-Intl</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7f95ce6ef0eaba422b6cc97445b886ac3acfad6ad91318c4f3bedcc4b8bf498</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>cpapai.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ambleside</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22237</link>
<guid>ec4b0223a9c1c3f2bd790b9a0de91090</guid>
<pubDate>Sun, 23 Mar 2025 13:14:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Ambleside</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>09378471222452a47f89b8ea999e0b51f501acc63c4a13e1800249f9a908bdee</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>ambleside.net</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zaveta-Custom-Homes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22232</link>
<guid>3968871ce7673ed3621a799f78f3e792</guid>
<pubDate>Sat, 22 Mar 2025 22:47:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Zaveta-Custom-Homes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3bab70b0b2c70d9853e12ba9377fcf806d459907d56ef5fa34845db6b0f97d02</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Goshen-Medical-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22233</link>
<guid>9268b90ee8afd29ad0d12427bf27fba6</guid>
<pubDate>Sat, 22 Mar 2025 22:24:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Goshen-Medical-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42e9dc807d11b0834b6b98a549380a8ca2230344c7a0cc38fadb416adbf76659</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>REOC-San-Antonio</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22224</link>
<guid>5c4673bce4320da5b54cf78055e59098</guid>
<pubDate>Sat, 22 Mar 2025 18:48:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>REOC-San-Antonio</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c1d43f2ac3d18256847838498e91d04ce8aea6478cf8005ad80788607b63418</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Colemanmaterials</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22228</link>
<guid>c93f4b099646514b331343beecb76eec</guid>
<pubDate>Sat, 22 Mar 2025 18:42:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Colemanmaterials</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5daef97256c8d75be32e179d47cfe1ee50b89c8e2f8a359881ddf982285cd32c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.colemanmaterials.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Innovative-Surfaces</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22226</link>
<guid>a1cccef65c05be0d8a3da6af885947df</guid>
<pubDate>Sat, 22 Mar 2025 16:46:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Innovative-Surfaces</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e16c4fc9095ccf89475d415046823c6f510ec9ab16f5c65e7295e3140094d83a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>innovativesurfaces.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aztec-Municipal-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22220</link>
<guid>8c2f94908f263917b48d13d474756e88</guid>
<pubDate>Sat, 22 Mar 2025 07:29:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Aztec-Municipal-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>51c08427fd8cc4dfdeeed2c11d047dec25f2a9820b03db7b74d2aad2bb5f362a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>aztecschools.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>compassionhealthcare.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22219</link>
<guid>2f58d47971dd8f5f3527642085d58efd</guid>
<pubDate>Sat, 22 Mar 2025 01:12:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>compassionhealthcare.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3d411279d50c4f02e5069087080531c8c46a6649683bc582602ed575cfb22e2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>compassionhealthcare.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.avalonapparel.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22200</link>
<guid>81b6bf4e488b9a4208399ff589de0e15</guid>
<pubDate>Fri, 21 Mar 2025 20:50:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.avalonapparel.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c28b64f01ddb6809218b23410bd6e324c19699f4f3e8039d2947b8e33b994649</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.accessfinanceonline.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22212</link>
<guid>8b290bf3b1b039227841d89f5f145a80</guid>
<pubDate>Fri, 21 Mar 2025 18:59:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.accessfinanceonline.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18d7725b13db9f2ddbc84b77395eef1cea983a65705f33575edc2eb1eda5c57e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.accessfinanceonline.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.elizajennings.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22214</link>
<guid>42646fb7b3cafcd424e700c1ffee3421</guid>
<pubDate>Fri, 21 Mar 2025 18:55:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.elizajennings.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe3c990590945779011260336aaffb9d833ada593ffb994d04c08b614b17f508</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.elizajennings.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.sinkdirect.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22215</link>
<guid>e0e60ec21d10b717a728bc089e73f262</guid>
<pubDate>Fri, 21 Mar 2025 18:53:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.sinkdirect.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9a0ef51b39add5c32b52fae83c5492a4aef49e4a5bb462144924a7b380ed851</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.sinkdirect.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.broadmoormethodist.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22216</link>
<guid>e2812f19ee06fbf2f9c2b27fa55ae5db</guid>
<pubDate>Fri, 21 Mar 2025 18:52:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.broadmoormethodist.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36ece830715a5ef87a14b6b5b615fbf6e16deb936daa86b7aeef9bf69af48ee6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.broadmoormethodist.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.oneupinnovations.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22197</link>
<guid>8b9a21934e5eb0b7f177bce0589c1b3d</guid>
<pubDate>Fri, 21 Mar 2025 18:49:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.oneupinnovations.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0da941361b2f70718e49f1b768cecf655b247ee03d2a72509df4cab8ebaab665</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.allstarhealthcaresolutions.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22202</link>
<guid>f8d1fd344c855b7d20e10071befd4ae1</guid>
<pubDate>Fri, 21 Mar 2025 18:47:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.allstarhealthcaresolutions.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>305ac6cd0f61f3bb119aa94c1a5146e89af97a923158f46d295b41e1542b4efa</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.allstarhealthcaresolutions.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.njcalwe.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22203</link>
<guid>b38801baf56109a4576501d6c6ec3a81</guid>
<pubDate>Fri, 21 Mar 2025 18:45:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.njcalwe.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5fba4da7e9146c8476508b6e4194b3850b12b5f635fdfdd8f94562c856feac73</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.njcalwe.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.gcsnet.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22204</link>
<guid>958b85a5b906cfc1cf826d779e694239</guid>
<pubDate>Fri, 21 Mar 2025 18:43:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.gcsnet.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4c134c117def47d9047ceb42b4adf21bf808fa58b82eb4215f81eb58d4ba547</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.gcsnet.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.core-1.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22205</link>
<guid>20be339c46ed86941481c44c82b84b7d</guid>
<pubDate>Fri, 21 Mar 2025 18:42:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.core-1.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4c6d8a0dd996ce9eccdf17ea8c41ae68a1eccd43ab482e0033c58150c45621a6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.core-1.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.esquirebrands.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22206</link>
<guid>21f8d34ed55cc8487885b771aec87f50</guid>
<pubDate>Fri, 21 Mar 2025 18:40:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.esquirebrands.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ca3d781b187680c21f4c39be893dad51cbdea87322c45d8c88d6f84fc089b1f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.esquirebrands.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Subsurfco-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22187</link>
<guid>2da07e501d2ce1f68327ef1c75a2a3d8</guid>
<pubDate>Fri, 21 Mar 2025 11:27:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Subsurfco-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0d672e5397b99fc54b10cb4063e7e1ecb12249f2af68a938ec4d3b401c9cfa31</i><br /><br />Threat actor <b>description</b>: <i>Subsurfco LLC is a company that operates in the Civil Engineering Construction industry. 
The company is headquartered in South Sioux City, Nebraska. Brad Smith is the president of this Company. 

Our team managed to breach and encrypt Sub            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.mslglobalexp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22178</link>
<guid>7adf7e3474d1857cc588cefbc4d68f55</guid>
<pubDate>Thu, 20 Mar 2025 22:45:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.mslglobalexp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>752f75b203ac39566e7a4183b34ebae51c95429e6e4ffd7ba920e239ff999fb0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>LS-Mechanical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22177</link>
<guid>da3792d66f5f4552e5bcff268c45946a</guid>
<pubDate>Thu, 20 Mar 2025 18:58:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>LS-Mechanical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f03dc19a3b6c85bd1e5b819a93f67652ffa76bceaacd2ecdd5531e3f676e5153</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.lsmech.com</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Land-Planners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22154</link>
<guid>c58f679c1efc8d6427e03c360bacb237</guid>
<pubDate>Thu, 20 Mar 2025 16:27:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Land-Planners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>21175c0313dc0486b4a342d6bc181698acdb544a617d7097afefe79b5dedeffa</i><br /><br />Threat actor <b>description</b>: <i>Land Planners PC is a company that operates in the Architecture, Engineering & Design industry with HQ in Georgia.We are ready to upload more than 13 GB of essential corporate documents such as: contact numbers and e-mail addresses of employeesand customers, personal passports, SSN’s, employment authorizations and driver licenses, HR documents, financial data (audits, payment details, reports), etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Oag.state.va.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22156</link>
<guid>0477b724bf16e35f2ccefc68351afca4</guid>
<pubDate>Thu, 20 Mar 2025 15:40:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Oag.state.va.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b68c7aa926c29f93a26a2d690f8b9d97eaa49c496bba780ec018ac1402c506ce</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Baltimorecityschools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22158</link>
<guid>753069c8736ffb846092c34a6e54966f</guid>
<pubDate>Thu, 20 Mar 2025 15:39:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Baltimorecityschools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a42cb5f12e392bc14a904d10e8ab96ab19443b2ab30c85d22e553f813607c9ff</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>National-Safety-Council</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22162</link>
<guid>9ae10fb573b7027df2bd5f4bfb02af75</guid>
<pubDate>Thu, 20 Mar 2025 15:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>National-Safety-Council</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff3f160393581fd5d73d0dade05a832a5b7cb565c424bd2e32a7878964a9ff09</i><br /><br />Threat actor <b>description</b>: <i>The National Safety Council (NSC) (founded in 1913) is a nonprofit, nongovernmental public service organization dedicated to protecting life and promoting health in the United States of America. National Safety Council corporate office is located in 1121 Spring Lake Dr, Itasca, Illinois, 60143, United States and has 501 employees. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Augusta-Industrial-Services-Inc.-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22163</link>
<guid>554b4a990f21efe6f39dfbec92d0f057</guid>
<pubDate>Thu, 20 Mar 2025 15:03:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Augusta-Industrial-Services-Inc.-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b69716e5272e844a4775da02b5a3af9b5fbabec3713d921979bb569363d44197</i><br /><br />Threat actor <b>description</b>: <i>Augusta Industrial Services, Inc. is an Employee Owned industrial and environmental cleaning service company providing pipe, tank, drain, vacuum excavation, and waste services for commercial, industrial, and nuclear customers in the southeastern United States. Augusta Industrial Services corporate office is located in 15 Lovers Ln 1428, Augusta, Georgia, 30916, United States and has 90 employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Big-Horn-County-School-District-4</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22150</link>
<guid>60ba700c9dd92b672db59eb30bf91896</guid>
<pubDate>Thu, 20 Mar 2025 14:59:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Big-Horn-County-School-District-4</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a3cf6efb095d755a49166e425785a547e3379165ba8283c066a8b87bddca081</i><br /><br />Threat actor <b>description</b>: <i>Big Horn County School District #4 is a public school district based in Basin, Wyoming, United States. The district has 297 students. Big Horn County School District #4 corporate office is located in 416S, 3rd St, Basin, WY, 82410, US. The total amount of data leakage is 205.7 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Newtown-Friends-School-newtownfriends.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22167</link>
<guid>b8306d1178a93955f70597d4dd2d06e9</guid>
<pubDate>Thu, 20 Mar 2025 14:02:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Newtown-Friends-School-newtownfriends.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f7e329d2c2c744f0a22a68943c51da68d7ab6cded915d69acd068d784243465</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>newtownfriends.org</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.kvhealth.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22147</link>
<guid>497973d699897abf7310eb4bb9b92383</guid>
<pubDate>Thu, 20 Mar 2025 02:03:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kraken</b> claims attack for <b>www.kvhealth.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>178a48cf2273a86f7ee8433693cc17086662e372d44df9e728cf5337cedb5d84</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.kvhealth.net</i>]]></description>
<category>kraken</category>
</item>
<item xmlns:dc='ns:1'>
<title>controlledair.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22138</link>
<guid>c0d84817e23caa22c287cbd1e4994ca0</guid>
<pubDate>Wed, 19 Mar 2025 18:52:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>controlledair.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5ada4d643ee2e5bd129e4500131dc939980edac3e5355fcc60a2701da392df3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.medsrx.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22139</link>
<guid>d947c9ca81cef801cd8cd633c0e9b483</guid>
<pubDate>Wed, 19 Mar 2025 16:45:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>VanHelsing</b> claims attack for <b>www.medsrx.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aeea93fadc2ad1cdbe98917efe8d91d1029162f12411a94b3c3093c3d1f74f02</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.medsrx.com</i>]]></description>
<category>VanHelsing</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Ely-Company-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22136</link>
<guid>88d4d7db55b11ebb5ad6b473fc807485</guid>
<pubDate>Wed, 19 Mar 2025 15:27:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-Ely-Company-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1c74d087d3fbae503f01ba92fda1c2728a1001e4d952cca59d9b47cba194ac7</i><br /><br />Threat actor <b>description</b>: <i>The Ely Company, Inc. has a solid foundation of over 50 years experience with the manufacturing and productions of quality machined parts for Commercial and Aerospace Industries.We are ready to upload more than 14 GB of essential corporate documents such as: financial data (audits, payment details, reports), corporate licenses, agreements and contracts, healthcare documents, personal SSN’s, contact numbers and e-mail addresses of employees and customers, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>LINC-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22133</link>
<guid>a2154298cca8ef88d1af027b622c4813</guid>
<pubDate>Wed, 19 Mar 2025 13:27:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>LINC-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dab83754b76d64d8803e7d5423b756a9a614afe05094cc82b055c2b2918f6233</i><br /><br />Threat actor <b>description</b>: <i>LINC Systems is a leading distributor of fastening solutions and industrial supplies. We are ready to upload mor4e than 11 GB of essential corporate documents such as: contact numbers and e-mail addresses of employees, vendors and customers, financial data (audits, payment details, reports), corporate licenses, agreements and contracts, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>VEST-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22134</link>
<guid>baa18c475f66f4323c0bf909aca05a35</guid>
<pubDate>Wed, 19 Mar 2025 13:27:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>VEST-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>449fd95466a68897acc1bec55a41add99c6548d3c4461561b1e1ddd628f6c5a5</i><br /><br />Threat actor <b>description</b>: <i>Vest LLC is one of the largest producers of electric welded carbon steel tubing in the Western United States. They are located in the heavy industrial neighborhood of Los Angeles named Vernon.We are ready to upload more than 125 GB of essential corporate documents such as: corporate NDA’s, financial data (audits, paymentdetails, reports), HR documents, driver license information, contact numbers and e-mail addresses of employees and customers, personal SSN’s, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Palomino-Petroleum</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22131</link>
<guid>978309fad5568a22033796586ca10160</guid>
<pubDate>Wed, 19 Mar 2025 12:27:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Palomino-Petroleum</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a2e438c30831f275e90662daaacbfc6ffded5f67adbcc4d62cf76df4c2732459</i><br /><br />Threat actor <b>description</b>: <i>Palomino Petroleum Inc is a company that operates in the Oil & Gas Exploration &...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>CD</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22122</link>
<guid>2a5b63fbaadcaa8ca0ef6b555fbe0c8a</guid>
<pubDate>Wed, 19 Mar 2025 01:43:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>CD</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2862b5f311405274249d8f0d491b43d3fd13c3c14d2479ebf2e10b0d3e6001b2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>newhollandwood.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22125</link>
<guid>ae951984b10287b9c3e716c3347f46a4</guid>
<pubDate>Wed, 19 Mar 2025 00:53:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>newhollandwood.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f202731e632499bef6ae4dfd0204335c341e7bd6165d0f5f0f562b41b06ea96</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>newhollandwood.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>THX-Transport</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22127</link>
<guid>19fadb255d5df879f17dc1cfb7d9969d</guid>
<pubDate>Wed, 19 Mar 2025 00:25:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>arcusmedia</b> claims attack for <b>THX-Transport</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4b3d08ddf33028c9d7052c6bc82a43d8c380bab858c7a049bd906a6d1cc33954</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.thxtransport.com</i>]]></description>
<category>arcusmedia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gloria-Cales</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22120</link>
<guid>fd03f6198800b312694493f5bbd9407a</guid>
<pubDate>Tue, 18 Mar 2025 22:45:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Gloria-Cales</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5d8881f5a0aa4571b784d10ccce42f364d8aba3061e9e1dedb31b9a94f27ba8b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ted-Hosmer-Enterprises</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22115</link>
<guid>a9836ba478550a1e6ffe8a013a8a0a4b</guid>
<pubDate>Tue, 18 Mar 2025 20:47:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Ted-Hosmer-Enterprises</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2d4ea8c39ed9522a92946d98b73b6043385e996424baae35ff8eb0a4959c960e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>JAMEL-CONTAINERS-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22111</link>
<guid>02e253a6d618f5bb63be3a33904bc3e2</guid>
<pubDate>Tue, 18 Mar 2025 15:16:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>JAMEL-CONTAINERS-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52b5200b35cfffc698e3c7a0567e7d6fec666032541823e4a6c3263ea4129f88</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cleveland-Municipal-Court</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22107</link>
<guid>542db1350b540ed5fe414afa93fe45fb</guid>
<pubDate>Tue, 18 Mar 2025 14:32:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Cleveland-Municipal-Court</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4eb4a7c11215ec6939d0b4f80fbe676de202b76adb73f35407a4f65c866591af</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.clevelandohio.gov/city-hall/cleveland-courts/cleveland-municipal-court</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>airtelligence.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22100</link>
<guid>e844c30aba3bf7feeae70f11e26ed92e</guid>
<pubDate>Tue, 18 Mar 2025 13:07:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>airtelligence.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe4e05871f2972fbb247d5d22db79291867d60ef9a348690cdc1b77f483d8a1f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Harcourts-Prime-Properties</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22098</link>
<guid>1b2294fb4080ec50d3f2e3143a558e43</guid>
<pubDate>Tue, 18 Mar 2025 06:59:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Harcourts-Prime-Properties</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>86a94350181ecd6e0eb290414e90c1bf15b7d1b3ad7cd4e6b9c3e20dc4dcb2ad</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>harcourtsprime.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bridgewater-Retirement-Community</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22096</link>
<guid>61b80b3c2e4d6c208f2c634ae5816887</guid>
<pubDate>Tue, 18 Mar 2025 00:08:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Bridgewater-Retirement-Community</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>316de6152e6d735ad4baed46bd18e9a592c7fef6ab1766abcde25fd2219590d9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>brcliving.org</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Electronics-For-Imaging</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22086</link>
<guid>00ad4587c5c242e23703ec19d8495824</guid>
<pubDate>Mon, 17 Mar 2025 21:34:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hellcat</b> claims attack for <b>Electronics-For-Imaging</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96ab99e94e3b1d3b9482f18201afc69a2dbedf6cb0f06006451072a1a45fec78</i><br /><br />Threat actor <b>description</b>: <i>We hold 19GB of sensitive files from Electronics For Imaging, Inc., including critical corporate data that could jeopardize the company's operations, client relationships, and reputation if released publicly.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>hellcat</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lepant-Law-Office</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22087</link>
<guid>0e1ddc294fde5896865dd30b1912c8a0</guid>
<pubDate>Mon, 17 Mar 2025 21:31:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Lepant-Law-Office</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>347a4c3150e22e2fb906778c629e5ff33280d59e341139124e8d42471ba007c7</i><br /><br />Threat actor <b>description</b>: <i>Lepant Law Office, PC, LLO is a successor firm to the law offices of Merrell Andersen and the several partnerships in which he was involved over his thirty-five year career as a Nebraska attorney. David Lepant carries on Mr. Andersen's legacy            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Worldlawn-Power-Equipment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22088</link>
<guid>bb63947c75d49061c743a2ae53cc1787</guid>
<pubDate>Mon, 17 Mar 2025 21:31:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Worldlawn-Power-Equipment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7ddeefc3bf9a7af1c80ae9e5f02941c2006e6e9a1a4eb3e004992ebf27b7a4b3</i><br /><br />Threat actor <b>description</b>: <i>Based in Beatrice, Nebraska, Worldlawn Power Equipment emphasizes quality machines at a great value. Worldlawn Power Equipment manufactures outdoor power equipment that currently includes professional and residential lawnmowers and snow throw            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Diode-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22089</link>
<guid>06c35f4da8a8d973fe3c611ec1fb7b49</guid>
<pubDate>Mon, 17 Mar 2025 21:31:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Diode-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>08e3ab2da01a1befcff45d24dc11389e9e1c7c98ca2e614ca47583b5a703eba4</i><br /><br />Threat actor <b>description</b>: <i>Diode Technologies based in Lincoln, Nebraska, specializes in smart home and commercial technology solutions, offering products such as lighting control, motorized window treatments, security systems, and home theater setups.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>terrell.k12.ga.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22092</link>
<guid>2a63aaefec8b7491fde3ac929c1ffd14</guid>
<pubDate>Mon, 17 Mar 2025 18:41:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>terrell.k12.ga.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f7b24c8d08720ad11cb9d32cc9989f6c8e022c039b99364a07b2c9b11a00c31</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>terrell.k12.ga.us</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>oneill.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22085</link>
<guid>314426bd564599865c676dbb6dc198c4</guid>
<pubDate>Mon, 17 Mar 2025 17:09:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>oneill.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9cfeab29ab7614e8411aa7fdec9e56ba15d22b3b4a61175471e7495c18909019</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>oneill.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.cityofbellville.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22080</link>
<guid>ec390e445f99f5d8c57a847f02552fbc</guid>
<pubDate>Mon, 17 Mar 2025 12:55:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>VanHelsing</b> claims attack for <b>www.cityofbellville.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2d4488aefc5d3d0818d85ea0abf460b06c839ae32da28952a79e1e0540d4e91d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.cityofbellville.com</i>]]></description>
<category>VanHelsing</category>
</item>
<item xmlns:dc='ns:1'>
<title>kyb.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22079</link>
<guid>0406576f71bdf8cdb29942cd5c1548c7</guid>
<pubDate>Mon, 17 Mar 2025 11:52:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>kyb.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f8c21d43a32c43e6d91f2d59c6c26c04973f7039e1829c435e76f7d920743934</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>kyb.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lake-Psychological-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22060</link>
<guid>23f1d15c461a87be388777aef426538a</guid>
<pubDate>Sun, 16 Mar 2025 21:26:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trinity</b> claims attack for <b>Lake-Psychological-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6fd31a054b71f7c8bc660945ae008f39c0c93b3e15db13b3c4877b9a655ab42a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>lakepsych.com</i>]]></description>
<category>trinity</category>
</item>
<item xmlns:dc='ns:1'>
<title>CANAM-Realty-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22059</link>
<guid>c1aa31664c1569818b0494c32981bc4f</guid>
<pubDate>Sun, 16 Mar 2025 21:24:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trinity</b> claims attack for <b>CANAM-Realty-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f0b5443df36a0c0436dee9a3d26d37a8fbe588bb175f5c79f1ab9035a9d81e2d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>canamrealty.com</i>]]></description>
<category>trinity</category>
</item>
<item xmlns:dc='ns:1'>
<title>CNS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22058</link>
<guid>c7e791b16611deca87a347c22ce64e11</guid>
<pubDate>Sun, 16 Mar 2025 21:23:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trinity</b> claims attack for <b>CNS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1aa9d8a165159cf63a3044b3519f4bf678defb04644a400d58b2454cde054e0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>neurosupply.com</i>]]></description>
<category>trinity</category>
</item>
<item xmlns:dc='ns:1'>
<title>la-z-boy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22057</link>
<guid>939a391a1ac9a3431f2d78e83bd8b856</guid>
<pubDate>Sun, 16 Mar 2025 21:21:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trinity</b> claims attack for <b>la-z-boy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2351ef38e74809eee3d5cbbb9788e134b57d22dc27a49ae711f1e8759dd52ca7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>la-z-boy.com</i>]]></description>
<category>trinity</category>
</item>
<item xmlns:dc='ns:1'>
<title>SRP-Companies-Second-lock--Company-scam</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22054</link>
<guid>e3f8cedce7f1fa45b35ceccfdcb7249f</guid>
<pubDate>Sun, 16 Mar 2025 20:31:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>SRP-Companies-Second-lock--Company-scam</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8dfc8e6ffe0658165c389c8850b897165c86c4ac6fac1b69aae2a04f4341d0a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>srpcompanies.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Coldwell-Banker-DAnn-Harper-REALTORS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22053</link>
<guid>950a8aff103afad782f73cd0a48f912a</guid>
<pubDate>Sun, 16 Mar 2025 20:30:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Coldwell-Banker-DAnn-Harper-REALTORS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>396ca76f89a36e62c91fa2c16a71c86dfab115bd92899262b3bc677a3d182de2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.ameda.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22046</link>
<guid>27c2eee02ba24911d6d88b05da1340f2</guid>
<pubDate>Sun, 16 Mar 2025 16:50:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.ameda.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d7ffc00c8e1111826ebca62883c1ac58a14cbf2b297f219e4feb7fd2f1ab4706</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Courageous-Home-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22043</link>
<guid>40e058330f014c529b23bcb157f7da4a</guid>
<pubDate>Sun, 16 Mar 2025 12:56:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Courageous-Home-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e02921de81190d63036dfc4527216fe7f6fe5f029f6b8fd4c140107c0bb745d5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fulcrum-Lifting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22026</link>
<guid>2bec3f7f8208e144c8fa1484d642eb47</guid>
<pubDate>Fri, 14 Mar 2025 23:10:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Fulcrum-Lifting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd084d8fbd8bc5a2e77987936285732a39233b31e42b37410b947c89dba0d274</i><br /><br />Threat actor <b>description</b>: <i>Fulcrum Lifting specializes in the distribution of lifting and rigging parts, pr...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Perrigo-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22029</link>
<guid>69930733ad15478fdd5332faf5a3a662</guid>
<pubDate>Fri, 14 Mar 2025 22:20:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>termite</b> claims attack for <b>Perrigo-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1fa2dbb0d0cf5207ef4a190035dde7a270ae37c78c52f031fe05b8e983ab701d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.perrigo.com</i>]]></description>
<category>termite</category>
</item>
<item xmlns:dc='ns:1'>
<title>Unicorr-Packaging-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22024</link>
<guid>d5cc7743b1af1094b27afd0cccd8faee</guid>
<pubDate>Fri, 14 Mar 2025 18:11:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Unicorr-Packaging-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>15df0ba2590dbb28292d27d69d45bc990e87fe5a5e2be0addac29a80784b8e65</i><br /><br />Threat actor <b>description</b>: <i>Unicorr is among the largest converters of custom corrugated products and protective packaging in the Northeast.We are ready to upload more than 90 GB of essential corporate documents such as: financial data (audits, payment details, reports), corporate NDA’s, contact numbers and e-mail addresses of employees and customers, corporate licenses, agreements and contracts, internal corporate correspondences, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>idcconstruction.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22025</link>
<guid>62509b585210b8dd3e871ca3c23f186b</guid>
<pubDate>Fri, 14 Mar 2025 16:50:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>idcconstruction.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b0d60b525fdec2f19e78ed534fecef21a7951d4e67aa766ff265cdce0fb6d68</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>jennyyoo.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22020</link>
<guid>47f64e755012d2865986a027f473d3c3</guid>
<pubDate>Fri, 14 Mar 2025 14:46:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>jennyyoo.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4145f9ccb51ae93044807f669e88958617c5d5d1e5e2f5464e63ef1cc6f0d120</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Karen-S-Pouliot</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22016</link>
<guid>fd22a77ffd3cc179b3c1407d6ea0637b</guid>
<pubDate>Fri, 14 Mar 2025 09:30:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Karen-S-Pouliot</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c99bc1eadb42509db573351fe2a201085f0e9d8518de93ca76fbf717fd325de</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>tpacpafirm.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cothrons-Security-Professionals</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22013</link>
<guid>2d1fc7492245772b81ed0555881afc31</guid>
<pubDate>Fri, 14 Mar 2025 08:49:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Cothrons-Security-Professionals</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>16d30328bbb80134ef648dc8d9c159404ff14d315a3804706991a05613cf86b3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Terralogic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22010</link>
<guid>6b913a2317d00f7bfa0abdaff1a1f67f</guid>
<pubDate>Fri, 14 Mar 2025 07:35:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>secp0</b> claims attack for <b>Terralogic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ba566f66a33af820dbe38f1974ac9b1ab870502d24570d376ffe7cb94ec08c1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>terralogic.com</i>]]></description>
<category>secp0</category>
</item>
<item xmlns:dc='ns:1'>
<title>dtrglaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=22000</link>
<guid>fb4ea06503aa04a60eb1988bd67ecbde</guid>
<pubDate>Fri, 14 Mar 2025 04:52:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>dtrglaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>49e7a4b4714a9b5699941af113e4a20c300796287bd5488fb101d5ce6d01b56f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>SL-Tennessee-Information</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21999</link>
<guid>bc9896c35a1d00719db5cfcbeec66f5b</guid>
<pubDate>Fri, 14 Mar 2025 01:41:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>SL-Tennessee-Information</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c261f7e838f690b1bf4f7c81306aea465581578fb9c05b48eef677a5accda93</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Harrells.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21997</link>
<guid>7735e310a8f8a4de2430338dfae18359</guid>
<pubDate>Thu, 13 Mar 2025 23:11:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Harrells.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5085d07029eb5fb28006f0a2261bf894e5e6b3aa8f731c3b211de1206da6faf6</i><br /><br />Threat actor <b>description</b>: <i>Based in Lakeland, Florida since 1941, Harrells is a leading producer and distri...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Best-Cheer-Stone</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21998</link>
<guid>309d36bfe0e77374deeb836355f8db23</guid>
<pubDate>Thu, 13 Mar 2025 22:46:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Best-Cheer-Stone</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a62d6b14ba63269f4081ff65d50e65a24416ba8217dd4ed65c5bc2e0b828bc7e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>fstlogistics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21995</link>
<guid>6c0ffea2dc26e3e5f85302514be3c697</guid>
<pubDate>Thu, 13 Mar 2025 22:13:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>fstlogistics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e53ad1adc90d86d0725377b44d275a1fa9a114c35aaf28534a903882ffcdfd8a</i><br /><br />Threat actor <b>description</b>: <i>Based in Columbus, Ohio, FST Logistics first opened its doors in 1991 with 11 co...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>World-Wide-Fittings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21993</link>
<guid>cda6eea50e92e0d0b6d22b6b54364ff0</guid>
<pubDate>Thu, 13 Mar 2025 20:18:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>World-Wide-Fittings</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>82e05c79afbc764fc6a65f24e7d1df9d5d0eb208037fcd012921b82f0fbf074a</i><br /><br />Threat actor <b>description</b>: <i>Over 600 gb of data stolen from their servers . data will be avaible for download in 48 hours .

From it’s founding in 1950 as World Wide Supply, World Wide Fittings has grown into a global manufacturer of steel and stainless hydraulic tu            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>University-Diagnostic-Medical-Imaging-PC-udmi.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21991</link>
<guid>729b4e7a67f295ec3b2b0ba1e08f2547</guid>
<pubDate>Thu, 13 Mar 2025 06:58:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>FOG</b> claims attack for <b>University-Diagnostic-Medical-Imaging-PC-udmi.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3d8157c7c379025197ed731aae5812b2cc91d0babb4d6ee66bdcf1764530e06</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>FOG</category>
</item>
<item xmlns:dc='ns:1'>
<title>El-Camino-Real-Academy-elcaminorealacademy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21988</link>
<guid>fe4e2a8a9740bc9311616fc08781fcf9</guid>
<pubDate>Thu, 13 Mar 2025 01:00:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>El-Camino-Real-Academy-elcaminorealacademy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9329aedf51e904099f79ade0e663f280b634d68c7260c7dca859d093641b2b3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Baily-International-of-Atlanta</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21982</link>
<guid>f997c52f51d33af5ee690d9455bb6a90</guid>
<pubDate>Wed, 12 Mar 2025 23:49:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Baily-International-of-Atlanta</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6659c7d5dc5d11ccea19b2209d1358f1729864d99da65f8a282cc964b1b1a901</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>bailyatl.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Yushin-America-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21973</link>
<guid>dbe99818c3b2e453bc03e6fd610d2596</guid>
<pubDate>Wed, 12 Mar 2025 17:18:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Yushin-America-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d4fa90a034e4489deed5249ffdd06078ab45de336abdf3077c2a6c06cbf6610c</i><br /><br />Threat actor <b>description</b>: <i>Yushin America, Inc. was established in 1988 to support North American sales. Yushin America has 70,000 sq. feet dedicated to manufacturing robots and custom downstream automation. Design; fabrication; assembly; runoff; testing; final packagi            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>baillie.com130.5MUSA52GBlt1-DISCLOSED</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21964</link>
<guid>36e0c72e6254a2992a95c193194f52a5</guid>
<pubDate>Wed, 12 Mar 2025 14:45:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>baillie.com130.5MUSA52GBlt1-DISCLOSED</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>743abf8ddf934a156875f564d00e39be8a47b4cec4da1fe997bcb5ac4789f94f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>CAHOKIA-CUSD-187-SCHOOL-DISTRICT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21956</link>
<guid>d91f7910cd3924264d0a7732a94a624b</guid>
<pubDate>Wed, 12 Mar 2025 14:21:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>CAHOKIA-CUSD-187-SCHOOL-DISTRICT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3dfd5e6a3f2d8aafb40d4342890bd0755c000766b15551f83675978dbf1b9233</i><br /><br />Threat actor <b>description</b>: <i>All data will be published on Mar.19.The Cahokia Unit School District Board of Education and the Superintendent of District #187, through an active partnership with its parent and community, will support a system of educational excellence.  W            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Indastrial-Acceptance-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21965</link>
<guid>c6945f4391acfd9319dcd33b120a174f</guid>
<pubDate>Wed, 12 Mar 2025 14:18:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Indastrial-Acceptance-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63844431980e60684b521e4533698a0b2aadead0eb065b77ec5f4b4cfeb85284</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>tempel.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21968</link>
<guid>597eda37c5212c69192a465bdfbcfe4a</guid>
<pubDate>Wed, 12 Mar 2025 13:58:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>tempel.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>553fc8675886c57b24fa7a49bac70f38b2046fae11757533fa6442fc6cbfc5f6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>tempel.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Peerless-Food-Equipment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21959</link>
<guid>4eed5c7364331eec1dff54ecd7811999</guid>
<pubDate>Wed, 12 Mar 2025 13:22:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Peerless-Food-Equipment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>523d583be2a5721e92f03e1e68904725b7683869a96a9a029ffc8f8bea44c0e3</i><br /><br />Threat actor <b>description</b>: <i>Peerless Food Equipment is a food equipment company dedicated to creating value for the world’s leading wholesale bakeries and commercial food processors by developing and applying innovative technology for excellent solutions. We are ready to upload more than 200 GB of essential corporate documents such as: financial data (audits, payment details, reports), corporate NDA’s, contact numbers and e-mail addresses of employees and customers, confidential licenses, agreements and contracts, passport scans, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>thermoid.com183.2MUSA199GBlt1-DISCLOSED</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21961</link>
<guid>02d796bfb1ab131efd76050ff25865b6</guid>
<pubDate>Wed, 12 Mar 2025 13:01:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>thermoid.com183.2MUSA199GBlt1-DISCLOSED</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e753e29069c54dd53eb9a59fb84fd82887cd4984cb9574f3ebf3f150601b095d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>rocketstores.com738.9MUSA3.2TBlt1-DISCLOSED</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21950</link>
<guid>1c443504f12339512726b931d14dda8c</guid>
<pubDate>Wed, 12 Mar 2025 10:49:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>rocketstores.com738.9MUSA3.2TBlt1-DISCLOSED</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1595d3af342a781e79ff9adbd7f2b7369a0a150e1ce3fa069e1ff590d0d36da</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>urban1.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21966</link>
<guid>739025f319bf2fc8ecafa26f547defbc</guid>
<pubDate>Wed, 12 Mar 2025 10:47:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>urban1.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>377f46ce5211a0bca819ac35268a3864a5805528cadfad9aa16aebb55b3a234d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>urban1.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>tradingacademy.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21943</link>
<guid>eb40887da3e98ba4f3708f84521ae52f</guid>
<pubDate>Tue, 11 Mar 2025 22:55:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>tradingacademy.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36b0bbe2ca35d4cceebf81cb0a97b82668cce94ecaa76222ace2c17311e45d14</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>tradingacademy.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>ultimateclasslimo.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21942</link>
<guid>c8235aaa18ac5ba6964391cc3f5cd9dd</guid>
<pubDate>Tue, 11 Mar 2025 22:53:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>ultimateclasslimo.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8134851d4b72100782567cf6dfef172f964c84eb3c8cadf06fc6e66819e8df86</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>ultimateclasslimo.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>lgipr.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21940</link>
<guid>bceacbc22b52047beb978db6f5e869ce</guid>
<pubDate>Tue, 11 Mar 2025 22:52:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>lgipr.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d16cf6137125f987049fc1895b4d37d9b931b789fe43b0d20f02d3415f7741d9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>lgipr.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Skyward-Specialty-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21936</link>
<guid>5f5ffbe75132e2154371f842f946c4e1</guid>
<pubDate>Tue, 11 Mar 2025 22:03:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Skyward-Specialty-Insurance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5521f2aa0073655bdae129fba3f2a8e14fc295e37faf8d40832a7830fa2420f5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>skywardinsurance.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trymata</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21935</link>
<guid>9e87605e4f61ce50f8a510e663f4a644</guid>
<pubDate>Tue, 11 Mar 2025 22:02:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Trymata</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>64cc86c77ac8fb42df924e6b821c0e90c591148006c225b43f52a05162a2f008</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>trymata.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gaines-County-Texas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21932</link>
<guid>dbd18fe1f4137d8e0a0cfb72376985ef</guid>
<pubDate>Tue, 11 Mar 2025 20:48:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Gaines-County-Texas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd05b01654555df3ffc40b9f2ad480327924efee26891fc65b721825c8e41316</i><br /><br />Threat actor <b>description</b>: <i>Gaines County Courthouse

101 South Main

Mailing Address:  P.O. Box 847

Seminole, Texas 79360

(432) 758-5411</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Springfield-Water-and-Sewer-Commission</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21933</link>
<guid>a8fb991b9f4b68a5475513a61f02593c</guid>
<pubDate>Tue, 11 Mar 2025 20:04:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Springfield-Water-and-Sewer-Commission</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ced78f65d8922c605ec5baac8c121b6959ebc83b43eb27bcfe981901307207be</i><br /><br />Threat actor <b>description</b>: <i>Documents.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Longue-Vue-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21926</link>
<guid>aa1a0b81305f12fce0e4946825c8cc7e</guid>
<pubDate>Tue, 11 Mar 2025 18:04:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Longue-Vue-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>21dcd10a7da123dd8f964384bfee9ace68591c1723dfcac47d1360d6e239faff</i><br /><br />Threat actor <b>description</b>: <i>Longue Vue Club is one of the Pittsburgh area's oldest country clubs. Situated o...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>WAUGH--GOODWIN-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21924</link>
<guid>459cd7c0d6a30fe025892b2f443a8edf</guid>
<pubDate>Tue, 11 Mar 2025 16:03:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>WAUGH--GOODWIN-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>66471e07d6e0bdb34b0e292389999d97dc715d7dad3b81efb5b862849eaa2d4a</i><br /><br />Threat actor <b>description</b>: <i>Waugh & Goodwin, LLP is a local CPA firm in Colorado Springs providing audit, tax and consulting services.We are ready to upload more than 120 GB of essential corporate documents such as: internal correspondences, contact numbers and e-mail addresses of employees and customers, personal driver licenses, passports and other employee and customer documents, employeeSSN’s, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Veristat</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21921</link>
<guid>78e249f2f806ede8a4f3bd522f3035c2</guid>
<pubDate>Tue, 11 Mar 2025 14:25:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Veristat</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>135dde0d61dff990344518ec615c125455b483b617c8e5e46f674adb7cd4a2a7</i><br /><br />Threat actor <b>description</b>: <i>Veristat is the science-first full-service drug and biologic CRO and consultancy that integrates strategic planning, regulatory expertise, and clinical trial execution to rapidly advance the mostcomplex or novel therapies. We are ready to upload more than 63 GB of essential corporate documents such as: HR documents, contact numbers and e-mail addresses of employees and customers, medicare documents, customer medical documents, confidential licenses, agreements and contracts, financial data (audits, payment details, reports), etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Essex-County-OBGYN-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21923</link>
<guid>6d7c8fcb2f7a9e4126a6be9777c5ca49</guid>
<pubDate>Tue, 11 Mar 2025 13:04:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Essex-County-OBGYN-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a56fcc3402c1afb762f66b4c1d6458d6bb30c68214fd4a8516757d1616111dd</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Princeton-Hydro</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21919</link>
<guid>8eb6146109901d8476f13b19f5706203</guid>
<pubDate>Tue, 11 Mar 2025 12:27:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Princeton-Hydro</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fea27c3d02ec25aa5c340daf104ebfdd1896cbe4902c2e30c49853916041fe28</i><br /><br />Threat actor <b>description</b>: <i>Princeton Hydro has provided unparalleled consulting services in the assessment, management, and restoration of our planet's important water, wetland, and soil resources.We are ready to upload more than 324 GB of essential corporate documents such as: contact numbers and e-mail addresses of employees and customers, passports and other employee and customer documents, financial data (audits, payment details, reports), internal correspondence, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>lexmark.com-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21916</link>
<guid>7f7c931315f7f6d9630177949243d2e2</guid>
<pubDate>Tue, 11 Mar 2025 02:52:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>babuk2</b> claims attack for <b>lexmark.com-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38e5f15d417fe1f46b9c46dfb5be2922e41c071c46183d2b48025c9e8fd453a4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>babuk2</category>
</item>
<item xmlns:dc='ns:1'>
<title>Magnolia-Manor-magnoliamanor.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21911</link>
<guid>f5c981c11d76faa6f95e9dfad16e3eb9</guid>
<pubDate>Mon, 10 Mar 2025 23:55:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Magnolia-Manor-magnoliamanor.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f4ab48b72dcd6c6831dcf53939cc94b30ee15285dafdd61319cb1fc8f15984c2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>magnoliamanor.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>fredsalvuccicorp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21905</link>
<guid>6e315707bfe8c9809f10e7336a2455a2</guid>
<pubDate>Mon, 10 Mar 2025 19:32:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>fredsalvuccicorp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1bd7e274beb6e1db3e0bece040816118b86bfaf5db9127576e96af92a0483cc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>fredsalvuccicorp.com</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>GARANIMALS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21893</link>
<guid>b1d69d7f6eceef8700a1dc70160ec0ff</guid>
<pubDate>Mon, 10 Mar 2025 16:47:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GARANIMALS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fdbeb6dd7fc3ef94a2ab2ee1d7d04f5b763fceb541b050888addcce5c707a14f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Callico-Distributors-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21895</link>
<guid>280433a363394d3a259d0d1044b86afc</guid>
<pubDate>Mon, 10 Mar 2025 16:28:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Callico-Distributors-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6569aef82d2cd4c4e0621321f0c14e6b6c7a890e6428e5e5753a3b907ec0f36</i><br /><br />Threat actor <b>description</b>: <i>Callico is New England's independent redistributor of janitorial,food service & industrial products.We are ready to upload more than 32 GB of essential corporate documents such as: confidential licenses, agreements and contracts, financial data (audits, payment details, reports), internal correspondences, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Safe-Strap-Company-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21890</link>
<guid>f0d15faf5024b8835ceef5548c062f56</guid>
<pubDate>Mon, 10 Mar 2025 14:29:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Safe-Strap-Company-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>00d114322b6e0aab8a6c33213edb0cb0742882f24eae59f26498170ed4aede44</i><br /><br />Threat actor <b>description</b>: <i>Safe-Strap Company, LLC mission is to provide our valued clients with the most innovative products and the highest quality of service to make shopping safe and convenient just as we have since wewere founded three decades ago.We are ready to upload more than 10 GB of essential corporate documents such as: corporative NDA’s, contact numbers and e-mail addresses of employees and customers, financial data (audits, payment details, reports), confidential licenses, agreements and contracts, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fickling--Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21891</link>
<guid>598e989a5706e1ab5cea5e65598d2125</guid>
<pubDate>Mon, 10 Mar 2025 13:28:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Fickling--Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ba6c00cca38f308bb0efbba3200f098aabee3535a758e4db947a933a45f8e1d</i><br /><br />Threat actor <b>description</b>: <i>Fickling & Company is a regional real estate services and development firm headquartered in Macon, GA.We are ready to upload more than 70 GB of essential corporate documents such as: corporate NDA’s, personal SSN’s. credit cards with CVV numbers, confidential licenses, agreements and contracts, passport scans, health care certificates, contact numbers and e-mail addresses of employees and customers, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Loretto-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21892</link>
<guid>c2a71acc0925c43163b18d7d2c7877aa</guid>
<pubDate>Mon, 10 Mar 2025 13:01:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>The-Loretto-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac19d3d62703a0c4e48d0b825fc20f63f9a525f7dda1830b2f9a64ff4652236e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>ACTi-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21875</link>
<guid>4849ef4e3811c4b64c2029b7f6f67139</guid>
<pubDate>Sun, 09 Mar 2025 21:28:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>ACTi-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e22d59d6510455493162f899fcb343717e9aa8c06b855dffd076b1d6d9a6cd5</i><br /><br />Threat actor <b>description</b>: <i>ACTi is an expert in IP video analytics solutions for security management, oper...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>E-Leet-Woodworking</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21883</link>
<guid>947f1a3a5122ba00b91e95a516295359</guid>
<pubDate>Sun, 09 Mar 2025 20:23:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>E-Leet-Woodworking</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>35ccbb43cfe1d7f8cfb615cc64863560880cc2dff69c91eaeeb4dfd7e087800d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>eleetwoodworking.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Customer-Management-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21879</link>
<guid>5d28f6eb169ebb83117ffd6b05518fc4</guid>
<pubDate>Sun, 09 Mar 2025 20:21:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Customer-Management-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>358df2e0014e2454a2d631ab8cf861b249f02506cc0be4151155e15ee0d755d6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>emperors.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21885</link>
<guid>9ec53bd19dd81ddd33912cf4003aa035</guid>
<pubDate>Sun, 09 Mar 2025 19:34:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>emperors.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a323e7a660e1a5990d0c1eacfece6ed2f30e60bbd6302ceb62764921b10aee4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>emperors.edu</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>BerksBar.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21876</link>
<guid>0ead0dd9d2b345a1fe8507437245d8f8</guid>
<pubDate>Sun, 09 Mar 2025 18:07:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>BerksBar.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>069c1277d370692ee252b135031e1e0c06742f65bcff863feb8cb58728de30a9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>BerksBar.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>williampevear.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21877</link>
<guid>e778f5c84ed2c8a8dbc05418c90732e3</guid>
<pubDate>Sun, 09 Mar 2025 18:05:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>williampevear.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1b2d1236ff4000deb9ae2f5d1b5efc299e1f6f692a59cf81a7bef74d1c62222</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>williampevear.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clawson-Honda</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21861</link>
<guid>d29ac33c25a1fe0e50c3c105ab8675a6</guid>
<pubDate>Sun, 09 Mar 2025 14:41:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Clawson-Honda</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>554becf9b187f3579594bb67f88e5ed89ba939d68f67fe5d059a6ae1763b9961</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>State-Bar-of-Texas-www.texasbar.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21862</link>
<guid>03c2e5ba2237492b40ec20354a9a4f03</guid>
<pubDate>Sun, 09 Mar 2025 13:32:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>State-Bar-of-Texas-www.texasbar.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2351b3cffb613f4a37db98d16058db228d5786f30b99891303a143d812fc0952</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.texasbar.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Greenwood-Village-South-GVS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21863</link>
<guid>a2bc9a43d2ec3fb9faf05fa563c89515</guid>
<pubDate>Sun, 09 Mar 2025 13:31:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Greenwood-Village-South-GVS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60eb9e77fc05b279096af7cdcce076f3ff2df18aa08a83dd92dc9d498a4cd7db</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Buckley-BalaWilson-Mew</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21860</link>
<guid>b12b951661a93ed0d2e605f076f54693</guid>
<pubDate>Sun, 09 Mar 2025 12:52:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Buckley-BalaWilson-Mew</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e827d60b7d8bfdb1069bbece583e1ab65511a1ea395937be8206114126f18b8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jerue-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21873</link>
<guid>4ddb6f74a1c9119602bc9053b5f2b4f3</guid>
<pubDate>Sun, 09 Mar 2025 12:52:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Jerue-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2459cef1274ef95bf3cd4797665a7dd50ee1159e96e3b15c288b13be0d94a53e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.jerue.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Compound-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21871</link>
<guid>460eb45f1f9b67a58c96a73be551f37b</guid>
<pubDate>Sun, 09 Mar 2025 12:49:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Compound-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>430613a42e0b0518338c326051ee7efdfae353cd96fd8bf183480e9b5a3305a5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.compoundsolutions.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>T-J-Machine--Tool</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21870</link>
<guid>3ac44bdb7fb0bbd5c8b3f4db0218d05e</guid>
<pubDate>Sun, 09 Mar 2025 12:47:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>T-J-Machine--Tool</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f981cb60855c2fb03fe23785153f460fec8afe141658613a97a05f96cc35e757</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.tjmachine.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gevril</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21869</link>
<guid>a2009556541dfee38d822cf642d80b8c</guid>
<pubDate>Sun, 09 Mar 2025 12:46:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Gevril</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b2cfcd21c99b3bf49ab381b59b50d05e98ed858a9a0a4a3e6bb2a4e7eeb8e7d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.gevril.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Peak-Season</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21868</link>
<guid>c05a343d88e2cac7ad9bd5f347189c62</guid>
<pubDate>Sun, 09 Mar 2025 12:44:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Peak-Season</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c8886429c35723e5e120aab9908857c14a30ade85e212bda11deccf4c387eb1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.peakseasoninc.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Yorke--Curtis</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21867</link>
<guid>8854e85268e5bfb9fa2b5d70798a987a</guid>
<pubDate>Sun, 09 Mar 2025 12:43:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Yorke--Curtis</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d725d7f62d5ba4bc3ba5ab128eaeb1f33a511ef76baa20423db02c1849c02024</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.yorkeandcurtis.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Holiday-Comfort</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21866</link>
<guid>86f48b1de523b6159630d09f56f31f1f</guid>
<pubDate>Sun, 09 Mar 2025 12:40:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Holiday-Comfort</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f607188e530ee0cf86dc6fcd33b60263fd52025dcd014fe93b8f7b6a7018536</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.scofcharlotte.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dectron</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21865</link>
<guid>1d715bae5c24c728757dc4de28ae388f</guid>
<pubDate>Sun, 09 Mar 2025 12:36:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Dectron</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96b2dcd84c7723ca9e00dc4708f2d7852c83fb03dc96062c2c2ea5bfc643a9fa</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.dectron.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.dcarosolutions.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21850</link>
<guid>694bb32b1ebbc8b4d3fc29bee5d1455c</guid>
<pubDate>Sat, 08 Mar 2025 22:46:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.dcarosolutions.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>620dd6b20a70b4f0707818606d62c48b3c84817c23cd81f7c3138c5a55f0efd7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>mitchellmcnutt.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21849</link>
<guid>8d618f48515500cd702cc305ee80acf1</guid>
<pubDate>Sat, 08 Mar 2025 20:43:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>mitchellmcnutt.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>519612c9e12b1f31aba3a7df3dcb1c7552fbeb7fdbfe8fbbefb9393cab954619</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.jpwindustries.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21848</link>
<guid>e38668311c8b85421dfdaf8e3c883588</guid>
<pubDate>Sat, 08 Mar 2025 08:48:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.jpwindustries.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d260430542d30542b763b16b27f34b6b2085da92a65397c135c7a25d333cc5cb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tech-NH</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21843</link>
<guid>f4e6bccbee6057b26de5f252fa76f847</guid>
<pubDate>Sat, 08 Mar 2025 01:29:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Tech-NH</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5d0343259d440769cb2ea48eef53d5a6ca1157f5d2919ee4d9691a00d4a03ce</i><br /><br />Threat actor <b>description</b>: <i>TechNH has evolved dramatically since we opened our doors more than forty years ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Allworx</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21847</link>
<guid>d140b46b9030bd231b950b3e6cf02ee4</guid>
<pubDate>Fri, 07 Mar 2025 23:47:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Allworx</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>591a29ae45de202c0b3a1ea1194be082e24c767b1511c5c924862425b770f472</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Island-Realty</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21845</link>
<guid>36c0482a72d18277c1ed8e89ebe1feff</guid>
<pubDate>Fri, 07 Mar 2025 23:46:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Island-Realty</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>85e54006a772d1482b9b33eaf699f54d49b4a8af4bebf2ed9a9da289e4e43f5a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Minnesota-Orthodontics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21846</link>
<guid>7085e5152593f9661190914a2a094a42</guid>
<pubDate>Fri, 07 Mar 2025 23:45:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Minnesota-Orthodontics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>148d6a40854c960cac0fd93e50e09a0b745d148b9ff6f8bc23e2812d958b0f59</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hancock-Public-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21844</link>
<guid>31f0a067ca77d80b3704aee9141bc2ea</guid>
<pubDate>Fri, 07 Mar 2025 21:23:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Hancock-Public-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6398ea8cfd45cfebe4cb44a9066dd540c0d649b1eb5dfb7f431f10121e821563</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https:hancock.k12.mn.us</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.cdg.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21834</link>
<guid>a7089a9374897ec2b499e275f31fea10</guid>
<pubDate>Fri, 07 Mar 2025 16:28:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.cdg.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8a69a5a2112cb37f2474535805195100547727168e1e3a16dc404a88554c4001</i><br /><br />Threat actor <b>description</b>: <i>We are an operator-driven OSS/BSS provider with 250+ years combined support experience at your fingertips. Our top executives don’t just run CDG, they also run a service provider. As a company owned and operated by a broadband provider, we             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>bayvillage.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21836</link>
<guid>14663816a87ff1539e548004e8c4c7be</guid>
<pubDate>Fri, 07 Mar 2025 14:43:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>bayvillage.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a6a3e02d44cc15f17423708d746fe9fdcfb1dbae441783b5bd735c06a33b0be</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sittab-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21831</link>
<guid>7ac0d6f2a7e643934c4c056762c37596</guid>
<pubDate>Fri, 07 Mar 2025 13:28:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Sittab-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>984df0c1434bd37eb4baa4e94df1aad0136b72a1804dee6d74c7172cba06741d</i><br /><br />Threat actor <b>description</b>: <i>The company is a world leader in the field of seating environment. The business idea is to develop and sell seat accessories in standard or customized versions. We are ready to upload a lot of essential corporate documents such as: NDA’s, employee medical documents, SSN’s, contact numbers and e-mail addresses of employees and customers, financial data (audits, payment details, reports), corporate licenses, agreements and contracts, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>wheats.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21837</link>
<guid>4e370d57ccc4153f2fd28fab7ddacd60</guid>
<pubDate>Fri, 07 Mar 2025 11:40:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>wheats.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a65bbd21dfef6786e485ccb8239231bcbc77e8522641d9e2e49b0bb3a4ba6838</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>wheats.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>RFA-Decor</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21819</link>
<guid>567431a7bb9273da729db5650a995590</guid>
<pubDate>Thu, 06 Mar 2025 22:27:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>RFA-Decor</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12dd93469276243b58134f8944416d59a16ea8652a225ab1072b92dac2c0e0ed</i><br /><br />Threat actor <b>description</b>: <i>Reshaping spaces globally for homes, business & retail clients with diverse offerings & customized solutions since 1979.We are ready to upload a lot of essential corporate documents such as: driver licenses, confidential licenses, agreements and contracts, internal correspondences, contact numbers and e-mail addresses of employees and customers, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Central-Electropolishing-Company-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21824</link>
<guid>48016f549dbc03c0e12190363e687c27</guid>
<pubDate>Thu, 06 Mar 2025 22:25:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>weyhro</b> claims attack for <b>Central-Electropolishing-Company-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7ac6b9085390ca7d7d197423e2a6ffa77cc9639bcb97a19fe17a54c1df6e4085</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>celcoinc.com</i>]]></description>
<category>weyhro</category>
</item>
<item xmlns:dc='ns:1'>
<title>MBI-International-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21823</link>
<guid>8f698d6fd2865cc064cdfa8b2c5c9c3f</guid>
<pubDate>Thu, 06 Mar 2025 22:21:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>weyhro</b> claims attack for <b>MBI-International-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db3a843483f1f42d5d42d211e95c840617bdde4c12b400d492cd0e28d810edea</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>mbitoner.com</i>]]></description>
<category>weyhro</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tugwell-Pump--Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21812</link>
<guid>82aafca3e03771835c2e1acb19fde2d4</guid>
<pubDate>Thu, 06 Mar 2025 19:28:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Tugwell-Pump--Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6759b9c9945a3a0722d479ef82e2aec7acc01ce452550927fe68bbf56bac0044</i><br /><br />Threat actor <b>description</b>: <i>With offices in Pensacola, FL and Mobile, AL, we specialize in submersible, grin...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.portlandschools.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21820</link>
<guid>00509e33150cba19d677c83ad03febae</guid>
<pubDate>Thu, 06 Mar 2025 19:07:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.portlandschools.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>006834aca137d9a517cff91a5f241ea2480115cc39e98a420a65596960a6c725</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.portlandschools.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.hinton.ca</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21821</link>
<guid>d950e8c6b584dfac7d569aacf43519a7</guid>
<pubDate>Thu, 06 Mar 2025 19:05:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.hinton.ca</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8fc24977ee4c82fe785a6cffcbb9e18310e87ac29a4a5192a60800abbe25d844</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.hinton.ca</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>agi.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21810</link>
<guid>5e1e1ad0d8c3c391a6a591b45b23e185</guid>
<pubDate>Thu, 06 Mar 2025 16:52:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>agi.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5d97d60dca57a3a36a23cb45ce39c023fe856cf31fc65fdda80670c97c36a37a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.centersheetmetal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21813</link>
<guid>2fae3af07a8228d1d41c509494c4b461</guid>
<pubDate>Thu, 06 Mar 2025 16:38:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.centersheetmetal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f11509a0d9102742798d888d5926777040c71042b71012e10532fa55f9862b5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.centersheetmetal.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>hickorylaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21817</link>
<guid>a4d93371a3aecc3e693cd34443bfdbda</guid>
<pubDate>Thu, 06 Mar 2025 16:35:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>hickorylaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b72868445d27caa015256cc8d64baf0e4955fcffa9bd39ac6eb51fa28d29780</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>hickorylaw.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dynamic-Closures</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21806</link>
<guid>266710f17eae1ddcdbd353dc54f49f01</guid>
<pubDate>Thu, 06 Mar 2025 16:34:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Dynamic-Closures</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ddf7574701c82c2a5f6b80fff9c6f04e151eea84c89bb5759aea8fcfb70bab0f</i><br /><br />Threat actor <b>description</b>: <i>We place our Customer's needs above all else, always exceed their expectations. ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>lovesac.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21818</link>
<guid>a3d102cbbb0c4b3b8f0f4bcac52072e6</guid>
<pubDate>Thu, 06 Mar 2025 16:33:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>lovesac.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8c4c76d6db8f103312b9f9e475714b8f9b365d12526b9f569411749a9e8386b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>lovesac.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>WJCC-Public-Schools-wjccschools.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21815</link>
<guid>618d8cb4eae98f783b4285e692e91d38</guid>
<pubDate>Thu, 06 Mar 2025 15:52:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>WJCC-Public-Schools-wjccschools.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8ab54bdbeca9af25e11030ba45d5258d7ee5d039347a7b78d973f33e5600161</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>wjccschools.org</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Connekted-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21816</link>
<guid>1a93e014eafe8cbab4f4d54ee030ad66</guid>
<pubDate>Thu, 06 Mar 2025 15:15:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Connekted-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd62b42563a0cf258a2cc460a5e3c97ab3d9d94464999f45ac9d2469e9664da6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.connekted.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Naples-Heritage-Golf--Country-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21811</link>
<guid>7d3c93b7a874ca3a2fd63f325225b26b</guid>
<pubDate>Thu, 06 Mar 2025 14:42:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Naples-Heritage-Golf--Country-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c28d4abc17a40010aea431ce9718644ae97c8e090d7895b500934b233e6df460</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Oberlin-Cable-Co-op-oberlin.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21808</link>
<guid>cfdeefc98127480b07bd11d089e62bf2</guid>
<pubDate>Thu, 06 Mar 2025 12:43:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Oberlin-Cable-Co-op-oberlin.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f52040903ceea098cb2427c006add2a9effff2a69299064710b12804f6d82d08</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>oberlin.net</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Manning-Publications-Co.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21781</link>
<guid>90ee81d4b0a4e17baec9fd7956ef26b3</guid>
<pubDate>Thu, 06 Mar 2025 02:07:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Manning-Publications-Co.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c747cd123f2f43b1c650828e6d61e5e0384525077b5ef24543f5f71ec6531c9a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.manning.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>InfoReach</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21788</link>
<guid>18ebf96a2f92ee2fb5a254536239cc38</guid>
<pubDate>Thu, 06 Mar 2025 01:55:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>InfoReach</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d2db1d29289f20657484c538c058274ef8f98d36108c22ef220f263f112e052f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.inforeachinc.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Blue-Planet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21792</link>
<guid>59da4b9e77bff518243c6119241d441a</guid>
<pubDate>Thu, 06 Mar 2025 01:47:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Blue-Planet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec1f35f0ef85d4c99e0e87f79264948ee82eab866a4b59d412f91b5cafe522de</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.blueplanet.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>USGS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21777</link>
<guid>b4af620dcf393e73991770297343e60a</guid>
<pubDate>Thu, 06 Mar 2025 01:42:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>USGS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b31358bb3a0c02a71cf19cbfcbd2de48dc5fe88e34cc4f3b4f1ad6a51b65a940</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.usgs.gov</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Law-Diary-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21798</link>
<guid>ba0c3a8d191e1921f963c1ac3edcb044</guid>
<pubDate>Thu, 06 Mar 2025 01:23:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>skira</b> claims attack for <b>Law-Diary-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b62a0e4f5b2505a15dec25c2dbc1291e63e9b4b8921848a7b2088eb1c7a33052</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>awdiary.com</i>]]></description>
<category>skira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carruth-Compliance-Consulting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21797</link>
<guid>ebfe4a43d46c01d811b34c14a3356904</guid>
<pubDate>Thu, 06 Mar 2025 01:22:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>skira</b> claims attack for <b>Carruth-Compliance-Consulting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19c27b4322f1b2517f6a9ea4e59aac8e4dc6799a1ec179d7db9586538b6345a5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>ncompliance.com</i>]]></description>
<category>skira</category>
</item>
<item xmlns:dc='ns:1'>
<title>LIPPERTENT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21770</link>
<guid>c7b591af74393bac468f20e73f66fc6a</guid>
<pubDate>Wed, 05 Mar 2025 18:27:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>LIPPERTENT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4adf6fd0f1f6e99ccef1a5b691aa3a439d34daee357e50f86d92f702d594ba19</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SCOLARO-FETTER-GRIZANTI--McGOUGH-P.C.-scolaro.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21773</link>
<guid>def2faa67d054cf3fa30ba0648eccb34</guid>
<pubDate>Wed, 05 Mar 2025 17:53:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>SCOLARO-FETTER-GRIZANTI--McGOUGH-P.C.-scolaro.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>969887eb7b2bef6f068fca52d7114820296c2e8a5aa2f3e349a633e5d34584b0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>scolaro.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-Plumbing--Electric-Supply-Co</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21766</link>
<guid>cc88ced1e298d32dcad4c0aff35ab56f</guid>
<pubDate>Wed, 05 Mar 2025 14:16:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>City-Plumbing--Electric-Supply-Co</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e8afd65fe7a2ddfee54dc429c154ff987e616ee8c88500b5eaf5059e6c3cbfc</i><br /><br />Threat actor <b>description</b>: <i>North Georgia's largest wholesale distributor or plumbing & electrical products.We are ready to upload more than 77 GB of essential corporate documents such as: contact numbers and e-mail addresses of employeesand customers, financial data (audits, payment details, reports), confidential licenses, agreements and contracts, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.sunsweet.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21767</link>
<guid>cdeeafb8118bb5cf2fd45b00d389e03a</guid>
<pubDate>Wed, 05 Mar 2025 13:00:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.sunsweet.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>03e59866c0776065685211c86eb711407bd04dab6aa82d08d67035d2e15df2b8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chicago-Doorways-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21768</link>
<guid>79ad6a5eae2eac1f159b0ea9b2d726c0</guid>
<pubDate>Wed, 05 Mar 2025 10:05:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Chicago-Doorways-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>80ddc0385613661ae0dd1736a2a7d44a695a316a2dae3d368c1e76ffbe4fa59a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.chicagodoorways.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Best-Collateral-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21762</link>
<guid>6b770f3b7c281868ec42c36703320eb2</guid>
<pubDate>Wed, 05 Mar 2025 08:49:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Best-Collateral-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f50436a328f4b87318a85977217d134a4599fdc494378f7df4011b899295569</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>365labs---Security-Corp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21759</link>
<guid>5ab120054eaa6aa30c427d0d195dfcd5</guid>
<pubDate>Wed, 05 Mar 2025 01:42:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>365labs---Security-Corp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb453e12042ac26d24c4ba8b8920860c473f1f1261840dda832206aaae0568f8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>dsrny.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21757</link>
<guid>2a506b217a5a867a204d645bbd486ad3</guid>
<pubDate>Tue, 04 Mar 2025 20:08:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>dsrny.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b9e1f3150678d88f9b4f4e62622f78495d6983e38552cc8d5f1a501bc159486</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>dsrny.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Keystone-Pacific-Property-Management-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21754</link>
<guid>f3af38a9500cfc72614a7cb788e5a56b</guid>
<pubDate>Tue, 04 Mar 2025 16:25:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Keystone-Pacific-Property-Management-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8fc73096936e9f90c42f8bb2bb91bbc9fbd13b1e4a97c98dfc472c17d8356b03</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mosley-Glick-OBrien-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21753</link>
<guid>3939e1a6347fb39e7ad765f88bf33a14</guid>
<pubDate>Tue, 04 Mar 2025 16:24:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Mosley-Glick-OBrien-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>07cb643998a0d393ae69d9adfe3907fd8f8f5dc2dad9219d201f7a76d0f3387d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ray-Fogg-Corporate-Properties</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21748</link>
<guid>e4eb156ab5ddb01cceec9a1bf29e3be5</guid>
<pubDate>Tue, 04 Mar 2025 16:16:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Ray-Fogg-Corporate-Properties</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f815c5965f9fb1f2ac5fea1e751769c710f715d472e9809ad38d19093b5f828</i><br /><br />Threat actor <b>description</b>: <i>Ray Fogg Corporate Properties has a vast portfolio of flexible office, warehouse, industrial and office / warehouse (Flex) properties available for lease.We are ready to upload more than 75 GB of essential corporate documents such as: financial data (audits, payment details, reports), confidential licenses, agreements and contracts, contact numbers and e-mail addresses of employees and customers, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>rockhillwc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21740</link>
<guid>9259551918ca646cfa759a8c5fb599e5</guid>
<pubDate>Tue, 04 Mar 2025 11:37:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>rockhillwc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac3d865dc6b87867f8eb3bb107d5fecaad7fb16cf5b9c8473b415894544f2d9e</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 11.03.2025. Since 1989, Rockhill Women’s Care has been dedicated to providing quality care and customer service to our patients. We are a full-service OB/GYN practice in Kansas City            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>bpmmicro.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21741</link>
<guid>df406179fe73acb98a8f45606449d731</guid>
<pubDate>Tue, 04 Mar 2025 11:37:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>bpmmicro.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>751f9fb31597deb8c230aeb898ec25bcdd485062c31c9e2db4383454a806e695</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 11.03.2025. BPM Microsystems manufactures high-performance, high-quality, and cost-effective device programmers and accessories for programmable semiconductor devices. The company has            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>peruzzi.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21742</link>
<guid>b6b53a1b9cde5ef3c37aea1ff7b16477</guid>
<pubDate>Tue, 04 Mar 2025 11:37:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>peruzzi.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b88a2222fb90b429c80f604deed061deff6fa6ef65320065dc7f7d151eb62490</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 11.03.2025. Peruzzi Auto Group offers a wide selection of quality, affordable new, used and pre-owned vehicles to Fairless Hills as well as the surrounding Souderton, Quakertown, Phil            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>goencon.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21749</link>
<guid>9b37bcab81ad1a699c12819c79b0b4f7</guid>
<pubDate>Tue, 04 Mar 2025 11:36:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>goencon.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2e8e60b9d3e33fc623c001f2a49fe4e79b1ea89525c7a0ac50ce683434a445c6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>goencon.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Legal-Aid-Society-of-Salt-Lake</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21744</link>
<guid>3312a1d297ed261ecb3cc34928347c43</guid>
<pubDate>Tue, 04 Mar 2025 09:23:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Legal-Aid-Society-of-Salt-Lake</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>20bf754e329d8e9ed07b3cfad1c5551a765b44810e08f04d82aca87681cdb24f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ewald-Consulting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21743</link>
<guid>47546271af6edfca8d96d7f471389b53</guid>
<pubDate>Tue, 04 Mar 2025 09:22:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Ewald-Consulting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33adeb2347491307f128cec4ab649a3eb353062e8a93e8c46cb65c42f42644af</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Netcom-World</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21735</link>
<guid>f62e621ff43fbe15bb2f2c09e0e8d585</guid>
<pubDate>Tue, 04 Mar 2025 05:25:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apos</b> claims attack for <b>Netcom-World</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d68aca309de9be890db1c3711b93bc67eb472d86e30adb5f96859145a7fffa0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>apos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sunnking-SustainableSolutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21728</link>
<guid>7fad1aaeb2b1139a73241d05e5a68cbb</guid>
<pubDate>Tue, 04 Mar 2025 01:24:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Sunnking-SustainableSolutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7948d454ca9f6916ca57ed1d8cd4ca8f1c45d39999c86012dca5946e5b5e6423</i><br /><br />Threat actor <b>description</b>: <i>Sunnking offers a comprehensive suite of IT Asset Disposition (ITAD) services, prioritizing efficiency and sustainability.We are ready to upload a lot of essential corporate documents such as: NDA’s, financial data (audits, payment details, reports), confidential licenses, agreements and contracts, contact numbers and e-mail addresses of employees and customers, etc</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>familychc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21730</link>
<guid>0c8fc7adb07a67b40a6fd3093b8865a8</guid>
<pubDate>Mon, 03 Mar 2025 22:06:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>familychc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3814184452c753630dcf55a6a2778fa4ef2db6921151caf2d686ef99c94766df</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>familychc.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>andreyevengineering.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21731</link>
<guid>03abb22f98c1ba728355443630f4a4e5</guid>
<pubDate>Mon, 03 Mar 2025 22:04:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>andreyevengineering.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f6a0ed36e9f4157abb0851dc7b2f2b5a86a58fde545998b342dd98d399f9f6c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>andreyevengineering.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>drvitenas.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21733</link>
<guid>154a6018257f777e0b3cd695304c5095</guid>
<pubDate>Mon, 03 Mar 2025 21:30:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>drvitenas.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>44c6c68aa11b68fc86e9fff8a83d82288ab9d07523696060707ad56b84cfbd8e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>drvitenas.com</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>usarice.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21732</link>
<guid>f314e8e9133de8ef063cb1518b4bffcb</guid>
<pubDate>Mon, 03 Mar 2025 21:28:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>usarice.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>20dfd76d239710f1c9b7946ff97cff193f657897af84448509952afbc586a60d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>usarice.com</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>RJ-IT-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21724</link>
<guid>ce86348064f870f0f4a4f72d42413062</guid>
<pubDate>Mon, 03 Mar 2025 19:57:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>arcusmedia</b> claims attack for <b>RJ-IT-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>662fe953aec7030478ff3f24c3f0218e7a5db52ae2fc46cc52852d50398266ed</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>rjitsolutions.com</i>]]></description>
<category>arcusmedia</category>
</item>
<item xmlns:dc='ns:1'>
<title>quigleyeye.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21717</link>
<guid>b9d0cdbab65a298d077a7b9794f97cd5</guid>
<pubDate>Mon, 03 Mar 2025 18:23:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>quigleyeye.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fb6afec83c809977817ae34323cda1625443ca6912dd2f5c6451da6091aec061</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>quigleyeye.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Central-McGowan-centralmcgowan.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21710</link>
<guid>4f31e209e022bbda5d0246b3e5ab6c38</guid>
<pubDate>Mon, 03 Mar 2025 12:57:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Central-McGowan-centralmcgowan.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b7bd49e768c56d821364e106e7e3e6090b819cc2ed526028e3c2f74b8e34224</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>centralmcgowan.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Klesk-Metal-Stamping-Co-kleskmetalstamping.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21711</link>
<guid>1d73ce2a7a702db385aa9056c7a0ff13</guid>
<pubDate>Mon, 03 Mar 2025 12:55:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Klesk-Metal-Stamping-Co-kleskmetalstamping.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5332f8a119223b5efc8024f3a78b2b156729e205f8d3ed429a351ead95347b19</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>kleskmetalstamping.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Couri-Insurance-Agency</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21695</link>
<guid>276598efa3cad81bba327f56cea301ef</guid>
<pubDate>Sun, 02 Mar 2025 20:45:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Couri-Insurance-Agency</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd0a0dc8f5707f1bb1615a970f112e29d6263f9fa8ff453ea99dc367d46022ab</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pre-Con-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21704</link>
<guid>93960d5fb44e9016051aac44fb34f9f6</guid>
<pubDate>Sun, 02 Mar 2025 20:09:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Pre-Con-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e76ad811127666f0d759d1e5c136909f904c939a2effc6917c96ce67d629dee0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.preconindustries.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>North-American-Fire-Hose</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21702</link>
<guid>a1363880b0e51db7dc8c5d41276b4ecd</guid>
<pubDate>Sun, 02 Mar 2025 20:06:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>North-American-Fire-Hose</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9eff2b7e9b951f703357ebe4b5d8317ce60a8cc0e74c00182de6c9e4355b8506</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.nafhc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mn-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21698</link>
<guid>ac1aacca91030c5cdb835cad7f32b4c6</guid>
<pubDate>Sun, 02 Mar 2025 20:03:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Mn-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e96b069a7131ed7d1d3b198abf5837c47e084291dc3e2663163ad845dd2427ef</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.mandnmanagement.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Optometrics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21701</link>
<guid>ed1dac006b5ef6170e646d7eb9ee2d1a</guid>
<pubDate>Sun, 02 Mar 2025 20:02:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Optometrics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>222f0448dc7dc2ab137dfefa4c333aa9d1a72ceb8715e04f3197ceb0b35976a8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.optometrics.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>International-Process-Plants</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21700</link>
<guid>6cf8912022f697ca81e17e33dc2993e6</guid>
<pubDate>Sun, 02 Mar 2025 20:00:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>International-Process-Plants</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>64816ab6e6d3993d18afbea7f0e635e9b6a1eb4b27cfe7ffa34ff2d85bcf5f59</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.ippe.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bell-Ambulance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21696</link>
<guid>d83a3ece517109abe8c5127136eb6145</guid>
<pubDate>Sun, 02 Mar 2025 17:43:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Bell-Ambulance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b123b3ee555aae606cf0358636d354c47cdfc838a8d1010b91568b610e86f8c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>breakawayconcretecutting.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21687</link>
<guid>154860e7d6c1a90ff1fd9f6c8b209054</guid>
<pubDate>Sat, 01 Mar 2025 22:45:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>breakawayconcretecutting.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7e1d65adc54195504612056149ebaad9116c1b1fb6e77e397964be082b9b2481</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kable-Product-Services-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21680</link>
<guid>b709742d89f8d9a642a31abd93dfd49d</guid>
<pubDate>Sat, 01 Mar 2025 21:16:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Kable-Product-Services-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30c029c6e74d4011ab379b209d63fb17feac8b14658983db5200b7d28ee84ab3</i><br /><br />Threat actor <b>description</b>: <i>Kable Product Services Inc. is a transportation, logistics, supply chain and storage company. Kable Product Services corporate office is located in 4275 Thunderbird Ln, Fairfield, Ohio, 45014, United States and has 115 employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Aurora</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21681</link>
<guid>87269806e37b9fe07a7c7aed9ad6f986</guid>
<pubDate>Sat, 01 Mar 2025 21:13:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>City-of-Aurora</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6878db532b88b3855549384a9e00bed5b4a8e8fea5357694325aa92236aba1b1</i><br /><br />Threat actor <b>description</b>: <i>Aurora is a home rule city located in Arapahoe, Adams, and Douglas counties, Colorado, United States. The city's population was 386,261 at the 2020 United States census with 336,035 residing in Arapahoe County, 47,720 residing in Adams County, and 2,506 residing in Douglas County. City of Aurora corporate office is located in 15151 E Alameda Pkwy Ste 4600, Aurora, Colorado, 80012, United States </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>APTEAN.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21682</link>
<guid>a819d06508519977b9bc88e9f00837ca</guid>
<pubDate>Sat, 01 Mar 2025 21:04:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>APTEAN.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c118a01ea565ef5e2c57973530c4d1f2c133470d247587dd649f78af9dd147e6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>JEFFREYCOURT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21683</link>
<guid>3829a518596ae2a37b09a417753e5328</guid>
<pubDate>Sat, 01 Mar 2025 21:03:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>JEFFREYCOURT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f635cdb5c1b5cbe705836a8deb625d3b3f79614e3ef0c98a7d820de2157d379</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GS-Floor-Designs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21686</link>
<guid>bcc4a7499ea45c2f3285fcf678eb34b7</guid>
<pubDate>Sat, 01 Mar 2025 20:32:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>GS-Floor-Designs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f679e62bbb2ee64080b6ed047a39fb0ec67d9477d6f4c5cf2c04b277908744d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.gsfloor.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Newton--Associates-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21674</link>
<guid>174e501a6b5ab618e567a08601e9067c</guid>
<pubDate>Sat, 01 Mar 2025 08:48:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Newton--Associates-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>facac306676e00371734db60545281d6bcb7a7ec337dbd41979e2bedb4496667</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.journeyoilfield.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21665</link>
<guid>9b3283db416902b9c8912bc05b9fee78</guid>
<pubDate>Fri, 28 Feb 2025 20:51:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.journeyoilfield.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b9a7ab11ed1a13b5551f1e842e27f36e4b45b89dc3410e075bde29b4dad1db06</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.casinoessentials.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21668</link>
<guid>fec16d1d594dae3de2fc1d8536896760</guid>
<pubDate>Fri, 28 Feb 2025 20:36:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.casinoessentials.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a01b8abf1261fa9b7643c6b233800cbf2ac541489d8605950a9c7cc133b12fc3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.casinoessentials.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>plasseramerican.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21666</link>
<guid>e024a97d9de60d7f9ea098651934a7df</guid>
<pubDate>Fri, 28 Feb 2025 18:03:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>plasseramerican.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5dfb079dcdaae38d804c1ac9cbb509275830baa62dd214bbd5ed87fa60e3f3c6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>plasseramerican.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Engineering-Mechanics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21663</link>
<guid>fb4032c5962cea1e0365d6e49fe381c4</guid>
<pubDate>Fri, 28 Feb 2025 17:27:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Engineering-Mechanics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a56e3e59f4d27db59c3d0833c42b4b90168ec071365911ccdd42506921f7ceb0</i><br /><br />Threat actor <b>description</b>: <i>Engineering Mechanics Corporation of Columbus (Emc 2) is an employee owned engin...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>ctpomd</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21661</link>
<guid>88e8a96c7c5192b45e78d97a87641b7f</guid>
<pubDate>Fri, 28 Feb 2025 12:28:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>ctpomd</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4133c3b2dc84f016da4b95e4c32b4ec327e03f306ecefd7f271c13be73cce740</i><br /><br />Threat actor <b>description</b>: <i>Central Texas Pediatric Orthopedics was founded in 1990 by Dr. Jay Shapiro, with the mission of serving Austin's community and setting the standard for exceptional pediatric orthopedic care.

 

Now with locations in Austin, Cedar Park, W            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Houston-Symphony</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21658</link>
<guid>0ddfce009feef8de73f1d781e16290ad</guid>
<pubDate>Fri, 28 Feb 2025 10:27:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Houston-Symphony</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f9459aa56537fb732af6b77f1ecf90d2d395023a30d0ce96777dc447af519aa</i><br /><br />Threat actor <b>description</b>: <i>All data will be published on March 5, 2025.With over 300 GB of files stolen. During the 2019-20 season, the Houston Symphony celebrates its sixth season with Music Director Andrés Orozco-Estrada and continues its second century as one of Am            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>sublettecountywy.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21657</link>
<guid>2234204dcec1a25356f2ffe8ca96d2d7</guid>
<pubDate>Fri, 28 Feb 2025 01:42:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>sublettecountywy.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>adb5ab5a0dc6ebfbdb7a9c5e325902abd716e25d36e2245628692ed3d2b2fb6d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.townofbourne.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21656</link>
<guid>ad2039e6ef9b35fe889db419691b472f</guid>
<pubDate>Thu, 27 Feb 2025 22:45:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.townofbourne.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca77bd27830f1308dd30f903fe11e90a7649fa708b05fae48dffa419ad04f836</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>CMCOLDSTORES.COMCODAGAMI.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21655</link>
<guid>490d72de1a6d78a51248e191c77322b4</guid>
<pubDate>Thu, 27 Feb 2025 18:12:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CMCOLDSTORES.COMCODAGAMI.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>252b43ae430b074731990d3c1e624fe6a02c3901530f2d0a2b41427e81c1bf9c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>CMCOLDSTORES.COMCODAGAMI.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GOURMETTRADING.NET</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21654</link>
<guid>b7cf739bf3f291eb97b5e3d425eea00d</guid>
<pubDate>Thu, 27 Feb 2025 18:05:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GOURMETTRADING.NET</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a998e0eadcaf7661fac1c698a46860269c8bced96ac20ccd721294fa5d95ee3b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>GOURMETTRADING.NET</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GNSWORLD.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21653</link>
<guid>98ea09126edd6eea0b7affbbeb0d9b17</guid>
<pubDate>Thu, 27 Feb 2025 18:05:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GNSWORLD.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fff0f2d3bcc02ca47c754d7aa49c83175f9b7627fdb3c5c16eb30bbac73988ea</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>GNSWORLD.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GIBSONHOMEWARES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21652</link>
<guid>3408b8d8a758db7c66b435a2c13352e4</guid>
<pubDate>Thu, 27 Feb 2025 18:05:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GIBSONHOMEWARES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f8a54fad5efa512e73996b50aeb346c6d60103903a590cadb8c19e27f970d5bb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>GIBSONHOMEWARES.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GHENT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21651</link>
<guid>09dbcc085b7640b12b75deb6c16d2a14</guid>
<pubDate>Thu, 27 Feb 2025 18:04:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GHENT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b396ff487240b3aed38d29448b73f299e626778e06151a9edb7599a080fde744</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>GHENT.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GETGARVEYS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21650</link>
<guid>b53f8d01835616293e994afe0ea01bdf</guid>
<pubDate>Thu, 27 Feb 2025 18:04:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GETGARVEYS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a4db6e0520f829c9be4e9a9d5b4338785b9eee3a0fcca2612f54a570680a205</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>GETGARVEYS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GERSONANDGERSON.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21649</link>
<guid>3391f7714552ccfd36c887e27dee4842</guid>
<pubDate>Thu, 27 Feb 2025 18:03:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GERSONANDGERSON.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ef9f6c499cdd9cb94f5eebf9496b79bf92822018d3b70a9711cc7b8cee6cfe6e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>GERSONANDGERSON.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GBBEV.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21648</link>
<guid>4238fc46fe869de66700ec14d6738248</guid>
<pubDate>Thu, 27 Feb 2025 18:03:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GBBEV.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1bdca576d4d9fcb1b3a5a00278d0ac8c4aaf4e7c7dc9512e59808aa924824a85</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>GBBEV.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GAIAM.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21646</link>
<guid>cfc589f72fd5f46aa97a9b69cbad002f</guid>
<pubDate>Thu, 27 Feb 2025 18:02:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GAIAM.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f1f4f6f5955e7627eb6492ec2864b911029f75a7058ccb57aa8a8192d6a970b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>GAIAM.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>FLORENCECORPORATION.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21644</link>
<guid>04dd226bd2e13b65115869b3307bc5ce</guid>
<pubDate>Thu, 27 Feb 2025 18:01:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>FLORENCECORPORATION.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>699e281b092697f6be44d21155d61fd7b470752837b5794b4f48f60a1f54049c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>FLORENCECORPORATION.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>FUN-WORLD.NET</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21642</link>
<guid>04480ac0fe75be397a06a7dddd0679d6</guid>
<pubDate>Thu, 27 Feb 2025 18:00:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>FUN-WORLD.NET</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>07f391879daa9fbe9196435b90da1dd4f7e24942bb4d0018789dbdf32cf04f6f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>FUN-WORLD.NET</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>FOTE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21641</link>
<guid>699123454aa4781d475b96aaac59dc62</guid>
<pubDate>Thu, 27 Feb 2025 17:59:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>FOTE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a4180ee8acfca0b8e8a7a044035c0be0d4935c3222e750c39f9f3707dbac6f0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>FOTE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>FORDSTORAGE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21640</link>
<guid>985e6ec4d9a58573df0f94a372dca9d5</guid>
<pubDate>Thu, 27 Feb 2025 17:59:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>FORDSTORAGE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d1ec6353565b33436681ee529c902da6926f453028551ead2a068dc531496019</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>FORDSTORAGE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lee-Enterprises</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21631</link>
<guid>4cbbd97795fad6dfbf3d00963c2776eb</guid>
<pubDate>Thu, 27 Feb 2025 17:28:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Lee-Enterprises</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>997703fcea7d1b3913a1c440b5cc71f724eb8b5e3b261611afbea8941deaf038</i><br /><br />Threat actor <b>description</b>: <i>All data will be published on March 5, 2025.
We are preparing to share sensitive data with the public that could shed new light on Lee Enterprises, a prominent newspaper publishing firm active across all U.S. states. The documents we hold ab            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mercury-Paper-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21630</link>
<guid>646b02e11133e257d571ffee126712ec</guid>
<pubDate>Thu, 27 Feb 2025 16:27:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Mercury-Paper-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57cd437d317323966a21614d9dfca0a3a9b8c6768af2516fc1a33d5d2b5afd75</i><br /><br />Threat actor <b>description</b>: <i>Mercury Paper is a rapidly growing manufacturer of bath tissue and paper towels. It provides contract manufacturing to Oasis Brands for FIORA®, one of the fastest growing brands in the U.S. We are ready to upload more than 100 GB of essential corporate documents such as: financial data (audits, payment details, reports), contact numbers and e-mail addresses of employees and customers, confidential licenses, agreements and contracts, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>teamwass.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21638</link>
<guid>3b847a075d85556882ccb050e82ab665</guid>
<pubDate>Thu, 27 Feb 2025 14:58:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>teamwass.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0432fb84e9c71649dec6ec2522aac18b6c9d154b38ad3cc210c1f05203be2ca3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>teamwass.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.nasonptc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21639</link>
<guid>74ab171bf4452a0f3ef007a38df8be7e</guid>
<pubDate>Thu, 27 Feb 2025 14:57:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.nasonptc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>41fca3c03c617e5fe7975f7b6d3f5a439e055eb8c455af6d7575a75e9b62290e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.nasonptc.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Donna-G.-Rogers-CPA-P.A.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21635</link>
<guid>14bf6dce0a0ceb6662449793da991fb8</guid>
<pubDate>Thu, 27 Feb 2025 14:37:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>RunSomeWares</b> claims attack for <b>Donna-G.-Rogers-CPA-P.A.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa32a7714ee86f302295bdf7f43cab87f7c0ab8db436846a943b0f2f066ba795</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>dgrogerscpa.com</i>]]></description>
<category>RunSomeWares</category>
</item>
<item xmlns:dc='ns:1'>
<title>FV-Capital-Management-LLC-FVCM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21633</link>
<guid>077efd55c94e1ea0c4e4583c8ea1c7f6</guid>
<pubDate>Thu, 27 Feb 2025 14:34:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>RunSomeWares</b> claims attack for <b>FV-Capital-Management-LLC-FVCM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1d3925397cb22e1e41c54ce9c598fb0329d13fd20c657ec303af977edf146a6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>fvcapital.us</i>]]></description>
<category>RunSomeWares</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gilbert</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21632</link>
<guid>ce7b63c9249c6b9fd6908b427cefcc06</guid>
<pubDate>Thu, 27 Feb 2025 14:33:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>RunSomeWares</b> claims attack for <b>Gilbert</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0498e2aaf0499c243415a76f372b6239192c504e9335032e4391486be3229315</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>gilbertusa.com</i>]]></description>
<category>RunSomeWares</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sterling-BMW</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21627</link>
<guid>e65da2392672bfaa382312263caceb9d</guid>
<pubDate>Thu, 27 Feb 2025 14:28:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Sterling-BMW</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>822311f9e436ff9e40c2cd138bf7e80a016a1ab2e28dc30bce5abd00d0cfab2a</i><br /><br />Threat actor <b>description</b>: <i>Sterling BMW offers Orange County, CA, the best vehicles available. BMWs are known for high performance, true luxury, and industryleading design. Sterling BMW is proud to be a leading BMW dealerfor Orange County, and all of California.We are ready to upload more than 10 GB of essential corporate documents such as: financial data (audits, payment details, reports), contact numbers and e-mail addresses of employees and customers, confidential licenses, agreements and contracts, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Finck-Cigar</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21616</link>
<guid>32cd0b3cfed084c5c03f6aafa0bb8d13</guid>
<pubDate>Thu, 27 Feb 2025 01:45:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Finck-Cigar</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>942fafda999aa1e828e1a99932557b6f71dd9595db359671df230db6c96f14d5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>3cBSI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21612</link>
<guid>dcbe4be7606b574be9a50c64ffbe5254</guid>
<pubDate>Wed, 26 Feb 2025 22:46:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>3cBSI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>835515473feab972dee866407d2975b8e51d8aaf20f2ab12a361666a2a2fdf14</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.envirolabsinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21618</link>
<guid>bd578998adcc95981af6429de69e53c9</guid>
<pubDate>Wed, 26 Feb 2025 22:40:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.envirolabsinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f29135d8bb61430df5af3a59453e45d55a7d2fda3591c49005b38b933a712f8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.envirolabsinc.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Muller-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21620</link>
<guid>895b6af63f9be375e707a988ace34ab9</guid>
<pubDate>Wed, 26 Feb 2025 21:07:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Muller-Insurance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8de52f8abbcd59bf7629a5332987c132e94e7149c227569c9b694472a516e4fe</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.mullerinsurance.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>caltrol.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21615</link>
<guid>8206a42a49e26f8419132a9c97e016f6</guid>
<pubDate>Wed, 26 Feb 2025 20:24:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>caltrol.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8af211d5bf17e86885a7e5f267b9cc5d6eb6e5de3cd959d54b370e639df6addb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>caltrol.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.newburghhealthcarecenter.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21613</link>
<guid>1a01b448690083588db6c9dbc171031a</guid>
<pubDate>Wed, 26 Feb 2025 19:32:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.newburghhealthcarecenter.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>475d16220f8306cb0a91bd75450b1d7178b6103120382d9747a0b03e83c3ded5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.newburghhealthcarecenter.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kendall-Auto-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21614</link>
<guid>4717c244331eb475a42e5f58945e945c</guid>
<pubDate>Wed, 26 Feb 2025 18:58:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Kendall-Auto-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ca9ce880760fce58c98f06f90f6431b8430f0e3c3877e82ab637d7933a43b30</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.kendallautogroup.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>holtcat.com1BUSA868GBlt1-DISCLOSED</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21603</link>
<guid>c828991bf51544cf79c2141168c359c7</guid>
<pubDate>Wed, 26 Feb 2025 18:51:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>holtcat.com1BUSA868GBlt1-DISCLOSED</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6d174eec4bf61f509519e7db174ed6e9a1c786dee2c93895f7cd649426a1160</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.amerasphalt.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21610</link>
<guid>ef154aea8a44ebae574d0371fb6233c3</guid>
<pubDate>Wed, 26 Feb 2025 18:07:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.amerasphalt.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c736696f13cc956c1630ab4a3c571fdfeecc7f0688e02b83246f6565c75d7e38</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.amerasphalt.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.emeryair.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21611</link>
<guid>934307c5f6de137954bb0b5d7f18fa30</guid>
<pubDate>Wed, 26 Feb 2025 18:06:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.emeryair.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f090bf3dfba2495555f9ca1c5af663921965e11e897f260a4e20dafea67903d2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.emeryair.net</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>alphabaking.com421.9MUSA1TBlt1-DISCLOSED</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21602</link>
<guid>973bc36f4729330b7993f2fdb1a7f9e7</guid>
<pubDate>Wed, 26 Feb 2025 16:54:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>alphabaking.com421.9MUSA1TBlt1-DISCLOSED</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba15d0de0ef8827cb22d3d70d2e0f27c137948fa284f84852f286b7f23d3bd5a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>powelltool.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21599</link>
<guid>58766b2804f2d263ecd81e805e8a907b</guid>
<pubDate>Wed, 26 Feb 2025 11:58:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>powelltool.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>871335a7f38ae0508f9094ebc82304c6ec5692e2001dfea48ae0b200d5b0a1ea</i><br /><br />Threat actor <b>description</b>: <i>Powell Tool Supply specializes in Vendor Managed Inventory solutions, recognizin...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>ITU-AbsorbTech</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21596</link>
<guid>e03fd300f9fe8ac024ecc83347215a30</guid>
<pubDate>Wed, 26 Feb 2025 10:55:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>ITU-AbsorbTech</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c6666776a842f994559fa3eff17f5869fe5a25465bcfa296226b29a471c24352</i><br /><br />Threat actor <b>description</b>: <i>ITU AbsorbTech has provided industrial services in support of cleaner, safer and...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Surface-678</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21597</link>
<guid>087ee12282d24d81482de8be77d6fbad</guid>
<pubDate>Wed, 26 Feb 2025 10:55:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Surface-678</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e791836456860b980fd09f15fbb6cc083436e84327f85a433651fc0bc00438f</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 7.03.2025. Founded in 1993, Surface 678 is a landscape architecture ﬁrm dedicated to design excellence and the integration of natural systems and craft into our work. It is our beli            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fairhaven-Shipyard-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21591</link>
<guid>69f98b8fa682e5455b51a131aed3394d</guid>
<pubDate>Wed, 26 Feb 2025 01:44:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Fairhaven-Shipyard-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>231d54d34861abfbe620c02e8892df406f0330b16f76113cc8d29c33e535b2ed</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Convert-Solar</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21582</link>
<guid>571dea3eb9d4d24c6194ef17c91cda79</guid>
<pubDate>Tue, 25 Feb 2025 22:44:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Convert-Solar</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b9037bb98685a1795e47d586cf7976e7c80fcdef179cfe9023556ae8be1db52</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>welcompanies.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21589</link>
<guid>1ae241081fe825621550691f56fe0963</guid>
<pubDate>Tue, 25 Feb 2025 22:42:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>welcompanies.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c04c1a0296bff63d0440c401c6dedd33edfcc2f27a5865e1a549b8f80fbd1ae2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>welcompanies.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Radco-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21595</link>
<guid>f64be92fc42691c03917865d7c8ceb96</guid>
<pubDate>Tue, 25 Feb 2025 22:37:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Radco-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2061d3a8d105d33c30a3c78711f3aea25a7ff129a2b9dbd6ec24ab5f09ae33b2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.radcoindustries.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Island-Realty</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21594</link>
<guid>0bf28731c890f78031df29d4be2d85e5</guid>
<pubDate>Tue, 25 Feb 2025 22:34:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Island-Realty</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3bdebd6f575c7c57413fe5e2ba69985f94f2ccf5a4d899bb61e4767b4108d026</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.islandrealty.us</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>First-Federal-Savings--Loan</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21593</link>
<guid>aca9d4f91ffc53d164e7a3242653879e</guid>
<pubDate>Tue, 25 Feb 2025 22:33:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>First-Federal-Savings--Loan</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>182e7638efaea2c0867676328a07416a71a440ecd08b0ebde7e634d35d5023d9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.firstwithus.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Benjamin-Consulting-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21572</link>
<guid>08d24d640ddb54ad66f3562185bc0f49</guid>
<pubDate>Tue, 25 Feb 2025 21:57:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Benjamin-Consulting-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>392b39a1ade1231152a2d216ff9142ece42aad76608d297492705bd166ef02a2</i><br /><br />Threat actor <b>description</b>: <i>10</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>ALCOTT-HR-GROUP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21573</link>
<guid>d24e41365a27a6ce4c4b46a5b539f5cb</guid>
<pubDate>Tue, 25 Feb 2025 20:50:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>ALCOTT-HR-GROUP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd1acabc2ed0070ba1ff49e99243b1a4f1e7ef371955fa178a053f7c76940373</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Friendship-House</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21570</link>
<guid>45734394a69e424c7cd1c76383233976</guid>
<pubDate>Tue, 25 Feb 2025 19:59:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Friendship-House</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>93d21a59ec127c46bb2b186684f7ddd76c1c585d77e813104b9751bcde218ae1</i><br /><br />Threat actor <b>description</b>: <i>Friendship House - clinic provides outpatient and inpatient services for the treatment of mental health and substance abuse. Friendship House corporate office is located in 406 W Koenig St, Grand Island, Nebraska, 68801, United States and has 9 employees. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>bluedge.com104.5MUSA994GBlt1-DISCLOSED</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21571</link>
<guid>66410adefc38da1e9486483597c15518</guid>
<pubDate>Tue, 25 Feb 2025 18:52:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>bluedge.com104.5MUSA994GBlt1-DISCLOSED</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>642d27a88b4f4481ecca858e8d60d95578b31a82ceb4c8833c4c7dc04fd03929</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.avalon-hotel.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21574</link>
<guid>5bc33927ca8779dcd219b9dfaa1195a5</guid>
<pubDate>Tue, 25 Feb 2025 18:12:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.avalon-hotel.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f81c44b0cfc7e343e9cd56ea35c96ee159525e880983b343a22fffe8703a3fb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.avalon-hotel.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.rgb.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21575</link>
<guid>7effe368dace6405ddee825c0707c434</guid>
<pubDate>Tue, 25 Feb 2025 18:10:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.rgb.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>95b3dfed76b30e8ca33ae90c6dcfb6efe0901005c9761d9891f74bdd9656b37f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.rgb.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.wpisd.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21576</link>
<guid>d075b7093d334000ed3befa4f78691e4</guid>
<pubDate>Tue, 25 Feb 2025 18:09:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.wpisd.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9de82c9d465998281ba0771852270c88e8fd78e6507812f94e0f9b5c3a509043</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.wpisd.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.confabca.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21578</link>
<guid>45101f00279424b821e70a003a05203a</guid>
<pubDate>Tue, 25 Feb 2025 18:05:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.confabca.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b624f6a07d44f91311ca2fb2f65e36745b569a9801082b74320a0ab92f7f9ddb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.confabca.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>lifting.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21580</link>
<guid>e31a1ba03ccbd7a24310cfb120957746</guid>
<pubDate>Tue, 25 Feb 2025 17:23:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>lifting.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d25149a01daf775ab3f5a07da97c67a089eb4ab93ddc81612b80f7190337a3a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>lifting.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>MNJ-Technologies-Direct</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21556</link>
<guid>8ee3592d7d251e3f7fe4da469785592b</guid>
<pubDate>Tue, 25 Feb 2025 15:57:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>MNJ-Technologies-Direct</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a9b24133551321b0b5d2eb61d4839d33082725932936e645a52d3a84d6b1d40</i><br /><br />Threat actor <b>description</b>: <i>MNJ Technologies serves its midmarket-to-enterprise customers by helping them increase productivity and reduce costs through personalized IT solutions and services. We are ready to upload a lot of essential corporate documents such as: NDA’s, confidential licenses, agreements and contracts, medicare documents, financial data (audits, payment details, reports), SSN’s, contact numbers and e-mail addresses of employees and customers, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mundelein-Park--Recreation-District-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21565</link>
<guid>cae582c97681e4f465420fadb30e84a4</guid>
<pubDate>Tue, 25 Feb 2025 15:41:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Mundelein-Park--Recreation-District-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5861f615650ffe163b8e8d38ff601ce2b924e04c40d97a85ddc2a3cc0a22abbc</i><br /><br />Threat actor <b>description</b>: <i>Mundelein Park & Recreation District (founded in 1954) provides 33 park sites offering over 735 acres of open space, playgrounds, ball fields, lakes, and trails. Mundelein Park & Recreation District corporate office is located in 1401 N Midlothian Rd, Mundelein, Illinois, 60060, United States and has 437 employees.  The total amount of data leakage is 118.20 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>South-Georgia-Accounting-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21567</link>
<guid>3350f342187a513cfe28119c59dc9038</guid>
<pubDate>Tue, 25 Feb 2025 14:43:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>South-Georgia-Accounting-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>709fb83ade32dc410605364bec6ab9f55b40c5f67a999e99b4cca570cc0453cc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>sgaccountingservices.com</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dinizulu-Law-Group-LTD</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21568</link>
<guid>04dfa78991b5140d09df3164008cd690</guid>
<pubDate>Tue, 25 Feb 2025 14:34:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>morpheus</b> claims attack for <b>Dinizulu-Law-Group-LTD</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1bfdbb4f58f21987dbcfe4dd578ab410ebdc99f6dad6e16573735b5205b44300</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>morpheus</category>
</item>
<item xmlns:dc='ns:1'>
<title>PPS-Services-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21553</link>
<guid>5a36726cd1d9ea6f9e350c2e67a43f18</guid>
<pubDate>Tue, 25 Feb 2025 13:49:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>PPS-Services-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>670d422a532cc27e1ff6eb6bf0e29b7d45ada15d988d740f1b95989053747b55</i><br /><br />Threat actor <b>description</b>: <i>PPS Services Group is an international engineering and technical services provid...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pulmonary-Physicians-of-South-Florida-Clinics--Data-security-breach</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21542</link>
<guid>3e4e67cbedefff39bd73f98f01e7e066</guid>
<pubDate>Tue, 25 Feb 2025 08:53:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>braincipher</b> claims attack for <b>Pulmonary-Physicians-of-South-Florida-Clinics--Data-security-breach</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>573bd7cefcabfabd60a469aab0877c76d0d7fa4ebe6da23501ebce4f93b68fd5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>braincipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>Summit-Home-Health-INC.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21548</link>
<guid>5b8f9c769baebee08aad92e36521b718</guid>
<pubDate>Tue, 25 Feb 2025 07:47:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Summit-Home-Health-INC.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>073ad15d7cdd659a13e7065bbdb56a6a57134da8f4e6ca6d5f16fb38c55e4baf</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>summithomehealthinc.com</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>acmefan.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21539</link>
<guid>25105ee21f67d6b2395ca64e43778f0b</guid>
<pubDate>Tue, 25 Feb 2025 04:57:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>acmefan.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea209cc50446f474a55247893ce2009e3b5fe223e4ca1d11bdcde9a411637369</i><br /><br />Threat actor <b>description</b>: <i>Acme Engineering and Manufacturing Corporation is known worldwide as a leader in...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Executive-Agenda</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21534</link>
<guid>df584ebb35586e6afddb744e9de7236f</guid>
<pubDate>Tue, 25 Feb 2025 02:59:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Executive-Agenda</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f31b6cedfbdc05d311fe5ec12d2ba9e69481b6f6be78530ca3d267fb2f5430a9</i><br /><br />Threat actor <b>description</b>: <i>17</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>Birdsall-Muller-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21535</link>
<guid>8ae0ef0300cdeeecd39636e873bf879f</guid>
<pubDate>Tue, 25 Feb 2025 02:59:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Birdsall-Muller-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>67d004b98630f6b43482c9911b5915698a7c7c54d36bb552ac05a2926b7afe99</i><br /><br />Threat actor <b>description</b>: <i>15</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>pacresmortgage.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21536</link>
<guid>68c1f25dcbd82e048c6d723b16b456df</guid>
<pubDate>Tue, 25 Feb 2025 02:58:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>pacresmortgage.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6c23a59431f3f7a21c5565f94b1a817e9182dea982d3d14aba73624bf56fc3c</i><br /><br />Threat actor <b>description</b>: <i>The PacRes story of growth continues to this day because our employees give ever...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aurora-Boardworks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21524</link>
<guid>90797bef9ef6175e04f3c9383568f9e4</guid>
<pubDate>Mon, 24 Feb 2025 19:11:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Aurora-Boardworks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>67618584d063f7421731f94c7c2c35ae6fb78deca2de2661bf4391e1d550b4fa</i><br /><br />Threat actor <b>description</b>: <i>Aurora Boardworks manufactures custom built circuit assemblies for industrial, medical, military, agriculture, oil and gas applications. Aurora Boardworks corporate office is located in 103 Grant St, Aurora, Nebraska, 68818, United States and has 24 employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Heartland-Health-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21525</link>
<guid>8d462d62ac0734241b98c97bafca11fc</guid>
<pubDate>Mon, 24 Feb 2025 19:11:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Heartland-Health-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af9d36bed6cd00d078cd268f56ddfa67c7bb509dd304656738b983fe426f6ab1</i><br /><br />Threat actor <b>description</b>: <i>Heartland Health Center - provides services in the healthcare cloud, namely, medical, stomotological, treatment of mental health and cognitive -behavioral therapy. Heartland Health Center corporate office is located in 3307 W Capital Ave, Grand Island, Nebraska, 68803, United States and has 31 employees. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Laurens-School-District-56</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21526</link>
<guid>4ab209885a134d73b39bc96504b7e301</guid>
<pubDate>Mon, 24 Feb 2025 19:10:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Laurens-School-District-56</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a4377db8ccc44691d9d454558f97e2ad1b22fdd54b464e1438567964500f2213</i><br /><br />Threat actor <b>description</b>: <i>Laurens School District 56 is a school district in South Carolina (Laurens County) which has about 2,800 students. Laurens County School District 56 corporate office is located in 211 N Broad St, Clinton, South Carolina, 29325, United States and has 118 employees. The total amount of data leakage is 2.40 TB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>WKKELLOGG.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21319</link>
<guid>c7518a1b6d7dfba75ad2cc2fc526fa65</guid>
<pubDate>Mon, 24 Feb 2025 18:59:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>WKKELLOGG.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec34bd7233bc281fe76d4e8819b2e3623d06fe6a60b9f881738ec61b0bf02650</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>WHEELS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21320</link>
<guid>e51c1eef0ce4c35af9069dabda7086ac</guid>
<pubDate>Mon, 24 Feb 2025 18:59:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>WHEELS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>239328fd63d091902e793bed32f8c4cbeb036191b9e73e572cb5709cd5f7ca57</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>WENDOVERART.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21322</link>
<guid>0d6d4579fd82b21026c44e6910669fcf</guid>
<pubDate>Mon, 24 Feb 2025 18:58:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>WENDOVERART.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89d11c441aa44370fc2681a37173df895f55f892bd9c2e5e367989a4bf505d76</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>WELCOMEIND.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21323</link>
<guid>eb7c1eabb2baa803f2635d2ba4792d3f</guid>
<pubDate>Mon, 24 Feb 2025 18:58:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>WELCOMEIND.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87f4d7a5c4df4d394e5deca33ec26b95a5203bf1a54dfc4c2ae67a12a680580c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>VANDALE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21324</link>
<guid>4537a9e98e90f416dadaedd65c416843</guid>
<pubDate>Mon, 24 Feb 2025 18:58:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>VANDALE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c80216e987d9404d80c143989ec5f5532158a4e9d89bf227289c930e1c396a15</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>VSSTRANSPORTATIONGROUP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21325</link>
<guid>ffc937399e9985e3399dbff1e4f6fd96</guid>
<pubDate>Mon, 24 Feb 2025 18:58:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>VSSTRANSPORTATIONGROUP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5bee1c6fa2924ad97b0570ae9a599f350582e62c3fccb35696eeec1e85a079c4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>VSSLOGISTICS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21326</link>
<guid>94fbd0186bea63a55d23f6dcc8e2bd93</guid>
<pubDate>Mon, 24 Feb 2025 18:58:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>VSSLOGISTICS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cf135479270b06b5c83020ed1c21a4335efbc9b42230b4fc42f36c4f9fad1bae</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>VLCDISTRIBUTION.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21328</link>
<guid>db34fbf0a135038c9c9102e028c614be</guid>
<pubDate>Mon, 24 Feb 2025 18:57:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>VLCDISTRIBUTION.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7965a5a1f1beb58e3fe520345336d98f900990341cba7f24c6bea0e2f35819e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>VIDAGROUP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21330</link>
<guid>e0b48316d133d5b9badb5fd83ac49dd0</guid>
<pubDate>Mon, 24 Feb 2025 18:57:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>VIDAGROUP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f5b34655de70a160b6702a94b746e2e544ff55dc615628372d79e54634323e0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>VALLEYDIST.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21333</link>
<guid>18f67e0b989c0e2b840dfd31df1a4ad0</guid>
<pubDate>Mon, 24 Feb 2025 18:56:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>VALLEYDIST.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>427162a58c7308775075ab91a1264317d62aa737510a1f7714378823c91c04e2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>UNIEK.INTERNAL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21334</link>
<guid>18856b47d46e2a7ddf650bdadc3b81e3</guid>
<pubDate>Mon, 24 Feb 2025 18:56:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>UNIEK.INTERNAL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9a7a163feef885e98be14f809ce8356b1cc995d147ee41f88a023f41af1489c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>UNIVERSALWAREHOUSES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21335</link>
<guid>5d2c23f58c7df2187e8b5fab4455e719</guid>
<pubDate>Mon, 24 Feb 2025 18:56:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>UNIVERSALWAREHOUSES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6135fbf0372c8ec9fe3d405a9730f83c9be1e5e71949b190fc877366ed0fe26e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>USM-INC.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21336</link>
<guid>fbfdab7e3983009e7d488d946a8de066</guid>
<pubDate>Mon, 24 Feb 2025 18:55:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>USM-INC.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b519f19799bfa6bf6aad554ef15ec8d0f5ad5936635d696b0b132d8f915ece0d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>UPPERLAKESFOODS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21337</link>
<guid>bc6e1826a881c674f2400c75e79bdfbb</guid>
<pubDate>Mon, 24 Feb 2025 18:55:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>UPPERLAKESFOODS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8905ac03f30ce12ca07854817af3ee4b8831e6f472f1b88a4db3b45a88847c36</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>UNITERS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21338</link>
<guid>b8c3567ca021e673164cc9f2c10634e2</guid>
<pubDate>Mon, 24 Feb 2025 18:55:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>UNITERS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>32c86c6ac1f9f1afd6a2802de2450921f7d1a561576ccf1ed4120e963377c642</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TWINSTARHOME.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21341</link>
<guid>eecd2755d73701aa057cd2a32bd7b1e2</guid>
<pubDate>Mon, 24 Feb 2025 18:55:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TWINSTARHOME.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff88f1e3d92a76f03a4d3e7e2004ec9b9f90fab58b7f9f468904087b8c4d7685</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TIMKEN.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21343</link>
<guid>08c04a234c59ed654221cd34078a489f</guid>
<pubDate>Mon, 24 Feb 2025 18:54:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TIMKEN.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>82591b6cafc5024337d69b47ce51a6d6b7bccbb85a258b90c248080e4557cc13</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TWTDIST.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21344</link>
<guid>3d29759865b9aac303dc0a80dd358b90</guid>
<pubDate>Mon, 24 Feb 2025 18:54:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TWTDIST.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a38440c7ac40013057c72310ec38e85a5d505868f48df19616906c87d54c960</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TUXTON.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21346</link>
<guid>5143180850f3d452b4fdb79ba467636e</guid>
<pubDate>Mon, 24 Feb 2025 18:54:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TUXTON.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a57d09731021e5647984867f6d168741eb3e71c54d5298c2a6ad81791cdcd090</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TUCKERCO.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21347</link>
<guid>c56eb490500b7a3f2619a1c4b79fbc98</guid>
<pubDate>Mon, 24 Feb 2025 18:53:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TUCKERCO.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a469479dd302ea32c252542ee027ede8ebc3fce69199805f425af97f172c52ca</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TRIMACO.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21348</link>
<guid>974665989159e4a9ef2595104007e8f7</guid>
<pubDate>Mon, 24 Feb 2025 18:53:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TRIMACO.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6224c9eb508850c511400dc324440af97dde40c1587ee9288ec81cd6da40fbb5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TRIBORO.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21349</link>
<guid>683cc00f22b1a9f8785120b125cf84f7</guid>
<pubDate>Mon, 24 Feb 2025 18:53:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TRIBORO.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9774988cca7b52d0cabaa1d31e69c87dc06c9fb1bc354a65a6ffb73ccf3093d9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TRENDSPOTINC.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21350</link>
<guid>2c4e1648bc0711f883a10d912a897b11</guid>
<pubDate>Mon, 24 Feb 2025 18:53:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TRENDSPOTINC.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b498e0565b2b53c52bd1d75b1c78a3bc25e2f27c63b34c4f3ae05358557a61d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TPGXML.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21351</link>
<guid>b780214f2ff6ab83e4d9d392922925ce</guid>
<pubDate>Mon, 24 Feb 2025 18:53:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TPGXML.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8ca0bf0541ad44694a3e86b1324991fd1faceddb2ce27e99632d00714a72959</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TOTALWINE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21352</link>
<guid>84743978fa058b3770d7a77b26b87d1c</guid>
<pubDate>Mon, 24 Feb 2025 18:52:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TOTALWINE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>474cd6eb4bfac722923440e5bd696af88d72b4ec881b039803bffb72d452e6c9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>THENORTHWEST.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21353</link>
<guid>0d05195da8cf260369654829ca79b8e7</guid>
<pubDate>Mon, 24 Feb 2025 18:51:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>THENORTHWEST.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b124f2bbb5b241b1a2a5de382970af9711a8cf17e4a30c775f710684fd189346</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>THEMEZZSHOPPE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21354</link>
<guid>9426cdfe04a0f5319467fc1c69a3c8c4</guid>
<pubDate>Mon, 24 Feb 2025 18:51:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>THEMEZZSHOPPE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>32e701b31430044df9003331786663270b6373925920e2ba6cab2a06d9b41a73</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TERINICHOLS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21355</link>
<guid>23755d10e2fe7c7a11342f80352a8e9d</guid>
<pubDate>Mon, 24 Feb 2025 18:51:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TERINICHOLS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f9c0ea244a45bbff511ca23f29217380a8ab11945bd349844e7de863ffafd50</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TARATOY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21356</link>
<guid>4b698ccb9137b9946f50b25962c7cd6a</guid>
<pubDate>Mon, 24 Feb 2025 18:51:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TARATOY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0fac7e8184d23d0a3cda2e068a8fe67ef9ae2d3468fcc6eab0db31e3a025a093</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TALLTAILSDOG.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21357</link>
<guid>bdbe7e66f577b4e312fcc1b94eacc673</guid>
<pubDate>Mon, 24 Feb 2025 18:50:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TALLTAILSDOG.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db7796ef1d3fd9b9c74035dc069e85fcbda7d581f712ed1518075c71620c0037</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SAMSCLU.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21358</link>
<guid>cdf8cce6a4faee958d05df52054add74</guid>
<pubDate>Mon, 24 Feb 2025 18:50:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SAMSCLU.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab769d4dc15ec284d11b3806bdbe7e426a7b84f833e4d7dcd71a94f8f0f85c3d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SCHAWK.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21359</link>
<guid>0c5bcd68aebc9060a7f2e5047bb962de</guid>
<pubDate>Mon, 24 Feb 2025 18:50:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SCHAWK.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>70921cb0fe325aac5286928e2122eafa9663c4a05a5fc9bebcbbc864b2bd9fc5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SDITECH.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21364</link>
<guid>6b387ebbcb8020ce186644d4a4669c6a</guid>
<pubDate>Mon, 24 Feb 2025 18:49:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SDITECH.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d73d7a5d06fd21ceeb8ae55b3f71bb10130630df997b08767c2f90eb729eaefc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SUN-RICH.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21367</link>
<guid>a4c2198d75787693192f0286f4c9f15a</guid>
<pubDate>Mon, 24 Feb 2025 18:49:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SUN-RICH.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b292e70c2f124a92d5215763a2508a5f2d813d6d075b70dfe67a6e446c6096fa</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>STUDIODESIGNS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21369</link>
<guid>7ab0afee6c265ec9f4a5f766fd774242</guid>
<pubDate>Mon, 24 Feb 2025 18:42:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>STUDIODESIGNS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e657ade5b9c3391b3916dc2ee8494bddd6318da21ae06f8cfb0b1ea3bc19fbe</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>STILACOSMETICS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21370</link>
<guid>94ffdad89680d66e0e6dd2b57c8ee4ef</guid>
<pubDate>Mon, 24 Feb 2025 18:42:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>STILACOSMETICS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d32a938d268df6d701625811e244b4ee56d0dd99b730f06c90ba629bc897234c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>STEVENSONBEERDISTRIBUTING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21371</link>
<guid>a921dee1e83e119429ce64b6d26ecc99</guid>
<pubDate>Mon, 24 Feb 2025 18:41:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>STEVENSONBEERDISTRIBUTING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33b4ea3b1b9af1eb84f670a662591d0ff95096d6652b8b20a494041090dea609</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>STEPHENJOSEPHGIFTS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21372</link>
<guid>e91540a780f62979576d7aa372139a4c</guid>
<pubDate>Mon, 24 Feb 2025 18:41:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>STEPHENJOSEPHGIFTS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>097fa88f7959e135078d6880aab194b617583cf9b339d3810dc2c3e17088542f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>STELLARPACK.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21373</link>
<guid>5f650923ba813c6ff71c027767b9919c</guid>
<pubDate>Mon, 24 Feb 2025 18:41:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>STELLARPACK.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4edfcdbc28a042c9ddf19bb2627c1573afcfa0afacfcb6ffad92b0a6b781bd70</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>STANLEYCREATIONS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21375</link>
<guid>3f006806e0d860271f42f3c1c5946bb4</guid>
<pubDate>Mon, 24 Feb 2025 18:41:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>STANLEYCREATIONS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>09e4870a295e7c47ce100cf200ef682f0e8f42201a761f7522d3cb3e904d0ba8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SPARTANLOGISTICS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21376</link>
<guid>2338fea343be1e96d7bd8892726b13fc</guid>
<pubDate>Mon, 24 Feb 2025 18:41:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SPARTANLOGISTICS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>69194c5f041dc364eadeb8180a522d115d949a21894d1d42e93b974ea178a93d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SOBELATHOME.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21377</link>
<guid>c7cca85fb808ff22d4196d92a56b94a0</guid>
<pubDate>Mon, 24 Feb 2025 18:40:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SOBELATHOME.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cecebd446f41c37bf2f4c5de52012948a541e9aaf051988a4fe3d8f78455e922</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SLTRANS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21378</link>
<guid>47aad7688350fbfd9a9109e8ee88f0f4</guid>
<pubDate>Mon, 24 Feb 2025 18:40:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SLTRANS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91f79abb24273fe90a9185a555d57cc3996a72c2110883d945786e6b9626b6d5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SIMPLEHUMAN.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21379</link>
<guid>a5e5bc0af001017b93172009d7a32b68</guid>
<pubDate>Mon, 24 Feb 2025 18:40:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SIMPLEHUMAN.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>58d840a7c734e6eaa61008293403f7b5372db15a91a5ee60eff132e0d805c2ed</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SHIPGFS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21380</link>
<guid>9786d91e129d1c16bbed55aaa2445c78</guid>
<pubDate>Mon, 24 Feb 2025 18:40:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SHIPGFS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f4fb65fcfb37d5aee376fc111a1404cfbebc8911b8a4e39720f697a636c9130</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SAUNDERSMIDWEST.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21384</link>
<guid>c8fd9e36fdeb06bcc93a0732c667b6d8</guid>
<pubDate>Mon, 24 Feb 2025 18:39:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SAUNDERSMIDWEST.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e0a643a01eae9a0a0c628d14ff6844524cd9b20f413e80ef8913c524bd4ddf03</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SATCO.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21385</link>
<guid>600a4d6403d3914e1e24b13808bd4bd4</guid>
<pubDate>Mon, 24 Feb 2025 18:38:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SATCO.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>977e53ad2809013b6dc199f093c3d37a3ae510965f208f4672f7bce8726ec8b6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SANTAFENYSHOP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21386</link>
<guid>aa2c6857a88b778501aa2d51ae3ccade</guid>
<pubDate>Mon, 24 Feb 2025 18:38:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SANTAFENYSHOP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8c63f439d58045afc68c4b9c7c3a39150d67fe9063acc302d7a8a51342f8ab61</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SALTEDAWG.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21387</link>
<guid>7c581b412887d3ddcf188128ec7d7cd5</guid>
<pubDate>Mon, 24 Feb 2025 18:38:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SALTEDAWG.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>025de5f2a7ae2cf4c4486296c83ab07c1dc8b43e27b7a89549f66ba04034e1f5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SALSON.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21388</link>
<guid>00e53a7bf746f90a6700232281a0a6d0</guid>
<pubDate>Mon, 24 Feb 2025 18:38:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SALSON.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e661903664b6677b95ac6daa5ba15ed66f691463550e808f7a2aabbcf77303ce</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SAKAR.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21389</link>
<guid>25c483880f8520828af4dba5d726d1e7</guid>
<pubDate>Mon, 24 Feb 2025 18:38:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SAKAR.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89635604aa5d10936b03273c9d8bd44ff8082efa9af9506bd9dbb237c387261d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>REVITALASH.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21390</link>
<guid>adf21078378b5c29d76423f457256e9d</guid>
<pubDate>Mon, 24 Feb 2025 18:37:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>REVITALASH.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34fb3a329bd01e7b86bd7987030251547d155361cdc73a4e9ec7215d2014376c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>REDCLAYGOURMET.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21391</link>
<guid>109ac6c7e70ef69fcbf717f86c278ed1</guid>
<pubDate>Mon, 24 Feb 2025 18:37:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>REDCLAYGOURMET.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a0a21a4f2de9f929037742f8ff276b78f97d8e5afdb152005d9aeffdcb1a4c3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ROUNDHOUSEGROUP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21393</link>
<guid>27952e90aad62b895d7bf8b36405a994</guid>
<pubDate>Mon, 24 Feb 2025 18:37:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ROUNDHOUSEGROUP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa60a2ae3d8c3bde2cb026f71aac59a00d332f2e770c97afbb015fb5708a6b43</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>REMAFOODS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21395</link>
<guid>69726edffb77c960d05785f5c26de5d5</guid>
<pubDate>Mon, 24 Feb 2025 18:36:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>REMAFOODS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd2639767b983e503c4e96b87269068d500344f149d4363b18927a7f9486f7da</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>REGENCY-RIB.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21396</link>
<guid>2d31d718f0f891ab8dc5da1013fd2741</guid>
<pubDate>Mon, 24 Feb 2025 18:36:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>REGENCY-RIB.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ede2772eeb401efbea226b6998e00872b62d1eff7c198f04d0152809857a1d1a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>REESEPHARMACEUTICAL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21397</link>
<guid>10112e4e12aa494db03ea2462302d34d</guid>
<pubDate>Mon, 24 Feb 2025 18:36:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>REESEPHARMACEUTICAL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9dffcb51ace612c669d242077713b01ccb463227332f796bf4d588a4fb674733</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>REESECHEMICAL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21398</link>
<guid>47412a37c01ba9ff688b231216c04ad2</guid>
<pubDate>Mon, 24 Feb 2025 18:36:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>REESECHEMICAL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b720b5d9a742f71a21a92da7a8a53758c5ecaad5129debbdb522dd4f3a23d21c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>REDDYICE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21399</link>
<guid>07e6663e4f8504f56cf059d5c5980708</guid>
<pubDate>Mon, 24 Feb 2025 18:36:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>REDDYICE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b672c6a4e1176d7e163d772e7c42d14585433d6fc26173519fa7d37f230a121d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>RDSGAMING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21400</link>
<guid>e9c0ded40a0630024a51c161925ec257</guid>
<pubDate>Mon, 24 Feb 2025 18:35:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>RDSGAMING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a4b5bdf3e3cd2088c78d2c92507df9f3a29168e7943a87d52a1fd0684f12b3b9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>RAYTIK.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21401</link>
<guid>f9a78afdf5be220d8779569e5155eab1</guid>
<pubDate>Mon, 24 Feb 2025 18:35:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>RAYTIK.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34e729275b7a8ba243866b3103292185edecd52c2d04bdd1f0828c702ff20d4d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>RANDSTRUCKING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21402</link>
<guid>231e3d1635ff621b8c1c3a9f5c0b2b20</guid>
<pubDate>Mon, 24 Feb 2025 18:35:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>RANDSTRUCKING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f42ef294eb4655fa2af46c9fa6b913055be406cc4dd157de41b48d330e1b7878</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>RACKSPACE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21404</link>
<guid>f08ddeeefd0099a226d98ab014e6e3ca</guid>
<pubDate>Mon, 24 Feb 2025 18:35:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>RACKSPACE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e74e8500cc433cbca490ca698a65571acdf448d8adeb986250a67e6ad559d1c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>QBTRANSPORTATION.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21405</link>
<guid>6943317304e0f076bc8f12dc02c48e9b</guid>
<pubDate>Mon, 24 Feb 2025 18:34:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>QBTRANSPORTATION.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36e81814adae907d1603df0a6c365d25e78deab69fcd0528c68b626e2942aa38</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PTCOUPLING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21408</link>
<guid>e207f16c28033acac2cecccf3d36409e</guid>
<pubDate>Mon, 24 Feb 2025 18:32:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PTCOUPLING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1baa11936b862d3aef181c05f35557f4f2eff2e66c270f7fbd94e9076a6c1ce</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PRESPERSE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21410</link>
<guid>51783435ce8f5bb47f2c2bc7ebc29eb1</guid>
<pubDate>Mon, 24 Feb 2025 18:29:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PRESPERSE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0fda0a2be666a3804a6fc0e968ef8b4c5da312d7fee9f1c26f60080cff9ee5b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PITSCO.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21411</link>
<guid>0666975194b979da8d9b57be5f230c4a</guid>
<pubDate>Mon, 24 Feb 2025 18:29:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PITSCO.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60eb8f803c326697c630773950aa541c5937f39d974e28e1971e8a732bc312a0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PHYSICALDISTRIBUTIONSERVICES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21413</link>
<guid>50fa544aed05b973f5f774b13ca04712</guid>
<pubDate>Mon, 24 Feb 2025 18:28:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PHYSICALDISTRIBUTIONSERVICES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36ff2b0cc33c191b6657a953ec7d7a78b0293af94092ab128d1b10dba1591632</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PETMATE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21414</link>
<guid>d0881bf5a7895640b88372a784a7eec4</guid>
<pubDate>Mon, 24 Feb 2025 18:28:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PETMATE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4479104aacdfd83d19218068496adb430a100a3c225456088bf9a16706044b12</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PERRONEANDSONS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21415</link>
<guid>1e915f881507bde3fbdafa3c2087cf69</guid>
<pubDate>Mon, 24 Feb 2025 18:28:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PERRONEANDSONS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b936c03b07c560c36712760f0443f99d78753ab175cb276fe24426641229ad89</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PEMAMERICA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21416</link>
<guid>f2b3726e205922943e6898a60f5d894a</guid>
<pubDate>Mon, 24 Feb 2025 18:28:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PEMAMERICA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dad3e50d988af6f49ce986a7da65467b10662b5330eca11c948bec066d07a58a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PELLONPROJECTS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21417</link>
<guid>f228d2e6f9099153388e9470180c8302</guid>
<pubDate>Mon, 24 Feb 2025 18:28:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PELLONPROJECTS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df41ecd79819863a7545014e49827f95de8ba0326bc40fd17e34dbf0bca82849</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PDSITE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21418</link>
<guid>db9aad0a768e82ed7c1b4b3f86b829fc</guid>
<pubDate>Mon, 24 Feb 2025 18:27:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PDSITE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8ede0f3ee7ba2a99594d5b6292104c7b1fe719566e0d3024ce565cbe63c74f4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PAIGEDENIM.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21421</link>
<guid>01671d8272924e3d10bce2c73066e933</guid>
<pubDate>Mon, 24 Feb 2025 18:23:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PAIGEDENIM.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e18677f0df6139b65c76ef8ed20bbfec9d8c2418028a74e4aaec99f2d0b6c146</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PAIGE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21422</link>
<guid>02f83d35779d1914212cae6784e70d18</guid>
<pubDate>Mon, 24 Feb 2025 18:22:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PAIGE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4effb004b5e09e3e6f9679a029346fc2ea91e96dafa287f2acf291a2687a113f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>OUTSOURCELOGISTICS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21424</link>
<guid>46f71057ed130f9be29510f68ce4ee71</guid>
<pubDate>Mon, 24 Feb 2025 18:22:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>OUTSOURCELOGISTICS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce3d52b4d04784da264146e75278c304c4e97412e4d3551195420d78426622fb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>OREGONFRUIT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21426</link>
<guid>8122ecf0e8a3dfbbd36d13b64aa30796</guid>
<pubDate>Mon, 24 Feb 2025 18:21:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>OREGONFRUIT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cbd2678de79c522256b98747777d7adc9a704c724b58e89d3a089985243a31dd</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>OUTERSTUFF.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21427</link>
<guid>141fded8387b387998eeedd6820f3ee3</guid>
<pubDate>Mon, 24 Feb 2025 18:21:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>OUTERSTUFF.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06cfb2341e5a3c23d72fc747faf54a31f2ce6ce1709c6a512c52e9976660d240</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ONWBEER.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21428</link>
<guid>77d756bc450e12c9eb62517c97afc6e9</guid>
<pubDate>Mon, 24 Feb 2025 18:21:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ONWBEER.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9df6df40b31e03425c1a24505136c036e40d2e24da4688eadb26488760bb0f04</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>OLDSPRODUCTS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21429</link>
<guid>a42c6d96e478f1d17de4125dd591e306</guid>
<pubDate>Mon, 24 Feb 2025 18:21:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>OLDSPRODUCTS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bcc293b78a7821cd612865f24156b500dc6e974ff4dcdf38a8c7032616439c30</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>OFFICEBASICS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21430</link>
<guid>feafb280b99f47d2e75d6008f73c15a3</guid>
<pubDate>Mon, 24 Feb 2025 18:21:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>OFFICEBASICS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b007e91e774cd534f8b88ad4239bdc32e47225079985baf3eed69bb969128ae0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>O2COOL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21431</link>
<guid>d42d69e7f0bd978777cca54687d3f1b7</guid>
<pubDate>Mon, 24 Feb 2025 18:21:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>O2COOL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>74b57b4ce9d047d10a330b738baf1806aa7842526bcbc57f0cd331d916545b05</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>NEBRASKAWAREHOUSE.LOCAL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21432</link>
<guid>6de1de23aac1b51733a0c789de180879</guid>
<pubDate>Mon, 24 Feb 2025 18:20:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NEBRASKAWAREHOUSE.LOCAL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fb5e2e1fccfef8fab099379500dbae5ea9d698fc9638d58fda705c5ba3ef90a2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>NORTHWIRE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21434</link>
<guid>9da23ab27b8170050f4f24548c3c5ac4</guid>
<pubDate>Mon, 24 Feb 2025 18:20:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NORTHWIRE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>59ce392fd3d9107a3a7b1827ec9f82ae5f89eb81a406e2e0de9d89fb086f124c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>NYCALLIANCE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21435</link>
<guid>c008c31802ec4b9c2126914d5d41ed9f</guid>
<pubDate>Mon, 24 Feb 2025 18:20:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NYCALLIANCE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a99d6049b9e14a0874b123c38506496990146bdffedb2cd2ab171aafbc7191c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>NPLUS1TECHNOLOGIES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21436</link>
<guid>d6e4f7092412810fe574f27408dbb8a2</guid>
<pubDate>Mon, 24 Feb 2025 18:20:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NPLUS1TECHNOLOGIES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>800e1053d3c6c9d461905b620ec6c19f124db77fdabad40aaadedffccd477124</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>NETPLUSTMS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21438</link>
<guid>ec703769ab1025a5cb18344a3e68ee55</guid>
<pubDate>Mon, 24 Feb 2025 18:19:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NETPLUSTMS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>43bd1d02b6a88fcbdd9a864e0437e395e8e721e25c706d657e39b74fa2bfec16</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>NATURESWEET.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21439</link>
<guid>4851be13cf2335c7f889d389d219fb24</guid>
<pubDate>Mon, 24 Feb 2025 18:19:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NATURESWEET.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2693bd693f42b0d3b59863724140e1c178c52d3ef227a4a68d29902eed1fb7f4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MAPLELEAFFARMS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21440</link>
<guid>247e7efbde76a5bdf2dadbbacce18e7f</guid>
<pubDate>Mon, 24 Feb 2025 18:19:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MAPLELEAFFARMS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>027214ad3244efcb6b17cf4993938db8ff5f3f40c44d973605c60ea9d65a8b20</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MMSUPPLY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21443</link>
<guid>2cfc7c2a1eabaff9fdcc09b009e8edad</guid>
<pubDate>Mon, 24 Feb 2025 18:18:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MMSUPPLY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>256581890ab0c22c4a44b09989205c69343de063786375f600fa4b272eb1d5d1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MYSTICAPPAREL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21447</link>
<guid>e6ad1286b0fd7a04c6aca2fa83a39d49</guid>
<pubDate>Mon, 24 Feb 2025 18:17:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MYSTICAPPAREL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd30b4026ff7d2b0abf6a4a78cdaeabbaca29ec8a25d0d7b7a991d9d6dbba5ea</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MAHARTOOL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21449</link>
<guid>81d7409c8053a78b7582a482aa61ef99</guid>
<pubDate>Mon, 24 Feb 2025 18:17:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MAHARTOOL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ec482124a079137a0931ed128f5254ff0d6b4f6c9cc036558ee8923ff8d6c86</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MERCERLOGISTICS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21450</link>
<guid>c2c1fc225872c8f4b8b18410e10ff072</guid>
<pubDate>Mon, 24 Feb 2025 18:17:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MERCERLOGISTICS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ed16b37b1820546b992f0c3a989a1b8465e20e85e45869bf3a6ef832627c953</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>METALANDWIRE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21451</link>
<guid>a5451ac57849a2ed0d3938dd4a3efa39</guid>
<pubDate>Mon, 24 Feb 2025 18:16:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>METALANDWIRE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff11e2e90db16b0261754c69bd4d76b05734b44798d945a9709e8bbeb220f946</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MUXIE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21452</link>
<guid>51e7fea7f69ef6875f82e22c5eda5e26</guid>
<pubDate>Mon, 24 Feb 2025 18:16:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MUXIE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8faf85d41124e20871eb8091de0a1d88784641c3530fc35b1c9ac0d5e98e3475</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MUNDI.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21453</link>
<guid>85d6066ab1d290b884a7f171042dc1ca</guid>
<pubDate>Mon, 24 Feb 2025 18:16:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MUNDI.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c6c49e85a181e2f49ec6e7fa247a44667bd0fbb89a54e4661d9b3c2afd24b72c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MORET.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21454</link>
<guid>93af461084793fe02a394f7efb844716</guid>
<pubDate>Mon, 24 Feb 2025 18:16:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MORET.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e9dd9d07794a54d96c5befe307e9da9b79c3a3e36a5d13515f7032fadd562a0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MONARCHBRANDS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21455</link>
<guid>42afdcd383ddd4cbf623792bafdbd6ab</guid>
<pubDate>Mon, 24 Feb 2025 18:15:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MONARCHBRANDS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1d8e276e9aa3a9c249a388e27b91ce7d6ed6b9a2a9005394be05a159ee98b49</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MGAINNOVATION.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21457</link>
<guid>a6a141f631618325c81115ed35c32ff5</guid>
<pubDate>Mon, 24 Feb 2025 18:15:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MGAINNOVATION.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b313f025f0939c44d21050d04249b21c3d246b2145a2ff8d67dd8e6098c70f1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MGAE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21459</link>
<guid>2e0894db9ac21b8645fdc4170b736f79</guid>
<pubDate>Mon, 24 Feb 2025 18:15:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MGAE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8fa0971734d0b212a824516ca30961c9c99092db8cd44c857f7e6fb0d8172ae1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>METOOSHOES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21460</link>
<guid>1e74f51b4cd0aaa6c3e0b77c71851ea7</guid>
<pubDate>Mon, 24 Feb 2025 18:15:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>METOOSHOES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6ac44d8ce854554ac95b932bd1add1f2e715aae209ff8fff10ed8f304764003</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MERIDIANGROUPREM.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21462</link>
<guid>37e83c96bcea8158cced5add35c02417</guid>
<pubDate>Mon, 24 Feb 2025 18:15:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MERIDIANGROUPREM.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7173a0e362466129a9344c7515dbb278d39e7095efbe2aa33abe092554b192ed</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MEGATOYS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21465</link>
<guid>f4901fe9f7579de134a23723831738ac</guid>
<pubDate>Mon, 24 Feb 2025 18:14:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MEGATOYS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fee80ab5935225adc7ea42931479ce04539c29d7dce436fbeafc5c650ed7c2e9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MEDCODATA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21467</link>
<guid>b83befc6ccb95cef05f27e608a5896ec</guid>
<pubDate>Mon, 24 Feb 2025 18:14:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MEDCODATA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9db6d4a9c64f2d48175d97babbb6b37ad4ace105c5f9ac50cbd07fa10343ea6c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MAJORLABELGROUP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21471</link>
<guid>b8c83e21f7df5abe23deb523d78ce79c</guid>
<pubDate>Mon, 24 Feb 2025 18:14:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MAJORLABELGROUP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>899c2d89467f60e2d1cdb43b51c39cc8c87d4decebf1ab7fdb4b145d3ac0970c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>LOLLYTOGS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21472</link>
<guid>faad1b29c35021dbd2bb8ef59d3c70c6</guid>
<pubDate>Mon, 24 Feb 2025 18:14:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>LOLLYTOGS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c832602e5f2db8f3c03becefbe64b4ec3690edcd78c61bae94bcf977cf576802</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>LAWSONROANOKE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21473</link>
<guid>fc1027164548d0abe0f897f083c29dd6</guid>
<pubDate>Mon, 24 Feb 2025 18:13:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>LAWSONROANOKE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b53032b2310b45b66d51eed552a0a4a9cd5a778bf6793692cb1fa16e982d380f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>LYNNS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21474</link>
<guid>515f4b1414c40dd89c5d73bb0c1671ac</guid>
<pubDate>Mon, 24 Feb 2025 18:13:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>LYNNS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>912fd7e1599d9792f8f3e8918b5dcdf2ec3f0ba3eba1a120817aaff017c838f0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>LOSCABOSMEXICANFOODS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21475</link>
<guid>3bca96ba3b13ba86d650abe2a99f13a7</guid>
<pubDate>Mon, 24 Feb 2025 18:13:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>LOSCABOSMEXICANFOODS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f5cf3a0ebec2efef117421a1965c50fe7f1637aa9dc1e28e27d05cf3216e3ab2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>LOSCAB.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21476</link>
<guid>9eec67a7083de7ce59a9e898049a065e</guid>
<pubDate>Mon, 24 Feb 2025 18:13:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>LOSCAB.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f2871e84f4b3c5c831cb18cc2f6ffe465d3b27bcca6596bfea757fcb3ce7a92</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>LNFDISTRIBUTORS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21477</link>
<guid>ee2584054b4963d51cf5e2387604cd86</guid>
<pubDate>Mon, 24 Feb 2025 18:12:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>LNFDISTRIBUTORS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9ffb67404eccc1dd6d82209fc52049383c3dbcca4107cbfff721c03a3951ae6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>LITTLEARTH.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21478</link>
<guid>9063366e3ba3efafeddfb78e4e422c62</guid>
<pubDate>Mon, 24 Feb 2025 18:12:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>LITTLEARTH.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>05ee5be360c9370f4a6aa416601f5751eb566a363161920dfd65b800c0e8d846</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>LEGALTRACKER.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21480</link>
<guid>0a6e039a028dd9a64239473ff08c82c6</guid>
<pubDate>Mon, 24 Feb 2025 18:12:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>LEGALTRACKER.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f3889bf6d5def1eabbddf1b6d045804c87440a3213742b7ce243bd290c93ceb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>LEADINGLADY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21481</link>
<guid>ea023e25b4a584e9cb10c7ac5ae6ee32</guid>
<pubDate>Mon, 24 Feb 2025 18:12:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>LEADINGLADY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>74d1125a459b807d585e3e1249d314640e85f229f527567740c2c46a9420dc6a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>LAPOLICEGEAR.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21482</link>
<guid>b80d1ec3ddec44d03ab7b4d32a6ae480</guid>
<pubDate>Mon, 24 Feb 2025 18:11:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>LAPOLICEGEAR.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89d1099d9fc1786d70ec512a9818b784d1474499434af86b766444a184bcb643</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>KEELEWL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21483</link>
<guid>7d929be5b3d4531b7ac0babdd9f49673</guid>
<pubDate>Mon, 24 Feb 2025 18:11:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>KEELEWL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c817f4b46f2bbc72e53e762c2534e7574b187c9fb0db33bc9d7e6eb38f944db</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>KWIKGOAL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21484</link>
<guid>64c32b8eb5304d80ba093227975ece13</guid>
<pubDate>Mon, 24 Feb 2025 18:11:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>KWIKGOAL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a64bf72c5be24698fae4832b49a9c9962d8c6049fa1f61c16a88a357ce87203</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>KURTADLER.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21485</link>
<guid>5fffe13c978a4c75c212c30e080f6e28</guid>
<pubDate>Mon, 24 Feb 2025 18:10:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>KURTADLER.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0027985b1aa8e8f08d60abc7c933dfd4e054ec37da90f7b06af4cbe00e0626ad</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>KOLCRAFT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21486</link>
<guid>b572466afc936e2a5989482723434043</guid>
<pubDate>Mon, 24 Feb 2025 18:10:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>KOLCRAFT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8108060958502dcb97aa3f6d0285953c93a427596b041de5e723c01e1da1f290</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>KOCHLOGISTICS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21487</link>
<guid>743a3892f8ced95e1fab16fc98a9f3e3</guid>
<pubDate>Mon, 24 Feb 2025 18:10:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>KOCHLOGISTICS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4fee315649050fa2ba01f60a1546a4dbd2780be2ba00404f27dc28ecabf60fcd</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>KNFILTERS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21488</link>
<guid>8c38890c0ec1120a65a3e67057936baf</guid>
<pubDate>Mon, 24 Feb 2025 18:10:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>KNFILTERS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c31e88e969653bdf5beb5926700dd5e1225396eb3eea4f29ff60fbef9d36dcf1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>KIRCHNERBEER.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21489</link>
<guid>27fa0d898aa0a20eba405302ab201cf6</guid>
<pubDate>Mon, 24 Feb 2025 18:09:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>KIRCHNERBEER.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fdff06542b24bf3267d241b03427b941a10fb2d6dc06cb239dcebf07f47c026c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>KIKKERLAND.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21490</link>
<guid>2961e81dfb2ddaa93aa482cbaebaa91c</guid>
<pubDate>Mon, 24 Feb 2025 18:09:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>KIKKERLAND.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cba5934c5d4aef434a6c1f11d2d3f7251b76cde2f0c825db40bbc541aded915b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>JDADELIVERS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21492</link>
<guid>42819db6a1110a53719d796c443ddffa</guid>
<pubDate>Mon, 24 Feb 2025 18:09:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>JDADELIVERS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0bfe31f7bda3b76f3ff16636933cbcbbb3d4a32dbdfbc73996317bfb5152816b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>JPWEST.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21493</link>
<guid>f320f1feb26db7e64dcd0f648a6d6738</guid>
<pubDate>Mon, 24 Feb 2025 18:09:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>JPWEST.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>430fbb723dc5e53500225af63e6de80fa0525e65899d41fe2225655839fa36b0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>JOHNPAULRICHARD.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21494</link>
<guid>d539ea6f856d9bb5765ae211a89c1573</guid>
<pubDate>Mon, 24 Feb 2025 18:09:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>JOHNPAULRICHARD.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd1d990db22d1751d26278f9f6014d4997de6d46acf37bfc1b80a365ae9db34b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>JOBAR.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21495</link>
<guid>3682cca356dc22eb5a9bbc009412d4bb</guid>
<pubDate>Mon, 24 Feb 2025 18:08:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>JOBAR.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de1b2e6ccf04c61543172f3bd1a2f815b4a9eca096c164bf47f58ca6444db0e4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>JENNE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21496</link>
<guid>a8c09018053d2e7021ddcb01cf0e4c2a</guid>
<pubDate>Mon, 24 Feb 2025 18:08:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>JENNE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a2b634047df635a284f9cc62e108aa25d06e35f8d2cd0281eece00caa3ac7c17</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>JAYAAPPARELGROUP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21497</link>
<guid>fe8946bd00dd1178502ce6befbb2a29a</guid>
<pubDate>Mon, 24 Feb 2025 18:08:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>JAYAAPPARELGROUP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57c1472b005b814c6bcfe2e5fb4586cd59fbf2f3d268ec309f311548e9e234eb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>JAGGEDPEAK.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21498</link>
<guid>55ea27b4b82dd858f2f7d75cb01f221a</guid>
<pubDate>Mon, 24 Feb 2025 18:08:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>JAGGEDPEAK.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c80a6ba5cc3128cf9f47bf33f7e549682774169ee5fd3e8aaab0dc1cb057ab41</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ID-GP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21501</link>
<guid>12af59cd7f4ef7a1bd550a800e703af4</guid>
<pubDate>Mon, 24 Feb 2025 18:07:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ID-GP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a2d9a9d815cd22e0430e520969df29ea921c2e85e58de039eedae779516cf023</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>INTELEKTECHNOLOGIES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21505</link>
<guid>a76c856f36b4d6f8b0a9bca9d3e81654</guid>
<pubDate>Mon, 24 Feb 2025 17:07:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>INTELEKTECHNOLOGIES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>669604ef18243d52bf296f0c85b81f37bbef76c16798dc7156e7d9acbc669e39</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>INNOVSYS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21506</link>
<guid>7905b0944f96ad2ec318855ae68fed89</guid>
<pubDate>Mon, 24 Feb 2025 17:07:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>INNOVSYS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8a29a223bdb74612fcf71b131fb7c9f4025e8b2cfe70252daf61937612535a88</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HPE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21508</link>
<guid>975798660f9f54567515a103ad35eb99</guid>
<pubDate>Mon, 24 Feb 2025 17:06:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HPE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5fabb5ec8e5bbc46e22cf5afba156d8a5727fb9e365cf8bb86bf01256c62eaec</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21509</link>
<guid>964e7520947a0d3ac39504daea604d83</guid>
<pubDate>Mon, 24 Feb 2025 17:06:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6d202811c9efe1605ac032ffae71c442553f6f5f442f3c87d02035876ed9005</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HOLLANDIADAIRY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21510</link>
<guid>007f1041969194e99b73e4e5fac7396f</guid>
<pubDate>Mon, 24 Feb 2025 17:06:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HOLLANDIADAIRY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c64f2418c419bd46869993a885f931ab2915ef439869009d08c0dbd691cfbe4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HIGHBARTRADING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21511</link>
<guid>f37cf9ea93740f0bd3177789c2b244e4</guid>
<pubDate>Mon, 24 Feb 2025 17:06:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HIGHBARTRADING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9d23ac3af5af8525773d4a5cb736625f493c119116b208e2e263362f4f48ad2c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HENDERSONSTAMPING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21513</link>
<guid>0628578027f2f3e17abf142c0faec461</guid>
<pubDate>Mon, 24 Feb 2025 17:05:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HENDERSONSTAMPING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>10c087853778aa02171fe0a3265d12d5fd4a33141d5d5afbd6ab8e834b1f0c89</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HANSONFASO.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21514</link>
<guid>d1dc45410ca4949bb399990e7a228428</guid>
<pubDate>Mon, 24 Feb 2025 17:05:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HANSONFASO.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9df286d5dc5d68dae97904f1426b81c728756c78c3a722c127d1e4e9d94bf892</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HANSONCOLDSTORAGE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21515</link>
<guid>f75d99dda3af0d6a958fa06f2019d674</guid>
<pubDate>Mon, 24 Feb 2025 17:05:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HANSONCOLDSTORAGE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f5f0c140c17d31d94ad743396d6f16e3ea3f026aad5ea9bd1af0f34a9a9f25af</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GARAN-MANUFACTURING</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21517</link>
<guid>4496bd929399a73223322c2a9599ff1f</guid>
<pubDate>Mon, 24 Feb 2025 17:05:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GARAN-MANUFACTURING</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3e07329777ffe85d3847d01c0adf8552e747441101f62fff15e345ac9ddb340</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GARDNERHEALTHSERVICES.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21518</link>
<guid>d0d89ff88fb31cba6c10aeded5b96e8c</guid>
<pubDate>Mon, 24 Feb 2025 17:04:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GARDNERHEALTHSERVICES.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0bcbac524115fbfb09edb1e83b3d7b9e0f6e95821df4f9d51940f7347b8d284a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GREATPLAINSDISTRIBUTORS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21520</link>
<guid>0810699abe09927a03a8b5a0247c6797</guid>
<pubDate>Mon, 24 Feb 2025 17:04:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GREATPLAINSDISTRIBUTORS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>78d22becd9b82fcc145846c0f399fa21c4ae4ed5bece6573c688a793e632b662</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GULFSTATESCS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21521</link>
<guid>17de40aac6ef19073756e1237c8c0cb0</guid>
<pubDate>Mon, 24 Feb 2025 17:04:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GULFSTATESCS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a645b050031be09513d22e20bb09241dd79838791f63f2b9d9defd509ff93c71</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GTIMPORTS.NET</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21522</link>
<guid>cfa57ce2b96aa179a800c08015a481b7</guid>
<pubDate>Mon, 24 Feb 2025 17:04:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GTIMPORTS.NET</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>adfea8ad6f177146dc8ac44b013362f968e6740827126988afd7420d6984db1b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Navien-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21286</link>
<guid>ce3f64221a4fbc9ed30d001c572bc5a3</guid>
<pubDate>Mon, 24 Feb 2025 16:56:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Navien-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c74a31ea088b651211d348dcffbda55535b7ab5c93f47781932fc9d208ef5556</i><br /><br />Threat actor <b>description</b>: <i>The #1 brand in high-efficiency condensing tankless water heaters, combination boilers and wall-mounted boilers. Official ENERGY STAR® Partner. Navien products are available in the U.S. and Canada through a select network of wholesale distributors. We are ready to upload more than 61 GB of essential corporate documents such as: contact numbers and e-mail addresses of employeesand customers, financial data (audits, payment details, reports), NDA’s, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>FOODIMPORTGROUP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21287</link>
<guid>30a7476842882400480bb490ac3664df</guid>
<pubDate>Mon, 24 Feb 2025 16:55:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>FOODIMPORTGROUP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0d231f774e8669fbdadc2527152a5e67301f88f2c66d8cb5ec40f95ece6ffda2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>FINLEYBEER.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21288</link>
<guid>434d707f9a5c1cb8836dde8f27dee4fe</guid>
<pubDate>Mon, 24 Feb 2025 16:55:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>FINLEYBEER.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>27f2b099de5c8d3b30e2744cd35437c288be7248536e72ee61313973c8fe8071</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>FFL-GROUP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21289</link>
<guid>481f0dd7ae83e18513be0b4e400a9535</guid>
<pubDate>Mon, 24 Feb 2025 16:54:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>FFL-GROUP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>27da8054b30dfa1aac19f1bff6cb42b6484ff08999fba6f9001d3906061426f2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>FAUSTDISTRIBUTING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21291</link>
<guid>8f0ca6a7afda126df10bedb633192388</guid>
<pubDate>Mon, 24 Feb 2025 16:54:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>FAUSTDISTRIBUTING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b67a5de28d2659397d33913913abf96fdfa50877cd2d210d60a600de4c27895</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>EMSON.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21297</link>
<guid>dab41742ca4e4dea998dc421b9f1edc4</guid>
<pubDate>Mon, 24 Feb 2025 16:53:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>EMSON.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1face274959da3375240f6e4301e79e792e81b3a9ac7b257cea773fdedeb896f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>EQLOGISTICS.US</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21298</link>
<guid>eeb74a8ddfbb606f20020fd92e80aa0f</guid>
<pubDate>Mon, 24 Feb 2025 16:52:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>EQLOGISTICS.US</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8f1143e90fb1bef6080c73f25b978c0611346ff026e59c5d9ed5006638d9c085</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>EZUP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21299</link>
<guid>78f7a8d2193741fa2bfb74ea06e162b4</guid>
<pubDate>Mon, 24 Feb 2025 16:52:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>EZUP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>968962d0b42cda12eaa865752952a359572418043204d915d92626c557c83236</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>EXCELLED.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21300</link>
<guid>9d88196d9b43925ec4093e0228fd7803</guid>
<pubDate>Mon, 24 Feb 2025 16:52:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>EXCELLED.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dcf24378fd1c6815e45cb95969d1a768900ca631531613ad76a5a2e3b2dbb3ce</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ESBERBEVERAGE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21302</link>
<guid>7162d34e551d232ae0976c0dda4e107a</guid>
<pubDate>Mon, 24 Feb 2025 16:51:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ESBERBEVERAGE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5785fe892da39bf6e99e37389b73d7c2a1654c83e28e3c581a5c94aa21f4b897</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ENCHANTEACCESSORIES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21304</link>
<guid>d5ece54ea76a9e6632f4242df1820164</guid>
<pubDate>Mon, 24 Feb 2025 16:51:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ENCHANTEACCESSORIES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be08a97594eef109e1bda2e96e6deb0b1702080892169606e302444d7e39d386</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>UNITEDLEGWEAR.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21307</link>
<guid>9d76f64df165ca0697703c084b1a9cd8</guid>
<pubDate>Mon, 24 Feb 2025 16:49:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>UNITEDLEGWEAR.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da5fa43c913368faffc380892bc7cdc69c98797d313794eb59c86c30d4839e1c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>chfindustries.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21458</link>
<guid>a18efbe1a6705c27b61fb3a34af34c29</guid>
<pubDate>Mon, 24 Feb 2025 14:08:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>chfindustries.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7d14c1a5a626d9b606c8a1bbfd0a7c4b08f7906a2576faaa89d0a063bde50b8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>chfindustries.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>aiibeauty.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21456</link>
<guid>c451b65ab758cd6d1e39733de11ac1be</guid>
<pubDate>Mon, 24 Feb 2025 14:06:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>aiibeauty.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d5da630768c5e5e90fd11c08eb8ba33f5c49c395f62c2399d17072df227cc748</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>aiibeauty.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>formanmills.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21461</link>
<guid>001c728a3046207c685f7f478f4bb41b</guid>
<pubDate>Mon, 24 Feb 2025 14:05:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>formanmills.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>233cb3e8ad8a3271cfc321eaa4419f2c74d712ce9b5a37d53b64f50078681d1b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>formanmills.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>amalgamatedsugar.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21463</link>
<guid>5384c4cf5d30e4607b3a231047002de0</guid>
<pubDate>Mon, 24 Feb 2025 14:03:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>amalgamatedsugar.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8913a3a2a0507a7767c9625deea731ebe530ee27bc0b2e89c95dfa115c4ca030</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>amalgamatedsugar.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>electrocraft.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21313</link>
<guid>c6dd60a67f164c8a38cf909467b7415a</guid>
<pubDate>Mon, 24 Feb 2025 12:04:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>electrocraft.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db0d6c861f7f6c4505524231fafb3ebc323bd625c254c73d38f6d3743640fd68</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>electrocraft.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>associatedasset.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21314</link>
<guid>dc05a22fa14faf0bd230a08b658b156d</guid>
<pubDate>Mon, 24 Feb 2025 12:02:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>associatedasset.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f53fd921f991a7a4efc6a483ccb9e76b9f7617d5570f0a3e74ac006dd6dd5382</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>associatedasset.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>grede.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21315</link>
<guid>c3fdcb6bbc2bd6e8263cceb41c22b64b</guid>
<pubDate>Mon, 24 Feb 2025 12:00:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>grede.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f6bfadce6dee9af51bd560d74a2efd80dc347d77b33e16f9e5afedc91a992aa</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>grede.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>branchgroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21316</link>
<guid>121f6f951ebe28c187c975e6c17c081d</guid>
<pubDate>Mon, 24 Feb 2025 11:58:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>branchgroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e217856b4e3310bfbd070b4d0623d8f059597bbc639ee4bb582b6d58ad963c69</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>branchgroup.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>pace-usa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21317</link>
<guid>cb53c399f26849a87fe718b19e8c16ca</guid>
<pubDate>Mon, 24 Feb 2025 11:56:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>pace-usa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>719d604f57c24c1341e97258947421b8c0ee642f5d01b0b8b95f70cbcc9a191a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>pace-usa.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>steelwarehouse.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21318</link>
<guid>ef926983fef6f9c7f1207289ac8a0331</guid>
<pubDate>Mon, 24 Feb 2025 11:55:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>steelwarehouse.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7949842fe0b507b23c847343e021cafde3b98cc261f5854fef8dd20a3ec5865f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>steelwarehouse.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>stanleyconsultants.com190.5MUSA388GBlt1-DISCLOSED</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21279</link>
<guid>b040016a9f9b158b9e2110fd9299979b</guid>
<pubDate>Mon, 24 Feb 2025 10:53:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>stanleyconsultants.com190.5MUSA388GBlt1-DISCLOSED</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2e364f972c523b6a9500f620fd729f78874394d9f7046594342b87e29d4a306f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Johnson039s-Nursery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21277</link>
<guid>2c35aee2e3a2410da6736f221f36498d</guid>
<pubDate>Mon, 24 Feb 2025 01:00:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Johnson039s-Nursery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b92b75b872af249c083ab514cf13e761ddd9ecb1bdf64564d762df3ea9233daa</i><br /><br />Threat actor <b>description</b>: <i>8</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>Goldstein-Law-Group-S.C.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21263</link>
<guid>a607946dc79f1013740366224ff2b175</guid>
<pubDate>Sun, 23 Feb 2025 18:58:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Goldstein-Law-Group-S.C.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af494b4cf5137a1ec96e3a3385b91f942b9be6e1d1db663b2158fc4e57d78d76</i><br /><br />Threat actor <b>description</b>: <i>25</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>Northern-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21264</link>
<guid>cfa3cd042a8f3e4fef1c323e4496c7d9</guid>
<pubDate>Sun, 23 Feb 2025 18:58:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Northern-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a36f6645402431bd01be223816ddeb7e35c172be86591f16324f317a846c2e8</i><br /><br />Threat actor <b>description</b>: <i>27</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Northwestern-Illinois-Association</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21265</link>
<guid>a3301f2aa1d198cf589d59c5b76d2df4</guid>
<pubDate>Sun, 23 Feb 2025 18:58:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>The-Northwestern-Illinois-Association</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>868cff74d2d8999c4999862c3cbce1b7dd62c25a26ea351cc864a222a1299a41</i><br /><br />Threat actor <b>description</b>: <i>26</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.famcomachine.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21268</link>
<guid>bdd94213eae5e5178f6b2b8653b9b22f</guid>
<pubDate>Sun, 23 Feb 2025 18:48:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.famcomachine.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>764bb86f789dd2c44714cf4ada12ba03766757d260398df01c7b5a55a0ad19ca</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>BluAgent-Technologies-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21275</link>
<guid>eb373961a9e663f29108e296d307bcb8</guid>
<pubDate>Sun, 23 Feb 2025 17:23:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>BluAgent-Technologies-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0452f7f28e38d7782c92b4ba689aa2a25d377742da361de409100339c18beee6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>bluagent.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Novi-Community-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21274</link>
<guid>b2d480a4453ebdf16df158c05281fe0a</guid>
<pubDate>Sun, 23 Feb 2025 17:21:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Novi-Community-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>68b29363e03aa379262d5bd7c1bb9d2656a4a4cb89d53fe2ed5bb8c51bac3c5c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>novi.k12.mi.us</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Al-Bawani</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21253</link>
<guid>8c5c3183cdd8d97e052a133bf8c39e60</guid>
<pubDate>Sat, 22 Feb 2025 15:20:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Al-Bawani</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19add1e1a1e258a0e84521e3ca77f59b3bf7c70e2a48264cdad7b0fe83936b3d</i><br /><br />Threat actor <b>description</b>: <i>www.albawani.net

Prince Sultan Street, Olaya, Riyadh, Saudi Arabia

6.96 TB
Description

Al Bawani, headquartered in Riyadh, Saudi Arabia, is a construction company specializing in housing complexes, industrial & commercial buildings, hospitals, educational institutions, and more</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Martin-Energy-Group-Services-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21256</link>
<guid>a59e802e5d70af6b5169be0514427a4e</guid>
<pubDate>Sat, 22 Feb 2025 15:12:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Martin-Energy-Group-Services-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8d3b2e094eeb114f2edbc8a3c0c4331d581e50ea591200578e1b97716dff03a5</i><br /><br />Threat actor <b>description</b>: <i>Martin Energy Group Services are a complete solutions provider for generator packages, combined heat and power (CHP) systems, microgrids, and anaerobic digester design & construction. Martin Energy Group Services corporate office is located in 39415 Excelsior Dr, Latham, Missouri, 65050, United States and has 120 employees. The total amount of data leakage is 320.90 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>GS-Electric-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21257</link>
<guid>146e984733b19bf173f9e7552ecd933b</guid>
<pubDate>Sat, 22 Feb 2025 15:10:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>GS-Electric-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>acaf97db3679fc1a175971e7c424d972c6d926c28a7237e1ad43e191da79be99</i><br /><br />Threat actor <b>description</b>: <i>G&S Electric LLC is a trusted electrical contractor serving Shreveport, Benton, and Bossier City, LA, specializing in both commercial and residential projects. G&S Electric corporate office is located in 2127 Mcclellan St, Shreveport, Louisiana, 71103, United States and has 23 employees. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Benton-Police-Department</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21258</link>
<guid>241dfe5e876da942ca1dc3cd5986e093</guid>
<pubDate>Sat, 22 Feb 2025 15:08:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Benton-Police-Department</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9fcd815b2f86f540f84f24de771b13bcb3a10dce5bcf0ee61ce74e1d4f97863</i><br /><br />Threat actor <b>description</b>: <i>Benton Police Department - city police department. Benton Police Department corporate office is located in 114 S East St Ste 100, Benton, Arkansas, 72015, United States and has 52 employees. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Peter-Glenn-Ski-Sport</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21259</link>
<guid>ed86eaf4f8b892e9f596c77943561db3</guid>
<pubDate>Sat, 22 Feb 2025 14:41:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Peter-Glenn-Ski-Sport</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1bf63170e0ad294d149915d479fc3774ea14e2c542ec097e1539437b1c69638e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Excel-Security</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21250</link>
<guid>f3e473999b625855bdf3f6a75f7b8f3a</guid>
<pubDate>Sat, 22 Feb 2025 10:57:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Excel-Security</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>701a0c1310fa40c1da0f3c87ad0ab3e4be545f195a081eb63bdac0cfdeb29a9e</i><br /><br />Threat actor <b>description</b>: <i>Excel provides consulting, executive protection, guard, electronic systems insta...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>evergreenpnw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21252</link>
<guid>b99c61acedb54c5253819b7b4f2d88c6</guid>
<pubDate>Sat, 22 Feb 2025 10:43:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>evergreenpnw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>222ca802a9774a4202b9312ba313ed0f6473338508f15231581ba3145b71b99c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>alleghenybradford.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21251</link>
<guid>d71b1233f519e433457aadcb2ebdc66e</guid>
<pubDate>Sat, 22 Feb 2025 08:20:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>alleghenybradford.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>93d269685e83fa13d689fcb2e77644343f413ce45d76b37fcedfee9eb26559d4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>alleghenybradford.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>teamsters175.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21249</link>
<guid>5a0835b21387fd03f958d1a655749c4c</guid>
<pubDate>Sat, 22 Feb 2025 04:51:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>teamsters175.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b9ccbf2e6635285ac513bd132e448ab862048b4ff2da74401bbcb5a21728e848</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vvf-Ilinois-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21248</link>
<guid>b8719842648c05533160cb28de3df4aa</guid>
<pubDate>Sat, 22 Feb 2025 01:27:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Vvf-Ilinois-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2151c762589baa2b3380690696698782447a9a26ed748c4194875b97bff717a4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.nola-law.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21243</link>
<guid>307c9b78e38a1992064cb0d9318b9102</guid>
<pubDate>Fri, 21 Feb 2025 22:46:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.nola-law.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbf18b98df6306f89b614ce3efff10a2181901496bff42cd40171ad114dc38d3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.midwestvascular.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21247</link>
<guid>df6a6e36561c763b1f1ef7984bdb5124</guid>
<pubDate>Fri, 21 Feb 2025 21:08:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.midwestvascular.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bcf1689db39d6ca888ba46e7fe1b4a4ac96cdfaef031d2fcc54daadaebc52973</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.midwestvascular.net</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>megamtls.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21242</link>
<guid>bb663c3fb7a7738d173d9625eb7e34e1</guid>
<pubDate>Fri, 21 Feb 2025 20:46:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>megamtls.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b775dd1bdf7912c5dd34ca119fa4c55075a8b94747906afd44aa990504f66c14</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Luminus-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21238</link>
<guid>f2a40c043c478051e6230e5c6be59d0f</guid>
<pubDate>Fri, 21 Feb 2025 16:37:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Luminus-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ecda114f5b07c6cb84df4e6ef47d70bd5a2cee381c44c3a3a32c99d29f1e7725</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Siegel-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21241</link>
<guid>4ac61d3ece467a154921be8eb908680d</guid>
<pubDate>Fri, 21 Feb 2025 16:20:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Siegel-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8039384735b9bbd5637182ddb2ecc1c11182e13653cc0d7f2e78dd9d959e4e84</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>siegelcompanies.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Barhite--Holzinger-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21231</link>
<guid>8012c113f03996cd9a5511baa835b83e</guid>
<pubDate>Fri, 21 Feb 2025 14:57:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Barhite--Holzinger-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b60339777dfc0d782f545bd58f04ec822f60c349377fd942847ba1a2bafe9eeb</i><br /><br />Threat actor <b>description</b>: <i>Licensed Real Estate Brokers and Property Management in Westchester County for over 85 years. We are ready to upload more than 65 GB of essential corporate documents such as: contact numbers and e-mail addresses of employeesand customers, SSN’s, confidential licenses, agreements and contracts, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>statesideseattle.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21234</link>
<guid>01044cfd18dd5c0cde26733c11a3b542</guid>
<pubDate>Fri, 21 Feb 2025 14:41:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>statesideseattle.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7ac7b210a49aaa4d40147fd4b8128a0b9aa70aefcb0e3ef6c726403702cec7e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.fla-esq.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21233</link>
<guid>55c6017b10a9755ef3681b09ccb01e94</guid>
<pubDate>Fri, 21 Feb 2025 12:56:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.fla-esq.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ffcbf6512a9d9aeb19e9ff8ddb1bad94100c8ebd8679555cd5a5dbf7d22a37a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crossroads-Trading-Company-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21228</link>
<guid>ea4617226119a78dda076158cbaef41d</guid>
<pubDate>Fri, 21 Feb 2025 11:56:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Crossroads-Trading-Company-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a964178102a487f1819d948f3a838383e2919e4348f6a1b9b217b4b1500313f1</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 27.02.2025. One of the first companies to pioneer secondhand clothing as an alternative to traditional retail, Crossroads Trading has been buying, selling, and consigning name brand a            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.saracenproperties.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21229</link>
<guid>8108e7580d35a6df529b4cd78137c5aa</guid>
<pubDate>Fri, 21 Feb 2025 10:45:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.saracenproperties.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a35d554ef43adb6d6f1ad1a185cf55b7dd2f50d9687c726c84571b17e5ec8e1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.okddsi.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21221</link>
<guid>1b8058dee2800a7e966dcb494a5f1fed</guid>
<pubDate>Thu, 20 Feb 2025 20:48:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.okddsi.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56a51f04f31e3c2863e0b97b926cefaebe128930bbb21dc95a2c9963c662aac5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>conduent.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21226</link>
<guid>87cbdccd7c4f57001c682af769ef9b15</guid>
<pubDate>Thu, 20 Feb 2025 20:11:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>conduent.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad28a795673f8577475a7d5a1a20da5c11d7d7bae28ddb530d088775ae408c85</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>conduent.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Andover-Family-Medicine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21215</link>
<guid>67e7cfd2e483fbbaaaa54b5523753e58</guid>
<pubDate>Thu, 20 Feb 2025 18:58:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Andover-Family-Medicine</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ca09051fa4f11709d6bb3864b7ed8eb38bed2a9054ac65bbcf9d8a619258a5c</i><br /><br />Threat actor <b>description</b>: <i>Andover Family Medicine has been established since 2006. Our physicians are board certified in family medicine. We practice full spectrum family medicine including obstetrics, newborn care, well child exams, preventive care exams for adults,             ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>newhorizonsbaking.com163MUSA455GBlt1-DISCLOSED</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21218</link>
<guid>f36b63f4ca5d8a47097f5c0b69d9d306</guid>
<pubDate>Thu, 20 Feb 2025 18:54:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>newhorizonsbaking.com163MUSA455GBlt1-DISCLOSED</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d241f03d6701837095d786bc920a47eb9a70663f46a018937dda28fed9003582</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nebraska-Irrigation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21216</link>
<guid>f004a7ecc4215ef1a36afca580fd6380</guid>
<pubDate>Thu, 20 Feb 2025 17:58:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Nebraska-Irrigation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>73ec1c375a279414411465db5f8cc157fe8d4574fc0f07418541af0ff96fdf41</i><br /><br />Threat actor <b>description</b>: <i>Supplier and manufacturer of center pivot components to dealers domestically and internationally.We are ready to upload a lot of essential corporative documents such as: NDA’s, driver licenses, financial data (audits, payment details, reports), contact numbers and e-mail addresses of employees and customers, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Waggonereng.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21208</link>
<guid>2e544457e0583a48caeca4120b266684</guid>
<pubDate>Thu, 20 Feb 2025 16:48:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Waggonereng.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e23ac6b645d6f3dc98d14aaa369a865debb50569feab71b2674f2b61ded56348</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Minaris-Medical-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21205</link>
<guid>8c2f64f08271fc4e4351c12acee2a932</guid>
<pubDate>Thu, 20 Feb 2025 14:58:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Minaris-Medical-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1147723cfd33d725c6bab044aad1e8e2696e621709c413633162757b12aaf957</i><br /><br />Threat actor <b>description</b>: <i>Minaris Medical America, formally known as MAST Immunosystems Inc(1979-1996) and Hitachi Chemical Diagnostics (1996-2021) was thefirst company to introduce a multiplex in vitro diagnostic test for allergies and one of the first to introduce a chemiluminescent assay system for the detection of lgE antibodies. We are ready to upload a lot of sensitive corporate documents such as: contact numbers and e-mail addresses of employees and customers, financial data (audits, payment details, reports), confidential licenses, agreements and contracts, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>californiaclingpeaches.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21213</link>
<guid>2167fcf808b8f383e7e44e25305a08a8</guid>
<pubDate>Thu, 20 Feb 2025 14:44:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>californiaclingpeaches.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d823af422dd1dd29cd66c6b763792f56f04f308b17948c138350d3a0845ee13a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Access2Jobs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21206</link>
<guid>3ca7176898afc20f480adfa00ab194bd</guid>
<pubDate>Thu, 20 Feb 2025 13:57:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Access2Jobs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1bdf3fb573d8d7ac5aacd90fc46ff319b644b548e93b45c3e2a978fb17c035a</i><br /><br />Threat actor <b>description</b>: <i>For over 50 years, Access Inc. has been serving the most vulnerable and under-served populations in San Diego County by promoting self-sufficiency and economic independence. There are three main programs at Access: Youth, Immigration and Micr            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.phdental.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21207</link>
<guid>a59687b426e9eb30465997eb54862a2e</guid>
<pubDate>Thu, 20 Feb 2025 13:03:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.phdental.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b0899c708ef2a2d5f1f16b2c548612df8f39a459e8a07f108c9c39412d51d8d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Berg-Engineering-Consultants-Ltd.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21204</link>
<guid>3bd80cc75f3bee69358296a3c4d8f01e</guid>
<pubDate>Thu, 20 Feb 2025 12:57:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Berg-Engineering-Consultants-Ltd.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7adca3a8096a7e98ea979cec52c2570756c6e2d5da5ec3e6efb3129a00fd5cc5</i><br /><br />Threat actor <b>description</b>: <i>Berg Engineering Consultants, Ltd. is a consulting engineering company that provides Heating, Ventilating, Air-Conditioning, Electrical, Plumbing and Fire Protection engineering and design services for Hospitals, Schools, Offices and Industrial Buildings.We are ready to upload more than 30 GB of essential corporate documents such as: confidential licenses, agreements and contracts, contact numbers and e-mail addresses of employees and customers, financial data (audits, payment details, reports), etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>M-1-TOOLWORKS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21202</link>
<guid>ecbd4df986ebf85c8a2873572e804803</guid>
<pubDate>Thu, 20 Feb 2025 10:56:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apos</b> claims attack for <b>M-1-TOOLWORKS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2966fd0b607ba8032c1108d9b1fb82ae37c830bff5a15a9b072137dfdba6ef2f</i><br /><br />Threat actor <b>description</b>: <i>M-1 Tool Works, Inc. (M-1) offers aerospace quality precision machining services for prototype and production volume requirements. M-1 provides CNC turning and milling capable in full 5 axis, sinker EDM, wire EDM, and grinding. We are best equipped for small to medium sized components, assemblies and tooling made from aluminum, stainless steel, titanium and super alloys. M-1 provides precision machined components to the Aerospace and Defense, Automation, Department of Energy, Electronics/Telecom, Food Processing, Medical, Motor Racing, Optical, Packaging, and many other high reliability industries.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>apos</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.riverdale.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21203</link>
<guid>fff75f52998a477f6e7b00e58af8d64a</guid>
<pubDate>Thu, 20 Feb 2025 10:48:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.riverdale.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>980feee660b6b8dcc0b12949b6dd0c63572ba931da931630ad8609d7c79e218d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>ehdd.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21200</link>
<guid>50a505acfcdc52e6e704164f1d65b474</guid>
<pubDate>Thu, 20 Feb 2025 03:14:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>ehdd.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22ebad9f581e6c0b977e028992c83b8776d7dfd6e6822b33103eb758affca06d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>ziese.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21198</link>
<guid>bbbc2dd37f2c9a36f393493b152d7bda</guid>
<pubDate>Wed, 19 Feb 2025 16:28:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>ziese.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>244c0f02f19233d5856966668c37266ac1bd49b8dfc2995529d8a1bf76c0f632</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>ziese.net</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>fastrans.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21195</link>
<guid>db90a31ac5c9409572031b5ff841077a</guid>
<pubDate>Wed, 19 Feb 2025 16:24:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>fastrans.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da22944d0c460eb64ddd365b5d88abe656fb942ef36f9c6953d6586e914bd6f6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>fastrans.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vector-Engineering-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21182</link>
<guid>bdc9494fa925db9bd1dd4cc122c19f0d</guid>
<pubDate>Wed, 19 Feb 2025 14:56:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Vector-Engineering-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9675d4a48adc2cb27ca63a22ea5ad3ffcc6a83fd2052472ee5d265887b8ec68a</i><br /><br />Threat actor <b>description</b>: <i>Vector Engineering, Inc is a company that operates in engineeringand environmental consulting for mining, mineral processing, waste management.We are ready to upload more than 10 GB of sensitive corporate documents such as: confidential licenses, agreements and contracts, financial data (audits, payment details, reports), contact numbers and e-mail addresses of employees and customers, marriage certificates, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hall-Law-Group-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21183</link>
<guid>b7644abae9d51f072401f013b5d42d53</guid>
<pubDate>Wed, 19 Feb 2025 14:56:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Hall-Law-Group-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f0c3b558edc6fca2a937ad8696c763128a6eec1290117fee02009426e544114</i><br /><br />Threat actor <b>description</b>: <i>Hall Law Group LLP has been offering probate planning, estate administration, tax, business and family office services for over 25years.We are ready to upload more than 55 GB of essential corporate documents such as: SSN’s, driver licenses, contact numbers and e-mail addresses of employees and customers, passports (including those of famous individuals) and other employee and customer documents, financial data (audits, payment details, reports), medicare documents, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alabama-Ophthalmology-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21192</link>
<guid>b9460526dc7daf0e629f28efca761e7a</guid>
<pubDate>Wed, 19 Feb 2025 14:52:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Alabama-Ophthalmology-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>431cd1cd595126da826e51f6e691fc8bb0951daa7d5b47707fff31924217848f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>DR.Claims-FL-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21191</link>
<guid>6d81df16fca504b6fb9280b11d2b0ae0</guid>
<pubDate>Wed, 19 Feb 2025 13:28:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>DR.Claims-FL-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89260b1ca3e6bda8d357e7156be56941bb92d956ff5de936358e88c19582d841</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>dr.claims</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>haleycomfort.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21186</link>
<guid>60934168a4560680ede1fe1b1d03ab3e</guid>
<pubDate>Wed, 19 Feb 2025 12:34:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>haleycomfort.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>179383662d27d39818493681fc3528bcba0124ddb7b053c7a4973e5d8035e614</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>haleycomfort.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>traffic-advertising-llc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21177</link>
<guid>e455b820b9478a022f0ef44cf2f56db4</guid>
<pubDate>Wed, 19 Feb 2025 12:01:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>traffic-advertising-llc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c483ff73723bf7957c7d76890645ad777c66590754375742aa4723d76f1f68f</i><br /><br />Threat actor <b>description</b>: <i>We are a full-service automotive advertising agency that caters to dealerships across the continental U.S. It is the job of our media team to perform comprehensive market analyses for each of our clients to ensure that all of our TV buys cons            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>dr-elizabeth-bjornson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21178</link>
<guid>6babc4f58d8d2e929d85fc2175025c92</guid>
<pubDate>Wed, 19 Feb 2025 12:01:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>dr-elizabeth-bjornson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52af2a229a07745026114a5bc529ef6557fd01834cf79f35f70ededabfafffa1</i><br /><br />Threat actor <b>description</b>: <i>We make it easy for you to obtain optimal dental health that is affordable, whether you undergo a routine comprehensive exam or more invasive procedures. We accept all major credit cards, personal checks, and cash. We also offer payment optio            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Haggin-Oaks-Golf-hagginoaks.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21187</link>
<guid>c2a58db8b46ccab0d043e74164407627</guid>
<pubDate>Wed, 19 Feb 2025 11:52:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Haggin-Oaks-Golf-hagginoaks.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c58cbe44aa864a6778bdd03c48a1a61cfce957b998382888803859cfed68ed05</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>hagginoaks.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>lake-washington-vascular</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21170</link>
<guid>b6d69c1c07b1d8d83b953b28563999ae</guid>
<pubDate>Wed, 19 Feb 2025 09:58:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>lake-washington-vascular</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba53c1553d3d8cd288069496d8eca280c8790a176c387fe67448f421b92932ca</i><br /><br />Threat actor <b>description</b>: <i>Lake Washington Vascular Center is the best place for your Vein Treatments, Vascular Surgeons, and vascular care</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>h2o.ai</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21175</link>
<guid>61d11278e40c04c1a4b014546772dcf8</guid>
<pubDate>Wed, 19 Feb 2025 07:29:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>linkc</b> claims attack for <b>h2o.ai</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>edb85ac2c7e9de2e1fe7b7590ba29a927686a38e5823cea2067c8bdfb87fe39d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>h2o.ai</i>]]></description>
<category>linkc</category>
</item>
<item xmlns:dc='ns:1'>
<title>Revi</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21169</link>
<guid>81ea0fcc88f87dc34ec2351dc57b711c</guid>
<pubDate>Wed, 19 Feb 2025 06:00:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Revi</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc9427a39393cda85a2156ee9ed5d3ba9c761d3aff54dadca6a0c04b52b2d443</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>getrevi.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Help-Me-Grow-Yolo</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21172</link>
<guid>f2219a7d1d1420aa24b7bed93275510e</guid>
<pubDate>Wed, 19 Feb 2025 05:58:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Help-Me-Grow-Yolo</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>76abb5f29a8aa8857069df02c7ef33cbfdfca2d360f369354def6fe36c33d6ce</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>helpmegrowyolo.org</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>bestbrands.com25.5MUSA659GBlt1-DISCLOSED</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21160</link>
<guid>3eb81a0ff05d44147f7b43d1577423d0</guid>
<pubDate>Tue, 18 Feb 2025 22:44:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>bestbrands.com25.5MUSA659GBlt1-DISCLOSED</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f906fd63118691af750087a66b9a66b0df3a467c2d66b12de9300708f736203</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>uniekinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21161</link>
<guid>21993f0e240be6533d3f445307d51767</guid>
<pubDate>Tue, 18 Feb 2025 19:26:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>uniekinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4c899a1dbdd171b0a3b5666bc45a3130a469888c085164ed5a2d84bd207bc203</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>uniekinc.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>midwayimporting.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21162</link>
<guid>de43b6702bac8fce6effad88fe37bbc6</guid>
<pubDate>Tue, 18 Feb 2025 19:24:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>midwayimporting.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8dfd27fc129c2960b16a204bc2a0ce08770b7e3e3bb5d5d86283388f13b094c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>midwayimporting.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>revitalash.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21163</link>
<guid>82c04dc6225e97782704775949a97ea3</guid>
<pubDate>Tue, 18 Feb 2025 19:23:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>revitalash.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9953ec919be3826bc85b55322cfc4020427e25127ceded0e5d857bbc09ec3cbe</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>revitalash.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.mwmechanicalinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21155</link>
<guid>14c76e43c96a01242e2c61e918e9d4ba</guid>
<pubDate>Tue, 18 Feb 2025 17:09:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.mwmechanicalinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4b4c618acf0de2086f00d92dc6da02873e57a96f9abbda9e9f6e3cb3695482cd</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.mwmechanicalinc.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.alphamedctr.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21156</link>
<guid>56fd8394eb88ae240cd0de2e9a8803a2</guid>
<pubDate>Tue, 18 Feb 2025 17:07:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.alphamedctr.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4464be9445c1b7f2aeee1de69cb602fe12bcc4f103309f310fa0b63585932d86</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.alphamedctr.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.ccttechnologies.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21157</link>
<guid>cc86a04784d3b4db1caa62ec47afa3cd</guid>
<pubDate>Tue, 18 Feb 2025 17:05:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.ccttechnologies.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>243eacc501acdb61dcfdaeb88e95cb267722928c250d2d1026fe3f8a3685218d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.ccttechnologies.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.copleystoughton.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21158</link>
<guid>cb07b2d1ffcfa44b11bf8049a150ae05</guid>
<pubDate>Tue, 18 Feb 2025 17:04:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.copleystoughton.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>67016e0f207e5c7e1efed597da7140db3cf4e815b6058710011dc81345f265d8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.copleystoughton.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.macmed.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21159</link>
<guid>8336a44c34eb4eda4d10217c50c245e6</guid>
<pubDate>Tue, 18 Feb 2025 17:01:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.macmed.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>71967c8e44435aacc1bdc763a2d4db6367d54d9ff1d2c8c9ab07247e006df3bc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.macmed.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bushmans</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21135</link>
<guid>87191796a64e570bc2ce6f722d7f8277</guid>
<pubDate>Tue, 18 Feb 2025 01:40:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Bushmans</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1cdbf4ebbb4c42be934408d33eaff8296f0a6bd6be4b6af830990e75e107c1ba</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bulldog-Oilfield-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21131</link>
<guid>08357dda130ec9b85fa60db2cf979b7b</guid>
<pubDate>Mon, 17 Feb 2025 22:42:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Bulldog-Oilfield-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48d02833f11122c6d63d3d821cb7728d6d2fd8fbddfe29427a58fbfc722f2e24</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cuna-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21145</link>
<guid>307d1094c1f5857935838964f2ae4db4</guid>
<pubDate>Mon, 17 Feb 2025 21:47:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Cuna-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9114b473830636bfda06e87f33988af2209a0d4db6d69d02f10deb6794c54863</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.cunasupply.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Inland-Empire-Distribution-Systems-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21144</link>
<guid>1a042e38b6cad7c50aafe731b44212a4</guid>
<pubDate>Mon, 17 Feb 2025 21:42:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Inland-Empire-Distribution-Systems-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>44e36a01b26ef9690c70df95861acbb4562c9713a68c31781d33044adbb40d86</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.ieds.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wylie-Steel-Fabricators</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21143</link>
<guid>1986405e39c5a79665af1746738c1f46</guid>
<pubDate>Mon, 17 Feb 2025 21:41:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Wylie-Steel-Fabricators</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cab255b8e0c4926fd099626dfaf1109073a0c76bb2906f498a94f638568b8c0c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.wyliesteel.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Oxford-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21142</link>
<guid>f0d9b8cdc92c7e4c6b28e0143d95b5df</guid>
<pubDate>Mon, 17 Feb 2025 21:39:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Oxford-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>90d58b852400a27bb2e09551f1df89d8d0c40f966406be6a60ffde96744fd439</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.oxfordcompanies.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stage-3-Separation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21141</link>
<guid>ecd4232a467c3085d7fa1302a827caa9</guid>
<pubDate>Mon, 17 Feb 2025 21:38:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Stage-3-Separation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46c2c08150e3123f0184c75cda6f611acf535407c5dfff56df546d50715a7eab</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.s3s.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Robinson-Family-Dentistry</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21121</link>
<guid>4a716f7ba05468f225127f29aa2040c5</guid>
<pubDate>Mon, 17 Feb 2025 21:22:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Robinson-Family-Dentistry</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b7504130a3606bfe07d1e98234dbeb9b61d76e9eb7fb01cf08bb16bbee03b417</i><br /><br />Threat actor <b>description</b>: <i>Robinson Family Dentistry - family dental clinic. Robinson Family Dentistry corporate office is located in 1281 Yeamans Hall Road, Hanahan, SC 29410, US. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crager-LaBorde</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21122</link>
<guid>eae6b5d089d0b287174df2742875b515</guid>
<pubDate>Mon, 17 Feb 2025 21:21:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Crager-LaBorde</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d4064bdfe4c82ec6d6026d01104973e0740f7c9f9c0157d59eff3993731ad718</i><br /><br />Threat actor <b>description</b>: <i>Crager LaBorde company provides services small to medium sized businesses reach their potential and goals with services that include income taxes past and present, monthly write-up, live payrolls, LLC and corporation setup, business consulting and quarterly sales and payroll taxes. Crager LaBorde corporate office is located in 335 Southfield Rd Ste 200, Shreveport, Louisiana, 71105, United States and has 17 employees. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Townsley-Law-Firm-Information</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21123</link>
<guid>72f9f967c43ce5c44ea12bf78ae63eaf</guid>
<pubDate>Mon, 17 Feb 2025 20:47:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>The-Townsley-Law-Firm-Information</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4beb931798b5ae7d17b5e7fccc72be4b79f5a3a884411190d06de27ee40c4fc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>danecourt.kent.sch.uk</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21133</link>
<guid>6b67560b23af2fb369555be4155d8c48</guid>
<pubDate>Mon, 17 Feb 2025 19:27:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>danecourt.kent.sch.uk</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1c41412c892865d7c4ea8a572012aac13077ac89035d8255b467a6deb0b75af</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>danecourt.kent.sch.uk</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>toitoiusa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21132</link>
<guid>6a0143100dc167553a0128d5a66ee4d4</guid>
<pubDate>Mon, 17 Feb 2025 19:26:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>toitoiusa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3933be0b1c760eb65af9d744f119ddc0348329237dcff545c454339e35bc4efc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>toitoiusa.com</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>kinseysinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21126</link>
<guid>8d2eee28cb5170c58b8e7c9a9a648a25</guid>
<pubDate>Mon, 17 Feb 2025 17:11:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>kinseysinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa6eb0c6ac69a4b112851ed42f17943d84695e574f4f8e744a4e497c81ab43a7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>kinseysinc.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>steelerubber.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21127</link>
<guid>c766cb374fd37fb59517aac231dafc81</guid>
<pubDate>Mon, 17 Feb 2025 17:09:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>steelerubber.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec0438a5fbc056b509af9f5de8a44af764fbd119e33c8aa4e449446e8371af4b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>steelerubber.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>almostfamousclothing.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21128</link>
<guid>234d5ba71b7020a2389ab5fdfd697149</guid>
<pubDate>Mon, 17 Feb 2025 17:07:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>almostfamousclothing.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77fa6c9ac9bede83b85fa884966f8419ae5992ac00e6979079e57ad71dbec455</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>almostfamousclothing.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>teamwass.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21129</link>
<guid>211fa07fbd5ca833b4cfd48c462138a9</guid>
<pubDate>Mon, 17 Feb 2025 17:06:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>teamwass.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8884126272e142e14443d22ed471b6eb2bf7c13e5a49e885a3a646a78327af6d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>teamwass.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Leadership-Strategies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21110</link>
<guid>5434d832e0dd3baab78c581eb7414b31</guid>
<pubDate>Mon, 17 Feb 2025 16:57:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Leadership-Strategies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe3ea868f7de51f4efc9deda3334ce6655bb0115dbf1b58f93e7e5f111f3e690</i><br /><br />Threat actor <b>description</b>: <i>Take a facilitative approach with Leadership Strategies. We provide expert meeti...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>ssmcoop.com22.5MUSA26GBlt1-DISCLOSED</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21118</link>
<guid>fe4a9e5a334eeaf995c4486002afa4ca</guid>
<pubDate>Mon, 17 Feb 2025 16:52:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>ssmcoop.com22.5MUSA26GBlt1-DISCLOSED</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>821379b459fa0e3f3cc53ba25b4da1064fa9061c2644d05ae40892a2b7056035</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Womans-Athletic-Club-of-Chicago</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21102</link>
<guid>531a192ef56b0c958ae831a8c40898bb</guid>
<pubDate>Mon, 17 Feb 2025 14:57:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Womans-Athletic-Club-of-Chicago</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf5f11f6692c48a9f35124106448f2b4170d51662b0ee75e734fd2a779886be7</i><br /><br />Threat actor <b>description</b>: <i>Woman's Athletic Club of Chicago is a private women's club residing in a historical landmark building on Michigan Avenue and the country's first women's athletic club.We are ready to upload some essential corporate documents such as: confidential licenses, agreements and contracts, financial data(audits, payment details, reports), internal correspondences, HRdocuments, contact numbers and e-mail addresses of employees andcustomers, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Greencastle-Antrim-Senior-High-School-gcasd.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21119</link>
<guid>95c1c113cb2941a27c0404300b58afbf</guid>
<pubDate>Mon, 17 Feb 2025 14:21:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Greencastle-Antrim-Senior-High-School-gcasd.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>300e83b7983467e28d2260b8d67ab6e25fc781f1464d49f9bea33294037da7c6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>gcasd.org</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bulverde-Glass-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21104</link>
<guid>0a03d5e4473c0629cfb20c5c31543b06</guid>
<pubDate>Mon, 17 Feb 2025 13:57:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Bulverde-Glass-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ecf1613a07067d06e88ceef482c6e8ecdd34ffdb609db0b37ed3fca1371900f7</i><br /><br />Threat actor <b>description</b>: <i>Bulverde Glass, Inc. was established in 1992 just outside the city of San Antonio in small-town Bulverde, but as the city has grown and expanded over the years, so has Bulverde Glass. In fact, we outgrew the small town of Bulverde and moved i            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>DA-Capital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21099</link>
<guid>676e76856c7fea3bc6378d1e6deea2aa</guid>
<pubDate>Mon, 17 Feb 2025 12:56:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>DA-Capital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>76eaac8f4ba40c3f299ac1d420f4e976176d127680cf4a65a892a1149df3cd61</i><br /><br />Threat actor <b>description</b>: <i>DA Capital LLC is a global investment manager specializing in credit and special situations.We are ready to upload a lot of sensitive corporate documents such as: NDA’s, employee credit cards, confidential licenses, agreements and contracts, employee medical cards, insurance documents, passports and visas, tax information, driver licenses, contact numbers and e-mail addresses of employees and customers, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Persante-Health-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21107</link>
<guid>413c4db2447de42d777342e49c995a58</guid>
<pubDate>Mon, 17 Feb 2025 10:24:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Persante-Health-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e9e4dccec1734eb9bf0d86678ce6e79e7e91c303cc99d27b3d2c2717c4e02e49</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>annegrady.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21098</link>
<guid>b8d60045db7568e16e497defc192abdf</guid>
<pubDate>Sun, 16 Feb 2025 22:27:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>annegrady.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>64f435024d221cfd1f82a9fbc91db4a1ffac30820dafbdbcd753c6b611e08cd8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>annegrady.org</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>saulttribe.comkewadin.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21089</link>
<guid>77557109d117fbb70757f8f00d6ed5e4</guid>
<pubDate>Sat, 15 Feb 2025 22:47:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>saulttribe.comkewadin.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>308a15d4cdd1b76e7f6ca92054354e81542a29a846e94cc66edaf5a830733576</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.310tempering.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21082</link>
<guid>32e7b56fb911eb28c0d28e10db9e353a</guid>
<pubDate>Sat, 15 Feb 2025 18:52:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.310tempering.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0c568be04e98468c567b052134f14812533208335ce36dd972e5a2c9949b229</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.colacouronnelocations.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21081</link>
<guid>f097e1436435f978e0b8f404c8b848d3</guid>
<pubDate>Sat, 15 Feb 2025 16:49:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.colacouronnelocations.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c7f7f44e11a4ea5e42a7f620e2cf568946b0b71dfc4c0c7690e95c1d9c2bb5c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.rowetactical.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21083</link>
<guid>b991e1dcd51bcef155428c414a0e056b</guid>
<pubDate>Sat, 15 Feb 2025 16:40:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.rowetactical.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47741b2cb3d92f7baafbc5305ab8384afc1a0970de061127e46fb70a41783519</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.rowetactical.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.cityoftarrant.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21086</link>
<guid>da3b06fe1b65ab19e14819bea1195afd</guid>
<pubDate>Sat, 15 Feb 2025 16:35:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.cityoftarrant.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eee1f0c504544ae3f431eab7ff0b3c90a9cf180874dcb4f15c90890031cc418d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.cityoftarrant.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.imgenterprises.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21087</link>
<guid>794b7ff3de411a7bb686761ca410038c</guid>
<pubDate>Sat, 15 Feb 2025 16:34:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.imgenterprises.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>10453aa68875fec9e641cc304b51299c9993ed7dca9e4b96f29ceee5332dcfb9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.imgenterprises.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.solardatasystems.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21088</link>
<guid>b9cf16c6bc32c1f73bd7a762c6dc43e0</guid>
<pubDate>Sat, 15 Feb 2025 16:32:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.solardatasystems.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>98b6c19342c48df4c9faf46456407bb4988baa2dcde52843aa6cfb60655d1be0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.solardatasystems.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-McKinney</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21078</link>
<guid>ececec2d9bd1d1b5dd0411fb766e2f70</guid>
<pubDate>Sat, 15 Feb 2025 12:58:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>City-of-McKinney</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2bd86b49801d96f794f22ac80dff0d736dd08ca694738d4c877beda903e06fcc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Northeast-Delta-Human-Services-Authority</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21079</link>
<guid>cef5524641d35342a138832d05ffe4e9</guid>
<pubDate>Sat, 15 Feb 2025 12:20:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Northeast-Delta-Human-Services-Authority</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7068e8316bda4acbf484deac8c11011ac4e5bcd8530111f6063b17795b29fc09</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>halex.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21077</link>
<guid>8d725eb1826fee2e7d5f852a1d63d14f</guid>
<pubDate>Sat, 15 Feb 2025 08:49:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>halex.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e4b7493412aa33623c0897e5ce79d7d0cfbe001ba29bebc4d401358f19c2a843</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>MEmpire-home-center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21072</link>
<guid>b5e2cbde919747030eea9e4fcf8f36b8</guid>
<pubDate>Sat, 15 Feb 2025 02:57:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>MEmpire-home-center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd05a5787a127e42541afe18b10a7f2f4d5396d41a6e81bf9bcc0e7a7cd23aa4</i><br /><br />Threat actor <b>description</b>: <i>Over 60 Years of Service
 
 In 1955, Harry "Whitey" O'Neill founded Empire Wre...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hydronic--Steam-Equipment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21075</link>
<guid>edcb4ffdaa57a1bfa3fecb75aec6e53b</guid>
<pubDate>Fri, 14 Feb 2025 22:31:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Hydronic--Steam-Equipment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cdd491bc32c5b23548cb79eafd7918faeb964a7172f0c3a92399aa474c802650</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.hydstm.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>CST-Corp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21073</link>
<guid>1441762ea1630bc0605fdcef3984e996</guid>
<pubDate>Fri, 14 Feb 2025 22:29:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>CST-Corp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd2ada230c79eb75f841f2fddd3a13c12fd7cc6f4462bcb39a6ea6c07a4cd0c0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.cstcorp.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Heritage-South-Credit-Union</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21071</link>
<guid>738c875d02a61f56eb30127ae50d0c88</guid>
<pubDate>Fri, 14 Feb 2025 18:02:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>Heritage-South-Credit-Union</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c4a04060f8dc10ea7b0298761e817bd134afebab63134699d97d0149c40abfe</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>F.TECH-RD-NORTH-AMERICA-INC.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21065</link>
<guid>21445b7069345a1a850ee2daacfd5d8e</guid>
<pubDate>Fri, 14 Feb 2025 17:57:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>F.TECH-RD-NORTH-AMERICA-INC.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38e773c4ebbbbd614f1f7d42b2c8cbd4f9d3dc6b29dc7ff60482f1dc541a1165</i><br /><br />Threat actor <b>description</b>: <i>F.tech R&D was established in Troy, Ohio, in April 2003, when F.tech began expanding R&D services for Honda in North America. Establishing an R&D center on the development side was a natural move to bring customer service closer to F.tech’s            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nelson--Townsend-CPAs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21067</link>
<guid>710049f9a52cd294d54b75d46ad3d2db</guid>
<pubDate>Fri, 14 Feb 2025 17:57:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Nelson--Townsend-CPAs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a68454f9d846852cb37943e338a45565ef75b75ec968b33d8b792b7b84eb04f4</i><br /><br />Threat actor <b>description</b>: <i>Nelson & Townsend, CPA's perform tax returns for individuals and businesses, accounting services (payroll services, bookkeeping), and business/client support.We are ready to upload a lot of essentials corporate documents such as: driver licenses, financial data (audits, payment details, reports), contact numbers and e-mail addresses of employees and customers, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Castle-Rock-Construction-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21068</link>
<guid>5ee3d718e484b7fee862c8d6a7b89c84</guid>
<pubDate>Fri, 14 Feb 2025 17:57:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Castle-Rock-Construction-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>221eab7372c8757c3fe44368069e4014984d26a48e57da9d9ed24841e6057adb</i><br /><br />Threat actor <b>description</b>: <i>Castle Rock Roofing & Restoration will provide you with an honestevaluation of your property with no strings attached. If damage is present, Castle Rock Roofing will guide you step by step through the claim process.We are ready to upload more than 16 GB of sensitive corporate documents such as: NDA’s, driver licenses, health insurance documents, SSN’s, contact numbers and e-mail addresses of employees and customers, internal financial documents, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Window-World-of-Raleigh</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21070</link>
<guid>f1b0f08180f4711cedb7b7d71ae7d3c6</guid>
<pubDate>Fri, 14 Feb 2025 17:57:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Window-World-of-Raleigh</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9b9081cd41e686252696458fee044a75d46d0d4d20f0379e41b1421e367d2b6b</i><br /><br />Threat actor <b>description</b>: <i>Window World® is America's Exterior Remodeler, offering quality windows, doors, siding, shutters, and more, with over 200 locations nationwide.We are ready to upload some of essential corporate documents suchas:  NDA with employees and clients, medical insurance documents, contact numbers and e-mail addresses of employees and customers, financial data (audits, payment details, reports), etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Go-Strictly</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21062</link>
<guid>0129a222fe10c9896db191c537694699</guid>
<pubDate>Fri, 14 Feb 2025 12:31:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Go-Strictly</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>592356a7071bca392670ff37b98e003b479f7ae6f3da816951476c69112d43c7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bethany-Lutheran-Church</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21063</link>
<guid>007203e95299b072b3a5e6f1f3d4c725</guid>
<pubDate>Fri, 14 Feb 2025 12:13:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Bethany-Lutheran-Church</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>945d68d1c8e6ec4fe2512a8616575ad04683c8e8ccfc7d4d3f69b36e5b828fbb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.bethany-denver.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Regency-Media</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21064</link>
<guid>71173877ba479d192fa6cf41ef10e995</guid>
<pubDate>Fri, 14 Feb 2025 11:52:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Regency-Media</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9efb020ce6d4469de60fe2f1892d5b91a5f91287a4257ed9df34bace3f183824</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shields-Facilities-Maintenance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21056</link>
<guid>0962e5897373acba79bc05179dd70492</guid>
<pubDate>Thu, 13 Feb 2025 22:32:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Shields-Facilities-Maintenance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>412b0151aa7dd4fc2ac8d952b8b04e336cdd7e2a4968278160ed6b102665e1cc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.shieldsfm.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aspire-Rural-Health-System</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21052</link>
<guid>b1196e4d5f25b0c1c3e45ee482191aad</guid>
<pubDate>Thu, 13 Feb 2025 20:58:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Aspire-Rural-Health-System</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd2e9f10cfa4073b49cb7b3c74c8b036014f1336441e13e9bce3f47936281f95</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>enventuregt.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21042</link>
<guid>9dcba86641df3c4ee2ec515eecf72b46</guid>
<pubDate>Thu, 13 Feb 2025 14:37:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>enventuregt.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2dc559e61ceb5c011da9f866d1a7e493feb1663e791f033bef3c444753f067ae</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>enventuregt.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>snoqualmietribe.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21043</link>
<guid>663ad9fa2aa6c2af4e1d8915e2c6fd9a</guid>
<pubDate>Thu, 13 Feb 2025 14:35:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>snoqualmietribe.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad677a87d2e804b96757d883a7ce4d288a17cc750cc31f8c6ddadd2adbeb364d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>snoqualmietribe.us</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nash-Brothers-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21041</link>
<guid>f3717533a90a8ecb1de730050beab052</guid>
<pubDate>Thu, 13 Feb 2025 14:18:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Nash-Brothers-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b260c476750b66e288d1451bea937f97b178570ac9331ce0c3206a7523366373</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nippon-Steel-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21048</link>
<guid>10c29792a08f56790e68db8a55f52fc7</guid>
<pubDate>Thu, 13 Feb 2025 14:17:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Nippon-Steel-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e45c8fa1cf85ffac581dca3f83440c89abe67ba2624f3308b759fb879401ba26</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Financial-Services-of-America-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21047</link>
<guid>c3545e60f4ffbd11070bdb7991ba3782</guid>
<pubDate>Thu, 13 Feb 2025 14:16:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Financial-Services-of-America-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e77f9783f89374a9afeddc071c3c55d875b3776bf7ceec8be54c36ef0eb91ad2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Layfield--Borel-CPAs-L.L.C</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21046</link>
<guid>1d1e62052e90a97409270f31326f5b0e</guid>
<pubDate>Thu, 13 Feb 2025 14:14:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Layfield--Borel-CPAs-L.L.C</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da450b62c4020d3892a91175dbd8ecdde8affa90de500453beb46cd03ac20886</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dain-Torpy-Le-Ray-Wiest--Garner-P.C.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21045</link>
<guid>1e81285f8a20c333002a35aaec157225</guid>
<pubDate>Thu, 13 Feb 2025 14:13:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Dain-Torpy-Le-Ray-Wiest--Garner-P.C.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>10ae87ef6ed68efc1f72cafa0289847072ec0edb653c7801002e020c5397c135</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>vadatech.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21038</link>
<guid>db49d990bff2b2c5e1ac041cba78b21c</guid>
<pubDate>Thu, 13 Feb 2025 13:57:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>vadatech.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0439c3d427199a782786e096a3bd2e7786641d8377e38e29e4f394acaee2fb20</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 24.02.2025VadaTech is a world leader in the design and manufacture of embedded computing solutions.The products include configurable application-ready systems and their building block            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpthermaseal.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21037</link>
<guid>936e8d43184bc47ef34e25e426c508fe</guid>
<pubDate>Thu, 13 Feb 2025 10:51:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ciphbit</b> claims attack for <b>httpthermaseal.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ebaa1e04882c9afd7ae8699933d54d1c59fa440583dc157627d1add78a1cefdf</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ciphbit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cache-Valley-ENT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21033</link>
<guid>c9ce1073ab925d72782e22228ac4e2b7</guid>
<pubDate>Wed, 12 Feb 2025 23:41:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Cache-Valley-ENT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aff56b68dce2fd2514675c55aa689a8dfed86c6aa2e3a05f60003cfae3b64fdc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>JP-Express</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21034</link>
<guid>0f66d5d47cc484792935962c50253404</guid>
<pubDate>Wed, 12 Feb 2025 23:40:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>JP-Express</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>414ff47b869665e2fb1153e8b63331f79aca13220ccdbf0aa91d27ffd9bb5a25</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Central-District-Health-Department</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21035</link>
<guid>71497f728b86b55d965edbf1849cca8d</guid>
<pubDate>Wed, 12 Feb 2025 23:39:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Central-District-Health-Department</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>319122a29284a67af3982e4fa0fef3d19499bb1ad679adb9a179262f287ebfd5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>stjerome.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21032</link>
<guid>fba6c96d44ce830a1d5886fab5a15fa5</guid>
<pubDate>Wed, 12 Feb 2025 20:16:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>stjerome.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9d8aee575624a1abc4ddd7c92ed177c012568f40a8bf7fc4be90b311cf6587c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>stjerome.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Quality-Home-Health-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21007</link>
<guid>93252740625b1bcb6dfa091de2d09202</guid>
<pubDate>Wed, 12 Feb 2025 17:59:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Quality-Home-Health-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0776ddd1ae55ce194eda6769c0c7df08d6fd881b362f762bc9364a7976d65b09</i><br /><br />Threat actor <b>description</b>: <i>As a locally-owned and operated home health care agency, we are able to offer you a wide array of health care services. Our skilled team of medical professionals makes every effort to keep you and your loved ones as comfortable and independen            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>alderconstruction.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21012</link>
<guid>22cc70b02596865f1ec15c5b156574fb</guid>
<pubDate>Wed, 12 Feb 2025 14:53:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>alderconstruction.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5d061643bd22ae46b586f10bef8f5896c42c1c607b82dcd33065a41e24e6a827</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>alderconstruction.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>steveallcorn.remax.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21013</link>
<guid>2ea3ff45d620f62b6669490c57394f3c</guid>
<pubDate>Wed, 12 Feb 2025 14:51:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>steveallcorn.remax.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c01a2baee419d8309b5730e915da0c06cc3a1b102d462462c239818dbb2af41a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>steveallcorn.remax.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>bergconst.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21014</link>
<guid>47b263e3b40d20089f2d73695fd2c2bb</guid>
<pubDate>Wed, 12 Feb 2025 14:49:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>bergconst.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1361fcd4c2c92e7d4268e7f7c61422add143ff7d7be93e90ca41cbe4c153147b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>bergconst.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>burdickpainting.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21015</link>
<guid>f8901656b0f02a487c453b1479be1f46</guid>
<pubDate>Wed, 12 Feb 2025 14:48:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>burdickpainting.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc882f3820b4279908349b2d919acf72900b07dcf345862b119e0c54c6b9aeea</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>burdickpainting.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>columbiacabinets.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21016</link>
<guid>2854675c4cd60e1c303659b5b78c89fa</guid>
<pubDate>Wed, 12 Feb 2025 14:46:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>columbiacabinets.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c38970ad740f540add9bde86e78a20164c5ed109e8bd6c75c4213b9b863fb67</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>columbiacabinets.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>ekvallbyrne.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21017</link>
<guid>be84663149780a7ca5a112689df4dc7a</guid>
<pubDate>Wed, 12 Feb 2025 14:45:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>ekvallbyrne.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d62193ff9b62dd3e9da8b759437d0075511a690df609610fa0d9161ebb63a2e1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>ekvallbyrne.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>krmcustomhomes.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21018</link>
<guid>6395ac11383a175ff4f80a4c628f64a8</guid>
<pubDate>Wed, 12 Feb 2025 14:42:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>krmcustomhomes.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6e4a389dbb0f2e1446e5c5cdcfd97096cce704297414619796d5b00bf6376f31</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>krmcustomhomes.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>laderalending.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21019</link>
<guid>e585c2ea8a6ff12e60c1c3e07d024079</guid>
<pubDate>Wed, 12 Feb 2025 14:41:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>laderalending.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a97e0980e9c3caa750d9c000b48f1961fed5a2227cd5ce2e24ce33569e225764</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>laderalending.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>minnesotaexteriors.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21020</link>
<guid>f90399d380904e64e59ceb60ce084cf4</guid>
<pubDate>Wed, 12 Feb 2025 14:39:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>minnesotaexteriors.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89280b9cbba5f9c4435413a2e90cc719ed6c8d7012180172ae67941270909f68</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>minnesotaexteriors.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>rogerspetro.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21021</link>
<guid>8569aad08bd79e68d8a5d2b2ee505408</guid>
<pubDate>Wed, 12 Feb 2025 14:38:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>rogerspetro.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a02f8b4a09fc0bf99abf9db6ca9b505e8a2a41911415fc25c6993488039a8d8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>rogerspetro.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>sundanceliving.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21022</link>
<guid>e8e64db539e34e76a55975b07ab716ff</guid>
<pubDate>Wed, 12 Feb 2025 14:36:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>sundanceliving.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>729de86a7df25306a40ab7954f3aa9af1927aa4d9a888d9918e75df9a197bfc7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>sundanceliving.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>thejdkgroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21023</link>
<guid>393418aa6851c719aac2d2d6216f5159</guid>
<pubDate>Wed, 12 Feb 2025 14:35:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>thejdkgroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c8e0c5177c07a98ece1a89a2f99c05a7bbf27640de49ed0ad5ca4538dc51983</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>thejdkgroup.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>twncomm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21024</link>
<guid>11d0f51d9aced381efa5ce3214d9228e</guid>
<pubDate>Wed, 12 Feb 2025 14:33:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>twncomm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd1644b7c167cb8da92127740ff298270b5ca2ed1e51a0d8aeb6b462536197d9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>twncomm.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>TJKM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21006</link>
<guid>69ae57a20fbf05b1b85b4f1ed95c3fee</guid>
<pubDate>Wed, 12 Feb 2025 11:06:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>TJKM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04451a96fa20f2759344207484412eac20857bc5981414d665f08117b9bfc5b8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.tjkm.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>slchc.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21003</link>
<guid>cfb5325c83ad40797068e162c50ee5a0</guid>
<pubDate>Wed, 12 Feb 2025 10:15:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>slchc.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c07c5229cb113cf1546a63b9f8b7dcda6fb500eb876ab71228c7a9ee11e6cf5a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>slchc.edu</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Erie-Management-Group-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=21002</link>
<guid>86686c6057489287cb609e4f81f3e1b3</guid>
<pubDate>Wed, 12 Feb 2025 10:11:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Erie-Management-Group-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa2d75f10cd3206db441a029a30d18ad29f6a0410484d615706db9198669ad80</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.eriemg.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>britannicahome.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20997</link>
<guid>c249e9902551985fca7bb2c496f67cc1</guid>
<pubDate>Wed, 12 Feb 2025 08:38:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>britannicahome.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b92074f59bde53a5012d1e860a318882007989cce0791cb8ceea527e5d142be</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>britannicahome.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>uniquehd.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20998</link>
<guid>e63e28f4e0b0bb9c14f09cba65380b1a</guid>
<pubDate>Wed, 12 Feb 2025 08:37:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>uniquehd.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ef2f0d4e59d25800d47b0af270c8b755c25615b7e79448c7d26518db9e96681</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>uniquehd.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>tomsmithindustries.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20995</link>
<guid>304db9bced11bfeb3539e3b68b9d811c</guid>
<pubDate>Wed, 12 Feb 2025 08:31:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>tomsmithindustries.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ef2feb4c83c95cc82e7303fe27901c2f61ece8342fc7e6e36b01fff724b0b555</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.tomsmithindustries.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>North-American-Spares</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20994</link>
<guid>0ceed3b289e76c7f6ac4cdd6083a0966</guid>
<pubDate>Wed, 12 Feb 2025 07:30:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>North-American-Spares</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>40ff5af3a3d25bd921758cecf94f2500277d2a206d5ed9645f4f1e0efb0125d7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>nasltd.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>MICRO-MANUFACTRING</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20992</link>
<guid>0b025724175e671bc969bdaca29ddc46</guid>
<pubDate>Wed, 12 Feb 2025 02:03:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusalocker</b> claims attack for <b>MICRO-MANUFACTRING</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c6ee1d40a406158cccba1714288503db404190d9fead34c8d9aa2d9e69fb3976</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusalocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tie-Down-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20991</link>
<guid>a6953af76df8ac424ed91eecfe6bf582</guid>
<pubDate>Tue, 11 Feb 2025 23:11:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Tie-Down-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8255fe53c444306bbd7de937e3b7279cea34a8ec6180ed0df10467ae0e366a6d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.tiedown.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Monroe-Transportation-Services-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20990</link>
<guid>67b7b196a1d3529edd7d8a896d1b7b1d</guid>
<pubDate>Tue, 11 Feb 2025 23:10:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Monroe-Transportation-Services-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>75e1430eefdf97a09f9314a2da00c32b7879a94aed05fe3636831c4383cf0eac</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.monroe-trans.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kensington-Glass-Arts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20989</link>
<guid>30f240dc14aa708deda6f0a0606ff810</guid>
<pubDate>Tue, 11 Feb 2025 23:08:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Kensington-Glass-Arts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba738052cb815b05c4ae6d21cf155ca9ae4b5f408f1054ee3a29e68c891512f9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.kensingtonglass.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jildor-Shoes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20988</link>
<guid>09e8fef7c74627eaadebcc0f0d15e2e8</guid>
<pubDate>Tue, 11 Feb 2025 23:03:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Jildor-Shoes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34871db589cc9f0a54e27be1ceb268b8fd00e821f2b20a0572c429e4d1bf5124</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.jildorshoes.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mainline-Information-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20987</link>
<guid>33a5ab413bb8e155ad89c29dbaced31a</guid>
<pubDate>Tue, 11 Feb 2025 23:02:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Mainline-Information-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3ec169b35089ff5c83a57d70469fcea2c0fbae0ff56d37a86bad7f55b928dec</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.mainline.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Baltimore-Country-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20977</link>
<guid>7742b7dab4579b0c86638453e45a2872</guid>
<pubDate>Tue, 11 Feb 2025 22:46:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Baltimore-Country-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7bc90f94f3bfd8ac6155c727fba713ac37d174c63299998b9cff69fbe0872d5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shinn-Fu-Company-of-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20982</link>
<guid>3d33f9e27159690bdb292746f9e1db8d</guid>
<pubDate>Tue, 11 Feb 2025 21:48:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Shinn-Fu-Company-of-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>815eaf3dc2f7d976d85a2586c548f3a498c475accfb62716ea4b08457e7d516c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.shinnfuamerica.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>ROCK-SOLID-Stabilization--Reclamation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20981</link>
<guid>976232f256ded42986f7fde7ea4e2ded</guid>
<pubDate>Tue, 11 Feb 2025 21:46:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>ROCK-SOLID-Stabilization--Reclamation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1cdc35e21a674fbe4273652ad198918fc2578eacb17f1723fc55ec594a21fe6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.rocksolidstabilization.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Neaton-Auto-Products-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20980</link>
<guid>e490b26afec38de1a0752227ba3ddf23</guid>
<pubDate>Tue, 11 Feb 2025 21:43:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Neaton-Auto-Products-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c6f80aa082574afce2931ee9a9a69e35db0034ce7e5877b335a52d7c39b2525</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.neaton.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>OS-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20973</link>
<guid>58369e57fb6c405420767b8c06ad3d73</guid>
<pubDate>Tue, 11 Feb 2025 19:41:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>OS-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd3cbbef6b8ff2a5340adbb5b8a98f97c9ee458710e251e8856f244fb63a608b</i><br /><br />Threat actor <b>description</b>: <i>O&S Associates

www.oandsassociates.com

145 Main St, Hackensack, New Jersey, 07601

388.24 GB

Founded in 1996, O&S Associates is a national full service multi-disciplined Architectural, Engineering and Planning firm. The firm is headquartered in Hackensa</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aurora-Public-Schools-aurorak12.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20975</link>
<guid>baa9c50420112c3411e4d87614108554</guid>
<pubDate>Tue, 11 Feb 2025 16:24:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Aurora-Public-Schools-aurorak12.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d1baa7b68a23f7f627895d8474d2b0b4852b25bde2f28164e2b988cc356814d4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>aurorak12.org</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Braums-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20968</link>
<guid>8c2b7c5f9176bd359d4d42f4e9f9f15d</guid>
<pubDate>Tue, 11 Feb 2025 15:54:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Braums-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>13821740bd415204ea43a17c5ebd25284f76f0412e63b98248b40ff57ad5523d</i><br /><br />Threat actor <b>description</b>: <i>Braum's (founded in 1968) is a family-owned fast-food restaurant chain and dairy shop. Braum's corporate office is located in PO Box 25429, Oklahoma City, Oklahoma, 73125, United States and has 6,500 employees. The total amount of data leakage is 612.50 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>LACOLD.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20969</link>
<guid>1815de90dcf9f6b27dd6bff0f7a487bd</guid>
<pubDate>Tue, 11 Feb 2025 15:36:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>LACOLD.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0fe97bf1e12a4769d7cc822f4183c0b188151503fb02f06cacd79b024d9218c8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wakefield--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20970</link>
<guid>d927d23c930781800eaefa38f667b2a2</guid>
<pubDate>Tue, 11 Feb 2025 13:26:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Wakefield--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a11b203291e2d6bf916afa02ece2e1b807e87f3f51bc55f8c7e52f37ba9e86b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Prime-Trust-Financial</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20972</link>
<guid>96aa5b781e408406e6b3feda135cf1a8</guid>
<pubDate>Tue, 11 Feb 2025 13:26:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Prime-Trust-Financial</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0eeb3bc4fb2796bf0ecf438f540ad826100378a9948acdd29c6222f08fbab698</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>sehma.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20964</link>
<guid>bbc502f239f99ddce9b2889e7da81684</guid>
<pubDate>Tue, 11 Feb 2025 13:02:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>sehma.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9dbfde06c3c460baddda05de2a126ce0bf625d6d270fc4ffb5f8f518577cee6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hammond-Trucking--Excavation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20962</link>
<guid>8cacb05141a62321548b0689ad4579a8</guid>
<pubDate>Tue, 11 Feb 2025 10:50:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Hammond-Trucking--Excavation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa31dfa0c902d4e63833de5e83f48fbe77f46f08bb80f32c0c7c96bd93a586b6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rogers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20963</link>
<guid>c7cfbf9f79f5b277b5d74e2419c60a50</guid>
<pubDate>Tue, 11 Feb 2025 09:51:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Rogers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6d2d0c0deb63a02ddba8c0cc74e70611a10ab08ce293cece7e74a287943b1167</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>rogershvac.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>ldi-trucking-inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20955</link>
<guid>f0c4ee14830138b69a028fdb37aae2a6</guid>
<pubDate>Tue, 11 Feb 2025 06:59:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>ldi-trucking-inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29aaf45a80b506cf69e23e56568a68ec0d483c0a30e852e1a86bb8845fe965a9</i><br /><br />Threat actor <b>description</b>: <i>Site: lexmardistribution.com
														Industry: Trucking industry
														GEO: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>sole-technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20958</link>
<guid>58aeb181265efefda62c3475bec08882</guid>
<pubDate>Tue, 11 Feb 2025 04:47:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>sole-technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a10688d2110dc898530b28015da4c2d23109d2938e920d5bd73723cf828b64b5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>primesourcestaffing.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20954</link>
<guid>46b89a8af1f131b7cf92ef1e78befcbf</guid>
<pubDate>Tue, 11 Feb 2025 03:20:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>primesourcestaffing.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a98006b7a38c953cceaeefd9b684d474fbbcc5f021e4b58927de25b5e8e1187</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Childrens-Center-Of-Hamden</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20953</link>
<guid>846ca1ecf9bca75d39bb933ba3c3be5d</guid>
<pubDate>Tue, 11 Feb 2025 00:17:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>The-Childrens-Center-Of-Hamden</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f5abecb8164ccdda1a875b82d79bc3083502448d9502015f8b55a01ae7f9d75</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.jsp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20946</link>
<guid>9833dfe00e523737467c90974b3ff70c</guid>
<pubDate>Mon, 10 Feb 2025 22:45:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.jsp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b46caa22071c5579163069b98833a74f14a9abab0211c38cb0d036435462a118</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>komline.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20949</link>
<guid>a555ec5f81ae0b44cb4a94424aa510bf</guid>
<pubDate>Mon, 10 Feb 2025 22:20:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>komline.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>691c415c3a2deccbf68d157ffc4db541d01646c1dc18fd16c1660e30e4b7c5b1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>komline.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>bazcooil.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20950</link>
<guid>c227f47adae0efadb834fcf162f5bbd5</guid>
<pubDate>Mon, 10 Feb 2025 22:18:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>bazcooil.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>955f6ee017cdfdde1adad8eb269c48bbefb8f70c2ddb6d92cf5547b73f4b65a2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>bazcooil.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>sdfab.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20951</link>
<guid>0993bdfbd20407e1b60739ef01e432c8</guid>
<pubDate>Mon, 10 Feb 2025 22:17:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>sdfab.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>762e63268401b62800e018ec43ba71052611fd0d4da5c672f89d3b5e9a44ec07</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>sdfab.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>kaplanstahler.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20952</link>
<guid>ba48bccfc0d72c73228d80154ec7bf39</guid>
<pubDate>Mon, 10 Feb 2025 22:15:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>kaplanstahler.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf0e75f2ea542ba22e66c338ef4fe903d8e8c87ca1af8eeb97eb19926720a9a4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>kaplanstahler.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>EKONOM.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20891</link>
<guid>189ab34087ec3f70187a007859af892e</guid>
<pubDate>Mon, 10 Feb 2025 19:30:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>EKONOM.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e844407b2be6d5e07bd99af62bea56a7e15d4e4a1dafbda79329f4955eda8514</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DANA-CO.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20894</link>
<guid>306708aaf995cf6a77d3083885b60907</guid>
<pubDate>Mon, 10 Feb 2025 19:29:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DANA-CO.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0f6497ec57be0b41afb57d5b4ff716142e78fd6e6b66120c9103f9f7f989c35</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DESIGNDESIGNINC.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20895</link>
<guid>786fc7b5f34ec5a502ca28e7717617f2</guid>
<pubDate>Mon, 10 Feb 2025 19:29:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DESIGNDESIGNINC.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>769eddc64071612c976973ebf9484815029035d034b4768bdb6a5492f32b8dc8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DUNNRITEPRODUCTS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20897</link>
<guid>8c9ce62eb00bfc39549c0b3cbe197ceb</guid>
<pubDate>Mon, 10 Feb 2025 19:29:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DUNNRITEPRODUCTS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f8cc2f670d67c82a5cda17c981656762ac5c5e57a57a0b5ff1e7e10587d9389f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DYNASTYFOOTWEAR.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20899</link>
<guid>259aa33b32fc31717e8a18f2dc9edc19</guid>
<pubDate>Mon, 10 Feb 2025 19:27:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DYNASTYFOOTWEAR.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8d2394e3a3f9e03ac7b4ad265bee1a8623284d85aa232a029c5cbd021e52dd88</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DXC.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20900</link>
<guid>55285adfd78a019a3245917649e29b3c</guid>
<pubDate>Mon, 10 Feb 2025 19:27:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DXC.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b0c20ac7c8fb8783951ffd1c3d3d31d554be3ee3b198c8aeac12fb2cd0e909a9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DUNDASJAFINE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20901</link>
<guid>46b315dd44d174daf5617e22b3ac94ca</guid>
<pubDate>Mon, 10 Feb 2025 19:27:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DUNDASJAFINE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c06aef65c619ef25f3783f92860880474c951120d879addd1ad4e6339def8a54</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DONLEN.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20903</link>
<guid>f687a4f18a6d8e0ade28a558503bd998</guid>
<pubDate>Mon, 10 Feb 2025 19:27:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DONLEN.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc07d9082c796cca836d694df7510ff548f2d60929e318d3c4971ada06e1ba8a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DLFNA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20904</link>
<guid>8cb060b4a9c350a9d34b588479d20c9f</guid>
<pubDate>Mon, 10 Feb 2025 19:26:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DLFNA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ae33a72e647cf0197d2ec21db18608b5df3ceaafb9530068a7d517a43ace602</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DIRECTEX.NET</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20905</link>
<guid>e8760be71b19d90afe733c79daedb7eb</guid>
<pubDate>Mon, 10 Feb 2025 19:26:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DIRECTEX.NET</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5657a8ec6cf673016fa5dbdba989398e33b3a63ec3598c3db1411967c30c57f8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DIAZFOODS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20906</link>
<guid>518d52eee664842ce523e2cce507315c</guid>
<pubDate>Mon, 10 Feb 2025 19:26:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DIAZFOODS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>31b6351ec06cc8dbdcc90482860c3cc19e8a07027753d8c1903c50331160cebd</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DELTAENTERPRISE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20908</link>
<guid>25e016f0840e4b586dcbc6cbba55961b</guid>
<pubDate>Mon, 10 Feb 2025 19:26:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DELTAENTERPRISE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>86cafe6d0d74b0eca2ba26fc281a6c55ae565cdc2895f2d63f7f3a095e49c01f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DELTACHILDREN.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20909</link>
<guid>6565bedc3b88da2412ea122c87433f0a</guid>
<pubDate>Mon, 10 Feb 2025 19:26:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DELTACHILDREN.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>50902078b9ab4b789e5f02acddbb2341b662b8a650269a724aac1e71932d16eb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DECRESCENTE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20910</link>
<guid>8f0ba28049c871e3c7f552a32affdbe5</guid>
<pubDate>Mon, 10 Feb 2025 19:25:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DECRESCENTE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6075b752682821421445513633a08ac40a8ab3ffc94d35c624dadc5a97877bd</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DATAPAKSERVICES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20912</link>
<guid>4b58db5ec33af76c6d9b968cf2c633b1</guid>
<pubDate>Mon, 10 Feb 2025 19:25:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DATAPAKSERVICES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d065061ec5a1fea348d81c5b92772cbb1c0e134329936267a208f3cb16bfe83e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CASSINFO.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20915</link>
<guid>7b79052a522d19d23aae93d16d3c744a</guid>
<pubDate>Mon, 10 Feb 2025 19:25:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CASSINFO.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6bba152c09d9fe6dfd32f13d0076f19025dca57eb51083c55867b1a500fc017e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CGDC.COTTONG.LOCAL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20917</link>
<guid>a0a30f6aadee1dc47393d98b24138964</guid>
<pubDate>Mon, 10 Feb 2025 19:24:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CGDC.COTTONG.LOCAL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7dcbc901c6e2e2c20a4198c844cebeeda96545212beebbb6c7f221b30271f740</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CPS.K12.IL.US</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20918</link>
<guid>0e668474147b19cfdc7c8cbef7f9f2e3</guid>
<pubDate>Mon, 10 Feb 2025 19:24:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CPS.K12.IL.US</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ccfe7c27918778c3aa9c403cd76c81f9082bd759903c6bde0e67af881fbec91</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CONBRACO.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20919</link>
<guid>fb420d76222279c408e6ec8fbff53cb6</guid>
<pubDate>Mon, 10 Feb 2025 19:24:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CONBRACO.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dfc797e341d629b8e68b673ea509380786f92f0fb09b6820e23af21943e9c361</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CRESTMILLS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20921</link>
<guid>14d010488fdb86b7b84ad331943cbb35</guid>
<pubDate>Mon, 10 Feb 2025 19:24:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CRESTMILLS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7f05609cb68d269a05ce39f0d8a032d287f1d80cdd1cb3aa98fe8b68f3f42a1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>COVECTRA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20923</link>
<guid>9b28c32a2fa00d78f5625807177a3db0</guid>
<pubDate>Mon, 10 Feb 2025 19:23:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>COVECTRA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97e7408f7415ab2960608491bf30d6284bced30617e049078f8e0fc359d22c08</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>COMPASSHEALTHBRANDS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20925</link>
<guid>175b0230afbb0ad5a51a2c70b9c768df</guid>
<pubDate>Mon, 10 Feb 2025 19:23:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>COMPASSHEALTHBRANDS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a835587e58870e2d76ef17698e123e9707f2212ecc91d361f4e75a0b29ec59ec</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>COLLECTIONXIIX.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20926</link>
<guid>c39795cb0bf6b6135138917091c41d6d</guid>
<pubDate>Mon, 10 Feb 2025 19:23:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>COLLECTIONXIIX.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91c570930df74e2163c970c9d0fb11b774b2ca4dd5fc21e78e96200760b2a41c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CODAGAMI.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20928</link>
<guid>3a74197713008020a939fa3566b1f543</guid>
<pubDate>Mon, 10 Feb 2025 19:22:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CODAGAMI.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f2fd4274313b9d65082b5b6a965dbf24aa080bddf37c410bceb7b99606d3f6e4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CLASSICACCESSORIES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20930</link>
<guid>2cfd73d6effa33badc4c55b0c67a056d</guid>
<pubDate>Mon, 10 Feb 2025 19:22:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CLASSICACCESSORIES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f875234a9618234cabc96450b2d37dbb52b88475ace3d2ac789bc19046c7ddc6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CHEROKEEDISTRIBUTING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20932</link>
<guid>2bada0d8cffac40c988e44a273ba58d7</guid>
<pubDate>Mon, 10 Feb 2025 19:22:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CHEROKEEDISTRIBUTING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f3b164b5519788029438ea247581937376d3d77d3351dbd8703bed65735d4533</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CHEMSTARCORP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20933</link>
<guid>1ecb6468735bde11b1d125b787158088</guid>
<pubDate>Mon, 10 Feb 2025 19:21:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CHEMSTARCORP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e77cfa0826cd7329d12f1a8515fbb5e629d9eb40cf3aa79bd4b6e2392685d3fe</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CHALLENGER.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20934</link>
<guid>4c7318c9d14f1ac6f4826d46646d2551</guid>
<pubDate>Mon, 10 Feb 2025 19:21:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CHALLENGER.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57ab17cf12d4c6dbb4357c0c69b231f9d0dedadb80bb853d2b5eaf7dcc4e8f38</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CEDARSFOODS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20936</link>
<guid>e61c7b2d4e0e9cdf707fbc671586e901</guid>
<pubDate>Mon, 10 Feb 2025 19:21:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CEDARSFOODS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed10d75a36c2cad481159c50d30f07e5a93f3f5a293d2a98762877bba8f6ac94</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CATHAYHOME.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20937</link>
<guid>5c6c364bf5f3e00a2e2b017859dde995</guid>
<pubDate>Mon, 10 Feb 2025 19:20:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CATHAYHOME.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8012e38ce41e785f1fe9316dbbb62c676d4dd410de23da2c0af57c570ac7dfa3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CATCHUPLOGISTICS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20938</link>
<guid>4d883854d72e0b60688786f83fce9e7d</guid>
<pubDate>Mon, 10 Feb 2025 19:20:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CATCHUPLOGISTICS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac7b3e0c0c927f05f9df7b2afce0d35cc9bb21feb2e8389dca0c4c1bba17beb9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CASTLEWOODAPPAREL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20939</link>
<guid>b887f82284199f5553f5cf0d1453bd1d</guid>
<pubDate>Mon, 10 Feb 2025 19:20:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CASTLEWOODAPPAREL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0bfcbfe6623a581e2706f78b59e81d547dd07f5b9c27d2e0139e7b7325151551</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CARLSONDISTRIBUTING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20940</link>
<guid>fff079091fab64095f9cad3298f1057a</guid>
<pubDate>Mon, 10 Feb 2025 19:20:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CARLSONDISTRIBUTING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0cb1d8476c397f1cb3012c9f6350f98a48a6bee658ea559b6faf3f86ae7de4c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Enfin</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20947</link>
<guid>64566c7205d7788234fa94f496ae3478</guid>
<pubDate>Mon, 10 Feb 2025 19:00:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Enfin</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>036441c8960f87cd4cbf19bd69537a1796a8e417077aa97196fdb803e4870b51</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>enfin.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>D-7-Roofing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20944</link>
<guid>9be2610ec283e1a45c7642ab8dcd713b</guid>
<pubDate>Mon, 10 Feb 2025 18:53:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>D-7-Roofing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0d80cc55114bf2f5fbc0a1b3d47d000ab5c685ebc494196d9aa133fe0a83629f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Recievership-Specialists</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20945</link>
<guid>5b011d9e8a36fa05832f9c3032d10123</guid>
<pubDate>Mon, 10 Feb 2025 18:52:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Recievership-Specialists</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38a289993b4d5f0ee01e77a607a85012a118a994dbd3f2a118ecc63063b1f574</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Allen--Pinnix</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20889</link>
<guid>828885df579012e180b602879bd3c129</guid>
<pubDate>Mon, 10 Feb 2025 17:56:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Allen--Pinnix</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca7091b77275431d6c596dc3d5188fd78b67d61bf6ec228d678a78cbe9665179</i><br /><br />Threat actor <b>description</b>: <i>Allen & Pinnix, P.A. is a leading North Carolina-based law firm, serving clients around the world for over thirty-five years. We are ready to upload  more than 29 GB of private corporate documents such as: NDAs, medical documents, contact numbers and e-mail addresses of employees and customers, birth certificate’s, driver licenses, passports, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Atlas-Commodities</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20875</link>
<guid>9d787a2fde1f968b1ae639ab6ec28f2b</guid>
<pubDate>Mon, 10 Feb 2025 16:57:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Atlas-Commodities</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d032ec014dd391ad188fb6b74557bec99007c56741be7653cdbed1ba58bbe036</i><br /><br />Threat actor <b>description</b>: <i>Atlas Commodities LLC is a brokerage firm that facilitates trading for both inst...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>SimonMed-Imaging</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20878</link>
<guid>c21152d513a740be16401febdffcc534</guid>
<pubDate>Mon, 10 Feb 2025 16:12:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>SimonMed-Imaging</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a27c7c571b2e4493c046f6b343513aeedc6605cd579ffe19108116d431ad539</i><br /><br />Threat actor <b>description</b>: <i>SimonMed Imaging (founded in 2003) is an outpatient medical imaging provider operating across United States with over 150 accredited facilities that are ACR-RADSITE certified with certified technologists and equipment. SimonMed Imaging corporate office is located in 16220 N Scottsdale Rd Ste 600, Scottsdale, Arizona, 85254, United States and has 2,030 employees. The total amount of data leakage is 212.616 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Serenity-Salon--Spa</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20880</link>
<guid>4a91a2632259bfeb28c052069c558843</guid>
<pubDate>Mon, 10 Feb 2025 16:10:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Serenity-Salon--Spa</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c55d1cd25079a434b3cdbfe03d097db8d60ef6d18b0d2b69d76a6d2880317761</i><br /><br />Threat actor <b>description</b>: <i>Serenity Salon & Spa offers services such as - hair services, skin care, waxing services, massage services, nail services. Serenity Salon & Spa corporate office is located in 15270 N Oracle Rd Ste B182, Tucson, Arizona, 85739, United States and has 6 employees. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Michaels-Hair-Body-Mind</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20881</link>
<guid>ea575071bd2ce6da53a62a2b147ea96c</guid>
<pubDate>Mon, 10 Feb 2025 16:10:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Michaels-Hair-Body-Mind</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4526d128497eb83838ca89718056cd5566cae88d6a3166aa8622bd696f0d08e7</i><br /><br />Threat actor <b>description</b>: <i>Michael’s Hair Body Mind (founded in 1959) - salon for exemplary hair and beauty services. Michael's Hair Body Mind corporate office is located in 1735 Lakeshore Rd W, Mississauga, Ontario, L5J 1J4, Canada and has 16 employees. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Greenwich-Medical-Spa-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20882</link>
<guid>9da70075597b70dd86a1b519091d7b12</guid>
<pubDate>Mon, 10 Feb 2025 16:08:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Greenwich-Medical-Spa-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e361409e0e816ac5c8b7e347d4e24b39ee7187d9e0c1e14e8244ec20aad6b8b5</i><br /><br />Threat actor <b>description</b>: <i>Greenwich Medical Spa (founded in 2005) specializes in injectables, body contouring, laser hair removal, and skin rejuvenation. Greenwich Medical Spa corporate office is located in 1285 E Putnam Ave, Riverside, Connecticut, 06878, United States and has 23 employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brockway-Hair-Design</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20883</link>
<guid>89ee399281aeb43dc8e2e761959d8935</guid>
<pubDate>Mon, 10 Feb 2025 16:06:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Brockway-Hair-Design</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a93e60e0ed2ee95e29beff57549df7d21ae84526ba846ce9f8510b0c18ae8bab</i><br /><br />Threat actor <b>description</b>: <i>Brockway Hair Design offers full service salons specializing in women's and men's cuts, color, hi-lites, texture, and hair treatments. Brockway Hair Design corporate office is located in 9260 Sierra College Blvd Ste 350, Roseville, California, 95661, United States and has 26 employees. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Old-National-Events-Plaza</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20874</link>
<guid>574656b5b645c38245ad6f1a1d1f4c7a</guid>
<pubDate>Mon, 10 Feb 2025 13:56:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Old-National-Events-Plaza</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a81550218a9591fd6be3c27853f4fa5b9aa37d86168d8e17144f899bf3d99e3a</i><br /><br />Threat actor <b>description</b>: <i>The impressive 280,000 square-foot, state-of-the-art facility, offers affordable, flexible space and in-house services to make theplanning and coordinating of your event a breeze.We are ready to upload a lot of sensitive corporate documents such as: confidential licenses, agreements and contracts, financial data (audits, payment details, reports), contact numbers and e-mail addresses of employees and customers, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>WhoHire</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20886</link>
<guid>155f4603b76e476b3e0dec9a1d5b4c50</guid>
<pubDate>Mon, 10 Feb 2025 12:17:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>WhoHire</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1192d901cfa4a5454854b96232510643945ec14f5668038a2df0036424aac464</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>whohire.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Upstate-Glass-Tempering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20870</link>
<guid>be800ff41f5c4aa73d8c082d2e00a186</guid>
<pubDate>Mon, 10 Feb 2025 07:55:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Upstate-Glass-Tempering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6357a1cc6d0ad99b862f733ce7e8df83d183ed6cb292534062a5b374a1731341</i><br /><br />Threat actor <b>description</b>: <i>Site: upstateglasstempering.com
														Industry: Commercial & Residential Construction
														GEO: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>Saied-Music</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20871</link>
<guid>ede782587d05690823d30d15269a980d</guid>
<pubDate>Mon, 10 Feb 2025 07:55:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Saied-Music</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>392b4daed41426fc6411c2906f4cbd9f75e5d40c144feba3c75f3038281e66d8</i><br /><br />Threat actor <b>description</b>: <i>Site: saiedmusic.com
														Industry: Media & Internet
														GEO: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>CALIFORNIARAINLA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20843</link>
<guid>1881baeccb7399f3452cd7f37cdb2b29</guid>
<pubDate>Mon, 10 Feb 2025 05:58:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CALIFORNIARAINLA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0180d1f9f8bf751a0b1cf66062b08128da174e8f92ee942592f8d198e6d87001</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CAINEWAREHOUSING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20844</link>
<guid>dba1dab580065e4db9defb2cfc74f65d</guid>
<pubDate>Mon, 10 Feb 2025 05:56:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CAINEWAREHOUSING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f3a2f6b824c200b8c985cb8f29076c9e5c7aeef8386d6482fa26aad41a313244</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BARCOMADE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20845</link>
<guid>cf655665801fc01205314e121a0ee8c2</guid>
<pubDate>Mon, 10 Feb 2025 05:43:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BARCOMADE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d0489b6b20a685a15b875dca787621069467ba566c3825aada1e898a86df1ca</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BIAGIBROS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20847</link>
<guid>2a222fead8906cbc8c782be1a3548533</guid>
<pubDate>Mon, 10 Feb 2025 05:42:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BIAGIBROS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c945c7744863df0e90b99b8cbee2f6de14ebc57c1172725fbc244e5eaf43a166</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BSIEDI.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20848</link>
<guid>4b3f1eb677f18a452dc6823e38c4721e</guid>
<pubDate>Mon, 10 Feb 2025 05:41:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BSIEDI.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e598814b263b0f2dc95626354403ee86635b75e47b160bf4eee2943d5143547</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BOWANDARROWPET.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20850</link>
<guid>1e06ec8cf0abf417f8c787235f66f350</guid>
<pubDate>Mon, 10 Feb 2025 05:35:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BOWANDARROWPET.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da89b23c742f517fd6cdab2a259103cfe24543a054e94a0b1189bb63b38cf493</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BOSSCHAIR.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20851</link>
<guid>d3391ca3a0c6b2d227920e8fb5ece40b</guid>
<pubDate>Mon, 10 Feb 2025 05:35:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BOSSCHAIR.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>870d632d396476704f03791c8c6bce5028c8da0bc008a8c85d550e16763b85c5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BISSELL.COM-CLEO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20852</link>
<guid>6881a152b83d09fd68ccb9be0f9d9ade</guid>
<pubDate>Mon, 10 Feb 2025 05:34:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BISSELL.COM-CLEO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>898d0c80c2eab08deff4d7a19768db51ffb42132162baa67dc4f9b1c41c468fe</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BESTBRANDSINC.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20853</link>
<guid>a6df0bdb9111011bb923c11b2bc2e5fd</guid>
<pubDate>Mon, 10 Feb 2025 05:33:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BESTBRANDSINC.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f46c53170e48bf9f1244f8912fe31c056cefc62b3ccd79fe4292125d6c0e9f97</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BERKSHIREINC.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20854</link>
<guid>48ea3e6f887cf74cbff9dd2a13d81bd2</guid>
<pubDate>Mon, 10 Feb 2025 05:33:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BERKSHIREINC.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c6c4b9f2fbe5535ae82604c81cfdccf2602372c18f5e95c517293e509c7f559a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BENSONMILLS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20855</link>
<guid>5f679cac1ebdeda165eb49cc3015fd9e</guid>
<pubDate>Mon, 10 Feb 2025 05:32:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BENSONMILLS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>552374b41a8d955d58ba051ec5305e9477d2b71d68245e0e4c1cdc6a1d4c4456</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BAYSIDENH.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20857</link>
<guid>afa5b2e548f3d4a647ee75ec79bc60cd</guid>
<pubDate>Mon, 10 Feb 2025 05:30:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BAYSIDENH.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04c150cf98b3d7a39b7e6a54a60fc8292bed6a26dd17483a77518891fa2799f7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BARRETTDISTRIBUTION.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20858</link>
<guid>57902633a9b75c60dd351cd33856950b</guid>
<pubDate>Mon, 10 Feb 2025 05:29:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BARRETTDISTRIBUTION.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7db6fda98b869a63071222cac7d3b3e4336ab4cdd3105cf0702606f28c05446b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BACKYARDDISCOVERY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20859</link>
<guid>d466c07ceb8f2e0704c4da35f9bd11c9</guid>
<pubDate>Mon, 10 Feb 2025 05:28:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BACKYARDDISCOVERY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>104d1a651c776c888a3780ea7857e15653dc5e11935deacd304522584eaaae6f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ALEGACY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20860</link>
<guid>a4cd5806822664852ac9b3e8b8b71576</guid>
<pubDate>Mon, 10 Feb 2025 05:27:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ALEGACY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bbb59cd57a3f20870fa61d7ff0f12efb98753a9e99ef20a63c70ac957e4a2164</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ARKIEJIGS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20863</link>
<guid>00ca4dc5c4d94396ae3966f3b0ab1f1b</guid>
<pubDate>Mon, 10 Feb 2025 05:17:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ARKIEJIGS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>152eaaee4753e40426ba546cd1434e2003daba6c5172e5400884e528e654f366</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>AOL.COM-AJ-MISSERT-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20865</link>
<guid>b78726bc3aca220745ba2e9c7193ee3e</guid>
<pubDate>Mon, 10 Feb 2025 05:13:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>AOL.COM-AJ-MISSERT-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87ff6ecea6980cb8f28386efcbe50522a76c11f6ed4a2adaaffb9c09735d9b32</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ANNABELLECANDY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20866</link>
<guid>98908fce27744e259d6b7d7bb87de294</guid>
<pubDate>Mon, 10 Feb 2025 05:12:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ANNABELLECANDY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bca4adfb4e79bcf75a38086939b739d3f1a201a31bd7362fb2de3d0639a51698</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ANDROSNA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20867</link>
<guid>8f34e6c58e3875b532232d5c0165afa2</guid>
<pubDate>Mon, 10 Feb 2025 05:12:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ANDROSNA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5177aadd80e242e24e664ae499622a68a86a16935c6e5493455299bc2b2a0d16</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ANDREWSDISTRIBUTING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20868</link>
<guid>12f2b19fb872d854ceffd60459a20dee</guid>
<pubDate>Mon, 10 Feb 2025 05:11:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ANDREWSDISTRIBUTING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ba1e45183285c13285d92062df8718eccefb4c40c4f86da6e0eb5e19e91a3ef</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>AMSINO.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20869</link>
<guid>3e8895f2632f4691cb5c32180389aa0e</guid>
<pubDate>Mon, 10 Feb 2025 05:10:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>AMSINO.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc89da569f534ad82141704c51e9c1ec1059a6b6957e10530b86d6f969cffdf9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>AMERICANLIGHTING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20827</link>
<guid>20b7529575c247bc9547f43ab405c8cf</guid>
<pubDate>Mon, 10 Feb 2025 04:52:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>AMERICANLIGHTING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2cd7a15b3946133df4c9c934d754a1da6c802b4984ad173c4d6c3c6c64cf7925</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ALPADVANTAGE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20828</link>
<guid>fe3940fba1a1698624b9905f1bc4de6c</guid>
<pubDate>Mon, 10 Feb 2025 04:46:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ALPADVANTAGE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>66d973ff4c87b13d587e841e343f4821e845a265dbcc19d7e716e4c9d9e12ae2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ALLTECH.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20829</link>
<guid>f985cff158c7cfb0fc2d5d05f731809f</guid>
<pubDate>Mon, 10 Feb 2025 04:45:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ALLTECH.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c8ff3f38529ea95cdcacfdea11cb8d24eac35b88b0c01c6cfce5ecf5342a7f6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>AGILITYAUTOPARTS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20832</link>
<guid>f57d2659f5b158b7991336a1bff47024</guid>
<pubDate>Mon, 10 Feb 2025 04:28:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>AGILITYAUTOPARTS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c66f23db1b7c6c9e3b2502077bef3ab2a02e132e7290d887e0758479e93dfd5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ACTIAN.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20834</link>
<guid>398e24b46129ded49457c65ce367eab7</guid>
<pubDate>Mon, 10 Feb 2025 03:31:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ACTIAN.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8245abaa7dc4c4e408e79160f68ea8ea2aefbde9c051efe5adf72322897f4fec</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ACPIDEAS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20835</link>
<guid>0ee4791bc282b18c03ab31072ffbbecd</guid>
<pubDate>Mon, 10 Feb 2025 03:27:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ACPIDEAS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>66a5a11f5959dd1ffef93f9f86f2f3cbd16e5ccec026bcf7d7b251aa5dacc481</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ACCEM.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20836</link>
<guid>eb9c0e8145b126a87392d98bb1fd81c3</guid>
<pubDate>Mon, 10 Feb 2025 03:27:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ACCEM.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>55c4de57de8f1bf66e796c140c86f3bf792202bd88341b07935a0e9fb40664b0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ABCOPRODUCTS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20837</link>
<guid>41d626e181cd445e3cac18440a448424</guid>
<pubDate>Mon, 10 Feb 2025 03:26:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ABCOPRODUCTS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6cfe4c1305a3b4e61175172588305c7ece995ca8f7292fc86337fc03b0f42b6f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>3PLSOFTWARE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20838</link>
<guid>88a2ae0abd8b20c4ebd29757ec1b65c1</guid>
<pubDate>Mon, 10 Feb 2025 03:25:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>3PLSOFTWARE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be3b2100f84db9e860f62f9d2cde1da07ec0d75cbc60391d50af873ff9f86ced</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>3FINITY.NET</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20839</link>
<guid>f0dab884339641a759fa5a90e906c883</guid>
<pubDate>Mon, 10 Feb 2025 03:23:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>3FINITY.NET</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f5c222b0682c1ee1a3ca856de8b779d508745fd9bf6c3d2369decd4df170904</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>1888MILLS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20840</link>
<guid>0383aa006955b67fb5d9110bc2522d8f</guid>
<pubDate>Mon, 10 Feb 2025 03:22:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>1888MILLS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e5bba5b85e7c1b0975247213c6330be6d2f4ad0f85a38181633ee02139a71b64</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CXTSOFTWARE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20841</link>
<guid>a43cf08f436295cdfb709c91ac898e7e</guid>
<pubDate>Mon, 10 Feb 2025 03:21:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CXTSOFTWARE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ed851866cb625c199314ebdeaaaf7b0ccb58515b718159c66a43f0cdd32f355</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.cisco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20821</link>
<guid>f40fe967870174ded9323bae71c5ce50</guid>
<pubDate>Sun, 09 Feb 2025 19:05:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kraken</b> claims attack for <b>www.cisco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>213a8bf3710ee757f898be497d2309a013830c56ff9046f0149b1a2b1c2bcb2a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.cisco.com</i>]]></description>
<category>kraken</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.mgl.law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20824</link>
<guid>6235309896929b904b7eabdd38e89235</guid>
<pubDate>Sun, 09 Feb 2025 19:03:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kraken</b> claims attack for <b>www.mgl.law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d6376ee09a406b9c46720e3d1efabb5262c8f5ac8323ef1cc6dff4c3ec1fd31</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.mgl.law</i>]]></description>
<category>kraken</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.fudpucker.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20823</link>
<guid>30aaa035ea6addf3032dc3d63b674344</guid>
<pubDate>Sun, 09 Feb 2025 19:01:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kraken</b> claims attack for <b>www.fudpucker.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>54a36dbddddb92a9b1214c0e08bc15d45e22458ee424a59c78f07f0ca6cd5f26</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.fudpucker.com</i>]]></description>
<category>kraken</category>
</item>
<item xmlns:dc='ns:1'>
<title>ctntelco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20822</link>
<guid>0e99eacf79d6fee9b99f889e6da46c0a</guid>
<pubDate>Sun, 09 Feb 2025 19:00:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kraken</b> claims attack for <b>ctntelco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3c19e1ee4be9f697f84e0e50f2ec362e51b9b9d0fd8addf849dafcceda9d057</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>ctntelco.com</i>]]></description>
<category>kraken</category>
</item>
<item xmlns:dc='ns:1'>
<title>Leading-Edge-Specialized-Dentistry</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20816</link>
<guid>d6f7f74d07995f27a5aaaf156579a650</guid>
<pubDate>Sun, 09 Feb 2025 18:49:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Leading-Edge-Specialized-Dentistry</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>314eec72b937f6acad071e098f396903e612fe8725e0eb75d72f345adcff4b00</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>wwcsd.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20813</link>
<guid>0723c0809ca062085a93e8970e58804d</guid>
<pubDate>Sun, 09 Feb 2025 14:46:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>wwcsd.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2462e5ada8a03afe4596bef09ccf3b0dc558ade62694fea4bc4744ab107c974a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Spectrum-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20810</link>
<guid>3b20f86f68dbde3147364a0f6499637b</guid>
<pubDate>Sun, 09 Feb 2025 12:57:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Spectrum-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc3341aa24ed25abeed7a65f11aa283dceaf52db112e466a3903cdc55534ee78</i><br /><br />Threat actor <b>description</b>: <i>With over 1000 GB of files stolen , company has 150 hours to contact us before making files public . Since 2006, Spectrum Solutions has been a single-source provider of high-quality, direct-to-consumer product innovation & global fulfillment.            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hpisd.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20815</link>
<guid>8eee8d98fe7248f4656ae222f283cae9</guid>
<pubDate>Sun, 09 Feb 2025 12:21:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>Hpisd.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9704e011f51aee88e9ab882dc31e98c91c7be46b06867a5a1aa0c52fd3578a0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>Hpisd.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Substitute-Teacher-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20808</link>
<guid>b9cc29ff23a908aaf7f741dabbe5b0f6</guid>
<pubDate>Sun, 09 Feb 2025 00:49:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Substitute-Teacher-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ace35257850bf9a67b32252b065a9cf196d5224d4a1c8ee8f7fc9f7a47971a8</i><br /><br />Threat actor <b>description</b>: <i>13</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>teamues.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20795</link>
<guid>2c97470b88a7147de0853a9b6ba8d0ce</guid>
<pubDate>Fri, 07 Feb 2025 16:52:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>teamues.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a450b368a85270ed564178c9773da1b227be6a1042070cb42cdf20365ef4323</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tropical-Foods-Company-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20796</link>
<guid>2b20b3682e832df224a5c404d8f9f365</guid>
<pubDate>Fri, 07 Feb 2025 13:32:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Tropical-Foods-Company-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0d1752b2e057ae001f91e4462bf70185a04bde52035cd30b4099ee3ae578a95c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>sautech.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20792</link>
<guid>0366cd91ea30dd83c73415b64afda334</guid>
<pubDate>Fri, 07 Feb 2025 13:03:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>sautech.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6b594b8afa0f1482afc17025a353d2252c37d94f94e0c3272858eda2c7c3d53</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>harcoboe.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20790</link>
<guid>700a143a1799e92c5aca1d4bf9de0b2a</guid>
<pubDate>Thu, 06 Feb 2025 20:07:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>harcoboe.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>035606303c127474a1d990634edeef7c9f081b2dfcd84703a1eb0cfddcd3b276</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>harcoboe.net</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>lowernazareth.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20789</link>
<guid>7396330c6ba8953e267957e1b1fdc7fe</guid>
<pubDate>Thu, 06 Feb 2025 20:06:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>lowernazareth.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>810fda536eec9ccfb5375d52a47b1ea0d568343e9009c74a8f4b861c044ccc75</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>lowernazareth.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>savoiesfoods.com18.2MUSA95GBlt1-DISCLOSED</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20784</link>
<guid>a364e18ae6f4ed11c6474ea350d42183</guid>
<pubDate>Thu, 06 Feb 2025 18:52:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>savoiesfoods.com18.2MUSA95GBlt1-DISCLOSED</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3001f573029470d4476e35edbfeec027f7a724767b516e1757ccebd516d45abd</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>zsattorneys.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20786</link>
<guid>cc5a8e3b4dbf63f5bace0347540fed78</guid>
<pubDate>Thu, 06 Feb 2025 18:46:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>zsattorneys.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>70eb365415324c64e9d222919c8cf9a05de9202866449d7619508962f7f413d0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>zsattorneys.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>UNIEKINC.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20780</link>
<guid>e35d364e346986c56be6b676999d8f00</guid>
<pubDate>Thu, 06 Feb 2025 16:48:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>UNIEKINC.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1dc3f6dcde073fac49bf2f99d1282c46cd4b398c8f4fad50921027b9578c08fb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Presence-From-Innovation-PFI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20783</link>
<guid>70b0fe89ee50140bd6580640a4d70e7e</guid>
<pubDate>Thu, 06 Feb 2025 13:52:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Presence-From-Innovation-PFI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>83aec222816b59fc581434f42b1966dab05118671ad9859b3b3e1f184740affb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lexington-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20781</link>
<guid>5e07b82cfd5b5b726a8b5685ce1a3766</guid>
<pubDate>Thu, 06 Feb 2025 13:17:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Lexington-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24056d578ca7ad08b87762940f9c89e360381de85141d7eebd57c9c8aa4c01ca</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.lexingtonelectric.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Robertshaw</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20778</link>
<guid>ad087ba3e8f8063d81a2ae71e365a81c</guid>
<pubDate>Thu, 06 Feb 2025 13:04:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Robertshaw</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db3109a78963fd4bb56a98fef14d67712926170db12e6f6ceb83578e201c09af</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>SmithDunnCo</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20773</link>
<guid>5d40c4d766944f12591f840c4d72d7ac</guid>
<pubDate>Thu, 06 Feb 2025 08:14:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>SmithDunnCo</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d1609d087752dfdd372d4733163d2469cb05eeeb3b0d2c9b766f450ff5b98819</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.smithdunn.com</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>McCORMICK-TAYLOR</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20767</link>
<guid>2fca89aef2c792cb67c316a669ffe591</guid>
<pubDate>Wed, 05 Feb 2025 23:54:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>McCORMICK-TAYLOR</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e26f03d972567719105f649c50ca498bc4903de380fdfc983ab5e85a26bd6072</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 13.02.2025.McCormick Taylor is a full-service civil engineering firm that provides creative design, planning, and environmental solutions to the challenges of everyday life. Since 194            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.iecsolutions.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20772</link>
<guid>1820c4b6fcbf5be5758bffe24c41fa6a</guid>
<pubDate>Wed, 05 Feb 2025 22:46:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>www.iecsolutions.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a42924725a6491a9dbfe45363e92b847eb430a5f4b74d51b4324231f2cda2801</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.iecsolutions.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>corehandf.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20771</link>
<guid>20fb49a2d6f77791a00d75ab23463426</guid>
<pubDate>Wed, 05 Feb 2025 21:28:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>corehandf.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>05ff8fa36a78bc834c9e1473f487f95c9fd6aee565d854cfad5e04359dc6beeb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>corehandf.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dash-Business</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20770</link>
<guid>54eaab91a094a64b34a6a5ef6b804073</guid>
<pubDate>Wed, 05 Feb 2025 20:42:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Dash-Business</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6aab8abb48a7be50094038e5f4a876ec0241d4dca667742e5ccee0ff74b1e785</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>NESCTC-Security-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20768</link>
<guid>ceadc8a6adc7928cbf91a70f4e2b1217</guid>
<pubDate>Wed, 05 Feb 2025 20:41:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>NESCTC-Security-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf40c03474ec2402ecc6fa2172848c5d481a8200d5b611f32229c2051d216a9d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>STORKCRAFT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20764</link>
<guid>6eb2d5d425df0c00ac300bdc04305cb2</guid>
<pubDate>Wed, 05 Feb 2025 20:10:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>STORKCRAFT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e432dc1132784f75eeeaa3d33068d00d7dc2561b593625a8c02e4a5ac987209c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Banfi-Vintners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20766</link>
<guid>1b849ffdb908682b466a7154d74da7bf</guid>
<pubDate>Wed, 05 Feb 2025 19:56:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Banfi-Vintners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>afa3fd515e92d0c7aca87e44c2a6932dd51dd4241ec078a24aa2477a78a0f378</i><br /><br />Threat actor <b>description</b>: <i>Banfi Vintners, the exclusive importer of Riunite in the United States, was foun...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>rablighting.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20762</link>
<guid>097a50cc176aaa176878e315f72fde85</guid>
<pubDate>Wed, 05 Feb 2025 18:56:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>rablighting.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd823e069e8c6f3449b65cf0a864b11dbc9e23b7242c73e00adde8b8e17e849e</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 13.02.2025.RAB Lighting is committed to creating high-quality, affordable, well-designed and energy-efficient LED lighting and controls that make it easy for distributors to sell, ele            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>annegrady.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20763</link>
<guid>b7f5d38aaa4e8a553f49c085ee06bb15</guid>
<pubDate>Wed, 05 Feb 2025 16:53:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>annegrady.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1598ba3d12c4751357ef91b4ee4a71a3e2e19e236d7a55aa9aeb409f15ebd85a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rural-Health-Services-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20761</link>
<guid>92c2425736b1065fa04616737b9e41b5</guid>
<pubDate>Wed, 05 Feb 2025 16:11:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Rural-Health-Services-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f99e15d07094a0005026438f794fcff49d6655c156182af114e5d040d546578</i><br /><br />Threat actor <b>description</b>: <i>Rural Health Services (RHS) (founded in 1971) has provided a wide array of primary and preventive healthcare services to the population of Aiken County and surrounding areas. RHS is a private, non-profit, Federally Qualified Health Center (FQHC). Rural Health Services corporate office is located in 120 Darlington Dr, Aiken, South Carolina, 29803, United States and has 100 employees. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mid-State-Machine--Fabricating-Corp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20759</link>
<guid>c310688b6d82ca7ea9c1889ccc3416ee</guid>
<pubDate>Wed, 05 Feb 2025 13:02:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Mid-State-Machine--Fabricating-Corp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>024e357367a2d41d78f85f9ffc73c2e77f33da46dcf8002b44441f58fdecd670</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>A2b-cargo.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20758</link>
<guid>357429c78239304d194f517cde4ad439</guid>
<pubDate>Wed, 05 Feb 2025 06:36:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>flocker</b> claims attack for <b>A2b-cargo.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ce7048fd244a22be824e7f6a3668bfdcc47d0172cc06371c8227162b3940692</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>A2b-cargo.com</i>]]></description>
<category>flocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Town-Counsel-Law--Litigation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20739</link>
<guid>d50b2d3afe5ec033d560dd1318b2707b</guid>
<pubDate>Tue, 04 Feb 2025 22:47:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Town-Counsel-Law--Litigation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>928ea56582d16d246f1245c5908bdc7a9406ba08cf8c170dfc573b8da0de2629</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>casperstruck.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20754</link>
<guid>0727459d2e79f13a818513aee75a1f90</guid>
<pubDate>Tue, 04 Feb 2025 21:59:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>casperstruck.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dedf84a778eaf35348d609f57ea8f7156520a801741b858e325cd008786d8748</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>casperstruck.com</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>X-lab-group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20747</link>
<guid>b8e13fb2d666b3ef456839ea878a0ab8</guid>
<pubDate>Tue, 04 Feb 2025 21:04:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>X-lab-group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec1ee7c62bdc88be09435c3d5bfc24cb33f1bdd779cca65d75cedc164a4827af</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>xlab-group.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>engineeredequip.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20737</link>
<guid>bd90b9ce1c34dd19e6a634a162ad65c8</guid>
<pubDate>Tue, 04 Feb 2025 17:52:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>engineeredequip.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>08297ab1b66843c3d3c7a81c459889edd09d7d2d9c1b4d9b9a0f662f1fb5d44d</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 2</i><br />Target victim <b>website</b>: <i>engineeredequip.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>alphascriptrx.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20735</link>
<guid>659c836a3fdfcb380e8608d2241f5523</guid>
<pubDate>Tue, 04 Feb 2025 17:51:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>alphascriptrx.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>90538aa33ea096851b69a87d0f623708acb77a3d8e2f5e373adf2e865da33b71</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 2</i><br />Target victim <b>website</b>: <i>alphascriptrx.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>premierop.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20734</link>
<guid>1fa19a98316222ab4bcac1af0412e2ab</guid>
<pubDate>Tue, 04 Feb 2025 17:50:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>premierop.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>64396157e24fb60c8897b8b2f91352594b81ed609062dbeeb9368301ebcb250c</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 2</i><br />Target victim <b>website</b>: <i>premierop.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>acesaz.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20733</link>
<guid>67eb5e92661b494826add1d403863257</guid>
<pubDate>Tue, 04 Feb 2025 17:49:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>acesaz.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f3ca62010c30ba055f66618d83b42b15097473c90ba3815d912f64094bd2933</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 2</i><br />Target victim <b>website</b>: <i>acesaz.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>usm-americas.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20731</link>
<guid>e06015c0688508d35fc02b0434cb7ce9</guid>
<pubDate>Tue, 04 Feb 2025 17:48:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>usm-americas.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>759c9e9f3ba2d08d9b17376df3805c1133c7b1dfad5d6b45a59990351ddbd416</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 2</i><br />Target victim <b>website</b>: <i>usm-americas.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>feheq.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20730</link>
<guid>37c9c9e3401bacdf3fb42cb447dadb4b</guid>
<pubDate>Tue, 04 Feb 2025 17:48:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>feheq.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eb52938fe1028fa434da9c247f8b841deb1b68b02172a88ff3be1db97fc71795</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 2</i><br />Target victim <b>website</b>: <i>feheq.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>stewartautosales.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20729</link>
<guid>8596dd1dc67d1200fe0606146fcee1a4</guid>
<pubDate>Tue, 04 Feb 2025 17:47:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>stewartautosales.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b5a0b016ca1e5c633de8a30fe8f9ee21e9c237241f8b247ab7e02374e1928da3</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 2</i><br />Target victim <b>website</b>: <i>stewartautosales.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>milleraa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20728</link>
<guid>81bea31a79deb32965455a1e507c944f</guid>
<pubDate>Tue, 04 Feb 2025 17:47:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>milleraa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>16db261b274a72e3b96677fbd8afe12c12dcbc0303e7d4aaaeba2e50d5f3a432</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 2</i><br />Target victim <b>website</b>: <i>milleraa.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>jsfrental.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20727</link>
<guid>6d9814b5207f1d3ff1d50bc3a89ac9b3</guid>
<pubDate>Tue, 04 Feb 2025 17:46:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>jsfrental.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>808427573676f25023f6bd288444c6434109f9e52fa2b2b64584cf9d943e765c</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 2</i><br />Target victim <b>website</b>: <i>jsfrental.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>summitmovinghouston.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20726</link>
<guid>89b3f18cd4609f9af4d1aa05a3df378e</guid>
<pubDate>Tue, 04 Feb 2025 17:46:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>summitmovinghouston.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a2319ea9da2493c9ebe1ec3e205af9d1f815381b0e3d7bdc5d111fe0fdf6544a</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 2</i><br />Target victim <b>website</b>: <i>summitmovinghouston.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>dwgp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20725</link>
<guid>94fa408dabe453246eb240f198322336</guid>
<pubDate>Tue, 04 Feb 2025 17:42:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>dwgp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a5a4f21748c72e340027db67a2c2777ae00094d733fd37b0ea4e837ee2fde76</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 2</i><br />Target victim <b>website</b>: <i>dwgp.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>westernwoodsinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20722</link>
<guid>b8b195466d4f833578d5ee14a9a3c5b8</guid>
<pubDate>Tue, 04 Feb 2025 17:41:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>westernwoodsinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d8b56b1487feb87ce06decc046933bba4752f3b3ec4272f8348666f050b064a4</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 2</i><br />Target victim <b>website</b>: <i>westernwoodsinc.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>viscira.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20721</link>
<guid>1cc1fab198176208789cf94b71412dc8</guid>
<pubDate>Tue, 04 Feb 2025 17:40:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>viscira.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>078a9702222ed541478334712e0c77379691d014f9b927cfdf662707ea26f5c7</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 2</i><br />Target victim <b>website</b>: <i>viscira.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>cfctech.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20719</link>
<guid>68f7706048943bb1314c6cf8e18a99e4</guid>
<pubDate>Tue, 04 Feb 2025 17:39:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>cfctech.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a7205177a1b2812133ca5c3279ac71a6b29d0b938b3e514a1812e8f1888355e</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 2</i><br />Target victim <b>website</b>: <i>cfctech.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>armellini.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20718</link>
<guid>76e29a9f2d8037429c360bdefcca0f57</guid>
<pubDate>Tue, 04 Feb 2025 17:39:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>armellini.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45effc332876a560f41fc66bcdcdbf70a4b6cd050b96da4ea06a8f1d04d1120f</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 2</i><br />Target victim <b>website</b>: <i>armellini.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>mbacomputer.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20717</link>
<guid>85410779053820c804ddc69ae4a48d9d</guid>
<pubDate>Tue, 04 Feb 2025 17:38:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>mbacomputer.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3ea5f052f629664f7dac0e677d2b06ad0ca4df8115de667ad9cda9a59d768d8</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 2</i><br />Target victim <b>website</b>: <i>mbacomputer.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>directex.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20716</link>
<guid>4b3909f00d45451966f2fdc01cdcc610</guid>
<pubDate>Tue, 04 Feb 2025 17:38:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>directex.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1cb137f01cdc014d763bb065cba9a3e8d422e78b23f281b24433e868062f84a4</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 2</i><br />Target victim <b>website</b>: <i>directex.net</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>C--R-Molds-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20711</link>
<guid>9c046ab62352166627485e062de7a9cf</guid>
<pubDate>Tue, 04 Feb 2025 16:20:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>C--R-Molds-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6ef26f46b0e08bf789e7ba15767e4e806c6793eaac094475efb49d2d084ec40</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Commercial-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20710</link>
<guid>0773717ebcc38123d5c85e7c95045b8d</guid>
<pubDate>Tue, 04 Feb 2025 16:19:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Commercial-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c755d64a60b693fce201edc5a0b79a88000db64386e465cf67d09f7a7699f02</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>kksp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20704</link>
<guid>83f68e12355250e64cbd57b2e51c57ad</guid>
<pubDate>Tue, 04 Feb 2025 15:57:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>kksp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>10033664833724b33027f2c5e4e10932c09fe9b6d3712b4ca692d70271893be9</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 12.02.2025.The Largest in North America
With over 425 screw machines in four locations in the U.S. and Mexico, we are the capabilities leader and the largest machine shop of our kind            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.aymcdonald.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20709</link>
<guid>9908f9fe263a529681a44d6e9c961c4d</guid>
<pubDate>Tue, 04 Feb 2025 15:49:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.aymcdonald.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8c8033608c4014328fd253e41f741600b2ee1131c0259eef2709ecab4ec56134</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.aymcdonald.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>clarkfreightways.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20707</link>
<guid>205d8e3b4d428dd0a3bf62e1d9512403</guid>
<pubDate>Tue, 04 Feb 2025 15:46:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>clarkfreightways.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>43010f4c56888badd99c58159196074034c78574375f223e09f3e2b58c779144</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>clarkfreightways.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>mgainnovation.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20706</link>
<guid>276d18b2db1978d562fa17920c57977f</guid>
<pubDate>Tue, 04 Feb 2025 11:03:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>mgainnovation.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>10cbe90eb63e9b5fda1e4a6661a4cbbc4e86128f052268014e0523ecae2359a2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>mgainnovation.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>cornwelltools.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20703</link>
<guid>77b1932b3eec9f094a2b103001f0dff1</guid>
<pubDate>Tue, 04 Feb 2025 09:00:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>cornwelltools.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>662a123659dbeaf279d2dae494ca2689e38e5aa760648466474766c21187d9cf</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>cornwelltools.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>rashtiandrashti.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20702</link>
<guid>775a90dc133a5870654dc448e95ce41b</guid>
<pubDate>Tue, 04 Feb 2025 08:58:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>rashtiandrashti.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed72521e7ab342919820257d09963c32b224e352e26d7c1c8f06725f215ce41b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>rashtiandrashti.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>heartlandrvs.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20697</link>
<guid>0d21438355b511b82bd90553b7a96ac6</guid>
<pubDate>Tue, 04 Feb 2025 06:23:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>heartlandrvs.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ffa6aa7f3300f2573e12f996133b05bf629e9d4ee338a1471e70701fa50dfce</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>heartlandrvs.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>gaheritagefcu.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20696</link>
<guid>94d7a0d6025b4d210ead230e118f6d4d</guid>
<pubDate>Tue, 04 Feb 2025 06:21:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>gaheritagefcu.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>466a5238df2fdd3a5297fda302c22f7ec3af77174749d477427d545f0d597d1e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>gaheritagefcu.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>C2S-Technologies-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20686</link>
<guid>fc76dcfc15b6be30b1e6d3c296f19e58</guid>
<pubDate>Tue, 04 Feb 2025 01:39:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>C2S-Technologies-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d24366e593ea33dd91fb6abfbbb025e8d1a204e2a428594836d4e3d84e46df36</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rivers-Casino-and-Rush-Street-Gaming</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20679</link>
<guid>e28819b5d88ce9a97d9491932c3a5800</guid>
<pubDate>Tue, 04 Feb 2025 00:57:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Rivers-Casino-and-Rush-Street-Gaming</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>426684e7e4de3ca9c31a73c74acdbf70c45125dddb3a3bcfff9a480f8ea6b8eb</i><br /><br />Threat actor <b>description</b>: <i>13</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>Asterra-Properties</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20680</link>
<guid>59770ea2e6ec69c5fafe3be3495d68d1</guid>
<pubDate>Tue, 04 Feb 2025 00:57:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Asterra-Properties</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>02658e6322a3f45e9ba25c00de450f99bb82ec4dd676e19e543893ed5b28efe6</i><br /><br />Threat actor <b>description</b>: <i>10</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>Caliente-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20681</link>
<guid>5a12243d83e5d4340291fd74318bffe2</guid>
<pubDate>Tue, 04 Feb 2025 00:57:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Caliente-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce84796f3e399d679f71192fc5fde33db480f6d20580a8ac18c6ad4140f209af</i><br /><br />Threat actor <b>description</b>: <i>14</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>brewsterfiredepartment.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20694</link>
<guid>19c787a60b260763b6630ef0402cbe32</guid>
<pubDate>Mon, 03 Feb 2025 21:22:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>brewsterfiredepartment.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>888459639e29168a2e608935559f9db703ca4686b42625c8f129b8739d9ac1d0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>brewsterfiredepartment.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>globexusa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20692</link>
<guid>61d5d9601b149e9c5356878a372b2921</guid>
<pubDate>Mon, 03 Feb 2025 21:19:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>globexusa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>44d161c3b14434479bd5e2fa9b11b377862fd59739905bb38e1a48a9f8fb3c81</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>globexusa.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dickerson--Nieman-Realtors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20691</link>
<guid>e900e23359023d5eb02b90a0933dc43d</guid>
<pubDate>Mon, 03 Feb 2025 21:13:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Dickerson--Nieman-Realtors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1beae6a279c1ea2d04bfc70207afbd885bd9ba97fe5b00b776aeb196e4ecf9cf</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.dickersonnieman.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Woodway-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20688</link>
<guid>6d9d8262844bea015e2303ae58d829bf</guid>
<pubDate>Mon, 03 Feb 2025 21:07:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Woodway-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>27633d319dd56978aabc123419e9845e6320daed7c9d3a53af6e84e60147bbe4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.woodway.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Daniel-Island-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20687</link>
<guid>ecf4747dc3523d20b91b0fadec88d2d9</guid>
<pubDate>Mon, 03 Feb 2025 21:06:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Daniel-Island-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a4c74366abca470ea9d9beaacc9dc790e6eb5f9693b4f1b7e1de7b6f423a6e8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.danielislandclub.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>KWS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20685</link>
<guid>9b2a084225d184770748a90c42a7b760</guid>
<pubDate>Mon, 03 Feb 2025 21:04:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>KWS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>017f39240ba0abf4bbf23f15a112693889277c7ee71c4b21530c5611295c4128</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.kwsmfg.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>DPC-Development</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20677</link>
<guid>1ce84848303b6bbe72fd5e3a2855c764</guid>
<pubDate>Mon, 03 Feb 2025 20:49:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>DPC-Development</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>215ec8fc7214796d5d895b4505749c1355a7ff1acff55d436d25d6489c385c3b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>QGS-Development</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20684</link>
<guid>dbf5e7a9585a95e7d2eba55e085aae3c</guid>
<pubDate>Mon, 03 Feb 2025 19:46:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>QGS-Development</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>88b5040477e5bc30df3cdf76756db6c61e963dcfedcb938d68ccf7cbdd19a028</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.qgsdevelopment.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Glow-Medi-Spa</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20673</link>
<guid>bb72ff86dcbb43a491a760184828aa78</guid>
<pubDate>Mon, 03 Feb 2025 17:20:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Glow-Medi-Spa</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c7924524604685a2c1115dcd36259e28d361422e8816a2f6e035fd1d79e6fc1</i><br /><br />Threat actor <b>description</b>: <i>Glow Medi Spa - spa center with medical services. Glow Medi Spa corporate office is located in 129 Yorkville Ave Fl 4, Toronto, Ontario, M5R 1C4, Canada and has 10 employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lakeshore-Title-Agency</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20667</link>
<guid>cd48d72165d061eea4c7b63d8da8a64b</guid>
<pubDate>Mon, 03 Feb 2025 16:07:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomexx</b> claims attack for <b>Lakeshore-Title-Agency</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>109ac2df6840cb478399cc42374ada4906edbd23e4cd60e4b52cf817bf67840e</i><br /><br />Threat actor <b>description</b>: <i> Date: Fri 31 January 2025
Tags: #usa

Lakeshore Title Agency has closed over $100 million in commercial transactions and over $700 million in residential refinances and purchases.
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomexx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Denton-Regional-Suicide-Prevention-Coalition</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20668</link>
<guid>c98399cf427813fcbe9bd5ad68d18f56</guid>
<pubDate>Mon, 03 Feb 2025 15:58:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Denton-Regional-Suicide-Prevention-Coalition</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60f3e42723466ed4400d299e8392334c5dca905e59159b5b8b0eaa1bcd0396d3</i><br /><br />Threat actor <b>description</b>: <i>With over 200 GB of files stolen , company has 100 hours to contact us before making files public . The Denton Regional Suicide Prevention Coalition came together in June 2014 as a response to the high number of suicides in our area. We are d            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.origene.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20670</link>
<guid>3dc20e2ac60a2551a4d3f08b03377def</guid>
<pubDate>Mon, 03 Feb 2025 14:50:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.origene.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de2dcab36c86e4a96669c83f355b61f56deb244b4e6aa652afd509275c6aacf1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.wongfleming.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20675</link>
<guid>d343454654125dd494e0d598510d5913</guid>
<pubDate>Mon, 03 Feb 2025 14:47:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.wongfleming.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8862d4fe42644d431c6a06e5cb92d888a6c946a346d2cb1f86443375c8bd88a2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.wongfleming.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>smithmidland.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20666</link>
<guid>6ac37313e074d4fa4c73335747f35fa1</guid>
<pubDate>Mon, 03 Feb 2025 13:01:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>smithmidland.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b0bc4a63aebfb711398b527d98651a1ebecb5a7ce2a9477f454ffa199a193a6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>GOVirtual-it.com--VIRTUAL-IT-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20655</link>
<guid>12eeb1fadde6b062c33ac4282fdaef75</guid>
<pubDate>Mon, 03 Feb 2025 12:57:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>GOVirtual-it.com--VIRTUAL-IT-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9b6f11eaa7560547a6c4e03f0764025a66eda0be4fb07ca2be1f7af02913fe52</i><br /><br />Threat actor <b>description</b>: <i>Virtual-IT is a technology partner that offers business IT services and support to help clients focus on their core activities. With a commitment to service excellence, they ensure that 98% of client calls are answered by highly skilled IT en            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pasco-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20658</link>
<guid>6ad352975d2f1649b553212e0b61731f</guid>
<pubDate>Mon, 03 Feb 2025 11:57:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Pasco-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a86f14d053ed2066a3ac37cea868ce04da21e36a273bbda4b02705366b8f99d</i><br /><br />Threat actor <b>description</b>: <i>PASCO designs and manufactures rugged automatic palletizers for all types of industry. Founded in 1976, family owned and operated, centrally located in St. Louis, Missouri, we have a long list of repeat customers who have found through the ye            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>MPP-Group-of-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20659</link>
<guid>bb6d7d30819268d8c124728d77d544cd</guid>
<pubDate>Mon, 03 Feb 2025 11:57:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>MPP-Group-of-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d969e683da58240f18808a1ae23fbc07013e194b97604ea3ba7c04a2cf23c993</i><br /><br />Threat actor <b>description</b>: <i>Metals Protection Plating, known today as the MPP Group of Companies, was founded in 1937, and has grown from its original location at 2800 Truman Road in Kansas City, Missouri, to a family owned business operating in four states, with real e            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>DRI-Title--Escrow</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20661</link>
<guid>d5e9d9e23447e1907c70ac5d9b29edcc</guid>
<pubDate>Mon, 03 Feb 2025 11:57:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>DRI-Title--Escrow</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7f34b8f56df5036e0f1d7c5fe9b8a7b31401e55c2747b8a070dac44be148ac4</i><br /><br />Threat actor <b>description</b>: <i>DRI Title & Escrow was founded in 2001 and is headquartered in Omaha, Nebraska. DRI Title & Escrow is a technology driven real estate information and transactional management company that provides title insurance and settlement services in si            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>DPA-Auctions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20662</link>
<guid>c4c0466a651f3c8b6911a1ac164f1879</guid>
<pubDate>Mon, 03 Feb 2025 11:57:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>DPA-Auctions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9194497c07aae4525dcf48ef19ff11aff51e59b8ab91e609618b513b5946a298</i><br /><br />Threat actor <b>description</b>: <i>DPA Auctions, headquartered in Fremont, Nebraska, and established in 1972, is a heavy machinery online auction company offering products for the agricultural, construction, and transportation industries</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Civil-Design-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20664</link>
<guid>6b48bbb8f3f6c2573c761fb6de79102b</guid>
<pubDate>Mon, 03 Feb 2025 11:57:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Civil-Design-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>558fc22398a38f0ca33ae074744a9fd669d15be215bd2fda1cd795f34b497de7</i><br /><br />Threat actor <b>description</b>: <i>Civil Design, Inc. is a multi-disciplined civil engineering firm established in 1996, with a focus on helping clients design quality infrastructure through successful, results-based projects. Our insight and experience, centered on Building S            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Gatesworth-Senior-Living-St.-Louis</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20665</link>
<guid>812e04d672a47f50b58835da9f6e1d46</guid>
<pubDate>Mon, 03 Feb 2025 11:57:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-Gatesworth-Senior-Living-St.-Louis</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>872e467b2eaf1629f84369e13488bccbd06c04074eee528081d3979d803a17a3</i><br /><br />Threat actor <b>description</b>: <i>Every inch of The Gatesworth has been designed to provide the most exceptional environment possible. From personalized service to breathtaking outdoor spaces and top-notch amenities, the standard of living at The Gatesworth is simply unmatche            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>usuhs.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20650</link>
<guid>5c64db62424a286a59daa6913b170a67</guid>
<pubDate>Sun, 02 Feb 2025 17:58:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>usuhs.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>54a3c0df5047180ba5b82ec9bd81d864de0584bf3ef043dc6f536e835c697159</i><br /><br />Threat actor <b>description</b>: <i>Uniformed Services University of the Health Sciences is a health science university and professional school of the U.S. federal government. The primary mission of the school is to prepare graduates for service to the U.S.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>jpcgroupinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20648</link>
<guid>1b976c57ad20e7dd4c0893de342d0cff</guid>
<pubDate>Sun, 02 Feb 2025 12:56:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>jpcgroupinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>347b338f9d4d753b9aa026847029c44d72f4711d1c9076e485222fe841116437</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>turbomp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20646</link>
<guid>37e82b59af48f2014f73b0a869ebac36</guid>
<pubDate>Sun, 02 Feb 2025 08:19:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>turbomp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3484d9dbb482c11a9fa731f1b69e8ba23ee79af5dbb0e1696baded265a78856f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>turbomp.com</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cyrious-Software</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20645</link>
<guid>813eb639491e5e5be984f34cc200a848</guid>
<pubDate>Sun, 02 Feb 2025 07:57:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Cyrious-Software</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cdd12a1f0b267e11ff704cd9a528cacb501b26995aa2f937efff45b986d907c7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>cyrious.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Medical-Associates-of-Brevard</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20644</link>
<guid>b98b76db555804ba9abb7316c858aabe</guid>
<pubDate>Sun, 02 Feb 2025 07:55:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Medical-Associates-of-Brevard</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ef691fd71a945d03321adcb85e1ecd409523541a6b3fa85c78fdc66b1dcec2b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>mabmd.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Civic-Committee</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20643</link>
<guid>dd1f2ad3a1bf536bc3d7ea8628152941</guid>
<pubDate>Sun, 02 Feb 2025 07:54:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Civic-Committee</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>285c0419d9a8dcdc6fe67499eb53c76329b928a84b9522948b747f3c9cfbc269</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>civiccommittee.org</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ayres-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20642</link>
<guid>3e6e161954c6b908db7770bf73f94be7</guid>
<pubDate>Sun, 02 Feb 2025 07:52:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Ayres-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3bb0eb18888f35f786e0e91dab34cf27b4f40fe9bbba508e125c75459f7b7180</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>ayres-law-firm.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zamzows</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20634</link>
<guid>35de15a1ff2a0ba6a06901961f293033</guid>
<pubDate>Sat, 01 Feb 2025 21:57:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Zamzows</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f4c274e7ac0202cd1a7b846cfbe7d54fe92e07c644114cac62503a4e595b1c32</i><br /><br />Threat actor <b>description</b>: <i>How is Zamzows.com secured? What attack vectors might be relevant? We explore th...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>DATACONSULTANTS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20638</link>
<guid>b6bcdc5176f139f9c4c0036b123ee12d</guid>
<pubDate>Sat, 01 Feb 2025 19:07:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DATACONSULTANTS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5550dbd82df7dff80a44360001aad5a6298877bf72669e1b955e3c488a0cf951</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>DATACONSULTANTS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CHAMPIONHOMES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20637</link>
<guid>e2dd17d60a8e6f1149cf7951ab931832</guid>
<pubDate>Sat, 01 Feb 2025 19:05:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CHAMPIONHOMES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4496d2dce7a2b14f328d57899cafa4404f664f56e425396eaea3d56ec6a4f272</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>CHAMPIONHOMES.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CIERANT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20636</link>
<guid>2955104571741a361ca41d687dd3649c</guid>
<pubDate>Sat, 01 Feb 2025 19:04:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CIERANT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a86d0670da62424d1dd3e55f6ac07103387dd7ee1f2bccddf33b726211b3c20</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>CIERANT.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DATATRAC.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20635</link>
<guid>7752af3ead702112b1485be7e6a4c214</guid>
<pubDate>Sat, 01 Feb 2025 19:02:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DATATRAC.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2d5101f47f2e575f1cdfc2049d22612bd5f84f8c0af5eb221911bfef11984395</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>DATATRAC.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>My-New-Jersey-Dentist</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20632</link>
<guid>c1b990e1e8ae798b46c46e4cde715bef</guid>
<pubDate>Sat, 01 Feb 2025 14:42:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>My-New-Jersey-Dentist</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>39f8fec08e396f79c3f512f059b8fdd4eb28beee01eeef13fd2bf2c36a85794b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>CAMRIDGEPORT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20627</link>
<guid>c0bc33be2e78a146322ceb5e08440f06</guid>
<pubDate>Sat, 01 Feb 2025 06:49:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>CAMRIDGEPORT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de24aa1a44f0d92ad9b68898a89731c771fd2a9bdeb48544e16ff3b09919c5e0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wireless-Solutions-Morris.Domain</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20621</link>
<guid>283dd35f0e875058ecfc895c9b2097dd</guid>
<pubDate>Sat, 01 Feb 2025 01:57:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Wireless-Solutions-Morris.Domain</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>334efa52ccbb733a6de7d3ca4069cd80780d194f8fae4fca873773b1c3b01a91</i><br /><br />Threat actor <b>description</b>: <i>Wireless Solutions is a wholesale, stocking distributor of Motorola Solutions tw...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>BH-Aircraft-Company-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20605</link>
<guid>1b4f877baadb44b36ff73a44e05ebd4c</guid>
<pubDate>Fri, 31 Jan 2025 18:51:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>BH-Aircraft-Company-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>85f9465743e3665f048357e8cf6ef1978bb261b0558248ffebee6babd594ef7a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Farrar-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20563</link>
<guid>264a8d02fe9429236ad8796df3f16ec6</guid>
<pubDate>Fri, 31 Jan 2025 18:41:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Farrar-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a539a76152cb7bef913224838d13f99197666e9b7813abfcd6849f7e56733b9b</i><br /><br />Threat actor <b>description</b>: <i>www.farrarusa.com

301 Levee Drive Manhattan, KS 66502

69.83 GB
Description

Farrar Corporation is a leading supplier of ductile iron castings and quality machined components. With over 90 years of quality American manufacturing behind us, we deliver innovative ISO-certified results in pattern design, heat treating, CNC machining and assembly services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>USGlobeCorp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20564</link>
<guid>aa40df143035c234478be31c91463953</guid>
<pubDate>Fri, 31 Jan 2025 18:40:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>USGlobeCorp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04e26ace8c031edc52f903b5a449fff636ac9c4b329c1f6226c2b1273fba7ccd</i><br /><br />Threat actor <b>description</b>: <i>www.usglobecorp.com

2115 Jericho Turnpike Garden City Park, NY 11040

7.3 GB
Description

Offering over 5,000 toner cartridges and imaging supplies from over 30 top manufacturers, repair service for computers, laptops, printers, copiers, fax machines, scanners, shredders and typewriters.

</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kats-Jamison--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20565</link>
<guid>0832f3473e5c452694a193e668e38ad1</guid>
<pubDate>Fri, 31 Jan 2025 18:38:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Kats-Jamison--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3b44334d3e9e5d037a3521b81ffe22242574683ad787971b2c49052ad5350326</i><br /><br />Threat actor <b>description</b>: <i>www.mkats.com

1 Bustleton Pike, Feasterville Trevose

4.9 GB
Description

Kats Jamison and Associates is a law firm serving Southeastern PA, NJ, and more, specializing in personal injury cases such as car accidents, motorcycle accidents, slip and falls, medical malpractice, and criminal defense. The firm prides itself on its track record of multi-million dollar settlements and verdicts, representing clients with humanity, humility, and honor, regardless of case size.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Engineering-Design-Initiative</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20567</link>
<guid>03d015a5f7a729b37c5f35c89516c4b2</guid>
<pubDate>Fri, 31 Jan 2025 18:37:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Engineering-Design-Initiative</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e375498100fc4c4e722e3101c709e2ca0d09bbf6dfdd3cdaf7aa8ade19d0268</i><br /><br />Threat actor <b>description</b>: <i>www.edi-dolejs.com

1112 N 5th St, Minneapolis, Minnesota, 55411

2.97 GB
Description

Engineering Design Initiative (edi), is a consulting firm focused on sustainable design, energy and the environment. EDI offers full service design, assessment and planning services supporting the mechanical, electrical and low-voltage engineering disciplines. EDI believes that by providing superior customer service coupled with creative, sound engineering, and skilled project management we are making a positive impact on the consulting engineering industry and to our clients through the work we produce. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Angotti--Reilly</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20568</link>
<guid>338c070809f38739e58e2a12a2684633</guid>
<pubDate>Fri, 31 Jan 2025 18:36:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Angotti--Reilly</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>475e291267b49cbe4776506d7f637be3bcd84cd71ee84b95c2bc6346cf5ab121</i><br /><br />Threat actor <b>description</b>: <i>www.angotti-reilly.com

2200 Jerrold Ave Ste E, San Francisco

3.66 GB
Description

Angotti & Reilly, Inc brings a service-first approach, competitive pricing, and over 35 years of successful experience in building and engineering to every project we undertake. We offer a variety of construction, construction management and development services on projects up to $25 million in budget. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Land-and-Lakes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20569</link>
<guid>72a7dd9f91089b8fabd3edc4c9db7ed1</guid>
<pubDate>Fri, 31 Jan 2025 18:34:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Land-and-Lakes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9abfbe60263a3b4657ac5bb063a2a4cfab2c0e9a8973b1c00763544255a5ebcf</i><br /><br />Threat actor <b>description</b>: <i>www.land-and-lakes.com

123 N Northwest Hwy Fl 2, Park Ridge

366.95 MB
Description

Land and Lakes Company has been providing excavation services since our inception in 1966. During the past 41 years, we have moved hundreds of millions of cubic yards of earth while completing both construction projects and environmental projects. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trimaco-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20573</link>
<guid>43aedd03a8f3006ff06dcb6ddd5df17d</guid>
<pubDate>Fri, 31 Jan 2025 18:18:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Trimaco-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0dac08fe33eed7f327ce5f698f6e6a5c5c4ebedb8b2f3bf43b7de3948332f394</i><br /><br />Threat actor <b>description</b>: <i>Trimaco (founded in 1906) is a manufacturer and worldwide distributor of surface protection and cleaning supplies to the construction, home improvement, and marine industries. Trimaco corporate office is located in 2300 Gateway Centre Blvd Ste 200, Morrisville, North Carolina, 27560, United States and has 224 employees. The total amount of data leakage is 228.10 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>vanguardpaints.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20617</link>
<guid>da584e093bf34c7006902e2d64c1c4a6</guid>
<pubDate>Fri, 31 Jan 2025 16:48:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>vanguardpaints.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>725314f99a828d144aca6292a6bee5e49d58a9fa7d523c4c42a863fe1c525e79</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>vanguardpaints.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>adhydraclean.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20615</link>
<guid>e41bbd4af5da30044b88dc9ab711c5b2</guid>
<pubDate>Fri, 31 Jan 2025 16:48:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>adhydraclean.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>abc71a9be2ec1fe040cdc33aca3c8ced605477ac0994f281763bbfa18d415cb3</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>adhydraclean.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>rightofwayequipment.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20614</link>
<guid>b16238d06c7888ecb3c3d24d368b1ab8</guid>
<pubDate>Fri, 31 Jan 2025 16:47:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>rightofwayequipment.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e62b7749f57198d81b4cd0e8ce4e389290108301932911b4b3e06a2bc876e310</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>rightofwayequipment.net</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>ibp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20575</link>
<guid>596a5705f4d9c0867ea0aba3be5db567</guid>
<pubDate>Fri, 31 Jan 2025 15:19:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>ibp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ffa75ecb249dafaef9f48d138254d689c88471aa26dfa3911952cb30614072c0</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>ibp.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>andrewlauren.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20603</link>
<guid>60ee22c27013613e980104db94ae53c9</guid>
<pubDate>Fri, 31 Jan 2025 15:19:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>andrewlauren.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aaa95421318a030ad90c4abd2b27207ce2ed11babdcaccede01600a6913bd197</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>andrewlauren.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>centerracoop.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20602</link>
<guid>286b0b3ea509af1aeff6bb47299d96d7</guid>
<pubDate>Fri, 31 Jan 2025 15:18:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>centerracoop.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3bd6fe6ea7023faccaa196e3c38374143c8132ad87bfb62ad021b139c5e4e4be</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>centerracoop.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>teligentems.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20601</link>
<guid>065f16a07047ae1c3b0c4ab8da87fe8e</guid>
<pubDate>Fri, 31 Jan 2025 15:18:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>teligentems.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee21092add6d479000c3387492649275dae63b9da228436703770b19213b250d</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>teligentems.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>rqsi.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20600</link>
<guid>9f369b3d166fd7623b321cfe91ca4c9f</guid>
<pubDate>Fri, 31 Jan 2025 15:17:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>rqsi.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>688000d62c939878e06972d41de56ac22029794be6084ab16a31df01c0003142</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>rqsi.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>omniflow.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20599</link>
<guid>1b81139cc390ee1ce67042addf1d32cd</guid>
<pubDate>Fri, 31 Jan 2025 15:17:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>omniflow.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5787345c0fdc3733ccb3bc1b998b25f6f289ae8b9bf507bea2a652a302bd4cb2</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>omniflow.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>allbrightcotton.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20592</link>
<guid>0ac04853f8058f61af1ca7630e786d22</guid>
<pubDate>Fri, 31 Jan 2025 15:14:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>allbrightcotton.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a6041c47a8575e621157bb781af6bde848f6d1faef04f81dc4ff4a2bd1cf2ed</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>allbrightcotton.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>clarkpower.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20591</link>
<guid>2de8d3829c34f96ae608052ecd132895</guid>
<pubDate>Fri, 31 Jan 2025 15:14:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>clarkpower.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8631f6400c82723e6ccad9bd4aa0a9e7d3b382b9f66780e7b94d1a15176937c1</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>clarkpower.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>ad.snadc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20590</link>
<guid>224267fe94355723e31177a2ca4851b2</guid>
<pubDate>Fri, 31 Jan 2025 15:14:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>ad.snadc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a4d0e230ccc54283a9f95df0fabd0b7e89f667e6e79828fd8632c7e260c9869</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>ad.snadc.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>sgbllp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20589</link>
<guid>d06ea3741c03e92e0e5f2f4ba8c288b0</guid>
<pubDate>Fri, 31 Jan 2025 15:13:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>sgbllp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>288c5e5512dc82406d5f35edb65f979739bf16311091faadc87f31efd42bd30e</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>sgbllp.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>isisecurity.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20588</link>
<guid>75124f25b1db7620476f6d70697fec61</guid>
<pubDate>Fri, 31 Jan 2025 15:13:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>isisecurity.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>71da0b6491ee1370e4eb0ed56a6ff691923068fb423eae9eca0084917bf748c7</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>isisecurity.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>scrantonrealtors.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20587</link>
<guid>402d34fc07781a8932b7fac0c3bf3cc2</guid>
<pubDate>Fri, 31 Jan 2025 15:12:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>scrantonrealtors.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>699d49217f877f37329a596818d7bd76314b1b7f19fabe8298f6b10c877150e2</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>scrantonrealtors.org</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>madisonforms.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20586</link>
<guid>ca708d0d44450d9cb93c897bf6515cd3</guid>
<pubDate>Fri, 31 Jan 2025 15:12:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>madisonforms.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ebe94b4b460b73997b4675fac1b51bbc0e4bb170ac79f7c70179d82131c3b14</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>madisonforms.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>simcointeriors.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20585</link>
<guid>db03d49be7f821909335a60ea7fb7c59</guid>
<pubDate>Fri, 31 Jan 2025 15:12:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>simcointeriors.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed806c34d39777e78f54f0150a16f1b125b4c51fda55977ad8bffc4e0f6c54e8</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>simcointeriors.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>atr.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20584</link>
<guid>4739d8dbd05dddb73604f6240b83ea68</guid>
<pubDate>Fri, 31 Jan 2025 15:11:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>atr.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2e71ef2863b577afb6d1e85753102d325568a2cb4cc14dc26c7a8fba784bc76</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>atr.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>calfaucets.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20583</link>
<guid>ef368049651bc5781718a8d879d9cd24</guid>
<pubDate>Fri, 31 Jan 2025 15:11:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>calfaucets.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f13b744d3ea327951702d00fda1d4450982ffa55d28f59ae2bd7337bd65705d</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>calfaucets.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>dkgrar.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20582</link>
<guid>d97dfe4d6bab44f304da189cdcb5bc74</guid>
<pubDate>Fri, 31 Jan 2025 15:10:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>dkgrar.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b026f3dd74d4965d9a88df7ac8e6a24d34d09569d988ab62dc9f7ea509c5fbc</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>dkgrar.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>yhti.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20581</link>
<guid>93dbe3b58a1bafbb7d581d8244dcaef2</guid>
<pubDate>Fri, 31 Jan 2025 15:10:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>yhti.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5ed67b8280521b28d5d913f6fa658ae8a71a71b0c1642737deec2d9b099a65b5</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>yhti.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>njcar.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20580</link>
<guid>f05a5279ad8f888dda342a7c6e458658</guid>
<pubDate>Fri, 31 Jan 2025 15:08:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>njcar.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36b5f370c488c0dc515084ff365d1eee89b029578b50df054e639a9a017e2b1f</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>njcar.org</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>worldfabricinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20576</link>
<guid>8f5c8acfebc4073ffd8f56522d137223</guid>
<pubDate>Fri, 31 Jan 2025 15:07:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>worldfabricinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>70095596b1293f4719cc468f4d646d1a266663efa28e7bfec537f20065319453</i><br /><br />Threat actor <b>description</b>: <i>Taking stock of 2024 Part 1</i><br />Target victim <b>website</b>: <i>worldfabricinc.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>HEXPOL-COMPOUNDING-AMERICAS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20561</link>
<guid>65d1b8a382fe0421b1c1d5b932baf87a</guid>
<pubDate>Fri, 31 Jan 2025 12:54:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>HEXPOL-COMPOUNDING-AMERICAS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79d0c950e0eef4781e6c504e7ae788f2ae4965515f394c46f12b1ac81422f037</i><br /><br />Threat actor <b>description</b>: <i>Complete irresponsibility and very poor IT level of HEXPOL COMPOUNDING AMERICAS (HCA) leads to that publication.
Data from all departments (Finance, HR, Accounting, Engineering, Logistics, Production, Purchasing, Quality, Safety, Recipe Cont            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southeast-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20559</link>
<guid>8e4cb3c0ff79723d70198239ad918d31</guid>
<pubDate>Fri, 31 Jan 2025 09:57:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Southeast-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ae9ae1fdcd9174e60460f353caffe7296285a430136a2a90805809643feffe4</i><br /><br />Threat actor <b>description</b>: <i>Southeast Supply Company provides the easiest, most cost-effective way to supply your students, employees, or fitness center members with convenient, controlled security locker storage, with (or without) "master key control" for immediate supervisory access. Our primary focus is to educational institutions; however, we are also available to service the combination lock security needs for fitness/athletic facilities or corporate/plant employee facilities. All of our locks are high-quality MasterLock combination Locker Locks, and carry MasterLock's five-year warranty. https://www.southeastsupplytn.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>johnpaulrichard.com60MUSA985GBlt1-DISCLOSED</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20549</link>
<guid>03271d336bfb3035b0d8bd034c6b2f76</guid>
<pubDate>Fri, 31 Jan 2025 03:12:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>johnpaulrichard.com60MUSA985GBlt1-DISCLOSED</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e5a95d2adcc0de6147dcc8ecdc65198f601184768e775e7e7fe50dfc6f3835db</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>vsstransportationgroup.com54.5MUSA522GBlt1-DISCLOSED</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20547</link>
<guid>592b1f6887c30e03ab96c13144e15dfb</guid>
<pubDate>Fri, 31 Jan 2025 01:38:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>vsstransportationgroup.com54.5MUSA522GBlt1-DISCLOSED</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db401abc31ef423545eb18c2bf8221941d2a0310b4cf153cbde21676137a3997</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>ttucorp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20554</link>
<guid>eb0f8365fc175ccab38fa0486702641b</guid>
<pubDate>Thu, 30 Jan 2025 23:23:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>ttucorp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>560b2bfd74c9397943579ce3bf676c6499be14425a755c090a3e04f8c64a57d1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>ttucorp.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>jayaapparelgroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20553</link>
<guid>e7cf3b4d9bec0c3e9cd89a0ae87c2813</guid>
<pubDate>Thu, 30 Jan 2025 23:20:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>jayaapparelgroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b960718bcdb3638c5952749b0471bf27aec5339f00dc778d4de823463b3a084</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>jayaapparelgroup.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Night-Hawk</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20545</link>
<guid>a703259707005bdac0bc2667a2eb62b3</guid>
<pubDate>Thu, 30 Jan 2025 18:53:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Night-Hawk</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c591ad3b4cea0545ea7002694936198caaeec5051f21b64ba3bd480fec45ad78</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Perfect-Plastic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20541</link>
<guid>1ff5f552ed389b3ab6e18308dd49a3c3</guid>
<pubDate>Thu, 30 Jan 2025 17:56:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Perfect-Plastic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>88d13b4cc1f1c23c2f492f46e5b95a4b7e3d5816e0e70f535effd5dcd8228326</i><br /><br />Threat actor <b>description</b>: <i>A world leader in payment card production. Innovative solutions in contactless, EMV, chip cards, and personalization. We are ready to upload a lot of private corporate documents such as: confidential agreements and contracts, driver licenses, financial data (audits, payment details, reports), contact numbers ande-mail addresses of employees and customers, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ottawa-Family-Physicians</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20530</link>
<guid>2a960e2c4cf05b146eadfb3fc72b6665</guid>
<pubDate>Thu, 30 Jan 2025 14:55:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Ottawa-Family-Physicians</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>640e00928be27d7bc3dc13ff49c4d03122490f25a5584a3b750a3524a4d8407b</i><br /><br />Threat actor <b>description</b>: <i>We are Ottawa Family Physicians and our specialty is family medicine. We have been caring for patients in Ottawa and the surrounding area since 1970. We care for patients of all ages and take great pride in providing friendly, high quality he            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>alkodistributors.com33.5MUSA345GBlt1-DISCLOSED</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20536</link>
<guid>bc8dc32af9d23d28836e5de55882f1e6</guid>
<pubDate>Thu, 30 Jan 2025 14:45:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>alkodistributors.com33.5MUSA345GBlt1-DISCLOSED</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>21a1e43a71a84e33d6d009a0f8e7b9e7d67987b447b0900e693013441853a5e6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Engine-Power-Source</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20532</link>
<guid>960ade68ab05b7e113c6c410ba34c4ee</guid>
<pubDate>Thu, 30 Jan 2025 13:55:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Engine-Power-Source</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8788f5ec9b9343700df040253517dba39164e8de5d8ca40df0b1005be5d52b11</i><br /><br />Threat actor <b>description</b>: <i>We have over 1TB of critical data, including personal employee and partner infor...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>FENSTERMAKER</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20534</link>
<guid>95459d948426c5018171cca8f8dbc5fa</guid>
<pubDate>Thu, 30 Jan 2025 12:56:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>FENSTERMAKER</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bad6944e025e0dbc079bae5fa596afe54124b32332d7b490c165b3a2f57c123d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jalaram-Produce</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20526</link>
<guid>08a83ab0d6cfa10c7dc6844badeeb9de</guid>
<pubDate>Thu, 30 Jan 2025 12:56:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Jalaram-Produce</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>855bb14a29d566e154668598f0836d0402e8742b63870e17cb1e8941dd88e238</i><br /><br />Threat actor <b>description</b>: <i>Jalaram Produce offers a high-quality line of the freshest produce delivered dai...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>KPI-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20527</link>
<guid>ffcd17d719cf7097719840119c2a696c</guid>
<pubDate>Thu, 30 Jan 2025 12:56:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>KPI-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24965721685f56c2af8ebcf6cc403f2a58a65d0395da461378cd0fe794b1183d</i><br /><br />Threat actor <b>description</b>: <i>KPI Engineering, Inc. is a small business specializing in Mechanical, Electrical...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tri-Sen-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20529</link>
<guid>31910e7811999746bcaec5c692b7f04d</guid>
<pubDate>Thu, 30 Jan 2025 12:56:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Tri-Sen-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a6ae82091e4c52229db9a20b9b83a88ce99de35c2472024b1d0fcd46e7adbe1</i><br /><br />Threat actor <b>description</b>: <i>Tri-Sen Systems Corporation, based in Houston, Texas, provides turbomachinery co...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Silverado-Contractors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20538</link>
<guid>5d73abc5d9c6b94b30add828e954b6a9</guid>
<pubDate>Thu, 30 Jan 2025 12:22:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Silverado-Contractors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d93cc761d5047bccd5f2fa93e23c1b8052ff4c76c8a856aa5889b2af7b1b8a9d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.silveradocontractors.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>SCV-Med-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20521</link>
<guid>010b229957fa385ab3198cbaad6e4e59</guid>
<pubDate>Wed, 29 Jan 2025 20:52:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>SCV-Med-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>75d1202a0dc7e8bd0e2292cc18a4f25f41a9933eb8821fe9a5ea6eb3606a339e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>Premierautocredit.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20519</link>
<guid>16ef40d34ab73c871b120a870f4d730e</guid>
<pubDate>Wed, 29 Jan 2025 20:23:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Premierautocredit.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8f8fbf1d5d0d0ee59a1b039e4750b7bf2867113481dcde2b334a873b030fe9f</i><br /><br />Threat actor <b>description</b>: <i>Country: USA
Views: 53

View more /pac
Public
156GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cahoon-Farms</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20508</link>
<guid>96da2b03702bc83befbc41bb870e81ca</guid>
<pubDate>Wed, 29 Jan 2025 16:52:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Cahoon-Farms</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1db0013802a27324be77384a1ec63a60c9ba07603d1d6b8d08150e71b9b69f6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Marshall--Bruce-Printing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20520</link>
<guid>968d10f389cfdeb6a5dc5610ef2081a9</guid>
<pubDate>Wed, 29 Jan 2025 15:53:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Marshall--Bruce-Printing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c158105d7105ea4592373bec189a827f9bd9f371c267a6a21dc4a1faa71bf81d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>marbruco.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Johnston</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20518</link>
<guid>bbacbbc9deb01ff97bfa8f71da0171e0</guid>
<pubDate>Wed, 29 Jan 2025 15:50:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Johnston</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d47214f9a977fdae3caf7191a1ce676606716721eb6fe11fe9ab877fda03f57c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>johnstonllc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Wendt-Agency</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20498</link>
<guid>2e30b27a08f1f6f59d68db75228c40e0</guid>
<pubDate>Wed, 29 Jan 2025 14:57:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>The-Wendt-Agency</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f64e8c92d06929ea44c742119b40646afa7712353070a0321616637e89f2551</i><br /><br />Threat actor <b>description</b>: <i>The Wendt Agency is a full-service advertising agency located in downtown Great ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rossi-Real-Estate-ROSSIDG.LOCAL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20499</link>
<guid>9fb0b4d60bfef7bf4382bf8fa7ea945e</guid>
<pubDate>Wed, 29 Jan 2025 14:57:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Rossi-Real-Estate-ROSSIDG.LOCAL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56cb660feedc4a3c5d533bdf5681b0d1a05bc3438a5e619b4cb8200fb61ab239</i><br /><br />Threat actor <b>description</b>: <i>Rossi Real Estate Corp. is a trusted family-owned and operated real estate broke...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Delta-Screen--Filtration-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20500</link>
<guid>f326680a2755d99e5ea5185c1fcb1b19</guid>
<pubDate>Wed, 29 Jan 2025 14:57:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Delta-Screen--Filtration-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e180c88630dd1a49c39d522c488c81f7c7ffeb727b7a3e4d4451ab9aa4fee926</i><br /><br />Threat actor <b>description</b>: <i>Delta Screens manufactures a variety of flat screens with exceptional rigidity a...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>By-design</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20503</link>
<guid>0e639653c10d1353dfbc8e4a14df280e</guid>
<pubDate>Wed, 29 Jan 2025 14:44:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>By-design</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26cf9c3b6c1dcf5db9c18ea1ac972daf8b532b12a7ebec528dceb97c2d34abe5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Plymouth-Foam</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20517</link>
<guid>3b20413fc76c5f432ede85b03e8af0a1</guid>
<pubDate>Wed, 29 Jan 2025 14:38:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Plymouth-Foam</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1598125d0041f7fc0a66d4f6791914dcd19d64a2bc43d69545dba9ba1a478de</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.plymouthfoam.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>tnlottery.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20514</link>
<guid>777b02102eecc65c3778e53776b416d6</guid>
<pubDate>Wed, 29 Jan 2025 14:26:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>tnlottery.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>67445efa7c511822e80fca510db32242e46126245c5cdec08d0d8c64e04615d6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>tnlottery.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Strategic-Materials</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20501</link>
<guid>deb65aba94010f86959e5f2fcd90da51</guid>
<pubDate>Wed, 29 Jan 2025 13:54:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Strategic-Materials</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee6c32d0061965b9106d9def6de169b9cdd4dbfa4b83817604f72a24d0e34f4e</i><br /><br />Threat actor <b>description</b>: <i>Strategic Materials, Inc. is a recycling company. It processes recycled glass an...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Commercial--Residential-Management-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20513</link>
<guid>ca2fb9274851370321bfa0017a5cc0d8</guid>
<pubDate>Wed, 29 Jan 2025 13:47:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Commercial--Residential-Management-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dee58dfa6d1caae85c5f862b6a837dc76a23702ec83f77f2552d2290ce194add</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.crmgco.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>daVinci</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20512</link>
<guid>8292195f4bd46e2ba9790f674a4c906f</guid>
<pubDate>Wed, 29 Jan 2025 13:45:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>daVinci</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>01ca7e96f893895be615d4d31aa70dc426db7a1df3aae4e8b28dfb704f6a21b0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.davinciretail.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>TRIVAD</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20511</link>
<guid>7f7fc17485016b50781712c529de1df4</guid>
<pubDate>Wed, 29 Jan 2025 13:43:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>TRIVAD</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eec3391274aa3ed28e9c09ffc7707bb53a13b9761afd784b82d77d0951eeec49</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.trivad.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wallin--Klarich</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20510</link>
<guid>b1ae293d97f4b7f67633115722c1009c</guid>
<pubDate>Wed, 29 Jan 2025 13:41:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Wallin--Klarich</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a984fd51ecfa35aaf1b07682cfe7d35c1f08af329fc8ec5e1242b9b2d4ddbf90</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.wklaw.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cimarron-Telephone-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20509</link>
<guid>d4c5ee388670c4a29987462458c5310f</guid>
<pubDate>Wed, 29 Jan 2025 13:38:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Cimarron-Telephone-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d9a40580f29a9e90a961e751d2ca2e32881823a5dd81ddf1c88a402234092ab</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.cimtel.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>biagibros.com273MUSA820GBlt1-DISCLOSED</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20502</link>
<guid>47ea4fca48eeb134e38df837a620c2c9</guid>
<pubDate>Wed, 29 Jan 2025 13:00:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>biagibros.com273MUSA820GBlt1-DISCLOSED</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e08366190115d3f9c86e402c74d83c4e299b7c4a6569f77979790cc28b5ecff</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Turning-Leaf-TURNINGLEAF.local</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20507</link>
<guid>d3dc22ad3ee79f300ae1c20bc9554d87</guid>
<pubDate>Wed, 29 Jan 2025 12:41:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Turning-Leaf-TURNINGLEAF.local</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b526055aa3b55a0bc21bc412b6ed4257edb36a6a134726cb336335aa57bb4ec</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Heart-to-Heart-Hospice</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20506</link>
<guid>9826ee8eb827f4adacdb88e615550686</guid>
<pubDate>Wed, 29 Jan 2025 12:40:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Heart-to-Heart-Hospice</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>94b6492da7af5d6959947a91153f5e8fdb66d13d2f4728413ecc91e03edeae5f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-Of-Beloit</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20505</link>
<guid>f0f68749983c98403d5954cd5e0b7b30</guid>
<pubDate>Wed, 29 Jan 2025 12:03:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>City-Of-Beloit</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d9a6afd084a2e8114e89333daa54acf05ce7be230014aa165c155bf5cc74af1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Boutin-Jones-boutindentino.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20504</link>
<guid>714aeac233808ffb2b01e3910edff2bc</guid>
<pubDate>Wed, 29 Jan 2025 11:59:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Boutin-Jones-boutindentino.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>09c9d2d942bb73985963659c6f2e61e13e77bafb5cd38d159e204accb5946280</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>boutindentino.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>boginmunns.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20485</link>
<guid>38be5418a8e2601443030c8cba989324</guid>
<pubDate>Wed, 29 Jan 2025 09:57:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>boginmunns.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>459c739c7562da2f19be4202d0ea59db3d14da2aa3f30499e022c69d50969d9e</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 02.02.2025.
At Bogin, Munns & Munns, we are committed to helping Central Floridians recover from loss and protect their best interests. We are always working to help our clients unde            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Menominee-Tribal-Clinic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20487</link>
<guid>642f0ffa02e1a52c66e09344421903ff</guid>
<pubDate>Wed, 29 Jan 2025 08:49:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Menominee-Tribal-Clinic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d94f30e3e05ffaa13b3b698d2efe8f28f50799bcd5fa993eff662a2ac891b10</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>delpackaging.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20482</link>
<guid>e67981d241ad5e29f4420a6f4ef2b7cb</guid>
<pubDate>Wed, 29 Jan 2025 00:11:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>delpackaging.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd4176f754a93deec3c89d7b24315a32611f07a991a86f3d761ec30bf415001b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>delpackaging.com</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Acoustiblok</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20481</link>
<guid>7f7959e1567f278cff8c64602c15f494</guid>
<pubDate>Tue, 28 Jan 2025 21:44:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Acoustiblok</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8cb01295e8d17ac7bec4392093b423e5a58457f7c6eab290aae77d65910d5a3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>broward.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20475</link>
<guid>9366fb6cdeff0a5d6c1093d1ffcfe458</guid>
<pubDate>Tue, 28 Jan 2025 18:53:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>broward.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4e472283de3e746cb73bfdcf3594f6382497585d83f14d75220b4b88fe26fda</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carthage-Police-Department</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20471</link>
<guid>272dd328718e70a3379ebfa0f21d88fa</guid>
<pubDate>Tue, 28 Jan 2025 16:47:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Carthage-Police-Department</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0311b4d1319b344544bc8894ba41ded5abb38127ea3f83248abc0a29f6fbb5a0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mercy-Supply-Collaborative</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20465</link>
<guid>46ec9a950cd9bfbff38ce77795038843</guid>
<pubDate>Tue, 28 Jan 2025 15:59:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Mercy-Supply-Collaborative</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>07a54a09ef30f5d94f43a4c96353e4b3f78ad1765b01daf8c4e1eeeeb16a9471</i><br /><br />Threat actor <b>description</b>: <i>Mercy is a diversified, privately held healthcare services organization, focused on positioning itself to meet the challenges of an increasingly complex healthcare environment.We are ready to upload a lot of private corporate documents such as: financial data (audits, payment details, reports), contact numbers and e-mail addresses of employees and customers, etc.</i><br />Target victim <b>website</b>: <i>mercyscb.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mapping-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20396</link>
<guid>571962a69fe39e95c60ad4ba6ce2fa05</guid>
<pubDate>Mon, 27 Jan 2025 18:09:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Mapping-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c70d05ed18d361a02d7cc285f995d190f1ea430bb44003cf69a2a03ba6728df</i><br /><br />Threat actor <b>description</b>: <i>www.mappingsolutions.com

Michigan, United States, 124 Merriweather Rd, Suite 200 Grosse Pointe Farms, MI 48236

99.09 GB
Description

We pride ourselves on being the GIS (geographic information systems) software solutions experts that our clients turn to again and again. From retailing, to health care, telecommunications, manufacturing, and public administration, our clients know that a friendly, knowledgeable Mapping Solutions staff member will always be available to help solve a business challenge.</i><br />Target victim <b>website</b>: <i>mappingsolutions.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpsleehartman.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20398</link>
<guid>9cf2af1403d6f96d729fe33c63c75585</guid>
<pubDate>Mon, 27 Jan 2025 16:52:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>metaencryptor</b> claims attack for <b>httpsleehartman.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eba4b003346f0af95b85534018f67052ee5e282db2e8393d3e7edf1c284ab1af</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>metaencryptor</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grand-Fire-Protection</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20394</link>
<guid>cd55fe95fc4bdee8b6699e7e3ba3ecde</guid>
<pubDate>Mon, 27 Jan 2025 15:57:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Grand-Fire-Protection</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7344486dbcb3c229e2d274764c4d081535a8d12b705ceba7d5fb7b582e076a9</i><br /><br />Threat actor <b>description</b>: <i>Grand Fire provides first-class fire protection and underground utility services in Nashville and Middle Tennessee.We are ready to upload a lot of private corporate documents such as: license agreements, financial data (audits, payment details, reports), contact numbers and e-mail addresses of employees and customers, SSNs, family member information, incident with compensation reports, etc.</i><br />Target victim <b>website</b>: <i>grandfire.org</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>lhps.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20395</link>
<guid>2dabf68638e6540704cb179d61594faf</guid>
<pubDate>Mon, 27 Jan 2025 14:45:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>lhps.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48bf4ebccc90a67e921c586912a72310c98b87d59a436df763a3d43876f17437</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1970, Lake Highland Preparatory School is the 8th largest coeducational independent day school in the nation, featuring two campuses totaling forty-two acres in the heart of Orlando. LHPS educates approximately 1,950 students in grades Pre-K though 12 in a rigorous college preparatory program. The school is accredited by Florida Council of Independent Schools, Southern Association of Colleges and Schools and Florida Kindergarten Council. </i><br />Target victim <b>website</b>: <i>lhps.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mark-Resolve-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20391</link>
<guid>94a5313663ab243911f0da89ed1096db</guid>
<pubDate>Mon, 27 Jan 2025 13:54:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Mark-Resolve-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a455d5a1ed5cd6b4f445f102128971e4459a3d3ed42b2d466122ea994e6b9a92</i><br /><br />Threat actor <b>description</b>: <i>This organization primarily operates in the Business Consulting, nec business / industry within the Engineering, Accounting, Research, and Management Services sector.We are ready to upload more than 13 GB of private corporate documents such as: driver licenses, internal financial documents, inside corporate correspondence, customer contact emails and phones, etc</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Prinston-Pharmaceutical-huahaius.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20392</link>
<guid>1092afef9301e82c9183b1efe946f869</guid>
<pubDate>Mon, 27 Jan 2025 13:05:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Prinston-Pharmaceutical-huahaius.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>58aea5f5c42418177f57280095d9341b4d018fbffb311b8056f4dd767677fb52</i><br /><br />Threat actor <b>description</b>: <i>Prinston Pharmaceutical Inc., is a fast growing, emerging global pharmaceutical company, located in Cranbury, New Jersey, USA. We are a fully-integrated pharmaceutical company engaged in product development, product registration, manufacturing, marketing and sales of high quality affordable generic prescription products to our customers. </i><br />Target victim <b>website</b>: <i>huahaius.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>International-AIDS-Vaccine-Initiative-iavi.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20326</link>
<guid>bdaccd7781386e6e39630d62b39afc40</guid>
<pubDate>Mon, 27 Jan 2025 03:13:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>International-AIDS-Vaccine-Initiative-iavi.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3feeb2399bc112f9dc1fed8dfef84d3e46403735246642fa7090ac159d8cd435</i><br /><br />Threat actor <b>description</b>: <i>The International AIDS Vaccine Initiative (IAVI) is a global not-for-profit, public-private partnership working to accelerate the development of vaccines to prevent HIV infection and AIDS. IAVI researches and develops vaccine candidates, conducts policy analyses, serves as an advocate for the HIV prevention field and engages communities in the trial process and AIDS vaccine education.</i><br />Target victim <b>website</b>: <i>iavi.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Weeks-Brucker-038-Coleman-Ltd--Legal-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20325</link>
<guid>604b22548fbebba00ec67d8b69c09e56</guid>
<pubDate>Mon, 27 Jan 2025 01:41:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Weeks-Brucker-038-Coleman-Ltd--Legal-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>14078717f97d9d1d6b57603a5bfe5aa2299bac050e598c70124d402c00c54790</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Metro-Wire-amp-Cable</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20320</link>
<guid>58a293c4c86b4c0000b0e683c77432a8</guid>
<pubDate>Sun, 26 Jan 2025 13:00:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>Metro-Wire-amp-Cable</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8bf50fef0bdcd14058a995a31294cb82f16f0b50a754ea6ea17c19c359bb26a2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>mcpathology.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20317</link>
<guid>53e1e04df729350fbab77ed1d2d16df3</guid>
<pubDate>Sat, 25 Jan 2025 20:33:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>mcpathology.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba7e2caee4216e5289220ce7e56ad7253117930dbaae2ce515299f0ce39dfa96</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] McPathology.com is essentially a Brisbane-based medical diagnostic service and laboratory that provides a wide range of pathology testing services. It is fully accredited by the Royal College of Pathologists of Australia. Professional pathologists, doctors, and health professionals rely on it to deliver accurate results with the aim of diagnosing, treating, and monitoring diseases and health conditions more effectively.</i><br />Target victim <b>website</b>: <i>mcpathology.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>paradiseschools.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20315</link>
<guid>c7af4a506117907c565f6ffe58bec4f1</guid>
<pubDate>Sat, 25 Jan 2025 20:28:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>paradiseschools.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f43f30d61407433806990c351f8d6cd09b2a9a7f96fc58dbabf3fbf0f75cbc8f</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Paradise Schools is a network of K-12 charter schools located in Surprise, Arizona. The organization, established in 1997, comprises three schools - Paradise Honors High School, Paradise Honors Middle School, and Paradise Education Center. It offers a comprehensive curriculum aligned with state and national standards. The student-centric institution strives to cultivate creativity, critical thinking, leadership, and character development in a safe and inclusive environment.</i><br />Target victim <b>website</b>: <i>paradiseschools.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>welcomewagon.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20314</link>
<guid>6b6769819569f3c8ef0785f500832831</guid>
<pubDate>Sat, 25 Jan 2025 20:27:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>welcomewagon.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c90104fa9b6732715e500e81865ad8e28081cec5d94984bd3aedffb35d231d24</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Welcome Wagon is a US-based company focused on creating connections between new homeowners, movers and local businesses. They specialize in welcoming new residents to their community, introducing them to products and services of local businesses through direct mail marketing, digital marketing services, and gift books. They aim to stimulate local economic growth by fostering these new relationships.</i><br />Target victim <b>website</b>: <i>welcomewagon.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>cellsciencesystems.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20313</link>
<guid>ca9f9c4764430f980dca8d70e29d8e5e</guid>
<pubDate>Sat, 25 Jan 2025 20:26:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>cellsciencesystems.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7511a17dbbc5e783c68aa80b607edbd99ceaf0c826cce374394122baadb2c2a4</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Cell Science Systems is a specialty clinical laboratory that develops and performs laboratory testing in immunology and cell biology to assist healthcare providers in the diagnosis, treatment, and monitoring of complex disorders. The company is notable for pioneering the Alcat Test for food and chemical sensitivities. The tests support the personalized treatment plans for conditions like digestion issues, migraines, obesity, chronic fatigue, aching joints, skin disorders, etc.</i><br />Target victim <b>website</b>: <i>cellsciencesystems.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>envirosep.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20311</link>
<guid>8c8ee26d59b77a94dc6747a41e7c3af0</guid>
<pubDate>Sat, 25 Jan 2025 10:47:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>envirosep.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e5ebd58a4b42b6e02e38634ba40995a4738dcecae3921f22abd4129794a5155</i><br /><br />Threat actor <b>description</b>: <i>EnviroSep designs and manufactures integrated solutions with automation and controls for fluid handling, heat transfer and energy recovery.</i><br />Target victim <b>website</b>: <i>envirosep.com</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>aws.amazon.com--10-btc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20309</link>
<guid>b05f00551528bda221276d01a40b7ef2</guid>
<pubDate>Sat, 25 Jan 2025 01:13:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>GDLockerSec</b> claims attack for <b>aws.amazon.com--10-btc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e2e1aefb21e0df5dca17f4a687527365ce6916e9522c2733661da3a3dfa0a23</i><br /><br />Threat actor <b>description</b>: <i>9GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>GDLockerSec</category>
</item>
<item xmlns:dc='ns:1'>
<title>PrimoTicketing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20308</link>
<guid>3ed14dec416ac8e278f2375543bcf7da</guid>
<pubDate>Fri, 24 Jan 2025 21:58:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>PrimoTicketing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>44b01c5e652422b7812f03c052f01f2622295fbae1c3812c35d391f45b93f6d6</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>primoticketing.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>KEEACTIONSPORTS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20273</link>
<guid>95a1c096512dbb572d74f4fcbf6bfbfb</guid>
<pubDate>Fri, 24 Jan 2025 18:03:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>KEEACTIONSPORTS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ead8387c9e78d488666b9efab0c2300fb1d5bbd1195d6873169fc89b075bee2f</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] KeeActionSports.Com is a online retailer specialized in selling sports-related goods and equipment. It is dedicated to catering to the needs of sports enthusiasts, regardless of their activity preference. Their product range covers an array of sports, including but not limited to golfing, running, swimming, and team sports. Their commitment is to provide high-quality sporting goods designed to enhance performance and ensure customer satisfaction.</i><br />Target victim <b>website</b>: <i>KEEACTIONSPORTS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>OLAMETER.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20277</link>
<guid>fbc08cbac224e9880b2600256f1c1455</guid>
<pubDate>Fri, 24 Jan 2025 17:38:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>OLAMETER.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>901f87b251fb5443dff0d44878d2eb3b556478af589ec999b26e1e8db9842fce</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Olameter is a diverse service company providing field metering services to gas, water and electric utilities, municipalities and cooperatives. It is based in Los Angeles, California, USA. The company offers a wide range of integrated utility solutions such as meter reading, customer service, AMR/AMI installations, meter testing, and field collection services among others. Their mission is to provide cost-effective, efficient, and innovative solutions.</i><br />Target victim <b>website</b>: <i>OLAMETER.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>USLUGGAGE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20278</link>
<guid>b57f7e3c691e9086caa881b52de2a661</guid>
<pubDate>Fri, 24 Jan 2025 17:36:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>USLUGGAGE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>17be43f4141ceaf2355ff6c6d17d3687fcd791481fb416d34a9b64dd9ce438c6</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "USLUGGAGE.COM" is an online retailer specializing in the sale of various types of luggage and travel accessories. The company offers a diverse range of products, including suitcases, backpacks, carry-on bags, duffel bags, and travel kits. It has a wide array of brands, catering to various consumer preferences and budgets. In addition to retailing luggage, the company also provides tips and recommendations for choosing the perfect travel gear.</i><br />Target victim <b>website</b>: <i>USLUGGAGE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CALEXISCS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20281</link>
<guid>a829b6def307bd357011e57e5d6a635d</guid>
<pubDate>Fri, 24 Jan 2025 17:31:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CALEXISCS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d4ea1f8dfac5076e525f3acff4ae6d41dbbf529a916f7b009063f3e6bfebd51d</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "Calexis.com" is an integrated marketing and Web development firm based in Toronto, Canada. They work on a variety of client projects involving website design, development, search engine optimization, and e-commerce. Their expertise also extends to traditional marketing such as direct mail, radio, and TV. Their interdisciplinary team is dedicated to creating unique and effective digital experiences for their clients. The company emphasizes innovation, agility, and strategic thinking in their solutions.</i><br />Target victim <b>website</b>: <i>CALEXISCS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CDRSOFTWARE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20282</link>
<guid>6df53cef666327a334686e16b14d0faa</guid>
<pubDate>Fri, 24 Jan 2025 17:27:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CDRSOFTWARE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3067b0bdacb93378fa974cb2b1a278b0404c6c53cf70bab6705119db057ed010</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] CDRSOFTWARE.COM is a company that offers specialized software solutions for a variety of business operations. These include distribution management, inventory control, customer relationship management, and more. They focus on integrating these solutions into the client’s existing systems and procedures. Their software is designed to help businesses increase productivity, streamline processes and maximize profitability. Prominent industries served include manufacturing, wholesale, and retail businesses.</i><br />Target victim <b>website</b>: <i>CDRSOFTWARE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SEATTLECHOCOLATES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20284</link>
<guid>2b31595206d7115ea2bcdc2a0fcd6757</guid>
<pubDate>Fri, 24 Jan 2025 17:26:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SEATTLECHOCOLATES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c209c8d95c2d4ddd5ef1a5f1d63aa9bd74f9eec0959be091649f9dbccbf60bca</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Seattle Chocolates is a renowned chocolate manufacturing company based in Seattle, Washington. Recognized for their premium quality and crafted chocolates, they are committed to creating delicious, innovative products with a focus on sustainability and social responsibility. They offer a wide range of flavorful, rich chocolates including truffle bars, truffle bags, gift boxes, and seasonal treats.</i><br />Target victim <b>website</b>: <i>SEATTLECHOCOLATES.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SPADERFREIGHT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20288</link>
<guid>b34fcbb8b9dae62f171ff71744191f0e</guid>
<pubDate>Fri, 24 Jan 2025 17:23:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SPADERFREIGHT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fbe9783fe1298c72a13a3f3c7b4d48d1762b387eb549fd95b6468bf2115aea85</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] SPADERFREIGHT.COM is a logistics company that offers a wide range of services related to the freight and shipping industry. The company specializes in the transportation of various goods and commodities, focusing on providing cost-effective and reliable solutions to their clients. Their services include truckload shipping, less-than-truckload shipping, intermodal freight, and expedited shipping options.</i><br />Target victim <b>website</b>: <i>SPADERFREIGHT.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SULLYTRANSPORT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20289</link>
<guid>154fa0133bf213ebda06227166605423</guid>
<pubDate>Fri, 24 Jan 2025 17:22:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SULLYTRANSPORT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>86838e1681ff6edf93ed80fd9014691b7d7e8598b1ddbfba3625b72262d77646</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "SullyTransport.com" is a transportation logistics company. They primarily specialize in facilitating ground transportation solutions across the United States. With their vast network of reliable carriers and advanced technological tools, they ensure fast and efficient freight shipping. Their services include full truckload, partial truckload, and expedited shipping, serving a diverse client base ranging from manufacturers to retailers.</i><br />Target victim <b>website</b>: <i>SULLYTRANSPORT.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BRADLEYCALDWELL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20290</link>
<guid>fdba1a7e539c5c1cce7293fe6ae09ee6</guid>
<pubDate>Fri, 24 Jan 2025 17:19:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BRADLEYCALDWELL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4c5e20ec335559972ec5264fce53179924f2c4f5142dc94efed4fd753d363438</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Bradley Caldwell is a leading wholesaler of a wide range of products across sectors like pet, garden, outdoor living, farm, equine, and wild bird industries. It offers more than 20,000 products from over 300 vendors, catering to retail businesses and dealers. This privately-owned company is known for its focus on customer service and commitment, ensuring timely and efficient delivery of goods.</i><br />Target victim <b>website</b>: <i>BRADLEYCALDWELL.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MADENGINE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20291</link>
<guid>93ec3bccd20f1403374ea7636b10f56d</guid>
<pubDate>Fri, 24 Jan 2025 17:17:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MADENGINE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0fa42e63e2f842c0740b0bcb097acfbea243a61c0a3994a784e278ce1a9ff343</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Mad Engine is a leading global apparel and accessories wholesaler. With a specialization in licensed merchandise, the company provides unique collections inspired by popular brands, films, and characters. In addition to B2B services, Mad Engine also supports direct-to-consumer sales. Their range extends from t-shirts and hoodies, to accessories like hats and socks. The company focuses on quality, creativity, and innovation in their designs.</i><br />Target victim <b>website</b>: <i>MADENGINE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SPGUSA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20292</link>
<guid>4458707eaea92785e478122f883f74b7</guid>
<pubDate>Fri, 24 Jan 2025 17:15:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SPGUSA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b70c347740068b2b9db1217d66d9e7e0ecae7dee08c4252f7ea8a82fecb6b61</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] SPGUSA.COM, also known as Special Products Group, is an American company specializing in the personalized customization and production of promotional products. They offer a wide range of products such as apparel, drinkware, office supplies, tech gadgets and more, all customizable for businesses and organizations for marketing needs.</i><br />Target victim <b>website</b>: <i>SPGUSA.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ARROW.COM-CLEO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20293</link>
<guid>6868e581382cc1c0d24e352a4e262ac0</guid>
<pubDate>Fri, 24 Jan 2025 17:13:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ARROW.COM-CLEO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47aeedf1e1cc8f049b44f30dd0f459a3cdc8b55de53bbbca1dec99ccaee08416</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>EMKAY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20294</link>
<guid>13d763a5838ca85acd2d4ff824ab03ea</guid>
<pubDate>Fri, 24 Jan 2025 17:10:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>EMKAY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9596d2d0c132e46cd080af56e3981b6e314c6b6e01791e7bd26a24c2ce29fca7</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] EMKAY Inc. is a business service provider specializing in fleet leasing and management solutions. Founded in 1946, EMKAY operates across North America and caters to a wide range of industry sectors. Offering services like lease financing, fuel management, accident management, licensing compliance, and more, EMKAY aims to help businesses manage their vehicle fleets efficiently and cost-effectively.</i><br />Target victim <b>website</b>: <i>EMKAY.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BUSINESSSYSINTEG.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20295</link>
<guid>e095c4a95e189556ccbff380afea7804</guid>
<pubDate>Fri, 24 Jan 2025 17:10:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BUSINESSSYSINTEG.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>78e8bd744e8be1a390608c21e7b5a0cc18790eb8c258d3ed6d0231d5a494348d</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] BUSINESSSYSINTEG.COM is a technology company specializing in providing business systems integration solutions. They offer services that help businesses streamline their processes and increase productivity by integrating separate systems into a unified whole. Their solutions cover a wide range of areas, from CRM and ERP to data management and analytics. Their team of skilled programmers and consultants are well-versed in a variety of software platforms to deliver tailored solutions for clients.</i><br />Target victim <b>website</b>: <i>BUSINESSSYSINTEG.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BMIUSA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20296</link>
<guid>9c4ab73ab173dbacc3fa5849e0b20922</guid>
<pubDate>Fri, 24 Jan 2025 17:09:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BMIUSA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3a958aef48919562fd97e6d0358faa650f6c3ef7715f3f4648711b4151cc336</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] BMIUSA.COM is a technology company specializing in offering business process automation solutions, including content and document management systems. They cater to a variety of industries such as government, education, healthcare, and commercial businesses. Their services aim to improve operational efficiency by digitizing and automating paper-based processes. With the help of their team that comprised of industry experts they assist clients from choosing the right software till post-implementation management.</i><br />Target victim <b>website</b>: <i>BMIUSA.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>COYOTE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20298</link>
<guid>c4512ba1c018dbd09ad51aff6441141e</guid>
<pubDate>Fri, 24 Jan 2025 17:07:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>COYOTE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60781a9b29a31f59239ef264399528b96dcbaa83e09facc08aa87d9e30e61040</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Coyote.com, a subsidiary of UPS, is a top-notch logistics service provider. Their operations involve arranging freight transportation for thousands of shipping companies across all sorts of industries. Coyote.com uses their network of over 70,000 carriers to create the best logistics and supply chain solutions. They offer truckload, less-than-truckload and intermodal brokerage services as well as transportation management services.</i><br />Target victim <b>website</b>: <i>COYOTE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HILLBROS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20299</link>
<guid>6fde059de50615d643a2c178be54c4f3</guid>
<pubDate>Fri, 24 Jan 2025 17:04:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HILLBROS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8a1d3555b90544d22ceba7752acf18df37396329095d6a50e978f319c810651</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] HILLBROS.COM is an online e-commerce website that specializes in various product categories including electronics, fashion, home & kitchen items and more. They ship across the U.S. and aim to be a one-stop online shopping destination for consumers. Their website is easy to navigate, ensuring a seamless shopping experience. They are committed to providing high-quality products and prioritizing customer satisfaction.</i><br />Target victim <b>website</b>: <i>HILLBROS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wannemacher-Enterprises-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20300</link>
<guid>6710ad47901fc717935bc4c6aa9fe736</guid>
<pubDate>Fri, 24 Jan 2025 17:00:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Wannemacher-Enterprises-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f8ff9040b67aa62a2bfb30ead175acf34eaa04f3f3f9532b486b0f114ddc87e9</i><br /><br />Threat actor <b>description</b>: <i>Wannemacher Enterprises Inc  aka Wannemacher Total Logistics was established in 1991 as a local trucking operation and has expanded over the years to a leader in transportation, warehousing, distribution, contract packaging, and liquid fillin            ...</i><br />Target victim <b>website</b>: <i>wanntl.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ORU-Mabee-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20301</link>
<guid>c5941be9c01b6fb6468639d5f03af022</guid>
<pubDate>Fri, 24 Jan 2025 16:53:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>ORU-Mabee-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>081cf8f2b05dc67ec7806270e669fe2e9c2129ef09f57e428a2a500668a8953c</i><br /><br />Threat actor <b>description</b>: <i>ORU Mabee Center ORU is a liberal arts university with programs for every interest, from business and biology to engineering, computer science, nursing, criminal justice, theology and ministry, and more!    More</i><br />Target victim <b>website</b>: <i>oru.edu</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>De-La-Salle-High-School-dlshs.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20262</link>
<guid>8f4c7958a3ef11baf6c6053f83fc3511</guid>
<pubDate>Fri, 24 Jan 2025 13:03:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>FOG</b> claims attack for <b>De-La-Salle-High-School-dlshs.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>88b321d878996654f412499226b6a0c37f5e07caff98efb87a74acd45adfaebf</i><br /><br />Threat actor <b>description</b>: <i>20 GB</i><br />Target victim <b>website</b>: <i>dlshs.org</i>]]></description>
<category>FOG</category>
</item>
<item xmlns:dc='ns:1'>
<title>HERTZ.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20270</link>
<guid>24c386cd9c503780b1b219e9aa063136</guid>
<pubDate>Fri, 24 Jan 2025 09:06:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HERTZ.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0422c7c0145c8fac5a45b95c5adaf0169e94b78b48337b71be2a7b19c436dc0</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Hertz.com is the online portal for The Hertz Corporation, a leading car rental service in the U.S. The company provides vehicle rental services including cars, trucks, and utility vehicles to consumers and businesses globally. It also offers additional services such as car sales, vehicle leasing, and fleet management. Its website, Hertz.com, allows customers to book rentals, manage reservations, and access special deals. Founded in 1918, Hertz is a subsidiary of Hertz Global Holdings.</i><br />Target victim <b>website</b>: <i>HERTZ.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CREELED.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20269</link>
<guid>c9041cfd2a40932691855abd98fd219a</guid>
<pubDate>Fri, 24 Jan 2025 09:04:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CREELED.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>818fd06faa6d3f1aba1de36f7f108b74eecb89b4184b867fca56d6c832d29725</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "CREELED.COM" is an online retail platform specializing in providing high-quality LED lighting solutions. The company offers a wide range of products including bulbs, tubes, and downlight fixtures, with a special focus on energy efficiency and durability. CREELED.COM works with leading manufacturers and implements strict quality control to ensure each product meets the highest standards. Beyond product sales, the company also provides expert advice and recommendations to help customers choose the right lighting solutions for their needs.</i><br />Target victim <b>website</b>: <i>CREELED.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>JAKKS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20268</link>
<guid>c79d3508e2dc8fe8524e6b88ba662656</guid>
<pubDate>Fri, 24 Jan 2025 09:01:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>JAKKS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c6a09757af248f4c931eb7ea165c3fccbe43ff9c9ba4b942800df32ce7a30b80</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] JAKKS Pacific, Inc., often referred to as JAKKS.COM, is a multi-brand company that designs and markets a broad range of toys, consumer products, and other leisure entertainment products. They provide merchandise for various franchises, such as Disney, Nintendo, and Star Wars among others. JAKKS Pacific is also known for its innovative technology application in toy manufacturing. The company started in 1995 and is situated in California, USA.</i><br />Target victim <b>website</b>: <i>JAKKS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ALPINEFOODS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20266</link>
<guid>b8af787cd4a611c6360b4dc71928ebe2</guid>
<pubDate>Fri, 24 Jan 2025 08:57:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ALPINEFOODS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6bd44b82b066650f90f67f1fad4488f3de2f18dfb6a18aa7f597fb08e601f79c</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] AlpineFoods.com is a reputed company engaged in the food and beverage industry. They offer a wide range of premium quality food items and drinks to their customers online. Their product list includes everything from fresh produce, dairy, meats, frozen foods to bakery items, prepared meals, and snacks, allowing customers to enjoy fresh and healthy food at home. They are recognized for their exceptional customer service and prompt delivery system.</i><br />Target victim <b>website</b>: <i>ALPINEFOODS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SHEERLOGISTICS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20265</link>
<guid>26c7cc8d05a0dc19cfc07baa975877f1</guid>
<pubDate>Fri, 24 Jan 2025 08:54:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SHEERLOGISTICS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77d7d9f58a1cf07cde535e5abc9fae8a8e9048aca342effe0f2e7dd40da16dfa</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Sheer Logistics is a US-based supply chain management company providing logistics and transportation solutions. The company specializes in freight forwarding, air and ocean freight, and warehousing services. With a strong focus on technology, it uses advanced tools to streamline its operations, improve visibility, and reduce costs for its clients. It serves businesses across various sectors, including agriculture, automotive, consumer products, and industrial goods.</i><br />Target victim <b>website</b>: <i>SHEERLOGISTICS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>OFSPORTAL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20264</link>
<guid>ba9d98e8e54041173ea4f3640ed79cac</guid>
<pubDate>Fri, 24 Jan 2025 08:53:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>OFSPORTAL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ae3e1d3b58a590d92639c1c68c75a181b6343e6dfdf242d4624d6b4d3eda3175</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] OFSPORTAL.COM is an online marketplace that caters exclusively to the oil field service business. It aims to streamline the process of procurement for products and services in the oil and gas industry by providing a platform to connect buyers and sellers in the market. The platform supports a wide range of service providers ranging from logistics to equipment suppliers, offering a versatile and efficient solution for industry professionals.</i><br />Target victim <b>website</b>: <i>OFSPORTAL.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SWEETSTREET.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20263</link>
<guid>dbb6b4e727f400075c39bd45209c5b1c</guid>
<pubDate>Fri, 24 Jan 2025 08:47:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SWEETSTREET.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ce965acac47c0492da003f201189a25325c4f100ae2a426d5b44f79b6ffe472</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Sweetstreet.com is a renowned company that specializes in creating a wide range of delicious and indulgent gourmet desserts. These include cakes, cookies, brownies, pies, and other sweet treats. Their products are known for their quality, taste, and craftsmanship. The company caters to both individual consumers and food service providers, offering various dessert options suitable for different occasions and tastes.</i><br />Target victim <b>website</b>: <i>SWEETSTREET.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PREMIERSUPPLIES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20260</link>
<guid>933526d917e9642b5d9a38f215a23b5a</guid>
<pubDate>Fri, 24 Jan 2025 08:42:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PREMIERSUPPLIES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a4364fa0f9d7f1a0ac51a29253d31254183c9c0c8a16c303a4c3c7960322a24</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Premiersupplies.com is a leading supplier of office equipment and supplies in the United States. From fully furnished office solutions to essential stationery items, they offer extensive lines of premium products at competitive prices. They specialize in providing high-quality tools and materials which include printers, scanners, office furniture, and daily-use office supplies, catering to various businesses and industries.</i><br />Target victim <b>website</b>: <i>PREMIERSUPPLIES.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BREAKTHROUGHFUEL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20259</link>
<guid>0a890abf09b6ef953734969c6aeee8d4</guid>
<pubDate>Fri, 24 Jan 2025 08:40:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BREAKTHROUGHFUEL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f5aeb750aef28547384609474b7ad01bfb644ae7e2cc8f514d7579e4ff4089a</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Breakthrough Fuel is a global supply chain management and energy advisory firm specializing in reducing energy costs and emissions. They utilize real-time data to create transparency in the energy and transportation sector and provide solutions for businesses to effectively manage the energy consumed by their supply chain. Their wide range of services includes energy management, information services, and strategic advice.
</i><br />Target victim <b>website</b>: <i>BREAKTHROUGHFUEL.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ENCOMPASSTECH.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20257</link>
<guid>5843342c9fde8a11880aa20b2c3899f1</guid>
<pubDate>Fri, 24 Jan 2025 08:36:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ENCOMPASSTECH.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7157a8a284aea15ba096a57a6961012264544131bfcfe03ea0f0bc34fbf58ddc</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Encompasstech.com is a technology-based company that specializes in software and IT services. It offers an extensive range of technologically-driven solutions for businesses including enterprise software development, IT consulting, IT outsourcing, and more. Encompasstech.com aims to help companies increase their efficiency and productivity by integrating top-notch technology with their business processes.</i><br />Target victim <b>website</b>: <i>ENCOMPASSTECH.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>NISSINFOODS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20256</link>
<guid>4746675b2008b47fc1ef6fd6e2e754a7</guid>
<pubDate>Fri, 24 Jan 2025 08:34:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NISSINFOODS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eb64dc934398060e26a376c7f818cbd38925aa46adbc91cbe20e5ebc8f0c051b</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Nissin Foods is a renowned Japanese food company that specializes in the production and sale of convenience foods. The company was established in 1948 by Momofuku Ando, the inventor of instant noodles. Its key products include instant ramen and cup noodles, which have become globally recognized. Nissin Foods operates in numerous countries, providing diverse palate choices with their individualized instant noodle flavors. They are known for their innovation, quality, and taste in the fast-food market.</i><br />Target victim <b>website</b>: <i>NISSINFOODS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SDITECHNOLOGIES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20252</link>
<guid>25411c7a6117dca4fca5d84c4ee09df5</guid>
<pubDate>Fri, 24 Jan 2025 08:25:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SDITECHNOLOGIES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81194e7cf3d53b49c05b97c62db2fee3d910884dbcbe4833587e3ad705972bed</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] SDITECHNOLOGIES.COM is a comprehensive IT service provider that specializes in delivering innovative technology solutions. The company supports its clients in various aspects such as ERP, e-business, web application, software development, IT consultancy, and more. The team of experts work strategically to develop and implement processes that drive efficiency. They are committed to addressing the unique needs of each client through a client-centered and result-driven approach. Utilizing high-quality technology, they aim to provide scalable business solutions with ease.</i><br />Target victim <b>website</b>: <i>SDITECHNOLOGIES.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CPS.EDU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20251</link>
<guid>70d5978ddd158dc934b5fe305e493aae</guid>
<pubDate>Fri, 24 Jan 2025 08:23:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CPS.EDU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c4324e2129d7cde337f07421fb67aed9acb56c1f18a203a11d9cae5abdb31b3</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] CPS.EDU refers to Chicago Public Schools (CPS), one of the largest public school districts in the U.S., serving over 355,000 students in 642 schools. It provides comprehensive educational programs, including traditional, magnet, charter, and special education for students from preschool through high school. The district also offers programs for English language learners and special needs students. CPS is committed to improving public education and preparing students for their future.</i><br />Target victim <b>website</b>: <i>CPS.EDU</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CLAWLOGISTICS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20250</link>
<guid>53c16d65d012198a587f8745bad50014</guid>
<pubDate>Fri, 24 Jan 2025 08:20:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CLAWLOGISTICS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab4c6f9b085c8f8718e679a62a766458358cd9c7093d0e4bc02f5d17124c9b13</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] ClawLogistics.com is a logistics firm that caters to businesses' supply chain needs with expertise in transportation and distribution. They offer various services including freight forwarding, warehousing, and supply chain management. Their team of experts use innovative technologies to customize and streamline logistics processes. Their dedication to client satisfaction and focus on cost control makes them a reliable partner for businesses in need of logistic solutions.</i><br />Target victim <b>website</b>: <i>CLAWLOGISTICS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CLEO.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20249</link>
<guid>5cd3027c07873cf6aa691a42320d86f5</guid>
<pubDate>Fri, 24 Jan 2025 08:18:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CLEO.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f25256d913b45397c9ac222146d861edb327a60356c93d0dcfbac0652fa84eb</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] CLEO.COM is a fintech startup that offers an AI-driven budget assistant to help individuals manage their finances. Its primary service enables budgeting, saving, and tracking spendings in an innovative way. Geared towards millennials, Cleo provides insights into spending habits, gives financial advice, and allows for easy management of money across multiple accounts. It operates in the UK and the US.</i><br />Target victim <b>website</b>: <i>CLEO.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>WESTERNALLIANCEBANK.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20248</link>
<guid>c791175db369972674de6dc1387f516d</guid>
<pubDate>Fri, 24 Jan 2025 08:16:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>WESTERNALLIANCEBANK.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>99b17735aae5cbc394da2f68e4117ef8f3f038485b3795520a3b6ee5ea40cb1e</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Western Alliance Bancorporation is a leading bank holding company in the US offering retail, commercial, and real estate banking services. Established in 1995, it operates through various divisions and subsidiaries across the nation. Western Alliance Bank provides lending, deposit, treasury management, and online banking solutions to consumers, small to larger businesses, and professional communities.</i><br />Target victim <b>website</b>: <i>WESTERNALLIANCEBANK.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ESPRIGAS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20247</link>
<guid>b618b4ddcc68e6ad3a4a62b467c91ad9</guid>
<pubDate>Fri, 24 Jan 2025 08:14:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ESPRIGAS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>73fb94948285cb46773c8d60e9b07544377816d27206ea0a851fb1878b40a2d9</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Esprigas.com is a company that provides innovative gas supply solutions to businesses across various sectors. They offer a range of services including gas supply, timing, and volume regulation, reducing costs and improving efficiency for clients. Their model involves sourcing gas from different suppliers to avail best pricing, and using advanced technology for management and delivery, thereby revolutionizing industrial gas procurement.</i><br />Target victim <b>website</b>: <i>ESPRIGAS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chappell-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20243</link>
<guid>d80686e7e897bf4d346d5f41ae337e35</guid>
<pubDate>Fri, 24 Jan 2025 07:45:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Chappell-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>73eaf0694b234e6d3b27b1b4369a862fed1498b2506e537361988c75c706554a</i><br /><br />Threat actor <b>description</b>: <i>Chappell Schools - the children's center providing an extensive range of programs for the development of the child. Chappell Schools corporate office is located in 8400 Baycenter Rd, Jacksonville, Florida, 32256, United States and has 115 employees. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bwfg.at</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20232</link>
<guid>ec56abf051ad30409305d1aa5020e7c7</guid>
<pubDate>Thu, 23 Jan 2025 19:22:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Bwfg.at</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0d502cb4f1b78070d2559dea37a0d9de67ae002a1c856fc7c9356e013e48e28c</i><br /><br />Threat actor <b>description</b>: <i>Bwfg.at


Country: austria
Views: 16

View more /bwfg
Public
102GB</i><br />Target victim <b>website</b>: <i>Bwfg.at</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>samsill.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20234</link>
<guid>46a731f4af282372a4097ba1e4d76b95</guid>
<pubDate>Thu, 23 Jan 2025 18:52:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>samsill.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e996b4801f33f3ccdc0070b7ed98b517cb4930aa5e7b254530668565cf98fc46</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Samsill Corporation is a reputable manufacturer in the office products industry. They primarily offer storage, organization, and protection products. With headquarters in Fort Worth, Texas, the company is known for producing binders, sheet protectors, laptop cases, iPad cases, and a wide variety of other office goods. With over 65 years of experience, Samsill takes pride in their commitment to innovation, sustainability, quality and excellence.</i><br />Target victim <b>website</b>: <i>samsill.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Enghouse-ex.-Navita</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20229</link>
<guid>e6403365350214703763569edef497e0</guid>
<pubDate>Thu, 23 Jan 2025 15:40:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Enghouse-ex.-Navita</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e9aad257ec1c9fe5bd3281415a9d03e93afde1acc73534c443e2bfc7c67e5f70</i><br /><br />Threat actor <b>description</b>: <i>Enghouse is a publicly traded Canadian company that provides enterprise software solutions focused on remote work, visual computing, and communications for next-generation software-defined networks.We are ready to upload some private corporate documents such as: internal financial data (audits, payment details, reports), employee tax payer numbers, employee contact emails, etc.</i><br />Target victim <b>website</b>: <i>enghouse.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>starkaerospace.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20230</link>
<guid>152b834f4143f04134b97d1efabb0c67</guid>
<pubDate>Thu, 23 Jan 2025 14:48:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>starkaerospace.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca6e6da25508fb666ef93bbc38662f4d2c43bbdc32e9006b364d42e39ff08df2</i><br /><br />Threat actor <b>description</b>: <i>At Stark Aerospace, we stand as a beacon of excellence in the realm of defense manufacturing. Founded on the principles of integrity and excellence, Stark Aerospace has become synonymous with technological advancement and operational superiority. Our dedication to quality permeates every aspect of our operations, ensuring that each product bearing the Stark Aerospace name upholds the highest standards of performance and durability. ==================================================  We have a full range of design documentation, source codes of software environments developed by you, including firmware of all types UAVs you produce, information on contracts with the Department of Defense and other military contractors, supply chain information, and technology partners, codes and parts numbers of the entire component base, building plans and scientific works used by you to manufacture of its products. Moreover, we know the personal data with copies of the passports of your instructors who fly to hot spots for training and presentations of your product solutions.  We also found a lot of interesting information on the programs for the production and launch of reconnaissance satellites functionality, as well as partially took away the documentation of your parent holding IAI. Copies of your websites, significant laboratories (in the form of virtual machines), configuration of information security tools and other things - all this is in our possession and will be sold to interested parties in case of refusal to cooperate.  4 TB of company data are at our disposal.</i><br />Target victim <b>website</b>: <i>starkaerospace.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.missionbank.bank</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20227</link>
<guid>62fb55ef2bfd3427d8408d2f11f5fd9e</guid>
<pubDate>Thu, 23 Jan 2025 13:02:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.missionbank.bank</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac8c292847b66509c91573fd59cf18f469f01ce40ed1859a8e4d2efaebe3b85b</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Mission Bank is a full-service, community-based bank based in California. They offer an array of products and services like personal banking, commercial banking, wealth management and online banking. Their goal is to foster community growth by providing personalized financial solutions to local businesses and individuals.</i><br />Target victim <b>website</b>: <i>www.missionbank.bank</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>PINELAND-BHDD-COMMUNITY-SERVICES</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20226</link>
<guid>aaa97bcc0fca801927941e0ab185442f</guid>
<pubDate>Thu, 23 Jan 2025 08:09:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>PINELAND-BHDD-COMMUNITY-SERVICES</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee68db5708c21aae27b7388cef20c7be673b0d09c41016a5e654b25f439ec7a4</i><br /><br />Threat actor <b>description</b>: <i>Pineland BHDD is to develop and provide the services needed to minimize the impact of mental illness, developmental disabilities and addictive diseases in the lives of those we serve and their families.• Patients' personal information, documents and medical histories. Company network database and backups. http://www.pinelandcsb.org</i><br />Target victim <b>website</b>: <i>www.pinelandcsb.org</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Black-Hills-Regional-Eye-Institute</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20225</link>
<guid>99bbb17674e75c528140126a3deb730e</guid>
<pubDate>Thu, 23 Jan 2025 08:01:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Black-Hills-Regional-Eye-Institute</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>814df5e2778e5481b4bcc5e4fe8c53e18cdb9f7dbb33ba0f7d0b105bd36c00ee</i><br /><br />Threat actor <b>description</b>: <i>Black Hills Regional Eye Institute https://www.blackhillseyes.com/ is a USA based medical group practice located in Rapid City, SD that specializes in Ophthalmology and Optometry. 
The network of this medical group had been breached and encr            ...</i><br />Target victim <b>website</b>: <i>www.blackhillseyes.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>gaylord.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20219</link>
<guid>b09e9b8f288432a0628bf7a6f1b8ed42</guid>
<pubDate>Wed, 22 Jan 2025 21:09:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>gaylord.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63371bfd153e8cd55b3728a2381e128eb3105853b28c827722a37197131d314c</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] I'm sorry, but there appears to be no available or valid information regarding a company named "gaylord.org". The search did not yield any relevant details about it being an existing and active organization. It might be beneficial to check if the name or spelling is accurate or if it's a regional or less-known entity.</i><br />Target victim <b>website</b>: <i>gaylord.org</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.manpower.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20216</link>
<guid>20cadab4a23d83d23b85d85e5bb3ede5</guid>
<pubDate>Wed, 22 Jan 2025 18:53:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.manpower.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a904ccfd4b02a8c2acc45fd55eeea13989cd50cc552c9a4f2b4e05163cc29fa</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Manpower is a global workforce solution company that provides recruitment and staffing services across a broad range of industries and skills. With established expertise in temporary, permanent and contractual staffing, it offers a full suite of solutions covering recruitment, assessment, training and consultation. Its services help companies find the right talent, while also opening up opportunities for individuals seeking employment.</i><br />Target victim <b>website</b>: <i>manpower.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Architects-West</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20213</link>
<guid>0f297ff03a203306384e8fcc694b6724</guid>
<pubDate>Wed, 22 Jan 2025 17:44:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Architects-West</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97d229862d33e6225c69ee6fbec54a835751acb13c7ddcd65f97c18b66b2430e</i><br /><br />Threat actor <b>description</b>: <i>Architects West is a leading architecture firm based in Coeur dAlene and Spokane, offering architectural, landscape architectural,and interior design services since 1973.We are ready to upload more than 120 GB of private corporate documents such as: HR documents, contact numbers and e-mail addressesof employees and customers, confidential agreements and contracts, financial data (audits, payment details, reports), etc.</i><br />Target victim <b>website</b>: <i>architectswest.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hayloft-Property-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20211</link>
<guid>e0613000bcd426e19c29ad052aa7ea49</guid>
<pubDate>Wed, 22 Jan 2025 14:43:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Hayloft-Property-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25f45999ee2ef87913d0672471189521a1679b731dc83b2fe3b17f351acfd8c6</i><br /><br />Threat actor <b>description</b>: <i>Hayloft Property Management Co. offers spacious, modern living, where quality and comfort come first. Their apartments for rent are located in five states, with nine different communities: South Dakota, Iowa, Minnesota, Nebraska, and Kansas.We are ready to upload about 9 GB of private corporate documents such as: license agreements, contact numbers and e-mail addressesof employees and customers, SSNs, internal financial documents, incident reports, etc.</i><br />Target victim <b>website</b>: <i>hayloftapartmenthomes.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Omni-Fiber-LLC---Press-Release</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20212</link>
<guid>cef86bd9ff0b73e7f5fc08c34b643a8b</guid>
<pubDate>Wed, 22 Jan 2025 14:43:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Omni-Fiber-LLC---Press-Release</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>894d7bc0deb0b5c279e71faf9256fbbe2b531ec39105add5b572f9a0949e8da6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.americanstandard-us.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20209</link>
<guid>dc13157dad018bcdd3f6763b4331329c</guid>
<pubDate>Wed, 22 Jan 2025 06:53:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.americanstandard-us.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>80414a544f28aa2dc13ee6de86310882ab1846b6e965a20c2d68bb59e03a0eef</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] American Standard is a leading North American manufacturer of plumbing and heating products, including bathroom and kitchen fixtures, parts, and accessories. They are recognized for their innovative and stylish designs, high-quality materials, and sustainability practices. Apart from products for individual customers, the company also caters to professional contractors and commercial businesses.</i><br />Target victim <b>website</b>: <i>americanstandard-us.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>whychoosebw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20201</link>
<guid>d683533d66f266d524cbf68d5df0ee9c</guid>
<pubDate>Wed, 22 Jan 2025 03:18:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>whychoosebw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22f7c7ebccf6c02449f381811c7bee92efc264ff83ec9c19977d1cd1c80fa6fb</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "WhyChooseBW.com" appears to be a platform associated with Bridgestone & Firestone, offering a wide range of tires for various vehicles. The name likely refers to "Why Choose Bridgestone & Firestone", emphasizing the superior quality, durability, and performance of their products. Their site provides information about their tire selection, technology, and dealer network. The company's commitment to safety, sustainability, and innovation is also highlighted.</i><br />Target victim <b>website</b>: <i>whychoosebw.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mintz-Law-Firm-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20199</link>
<guid>78bfc4fdafe38bbdb63f9afa4813e26b</guid>
<pubDate>Wed, 22 Jan 2025 01:45:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Mintz-Law-Firm-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d06d19d8e5a65d2b4a7f25290a9c1d9dd46908e9f097018ce2e44acaa01845c2</i><br /><br />Threat actor <b>description</b>: <i>At Mintz Law Firm, LLC - Personal Injury & Car Accident Lawyers, we care deeply ...</i><br />Target victim <b>website</b>: <i>mintzlawfirm.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>boardman-hamilton.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20200</link>
<guid>6ce70275d3db0a080384a366c7dcfe3c</guid>
<pubDate>Wed, 22 Jan 2025 01:41:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>boardman-hamilton.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2d9387b4f31d995003042780bb52a432c2b568b72b036d3b555e8eb1def60afc</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Boardman-Hamilton Company is a full-service, independent insurance agency. Located in Philadelphia, they have been in business for over 80 years. They provide a comprehensive range of insurance services, including personal, business, health, life, and special risk insurance. They offer personalized service, focusing on understanding individual client needs, ensuring adequate coverage at cost-effective rates. They have a skilled team of insurance professionals who guide clients in making informed insurance decisions.</i><br />Target victim <b>website</b>: <i>boardman-hamilton.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>brunetti.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20204</link>
<guid>751f75ca64e39a7c3d47d79e27aa1e85</guid>
<pubDate>Tue, 21 Jan 2025 23:10:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>brunetti.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>20d3f8ba44a1ca244577487349fd5071b71083f317b41bcbcec3c8310116a853</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Brunetti is a renowned Italian cafe established in Melbourne, Australia in 1985. Known for its European ambiance and authentic Italian food, Brunetti offers a wide range of options including gourmet pizza, pasta, gelato and one of Melbourne's most extensive ranges of Italian pastries, cakes and desserts. They also provide catering and online takeaway ordering services.</i><br />Target victim <b>website</b>: <i>brunetti.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>precisionmechsd.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20202</link>
<guid>e240f783de5c9ea54f362c8f65d6eb69</guid>
<pubDate>Tue, 21 Jan 2025 23:02:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>precisionmechsd.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6dbee7d40d2e5b114a49c7f400562bf99dfed26e4bade4eec9db04906f679f2</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Precision Mechanical, Inc. is a leading mechanical contracting firm based in South Dakota. They specialize in industrial projects, offering services such as HVAC, pipe fabrication, plumbing, and more. They are known for their safety, reliability, and high quality work in various sectors such as healthcare, education, and commercial buildings. Credit: precisionmechsd.com.</i><br />Target victim <b>website</b>: <i>precisionmechsd.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>miedemaproduce.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20197</link>
<guid>f84b89bcf33c161bdaa19c925928f74d</guid>
<pubDate>Tue, 21 Jan 2025 20:53:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>miedemaproduce.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>55134fef2f4ec6a1337f97a847676361d31b7c3a1d196ba4d91ed82ea30f6ee7</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Miedema Produce, Inc is a family-owned business that specializes in growing, packaging, and distributing fresh produce. Founded in 1958, the Michigan-based company focuses on onions and carrots, offering a variety of sizes and packaging options. They are well-known for their commitment to quality and sustainability. They distribute their produce both domestically and internationally, providing farm-fresh products to consumers year-round.</i><br />Target victim <b>website</b>: <i>miedemaproduce.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sentinel-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20176</link>
<guid>c3671e164e65eb26a22db5421e92c405</guid>
<pubDate>Mon, 20 Jan 2025 13:45:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Sentinel-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>386d5c0929426e93d5c09c06ba4f4db0fbe41bd45882d0e3458730924fdc5e01</i><br /><br />Threat actor <b>description</b>: <i>Sentinel Systems Corp is a company that operates in the Software industry. It em...</i><br />Target victim <b>website</b>: <i>sentinelsystems.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Angotti--Reilly</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20177</link>
<guid>4deb952153ce3744d3c724aed6c09830</guid>
<pubDate>Mon, 20 Jan 2025 13:45:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Angotti--Reilly</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8b3d3fd3181a52150c4ec6701e0eb47fabd7b5882ef6052123602e2c248c923</i><br /><br />Threat actor <b>description</b>: <i>Angotti & Reilly, Inc brings a service-first approach, competitive pricing, and ...</i><br />Target victim <b>website</b>: <i>angotti-reilly.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>D--M-Trim</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20175</link>
<guid>b05edd78c294dcf6d960190bf5bde635</guid>
<pubDate>Mon, 20 Jan 2025 08:18:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>D--M-Trim</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd155d071939e3316b98632f67dbf23b2fe859cd7c5c1acc84c7147db03ccb91</i><br /><br />Threat actor <b>description</b>: <i>D & M Trim, Inc.is a North Florida Based trim company, full service contractor with broad experience in private – sector clients. D & M Trim corporate office is located in 1607 Lucas Ave, Green Cove Springs, Florida, 32043, United States and has 30 employees.</i><br />Target victim <b>website</b>: <i>dmtriminc.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Delta-Fabrication-and-Machine-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20174</link>
<guid>1e78e7323c18caa97a193cb00302ed8b</guid>
<pubDate>Mon, 20 Jan 2025 08:16:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Delta-Fabrication-and-Machine-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c27139629d5e68af2246a3322e20783ab69c6393d69fc56e9238c100d0d400c</i><br /><br />Threat actor <b>description</b>: <i>Delta Fabrication and Machine, Inc (founded in 1989) - the company offers ready -made solutions that cover all parts of construction and maintenance, including the pre -construction design, purchases and logistics, installation of metal structures, prefabricated pipelines, mechanical design and installation, as well as project management, covering such industries as the production of electricity, automotive industry, aerospace industries , the production of metals and woodworking. Delta Fabrication & Machine corporate office is located in 1379 County Road 2110, Daingerfield, Texas, 75638, United States and has 315 employees.</i><br />Target victim <b>website</b>: <i>deltafab.net</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Richardson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20165</link>
<guid>5af2de2fbcd7535745699d05f0481ca4</guid>
<pubDate>Sun, 19 Jan 2025 15:42:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Richardson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6206e0bddfd65e1cc4c61eecf1704d78dab6b10451f8293d8c2f63a9059db0a4</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1978, Richardson Sales Performance is a global sales training and performance improvement company focused on helping you drive revenue and grow long-term customer relationships.</i><br />Target victim <b>website</b>: <i>richardsonsl.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>TG3-Electronics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20166</link>
<guid>5ee5940136007dd813ea0437ddc6915f</guid>
<pubDate>Sun, 19 Jan 2025 14:43:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>TG3-Electronics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db402e18f151a2d7539107b7b2ba66eff41a07ac7c49aa11668266ea51e49d6e</i><br /><br />Threat actor <b>description</b>: <i>TG3 Electronics TG3 Electronics, Inc. is a second-generation family-owned custom keyboard and electronics manufacturer based in Kenosha, Wisconsin.</i><br />Target victim <b>website</b>: <i>tg3electronics.com</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>WELKER--World-Class-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20164</link>
<guid>e2e72c7e0f9f4f765b443b5f16116417</guid>
<pubDate>Sun, 19 Jan 2025 10:43:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>WELKER--World-Class-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>299eb2e90e8196641425e17b2b14c718458eb8283869abe3d1cdbefc3a3fcfa6</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 24.01.2025. At Welker, Inc., weve been manufacturing ideas since 1954. A world-class manufacturer based in Sugar Land, Texas, USA, Welker is a proven leader in sampling equipment and             ...</i><br />Target victim <b>website</b>: <i>welker.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>MERCURYGATE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20159</link>
<guid>9f4241002d82d931ad8c5cec67f17e9a</guid>
<pubDate>Sat, 18 Jan 2025 12:15:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MERCURYGATE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89a5bfc3ec75ea0522e3cad61363c0922c49231a1045c570078fb87cc51a2785</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] MercuryGate delivers cloud-based Transportation Management System (TMS) solutions to a wide range of industries including retail, manufacturing, and third-party logistics. It provides platforms for transportation logistics management, freight forwarding and carrier selection. The company was founded in 2000 and is known for its innovative technology, scalability and exceptional customer service.</i><br />Target victim <b>website</b>: <i>MERCURYGATE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MassDevelopment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20158</link>
<guid>212112eece862ca4a3da112f217288fb</guid>
<pubDate>Sat, 18 Jan 2025 11:58:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>MassDevelopment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>49f4803e9419b2acef5d6ee1a0bdadbdb0ae5fb24b163106612385d25c66372f</i><br /><br />Threat actor <b>description</b>: <i>MassDevelopment, the state’s development finance agency and land bank, works with businesses, nonprofits, banks, and communities to stimulate economic growth.</i><br />Target victim <b>website</b>: <i>massdevelopment.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>USE-Federal-Credit-Union</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20155</link>
<guid>8974b3cfdf5f3b7e194ba60224d5c206</guid>
<pubDate>Sat, 18 Jan 2025 11:39:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>USE-Federal-Credit-Union</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>657c3454bfc7af80caa52ec5c0ddc04c04d0c114c1cac3cfdb35e5cd2d8785ed</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 24.01.2025. At USE Federal Credit Union, no two members are the same. Blue or white collar, younger or wiser, they all have one thing in common — they hustle for every dollar they e            ...</i><br />Target victim <b>website</b>: <i>usecreditunion.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Refreshment-Services-Pepsi</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20156</link>
<guid>fa29e79105dc1fd3e9a7b54d9ae0e2f1</guid>
<pubDate>Sat, 18 Jan 2025 11:39:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Refreshment-Services-Pepsi</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>890b467df933eb46dfbcf435cc99c7240ca0633518fd039be765e431fbae638a</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 24.01.2025. Refreshment Services Pepsi is a privately-held, independent bottler for Pepsi-Cola products comprised of 7 distribution centers located across the central and southern par            ...</i><br />Target victim <b>website</b>: <i>refreshmentservicespepsi.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kassin--Carrow</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20151</link>
<guid>d9e463c17706da6e0606b5becce78531</guid>
<pubDate>Sat, 18 Jan 2025 01:43:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Kassin--Carrow</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b50ee31f192b8494df4d28c305649d31945484fd5926095aad171032a5651c73</i><br /><br />Threat actor <b>description</b>: <i>At Kassin & Carrow, we strive to give the highest quality personal representatio...</i><br />Target victim <b>website</b>: <i>kassincarrow.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>gonzalesusd.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20154</link>
<guid>e783341675cac1206faad107698f1b48</guid>
<pubDate>Sat, 18 Jan 2025 00:38:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>gonzalesusd.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b2265c647dd49bfdccf67ada4f6138df70bb1eec27882591df6576c86281d9fd</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] I'm sorry for the confusion but gonzalesusd.net is not a company. It's actually the domain for the Gonzales Unified School District in Gonzales, California, primarily responsible for all public education in the city. It incorporates various levels of education including elementary, middle, and high school. It works to create enriching, engaging environments for students, teachers and staff.</i><br />Target victim <b>website</b>: <i>gonzalesusd.net</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gossett-Motor-Cars</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20153</link>
<guid>950c4761e0ce26395c319950de90f0d1</guid>
<pubDate>Fri, 17 Jan 2025 21:34:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Gossett-Motor-Cars</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19e127337eaa82a736de66c87e46419085112b176e861dad644ec9e596d22713</i><br /><br />Threat actor <b>description</b>: <i>Al Gossett, president of Gossett Motor Cars, along with his brother David and son Brian, believe that building strong relationships starts with treating others the way you would like to be treated. "We will never take for granted the employees and customers who have contributed to our success," says Al Gossett. "We encourage and train our employees to understand the importance of building mutually respectful relationships not only with all of our valued customers, but with each other, as well."</i><br />Target victim <b>website</b>: <i>www.gossettmotorcars.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kilgore-College-kilgore.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20139</link>
<guid>3ff35d5b17f95d78ffcf8e465f1b6019</guid>
<pubDate>Fri, 17 Jan 2025 03:12:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Kilgore-College-kilgore.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8838c666e0c4a41486fcb9a3971d2ad4882392be51cc5c0490e9225498ce3a9e</i><br /><br />Threat actor <b>description</b>: <i>Kilgore Economic Development Corporation is an organization founded in 1990 and funded by a dedicated sales tax approved by voters. The mission of KEDC is to enhance a business climate that is conducive to job creation and retention improving the standard of living for Kilgore residents.</i><br />Target victim <b>website</b>: <i>kilgore.edu</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Washington-Gastroenterology-DHSWA.NET</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20143</link>
<guid>9c75bab0f5d964591655e73e7c22c540</guid>
<pubDate>Fri, 17 Jan 2025 01:05:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Washington-Gastroenterology-DHSWA.NET</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9fd9c8990c204caebd4d04fd0bb9588643aa04154a92eb2e4418188add286c5</i><br /><br />Threat actor <b>description</b>: <i>Washington Gastroenterology (WAGI) was formed with the merger of three western Washington-based gastroenterology (GI) practices: Digestive Health Specialists (based in the Tacoma/South Puget Sound region), along with Northwest Gastroenterology Associates and Overlake Internal Medicine Associates - Gastroenterology (both based in the Bellevue/Eastside area). Launched on January 1, 2018, WAGI is now the largest, most comprehensive private GI practice in Washington state. Our story includes a rich history of providing superior GI care for nearly five decades, combined with a vision of collaboration and innovation, in a new practice dedicated to extraordinary patient care now and into the future.</i><br />Target victim <b>website</b>: <i>washgi.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>peponline.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20142</link>
<guid>a7fddb9c43e310c9554eacfa196eba3e</guid>
<pubDate>Fri, 17 Jan 2025 01:01:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>peponline.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e04d7e385a1cd1d3f246f78fb99e446362d3088748f096abf68ecc2703d50c8</i><br /><br />Threat actor <b>description</b>: <i>People Encouraging People is an organization driven by our core values. Our programs provide a wide range of services , from rehabilitation, to assistance for the deaf and blind, to residential and vocational ventures aimed at assimilating our clients into the community. </i><br />Target victim <b>website</b>: <i>peponline.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Taylor-Regional-Hospital-thcg.local</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20141</link>
<guid>94a63c28036769847b9597e0dd7abb1c</guid>
<pubDate>Fri, 17 Jan 2025 00:58:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Taylor-Regional-Hospital-thcg.local</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>40e5ebfe033e523ff01a1c57ee659a2150723eed087d2ffd5f418cbe5bf3b341</i><br /><br />Threat actor <b>description</b>: <i>Taylor Regional Hospital is a private, not-for-profit acute care facility governed by a self-perpetuating Board of Trustees located in Hawkinsville, Georgia. We continue to set the trend among health care providers in the Middle Georgia area.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>platinumcollision.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20138</link>
<guid>5fd3864b73ab0f55a568774e589ccfcf</guid>
<pubDate>Thu, 16 Jan 2025 22:14:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>platinumcollision.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b584ce65100b26a9f83c6229032a5955ab64e89156e97cf0c5de593abb230683</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Platinum Collision is a reputed automotive repair company specializing in car body repair and paint services. They provide high-quality restorative solutions to vehicle owners, promising excellent craftsmanship, advanced equipment, and certified technicians. They ensure full collision repairs in line with vehicle manufacturer standards. Customer satisfaction, consistency in deliverance and commitment to quality makes Platinum Collision a preferred choice for many.</i><br />Target victim <b>website</b>: <i>platinumcollision.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Woodlake</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20137</link>
<guid>caad81ebb701ccc8e872e601af4f56d1</guid>
<pubDate>Thu, 16 Jan 2025 18:25:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Woodlake</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9865718e1c12418d7c9d08c3d64c24ea54cc75ebfff7e4c42323fff35f3c6ee0</i><br /><br />Threat actor <b>description</b>: <i>EMRs,Test Results,Patient’s History,Patient’s private information,Billing information etc.Total volume data : 180GBCompany representative should follow the instructions to contact us before time runs outhttps://woodlakecenter.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Delta-Dental-of-Washington</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20130</link>
<guid>6147246665001872dd5a886d418f990c</guid>
<pubDate>Thu, 16 Jan 2025 11:42:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Delta-Dental-of-Washington</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4de48c0cded2378ebf2f5d2500c6cd68bbe84f2818bddf0c057b555702831c7d</i><br /><br />Threat actor <b>description</b>: <i>Delta Dental of Washington is one of the leading dental insurance organizations in the United States. It provides a wide range of insurance plans for individuals, families, retirees, as well as for small and large businesses. The company strives to improve the oral health and overall health of its customers by offering affordable and convenient dental services.https://www.deltadentalwa.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Prestige-Maintenance-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20124</link>
<guid>737233cb87dfe0e7b5525a1b7ecc112c</guid>
<pubDate>Wed, 15 Jan 2025 22:49:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Prestige-Maintenance-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0af70c4db29054b2be9e2d3d1aa20ce905e21a674415a13a75247d44c4d2bfb5</i><br /><br />Threat actor <b>description</b>: <i>Prestige Maintenance USA company betrays cleaning services both in the industrial and in the private sector. Prestige Maintenance USA corporate office is located in 1808 10th St Ste 300, Plano, Texas, 75074, United States and has 3,000 employees. </i><br />Target victim <b>website</b>: <i>prestigeusa.net</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>safecoastseafoods.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20122</link>
<guid>1fa94bd27600d8fc326e8c9cc285847e</guid>
<pubDate>Wed, 15 Jan 2025 22:47:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>safecoastseafoods.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2a879e4aeb474185a317595586176ef22c44e6eec6eb1b5e76d7b142750d984</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Safecoast Seafoods is a premium seafood sourcing and distribution company. They are focused on delivering the highest quality fresh and frozen seafood to various markets. They partner with sustainable fisheries worldwide, ensuring they offer a wide variety of species. Their services include wholesale distribution, home delivery and even private labeling, meeting the needs of restaurants, markets, and individual consumers alike.</i><br />Target victim <b>website</b>: <i>safecoastseafoods.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>combinedpoolandspa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20115</link>
<guid>2b795a1bc79c65ed1e8693a24834e664</guid>
<pubDate>Wed, 15 Jan 2025 21:29:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>combinedpoolandspa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52af242e96951dabb504429a61fea6cd0fd0f64eba595b60b0b527e1335260c2</i><br /><br />Threat actor <b>description</b>: <i>USA - Combined Pool and Spa</i><br />Target victim <b>website</b>: <i>combinedpoolandspa.com</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>AKConstructors.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20112</link>
<guid>ae8fae5681609a2556741d9528afacc6</guid>
<pubDate>Wed, 15 Jan 2025 20:47:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>AKConstructors.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19c63b5602aef92eb858716962f17d5ba6c6be1dde162f4f400b84b829e2ff4a</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] AK Constructors is a construction firm specializing in commercial, residential, and industrial projects. The company provides reliable service, utilizing advanced technology and innovative approaches for client satisfaction. Their seasoned team ensures quality workmanship and timely completion of projects. Services offered include project management, design, renovation, and repair services. Their commitment to quality and sustainability makes AK Constructors a leading construction company.</i><br />Target victim <b>website</b>: <i>AKConstructors.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lowe-Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20110</link>
<guid>c6852f035cd6c4c21c3fc2ef8496f759</guid>
<pubDate>Wed, 15 Jan 2025 20:45:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Lowe-Engineers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ea0f9671af166bbd0e0d2ec1217c1ee35fddbc80613e2e57561a19fea202442</i><br /><br />Threat actor <b>description</b>: <i>The full intimate photos of IT director Loweengineers(Linda Messing) as well as ...</i><br />Target victim <b>website</b>: <i>loweengineers.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>fplfood.com675MUSA21GBlt1-DISCLOSED</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20111</link>
<guid>c94faaa101a638cffe3889f532b98b7c</guid>
<pubDate>Wed, 15 Jan 2025 18:54:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>fplfood.com675MUSA21GBlt1-DISCLOSED</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b461079c144c582675deffffa7aa2130f9ed3ad32b4c96c2a69dff224339d807</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>anwsd.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20104</link>
<guid>7c2f946d218016c9a87d721e301a61a7</guid>
<pubDate>Wed, 15 Jan 2025 10:49:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>anwsd.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97e4ea2ae73ca37a33d04cbc01274ba489fe6ca20873609df6d6cd91a86fdef7</i><br /><br />Threat actor <b>description</b>: <i>Our district is comprised of Vergennes Union Elementary School (K-6), Ferrisburgh Central School (K-6), Addison Central School (K-6) and Vergennes Union High School (7-12). We are conveniently located between Burlington and Middlebury communities...</i><br />Target victim <b>website</b>: <i>anwsd.org</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>optiline.com127.3MUSA947GBlt1-DISCLOSED</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20102</link>
<guid>b6d6956cc1fc1e8fb824782187fb6b09</guid>
<pubDate>Wed, 15 Jan 2025 06:55:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>optiline.com127.3MUSA947GBlt1-DISCLOSED</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b76ff9731edab06db77d0d05b0a21c851f2062ab48289836c8c10289043a989</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>jgele.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20101</link>
<guid>64590d156b97b39b8015a7f506a67af2</guid>
<pubDate>Wed, 15 Jan 2025 00:29:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>jgele.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1639d1ba304ec782c40aae73147d47795f7437040af5dca911cb1d748a76c80f</i><br /><br />Threat actor <b>description</b>: <i>USA - J.G. Electrical Installations</i><br />Target victim <b>website</b>: <i>jgele.com</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>AVI-Southeast</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20098</link>
<guid>f0d7cd6a8d00b6d0a18533c5975731fd</guid>
<pubDate>Tue, 14 Jan 2025 22:03:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>AVI-Southeast</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>406f6cf9a4e7dbcd2782f71d657a0e4335231052bde10807a017a948b8820fcb</i><br /><br />Threat actor <b>description</b>: <i>AVI Southeast is a wholly owned audio visual system integrator with over 20 years of experience with design, installation and top customer support throughout the Southeast and United States. AVI corporate office is located in 9675 W 76th St Ste 130, Eden Prairie, Minnesota, 55344, United States and has 1,000 employees. </i><br />Target victim <b>website</b>: <i>avisystems.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Chicano-Federation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20096</link>
<guid>0ce68201e60fced9cfb32a41b575afa4</guid>
<pubDate>Tue, 14 Jan 2025 16:51:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>The-Chicano-Federation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30f3e638a20b4473e1c61a0fea7c85deb19b7b6ad4cee0ab974b4d84ac34b6b1</i><br /><br />Threat actor <b>description</b>: <i>The Chicano Federation The Chicano Federation is a leading nonprofit in the region and has worked towards the benefit of all San Diegans since 1969.</i><br />Target victim <b>website</b>: <i>chicanofederation.org</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wynnewood-High-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20081</link>
<guid>131e28c946ec1e010dc02a8f53cec237</guid>
<pubDate>Tue, 14 Jan 2025 13:41:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Wynnewood-High-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd26700407e15eaebdf86b979cc7444b2816eec7eb8403fdc1293c2a25daf0f5</i><br /><br />Threat actor <b>description</b>: <i>Wynnewood High School is part of the Wynnewood Public Schools district in Wynnewood, Oklahoma. The district is dedicated to fostering independence, accountability, and a passion for learning. The school aims to provide students with a well-rounded education by focusing on their physical, emotional, social, and academic development through high expectations and meaningful relationships.https://www.wynnewood.k12.ok.us/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>WPD.WOODPORTDOORS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20085</link>
<guid>9a3e594b26056b67a02cac0e510393d1</guid>
<pubDate>Tue, 14 Jan 2025 13:41:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>WPD.WOODPORTDOORS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0fd89b048a0adec45e6bc2a2f0645a45dac73e909bcfc9265f8970829b816a6e</i><br /><br />Threat actor <b>description</b>: <i>Woodport Doors offers more than 40 wood species. View the full list of standard ...</i><br />Target victim <b>website</b>: <i>WOODPORTDOORS.COM</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>QualiTech-qualitech.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20086</link>
<guid>105773e3edc76ba90bb1d60913dffddf</guid>
<pubDate>Tue, 14 Jan 2025 13:41:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>QualiTech-qualitech.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4782e76f0b9ac290f2194945985013206d6c045678d0a2837d17b32e4e8c6cab</i><br /><br />Threat actor <b>description</b>: <i>QualiTech Environmental provides consulting, training, equipment and support to ...</i><br />Target victim <b>website</b>: <i>qualitech.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kinseth-Hospitality-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20087</link>
<guid>ed47c903ad66558cbdb749e44bc89b1b</guid>
<pubDate>Tue, 14 Jan 2025 13:41:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Kinseth-Hospitality-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f2a794f4df6216e87fd454d162b4f7113ebd7aecea854a6f9be6e5c6074cc5fb</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1957 and headquartered in North Liberty, Iowa, Kinseth Hospitality Co...</i><br />Target victim <b>website</b>: <i>kinseth.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Douglas-County-GA-DDCWSA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20088</link>
<guid>94b2b0f4b6764b8bca29501e0b26cc2c</guid>
<pubDate>Tue, 14 Jan 2025 13:41:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Douglas-County-GA-DDCWSA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7f0809be6d0974a19e2fd52bca75c61fff466a80bf1e9bf358b3b6661e70abb</i><br /><br />Threat actor <b>description</b>: <i>The Douglasville-Douglas County Water and Sewer Authority delivers quality water...</i><br />Target victim <b>website</b>: <i>DDCWSA.COM</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Beyond79</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20089</link>
<guid>489dca82b123cc23aa7500ea13028679</guid>
<pubDate>Tue, 14 Jan 2025 13:41:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Beyond79</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>afc74f114d560b1aa3188575745c0dcc688e5a418ba43f581c4b13cec93c2539</i><br /><br />Threat actor <b>description</b>: <i>Welcome Beyond79 is a community of committed jewelry professionals dedicated to the cultivation of passionate customers by delivering the ultimate online jewelry experience. We are ready to upload a lot of private documents such as: SSNs, contact numbers and e-mail addresses of employees and customers, internal financial documents, confidential correspondence, internal financial documents, etc.</i><br />Target victim <b>website</b>: <i>beyond79.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>PJs-Rebar</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20091</link>
<guid>8ac462c3beb1a7bb86506bb0218c55af</guid>
<pubDate>Tue, 14 Jan 2025 13:41:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>PJs-Rebar</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22699cc239692bd6b1f3c43fff57ddef12e4a0eb9ca64918c706ab95237c1668</i><br /><br />Threat actor <b>description</b>: <i>Rebar supply & preassembly company that is focused on pre-assembled, fabricated, and stock rebar in all grades and sizes.We are ready to upload more than 40 GB of private corporate documents including: contact numbers and e-mail addresses of employeesand customers, internal financial documents, etc.</i><br />Target victim <b>website</b>: <i>pjsrebar.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>pittman-construction.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20078</link>
<guid>0841e501109ad2474e51874dc351bd2b</guid>
<pubDate>Tue, 14 Jan 2025 12:41:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>pittman-construction.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3bf2c30f66f547c0141ed5430eb69dbbe384faf3a13e2f30cc4ccedcad582cd</i><br /><br />Threat actor <b>description</b>: <i>Pittman Construction Company, based in Conyers, has been a pivotal player in the construction industry for over a century. Established in 1884, the company has a rich history of contributing significantly to infrastructure development in Atlanta and...</i><br />Target victim <b>website</b>: <i>pittman-construction.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-University-of-Oklahoma-ou.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20095</link>
<guid>ad720f99a3b6ea189d9c352217bd3028</guid>
<pubDate>Tue, 14 Jan 2025 12:31:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>The-University-of-Oklahoma-ou.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18b8a304666988c7c7b4a2e09eeaf947dda5f6c7a56ec3b69b9ce8fadb4897b1</i><br /><br />Threat actor <b>description</b>: <i>91 MB</i><br />Target victim <b>website</b>: <i>ou.edu</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>SciTech-Services-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20094</link>
<guid>97550c51d72fe06f777c5a41404c940c</guid>
<pubDate>Tue, 14 Jan 2025 12:30:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>SciTech-Services-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7e0311cd5a15112a394b6cd1e0c23689260de7f55243705ca3711b5731db4747</i><br /><br />Threat actor <b>description</b>: <i>15 GB</i><br />Target victim <b>website</b>: <i>scitechinc.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Buttery-butterycompany.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20093</link>
<guid>f45fe3f64d37932f037761c6bf9a46db</guid>
<pubDate>Tue, 14 Jan 2025 12:29:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Buttery-butterycompany.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a1ce0e8dc76caded45a0b3bef4e1a146e730556a0df55b6e7dff66696683237</i><br /><br />Threat actor <b>description</b>: <i>1.7 GB</i><br />Target victim <b>website</b>: <i>butterycompany.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Union-Studio</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20079</link>
<guid>f9b2c114ad004e341ac06bdb07c62fda</guid>
<pubDate>Tue, 14 Jan 2025 11:44:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Union-Studio</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e227fb34c3cc9f0c3c0a55d38fbbc79840ae9b94f974768951ad46611168015</i><br /><br />Threat actor <b>description</b>: <i>Union Studio is a growing Providence, RI-based office of 12 designers, architects and planners focused on the design of exceptional New Urbanist communities.We are ready to upload more than 38 GB of private corporate documents such us: driver licenses, employee licenses, HR documents, COVID-19 screening information, contact numbers and e-mail addresses of employees, passports, etc.</i><br />Target victim <b>website</b>: <i>unionstudioarch.coms</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Thilges--Bernhardt-Attorneys-at-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20076</link>
<guid>fbca336e199c90d72670d50eb650d42a</guid>
<pubDate>Tue, 14 Jan 2025 10:42:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Thilges--Bernhardt-Attorneys-at-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9d13afaa178e7c52f19766ab94460c5cadc4abf0ba6850155af70bd7b407d1e2</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 19.01.2025. The firm was founded in 1991 by J. Bradley Short and Ray L. Borth, now retired. Our firm now has four attorneys, all dedicated exclusively to family law with collectively             ...</i><br />Target victim <b>website</b>: <i>tandblawfirm.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Solaris-Pharma</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20068</link>
<guid>cd3ae697a7a2f79d3909f2f6c41b51c7</guid>
<pubDate>Tue, 14 Jan 2025 01:37:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Solaris-Pharma</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1ff69225c793c3ead65cefffb26acf5938dfe8e290a52dacc447c75c4b055bf</i><br /><br />Threat actor <b>description</b>: <i>The Solaris Pharma internal network was attacked by our group. During the incident, more than 400 GB of internal important data were exfiltrated to our servers, including internal and confidential information, as well as contract information To restore access to files and prevent the publication of internal documents A company representative should contact us using […]</i><br />Target victim <b>website</b>: <i>solaris-pharma.com</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Onecare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20074</link>
<guid>00053f5e11d1fe4e49a221165b39abc9</guid>
<pubDate>Tue, 14 Jan 2025 00:34:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Onecare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b25b6d5404244527e00bfce0dc591fbadeb85730ef98f0d8ad5567b86e02d5b</i><br /><br />Threat actor <b>description</b>: <i>ONE CARE provides a range of supportive care services that enable seniors and people with disabilities to enjoy better quality of life as they age at home. ONE CARE Home & Community Support Services is a community based, charitable, not-for-profit health organisation providing supportive care to families in Huron and Perth Counties and surrounding area. The agency was formed in 2011 when three long standing Huron and Perth organisations came together as ONE CARE</i><br />Target victim <b>website</b>: <i>onecaresupport.ca</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Imperial-Valley-Respite-ivrespite.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20071</link>
<guid>ac539936ccf02065d63dbae632df5d4a</guid>
<pubDate>Tue, 14 Jan 2025 00:30:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Imperial-Valley-Respite-ivrespite.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29ad17970dfb853827a102a02c56b0fb073ad0734cd7a6358d9e8ff11b431e13</i><br /><br />Threat actor <b>description</b>: <i>Caregiving is demanding, and Imperial Valley Respite is a helpful source to ease the demands of caregiving. IV Respite aims to help families and caregivers in the developmentally disabled community tackle the challenges of providing daily care. IV Respite offers support services to families in need of short-term care for developmentally disabled persons of all ages throughout the Imperial Valley and San Diego.</i><br />Target victim <b>website</b>: <i>ivrespite.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>oyolasvegas.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20056</link>
<guid>b1823297adf46a9cadba8244c11655ad</guid>
<pubDate>Mon, 13 Jan 2025 22:43:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>oyolasvegas.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0043de9af253651815cb5291a2f2de805a2d9c859317a6ad45eb5b1e23460749</i><br /><br />Threat actor <b>description</b>: <i>OYO Las Vegas Hotel and Casino (fka Hooters Casino Hotel)</i><br />Target victim <b>website</b>: <i>oyolasvegas.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Browdy-bl.local</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20064</link>
<guid>b689e747d1360e42e9dbb90fa68d9e83</guid>
<pubDate>Mon, 13 Jan 2025 21:42:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Browdy-bl.local</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbbf5b5a57100012778ed4fe3eb0e8a4547c5ccf6dfd73361baab3c3c766f220</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2002, FisherBroyles, LLP is a full-service law firm with offices acro...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>PHG-CPAs-bushman.biz</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20065</link>
<guid>039b9f5c48fb1bbea76b82b43d43ea74</guid>
<pubDate>Mon, 13 Jan 2025 21:42:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>PHG-CPAs-bushman.biz</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b0c136c19b388f3c659203d3155455e2a3ebaf4be8fadd181f2934e867b601a7</i><br /><br />Threat actor <b>description</b>: <i>Prince Hansen Group, PLLC is a CPA firm in Salt Lake City offering a complete ra...</i><br />Target victim <b>website</b>: <i>bushman.biz</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nash-Brothers-Construction-nashdom.local</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20066</link>
<guid>5e7b46caa9a02a3e3af097af5d27fab5</guid>
<pubDate>Mon, 13 Jan 2025 21:42:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Nash-Brothers-Construction-nashdom.local</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>622fbd8cdc66b8e0ec4b9be5a53c76635b12e9fbfd4318da5a93cea7cbbd1843</i><br /><br />Threat actor <b>description</b>: <i>Founded in the 1890's, Nash Brothers Construction Company, Inc., has been dedica...</i><br />Target victim <b>website</b>: <i>nashbrothers.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>healthcarewithinreach.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20055</link>
<guid>05d9badacfacac78a47cc067c4e90353</guid>
<pubDate>Mon, 13 Jan 2025 18:53:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>healthcarewithinreach.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df98a10a3a6ae965e6a30b1e27706ea0a041eba9b14879f41230714df711f7b0</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Healthcarewithinreach.org is a not-for-profit organization dedicated to promoting accessible healthcare services for all. They strive to educate and advocate for health justice, focusing on marginalized communities and individuals facing barriers to healthcare. Their approach includes creating awareness about policy and practice changes and providing resources to aid more accessible healthcare provision.</i><br />Target victim <b>website</b>: <i>healthcarewithinreach.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>DURAYDUNCAN.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20050</link>
<guid>e7a791ef7b3cccca6510dcc82ac48291</guid>
<pubDate>Mon, 13 Jan 2025 15:35:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DURAYDUNCAN.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b20350e0e48ac90e4045d8fcb685c77e8efaf1060962c2e3b88aa704931bffa9</i><br /><br />Threat actor <b>description</b>: <i>J.F. Duncan is one of the largest commercial kitchen food service equipment designers, suppliers and installation providers in the nation.</i><br />Target victim <b>website</b>: <i>DURAYDUNCAN.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>mi.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20049</link>
<guid>f9d15850234291f8df6f03c468fb5cc7</guid>
<pubDate>Mon, 13 Jan 2025 13:05:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>mi.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>117f235582438d0ebd539cae948bd95c350a8d870c55b41e56b25a82ffa959b1</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Mi.edu, or the Musicians Institute, is a reputable music school established in 1977. Located in Hollywood, California, it offers a variety of music degrees and programs, including in performance (guitar, bass, drums, keyboard, or vocals), audio engineering, music business, and film. The institute has a connective approach, helping students develop their skills within the industry. It's known for fostering a community of creative collaboration among students.</i><br />Target victim <b>website</b>: <i>mi.edu</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jim-Thompson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20043</link>
<guid>1cea227cb2ca29383f916aef863a2dd8</guid>
<pubDate>Sat, 11 Jan 2025 17:42:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Jim-Thompson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8767fd8643884330ff70742ec47e9bf4e77145474c96240a39fc24eb7e94d9bb</i><br /><br />Threat actor <b>description</b>: <i>No brand spells heritage like Jim Thompson, The Thai Silk Company founded in 195...</i><br />Target victim <b>website</b>: <i>jimthompson.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>cityofwesthaven.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20025</link>
<guid>73b0224bc6bcf2334b92e18bf15ef7e9</guid>
<pubDate>Sat, 11 Jan 2025 12:41:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>cityofwesthaven.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f4031cba142837d056280715801a42ba6eb2fe5b7efc8a761f79e643b268303f</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 19.01.2025. West Haven occupies 10.6 square miles with over 22,000 house-holds. 
Its urban shoreline setting provides excellent recreation, a divers housing community and a growing b            ...</i><br />Target victim <b>website</b>: <i>www.cityofwesthaven.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>pleasantsconstruction.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20026</link>
<guid>91d5cf69202ac51fca62d47a43e024fc</guid>
<pubDate>Sat, 11 Jan 2025 12:41:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>pleasantsconstruction.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7888242347a8d85dedc1f177d3b2ed5a9e4cea193166f67e8724a306c746f3de</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 19.01.2025. Pleasants Construction, Inc. was founded by William D. Pleasants, Jr. to continue the operations of the Company founded by his father, William D. Pleasants, Sr. Pleasants             ...</i><br />Target victim <b>website</b>: <i>www.pleasantsconstruction.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>T.-Hasegawa-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20042</link>
<guid>c4bb5a353be47442aa65df4e7ec64cae</guid>
<pubDate>Sat, 11 Jan 2025 12:27:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>T.-Hasegawa-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5cc4712b0306b45b42c20b577e8bf14f2eaa0d4667d22b399f109efec18b49e1</i><br /><br />Threat actor <b>description</b>: <i>Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>www.thasegawa.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Barber-Specialties</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20041</link>
<guid>91024559c37865feea27551343dfafe8</guid>
<pubDate>Sat, 11 Jan 2025 12:26:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Barber-Specialties</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f02dd24c9414e419c2795db8068ff555393fc359c34b3dcfefee806049948c77</i><br /><br />Threat actor <b>description</b>: <i>Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>www.barberspec.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Costex</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20040</link>
<guid>b3a153ec4be947cbee37d78cead6552b</guid>
<pubDate>Sat, 11 Jan 2025 12:24:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Costex</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e817c8db9ae5a3e2c2b8a9b7f829c6c18ec2694df411e1e2a82a65fc82cb07e</i><br /><br />Threat actor <b>description</b>: <i>Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>www.costex.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Unisource-Information-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20036</link>
<guid>a0e60a138fbb31f5fbea2fb761e30c69</guid>
<pubDate>Sat, 11 Jan 2025 12:20:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Unisource-Information-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9c0fb48c539f5401d67c3af13860387d425d7464383e6eabd34ae3b64f63e2f</i><br /><br />Threat actor <b>description</b>: <i>Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>www.unisourcejv.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>schuff.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20035</link>
<guid>2fe4b13d9f35cdcf8083d1525b42c81c</guid>
<pubDate>Sat, 11 Jan 2025 11:35:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>schuff.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1494976b3ce1ef419ad9fcac3677bf4b9e2d26b99035793bfce1dcaaa535a21</i><br /><br />Threat actor <b>description</b>: <i>Schuff Steel Company is one of the largest structural steel fabrication and erection companies in the United States, founded in 1976 by Dave Schuff and his son, Scott. The company specializes in providing comprehensive services for commercial and industrial construction projects, including high-rise buildings, sports arenas, hospitals, and more.SITE: www.schuff.comADDRESS:
3003 N. Central Avenue, Suite 1500
Phoenix, AZ 85012
United StatesTEL#: (602) 252-7787ALL DATA SIZE: ≈800gb
1. Financial data
2. Personal employees data, docs, forms…
3. Confidential, NDA’s
4. Engeneering, Projects, Drawings…
& etc…</i><br />Target victim <b>website</b>: <i>schuff.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>plasmatherm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20033</link>
<guid>93fbe03d0e7b762d188a63f89bc1b75f</guid>
<pubDate>Sat, 11 Jan 2025 11:30:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>plasmatherm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d690a96360063c3fdbb873e776377f1579b7a1a4175d5306f223e8fb703289a</i><br /><br />Threat actor <b>description</b>: <i>Plasma-Therm is a prominent global manufacturer specializing in advanced plasma-processing equipment, particularly for the semiconductor industry. Established over 50 years ago, the company provides essential technologies such as etching, deposition, and plasma dicing, which are integral to various applications including semiconductor packaging, solid-state lighting, MEMS (Micro-Electro-Mechanical Systems), and renewable energy.SITE: www.plasmatherm.comADDRESS:
10050 16th Street North
Saint Petersburg, FL 33716
United StatesTEL#: +1 (727) 577-4999ALL DATA SIZE: ≈1.5tb+
1. Financial data, Accounting
2. Contracts, Confidential, NDA’s
3. Home folders, Personal employees data
4. CAD, Projects, Drawings
5. Human Resources
6. R&D, Engeneering
7. Customers data
& etc…</i><br />Target victim <b>website</b>: <i>plasmatherm.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>migonline.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20029</link>
<guid>cc0c03944d54e6fb0a27aa25d3c43dfc</guid>
<pubDate>Sat, 11 Jan 2025 11:23:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>migonline.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5db217383bb4d1bc5507f45e2ca07ea4a61d9ef6991cb07d2cb6b699f8cbe36</i><br /><br />Threat actor <b>description</b>: <i>Mortgage Investors Group (MIG) is a prominent mortgage lender based in the Southeast United States, specifically established in 1989 in Knoxville, Tennessee. The company specializes in providing a variety of home financing solutions, including conventional and government-backed loans, aimed at making homeownership accessible and enjoyable for its clients.SITE: www.migonline.comADDRESS:
8320 E Walker Springs Ln Ste 200
Knoxville, Tennessee, 37923
United StatesTEL#: (865) 691-7714ALL DATA SIZE: ≈1.5tb+
1. Financial data, Accounting
2. Contracts, Loans data
3. Home folders, Personal employees and clients documents
4. Personal clients(customers) data and documents
5. Personal forms
6. Confidential data
& etc…</i><br />Target victim <b>website</b>: <i>migonline.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sheyenne-Tooling--Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20023</link>
<guid>99a805bc0d0845bf489b9b09ad69ea30</guid>
<pubDate>Fri, 10 Jan 2025 20:57:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Sheyenne-Tooling--Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bfafe3bf9a0775103a506ab5bfb6aea9da33fe0f4d4a95f66ca724a53541180f</i><br /><br />Threat actor <b>description</b>: <i>Sheyenne Tooling & Manufacturing
Sheyenne Tooling & Manufacturing of Cooperstown, North Dakota was founded in 1977 with the goal of becoming a highly regarded regional tool and die manufacturer. Since then, the family owned business has established a reputation as a precision component manufacturer for some of the biggest names in American agriculture including Bobcat, John Deere and CNH. Our Tele-Boom, Tele-Fork, Double Quick Tach Grapple and the rest of our short line of unique and innovative skidsteer attachments are designed and built to meet our customers high quality and performance expectations.Geo: USA - Leak size: 134 GB Archive - Contains: Files, SQL</i><br />Target victim <b>website</b>: <i>sheyennemfg.com</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ichikawa-North-America-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20021</link>
<guid>573572e4e9a8486a02fbc7eeeaffba7b</guid>
<pubDate>Fri, 10 Jan 2025 18:51:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Ichikawa-North-America-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>023b0fa1a4b4200d971df73668ed9e1f66ba8f423491288c4af392011ca29239</i><br /><br />Threat actor <b>description</b>: <i>Ichikawa Co., Ltd. manufactures and sells paper making and indust
rial felts in Japan and internationally.

We are ready to upload some private corporate documents including
: internal financial documents, confidential agreements, customer
contact phone numbers and e-mails, SSNs. employee contacts, driv
er licenses etc. 
</i><br />Target victim <b>website</b>: <i>ik-felt.co.jp</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Thomas-J.-Henry-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20020</link>
<guid>60c75132dc4a848c0e2c0caa4df8df19</guid>
<pubDate>Fri, 10 Jan 2025 18:15:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Thomas-J.-Henry-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4dd8e7413092defcade316a6144a0ca188e476f1c2dfb3bf5fa9bf8ee75493fc</i><br /><br />Threat actor <b>description</b>: <i>Thomas J. Henry Law is one of the largest personal injury law fir
ms in Texas, handling all types of personal injury claims and rep
resenting clients in mass torts, product liability, child injurie
s, and whistleblower defense cases.

We have obtained over 4 Tb of private corporate documents includi
ng: NDAs, SSNs, passports, driver licenses, confidential medical 
information, medicare documents, contact numbers and e-mail addre
sses of employees and customers, personnel incident reports etc. 
We can put this information freely available at any time.
</i><br />Target victim <b>website</b>: <i>thomasjhenrylaw.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>amerplumb.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20015</link>
<guid>20e3c52b6204040da78744a257a6dc73</guid>
<pubDate>Fri, 10 Jan 2025 16:51:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>amerplumb.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>16873c236876e7e51507635ddac009911dfab6f5094fea8692c3692e8c9bcc46</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Amerplumb.com is a reliable and high quality plumbing services provider, serving clients in and around Hilliard, Ohio. The company offers a broad range of services including residential plumbing, commercial plumbing, repairs, installation, water treatment and more. The company is insured, bonded, and licensed, with a team of skilled professionals providing prompt and efficient solutions for all plumbing issues.</i><br />Target victim <b>website</b>: <i>amerplumb.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>OmniRide-omniride.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20014</link>
<guid>6c6b56eeda970754d230cbfb815779b0</guid>
<pubDate>Fri, 10 Jan 2025 12:20:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>OmniRide-omniride.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c101598212279aac6c324afa0b66f6866ac5d136a057a0091bee348b61ac61c</i><br /><br />Threat actor <b>description</b>: <i>7.2 GB</i><br />Target victim <b>website</b>: <i>omniride.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.leaguecenter.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20010</link>
<guid>21adc1868d67ad76612abec6167046e4</guid>
<pubDate>Fri, 10 Jan 2025 00:44:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.leaguecenter.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>95e98940c354203304735b2d3b1115bc7559c024b9f30fbacc0d26fcf49247f0</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] The League Education & Treatment Center is a non-profit organization based in Brooklyn, New York. It provides comprehensive services to children and adults with psychiatric and developmental disabilities, including autism. It offers a broad range of programs including early childhood education, day treatment programs, a Korean program, and adult services to foster independent living.</i><br />Target victim <b>website</b>: <i>www.leaguecenter.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.primalwear.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20005</link>
<guid>8381872fa17f9dcb5fdb58802461c46e</guid>
<pubDate>Fri, 10 Jan 2025 00:32:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.primalwear.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ea2fe9850e9ecc5f2538e5a8eeccb5c966d81761ac0ec720258cc925b1618b9</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Primal Wear, Inc. is a US-based company, founded in 1992, widely known for producing high-quality cycling apparel. They offer a broad range of cycling gear including jerseys, shorts, outerwear, and accessories for both men and women. Primal Wear specializes in advanced fabrics and innovative designs, focusing on comfort and performance enhancement. They advocate for cycling through partnerships with various events and organizations.</i><br />Target victim <b>website</b>: <i>www.primalwear.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>depewgillen.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19999</link>
<guid>64ce463c6856e0e3867dea50033e8a29</guid>
<pubDate>Thu, 09 Jan 2025 22:52:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>depewgillen.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d743a5478783d283eabd23602d1d657bdbdd333e549774c8bf5fc3a0e4fd3de</i><br /><br />Threat actor <b>description</b>: <i>files</i><br />Target victim <b>website</b>: <i>depewgillen.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>drive-lines.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20000</link>
<guid>d9798cdf31c02d86b8b81cc119d94836</guid>
<pubDate>Thu, 09 Jan 2025 19:04:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>drive-lines.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ae75b59ef64535552923e45aa1d7d36b6cb242bb425c29fd8898209562dbf6f</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Drive-Lines.com is a company that specializes in providing advanced technological solutions for motion control and power transmission. They offer a diverse product range including gearboxes, torque limiters, screw jacks, line shafts, and couplings. With a strong attention to innovation and quality, they cater to various industries such as automotive, food & beverage, packaging, pharmaceutical, and many more.</i><br />Target victim <b>website</b>: <i>drive-lines.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rent-2-Own</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19997</link>
<guid>4372e2ba2d04ea409b6d4a391641f938</guid>
<pubDate>Thu, 09 Jan 2025 15:58:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Rent-2-Own</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3804d11b8ce089ec4482d0a1fba13ce1f9940552a4defe6bda41c7c6880a00e7</i><br /><br />Threat actor <b>description</b>: <i>Rent-2-Own has rent to own furniture, rent to own TV, rent to own computers, and we rent appliances too. 32 Ohio and Kentucky rental stores. Rent 2 Own corporate office is located in 1369 W Ohio Pike, Amelia, Ohio, 45102, United States and has 360 employees.</i><br />Target victim <b>website</b>: <i>r2o.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Northern-Lights-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19984</link>
<guid>eb852fa9d9e60316fa715602baf5bc05</guid>
<pubDate>Thu, 09 Jan 2025 14:41:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Northern-Lights-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8543c7b8250421e096904a846a41d64a0aa1a2478aa9d60cdf1325688f939b05</i><br /><br />Threat actor <b>description</b>: <i>Northern Lights Electric installs electric vehicle chargers, recessed lighting, and generators.We are ready to upload some of private corporate documents including: driver licenses, employee personal licenses, contact numbersand e-mail addresses of employees and customers etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>bendixengineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20045</link>
<guid>745c7d75786602f3105a69845316ff61</guid>
<pubDate>Thu, 09 Jan 2025 09:38:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusalocker</b> claims attack for <b>bendixengineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81c5ec41ddccd80766a58d67e99e2f4b3f55953b3d0df8770f5ec9b8c164eab8</i><br /><br />Threat actor <b>description</b>: <i>Descriptionemployee information – agreement – customer email(.xls)-.msg outlook files Data-2016-2024 years Price-$50000 (sale in one hand there are options for making a profit from these files will be included in the deal</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusalocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Press-Color</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19980</link>
<guid>81517079882bbb04ab3b2c1fb244f336</guid>
<pubDate>Wed, 08 Jan 2025 17:43:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Press-Color</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b5775d377f0c4b9bf9c5396d04f67432222ecd3fbeed67c935f153f67fa15265</i><br /><br />Threat actor <b>description</b>: <i>Press Color, Inc. (PCI) is a privately held Wisconsin based printing ink manufacturer of flexographic and offset inks.  Incorporated over sixty years ago, PCI offers total solutions for the printing and converting industry.We are ready to upload a lot of private corporate documents including: NDAs, driver licenses, HR documents, contact numbers and e-mail addresses of employees and customers, internal financial documents, SSNs etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Huntington-Hotel-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19979</link>
<guid>9f5a14374960400c7f537198d1e26acd</guid>
<pubDate>Wed, 08 Jan 2025 14:49:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>termite</b> claims attack for <b>Huntington-Hotel-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0d785a33f3c1f915740f5b7d47c74ad6aa48c63bea16de7d895b86fa0310858e</i><br /><br />Threat actor <b>description</b>: <i>Huntington Hotel Group was founded in 1998 by Kevin Keefer and Brent Andrus with the vision of developing and managing premium brand select service hotels in markets with high barriers to entry. 
</i><br />Target victim <b>website</b>: <i>www.huntingtonhotelgroup.com</i>]]></description>
<category>termite</category>
</item>
<item xmlns:dc='ns:1'>
<title>fwmep.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19978</link>
<guid>0c4c93af131c294eb21bd79fd3c8b8f3</guid>
<pubDate>Wed, 08 Jan 2025 13:02:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>fwmep.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22db8c295f642f52dd610787acad8ab6395b203c63bc94acb810127651649906</i><br /><br />Threat actor <b>description</b>: <i>The Family Medicine Center, in partnership with the Fort Wayne Medical Education Program, has been serving the Fort Wayne community since 1967. During this time, we have developed a proven Patient Centered Medical Home model, built on the foundation of passionate, evidence-based care 66 GB</i><br />Target victim <b>website</b>: <i>fwmep.edu</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Surface-Combustion</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19975</link>
<guid>df667161a3ae432b669e7879e676a70b</guid>
<pubDate>Wed, 08 Jan 2025 12:46:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Surface-Combustion</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a68658f82a6cb555bde6628cd2a16ecb1e6a232c86e9a4f0979708845c988d90</i><br /><br />Threat actor <b>description</b>: <i>Surface Combustion, Inc. is a highly respected producer of thermal processing equipment, headquartered in Maumee, Ohio.We are ready to upload more than 20 GB of private corporate documents including: contact numbers and e-mail addresses of employeesand customers, SSNs, driver licenses, HR documents, confidentialagreements etc.</i><br />Target victim <b>website</b>: <i>surfacecombustion.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Slawson-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19976</link>
<guid>bb1124c56b5b89bfb34edc03bbdcf161</guid>
<pubDate>Wed, 08 Jan 2025 12:46:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Slawson-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c209c0ba8bae34ec9c22e39702082049f9a2e0c1276c4c165060a4a433bbbdf3</i><br /><br />Threat actor <b>description</b>: <i>Slawson Companies is a community builder that has diversified into commercial and residential real estate development, restaurants, and hotels. We are ready to upload more than 20 GB of private corporate documents including: driver licenses, NDAs, credit cards info, internal financial documents, vaccination certificates, contact numbers and e-mail addresses of employees and customers etc.</i><br />Target victim <b>website</b>: <i>slawsoncompanies.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>General-Digital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19973</link>
<guid>e7af19935015fb11dedb9fbb2955f880</guid>
<pubDate>Wed, 08 Jan 2025 03:19:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>General-Digital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b56a2d175498ae6513267f334ec5f94a9ba848540d3956d85abc2a04edf2a64</i><br /><br />Threat actor <b>description</b>: <i>We design, develop, integrate, test and deliver the world’s most reliable displays, technology products, and software services.We bring over 50 years of experience in display manufacturing, product development, and software engineering, and match that with today’s latest technology—and a relentless focus on engineering what’s next.Our team of Embedded Systems Engineers—a diverse group of focused, experienced electrical, software development, and IV&V test engineers—is flexible enough to tackle almost any engineering project, from product conceptualization to production delivery, and anywhere in between. https://generaldigital.com/</i><br />Target victim <b>website</b>: <i>generaldigital.com</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>astaphans.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19970</link>
<guid>279d610d31be813168e80dbf1558dcf1</guid>
<pubDate>Tue, 07 Jan 2025 22:47:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>astaphans.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c273990397be10b91227adf1ee0f7d2263f348edb223b46f05aa53b6740e3e8</i><br /><br />Threat actor <b>description</b>: <i>Astaphans : - Super Centre Home & Building Centre Gift Card Auto Centre Shop by Brand dominica, wholesale, dominica auto centre, online supermarket.</i><br />Target victim <b>website</b>: <i>astaphans.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lake-Shore-Public-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19957</link>
<guid>d0231cd3ec12768a73c40062ca8eda79</guid>
<pubDate>Tue, 07 Jan 2025 17:44:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Lake-Shore-Public-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4623b4e7af472e80956d742a33cdfc5bd33aaf88813f8aceccd834f0a9c32266</i><br /><br />Threat actor <b>description</b>: <i>Lake Shore Public Schools is a school district located in St. Clair Shores, Michigan, USA. The district includes six schools and serves about 3,339 students. The district consists of three elementary schools, one middle school and two high schools. The district's mission is to provide quality education in a safe and supportive environment, preparing students for success in a global society.
The district offers a variety of educational programs, including early childhood, continuing and community education, and supports 51 sports teams. LakeShore Public Schools strives to inspire, innovate, and celebrate achievement, as reflected in their guiding principles.
https://www.lakeshoreschools.org/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>CED-Solutions-Computer-IT-Training-Centers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19959</link>
<guid>762dd577d6ff90976d1269075d4ebae5</guid>
<pubDate>Tue, 07 Jan 2025 17:44:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>CED-Solutions-Computer-IT-Training-Centers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>95203b4c66007612a5e373028eee2a92f3afec1c458816395e7f200b6be2c09b</i><br /><br />Threat actor <b>description</b>: <i>CED Solutions is a company specializing in providing IT training and certifications, including courses on Microsoft, Cisco, CompTIA and other leading technologies. They offer a variety of learning formats, including face-to-face classes, online courses, and webinars, with flexible payment options.
cedsolutions.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bergstrm-Wines</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19964</link>
<guid>41c831141b8539bbbfc233928f6bf831</guid>
<pubDate>Tue, 07 Jan 2025 17:44:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Bergstrm-Wines</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e97e9b17a2f55576b4cdace424ab885f88405ac2b7ee8f87a8cdd5f6a20ec3d</i><br /><br />Threat actor <b>description</b>: <i>Bergström Wines is a family—owned winery founded in 1996 in Willamette Valley, Oregon. The company produces wines from grapes grown in environmentally friendly wineries. The wine reflects the peculiarities of the region and seasonality, with an emphasis on natural agriculture. Bergström Wines aims to create a wine that helps reveal the beauty of this place and brings joy to people.
bergstromwines.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Drivestream</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19965</link>
<guid>0d0dd06a746311e36ca0766cfe2b1b15</guid>
<pubDate>Tue, 07 Jan 2025 17:43:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Drivestream</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a30a69f683361d1e1cfedb21f009bb5def6b533255601f41e5cbd4827f9c48d</i><br /><br />Threat actor <b>description</b>: <i>Drivestream is a management and IT consulting firm specializing in migrating the enterprise business processes of large and mediumsized businesses to the Cloud.We are ready to upload more than 80 GB of private corporate documents including: SSNs, family contacts, contact numbers and e-mailaddresses of employees and customers, driver licenses, passportsetc.</i><br />Target victim <b>website</b>: <i>drivestream.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Drywall-Partitions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19966</link>
<guid>061f193d29d6ec5b5c02ed242396c2a7</guid>
<pubDate>Tue, 07 Jan 2025 17:43:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Drywall-Partitions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>acad03d51e77e85bb06fdfdd15d4f81b2a0835715c7deee571fba5fe7ec7ee8d</i><br /><br />Threat actor <b>description</b>: <i>Drywall Partitions, Inc. is a commercial drywall construction firm building new and remodel projects with special emphasis on tenant finish build-outs. We are ready to upload a lot of private corporate documents including: internal financial documents, inside corporate correspondence, SSNs, contact numbers and e-mail addresses of employees etc.</i><br />Target victim <b>website</b>: <i>drywallpartitions.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>AAA-Environmental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19967</link>
<guid>b60adcb70283fea07596c9a73ddfb899</guid>
<pubDate>Tue, 07 Jan 2025 17:43:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>AAA-Environmental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7ef595f24834cdab82cd6822bed0355604eaf4af72807b0ebac18f1f94edfb9</i><br /><br />Threat actor <b>description</b>: <i>AAA Environmental provides environmental training, industrial hygiene, safety, online classes, and consultation services.We are ready to upload a lot of private corporate documents including: internal financial documents, employee medical documents, contact numbers and e-mail addresses of employees and customers, family contacts, medicare information, driver licenses, credit card information, SSNs etc.</i><br />Target victim <b>website</b>: <i>aaaenvironmental.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>u0-Excel-Transportation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19954</link>
<guid>7fd1b2b2c47abff68e7300061e48039b</guid>
<pubDate>Tue, 07 Jan 2025 16:22:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>u0-Excel-Transportation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>68939ab4237efb54c6370eba5cf06e019c7ebb9fb757dad0254dfeb31b0db770</i><br /><br />Threat actor <b>description</b>: <i>We obtained a vast amount of personal and sensitive data about Excel Transportat...</i><br />Target victim <b>website</b>: <i>exceltransportation.ca</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>D-7-Roofing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19953</link>
<guid>9b2e864a22f3750ac5d751c90d9a9ef7</guid>
<pubDate>Tue, 07 Jan 2025 13:06:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>D-7-Roofing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b107a430369b22198f3695dd3e83e79a7708e6882d7af9efec400e148e5ee8ef</i><br /><br />Threat actor <b>description</b>: <i>Financial documents, accounting</i><br />Target victim <b>website</b>: <i>d7roofing.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Muscogee-County-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20106</link>
<guid>1e199ccc0d3a8aed6c1effd016e3c9d1</guid>
<pubDate>Tue, 07 Jan 2025 12:01:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>Muscogee-County-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87d9313e807b9bbaed66baba44484704e54ab8b8352b1d41861ccfba3c0af9c9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>muscogee.k12.ga.us</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>BBB-Industries-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=20105</link>
<guid>a50a2f182d52fe132a296a3cedc58fd5</guid>
<pubDate>Tue, 07 Jan 2025 12:00:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>BBB-Industries-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d6b270c19dd8cda270c207d01e1c0f0967851923a3888a1a2b25d146bfa7e98</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>bbbind.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sunflower-Medical-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19952</link>
<guid>26a307361de9f093e261c8c94d7814c0</guid>
<pubDate>Tue, 07 Jan 2025 10:53:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Sunflower-Medical-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0fb7e5f23631775779e289d8ebf7dde9f52b98c1a9bea67a0d2854fa2cc1514b</i><br /><br />Threat actor <b>description</b>: <i>Sunflower Medical Group With only 7 days to spare, take the opportunity to bet on exclusive, unique, and impressive data. More than 400 thousand driver's licenses, insurance cards, social security numbers. Sql base is more than 3TB. Open your wallets and get ready to buy exclusive data. We sell only to one person, no resale, you will be the only owner!</i><br />Target victim <b>website</b>: <i>sunflowermed.com</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>VELSOL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19950</link>
<guid>610f2db734ee5a5fdaa55e579e33c351</guid>
<pubDate>Mon, 06 Jan 2025 18:52:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>VELSOL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9b28e699c32e40d7f927abfbf0d43de81bde1302f1ffa7c0cc8f8685128e565</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "VELSOL.COM" is a technology company specializing in providing software solutions and services. It caters to businesses of varied sizes and offers comprehensive solutions designed to streamline operating procedures and increase business efficiency. The firm's offerings range from enterprise-level software application development to IT consulting, digital transformation, cloud services and more. VELSOL.COM is recognized for its innovative solutions and cutting-edge technologies.</i><br />Target victim <b>website</b>: <i>VELSOL.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>WSINC.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19949</link>
<guid>2db57e442e48e8860facef49e0a8f2dc</guid>
<pubDate>Mon, 06 Jan 2025 18:50:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>WSINC.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fca65bed114df734691206a2428c4ff0467fbdb94e703fc3c5cf1c605f6ee1a8</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] WSINC.COM is a logistics company based in North America that aims to provide practical and successful supply chain solutions. They specialize in warehouse management, supply chain consulting and transportation brokerage services to maximize operational efficiency. Their field of experience spans across various industries such as retail, manufacturing, and healthcare.</i><br />Target victim <b>website</b>: <i>WSINC.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Maverick-Constructors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19945</link>
<guid>618b8f8031405754a8c4219c1b8c905e</guid>
<pubDate>Mon, 06 Jan 2025 16:39:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Maverick-Constructors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb3827fe1cf1be8f5f502df0120e25ba063834ef50425e8c89f1df135f31392b</i><br /><br />Threat actor <b>description</b>: <i>MAVERICK CONSTRUCTORS, LLC is a construction company based out ofLutz, Florida, United States.We are ready to upload more than 35 GB of private corporate documents including: financial data (audits, payment details, reports), contact numbers and e-mail addresses of employees and customersetc.</i><br />Target victim <b>website</b>: <i>maverickconstructors.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>A-Bar-A-Ranch</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19946</link>
<guid>d5204d936db2e5df8f78a58f7bcf7248</guid>
<pubDate>Mon, 06 Jan 2025 16:39:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>A-Bar-A-Ranch</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>37e638445a57fb4ca892831118f3141cd39e0224dafdb394c5a716654a645bc5</i><br /><br />Threat actor <b>description</b>: <i>Along the banks of the North Platte River, in the heart of southern Wyoming’s Medicine Bow Mountains, lies the A Bar A Ranch. Established in 1922, it is one of the oldest guest ranches in the country. It is also one of the largest, with nearly 100,000 acres for guests and staff to explore.We are ready to upload a lo of private corporate documents including: financial data (audits, payment details, reports), contact numbers and e-mail addresses of customers and employees, insurancedocuments, lease agreements etc.</i><br />Target victim <b>website</b>: <i>abararanch.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bluegrass-Ingredients</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19942</link>
<guid>f4e4b6af8c2d1b0e2111b045201aebc3</guid>
<pubDate>Mon, 06 Jan 2025 14:40:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Bluegrass-Ingredients</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b26d7d23bfeed782fe2d71f6c98244ba29699cb8bbaccd22f71d48dd5299a18d</i><br /><br />Threat actor <b>description</b>: <i>Bluegrass helps leading brands and flavor houses concept, test and produce the custom flavors and formulations they need to stay ahead.We are ready to upload more than 45 GB of private corporate documents including: NDAs, SSNs, financial data (audits, payment details, reports), contact numbers and e-mail addresses of employees etc.</i><br />Target victim <b>website</b>: <i>bluegrassingredients.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hunter-Taubman-Fischer--Li</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19937</link>
<guid>2c65c703e76038d3dee71ea44a8aad74</guid>
<pubDate>Sun, 05 Jan 2025 14:41:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Hunter-Taubman-Fischer--Li</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e0d1f3a08327cff0a44b9232ddf78a3dea7b7c013329c6377b4c224dee08e7b</i><br /><br />Threat actor <b>description</b>: <i>A lot of confedential data will be published within 2 days
 
 The data contains ...</i><br />Target victim <b>website</b>: <i>htflawyers.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Veccio-and-Company-PLLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19936</link>
<guid>0b8072450ee555897c3d4221a569b5fb</guid>
<pubDate>Sun, 05 Jan 2025 04:40:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Veccio-and-Company-PLLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c79ba10065efcdf8afb37468636be16605ca3b52c30c2499f2d02b8c200cf935</i><br /><br />Threat actor <b>description</b>: <i>Accounting company from West Virgina refused to cooperate with us, to keep confidential private records of their clients, whose data was leaked due to poor IT an irresponsibility of management
Company was warned twice that publication will h            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>datascan.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19929</link>
<guid>aa8f7e46ca13ec4051e4b358eb9273ac</guid>
<pubDate>Sat, 04 Jan 2025 13:01:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>datascan.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>719eaa6d586e2bfa94a560aef0340cc82d621f7fc4670e24703bd710c3bcf6ce</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>Auxis</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19931</link>
<guid>e6bfd79be503e98ee35900cc07b0d5eb</guid>
<pubDate>Sat, 04 Jan 2025 11:38:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apos</b> claims attack for <b>Auxis</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f20e698da74372387b63ad476ec282897c74d0918e5dcad3b03555ef88bf23f6</i><br /><br />Threat actor <b>description</b>: <i>🌐 www.auxis.com💲 162500000📍 United States</i><br />Target victim <b>website</b>: <i>www.auxis.com</i>]]></description>
<category>apos</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.smawins.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19927</link>
<guid>38ed9e617aa706f41e1dcf58352dc01c</guid>
<pubDate>Sat, 04 Jan 2025 09:40:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.smawins.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a9d78feb76111f59dd5f80a64d2a6c5f85c0efe159a280a06773048d5df5329</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 13.01.2025. SM&A, founded in 1982 as Steven Myers & Associates, is a defense and aerospace consulting firm located in Irvine, California. The founder of SM&A is Steven Myers. In 2008             ...</i><br />Target victim <b>website</b>: <i>www.smawins.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>lscd</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19895</link>
<guid>9a60f48f5298395dc0d6e0cf062d8cd7</guid>
<pubDate>Sat, 04 Jan 2025 08:44:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>lscd</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c832259986fe8043aff8a93072afb5dbf650830e863c6cee3502d970d9bca842</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 11.01.2025. What is The Legal Services Corporation of Delaware, Inc. (LSCD)? LSCD is a non-profit organization that offers legal advice and assistance to people who cannot afford a pr            ...</i><br />Target victim <b>website</b>: <i>www.lscd.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>YorkTest-Laboratories</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19896</link>
<guid>294579d00ba8c23043734592c26ce40e</guid>
<pubDate>Sat, 04 Jan 2025 08:43:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>YorkTest-Laboratories</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2940847276cc1a7054b2ea3ae63e63313b8624b4564ad01fb04d275d26036fb1</i><br /><br />Threat actor <b>description</b>: <i>All data of this company will be available for download on 11.01.2025. YorkTest is one of the UK's market leaders in Home Health Testing, best known for their food sensitivity and intolerance tests which are backed by 38 years of scientific r            ...</i><br />Target victim <b>website</b>: <i>www.yorktest.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.alliancemat.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19894</link>
<guid>a5e9eeab9a92ab47c09a40ee4e5b299e</guid>
<pubDate>Fri, 03 Jan 2025 14:49:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.alliancemat.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2753a3850d074a0124724b5c618a989ab582eb7da419e5dd4991fd882ba46f3e</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] AllianceMat is a company specializing in providing high-quality floor matting solutions. They offer a diverse range of products designed for various environments, including commercial, industrial, and residential spaces. Their mats are known for durability, safety, and aesthetic appeal, aiming to enhance both functionality and appearance. AllianceMat is committed to customer satisfaction and innovation in the matting industry.</i><br />Target victim <b>website</b>: <i>www.alliancemat.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Amourgis--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19891</link>
<guid>e5f3045e4478665d73a7f8a89ef4782e</guid>
<pubDate>Fri, 03 Jan 2025 13:39:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Amourgis--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e783a12b5778cb38e2d78ffe924333d65b5315b40e2c8a024faf48da0ebfc68</i><br /><br />Threat actor <b>description</b>: <i>We are a consumer-based personal injury and bankruptcy law firm. That means we n...</i><br />Target victim <b>website</b>: <i>amourgis.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.geedingconstruction.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19890</link>
<guid>c520b0922edc458374f8da29a8e52ee3</guid>
<pubDate>Fri, 03 Jan 2025 10:47:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.geedingconstruction.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7d1b52546dc526dcc144d0237a374c3dde6cd03ef20c8b0e5a16965ceaeb126</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Geeding Construction is a company specializing in construction and renovation services. They focus on delivering high-quality craftsmanship and personalized service to meet clients' needs. Their offerings include residential and commercial projects, with a commitment to using durable materials and innovative techniques. Geeding Construction emphasizes customer satisfaction and timely project completion.</i><br />Target victim <b>website</b>: <i>www.geedingconstruction.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lyons-Specialty-Co.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19889</link>
<guid>bee97a6edf4a7793afcdbb8d30ee67c9</guid>
<pubDate>Fri, 03 Jan 2025 09:42:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Lyons-Specialty-Co.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c09148159d40a10982dfd8fb8cb6530ba3c043f08bf53f7777b7f1f0c4c8962f</i><br /><br />Threat actor <b>description</b>: <i>Independent Grocery Distributor Committed to Your Success in Convenience Store Retail & Foodservice. Where your success matters most. We're a convenience store distributor with over 100 years of experience At Lyons, we’re independent, just like you. And our success comes from your success. Lyons is a wholesale distributor of candy, tobacco, groceries, foodservice, health and beauty care items, automotive supplies, general merchandise, janitorial supplies, and paper goods. Lyons customers consist of convenience stores, grocery stores, and restaurants in Louisiana, Mississippi, Arkansas & Texashttps://lyons-aav.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jay-Enn-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19886</link>
<guid>0fc591c46a8bf39d14d9f87b31cd1fc4</guid>
<pubDate>Fri, 03 Jan 2025 00:40:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Jay-Enn-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9b3aeb6a9fde11b113d2534616c7f1ba84009cf86ae8d046d2f480c2170d7c4</i><br /><br />Threat actor <b>description</b>: <i>Jay Enn is established as a premier supplier providing services for Design, Manufacturing, Assembly, and Certification of Precision Tools, Fixtures, Jigs, Carts and Equipment for Automotive, Aerospace and Defense industries. Jay Enn Corporation is a Facilities Services company located in 33943 Dequindre Rd, Troy, Michigan, United Stateshttps://www.jayenn.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carrollton-Orthopaedic-Clinic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19888</link>
<guid>39225df22de7b1ab2e5cf03d912900b9</guid>
<pubDate>Fri, 03 Jan 2025 00:40:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Carrollton-Orthopaedic-Clinic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ad581670b7b5a17c68d417da32767d8bb33592431eae2703ba45ddbfa1a6a34</i><br /><br />Threat actor <b>description</b>: <i>Ortho West, formally Carrollton Orthopedics, offers a full line of orthopedic care. Serving West Georgia and East Alabama with superior ortho care.https://www.orthowestga.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.metlife.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19875</link>
<guid>bcc04bea0466505ec8495e1fd62b67d9</guid>
<pubDate>Tue, 31 Dec 2024 06:50:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.metlife.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd916489884675443094463c5932c24ad4b0d7571463488c8bbd8c2135893433</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] MetLife is a leading global provider of insurance, annuities, and employee benefit programs. Established in 1868, it offers life, dental, disability, and accident insurance to individuals and groups. Headquartered in New York City, MetLife operates in over 40 countries, serving millions of customers. It focuses on delivering innovative solutions to help clients manage risks and secure their financial futures.</i><br />Target victim <b>website</b>: <i>www.metlife.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Luxury-Yacht-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19872</link>
<guid>898b5da2c62fa1cc9fc1e5c8f204f41f</guid>
<pubDate>Mon, 30 Dec 2024 20:53:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Luxury-Yacht-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a4c759c58e27b3b7fcc1866ee2be00f0b9c35a87e42db65cddee884121f5ff09</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.luxyachts.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bettisworth-North</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19870</link>
<guid>0305650d94e32c656ec55309a8467b4c</guid>
<pubDate>Mon, 30 Dec 2024 18:52:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Bettisworth-North</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8446280798e3c0755a26d516d626db57e3ee62052137b827778f6d672d3f39cb</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.bettisworthnorth.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>McCray-Lumber</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19874</link>
<guid>a1af768d3b16885b8eb893d58712c1ea</guid>
<pubDate>Mon, 30 Dec 2024 18:18:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>McCray-Lumber</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>41f884bf35123fd4502b5b848ab8831aa67ed68c46da5b2813bf3f2c44a9f09b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.mccraylumber.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>starkvillesd.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19866</link>
<guid>538b58f65612127aff09cf6d0d9f5721</guid>
<pubDate>Sun, 29 Dec 2024 23:56:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>starkvillesd.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5ec4825c6abe9e74a93395126e16bea2849c41f784573423e0f23da4132b60e</i><br /><br />Threat actor <b>description</b>: <i>Revenue $9.1 Million</i><br />Target victim <b>website</b>: <i>starkvillesd.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>spiro.k12.ok.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19865</link>
<guid>1b9e56d302be55b44cf3443dcf324bd2</guid>
<pubDate>Sun, 29 Dec 2024 23:55:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>spiro.k12.ok.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7ef5f6ca102e448578ce4e49ddd1a15b60adeb6136be1ae94e32ad7a47587401</i><br /><br />Threat actor <b>description</b>: <i>Revenue $5 Million</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>byronunionschooldistrict.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19864</link>
<guid>ce76bd604997d26b8af5561c84f25517</guid>
<pubDate>Sun, 29 Dec 2024 23:55:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>byronunionschooldistrict.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>43a67d2a51c83b2c4ae707206f82e6a51f791d866d1dc8de583076845ae54d97</i><br /><br />Threat actor <b>description</b>: <i>Revenue $19.3 Million</i><br />Target victim <b>website</b>: <i>byronunionschooldistrict.us</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>dprinvestments.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19862</link>
<guid>b400f98a2d7ae72b97cb87a354ebfb9f</guid>
<pubDate>Sun, 29 Dec 2024 23:52:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>dprinvestments.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d323a03162508e6e08605e2b16febefb6320208d26649d85f1bead252019e5b</i><br /><br />Threat actor <b>description</b>: <i>Revenue $13 Million</i><br />Target victim <b>website</b>: <i>dprinvestments.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Asheville-Eye-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19850</link>
<guid>245ff1b341d75eebae822cc2af5714e2</guid>
<pubDate>Sun, 29 Dec 2024 10:05:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Asheville-Eye-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d038a84a87327c2c655b05a26f1c2d2c53dff8872ea24dd5b31ffb2cf7d982a9</i><br /><br />Threat actor <b>description</b>: <i>Asheville Eye Associates is headquartered in Asheville, North Carolina. The offers services such as, cataract surgery, glaucoma and diabetic vision care, lasik and PRK surgery, full service optical services. The company was founded in 1986.</i><br />Target victim <b>website</b>: <i>ashevilleeye.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Watertown-Public-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19843</link>
<guid>d81ca022ec417e1ea5c92075fdd94504</guid>
<pubDate>Sat, 28 Dec 2024 11:49:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>raworld</b> claims attack for <b>Watertown-Public-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff085770cb2d9908464cd8208f88101f04acd2a91a88de49a07b42126755f0f2</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Watertown Public Schools is a school district located in Watertown, Massachusetts. It serves a diverse community, offering education from pre-kindergarten through 12th grade. The district is committed to fostering an inclusive environment and emphasizes academic excellence, critical thinking, and social-emotional development. Schools include elementary, middle, and high schools, focusing on preparing students for future success.</i><br />Target victim <b>website</b>: <i>watertown.k12.ma.us</i>]]></description>
<category>raworld</category>
</item>
<item xmlns:dc='ns:1'>
<title>Youth-Eastside-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19839</link>
<guid>7b6ce75e5d95acc103465e3522f9d2fd</guid>
<pubDate>Sat, 28 Dec 2024 10:47:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Youth-Eastside-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>187cc0aa01400e55dd7f332b6516bc7ace1953bd58c8637ffd33a66736f30823</i><br /><br />Threat actor <b>description</b>: <i>Since 1968, Youth Eastside Services helped children, teens and families struggling with depression, grief, trauma, substance abuse, anxiety, gender- or cultural-identity issues, behavioral issues, ADHD, and autism. It provides counseling, substance abuse treatment, education and prevention, and psychiatric services in East King County.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>VO-Baker</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19834</link>
<guid>5f6f704230e538d2f853a12817e674e9</guid>
<pubDate>Fri, 27 Dec 2024 14:41:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>VO-Baker</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e09acbe13090cc6951110b1905a38507059d43dccc549390f82d546b2a9ac23d</i><br /><br />Threat actor <b>description</b>: <i>V. O. BAKER COMPANY is a chemicals company based out of 8647 TWINBROOK RD., MENTOR, Ohio, United States.We are ready to upload some private corporate documents including: SSN, contact numbers and e-mail addresses of employees and customers, employee injury reports, internal financial documents etc.</i><br />Target victim <b>website</b>: <i>vobaker.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Primary-Health-Services-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19830</link>
<guid>c75c4ad23ef91601650dee30d5112a87</guid>
<pubDate>Fri, 27 Dec 2024 01:43:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Primary-Health-Services-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b9678b68c194afc7cdca8471e5bd3105b9dcf3ce626f661835f75c759f0254bd</i><br /><br />Threat actor <b>description</b>: <i>Primary Health Services Center (PHSC) is a private, 501(c)(3) nonprofit organization and certified Patient Centered Medical Home incorporated in 1997 by local citizens. As a Federally Qualified Health Center (FQHC) PHSC is involved in community based primary healthcare, offering core primary medical services, OBGYN, pediatric and behavioral health services, including substance abuse counseling and short term therapy, access to dental services, and referrals of chronically mentally ill patients to the local community behavioral health network of mental health providers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ober-Mountain-OberGatlinburg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19827</link>
<guid>2297ae3a852fa1d5e662bbed474f97d5</guid>
<pubDate>Thu, 26 Dec 2024 22:48:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>FOG</b> claims attack for <b>Ober-Mountain-OberGatlinburg.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>014a92ebd90cb8f35e62604e4b6a1af54b62de98d10c74c08f702269be84761f</i><br /><br />Threat actor <b>description</b>: <i>14.3 GB</i><br />Target victim <b>website</b>: <i>OberGatlinburg.com</i>]]></description>
<category>FOG</category>
</item>
<item xmlns:dc='ns:1'>
<title>Family-Help--Wellness</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19826</link>
<guid>5c7556b1a07edd1bd22a23f5bc30284d</guid>
<pubDate>Thu, 26 Dec 2024 20:47:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Family-Help--Wellness</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>70b6659168f745ffee1d9a6341b5fb1ec55d6a8d7bf39d53b6c06378a559dd4e</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>www.famhelp.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>E-Tank</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19823</link>
<guid>52c73af5e80c9b3433c7a72de1c40c16</guid>
<pubDate>Thu, 26 Dec 2024 17:40:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>E-Tank</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>17d830db6886e25fc7d4f688f9bf34762ce694c76e417156ae0345efba7f5916</i><br /><br />Threat actor <b>description</b>: <i>E-Tank is a rental solution for the frac tank, roll-off box, and industrial pump equipment.We are ready to upload more than 100 GB of private corporate documents including: SSNs, driver licenses, passports, contact numbers and e-mail addresses of employees, family information, medical insurance documents etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Charlies-Tax-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19817</link>
<guid>479065c78e0ba7c787a6cf9bcbc8c181</guid>
<pubDate>Thu, 26 Dec 2024 16:39:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Charlies-Tax-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e104fe090b0c2c9179ac2dfbeb8665033f8ef635455f72d4ee0c2a0b039cd393</i><br /><br />Threat actor <b>description</b>: <i>Charlie's Tax Service is an accounting company that provides clients with tax preparation services.We are ready to upload more than 15 GB of private corporate documents including: SSNs, driver licenses, contact numbers and e-mailaddresses of employees and customers etc.</i><br />Target victim <b>website</b>: <i>charliestax.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pinno-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19818</link>
<guid>0c741607da88f09ca91cd2a2f130900d</guid>
<pubDate>Thu, 26 Dec 2024 16:39:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Pinno-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd320303fbf3089210c10695ffbf219db80a86c85cef0aeb9dbfad2d07a746d8</i><br /><br />Threat actor <b>description</b>: <i>Pinno Construction offer all types of construction solutions fromcustom-designed new homes, remodels and additions to window, siding and roofing replacements and even commercial renovations.We are ready to upload more than 10 GB of private corporate documents including: driver licenses, internal financial documents, signed lease agreements, SSNs, contact numbers and e-mail addressesof employees etc.</i><br />Target victim <b>website</b>: <i>pinnobuildings.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ramos-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19819</link>
<guid>7fa77b668578a893653c674b2be3865c</guid>
<pubDate>Thu, 26 Dec 2024 15:40:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Ramos-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>032777839d9190b2f5cfa79bd7e04b710dcc95369e6b61c268ef89dd64c749fd</i><br /><br />Threat actor <b>description</b>: <i>Ramos Law is a personal injury law firm that provides legal support services. Its practice areas include medical malpractice, nursing home neglect, wrongful death, bad faith insurance, litigation, vaccine injury, etc.We are ready to upload more than 15 GB of private corporate documents including: passports, driver licenses, internal financial documents, contact numbers and e-mail addresses of employees and customers etc.</i><br />Target victim <b>website</b>: <i>ramoslaw.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>MLP-Tax--Financial-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19821</link>
<guid>fdf0ac71ca479e1beaeed369d67aec38</guid>
<pubDate>Thu, 26 Dec 2024 15:40:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>MLP-Tax--Financial-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25b62bab43f33d06e5072e1fbce823cf35edcf5dda9caea555e1a7ff9c3c1168</i><br /><br />Threat actor <b>description</b>: <i>MLP Tax & Financial Services, Inc. is an independent firm providing tax and investment management services, including tax planning, return preparation, financial planning, retirement review, educational planning, and estate planning.We are ready to upload a lot of private corporate information including: SSNs, driver licenses, contact numbers and e-mail addresses of employees, corporate financial data, insurance documents etc.</i><br />Target victim <b>website</b>: <i>mlpfinancial.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>McCormick--Priore</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19825</link>
<guid>e40505e7b350e30e53d2b40b58584500</guid>
<pubDate>Thu, 26 Dec 2024 14:04:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>McCormick--Priore</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8983eae8722ff585bff921a38cf0e5eb0028ce2f3ae58cc47b92b35b4c941a43</i><br /><br />Threat actor <b>description</b>: <i>McCormick & Priore is a defense litigation firm known for having the intensity and integrity to go beyond expectations - something we call "outperformance. This includes being large enough to provide the in-depth legal expertise and support clients need and yet focused enough to also provide the individualized attention successful litigation requires
We present to your attention a large collection of SQL databases, confidential data of employees and clients.</i><br />Target victim <b>website</b>: <i>mccormickpriore.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aroma-Housewares-Co-Aromaco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19809</link>
<guid>32f57b05e13cc66c536619f3cda36b39</guid>
<pubDate>Wed, 25 Dec 2024 18:55:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>FOG</b> claims attack for <b>Aroma-Housewares-Co-Aromaco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd3f4fcddcab9c61b026b87e1f4318a6f049a08793fb177fde2fe8fe72e191ea</i><br /><br />Threat actor <b>description</b>: <i>35 GB</i><br />Target victim <b>website</b>: <i>aromaco.com</i>]]></description>
<category>FOG</category>
</item>
<item xmlns:dc='ns:1'>
<title>Inteleca</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19802</link>
<guid>aa7bed7356f6705718a75dda26c26614</guid>
<pubDate>Wed, 25 Dec 2024 14:42:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Inteleca</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34820d458f588f8c75300bb0c385c34c8c59c44a1b94423acab953f40f8f7fed</i><br /><br />Threat actor <b>description</b>: <i>Inteleca has become a trusted partner in providing enterprise organizations with infrastructure and architecture design, hardware procurement, and maintenance services, excelling in the design ofvendor-neutral solutions as well as cutting-edge Optical Networking Solutions. We are ready to upload more than 100 GB of private corporate documents including: NDAs, license agreements, internal financial documents, contact numbers and e-mail addresses of employees and customers, SSNs, HR information, a lot of git project and source code files etc.</i><br />Target victim <b>website</b>: <i>inteleca.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tillamook-Country-Smoker</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19803</link>
<guid>5a87627ce58b6156584c7317e12914e6</guid>
<pubDate>Wed, 25 Dec 2024 14:42:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Tillamook-Country-Smoker</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af8cfa2a38581888d6d5e30b3d5db823db663120961f1fbce172a25d367156ba</i><br /><br />Threat actor <b>description</b>: <i>Tillamook Country Smoker (TCS) is a long-standing producer of high-quality beef jerky and meat sticks distributed primarily through grocery, convenience mass, specialty and e-commerce channels.We are ready to upload more than 14 GB of internal corporate documents including: SSNs, inside financial and medical information, employee contact phones and emails, etc.</i><br />Target victim <b>website</b>: <i>tcsjerky.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>sensualcollection.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19733</link>
<guid>0b9bae10752fcdd26cabd7fab013c7e6</guid>
<pubDate>Wed, 25 Dec 2024 03:14:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>sensualcollection.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2bb95e9b6e5072fc50ff9e52591684018b64eecbc8488b8d4468afdbdd37e036</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] SensualCollection.com is an online retailer specializing in intimate apparel and accessories. The company offers a wide range of products, including lingerie, sleepwear, and romantic accessories, catering to diverse tastes and preferences. With a focus on quality and customer satisfaction, SensualCollection.com aims to provide a discreet and enjoyable shopping experience for individuals and couples.</i><br />Target victim <b>website</b>: <i>sensualcollection.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>polar</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19737</link>
<guid>f1eba978f8a36c92875063b46fd7e3a1</guid>
<pubDate>Tue, 24 Dec 2024 23:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>polar</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>16f214d621d2ae0508e8933b04184925797f4097ea9d392ec64c5ea5b42f2d10</i><br /><br />Threat actor <b>description</b>: <i>guessed victim name: Polaris Industries - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.</i><br />Target victim <b>website</b>: <i>polaris.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>calex</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19738</link>
<guid>a1231cf8c00e5608fc395813fe56afc3</guid>
<pubDate>Tue, 24 Dec 2024 23:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>calex</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>961e7ebd1248caf5be2212373aa860ac68214d3ab43c3cd105fd0eeb4b4d8312</i><br /><br />Threat actor <b>description</b>: <i>guessed victim name: Calex Manufacturing - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.</i><br />Target victim <b>website</b>: <i>calex.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>utili</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19740</link>
<guid>273e185673e56fa2bbd050bb6218b3a3</guid>
<pubDate>Tue, 24 Dec 2024 23:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>utili</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>68c25baa95cf54696d1d3205e0d3607d74919454fc47ece156dba155a16020f8</i><br /><br />Threat actor <b>description</b>: <i>guessed victim name: Utilimaster - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.</i><br />Target victim <b>website</b>: <i>utilimaster.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>spade</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19746</link>
<guid>893c34971be4fe666b596392d7ffdccf</guid>
<pubDate>Tue, 24 Dec 2024 23:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>spade</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>489550c2e8faeb0df100a9775863e2ec5b9fbdc3d5ad61f163c6bbfb0afd9027</i><br /><br />Threat actor <b>description</b>: <i>guessed victim name: Spade Technology - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.</i><br />Target victim <b>website</b>: <i>spadetechnology.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>datac</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19754</link>
<guid>b817f8dad313f809b7e71a53e14a9231</guid>
<pubDate>Tue, 24 Dec 2024 23:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>datac</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c74d5110d4a6fb50546c3108ec3b293a44b2281318dc55dc1eb45010d21100e</i><br /><br />Threat actor <b>description</b>: <i>guessed victim name: Datacore Software - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.</i><br />Target victim <b>website</b>: <i>datacore.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>busin</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19756</link>
<guid>9d72602ab51415fbc2fad50252666445</guid>
<pubDate>Tue, 24 Dec 2024 23:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>busin</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c232ae223bd5ba81e417e03c1fc6af5f083c65e5fe8c89bed5b67940f6cc09eb</i><br /><br />Threat actor <b>description</b>: <i>guessed victim name: Businessolver - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.</i><br />Target victim <b>website</b>: <i>businessolver.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>north</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19758</link>
<guid>ea0d596db885d871c96c206697b4878f</guid>
<pubDate>Tue, 24 Dec 2024 23:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>north</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1cc475cb6fe973dfe3941a7a11035fa01ea09bd1321bbfa0a91f8481ec7fddea</i><br /><br />Threat actor <b>description</b>: <i>guessed victim name: Northrop Grumman - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.</i><br />Target victim <b>website</b>: <i>northropgrumman.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>jomar</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19766</link>
<guid>85bb07bea16780c3974da113d3b0805f</guid>
<pubDate>Tue, 24 Dec 2024 23:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>jomar</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6157fbe7cf3d50b59a7f42817e90d2e73238f963190b269ac7364ab2fe53606</i><br /><br />Threat actor <b>description</b>: <i>guessed victim name: Jomar Valve - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.</i><br />Target victim <b>website</b>: <i>jomarvalve.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>innot</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19769</link>
<guid>9b559e998150214661f26a1ced740688</guid>
<pubDate>Tue, 24 Dec 2024 23:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>innot</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d19d0c7c7c1adc0ef77d8ddb77037b644a5e8f4ba1e999cd7326996ad8caeff</i><br /><br />Threat actor <b>description</b>: <i>guessed victim name: Innotrac - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.</i><br />Target victim <b>website</b>: <i>innotrac.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>sheer</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19770</link>
<guid>ca757ee05fb49e59637cf2f6e22431db</guid>
<pubDate>Tue, 24 Dec 2024 23:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>sheer</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8533c86088a820cc45bec2d47d2f7048e3aba337e41b34f564dc8cd720e693bc</i><br /><br />Threat actor <b>description</b>: <i>guessed victim name: SheerID - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.</i><br />Target victim <b>website</b>: <i>sheerid.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ofs-p</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19771</link>
<guid>4afa2aea8aa76eddf65a3b2c12a8f5f6</guid>
<pubDate>Tue, 24 Dec 2024 23:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ofs-p</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>83916f08a356e973f317f64fcb7131bce2285bfc16c956e1afcb8cda2f8e9433</i><br /><br />Threat actor <b>description</b>: <i>guessed victim name: OFS Brands - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.</i><br />Target victim <b>website</b>: <i>ofs.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>sweet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19772</link>
<guid>074596f2944ba2b35e080177d533733d</guid>
<pubDate>Tue, 24 Dec 2024 23:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>sweet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce80cf5a5b3766d42ccd1ff24e9beeb5551810bc9d76559d676a6b6aff2c1a0b</i><br /><br />Threat actor <b>description</b>: <i>guessed victim name: Sweetwater Sound - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.</i><br />Target victim <b>website</b>: <i>sweetwater.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>premi</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19775</link>
<guid>ffba90305889de903ea9b6a6ec4376d9</guid>
<pubDate>Tue, 24 Dec 2024 23:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>premi</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c62f3a9110906fca84a169c765c13adbedf1d7fd4b7de8a32b7d11ae3e814353</i><br /><br />Threat actor <b>description</b>: <i>guessed victim name: Premier Inc. - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.</i><br />Target victim <b>website</b>: <i>premierinc.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>datad</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19776</link>
<guid>d95514e752a8834f5eaf8a04d75200a2</guid>
<pubDate>Tue, 24 Dec 2024 23:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>datad</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9dab580b90619dc282e3e131dc54d087fa63a7cb03030e073c5729120e30bc4e</i><br /><br />Threat actor <b>description</b>: <i>guessed victim name: Datadog - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.</i><br />Target victim <b>website</b>: <i>datadoghq.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>break</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19777</link>
<guid>09f2eee3a1a8cf447291c883dc09ff4e</guid>
<pubDate>Tue, 24 Dec 2024 23:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>break</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a707093d35a9bd29badc9227e22f7024d75b3538d82881bdd6f5f5a085c90260</i><br /><br />Threat actor <b>description</b>: <i>guessed victim name: Breakthru Beverage Group - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.</i><br />Target victim <b>website</b>: <i>breakthrubev.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>iceri</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19778</link>
<guid>9d203879c2650125412c8c1e894be590</guid>
<pubDate>Tue, 24 Dec 2024 23:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>iceri</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9ac8e8b173af9d40ae3b0b3f12363f6b94eb9d37a6978f3f97611899d984059</i><br /><br />Threat actor <b>description</b>: <i>guessed victim name: Icertis - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.</i><br />Target victim <b>website</b>: <i>icertis.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>thoms</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19781</link>
<guid>cfbb42c99e65131d097db1bd8a8d2d1f</guid>
<pubDate>Tue, 24 Dec 2024 23:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>thoms</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47d150a205689aea9ee10679cef36cfea0a2585a114f7f2ce93ed06b7a4427c3</i><br /><br />Threat actor <b>description</b>: <i>guessed victim name: Thomson Reuters - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.</i><br />Target victim <b>website</b>: <i>thomsonreuters.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>steel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19785</link>
<guid>1be7e085f5416cb9b7bbee08b506ae4a</guid>
<pubDate>Tue, 24 Dec 2024 23:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>steel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d009ee719a13905beb890938735857108898ab1cf33def7524d0c5be4d5c5aa9</i><br /><br />Threat actor <b>description</b>: <i>guessed victim name: Steel Technologies - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ciera</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19786</link>
<guid>9c58cf4d9f49eb265e8b7f6f8c8c2434</guid>
<pubDate>Tue, 24 Dec 2024 23:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ciera</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f038dfeba003c9f5a0397f3742cce0848e4dd51adc7e6fbe2f55d9c93667dea</i><br /><br />Threat actor <b>description</b>: <i>guessed victim name: Ciera Network Systems - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.</i><br />Target victim <b>website</b>: <i>cieranetworks.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>weste</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19794</link>
<guid>ad790ea10ae2aeda7d2e7657b71bc671</guid>
<pubDate>Tue, 24 Dec 2024 23:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>weste</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>88f600498111b7831dcf5a83afcfd53702456a787344d9971a8f394e083ec8ef</i><br /><br />Threat actor <b>description</b>: <i>guessed victim name: Western Digital - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.</i><br />Target victim <b>website</b>: <i>wdc.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>datat</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19795</link>
<guid>80b684a68f08b78f660352dd6437b60b</guid>
<pubDate>Tue, 24 Dec 2024 23:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>datat</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bce06667f20716f4740f741a7980adab27a3c0a9f8a5ccb88506f74ee7a1f8f0</i><br /><br />Threat actor <b>description</b>: <i>guessed victim name: Datatech - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.</i><br />Target victim <b>website</b>: <i>datatech.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>blueyonder.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19799</link>
<guid>7c9a78d4cbeacba4b35f3b445d01f055</guid>
<pubDate>Tue, 24 Dec 2024 23:05:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>blueyonder.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>02d34811d33a7f148cdfad450ac36bd9e4270cba6d43ceef32b89524844c095d</i><br /><br />Threat actor <b>description</b>: <i>guessed victim name: Blueyonder - Blue Yonder = Validated ✅ - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.</i><br />Target victim <b>website</b>: <i>BLUEYONDER.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SeaLandAire-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19731</link>
<guid>d5a92a68f9af953b26eafb935a054ce7</guid>
<pubDate>Tue, 24 Dec 2024 22:49:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>SeaLandAire-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d8c525ea85813b961d93cd75e554a1d549a85b0a9294ced3c1362b055214a391</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>www.sealandaire.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Good-Neighbors-Credit-Union</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19727</link>
<guid>f7228691a270b4fc188b61b3868140d1</guid>
<pubDate>Tue, 24 Dec 2024 13:41:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Good-Neighbors-Credit-Union</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc01974ba0f93c493a95f57ba6b36ff65c96ce029fc0cd1806169989cdabe7af</i><br /><br />Threat actor <b>description</b>: <i>Good Neighbors Credit Union is a financial service based banking agency that provides loans, insurance to various financial services.We are ready to upload a lot of private corporate documents including: inside financial information, contact numbers and e-mail addresses of customers and employees, SSNs, HR documents, family information,  NDAs, driver licenses etc.</i><br />Target victim <b>website</b>: <i>goodneighborscu.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kern-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19723</link>
<guid>dacb0ad1b87a47e298cfd44e57bba042</guid>
<pubDate>Tue, 24 Dec 2024 06:43:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Kern-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>326e4e75dacd4617bde942614ae400c8ee0099dc03f0aea6263dcc967d41aea2</i><br /><br />Threat actor <b>description</b>: <i>Site: kernservices.net
														Industry: Business Services
														GEO: USA</i><br />Target victim <b>website</b>: <i>relations.Geo</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>Farrar--Ball</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19719</link>
<guid>100d401be2079ef59caeaa7094fe9df4</guid>
<pubDate>Tue, 24 Dec 2024 01:42:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Farrar--Ball</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5df31069061e88e6a8b8361e3e4b3a2a5c8a8ad79f51006d4b5d1ce9435bc7d9</i><br /><br />Threat actor <b>description</b>: <i>Confidential information of clients and the company</i><br />Target victim <b>website</b>: <i>fbtrial.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>acwlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19710</link>
<guid>aca49daec57b423d08d2462a1bc90413</guid>
<pubDate>Mon, 23 Dec 2024 22:42:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>acwlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0fcb9cc03478cb7ec5e07d2f27f1a1ba49404125b8aeb7e40e1340c44c525737</i><br /><br />Threat actor <b>description</b>: <i>ACW Law is committed to Building the Bridge to Your Future. We are passionate about achieving the best outcomes for our clients. Our mission is to work with you to identify your desired destination, and then work tirelessly to get you there.</i><br />Target victim <b>website</b>: <i>acwlaw.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>tsebrakes.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19704</link>
<guid>ea9d1c73e9ecc56335af6f93697fb258</guid>
<pubDate>Mon, 23 Dec 2024 19:41:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>tsebrakes.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6d58d1c93a6c75d7647e49d80c17f9610eadd6cd847008ff660aa58960438c9a</i><br /><br />Threat actor <b>description</b>: <i>As a global player in the heavy-duty trucking industry, TSE utilizes an extensive technical support, sales, and distribution network to supply spring brakes for drum and disc brake applications in more than 30 countries worldwide. This global perspec...</i><br />Target victim <b>website</b>: <i>tsebrakes.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>marmon-herrington.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19705</link>
<guid>84e17d99a1e885b374d0cb2e25d7aa4b</guid>
<pubDate>Mon, 23 Dec 2024 19:41:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>marmon-herrington.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60f50f39f6e0ca5ff757d6b023f6acf6d6ccaba722a2e13c156bbbdad0d359dd</i><br /><br />Threat actor <b>description</b>: <i>Marmon-Herrington offers a full-range of durable axles and transfer cases for trucks and specialized vehicles, along with OEM solutions and installation kits.</i><br />Target victim <b>website</b>: <i>marmon-herrington.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.semfin.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19717</link>
<guid>0f417ef3a1e9bd0abb2388fe9e97c400</guid>
<pubDate>Mon, 23 Dec 2024 19:24:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.semfin.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b46dedc6ff5aa216eba1a441a05c0b88b725094c12885fe1cf49d613c62e9622</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Certainly! SEMFIN is a company specializing in financial services, offering solutions tailored to meet the diverse needs of businesses and individuals. Their expertise spans areas such as investment management, financial planning, risk assessment, and strategic consulting. With a focus on personalized service, SEMFIN aims to empower clients to achieve their financial goals through innovative and reliable advice.</i><br />Target victim <b>website</b>: <i>www.semfin.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>awimc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19718</link>
<guid>799dc6a895ca80f6cdb228012f7bf6fc</guid>
<pubDate>Mon, 23 Dec 2024 18:56:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>awimc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7ca948244da7873f1a47f4d99db46a7ad579420f8366c0138f7992d643805a19</i><br /><br />Threat actor <b>description</b>: <i><p>Real Estate.<br><br>“AWI Management Corporation is a highly experienced property management firm specializing in providing property management services for owners and developers of affordable housing. AWI is dedicated to providing its clients with exceptional service and experienced representation with an emphasis on integrity, dependability and competence.”<br><br>Website: <a href="https://www.awimc.com/">https://www.awimc.com/</a><br><br>Revenue : $102.7M<br><br>Address: 120 Center St At, Auburn, California, 95603, United States<br><br>Phone Number: (530) 745-6170<br><br><mark class="marker-yellow"><strong>Download link #1:</strong></mark> &nbsp;<a href="https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/AWIMC/PROOF/">https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/AWIMC/PROOF/</a><br><br><mark class="marker-yellow"><strong>Mirror:</strong></mark> <a href="https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/AWIMC/PROOF/">https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/AWIMC/PROOF/</a><br><br><mark class="marker-yellow"><strong>DATA DESCRIPTIONS:</strong></mark> Personal Identifiable Information (both employees and tenants), financial documents, executives and employees personal data, customer personal information, corporate confidential data and correspondence, etc.</p><p><img src="/uploads/Viscaya_104_B_2022_CYC_511ad07183.png" alt="Viscaya 104B 2022 CYC.png"><img src="/uploads/205_2_A_Olivia_Nunez_1st_year_1_e281462669.png" alt="205-2A Olivia Nunez 1st year (1).png"><img src="/uploads/M_Burke_drivers_license_2b1616965e.png" alt="M.Burke drivers license.png"><img src="/uploads/T_Williams_drivers_license_066490993e.png" alt="T.Williams drivers license.png"><img src="/uploads/De_Leon_Itzel_13e0a36d02.png" alt="De Leon, Itzel.png"></p></i><br />Target victim <b>website</b>: <i>awimc.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>galatachemicals.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19714</link>
<guid>950603cf46817ee4e320b2db79be5a71</guid>
<pubDate>Mon, 23 Dec 2024 17:45:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>galatachemicals.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4b9bd0f19b21f1a2cf71e8f40c9a7004bb8d1ff5045bfdf7c711558a7e333af1</i><br /><br />Threat actor <b>description</b>: <i><p>Chemicals &amp; Related Products.<br><br>“We are a leading producer and supplier of PVC, CPVC, Engineering Thermoplastics, and Polyolefin Additives, serving many industries worldwide, including Building and Construction, Packaging, Medical, and Automotive from our manufacturing facilities spanning three continents.”<br><br>Website: <a href="https://www.galatachemicals.com/">https://www.galatachemicals.com/</a><br><br>Revenue : $100M<br><br>Address: 3 Harborside Plaza 10 Ste 307, Jersey City, New Jersey, 07302, United States<br><br>Phone Number: (609) 421-1040<br><br><mark class="marker-yellow"><strong>Download link #1:</strong></mark> &nbsp;<a href="https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/GALATA/PROOF/">https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/GALATA/PROOF/</a><br><br><mark class="marker-yellow"><strong>Mirror:</strong></mark> <a href="https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/GALATA/PROOF/">https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/GALATA/PROOF/</a><br><br><mark class="marker-yellow"><strong>DATA DESCRIPTIONS:</strong></mark> Personal identifiable information (including top managers), personal and corporate confidential data, correspondence, customer documents, engineering data, projects, drawings, NDAs, financial data, IT dept information, legal and litigation docs, HR data, etc.</p><p><img src="/uploads/Internals_for_K005_19c5127cc1.png" alt="Internals for K005.png"><img src="/uploads/Passport_Jamal_Siddiqi_1206090e6d.png" alt="Passport (Jamal Siddiqi).png"><img src="/uploads/5_1_1_2_3_FILED_Plaintiff_s_Complaint_e90bda18be.png" alt="5.1.1.2.3_FILED Plaintiff's Complaint.png"><img src="/uploads/Passport_Bachmann_bff0a20f18.png" alt="Passport - Bachmann.png"><img src="/uploads/7_1_3_1_1_FINAL_Phase_I_ESA_and_LECR_Kemira_Aberdeen_MS_July_2023_update_9cea4a9cb0.png" alt="7.1.3.1.1_FINAL Phase I ESA and LECR_Kemira_Aberdeen MS_July 2023 update.png"></p></i><br />Target victim <b>website</b>: <i>galatachemicals.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>RODS-Surveying-rods.cc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19706</link>
<guid>dcbf892ffba18a236df0b13608350aa9</guid>
<pubDate>Mon, 23 Dec 2024 16:09:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>RODS-Surveying-rods.cc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>742d620564a5129355094e337f880921392a76ae12a9f6b6fa8a82f1dec85450</i><br /><br />Threat actor <b>description</b>: <i>43.5 GB</i><br />Target victim <b>website</b>: <i>rods.cc</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Albion-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19707</link>
<guid>7a7acdc3dfc8102141368e4c51f7dd3e</guid>
<pubDate>Mon, 23 Dec 2024 15:16:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Albion-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a0eadb98fc8d4e5a664040ecd5290146e08667aef07279d6eb6409b3f86b25f0</i><br /><br />Threat actor <b>description</b>: <i>Albion College (founded in 1850) offers bachelor’s degrees in business, the humanities, fine arts, natural sciences, and social sciences. It provides study-abroad programs in Europe, Latin America, Israel, Africa, Asia, and Australia. About 1,500 students are currently studying. Albion College corporate office is located Albion, Michigan, United States and has 412 employees. </i><br />Target victim <b>website</b>: <i>albion.edu</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rhode-Island-Departement-of-Humain-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19703</link>
<guid>db64c0aebc690877b866ad642fa3c722</guid>
<pubDate>Mon, 23 Dec 2024 14:32:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>Rhode-Island-Departement-of-Humain-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7fce504f57a7c95ba18693337a127242ecc5f5da8623b82ab79002866e03047</i><br /><br />Threat actor <b>description</b>: <i>Provides support and resources for health, financial aid, and social services in Rhode Island.</i><br />Target victim <b>website</b>: <i>dhs.ri.gov</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>Forum-Architecture--Interior-Design-forumarchitecture.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19699</link>
<guid>c50963c801026896bcfaa38b535b5e88</guid>
<pubDate>Mon, 23 Dec 2024 13:19:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Forum-Architecture--Interior-Design-forumarchitecture.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd6e080010ac7726cedb3334f1c010eb3cb5d4c63d2b5524d5ed9a903320678e</i><br /><br />Threat actor <b>description</b>: <i>5.7 GB</i><br />Target victim <b>website</b>: <i>forumarchitecture.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gallade-Chemical-galladechem.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19700</link>
<guid>9fa382e159884a63dc1a118b00bed446</guid>
<pubDate>Mon, 23 Dec 2024 13:18:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Gallade-Chemical-galladechem.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4cfdcf48c7a5f56b54908e4d524a4ade63412ddce983e1ad5a7b48da61409174</i><br /><br />Threat actor <b>description</b>: <i>2.4 GB</i><br />Target victim <b>website</b>: <i>galladechem.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>ptcky.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19695</link>
<guid>6d94f9a8ea3ab919370c4bbd22ce9956</guid>
<pubDate>Mon, 23 Dec 2024 11:38:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>ptcky.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1fb1e1988181f9ee839451bd3c7225553cc0be302cc827be18be4652ab08e7fd</i><br /><br />Threat actor <b>description</b>: <i><p>Hospitals &amp; Physicians Clinics.<br><br>“At Physicians to Children &amp; Adolescents, we offer a full range of pediatric care including prenatal visits for expecting parents, well–child check–ups, etc. Our mission is to provide outstanding care and services that meet the highest quality standards.”<br><br>Website: <a href="www.ptcky.com">www.ptcky.com</a><br><br>Revenue : $5M<br><br>Address: 201 S 5th St, Bardstown, Kentucky, 40004, United States<br><br>Phone Number: (859) 336-3952<br><br><mark class="marker-yellow"><strong>Download link #1:</strong></mark> &nbsp;<a href="https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/BARDSTOWN/PROOF/">https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/BARDSTOWN/PROOF/</a><br><br><mark class="marker-yellow"><strong>Mirror:</strong></mark> <a href="https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/BARDSTOWN/PROOF/">https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/BARDSTOWN/PROOF/</a><br><br><mark class="marker-yellow"><strong>DATA DESCRIPTIONS:</strong></mark> Thousands of patients Personal Identifiable information, medical records, reports, corporate docs, employee data, database backups, etc.</p><p><img src="/uploads/ZZZZZ_2_ZVD_5_88a09b5ba6.png" alt="ZZZZZ2ZVD5.png"><img src="/uploads/ZZZZZ_2_PU_5_D_4310f51097.png" alt="ZZZZZ2PU5D.png"><img src="/uploads/M_Johnson_PTCA_visit_8_29_24_c3e16aac7c.png" alt="M. Johnson PTCA visit 8-29-24.png"><img src="/uploads/ZZZZZ_2_UOCG_656fd2d1fb.png" alt="ZZZZZ2UOCG.png"><img src="/uploads/ZZZZZ_30_ALM_5d683ca405.png" alt="ZZZZZ30ALM.png"></p></i><br />Target victim <b>website</b>: <i>ptcky.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Blome-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19673</link>
<guid>27c602eea419202c123f75f17df800e0</guid>
<pubDate>Sat, 21 Dec 2024 21:28:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Blome-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6123f0f9a3b8b652559f9d54a8825905d0faecfbd64bc97818eeedbeadbc22b</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>blome.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>BRIGHT-BOLT-ENTERPRISES-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19672</link>
<guid>4303f79834031ce32c04792f47f56d40</guid>
<pubDate>Sat, 21 Dec 2024 21:25:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>BRIGHT-BOLT-ENTERPRISES-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6838e4f46adfd611a5b0638ee3e242b3b0e06a789e628e7dfc21d8b39fa8903</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>brighbolt.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Casa-Juarez-Restaurant-Supply-Co</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19671</link>
<guid>8ebb270c06eb053c6d0b0bb201f0d739</guid>
<pubDate>Sat, 21 Dec 2024 21:22:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Casa-Juarez-Restaurant-Supply-Co</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f280d58fd08298436328eb8e45dfd9f1d557e52333257550a7cdaa599fc5941</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>casajuarezrestaurantsupplies.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Davis-Products-Company-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19670</link>
<guid>fea68355a2b250eb95468fb15c087d8c</guid>
<pubDate>Sat, 21 Dec 2024 21:19:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Davis-Products-Company-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9a2e9434c14ecff21111f996968815da1e30581590ceaf53f44217278861db2</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>davisproductsco.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Economy-Restaurant-Equipment-And-Supply-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19669</link>
<guid>a2e8e57dbcbed07cd3fd9d3635dbfa60</guid>
<pubDate>Sat, 21 Dec 2024 21:16:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Economy-Restaurant-Equipment-And-Supply-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>86c5b3dd4e1698dc12ec19578937677712382d77716d7b0c225c2d7adf22e006</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>economyrestaurantequip.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>GAMKA-SALES-CO.-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19668</link>
<guid>97c62a533e5fe5ffbbe8d57be31b7063</guid>
<pubDate>Sat, 21 Dec 2024 21:13:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>GAMKA-SALES-CO.-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a780dea2db710e8dff1a21f19cf9f77d9437a2f15e6ce833b29d5b9b54ec610</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>gamka.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Greater-Michigan-Distributors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19667</link>
<guid>020e78251cdefbdfe0365d73cad6a32e</guid>
<pubDate>Sat, 21 Dec 2024 21:10:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Greater-Michigan-Distributors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f622206fb131dc3414075433ff170bd7a3220320d7f3613a5bf71c55280b158e</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>g-m-d.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>GPM-Lawn-Sprinkler-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19666</link>
<guid>2d40f027dc7db2e6860f88994ac7a265</guid>
<pubDate>Sat, 21 Dec 2024 21:07:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>GPM-Lawn-Sprinkler-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ba34c67ca77dd8420d6d6975d1742b140f05f7f039ff77d7640402f0179a80b</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>gpmpoolandspa.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Greene-Supply-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19665</link>
<guid>ae4f3688990e2b80925aa342627625e7</guid>
<pubDate>Sat, 21 Dec 2024 21:04:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Greene-Supply-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d88dd66951c1b3a9fef80fee78586f0d8f91d8ef801883e62fbb9aa2dd9f3cb1</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>greensupplyco.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hammons-Supply-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19664</link>
<guid>6374e3ddc6da019b8d63d803662c47e7</guid>
<pubDate>Sat, 21 Dec 2024 21:00:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Hammons-Supply-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c5fbcbb51972b36c4c0a164f022ea92a039ec40c8dd829077014a6722f55fc7</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>hammonssupply.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>J-AND-S-Electrical-And-Lighting-Supply-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19663</link>
<guid>1b2d6b1019c17cecf8a00e29fc75af6b</guid>
<pubDate>Sat, 21 Dec 2024 20:57:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>J-AND-S-Electrical-And-Lighting-Supply-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>82e3e9765bea16ffe4d2e25c560a5038c2af7b400f6d980298253b21daec8c56</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>jselectricalsupply.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>LAMERS-ENTERPRISE-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19662</link>
<guid>bdec2d109b0576a60c6587ad2b5bbfd4</guid>
<pubDate>Sat, 21 Dec 2024 20:54:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>LAMERS-ENTERPRISE-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>864e37ad086625273152683c3b185921bb8fcb2408221fc60fbf1b642a9388f4</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>lamersenterprise.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Langford-Tool-And-Drill-Co</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19661</link>
<guid>ffcda792e9cf98819caf142a417dc000</guid>
<pubDate>Sat, 21 Dec 2024 20:51:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Langford-Tool-And-Drill-Co</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a122d869f1bcb883336e2c5e0277f262bc8239305db695f95ad493e6038bbbe9</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>langfordtool.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>McCally-Tool-and-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19660</link>
<guid>370ffa32cc1f08b7ad5f2405f126429a</guid>
<pubDate>Sat, 21 Dec 2024 20:48:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>McCally-Tool-and-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2aeb42ebbcf02864b265a04c3af210a46d663d548acbed44078e1ee09eb8d14e</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>mccallytool.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Abrasive-Supply-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19659</link>
<guid>ea1c763b8e43c3e5e486e1b79c281e1e</guid>
<pubDate>Sat, 21 Dec 2024 17:32:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Abrasive-Supply-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9957fbf6a1d1ede9d98cf1ed548b010d99ae6200e3d4a8c96e0528c9870ed7f</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>AbrasiveSupply.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Albert-Paper-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19658</link>
<guid>6198bcc65620c22e218168ab511b86e3</guid>
<pubDate>Sat, 21 Dec 2024 17:29:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Albert-Paper-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce34b51434dc42e98f91db8c9d1023af2a6b2edfe6f46f3f200679545a65011d</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>albertpaperco.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Allied-Packing-And-Rubber-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19657</link>
<guid>ef8ff9dcba0ea0f66f02b9d355fb860c</guid>
<pubDate>Sat, 21 Dec 2024 17:26:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Allied-Packing-And-Rubber-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>54eecb391eab0840a3cea9a0a300d05553ef2a713ce312c0660205e9b59a1075</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>alliedpackingandrubber.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Avana-Electrotek</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19656</link>
<guid>07f7ee3a9193300869b19d91690e8ace</guid>
<pubDate>Sat, 21 Dec 2024 17:23:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Avana-Electrotek</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4b3b0aaed3e2bbdd8be992ff1e3c60aae4eeb9c1481112783b1a23aea2f0ac22</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>avanaelectrotek.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Badger-Popcorn-And-Concession-Supply-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19655</link>
<guid>42e7f95897396990e2357eb040e666db</guid>
<pubDate>Sat, 21 Dec 2024 17:20:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Badger-Popcorn-And-Concession-Supply-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a11015cea832dd401f10d299e266c318f10b9ce06dba891995690351a4497920</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>badgerpopcorn.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>berkotfoods.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19654</link>
<guid>7bbd4529ac608511bd21e85530061ee0</guid>
<pubDate>Sat, 21 Dec 2024 16:49:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>berkotfoods.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9834c1fe9eb3cd456ee9246d15d5e622dd33526429ce6abaedd27b1ffee2a05</i><br /><br />Threat actor <b>description</b>: <i>Berkot's Super Foods is your neighborhood, family-owned and operated, full-service grocery store.</i><br />Target victim <b>website</b>: <i>berkotfoods.com</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>gilariver.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19646</link>
<guid>d61a328561119583444e250036006e81</guid>
<pubDate>Fri, 20 Dec 2024 21:24:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>gilariver.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7cb4aa6aa12a494a6768f4ae2442e1058bd0593886949f28a879e0e1418bebb8</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "Gilariver.org" is the official website for the Gila River Indian Community, a sovereign tribe located in Arizona. The community consists of members from the Akimel O'odham (Pima) and Pee-Posh (Maricopa) tribes. The site provides information about their government, services, cultural heritage, economic enterprises, and community events, highlighting their commitment to preserving their traditions and promoting development.</i><br />Target victim <b>website</b>: <i>gilariver.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Accolent-ERP-Software</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19647</link>
<guid>a93c7100f7f6f9815964812e831054e5</guid>
<pubDate>Fri, 20 Dec 2024 21:18:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Accolent-ERP-Software</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2034ef51baba9abe415bc80178143f0feef372c8845534f800d9fd624ac589b5</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>accolentsoftware.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Izmocars</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19645</link>
<guid>34dd3675a36242216e981ddc1c3064b0</guid>
<pubDate>Fri, 20 Dec 2024 20:54:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Izmocars</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7668272a0ce732c224dc9f0479c192cdfe72a71ae40d367127028313e9123f8a</i><br /><br />Threat actor <b>description</b>: <i>Total volume data:More than 200GB of .msg files Files including:izmoltd izmocars izmolaw izmomedia izmolimited.com izmocars.be carazoosolutions.com auto-marketing.pro carazoo.com carsite.com cartalking.com citadeldefence.com citadelint.in citadelint.net cpa-marketing.pro deepheritage.com deepjansevasamiti.com dgipro.com dgipro-design.com digitalnanotechsg.com franchisenow.pro ipricecars.com izmocars.fr izmocrm.com izmodirect.com izmoeurope.be izmoinc.com izmolaw.com izmomedia.com izmonet.com izmostock.com izmostudio.com izmoweb.com izmoweb.in legal-marketing.pro partsgorilla.com smart-shiksha.com logixworld.com izmotion.com netmobyl.com si2microsystems.com vtcl.in sankeshwar.in medical-marketing.pro tejsoni.com motortrend.in […]</i><br />Target victim <b>website</b>: <i>izmolimited.com</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Genie-Healthcare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19641</link>
<guid>e72f549e59cd75ee9cf71230947471d8</guid>
<pubDate>Fri, 20 Dec 2024 18:53:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Genie-Healthcare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0b9a040e6c60443c91a6a0a5993bf0de38df72ae58caf590fce73fa17f7708a</i><br /><br />Threat actor <b>description</b>: <i>Database including the entire history of employee records and personal data!More than 4,400 personal IDs.Total amount of stolen data : 110GBhttps://geniehealthcare.com/Company representative should follow the instructions to contact us before time runs out</i><br />Target victim <b>website</b>: <i>geniehealthcare.com</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Frameworks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19637</link>
<guid>510b67b97266d086ba20a6e589756f39</guid>
<pubDate>Fri, 20 Dec 2024 18:42:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Frameworks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38bb4f8ac16fae093ae696390881eb0308e4174d390d4fb076888d2e241063a5</i><br /><br />Threat actor <b>description</b>: <i>18</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>Village-Community-School-vcsnyc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19643</link>
<guid>18d596dcf73043e0c8a6e3bfef2a0731</guid>
<pubDate>Fri, 20 Dec 2024 15:17:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Village-Community-School-vcsnyc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cbe11f4643e47e1a2dbb625b0280626250ed59d44f2c1931572dccb39d40d9de</i><br /><br />Threat actor <b>description</b>: <i>1 GB</i><br />Target victim <b>website</b>: <i>vcsnyc.org</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Circle-Electric-circleelectric.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19644</link>
<guid>c5218f6c84f93bd3d2d9a888a720ccd9</guid>
<pubDate>Fri, 20 Dec 2024 15:16:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Circle-Electric-circleelectric.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ce3c8b57a947705648da90a63c26f5b321292a76860d4b618aa382d519f049c</i><br /><br />Threat actor <b>description</b>: <i>25.9 GB</i><br />Target victim <b>website</b>: <i>circleelectric.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Howell-Township-Public-Schools-howell.k12.nj.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19638</link>
<guid>dabcff9ba10224b01fd2ce83f7d73ad6</guid>
<pubDate>Fri, 20 Dec 2024 13:20:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Howell-Township-Public-Schools-howell.k12.nj.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e4729e8635a2743a751968439cbecf3237d8e08374102a8c7a532997382b5bdd</i><br /><br />Threat actor <b>description</b>: <i>14.2 GB</i><br />Target victim <b>website</b>: <i>howell.k12.nj.us</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>EP-Holdings-epholdingsinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19639</link>
<guid>b0ec10166fcb5fd6d95ead1c3d735324</guid>
<pubDate>Fri, 20 Dec 2024 13:19:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>EP-Holdings-epholdingsinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>41fcd2f6bfa497bb56108d7139a244f457c85f4308dbff7f3166072fd08c3fb3</i><br /><br />Threat actor <b>description</b>: <i>2.7 GB</i><br />Target victim <b>website</b>: <i>epholdingsinc.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Khalil-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19636</link>
<guid>bf31cf91a25a954107b264332a7ca548</guid>
<pubDate>Fri, 20 Dec 2024 11:30:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Khalil-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0763f6981774a505e2542d4bb7cf2f9ce361d5f9edd752dd166b8a31a09b8a2</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>khalilcenter.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.tekni-plex.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19626</link>
<guid>533a42a835b25ce0b262e20e29e6d689</guid>
<pubDate>Fri, 20 Dec 2024 04:53:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.tekni-plex.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>657d2840601ba2e967e28589a1e4d040479b3f756f69462d3f1e751af2766e71</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Tekni-Plex is a global leader in advanced materials science, providing innovative solutions for packaging, medical, and other specialized industries. The company focuses on developing high-performance materials, including polymers and compounds, to enhance product safety, functionality, and sustainability. With a strong commitment to quality and customer service, Tekni-Plex serves a diverse range of markets worldwide.</i><br />Target victim <b>website</b>: <i>tekni-plex.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Noblesville</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19630</link>
<guid>e3a413605c34e75eb80b4209a23485e3</guid>
<pubDate>Fri, 20 Dec 2024 04:41:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>City-of-Noblesville</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9079a25448a6bd5cda761cf62c1b7cd44a1835577c6c10d64c407cef2be1a3c0</i><br /><br />Threat actor <b>description</b>: <i>City of Noblesville is a company that operates in the Government industry. It employs 250to499 people and has 25Mto50M of revenue. The company is headquartered in Noblesville, Indiana
We present to your attention, a large SQL database, confidential data of employees, confidential data of the Police, and emergency services.</i><br />Target victim <b>website</b>: <i>noblesville.in.gov</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jet-Edge-jetedgewaterjets.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19627</link>
<guid>3c038365b78e51a7999d8b6ec0584836</guid>
<pubDate>Fri, 20 Dec 2024 04:22:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Jet-Edge-jetedgewaterjets.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12b321a79b6f76d021e734d46c4b8c9df6b31cf8b86c5971499d502b026467cd</i><br /><br />Threat actor <b>description</b>: <i>5 GB</i><br />Target victim <b>website</b>: <i>jetedgewaterjets.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Energy-Capital-Credit-Union-eccu.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19628</link>
<guid>867c316d974d1d526d0f9106f4d01c55</guid>
<pubDate>Fri, 20 Dec 2024 04:21:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Energy-Capital-Credit-Union-eccu.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>86bd663c7e7ffaed3c568c852a3e11ffdde991f2b884dedf87987a75d9be9c90</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>eccu.net</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>ProCaps-Laboratories</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19629</link>
<guid>6104abd0046e4bbf15ea8f5c46a36a2d</guid>
<pubDate>Fri, 20 Dec 2024 04:06:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>ProCaps-Laboratories</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a77a93ecc705cb08e106b8a4f42ea1d23b749352dea9de90cff2b42b23436ad9</i><br /><br />Threat actor <b>description</b>: <i>Procaps founded 1979 and headquartered in Henderson, Ne
vada, manufactures vitamin supplements and distributes 
them online offering multiple products including, weigh
t management, multivitamins, and energy & joint supplem
ents.

You will find mssql databases with internal corporate i
nformation.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:8FF2FF8DAE537AFC5906D8E
27778417AE3930AB4&dn=procapslabs.com&tr=udp://tracker.o
penbittorrent.com:80/announce&tr=udp://tracker.opentrac
kr.org:1337/announce
</i><br />Target victim <b>website</b>: <i>procapslabs.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Krispy-Kreme</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19625</link>
<guid>08382dcaf2fd60627832891d11dd0bf0</guid>
<pubDate>Thu, 19 Dec 2024 22:50:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Krispy-Kreme</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c2238498953d5d4d4044c229d848732024a31ea149aa36c2823c39cad8d1b42</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.krispykreme.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Broker-Educational-Sales--Training</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19618</link>
<guid>3c70d0c22d88857d04d7195bc4954b09</guid>
<pubDate>Thu, 19 Dec 2024 16:59:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Broker-Educational-Sales--Training</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe0cb2c8829b967377f9dc98097b22985ce7746b24347668944135843fbc3508</i><br /><br />Threat actor <b>description</b>: <i>Broker Educational Sales & Training (founded in 1986) has been providing insurance continuing education (CE) to financial and insurance professionals nationwide. Broker Educational Sales & Training corporate office is located in 7137 Congress St, New Port Richey, Florida, 34653, United States and has 27 employees.</i><br />Target victim <b>website</b>: <i>brokered.net</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jared-Beschel-and-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19619</link>
<guid>846f87c3be78ef2dbb46bad3d6ec911f</guid>
<pubDate>Thu, 19 Dec 2024 16:40:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Jared-Beschel-and-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8b92b89750e2d33315b3aded417dff1bafb5cf6e1e84f8dfd5084be67972ebf</i><br /><br />Threat actor <b>description</b>: <i>Jared Beschel and Associates, P.C. is a law firm specializing in real estate transactional matters for individual homeowners looking to buy, sell, refinance, or lease their primary home or investment property.We are ready to upload more than 35 GB of internal corporate documents including: driver licenses,  contact numbers and e-mail addresses of employees and customers, SSNs, inside financial documents, passport scans, etc.</i><br />Target victim <b>website</b>: <i>beschellaw.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hide-A-Way-Lake-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19622</link>
<guid>9b9236c6d892bd929385745701615190</guid>
<pubDate>Thu, 19 Dec 2024 15:41:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Hide-A-Way-Lake-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b02d0f5827ce1cc8f1e7b520dddbf6a9e4e8168bf4b8dd109a4a97cf846c798e</i><br /><br />Threat actor <b>description</b>: <i>Hide-A-Way Lake Club offer three golf courses, three lakes, parks, a beach and swimming pool area, 24/ 7 security and in the Lindale school district.We are ready to upload some internal corporate documents including: inside financial documents, HR documents, employee contact phones, etc.</i><br />Target victim <b>website</b>: <i>hideawaytexas.net</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Compliance-Solutions-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19615</link>
<guid>278c00e63919b2bd4844a64463cc69d5</guid>
<pubDate>Thu, 19 Dec 2024 14:41:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Compliance-Solutions-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff25f4cdee0d1a8b079bdec4b9bbf7f7dbf1e4b2b47c8ec64d249481e12dadc8</i><br /><br />Threat actor <b>description</b>: <i>Complete irresponsibility and very poor IT level of Compliance Solutions Inc  (CSI) leads to that publication. Data from all departments  was exfiltrated fully from CSI internal network. Total 319Gb and 1m260k files will be published at that             ...</i><br />Target victim <b>website</b>: <i>csilongwood.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Leyman-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19616</link>
<guid>ce8ae867a0accc0b7577fcc340bb99f4</guid>
<pubDate>Thu, 19 Dec 2024 14:41:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Leyman-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>806693a876799fb9303b18d2b17283ecd120fd7230e2e6d3f82004d02802c153</i><br /><br />Threat actor <b>description</b>: <i>A leading manufacturer of all hydraulic lift gates, Leyman Lift Gates provides equipment and services to all industries that transport goods.We are ready to upload a lot of internal corporate data including: NDAs, customer contacts with phone numbers and emails, internalconfidential documents, inside financial information, credit card numbers with CVV etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>bataviacontainer.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19613</link>
<guid>b210215075f68e712aa3d04c9269aea8</guid>
<pubDate>Thu, 19 Dec 2024 10:48:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>bataviacontainer.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb5d6e2e0b3d6a098e929749f1c588f0960fa46cb3d84de3c87ae7f03e9f5d24</i><br /><br />Threat actor <b>description</b>: <i>Batavia Container is devoted to providing customers with the best packaging solutions in the industry.</i><br />Target victim <b>website</b>: <i>bataviacontainer.com</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>Banner-Day-Camp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19609</link>
<guid>d7d1b0e1c2ba164a103f995abd07662f</guid>
<pubDate>Thu, 19 Dec 2024 01:37:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Banner-Day-Camp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>95ce3be55298c9d3adea9f30353cd671598ab37221432f99a94f154c94855abc</i><br /><br />Threat actor <b>description</b>: <i>We tried many times to convince Banner Day Camp management to resolve this point...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Microvision</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19606</link>
<guid>6ddeeff784c00425c090970528a617b3</guid>
<pubDate>Wed, 18 Dec 2024 20:23:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Microvision</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>90498f0858b01581d45810f6fbfc4ed07f20e58c8eeabb2746ab052a71390d1d</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>www.microvision.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Good-Samaritan-Health-Center-of-Cobb</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19590</link>
<guid>6b7d24fd9a098d52b53fcc2cbd168789</guid>
<pubDate>Wed, 18 Dec 2024 18:38:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-Good-Samaritan-Health-Center-of-Cobb</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d77e0addf21cbc1b9bec99c82d77b1d8248fbf2f918431f92eabc43c24d67a3</i><br /><br />Threat actor <b>description</b>: <i>Good Samaritan Health Center of Cobb, a 501(c)3 non-profit Federally Qualified Health Center, opened its doors in 2006 with a mission “to spread the love of Christ by providing quality healthcare to those in need.” The Center was co-found            ...</i><br />Target victim <b>website</b>: <i>www.goodsamcobb.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Archie-Cochrane-Ford</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19591</link>
<guid>4d3515f670beb14cc76159cd3881151b</guid>
<pubDate>Wed, 18 Dec 2024 17:36:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Archie-Cochrane-Ford</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e2720c3e28d5718601fb6eb2a44e3e1db0da895ef645d0a14a4fbb4260134fa</i><br /><br />Threat actor <b>description</b>: <i>Archie Cochrane Ford is the largest Ford Dealer in Montana for inventory and sales volume. They offer a wide range of services, including a full-service department, parts department and body shop.We are ready to upload more than 8 GB of internal corporate documents including: HR documents,  contact numbers and e-mail addresses of employees, SSNs, inside financial information, driver licenses etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>fote.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19593</link>
<guid>0c898e44d210fe2d268f4ef11b19542d</guid>
<pubDate>Wed, 18 Dec 2024 17:12:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>fote.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2e60f7e6b062d2b7a7dceee23c2260ce8ada998ccfb065c618da899d3f038079</i><br /><br />Threat actor <b>description</b>: <i>Fruit of the Earth, a prominent skin care company based in Grand Prairie, Texas. Founded in 1980, Fruit of the Earth specializes in producing high-quality aloe vera and nature-inspired products, including skin care, sun care, and health care items. The company operates as a family-owned business and emphasizes ethical sourcing and environmentally friendly practices in its production processes.SITE: www.fote.com Address : 3325 W Trinity Blvd Grand Prairie, Texas 75050 United StatesTEL#: (817) 510-1600ALL DATA SIZE: ≈990gb 1. Financial data, Accounts, Payroll 2. Personal employees data and docs 3. Confidential data, NDA 4. R&D & etc…</i><br />Target victim <b>website</b>: <i>fote.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>valveworksusa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19594</link>
<guid>b500a92764c137e68f3d66a7941b3319</guid>
<pubDate>Wed, 18 Dec 2024 17:08:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>valveworksusa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97ca0346ef0d68445adc7ec57a7c2017a23bcf20ae8c290c3db866546b5ad23c</i><br /><br />Threat actor <b>description</b>: <i>Valveworks USA is a privately-held company based in Bossier City, Louisiana, founded in 1993 by Rick Roberts. With over 25 years of experience in the oil and gas industry, Valveworks specializes in manufacturing gate valves and wellhead equipment, establishing itself as a leading producer in this sector.SITE: www.valveworksusa.com Address : 1650 Swan Lake Road Bossier City, LA 71111 United StatesTEL#: 318-425-0266ALL DATA SIZE: ≈905gb+ 1. Financial data 2. Personal data 3. Human Resources, personal docs 4. Drawings, Engeneering, CAD & etc…</i><br />Target victim <b>website</b>: <i>valveworksusa.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Reliance-Connects-relianceconnects.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19598</link>
<guid>0e3febae74bb362088755e1f1cb3c4a5</guid>
<pubDate>Wed, 18 Dec 2024 16:53:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Reliance-Connects-relianceconnects.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>02db24c6fa2aabfbf734e39f9289c8f411a6e16a9fd9489c899bf37361fb75b1</i><br /><br />Threat actor <b>description</b>: <i>19 GB</i><br />Target victim <b>website</b>: <i>relianceconnects.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Smith-Tank--Steel-smith-tank.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19583</link>
<guid>d7a2abc84bf1d761021324a2851e1a49</guid>
<pubDate>Wed, 18 Dec 2024 16:40:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Smith-Tank--Steel-smith-tank.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>549b83622a35507df639ecbdc3a3755870c86ec7008d5b320d4393b84c906a6d</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1977 and headquartered in Gonzales, Louisiana, Smith Tank & Steel pro...</i><br />Target victim <b>website</b>: <i>smith-tank.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>OL-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19584</link>
<guid>1dc9eec5d23c9b8fbb75ab425f6e032f</guid>
<pubDate>Wed, 18 Dec 2024 16:40:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>OL-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>65845fd22a0b35eda0652a6309d406adc3b2113a6bcd9793b045bb9f78f0c97b</i><br /><br />Threat actor <b>description</b>: <i>O.L. Products provides a cost effective, innovative, and timely distribution process for your lotions, creams, ointments, gels, pastes, liquids, and cosmetic products to worldwide store shelves.We are ready to upload a lot of internal corporate documents including: inside financial information, customer contact emails, SSNs, employee contact phones etc</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cottrell-Fletcher--Cottrell-P.C.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19600</link>
<guid>19087444f37abf0815914273d60312fa</guid>
<pubDate>Wed, 18 Dec 2024 15:24:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Cottrell-Fletcher--Cottrell-P.C.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8564c12dc81938a65c221c905499084711ff14e4eb64f613c5768996f55e35c0</i><br /><br />Threat actor <b>description</b>: <i>Cottrell Fletcher & Cottrell P.C. is a full-service law firm located in 5845 Richmond Hwy Ste 800, Alexandria, Virginia.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Giordano-DelCollo-Werb--Gagne-LLC.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19599</link>
<guid>259bff13a1f5967de9abbed0ecb90e5a</guid>
<pubDate>Wed, 18 Dec 2024 15:23:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Giordano-DelCollo-Werb--Gagne-LLC.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>71f94b67189709777aa69aca3c923dce5e887c4c5b38b6a65722ea6ac90bb55d</i><br /><br />Threat actor <b>description</b>: <i>Giordano, DelCollo, Werb & Gagne, LLC is a full-service law firm located in Wilmington, Delaware.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Black-Oak-Casino-Resort</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19574</link>
<guid>39871d0cee6ab3debf7e05cd7a6d5cf4</guid>
<pubDate>Wed, 18 Dec 2024 12:39:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Black-Oak-Casino-Resort</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>93215eb701056272a00b79ea21603947ce66e65ed56815ce9eb48e4e25228e32</i><br /><br />Threat actor <b>description</b>: <i>Located in Tuolumne, CA in the scenic Sierra Nevada foothills, Black Oak Casino Resort is owned and operated by The Tuolumne Band of Me-Wuk Indians.We are ready to upload more than 90 GB of internal corporate documents including: employee and customer contacts, inside financialinformation, signed corporate contracts etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Freightlinerof-Savannah</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19587</link>
<guid>aff390f6bf9e8036f52a75448b087ca2</guid>
<pubDate>Wed, 18 Dec 2024 11:54:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Freightlinerof-Savannah</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>454b5ce5cb4c0992bd05a76452e2f478ef59c30e7bfccb51eafadcca3c28e185</i><br /><br />Threat actor <b>description</b>: <i>Freightliner Of Savannah is a commercial truck and trai
ler dealership based out of Savannah Georgia.

You will find a lot of internal corporate documents inc
luding: contact numbers and e-mail addresses of employe
es, drug screen results, driver licenses, SSNs, employe
e medical documents, passports etc.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:A08682AADE458590F196682
ED3A3D9408CE5E75E&dn=freightlinerofsavannah.com&tr=udp:
//tracker.openbittorrent.com:80/announce&tr=udp://track
er.opentrackr.org:1337/announce&tr=wss://wstracker.onli
ne
</i><br />Target victim <b>website</b>: <i>freightlinerofsavannah.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>massdevelopment.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19579</link>
<guid>e8257cae02495b31c4e89a4ae812499c</guid>
<pubDate>Wed, 18 Dec 2024 10:26:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>massdevelopment.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52ddc017ae20c42a509a7257ddbf9f47ad49bffe44b27b4ecf4269e5b5f5535f</i><br /><br />Threat actor <b>description</b>: <i><p>Banking.<br><br>“MassDevelopment, the states finance and development agency, works with businesses, nonprofits, financial institutions, and communities to stimulate economic growth across the Commonwealth. During FY2017, MassDevelopment financed or managed 377 projects generating investment of more than $4 billion in the Massachusetts economy. These projects are projected to create about 9,488 jobs and build or rehabilitate about 1,863 residential units.”<br><br>Website: <a href="https://www.massdevelopment.com/">https://www.massdevelopment.com/</a><br><br>Revenue : $24.6M<br><br>Address: Development Finance Agency 99 High St 11TH Fl Massachusetts, Boston, Massachusetts, 02110, United States<br><br>Phone Number: (617) 330-2000<br><br><mark class="marker-yellow"><strong>Download link #1:</strong></mark> &nbsp;<a href="https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/MASSDEVELOPMENT/PROOF/">https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/MASSDEVELOPMENT/PROOF/</a><br><br><mark class="marker-yellow"><strong>Mirror:</strong></mark> <a href="https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/MASSDEVELOPMENT/PROOF/">https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/MASSDEVELOPMENT/PROOF/</a><br><br><mark class="marker-yellow"><strong>DATA DESCRIPTIONS:</strong></mark> Personal identifiable information, actual database backups, corporate and employees personal data, various confidential documents, correspondence, customer data\contracts, NDAs, financial docs, projects etc.</p><p><img src="/uploads/Dan_O_Connell_passport_and_Social_Security_card_0d5b942078.png" alt="Dan OConnell passport and Social Security card.png"><img src="/uploads/Nicholaus_Sartoris_Passport_b88566547e.png" alt="NicholausSartoris Passport.png"><img src="/uploads/Project_Beacon_Confidential_Information_Memorandum_v2023_4_18_9fdce9dc51.png" alt="Project Beacon Confidential Information Memorandum v2023.4.18.png"><img src="/uploads/195_Market_St_Lynn_OM_986b234cbf.png" alt="195 Market St, Lynn - OM.png"><img src="/uploads/MDFA_FY_24_Financial_Statement_Draft_4_5dfb0098a8.png" alt="MDFA FY24 Financial Statement - Draft #4.png"></p></i><br />Target victim <b>website</b>: <i>massdevelopment.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>furmanos.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19580</link>
<guid>741adf496ee8c2d3e8c864e9567211af</guid>
<pubDate>Wed, 18 Dec 2024 10:23:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>furmanos.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>49d6ccba95192d2486b8174e73087e71142e59aa4c1e66a7f5f2271a23d6ec5b</i><br /><br />Threat actor <b>description</b>: <i>Furmano’s is a family-owned company that produces tomatoes, beans, vegetables, and ancient grains for foodservice and retail. The company was founded in 1921 in the kitchen of a farming family in the Susquehanna Valley of Pennsylvania. Furmano’s is now in its fourth generation of family ownership and operation.SITE: www.furmanos.com Address : Furmano Foods, Inc. 770 Cannery Road Northumberland, PA 17857 United StatesTEL#: 1-800-952-1111ALL DATA SIZE: ≈1tb 1. Group data 2. Account 3. HR 4. RD 5. Users personal and home folders data & etc…</i><br />Target victim <b>website</b>: <i>furmanos.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Avstar-Fuel-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19565</link>
<guid>665a24a314ec348b3b2ac1e3eb26dae0</guid>
<pubDate>Wed, 18 Dec 2024 01:53:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Avstar-Fuel-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a557e57cc06083a2dbdd2200f08c37b7aac20bab92762f146b3c74924dbd995</i><br /><br />Threat actor <b>description</b>: <i>Avstar Fuel Systems AVStar was formed in 1999 to overhaul Marvel Schebler/Precision/Volare type float carburetors and Bendix/Precision fuel injection systems.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>choicemg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19561</link>
<guid>e4a5e8fb022785d56a9cefcaa4ac0ee5</guid>
<pubDate>Tue, 17 Dec 2024 18:34:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>choicemg.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>85dde5820018ffff0520272eeb962c13bf6235fa5826ed288c098fc5bb3749d7</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Choice Management Group (choicemg.com) is a company specializing in talent management and entertainment services. They focus on representing a diverse roster of clients across various sectors in the entertainment industry, such as actors, writers, and directors. The company is dedicated to fostering the careers of its clients through personalized management strategies and industry expertise.</i><br />Target victim <b>website</b>: <i>choicemg.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>kuritaamerica.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19554</link>
<guid>42085df6d3d066c57c86452a818bb74b</guid>
<pubDate>Tue, 17 Dec 2024 16:59:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>kuritaamerica.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f4c0d30afd2959c55dce728b338b8fd6340689173328850ca458218ae7e5032d</i><br /><br />Threat actor <b>description</b>: <i>Kurita America Inc. (KAI) was established in 1996 as the US subsidiary of KURITA WATER INDUSTRIES LTD. of Tokyo, Japan. KAI provides complete turn-key systems, maintenance services, and water treatment chemicals capable of meeting the needs of...</i><br />Target victim <b>website</b>: <i>kuritaamerica.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kilgore-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19558</link>
<guid>871ee402e7a9a1cc25c02e0e0b1bb08c</guid>
<pubDate>Tue, 17 Dec 2024 16:31:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>Kilgore-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f96ae6fe81e78506d1794a839fb08a23182ccab593f0bf6d63a203d3a2dd9e9f</i><br /><br />Threat actor <b>description</b>: <i>Headquartered in Houston, Texas, Kilgore Industries, LP designs, builds and installs HVAC, mechanical, electrical and plumbing systems in the United States</i><br />Target victim <b>website</b>: <i>kilgoreind.com</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Toscano-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19551</link>
<guid>2246409389f1ea413ff9c03b9e09ffb3</guid>
<pubDate>Tue, 17 Dec 2024 15:39:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Toscano-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9106c036e508a14ef97dbdc20888a9bf6699ae817a23746e61218f91b5bab821</i><br /><br />Threat actor <b>description</b>: <i>A Virginia Beach law firm focused on personal injury, criminal defense, divorce and custody, and Title IX.We are ready to upload more than 40 GB of internal corporate documents including: customer and client contacts, inside financial documents etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>A-Beautiful-Pools-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19557</link>
<guid>7da995c4475a937dfdd1dbc776850f36</guid>
<pubDate>Tue, 17 Dec 2024 14:34:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>A-Beautiful-Pools-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f924dd874abdbb17b552ffa30c9080e89fcbabb3b3c5547520c45e927a3ffb6</i><br /><br />Threat actor <b>description</b>: <i>A Beautiful Pools, based in Texas, specializes in designing, building, and maintaining custom swimming pools for residential and commercial properties.</i><br />Target victim <b>website</b>: <i>a-beautifulpools.com</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fireproof-Contractors-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19556</link>
<guid>adbdb0d28dc3e22ed8ea0cd1f10228d0</guid>
<pubDate>Tue, 17 Dec 2024 14:31:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>Fireproof-Contractors-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d218f0d9e719312c43b226feee38e5bbe8d3b76db07481d9c30f7c3a979066b3</i><br /><br />Threat actor <b>description</b>: <i>Fireproof Contractors, Inc. specializes in commercial fireproofing, thermal and acoustical insulation, waterproofing, and firestop services.</i><br />Target victim <b>website</b>: <i>www.fireproofcontractors.com</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Heritage-Bank</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19547</link>
<guid>8277ee21b1f8107795126b1e8d803f1a</guid>
<pubDate>Tue, 17 Dec 2024 10:31:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Heritage-Bank</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1410905d8eb93da1ba332c3972790643b7b87e08f3bc6768fc1f2c7b422af642</i><br /><br />Threat actor <b>description</b>: <i>Heritage Bank USA provides commercial banking services. Heritage offers a broad line of banking and financial products and services with the personalized focus of a community banking organization.
You can immerse yourself in banking and we can help you do it. Confidential banking documents, personal data of employees and customers, credit reports. Technical documentation, and ATM statements. And much more. Enjoy browsing.</i><br />Target victim <b>website</b>: <i>ourheritage.bank</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brockton-Neighborhood-Health-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19546</link>
<guid>106ad9890ac0e9005be0a806bcc5752b</guid>
<pubDate>Tue, 17 Dec 2024 08:31:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Brockton-Neighborhood-Health-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e3085cd05506200007aaefb0201cf325aa5fe3120a0d5e78aaa16d427407b7b9</i><br /><br />Threat actor <b>description</b>: <i>Brockton Neighborhood Health Center is a multicultural organization that collaborates with community agencies and residents to provide high quality comprehensive health care that is responsive to community health needs and is linguistically, culturally and financially accessible.
We present to your attention a large SQL database, a collection of confidential documents of patients and employees.</i><br />Target victim <b>website</b>: <i>bnhc.org</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Joshua-Grading--Excavating</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19539</link>
<guid>a3dd176fb68ba78b8297421f5a093f24</guid>
<pubDate>Mon, 16 Dec 2024 23:02:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Joshua-Grading--Excavating</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2180cb3a598a2d1e6277e3d57b7899a3c0e1b5f6e534cc82272ff0becb39299c</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.joshuagrading.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>South-Plains-Implement</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19538</link>
<guid>76d4a91e4e3ee83a467a2d783f390257</guid>
<pubDate>Mon, 16 Dec 2024 22:59:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>South-Plains-Implement</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2d711d2b1d033bbd5bd3a463e3e7027c2d60d8eba2dc553c120b864e09d19996</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.southplainsimplement.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.specialtree.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19531</link>
<guid>7e3f1da13fa6bff785ccbdf2bbc64ef2</guid>
<pubDate>Mon, 16 Dec 2024 21:20:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.specialtree.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d543dcfb29bc3a478895fab8772082665166b8ce623049aa842c7281862c869a</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Special Tree is a healthcare organization that offers a range of rehabilitation services for individuals with brain and spinal cord injuries. They provide comprehensive care, including subacute, outpatient, and residential rehabilitation services. Special Tree is committed to enhancing the quality of life for their clients through personalized care and innovative therapeutic programs.</i><br />Target victim <b>website</b>: <i>www.specialtree.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lanigan-Ryan</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19535</link>
<guid>4526ff9c12cbeaf09fff0a778938b52e</guid>
<pubDate>Mon, 16 Dec 2024 21:07:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Lanigan-Ryan</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f879e693583b2e8c301e13deb98c4342316c723d0f88d3d71b3083800589b915</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.laniganryan.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Welker</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19534</link>
<guid>ef7cd9c4e808d55127903f646681c50a</guid>
<pubDate>Mon, 16 Dec 2024 21:04:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Welker</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0ebf5474ed61f3006809e80d3f5b4b2dd478d2df7a0ec973b307304de5f9b40</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.welkerproducts.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>eisenhowerlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19533</link>
<guid>25b55400e4fef098a35e25ba199b47b5</guid>
<pubDate>Mon, 16 Dec 2024 20:58:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>eisenhowerlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1a4d0320b6844854fa9db39ce008e598dd9d8b98bb85e2bec57df46b870f16a</i><br /><br />Threat actor <b>description</b>: <i>usa - Eisenhower Carlson</i><br />Target victim <b>website</b>: <i>eisenhowerlaw.com</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Super-Vac</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19523</link>
<guid>3116e20932c152ecd0daac6d655352cc</guid>
<pubDate>Mon, 16 Dec 2024 20:38:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Super-Vac</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a906d9610d5059720f6bbbc62ad05316cc764f2f273f278bad9201ca787cf0b</i><br /><br />Threat actor <b>description</b>: <i>The Super Vac Foundry isn’t your ordinary, run-of-the-mill small foundry. Rather, our foundry is part of something much bigger — a collection of long-trusted brands backed by a 65-year-old family-owned company, Super Vacuum Manufacturing.            ...</i><br />Target victim <b>website</b>: <i>www.supervacfoundry.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>CM-Buck--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19524</link>
<guid>9c47794cc5b62d463fd67c8d182f12d0</guid>
<pubDate>Mon, 16 Dec 2024 19:41:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>CM-Buck--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b7fbff92b807d9793b1feb014fa8baff4176e8648de3d1bbb2f6487f7cb04f6</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1941 by mechanical engineer Chauncey M. Buck, CM Buck & Associates, I...</i><br />Target victim <b>website</b>: <i>cmbuck.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>bushandburchett.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19530</link>
<guid>bbbdef0b9bc5d4e6735581fa7f6a614b</guid>
<pubDate>Mon, 16 Dec 2024 19:09:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>bushandburchett.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1f2ebfb14809528dc2b4212de71d8a8a8940e63f9ab339d1d4f5a7492dc9aa2</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Bush & Burchett, Inc. is a company specializing in construction services, particularly focusing on infrastructure projects such as bridges, highways, and other civil engineering works. They are known for their expertise in project management and commitment to quality and safety standards. Their operations are primarily based in the United States, serving both public and private sector clients.</i><br />Target victim <b>website</b>: <i>bushandburchett.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>SWDAKOTAH.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19525</link>
<guid>ebe796bb332c7556b1e5a78e4a386927</guid>
<pubDate>Mon, 16 Dec 2024 19:03:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>SWDAKOTAH.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd932cbadaf599891c3429cdcd51a2d21c6bfa15d5f6c062c1ef19e5bb62cbee</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] SWDAKOTAH.COM is a company that specializes in offering products and services inspired by the culture, heritage, and natural beauty of South Dakota. They focus on regional crafts, local artwork, and tourism services, providing customers with authentic and high-quality items. The company is dedicated to promoting local artisans and supporting sustainable practices in the region.</i><br />Target victim <b>website</b>: <i>SWDAKOTAH.COM</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Time-Machine-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19517</link>
<guid>2b423dc1a327648b419922ee8980e8dd</guid>
<pubDate>Mon, 16 Dec 2024 17:38:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Time-Machine-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>efe8fde1ce71065af4415b6adbace72b55aa3f65df01aeb3772b9684eb423d8e</i><br /><br />Threat actor <b>description</b>: <i>Time Machine is a contract machining company that serves the mining, construction, railroad, oil, and gas industries.We are ready to upload more than 55 GB of private corporate documents including:  contact numbers and e-mail addresses of employees and customers, NDAs, driver licenses, inside financial information, insurance documents etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>FINN</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19518</link>
<guid>de95cc66628a532bfd2258159f8950e1</guid>
<pubDate>Mon, 16 Dec 2024 17:03:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>FINN</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f8b8fe4084f720406a3d4cfa00f1951cbee598f58e578f842e2314bc37402fe</i><br /><br />Threat actor <b>description</b>: <i>finncorp.com

FINN Corporation has a worldwide presence with more than 100 North American dealer and service locations, plus others in Australia, South America, Africa and Europe.</i><br />Target victim <b>website</b>: <i>finncorp.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Williams-Tank-Lines</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19519</link>
<guid>1e1aee7d1c2f371f8cd3442dcdc4e8cd</guid>
<pubDate>Mon, 16 Dec 2024 17:02:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Williams-Tank-Lines</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4b5cde576ed0cdbf09e3becbd6ea2b14cc2b1ba2e185928d37f9287f7d4edc69</i><br /><br />Threat actor <b>description</b>: <i>www.williamstanklines.com

Williams Tank Lines is one of the largest for hire bulk petroleum carriers in California. The corporate office is located in Stockton, California. The company was founded in April of 1976 by Michael and Marlys Williams.</i><br />Target victim <b>website</b>: <i>www.williamstanklines.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Engineered-Tower-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19520</link>
<guid>db056ecf99d3fedd1f0c87aa2f39f2ee</guid>
<pubDate>Mon, 16 Dec 2024 17:02:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Engineered-Tower-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8d684bc3a8a5b28357957f5301077880b86237eb21a6de516e92f71f7d13621f</i><br /><br />Threat actor <b>description</b>: <i>ets-pllc.com

Engineered Tower Solutions, PLLC (ETS) is a full service engineering company specializing in telecommunication towers and residential/commercial industries.</i><br />Target victim <b>website</b>: <i>ets-pllc.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Marine-Floats</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19510</link>
<guid>d26deb6325aed2d1d9ebb9d96c423854</guid>
<pubDate>Mon, 16 Dec 2024 16:58:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Marine-Floats</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f716ddb1e317d61737a2ee367e17c3f0c70e1340c2b825359d9f890d25ffcca</i><br /><br />Threat actor <b>description</b>: <i>marinefloats.com

Marine Floats designs, manufactures, constructs and maintains commercial and residential marinas, dock systems, covered moorage and other waterfront solutions. </i><br />Target victim <b>website</b>: <i>marinefloats.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>National-Air-Vibrator</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19511</link>
<guid>d66f27ddc6cea33a948e4cafefc9038e</guid>
<pubDate>Mon, 16 Dec 2024 16:39:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>National-Air-Vibrator</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a78adb179d8432e1022268744bda560ee647fc18c69dfd9edba22106cae96391</i><br /><br />Threat actor <b>description</b>: <i>NAVCO bin hopper vibrators, railcar vibrators, and other vibratory equipment are used in rail cars, trucking, foundries, and process manufacturing, to facilitate flow of bulk materials through hoppers, bins, bunkers, and other vessels for efficiency and profitability. We are ready to upload more than  40 GB of internal corporate documents including: NDAs, inside financial documents,  contact numbers and e-mail addresses of employees and customers, driver licenses etc.</i><br />Target victim <b>website</b>: <i>navco.us</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Great-Plains-Bank</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19513</link>
<guid>7cd542b173cf405c73cff9ffcd5ea953</guid>
<pubDate>Mon, 16 Dec 2024 15:36:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Great-Plains-Bank</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ca97a2de65d01a5b2092c7236acf4593a43bad4a52070b883e49fcb63348ea0</i><br /><br />Threat actor <b>description</b>: <i>Great Plains National Bank is a full-service community bank with branches in Oklahoma and Texas, offering personal banking solutions designed to meet your financial needs including checking, savings, loan and mortgage services.We are ready to upload more than 18 GB of internal corporate documents including: NDAs, driver licenses, contact numbers and e-mail addresses of employees and customers etc.</i><br />Target victim <b>website</b>: <i>gpbankok.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Acumen-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19516</link>
<guid>cb5a475c1348bead24ba41f08a0eeb79</guid>
<pubDate>Mon, 16 Dec 2024 12:24:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>Acumen-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36ba8c77737dc6a234dd32d7a947b44bec7cdc34f3f4d0dbe0ec9afdc753404e</i><br /><br />Threat actor <b>description</b>: <i>Home Improvement & Hardware Retail · California, United States
<25 Employees
Acumen Group, a founding partner of Distributor's EDGE, delivers integrated best-in-class solutions that address the essential challenges that distributors face in all areas of their businesses such as financials, supply chain planning, relationship management, demand management, ERP, warehouse management, business intelligence and Ecommerce
Revenue <$5 Million</i><br />Target victim <b>website</b>: <i>acumengroup.us</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>LaSen</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19515</link>
<guid>289c71a3a46b3f3ef38d65ff4583a19e</guid>
<pubDate>Mon, 16 Dec 2024 12:22:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>LaSen</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>faad093a07725e4ae194eb902346bfb87e9c37b0af8edbfbef25d784d647c34c</i><br /><br />Threat actor <b>description</b>: <i>The company has been compromised. Further details will be provided later.</i><br />Target victim <b>website</b>: <i>lasen.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>Westfield-Fire-Department</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19488</link>
<guid>7ce1b2bc1baf1b4ea2027e15fc2ed397</guid>
<pubDate>Sun, 15 Dec 2024 10:40:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Westfield-Fire-Department</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b4904ed21d82dfadf3db4c66b371b42f8a92888799c83a6f0aba2069dc01d6e</i><br /><br />Threat actor <b>description</b>: <i>Westfield Fire Department (founded in 1931) is located in Middletown, Connecticut. They provide fire prevention, fire protection, medical and rescue services. Westfield Fire Department corporate office is located in 653 East St, Middletown, Connecticut, 06457, United States and has 36 employees. </i><br />Target victim <b>website</b>: <i>westfieldnj.gov</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>North-Los-Angeles-County-Regional-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19489</link>
<guid>db2ed8586b1b0c3bb5e046904a1b1f59</guid>
<pubDate>Sun, 15 Dec 2024 10:39:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>North-Los-Angeles-County-Regional-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0667da432db7921ae232304f0b0b1a4ff2b1bc0505f4fbf5cdee491590c9c541</i><br /><br />Threat actor <b>description</b>: <i>North Los Angeles County Regional Center - the company provides legal support for persons with developmental disabilities. North Los Angeles County Regional Center corporate office is located in 9200 Oakdale Ave Ste 100, Chatsworth, California, 91311, United States and has 360 employees. The total amount of data leakage is 600.8 GB</i><br />Target victim <b>website</b>: <i>nlacrc.org</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clarkson-Insurance-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19490</link>
<guid>db35b1f3d006b037c6acf898da036d58</guid>
<pubDate>Sun, 15 Dec 2024 10:39:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Clarkson-Insurance-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8ce6dafd05cadfe95d6d29cb4aab1df7d32941cd2e700ec80262268c578b06e</i><br /><br />Threat actor <b>description</b>: <i>Clarkson Insurance Group - insurance broker for business, families and private individuals. Clarkson Insurance Group corporate office is located in 401 W Main St Ste 1500, Louisville, Kentucky, 40202, United States and has 27 employees. The total amount of data leakage is 115.9 GB</i><br />Target victim <b>website</b>: <i>rhcgroup.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>First-Baptist-Church</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19447</link>
<guid>4332aede19e10d33866aa5a827976256</guid>
<pubDate>Sat, 14 Dec 2024 17:38:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>First-Baptist-Church</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1a9aebdee7e410cad37151d320f23feae96522490bafd879b0fa0b5872765b3</i><br /><br />Threat actor <b>description</b>: <i>Organizations · Florida,
United States
<25 Employees
First Baptist Church of High Springs maintains an affiliation with the Southern Baptist Convention.
Revenue < $5 Million</i><br />Target victim <b>website</b>: <i>fbchighsprings.org</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>Light-Speed-Design</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19445</link>
<guid>3b7cd3a5ad79da7f656f33072ad212fe</guid>
<pubDate>Sat, 14 Dec 2024 17:34:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>Light-Speed-Design</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2dd2cdd698cdb9604f5ca7e385f27975cbe9e53d5fabb8aab16768af3db4ae9</i><br /><br />Threat actor <b>description</b>: <i>Manufacturing · Washington, United States · <25 Employees
Lightspeed Design, Inc. is located in Bellevue, WA, USA, and specializes in 3D film & video production and stereoscopic 3D technology development.
Revenue <$5 Million</i><br />Target victim <b>website</b>: <i>www.lightspeeddesign.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>Levinlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19444</link>
<guid>b2e466c9d91e7a0be71ab741fc76c4a1</guid>
<pubDate>Sat, 14 Dec 2024 16:15:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>Levinlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>071328564e3d615bf9414a0a282d0a9e6672253eace79c6c4236b3ec79309089</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Levinlaw.com represents Levin Papantonio Rafferty, a prominent law firm specializing in mass tort litigation, personal injury, and class action cases. Founded in 1955, the firm has gained national recognition for its work in pharmaceutical, environmental, and consumer protection lawsuits. With a team of experienced attorneys, they are dedicated to seeking justice and compensation for their clients.</i><br />Target victim <b>website</b>: <i>Levinlaw.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Computer-Estimating-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19443</link>
<guid>88f5117f17105532ce02ca3f132c6628</guid>
<pubDate>Sat, 14 Dec 2024 14:35:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>American-Computer-Estimating-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c6d011b0b835cbffff851c31f86542e4cdaa953ec88bd3066586f651983431b</i><br /><br />Threat actor <b>description</b>: <i>American Computer Estimating is a company that offers desk review and settlement of auto and property claims, including subrogation audits.</i><br />Target victim <b>website</b>: <i>ace-it.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>MedRevenu-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19442</link>
<guid>9f6baa1a206155de9806efc35da9ee66</guid>
<pubDate>Sat, 14 Dec 2024 14:34:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>MedRevenu-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45594fff4b2046be35d1244387042ea732864a78af171f221573044a1a321a23</i><br /><br />Threat actor <b>description</b>: <i>MedRevenu is a Physician Revenue Cycle Management Company that utilizes a proven methodology to increase physicians' revenues and maximize reimbursement.</i><br />Target victim <b>website</b>: <i>medrevenu.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mid-Florida-Primary-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19441</link>
<guid>c273330bffbf9a2367a2618a3696cf7e</guid>
<pubDate>Sat, 14 Dec 2024 14:33:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Mid-Florida-Primary-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9de21a522e4f7ff3a73371543f2467668c1fe2f3e78880b0c0ce044fe63c5bc2</i><br /><br />Threat actor <b>description</b>: <i>Mid-Florida Primary Care is a specialized private Internal Medicine practice.</i><br />Target victim <b>website</b>: <i>mymfpc.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tri-County-Property-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19436</link>
<guid>15ef9d499850bb871944e0b52083173a</guid>
<pubDate>Sat, 14 Dec 2024 08:52:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>Tri-County-Property-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3efcc5e5d7b5e4359b80b9b0a602f8391811294f84545fecdf6c10d9c47953f7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Archdiocese-of-Louisville</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19435</link>
<guid>402a3083474531ec96e5c6c8a40f5ab6</guid>
<pubDate>Sat, 14 Dec 2024 06:59:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>Archdiocese-of-Louisville</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6980275c2140846cdf887894135ccddf13f47e93f502c4269350561fb453214d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Luxor-Capital-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19424</link>
<guid>6193850a9398731989b648105c75d321</guid>
<pubDate>Fri, 13 Dec 2024 15:39:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Luxor-Capital-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e266b6c0b67c39322b2f18a551d67221561e7061cf5725f60990d6f9fb17eb0</i><br /><br />Threat actor <b>description</b>: <i>Luxor Capital Group is a New York-based investment firm that targets venture capital and growth equity investments across North America. More than 100Gb of data will be available for downloading soon. You will find much interesting inside: medical information of employees and their relatives, passports, birth and death certificates, client correspondence containing confidential information, financial information, contracts and other docs with personalinformation as well.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Myhealthcarebilling</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19410</link>
<guid>2f7eaf16eceec07fc19c93090e90033a</guid>
<pubDate>Fri, 13 Dec 2024 01:49:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Myhealthcarebilling</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff468efe1ca38ff78841d5f1913960794a20ef18051a2f129c6f1ee1b2afdae4</i><br /><br />Threat actor <b>description</b>: <i>https://www.myhealthcarebilling.com/Company representative should follow the instructions to contact us before time runs out</i><br />Target victim <b>website</b>: <i>myhealthcarebilling.com</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Talascend</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19409</link>
<guid>3cb7820f34d947f7c4c3531ed72254b0</guid>
<pubDate>Fri, 13 Dec 2024 01:41:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Talascend</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a02d625ac251867fc2e71cd1af9cb230cfeac3efecd562707040e6d596969c13</i><br /><br />Threat actor <b>description</b>: <i>Talascend, founded in 1946 and headquartered in Troy, Michigan, is an employment...</i><br />Target victim <b>website</b>: <i>talascend.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Long-Beach-Convention-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19416</link>
<guid>d01ae29d5449df16318aa3760c9665b3</guid>
<pubDate>Fri, 13 Dec 2024 00:38:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Long-Beach-Convention-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac3044c62c347ebd97295e06672877331e636db050531ec4147594a0bb3b48bf</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.longbeachcc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Maxus-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19415</link>
<guid>cc281a493d63c492153ba35b86dcc794</guid>
<pubDate>Fri, 13 Dec 2024 00:35:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Maxus-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53b7413db3b361da85efcfedff3e46021b9a2b406cff6d2748c9fa44efd534d5</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.maxusgroup.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sunline</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19413</link>
<guid>4b5ed938de41e4ff532c02c27dfd143a</guid>
<pubDate>Fri, 13 Dec 2024 00:31:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Sunline</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>54ee29e1f360389579db6d2cb2ce67b3aa9c261f8d8141cdbf698fd2c6f93f69</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.sunlineglobal.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Goins-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19407</link>
<guid>24195119088b213cafd968936c1a10ff</guid>
<pubDate>Thu, 12 Dec 2024 23:38:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Goins-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8d24609ef1dab070523ba1062b3adc83e30b35f52c5cdb245ee00f15af13d154</i><br /><br />Threat actor <b>description</b>: <i>A large list of data files will be published soon
 
 Bank checks
 Information ab...</i><br />Target victim <b>website</b>: <i>goinslaw.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arnott</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19408</link>
<guid>715f390c232030c410b5ff0aa1034a1c</guid>
<pubDate>Thu, 12 Dec 2024 22:51:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Arnott</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4aabcc8e004e68439b129b9e36360c654a51df2a3978f16b3ca7162dd11650d4</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.arnottindustries.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gills-Onions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19403</link>
<guid>5efbbc6a2ad095faa18de332898d44f1</guid>
<pubDate>Thu, 12 Dec 2024 20:38:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Gills-Onions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9647fecac0bb09f4c5ce767bafc404fa46d133d470d0ce54aa7e873b69911ab4</i><br /><br />Threat actor <b>description</b>: <i>Gills Onions: Leaders in Sustainable Onion Production
 
 For over 35 years, Gill...</i><br />Target victim <b>website</b>: <i>gillsonions.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>AFD</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19402</link>
<guid>e197f79ebb916f235f91655b77ff9cdd</guid>
<pubDate>Thu, 12 Dec 2024 16:57:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>AFD</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ffade6104bdde16c693a8c32adbd46e984ef36b844308a41b354968785074b0f</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>www.afd-inc.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southern-Acids</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19400</link>
<guid>6b72ae1b07bcd7ac94b68f62d7cf4d8b</guid>
<pubDate>Thu, 12 Dec 2024 13:05:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Southern-Acids</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ebfb1038057b426f5895cfd95233fef8be8c9a3effb568b71e4b1d3fd9d52ce6</i><br /><br />Threat actor <b>description</b>: <i>Country : Malaysia - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>www.southernacids.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>cityofmarlow.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19396</link>
<guid>3ad238e605b85c8663802847e45dac99</guid>
<pubDate>Wed, 11 Dec 2024 23:13:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>cityofmarlow.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2530c539774ee0279e24d1a353dbf5ada52dc236d8063ec396f9777edd7ef4d7</i><br /><br />Threat actor <b>description</b>: <i>Revenue $5 Million</i><br />Target victim <b>website</b>: <i>cityofmarlow.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>nbkenney.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19395</link>
<guid>4ccc3735e387537e61269a976a33e412</guid>
<pubDate>Wed, 11 Dec 2024 23:11:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>nbkenney.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57501563b43fd89bac17f7852b91760e1f8f0edc821bb04035228f4cbda3f590</i><br /><br />Threat actor <b>description</b>: <i>Revenue $5 Million</i><br />Target victim <b>website</b>: <i>nbkenney.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Watsonville-Community-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19391</link>
<guid>6ecee9c863a73e2c3ba55b5fc99b1fed</guid>
<pubDate>Wed, 11 Dec 2024 21:07:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>termite</b> claims attack for <b>Watsonville-Community-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>620713640dec0c27bcda167d96bd5eee84104ac72c2de1fdbc8c0379fa23f5cc</i><br /><br />Threat actor <b>description</b>: <i>Watsonville Community Hospital is community healthcare provider; a 106-bed facility that offers a comprehensive range of medical and surgical services to the culturally diverse tri-county area along California’s Central Coast.
</i><br />Target victim <b>website</b>: <i>watsonvillehospital.com</i>]]></description>
<category>termite</category>
</item>
<item xmlns:dc='ns:1'>
<title>Locke-Solutions--LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19394</link>
<guid>d7678df0f1716c9893c21506a07c809d</guid>
<pubDate>Wed, 11 Dec 2024 21:04:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>Locke-Solutions--LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e007205a913075dfa12a46c0ee553a00b23c62f005904b3bbad5f7b14135a883</i><br /><br />Threat actor <b>description</b>: <i>Locke Solutions, based in Houston, Texas, is a company that primarily provides construction services and building materials. The company specializes in offering a variety of construction solutions, particularly in areas such as structural concrete, pre-cast concrete, building systems, and engineering design services.</i><br />Target victim <b>website</b>: <i>lockesolutions.com</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>CW-Lighting-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19393</link>
<guid>261c369066740deaa9693387b5e701c5</guid>
<pubDate>Wed, 11 Dec 2024 21:01:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>CW-Lighting-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6cd73ac94f8cddd05137b7fc5cd269b67d27460726f9aa6f3fc3491ac50df20e</i><br /><br />Threat actor <b>description</b>: <i>CW Lighting is a lighting manufacturer representative serving the Houston, Texas area.</i><br />Target victim <b>website</b>: <i>cwlighting.com</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sarah-Car-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19376</link>
<guid>3b219f3b7e193f60d4373862942e52c1</guid>
<pubDate>Wed, 11 Dec 2024 18:55:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Sarah-Car-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>623b27ed3426c2f54815e85b0479d72b4c2a0ff63398bcaf5437bfffef15e8ce</i><br /><br />Threat actor <b>description</b>: <i>Total amount of stolen data : 100GBhttps://sarahcarcare.com/Company representative should follow the instructions to contact us before time runs out</i><br />Target victim <b>website</b>: <i>sarahcarcare.com</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tejas-Office-Products-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19388</link>
<guid>e5784ac77ea342ed561f03cf2d2482a8</guid>
<pubDate>Wed, 11 Dec 2024 16:55:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>Tejas-Office-Products-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87e5d23c9763a9b88a0f276aa7c5d3037c98d4f1121c96c8552ae63f26a1439c</i><br /><br />Threat actor <b>description</b>: <i>Tejas Office Products is a company based in Houston, Texas, specializing in office supplies and related products. They offer a range of services and products designed to support office environments, including office furniture, equipment, technology, and supplies.</i><br />Target victim <b>website</b>: <i>www.tejasoffice.com</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Planters-Telephone-Cooperative-planters.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19377</link>
<guid>9c440b45b356a36bd3b2562a361d9656</guid>
<pubDate>Wed, 11 Dec 2024 16:44:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Planters-Telephone-Cooperative-planters.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4851a209355c581fa88e4fe0480b1aba9181e959f8138d8ded6a2e4ca2cd5b95</i><br /><br />Threat actor <b>description</b>: <i>about 1  GB</i><br />Target victim <b>website</b>: <i>planters.net</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>midwest.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19378</link>
<guid>860752c3fc7a4058ce178c37c4258c4c</guid>
<pubDate>Wed, 11 Dec 2024 16:42:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>midwest.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8257b8b5bd52d6307ac79aeadeced60ba4576b17e090cf580eee49bebc7044b3</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Certainly! "Midwest.com" is a company focused on providing comprehensive solutions and services related to the Midwest region of the United States. They specialize in regional information, products, and services that cater to both local residents and businesses. Their offerings might include travel guides, local news, and business directories, aiming to connect communities and promote regional growth and awareness.</i><br />Target victim <b>website</b>: <i>midwest.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bianco-Brain--Spine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19373</link>
<guid>14cd06dc182d6ef43dfc5395b5aded78</guid>
<pubDate>Wed, 11 Dec 2024 16:37:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Bianco-Brain--Spine</b>. The target comes from <b>usa</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12eddef7258819624d0ab836448944a85a20b951c1757595a7df39c191698902</i><br /><br />Threat actor <b>description</b>: <i>500 GB of files containing patients , clients and financial documents . Company has 48 hours to contact us before posting the data .</i><br />Target victim <b>website</b>: <i>www.biancosurgery.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Primary-Plus</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19366</link>
<guid>af3632b9be2c1cf9b507427e6fd9e9fe</guid>
<pubDate>Wed, 11 Dec 2024 14:36:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Primary-Plus</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6fd06d996b9ac65dc4ed4cb3bb92d7e614773a6fc46e7961d3ca90b56375b47b</i><br /><br />Threat actor <b>description</b>: <i>We offer TWO convenient locations for dental care: Vanceburg and Maysville. Our Vanceburg office is located in Building D at the 211 KY 59 PrimaryPlus campus and is proud to feature the care of Ron Mays, DMD who has 30+ years of service. T</i><br />Target victim <b>website</b>: <i>primaryplus.net</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rutherford-County-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19369</link>
<guid>e5b0663c1dad4751e0ce728f4a6cf9b5</guid>
<pubDate>Wed, 11 Dec 2024 13:06:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Rutherford-County-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eec0693434bc3ded496a2b7fcef55bf20f829420096ca2c1aab060468edde5af</i><br /><br />Threat actor <b>description</b>: <i>Rutherford County Schools Rutherford County Schools is a school district based in Murfreesboro, Tennessee, United States.</i><br />Target victim <b>website</b>: <i>rcschools.net</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Matagrano</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19362</link>
<guid>c7c9ff0f870462d9fb21b904e01cce9e</guid>
<pubDate>Wed, 11 Dec 2024 12:34:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Matagrano</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb5236cfad75dcb13757df86f7fe31982e3069d1e3eee9448b32a0be469f5806</i><br /><br />Threat actor <b>description</b>: <i>Matagrano Inc. is the domestic, craft & import beer distributor for San Francisco, San Mateo and Santa Clara County.We are ready to upload more than 100 GB of internal corporate documents including: NDAs, employee and customer contacts, driver licenses, medical certificates, family information, HR records and many other documents.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hydra-Matic-Packing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19358</link>
<guid>fb99d3df665eeeccf78c6e8bb851b0b3</guid>
<pubDate>Wed, 11 Dec 2024 01:33:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Hydra-Matic-Packing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a07d41c2f315ea42557b228056c1dd2bfa35a02ac3e65626453c678c32516b8</i><br /><br />Threat actor <b>description</b>: <i>ACCOUNTING, DRAWINGS, FORMS</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>tectaamerica.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19355</link>
<guid>0f178c4bac39101d7d38a61e4c420b26</guid>
<pubDate>Tue, 10 Dec 2024 20:50:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>tectaamerica.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9362c014b5de86a2a35635bbb9519f3b243ae15413371820c560c920830395b9</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Tecta America is a leading commercial roofing contractor in the United States, offering a range of services including roof installation, repair, and maintenance. The company serves various sectors such as industrial, institutional, and retail, providing expertise in roofing systems and technologies. Tecta America is known for its commitment to safety, quality, and customer satisfaction.</i><br />Target victim <b>website</b>: <i>tectaamerica.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mission-Constructors--Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19356</link>
<guid>aa768fe5e5cf9cfd7ef3e584264107d8</guid>
<pubDate>Tue, 10 Dec 2024 18:18:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>Mission-Constructors--Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe710ee782fe141cdbf64ebedf3e98cdc8a39f9f939684e44be15621a1364016</i><br /><br />Threat actor <b>description</b>: <i>Mission is a Houston-based corporation providing construction management, design/build, value engineering and construction services throughout the state of Texas.</i><br />Target victim <b>website</b>: <i>missionconstructors.com</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Matandy-matandy.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19345</link>
<guid>437fcf36c72ca2d5d6179539a1eee748</guid>
<pubDate>Tue, 10 Dec 2024 15:31:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Matandy-matandy.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c837156af8376d3034c41d447c34eb6d38155ecf136e7629d40bad3e4ba8fdb</i><br /><br />Threat actor <b>description</b>: <i>Matandy Steel & Metal Products, LLC, is a steel service center specializing in the processing of flat rolled material, including aluminized, hot dip galvanized, electro-galvanized, cold rolled, galvannealed, galvalume, and hot rolled pickled and oiled.We are ready to upload a lot of internal corporate documents including: inside financial documents, employee and customer contactsand personal files, SSNs etc.</i><br />Target victim <b>website</b>: <i>matandy.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Conrey-Insurance-Brokers--Risk-Managers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19335</link>
<guid>544217b77264db8da81cfe0dac39ec0a</guid>
<pubDate>Tue, 10 Dec 2024 13:30:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Conrey-Insurance-Brokers--Risk-Managers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04eae96e78962130c664fbcfcb004c50f299caa5e7d2126be5fae54fd91a7c63</i><br /><br />Threat actor <b>description</b>: <i>Conrey Insurance Brokers and Risk Managers is one of Southern California's fastest growing, mid-sized insurance brokers.We are ready to upload more than 8 GB of internal corporate documents including: driver licenses, NDAs, SSNs, contact numbers and e-mail addresses of employees, family contacts etc</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aruba-Productions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19336</link>
<guid>b1898d77a4b59881d6ce0b50de35801a</guid>
<pubDate>Tue, 10 Dec 2024 13:30:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Aruba-Productions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b9285946c769f43bb09ad1dd2ce921018b9b71ed4bfd65052520044af338c21e</i><br /><br />Threat actor <b>description</b>: <i>ARUBA PRODUCTIONS is a general management and executive producingorganization that manages and produces shows worldwide.We are ready to upload a lot of internal corporate documents including: passports, driver licenses, customer contact data with phones and emails, inside financial documents, credit cards with CVVetc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lakeside-Sod-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19337</link>
<guid>63ea2c642aaee001d818604fe1d9a811</guid>
<pubDate>Tue, 10 Dec 2024 13:30:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Lakeside-Sod-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eb7f6b8ddacbfd3312b2d4e8ecca7d6350b0148873bce3b547908998d1d81f81</i><br /><br />Threat actor <b>description</b>: <i>Lakeside Sod is Upstate New York’s most reliable resource for sod, seed, fertilizer and products for both the trade and consumers.We are ready to upload some internal corporate documents including: contact numbers and e-mail addresses of employees, SSNs, HR documents, employee health records, employee license certificates etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Global-Insurance-Agency-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19347</link>
<guid>0443e6bc05a750749b9438bfb7edcfa4</guid>
<pubDate>Tue, 10 Dec 2024 12:35:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Global-Insurance-Agency-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb517a6ae3b6fe7c5e0f92138b941c705a7ebb595f4a74396cfb22802fa330e0</i><br /><br />Threat actor <b>description</b>: <i>Global Insurance Agency is a full service brokerage firm offering personal and commercial insurance. We provide our clients with personalized service tailored to each client's needs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>womenscare.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19346</link>
<guid>b527e3339f309cece10812a019376d12</guid>
<pubDate>Tue, 10 Dec 2024 11:24:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>womenscare.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9884b3b752174022142c05be238d2b1e8241a127976e55c7b95f58543a639b74</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] WomensCare.com is a healthcare organization focused on providing comprehensive services for women's health. They offer a wide range of medical care, including obstetrics, gynecology, and specialty services such as fertility treatments and menopause management. The company is dedicated to delivering personalized and compassionate care, prioritizing the well-being and health of women at every stage of life.</i><br />Target victim <b>website</b>: <i>womenscare.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>greenscape.us.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19332</link>
<guid>f182c4c2e7b4bd91debd2d0d636becac</guid>
<pubDate>Tue, 10 Dec 2024 10:52:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>greenscape.us.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3b675cb14d4943f8c5151724b3e3673719bc39e163d36cca86c769d23e9f80bb</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Certainly! Greenscape is a company that specializes in providing high-quality landscaping services. They are dedicated to creating and maintaining beautiful, sustainable outdoor environments for both residential and commercial clients. Their services often include landscape design, installation, maintenance, and enhancements, focusing on environmentally friendly practices to promote healthy and vibrant green spaces.</i><br />Target victim <b>website</b>: <i>greenscape.us.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Physicians-Primary-Care-of-Southwest-Florida</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19338</link>
<guid>c2de2e6bbf07cd38773366898f06f3d5</guid>
<pubDate>Tue, 10 Dec 2024 09:36:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Physicians-Primary-Care-of-Southwest-Florida</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0560de88349a7afc272f0977d85618f08533902a044f9156eeaa9814f26cb7e</i><br /><br />Threat actor <b>description</b>: <i>Physicians' Primary Care is a healthcare organization pursuing to become the premier multi-specialty group in Southwest Florida.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>mpdory.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19324</link>
<guid>8cad7770bea867c44a6cd63bae19903d</guid>
<pubDate>Mon, 09 Dec 2024 16:55:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>mpdory.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a2eeaf09e1424bfd0dcbc4404e428bccefd187a96124d825f4f3648efb98395</i><br /><br />Threat actor <b>description</b>: <i>Company specializing in Guardrail, Fence, Signs, Traffic Signals, and Noise Barriers</i><br />Target victim <b>website</b>: <i>mpdory.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.bms.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19321</link>
<guid>8945e380613d55b5fc2968c42b1a58fd</guid>
<pubDate>Mon, 09 Dec 2024 15:29:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>www.bms.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>766c28adc234bd54c43da5d46ec5eea7e000599f11a7cbb9dae5fbd0d31c0456</i><br /><br />Threat actor <b>description</b>: <i>Pharmaceutical company. personal data - 302 lines</i><br />Target victim <b>website</b>: <i>www.bms.com</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.lasalleinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19322</link>
<guid>4a7d2be8648d00c3d1090ed4168a5748</guid>
<pubDate>Mon, 09 Dec 2024 14:53:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.lasalleinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a080d2abcdf348957941007af587a4104caf6fcefcdb061b1cdafb778f6c8251</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] LaSalle Inc. is a company that specializes in providing comprehensive real estate and investment management services. It focuses on delivering strategic solutions and insights to clients in the real estate sector. With a commitment to excellence and innovation, LaSalle Inc. aims to enhance value for its clients through expert management, market research, and tailored investment strategies.</i><br />Target victim <b>website</b>: <i>www.lasalleinc.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Consumers-Builders-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19306</link>
<guid>912dcb7dd52746d40917ed1c6fdb9de5</guid>
<pubDate>Mon, 09 Dec 2024 14:29:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Consumers-Builders-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ae1e727524b079ee68d4f8fe3805c396a1154a30e9c8671c6fa03db92c3169a</i><br /><br />Threat actor <b>description</b>: <i>Consumers Builders Supply has supplied leading builders and contractors with ready mix concrete, aggregate and masonry material for commercial, industrial, residential, and road and bridge projects. We are ready to upload some internal corporate documents including: customer contacts, inside financial information, employees contacts etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>ECBM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19307</link>
<guid>7d9b7f6e319f9fa90078c7c61ed9bd19</guid>
<pubDate>Mon, 09 Dec 2024 14:29:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>ECBM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>426015a0b3ea6749c943ced95919579ed874109f6e42425f682ed4528ba1fc69</i><br /><br />Threat actor <b>description</b>: <i>ECBM is a family-owned, independent insurance broker and consulting firm located in the Philadelphia area.We are ready to upload more than 30 GB of internal corporate documents including: NDAs and NSAs, driver licenses, employee contacts, drug testing results, SSNs and many other documents.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pelstar</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19308</link>
<guid>caec785d9e8e4f690ce7d9a4d37cb677</guid>
<pubDate>Mon, 09 Dec 2024 14:29:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Pelstar</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d6f6d21c796c22cc6bae0e0d70f821d1fa448acaa11f9d18448e15dd709be1b</i><br /><br />Threat actor <b>description</b>: <i>Pelstar Computer Systems is a complete technology solution provider. We are ready to upload some internal corporate documents including: credit cards data with CVC, customer contacts with phones, inside financial information, SSNs etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pb-Loader</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19309</link>
<guid>0f8a6c1689a55493677426059495e532</guid>
<pubDate>Mon, 09 Dec 2024 14:29:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Pb-Loader</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>20658ae4ad039de0b1f310c5e015d0e6aa2856515d5105229abadcf9edfb4a07</i><br /><br />Threat actor <b>description</b>: <i>PB Loader offers a complete line of Truck Mounted loaders, Asphalt Patchers, Emulsion Sprayers, Truck Equipment and Bodies.We are ready to upload more than 200 GB of internal corporate documents including: NDAs, inside financial information, customer and employee contacts, SSNs etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jamaica-Bearings-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19310</link>
<guid>1683c30db91283155060d1b8a7cb807a</guid>
<pubDate>Mon, 09 Dec 2024 14:29:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Jamaica-Bearings-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>50b69d09086c74d4d6aa8c09496f82fb065fa766e6a7e54e39119c1c92940b4d</i><br /><br />Threat actor <b>description</b>: <i>JBG  provides production and spares supply chain management programs into many global Tier I aerospace OEMs, system integrators, airlines, and MROs.We are ready to upload more than 50 GB of internal corporate documents including: NDAs, SSNs, employee contacts with phones and emails, HR information, customer contacts etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Weinberg--Schwartz-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19311</link>
<guid>5b2a8f2b014bb326fd82ee313704e78c</guid>
<pubDate>Mon, 09 Dec 2024 14:29:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Weinberg--Schwartz-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>98180e0a92466d570359cc463f06a7a9af73e455477ad69d4c22784d7e541a06</i><br /><br />Threat actor <b>description</b>: <i>WEINBERG & SCHWARTZ, L.L.C., in Columbia, Maryland represents clients in family law and divorce matters throughout Maryland, including Anne Arundel County, Baltimore City, Baltimore County, Carroll County, Howard County, Montgomery County and the Eastern Shore.We are ready to upload more than 100 GB of internal corporate documents including: customer contacts with phone numbers and emails, signed agreements, inside financial info, internal correspondence, SSNs, driver licenses, passports, medicare documents and manyother documents.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Milwaukee-Cylinder</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19312</link>
<guid>97cc7b6c7b91cf6b4718df7341c89d20</guid>
<pubDate>Mon, 09 Dec 2024 14:29:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Milwaukee-Cylinder</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e691d4cefc79892c6374be630dc7c5a1e114b8dbb8534f8acdc82cb2c5f1e0f5</i><br /><br />Threat actor <b>description</b>: <i>Milwaukee Cylinder is a leader and innovator in the hydraulic andpneumatic actuation field.We are ready to upload more than 10 GB of internal corporate documents including: NDAs, HR documents with personal data, driver licenses, inside financial documents etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Coffee-Beanery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19315</link>
<guid>4a1a9329a417db6fc3b2948a687f4457</guid>
<pubDate>Mon, 09 Dec 2024 14:29:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Coffee-Beanery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5ce8bdc2897abbefec86361eae2de646877b39743a2c32b3b2fb1ecac9bc3f54</i><br /><br />Threat actor <b>description</b>: <i>Coffee Beanery has over 75 locations throughout the U.S., 20 locations internationally, and is recognized as an industry leader for its unique family business approach, corporate culture and commitment to quality.We are ready to upload a lot of internal corporate documents including: customer contact addresses, inside financial information, employees contact, internal financial documents etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>C-Pathe</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19316</link>
<guid>8010691083622c563813e1f1d85119d6</guid>
<pubDate>Mon, 09 Dec 2024 14:29:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>C-Pathe</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dcaf521e401cb91a6cc9656056a1e0e5c41b89c887cb385caf6829a744525018</i><br /><br />Threat actor <b>description</b>: <i>C Pathe offer a complete range of end-to-end services, including creative concept development enhanced by 3D rendering, design realization, impeccable management, and effective execution.We are ready to upload o lot of internal corporate documents including: inside financial information, employee phones and emails, insurance info etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Boston-Chinatown-Neighborhood-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19300</link>
<guid>24a2dbfe8f3ac27bfdf453dde5d26c3f</guid>
<pubDate>Mon, 09 Dec 2024 03:58:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Boston-Chinatown-Neighborhood-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>524a3dfacd097e9e257c028938d559e13a33c0aad7f1d05612a8fa812b2378fa</i><br /><br />Threat actor <b>description</b>: <i>For more than 50 years, BCNC has been providing new immigrants, especially Asians, with the support and resources they need to thrive in the United States.  With deep roots in Boston's Chinatown neighborhood, BCNC now serves people from three locations in Greater Boston and the South Shore
                                                      We present you with personal data of employees, contracts and much more.</i><br />Target victim <b>website</b>: <i>bcnc.net</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>CK-Technology-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19387</link>
<guid>9a944cbabc2d065e383296ec167138b7</guid>
<pubDate>Sun, 08 Dec 2024 17:31:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>CK-Technology-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36faddfb7dde72bee029de2e5be6f1e84002320ac01374a271954adcc912513a</i><br /><br />Threat actor <b>description</b>: <i>34</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>Town-of-Whitestown---NY-Highway-Department</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19269</link>
<guid>ee61b754c078f757f61f2422169d6f92</guid>
<pubDate>Sun, 08 Dec 2024 17:31:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Town-of-Whitestown---NY-Highway-Department</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>629d31c391a7d7073fb64b8876b5e885b0c76b94dd5d3820398bbf58c2fb6bf7</i><br /><br />Threat actor <b>description</b>: <i>x</i><br />Target victim <b>website</b>: <i>whitestown.net</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Matlock-Security-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19261</link>
<guid>9220e1b573ac13ab682c3899a3241db1</guid>
<pubDate>Sat, 07 Dec 2024 16:52:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Matlock-Security-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ba315d719b9c2fb93e668f9443f5b02742817b67dc43e22530913eb6a4cae82</i><br /><br />Threat actor <b>description</b>: <i>Matlock Security Services With over 30 years of experience, Matlock Security has been protecting business throughout the Tulsa metro area.</i><br />Target victim <b>website</b>: <i>matlocksecurity.com</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arc-Community-Services-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19258</link>
<guid>f2ee555e877c9bd7239e2a2d4e5c4f25</guid>
<pubDate>Sat, 07 Dec 2024 13:02:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Arc-Community-Services-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a15bc4a9d6bb946023f66b6b4a72d7fd1b5d45eef9b6eb8950bf6e65187365f2</i><br /><br />Threat actor <b>description</b>: <i>ARC Community Services Inc is a company that operates in the Mental Health & Rehabilitation Facilities industry. It employs 50 to 99 people</i><br />Target victim <b>website</b>: <i>arccommserv.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>TM-Equipment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19255</link>
<guid>a8b428e6575840625955db1842361751</guid>
<pubDate>Fri, 06 Dec 2024 20:54:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>TM-Equipment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd933f1946ee09cebba4ce762eb11799c6cf326a451212802ada284f82f0daf7</i><br /><br />Threat actor <b>description</b>: <i>usa - T & M Equipment</i><br />Target victim <b>website</b>: <i>tandmequipcorp.com</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>RJM-Marketing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19254</link>
<guid>abb207957b0abc1d85a7e32ab1c4359c</guid>
<pubDate>Fri, 06 Dec 2024 20:51:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>RJM-Marketing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34ceb4144b6865220026a77f41c0667b4dc1e638443e47ab1fd72cb2f92a1548</i><br /><br />Threat actor <b>description</b>: <i>Who is RJM Marketing. Founded in 1980, RJM has provided advertising and marketing services to clients across the United States. While founded in the era of traditional m edia and print, they have expanded their services over the years to become a leader in the ever-changing digital world.
                                                        We present you with employee personal data, contracts and much more.</i><br />Target victim <b>website</b>: <i>rjmichaels.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Medical-Technology-Industries-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19251</link>
<guid>a730d98bd8e325260bfc8ba46daeed16</guid>
<pubDate>Fri, 06 Dec 2024 18:57:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Medical-Technology-Industries-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e162a89119f33734b33822e4fc1807cbb7461b9da557c40a9c76db3bca567b5</i><br /><br />Threat actor <b>description</b>: <i>Total amount of stolen data : 900GBhttps://mti.netCompany representative should follow the instructions to contact us before time runs out</i><br />Target victim <b>website</b>: <i>mti.net</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Precision-Walls</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19247</link>
<guid>72e0c3840cba5439a1fc242c00f275ff</guid>
<pubDate>Fri, 06 Dec 2024 16:34:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Precision-Walls</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>02fd30ff6dc4ffc737ce819adcc3a2c4b37264d99f9bf1daa1fa3e82be0e4da9</i><br /><br />Threat actor <b>description</b>: <i>www.precisionwalls.com

1230 NE Maynard Rd, Cary, North Carolina, 27513, United States

455.08 GB
Description

Projects and infrastructure of banks, hospitals, hotels, industrial and government buildings, and even Google and Berkeley data centers. All this was developed by Precision Walls, which did not take responsibility for the loss of these documents and the damage caused to its customers.

6 December 2024</i><br />Target victim <b>website</b>: <i>precisionwalls.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Blue-Yonder</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19248</link>
<guid>06f46a725a4bdc070e07b09bb7d05dce</guid>
<pubDate>Fri, 06 Dec 2024 14:45:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>termite</b> claims attack for <b>Blue-Yonder</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>774464cc6cbba8bae46fdacad4a8bb5b2be79ac8d5e6e5418519b7775c51ce8a</i><br /><br />Threat actor <b>description</b>: <i>Blue Yonder Group, Inc. (formerly JDA Software Group) is an American supply chain management company operating as an independent subsidiary of Panasonic. Founded in 1985, the company is headquartered in Scottsdale, Arizona, with offices globally. Its acquisitions have included Yantriks, RedPrairie, i2 Technologies, Manugistics, E3, Intactix, and Arthur</i><br />Target victim <b>website</b>: <i>blueyonder.com</i>]]></description>
<category>termite</category>
</item>
<item xmlns:dc='ns:1'>
<title>LTI-Trucking-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19249</link>
<guid>cc16c48e00744da59ed285ca9678d5b9</guid>
<pubDate>Fri, 06 Dec 2024 13:51:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>LTI-Trucking-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>03d22bdc7a293f3ff57a9b6f066897854de72c7e83234f71f5ce1169f64d276f</i><br /><br />Threat actor <b>description</b>: <i>LTI Trucking Services, established in 1975, reformed in 2005 and based in St. Louis, Mo, is an asset-based transportation company that specializes in temperature-controlled freight.</i><br />Target victim <b>website</b>: <i>ltitrucking.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>pro-mec.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19243</link>
<guid>e2de92f7d986a7cc082a605634119514</guid>
<pubDate>Fri, 06 Dec 2024 10:49:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>pro-mec.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42dc019e75f6186d1e34cf15399458e071b6e7d499502035ef2da440b0b32d83</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Pro-mec.com is a company specializing in precision engineering and manufacturing solutions. They offer a range of services, including CNC machining, fabrication, and assembly, catering to various industries such as aerospace, automotive, and industrial equipment. With a focus on quality and innovation, Pro-mec.com delivers customized solutions to meet specific client needs, ensuring high standards and efficiency.</i><br />Target victim <b>website</b>: <i>pro-mec.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>casaimports.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19242</link>
<guid>c9c10e15bf0575c599ce161447d0a183</guid>
<pubDate>Fri, 06 Dec 2024 03:29:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>casaimports.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b0b43b80d1b0cd2ce6e6a46ec84ede02b3f5a203bbfa39615e9dc1a756f03912</i><br /><br />Threat actor <b>description</b>: <i>Revenue $5 Million</i><br />Target victim <b>website</b>: <i>casaimports.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brodsky-Renehan-Pearlstein--Bouquet-Chartered</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19234</link>
<guid>b3b2e5e6e33a19aa35fe31321adc3100</guid>
<pubDate>Thu, 05 Dec 2024 22:58:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Brodsky-Renehan-Pearlstein--Bouquet-Chartered</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a55581c9783c98ebca30ae1e14c6b442e9290065b74209f2399654f276888e85</i><br /><br />Threat actor <b>description</b>: <i>Brodsky Renehan Pearlstein & Bouquet, Chartered is one of Maryland and Washington, DC's divorce and family law litigation firms. Brodsky Renehan Pearlstein & Bouquet corporate office is located in 16061 Comprint Cir, Gaithersburg, Maryland, 20877, United States and has 17 employees. The total amount of data leakage is 347.20 CB</i><br />Target victim <b>website</b>: <i>brpfamilylaw.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Levicoff-Law-Firm-P.C</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19235</link>
<guid>f7c6853c7a4a2291e0c49cad09fb1a30</guid>
<pubDate>Thu, 05 Dec 2024 22:57:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Levicoff-Law-Firm-P.C</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>135dafc7dca9a13f913a0033a2fb7f2a152575ddabbefd1a516de29da9a01126</i><br /><br />Threat actor <b>description</b>: <i>The Levicoff Law Firm, P.C. - handle civil litigation matters of virtually all kinds including accident and injury cases, construction matters, insurance problems, employment issues, as well as contract disputes, commercial tort claims, and generally any form of litigation a business may confront. The Levicoff Law Firm corporate office is located in 4 Ppg Pl Ste 200, Pittsburgh, Pennsylvania, 15222, United States and has 11 employees. The total amount of data leakage is 246.6 GB. * : The poor leadership team begged us for 1000$ to solve their problem and keep their sensitive data safe. It was a scarce case with such a stupid offer.</i><br />Target victim <b>website</b>: <i>levicofflaw.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>coa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19252</link>
<guid>571e646d4ea4d46a8fde33d07167efe5</guid>
<pubDate>Thu, 05 Dec 2024 21:30:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>coa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a35d48394d12fdf43ba80e6a19751177258420923820b976dea2aee198968af7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Max-Trans</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19236</link>
<guid>d53ed6e2576ab89b34c972e6aa731423</guid>
<pubDate>Thu, 05 Dec 2024 20:51:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Max-Trans</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53f221feab29aed390807deaa337a94c8198293853f89610ba5aa3bbc64cb511</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.maxtrans.us</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Standard-Calibrations</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19238</link>
<guid>c05901fe338c7b91f5251eb0a62df6e1</guid>
<pubDate>Thu, 05 Dec 2024 18:34:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Standard-Calibrations</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a33b92e2833366bdb4bbceec91c226725654992a4e30e976753a578d1d4c4c22</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.standardcal.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>NatAlliance-Securities</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19237</link>
<guid>b818123d4596c686bf837ce0d839a9af</guid>
<pubDate>Thu, 05 Dec 2024 18:31:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>NatAlliance-Securities</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>213c4954fd90d98fe571cef05438443fea44789032385eb7744ca1d3a6b56b8e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.natalliance.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>SRP-Federal-Credit-Union</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19216</link>
<guid>f6bb6d65c8c39c685424a156838f6853</guid>
<pubDate>Thu, 05 Dec 2024 16:38:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>SRP-Federal-Credit-Union</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5eb9a571c274edb76c795fd7e978274894ac3696ebc792ffc72f0bab31ca17b7</i><br /><br />Threat actor <b>description</b>: <i>SRP Federal Credit Union is a member-owned financial institution that offers a variety of financial products and services, including savings accounts, loans, credit cards, and mortgages..</i><br />Target victim <b>website</b>: <i>srpfcu.org</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Star-Shuttle-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19230</link>
<guid>59a4e3a281d5feda1b6b531c65657e89</guid>
<pubDate>Thu, 05 Dec 2024 15:08:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Star-Shuttle-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fbba06c89984af49fabb12e1d74015515682cb545a4121194a67b83d8ddd3365</i><br /><br />Threat actor <b>description</b>: <i>Star Shuttle & Charter, based in San Antonio, Texas, is a privately owned and operated company by the Walker family of San Antonio and Walker Resources, Inc.</i><br />Target victim <b>website</b>: <i>starshuttle.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>hanwhacimarron.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19223</link>
<guid>5c3b44401b674811b5e8088e1a24e7a5</guid>
<pubDate>Thu, 05 Dec 2024 12:42:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>hanwhacimarron.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cac6ef38b502c895ed1be8d0e62307359d8cb36765efdea9ded9b81b0829b25a</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Hanwha Cimarron is a company specializing in the manufacture of advanced composite pressure vessels. These vessels are used in industries such as aerospace, defense, and energy for storing and transporting gases under high pressure. As part of the Hanwha Group, known for its diverse industrial footprint, Hanwha Cimarron leverages cutting-edge technology to deliver high-performance, reliable solutions.</i><br />Target victim <b>website</b>: <i>hanwhacimarron.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>USA2ME</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19213</link>
<guid>23e140a848564d0d992c874d4cea766b</guid>
<pubDate>Thu, 05 Dec 2024 12:00:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>USA2ME</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a76668ca29b1c4176f0ff5ee7700f63b25ec339de600ebcf179ed4aab91042e</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>usa2me.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>islandphoto.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19210</link>
<guid>fbc73ee8f22e7cbf9e2b7883ce7516bb</guid>
<pubDate>Wed, 04 Dec 2024 18:14:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>islandphoto.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>760524a74a01eb808dff17739e14046454f5cf0ec882b1a7258f929a39b6a2a7</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Islandphoto.com is a photography company that specializes in capturing events and providing professional photography services. They focus on delivering high-quality images for events such as graduations, sports, and other special occasions. With a commitment to customer satisfaction, they offer various packages and products to preserve memorable moments with clarity and artistry.</i><br />Target victim <b>website</b>: <i>islandphoto.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>troxlerlabs.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19209</link>
<guid>ba32ac4781099e7ffe65f42e3cdf3d34</guid>
<pubDate>Wed, 04 Dec 2024 16:26:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>troxlerlabs.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d98b665221ac78524b0d69a96687116b94ee0f525f33de631616199998174bf</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Troxler Electronic Laboratories is a company specializing in precision test and measurement equipment for the construction and agriculture industries. Known for their nuclear density gauges, Troxler provides tools for soil moisture and density analysis, ensuring quality control in construction projects. Established in 1958, they focus on innovation and reliability, supporting infrastructure development globally.</i><br />Target victim <b>website</b>: <i>troxlerlabs.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Donnewalddistributing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19197</link>
<guid>0ea2f58f6ebe35f4bc5b37b01911fd0a</guid>
<pubDate>Wed, 04 Dec 2024 14:53:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Donnewalddistributing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87ec556b5738d98d51f4d03978792de7d34393c9f3760de8c621dd31c6e9250e</i><br /><br />Threat actor <b>description</b>: <i>Country: USA
Views: 61

View more /donne
Public
<100GB</i><br />Target victim <b>website</b>: <i>donnewalddistributing.com</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>hobokennj.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19208</link>
<guid>ffb5597397de30f24dfafbf479c92861</guid>
<pubDate>Wed, 04 Dec 2024 14:52:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>hobokennj.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>31ab1c89fdd8e614cd9965be6f16f86d2bc77b92639113bd2468ffb751f3cf31</i><br /><br />Threat actor <b>description</b>: <i>City of Hoboken</i><br />Target victim <b>website</b>: <i>hobokennj.gov</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>NTrust</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19207</link>
<guid>f5d523734ce2ac76ad9215bd0f87c376</guid>
<pubDate>Wed, 04 Dec 2024 14:50:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>raworld</b> claims attack for <b>NTrust</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d8ab2fb92d09a30e549066b958d024250d3ced8ba53d3f5a03450a1f0fc07358</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] NTrust is a global real estate and facilities management services company that specializes in lease administration, lease accounting, and technology solutions. They offer services such as transaction management, data abstraction, and portfolio management. NTrust leverages advanced software and analytics to optimize real estate operations, helping clients streamline processes and improve decision-making.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>raworld</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.d47.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19203</link>
<guid>a3b2e0d095b2d7155d1b7739488f9ff1</guid>
<pubDate>Wed, 04 Dec 2024 14:46:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.d47.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7718233f62d0816869cd671646f9ece487607a2bcbe6d271f168ac6355fa1c3</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] www.d47.org is the website for Crystal Lake Elementary District 47, a public school district serving Crystal Lake and parts of Lakewood and Lake in the Hills in Illinois. The district provides education for students in kindergarten through eighth grade. It focuses on fostering a supportive and inclusive environment, emphasizing academic excellence, and offers various programs to support student development and community engagement.</i><br />Target victim <b>website</b>: <i>d47.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.certifiedinfosec.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19201</link>
<guid>50b6da85112e21710d78b44f2cc8a8a3</guid>
<pubDate>Wed, 04 Dec 2024 13:21:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>www.certifiedinfosec.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e05524f36af8dc918030d8a216683af03d19f1f7e0edb1d4b0f8737d5a298098</i><br /><br />Threat actor <b>description</b>: <i>Certified Information Security is a registered trade name for Certified Tech Trainers (CTT) (D-U-N-S# 010573009) (CAGE code: 3FKS0), a corporation ...</i><br />Target victim <b>website</b>: <i>www.certifiedinfosec.com</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>cafezupas.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19187</link>
<guid>cccff7e026df95190cdca4811b10b68b</guid>
<pubDate>Wed, 04 Dec 2024 12:20:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>cafezupas.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>245b17cb29067a70a7b240a3a1e39a3715e2a4cb14b7e0634b557cdbb679e4b6</i><br /><br />Threat actor <b>description</b>: <i>At Cafe Zupas, we believe that real, whole food should always come first. With daily premium produce deliveries and 18 hours of combined prep, our restaurant teams make everything from scratch each day, including our salad dressings, sandwich spreads, and soups. We’re driven by our mission of “Nourish The Good Life!” It guides us to push the bounds and provide something that our guests love and feel great eating. After all, eating right should be delicious. With protein packed Good Life Bowls, refreshing salads, hearty soups and flavorful sandwiches — there’s something for everyone at Cafe Zupas!SITE: www.cafezupas.comADDRESS:
460 W Universal Circle
Sandy, Utah 84070
United StatesTEL#: (801) 216-8148ALL DATA SIZE: ≈800gb
1. Employees personal documents
2. Financial data
3. Confidential data
4. Accounting
& etc…</i><br />Target victim <b>website</b>: <i>cafezupas.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>medicacorp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19192</link>
<guid>f869d4accedf2bf6b9469a3be9f1d715</guid>
<pubDate>Wed, 04 Dec 2024 12:20:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>medicacorp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>852dbeb0120951ff7be4bf7fe0a0c4ad4d0bda417f9778a028328b2cd38805da</i><br /><br />Threat actor <b>description</b>: <i>Medica Corporation is a manufacturer specializing in diagnostic blood testing analyzers. The company focuses on creating simple-to-use and highly reliable devices for in vitro diagnostic laboratories, particularly those that are small to medium-sized. Their product range includes clinical chemistry analyzers, blood gas analyzers, and electrolyte analyzers.SITE: www.medicacorp.comADDRESS:
5 Oak Park Drive
Bedford, MA 01730
United StatesTEL#: 1 800 777 5983ALL DATA SIZE: ≈1.5tb
1. Departments data: Corporate, Financial, Accounting, Graphics… etc
2. Users data, Personal employees documents
3. Confidential data, NDA’s
4. R&D, Engeneering, Projects
& etc…</i><br />Target victim <b>website</b>: <i>medicacorp.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>westbornmarket.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19172</link>
<guid>fe5e902f7f31e84ff8ad88c13b653f2a</guid>
<pubDate>Wed, 04 Dec 2024 08:51:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>westbornmarket.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>787369410ec7979320c7862d3b515d474309ba69865c2234fc00f90120892004</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Westborn Market is a specialty grocery retailer known for offering a wide selection of fresh produce, gourmet foods, and fine wines. The company emphasizes quality and locally sourced products, catering to customers seeking unique and high-quality ingredients. Westborn Market is committed to providing an exceptional shopping experience, focusing on customer service and community involvement.</i><br />Target victim <b>website</b>: <i>westbornmarket.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>marietta-city.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19195</link>
<guid>2fbdd77210d6beb40c3bd1bd026f63ed</guid>
<pubDate>Wed, 04 Dec 2024 07:41:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>marietta-city.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8d95b2eaf62ccb8806a9be49be7092184b90ae1155c52fd45b888426da4a02c2</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Marietta-city.org is the official website for the city of Marietta, Georgia. It serves as a central hub for information about the city's government, services, and community resources. The site provides details on city departments, local events, public notices, and municipal operations. It aims to facilitate communication between residents and city officials, enhancing civic engagement and access to public services.</i><br />Target victim <b>website</b>: <i>marietta-city.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Communicare-Inc.US</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19158</link>
<guid>f3840c3e3fb9af1a9d9a815e1c2adcf9</guid>
<pubDate>Tue, 03 Dec 2024 20:53:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>daixin</b> claims attack for <b>Communicare-Inc.US</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>867551e610d0df2057da9b4a4dadb01570a249a34cf3b0a3c02a44e97d45ad52</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>daixin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Inland-Tarp--Liner</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19149</link>
<guid>b01f659554805dc3b0dd01f757d440f9</guid>
<pubDate>Tue, 03 Dec 2024 20:30:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Inland-Tarp--Liner</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6bcba2e2c493f4ac2810cd4396aaa151839da5dc0e658a61ccd9b833ff24929f</i><br /><br />Threat actor <b>description</b>: <i>Over the past 40 years, Inland Tarp & Liner® has evolved from a hay tarp manufac...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>SGS-Co-US</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19152</link>
<guid>d28c252abf26d8ffa69ad522c66b698e</guid>
<pubDate>Tue, 03 Dec 2024 18:54:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>daixin</b> claims attack for <b>SGS-Co-US</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8082c40d99977b23efe28113af36b3e2da31bd7fe7224cffee2c89ccb3720567</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>daixin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.iscinc93.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19160</link>
<guid>5ef7f68d74e8de904b773669eff12e1d</guid>
<pubDate>Tue, 03 Dec 2024 18:44:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.iscinc93.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3af6bca2b8ddf20a90f260f9b5591280b2b2e8c71ef2488a7514a22220cd468a</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] ISC, Inc. is a company that specializes in providing information security consulting services. Established in 1993, it offers a range of services including cybersecurity assessments, risk management, compliance consulting, and IT security solutions. ISC, Inc. aims to help organizations protect their data and networks by implementing effective security measures and strategies tailored to meet specific client needs.</i><br />Target victim <b>website</b>: <i>iscinc93.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.fibrogen.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19161</link>
<guid>6a3eb9a0e11d2e50254bd6e0dd993eba</guid>
<pubDate>Tue, 03 Dec 2024 18:43:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.fibrogen.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c517a19049f7cf3edd5e75bbace019badd183799a6ea5584750ae816de025cdb</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] FibroGen, Inc. is a biopharmaceutical company dedicated to the discovery, development, and commercialization of novel therapies to treat serious unmet medical needs. The company focuses on areas such as fibrosis and oncology, with its lead product candidates targeting conditions like chronic kidney disease and anemia. FibroGen harnesses innovative technologies to develop first-in-class therapeutics.</i><br />Target victim <b>website</b>: <i>www.fibrogen.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.z2data.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19162</link>
<guid>851d6b8d0d0678635b00bf448a3dd76b</guid>
<pubDate>Tue, 03 Dec 2024 18:40:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.z2data.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>55db96f44122c1bb72b2173d193539cd8f9720f68d9f01ad06184ba4ba9effc4</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Z2Data is a company that specializes in providing supply chain intelligence and risk management solutions. They offer tools and services that help businesses analyze and mitigate risks related to their supply chains, including supplier risk, component availability, and geopolitical factors. Their platform integrates data analytics to enhance decision-making and ensure supply chain resilience.</i><br />Target victim <b>website</b>: <i>z2data.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.wsgcpa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19167</link>
<guid>a371220f8bdb240bffb403c5ac7f3ef1</guid>
<pubDate>Tue, 03 Dec 2024 18:29:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.wsgcpa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e608bee2966ea4d98ba779ee7be24dd86c0762f5043a33efaf1909c162cc256</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] WSG CPA is an accounting firm that offers a range of financial services, including tax preparation, auditing, bookkeeping, and business consulting. They cater to both individuals and businesses, aiming to provide personalized and strategic financial solutions. Their team of experienced professionals focuses on helping clients achieve financial success through expert guidance and support.</i><br />Target victim <b>website</b>: <i>www.wsgcpa.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>InterCon-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19154</link>
<guid>4a33edb840d8caeb24bbcb1b0ce1d8d7</guid>
<pubDate>Tue, 03 Dec 2024 16:41:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>InterCon-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4460f44e0a427f5c149da114f0e12ffe4b11b9b6285d961a690f87c08a45da3c</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>www.intercon-const.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Royce-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19153</link>
<guid>1b4425e72b5a1eb7cb80882cb2502f34</guid>
<pubDate>Tue, 03 Dec 2024 15:05:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>Royce-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>080da2d728171593c0a5dfa2ffaf569218631b3498bb568cfd9742db6dcbb006</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Royce Corporation is a global trading company specializing in the distribution and marketing of industrial raw materials and chemicals. The company serves a diverse range of industries, including metallurgy, electronics, and energy. Known for its strong supply chain management and strategic partnerships, Royce Corporation aims to deliver quality products and services to meet the evolving needs of its clients worldwide.</i><br />Target victim <b>website</b>: <i>roycecorporation.com</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>IDN</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19145</link>
<guid>aae9f5d3f077388ec544d70d8a949326</guid>
<pubDate>Tue, 03 Dec 2024 11:58:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>IDN</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45a22e04084474220b8040e8aed01e99aa46dc7a1d185d0f640cfd9ca185c5a9</i><br /><br />Threat actor <b>description</b>: <i>IDN quietly began out of a desire to protect two families in the event of untimely deaths. In the early 1970s, Al Hoffman and Virl Mullins, both second-generation owner-operators, found themselves in businesses that traditionally needed to be            ...</i><br />Target victim <b>website</b>: <i>www.idn-inc.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Goodwill-North-Central-Texas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19143</link>
<guid>cd7d952b109ea30fa0b8b59c7b7be36d</guid>
<pubDate>Tue, 03 Dec 2024 10:52:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Goodwill-North-Central-Texas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1825539050be18f05711852620d3f63324a0b3b049285cd95e9bac47fb046cec</i><br /><br />Threat actor <b>description</b>: <i>Goodwill North Central Texas You'll find a lot of personal employee information here, SQL databases with clients payment information. Enjoy.Founded by Methodist Minister Edgar J. Helms in 1902, Goodwill gave people with disabilities and other social barriers the opportunity to find meaningful work. From the beginning, Goodwill's mission has promoted job creation for the disenfranchised.</i><br />Target victim <b>website</b>: <i>Enjoy.Founded</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-Age-Micro</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19142</link>
<guid>ff23b5e3594d0ed1e0e83a7176d2d281</guid>
<pubDate>Tue, 03 Dec 2024 06:28:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>New-Age-Micro</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b13a4309ab0355cb03263d686d0c1f076398153a40214e4f41fc554a7fc522ed</i><br /><br />Threat actor <b>description</b>: <i>A distinguished product design firm located in Mansfield, MA, New Age Micro has over 20 years of success delivering design services in the areas of software and firmware development, hardware and mechanical design, simulation, and test. The experience that the team brings spans numerous industries and includes research and development, tool design, and design for manufacturing. Diverse backgrounds at New Age Micro combine to offer a unique perspective and an agile development environment that allows the team to scale to meet the speed and complexity requirements of any project they encounter.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Textiles-Coated-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19140</link>
<guid>b37d4650ab6bcd16657b72b343cb9595</guid>
<pubDate>Mon, 02 Dec 2024 21:26:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Textiles-Coated-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c6e269c54206906c18444aa0c0f26f404e42017ca8674ec852d46a80ae72194b</i><br /><br />Threat actor <b>description</b>: <i>TCI (Textiles Coated International) is an American manufacturer of high-performance fluoropolymer films, laminates, and composites. Since 1985, TCI has been continuously manufacturing high-quality fluoropolymer materials designed to perform in the most challenging thermal and chemical environments. TCI is proud to be the only supplier to offer PFA, FEP, ETFE, PVDF, ECTFE, PTFE cast films, and 100% PTFE CrossFilm. TCI's superior material quality has enabled expansion joint manufacturers to engineer successful long-term solutions for fabric expansion joints. Today, TCI is the world's leading manufacturer of high-performance PTFE materials for non-metallic expansion joint manufacturers. As the PTFE experts, TCI has decades of experience helping customers to diagnose and understand the effectiveness of PTFE barrier materials. TCI's product range includes specialty materials such as CrossFilm, a variety of PTFE coated fiberglass fabrics, and other materials engineered for performance in challenging applications.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Robson-Planning-Group-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19156</link>
<guid>f9185e6f4e26bb03bb309a5622fbb45e</guid>
<pubDate>Mon, 02 Dec 2024 20:59:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Robson-Planning-Group-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77565123bb3797f4ac2bf108e8a43f153fc53b2f989ec19c914aa248d386d846</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>robsonplanning.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Care-Age-of-Brookfield</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19155</link>
<guid>62f72f60b5d8f2daa4be4172957c458c</guid>
<pubDate>Mon, 02 Dec 2024 20:58:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Care-Age-of-Brookfield</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c646e9a637155d4d8d6b02a4f37e935fdf0869f94243cbda2c9a183766defa0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>care-age.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>salesgig.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19138</link>
<guid>e0c5b770acef5dc9a9c462548446c082</guid>
<pubDate>Mon, 02 Dec 2024 20:50:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>darkvault</b> claims attack for <b>salesgig.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7987d4e99b425fd6aed4affabb0183196e13d86649a1c95c43ee3012c9db378</i><br /><br />Threat actor <b>description</b>: <i>SalesGig provides outsourced sales development to support our B2B clients generate leads. We deploy proven outbound strategies to expand reach, open conversations, and set sales meetings.</i><br />Target victim <b>website</b>: <i>salesgig.com</i>]]></description>
<category>darkvault</category>
</item>
<item xmlns:dc='ns:1'>
<title>KHKKLOW.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19136</link>
<guid>2cfd22322a832d773c4218f4559fa174</guid>
<pubDate>Mon, 02 Dec 2024 19:00:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>KHKKLOW.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f618ed4202859f20e6ca4dfe997981ab9044c51cf2b1679992812b08a277a759</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] I'm sorry, but I couldn't find any information on a company called "KHKKLOW.com." It's possible that it may be a small, lesser-known business or a misspelling. If you have any additional details or context, feel free to provide them, and I can try to assist you further.</i><br />Target victim <b>website</b>: <i>KHKKLOW.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Conlin39s-Pharmacy-conlinspharmacy.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19134</link>
<guid>f3c1eaec9dce37a8f6b301a80570dff9</guid>
<pubDate>Mon, 02 Dec 2024 14:52:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>FOG</b> claims attack for <b>Conlin39s-Pharmacy-conlinspharmacy.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d2660ea5ff2d0ae306b5757dfc518525f827a9c808a3a99ca201e6c6f10316f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>FOG</category>
</item>
<item xmlns:dc='ns:1'>
<title>Avico-Spice</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19131</link>
<guid>493c465c0ff313adb2a8164d3cdee573</guid>
<pubDate>Mon, 02 Dec 2024 09:30:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Avico-Spice</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04e93a00c9cdafd5583b821f933b7a9c6b09fad020d1755fa78e4c190da8799e</i><br /><br />Threat actor <b>description</b>: <i>Avico Spice is located in New York State. Packers of spices, grated cheese products, fruit and nut products and flavorings. These products are sold in various sizes. The company was previously known as A. Vitagliano & Company, which was established in 1926.</i><br />Target victim <b>website</b>: <i>avicospice.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Down-East-Granite</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19132</link>
<guid>75b769beb7e88dc7c59c1adb2006533c</guid>
<pubDate>Mon, 02 Dec 2024 09:29:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Down-East-Granite</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2d41302c3440c6fe0583ff8cb9fccec5227c2256486baba75a77ac74b0b1704b</i><br /><br />Threat actor <b>description</b>: <i>Down East Granite is currently Central Pennsylvania’s fabricator of Granite, Quartz, Corian®, Dekton and Other Natural Stone surfaces. Down East Granite is currently Central Pennsylvania’s fabricator of Granite, Quartz, Corian®, Dekton and Other Natural Stone surfaces.</i><br />Target victim <b>website</b>: <i>downeastgranite.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wiley-Metal-Fabricating</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19133</link>
<guid>baaf111c2bdc129a356a14f79fefd224</guid>
<pubDate>Mon, 02 Dec 2024 09:28:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Wiley-Metal-Fabricating</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cdbdeab03e7cf2caad9c402641f0e1d82e305f6f5d19d1ed9ad81f9a3e5e85d9</i><br /><br />Threat actor <b>description</b>: <i>Wiley Metal Fabricating - the company is engaged in the manufacture of sheet and structural metal. Wiley Metal Fabricating corporate office is located in 4589 N Wabash Rd 46952, Marion, Indiana, 46952, United States and has 96 employees. </i><br />Target victim <b>website</b>: <i>wileymetal.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>tascosaofficemachines.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19126</link>
<guid>3a5b32a30dde157ac0e5e90d1330fe91</guid>
<pubDate>Sun, 01 Dec 2024 22:48:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>tascosaofficemachines.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5bf3e4cfe37b725e3d6d44bda5ae92217465611fa5c89c20ad7dfc5145c6b8a1</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Tascosa Office Machines is a company specializing in providing office equipment and supplies. They offer products such as printers, copiers, and fax machines, as well as related services like maintenance and repair. The company focuses on helping businesses optimize their office operations through reliable equipment and support, ensuring efficient workflow and productivity.</i><br />Target victim <b>website</b>: <i>tascosaofficemachines.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>shapesmfg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19124</link>
<guid>16e62507eba0d973dc7aa14aa3aa41ab</guid>
<pubDate>Sun, 01 Dec 2024 20:53:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>shapesmfg.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2afb1e95403d60e0aa089d2945ac8215a137337668bd47cfdafa864fbd8b4a69</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Shapes Manufacturing is a company known for producing high-quality custom cabinetry, countertops, and architectural millwork. They focus on delivering tailored solutions for both residential and commercial projects. With a commitment to craftsmanship and innovation, Shapes Manufacturing uses state-of-the-art technology and skilled artisans to ensure precision and quality in every product they create.</i><br />Target victim <b>website</b>: <i>shapesmfg.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>everde.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19127</link>
<guid>4c6ec11e967c21b14b970b16579cdf13</guid>
<pubDate>Sun, 01 Dec 2024 19:46:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>everde.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5538235f4d1f8cd6d573ee9cc14eb714fcf8a017b23a554519bbb88fcf379e5</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Everde.com is an online platform specializing in eco-friendly products and sustainable solutions. The company offers a wide range of environmentally conscious goods, aiming to promote a greener lifestyle. Their product catalog includes items for home, personal care, and outdoor living, all sourced with a focus on reducing environmental impact. Everde.com is committed to fostering sustainability and environmental awareness.</i><br />Target victim <b>website</b>: <i>everde.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>qualitybillingservice.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19128</link>
<guid>d68064201291ce47be8ac5d3918bcb49</guid>
<pubDate>Sun, 01 Dec 2024 19:42:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>qualitybillingservice.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3de1fecff1777892aa0ea859ee556389c41bcb584ef88d84998ad707bec82474</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Quality Billing Service is a company that specializes in providing medical billing services to healthcare providers. They focus on streamlining the billing process to enhance efficiency and ensure accurate claims submission. By offering services like account management, claims processing, and revenue cycle management, they aim to optimize financial performance for medical practices and improve overall revenue recovery.</i><br />Target victim <b>website</b>: <i>qualitybillingservice.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>costelloeye.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19123</link>
<guid>a0519cba56fbfc7adac9c0a3d313b27d</guid>
<pubDate>Sun, 01 Dec 2024 18:53:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>costelloeye.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>13c6024864dd8acfa51c779d978e649fd5af24c6a7e7ca91c116dc42cc240823</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Costelloeye.com is an online retailer specializing in eyewear. The company offers a wide range of products, including prescription glasses, sunglasses, and contact lenses. They focus on providing stylish and affordable eyewear options for customers, featuring various frame styles and lens types to suit different needs. Costelloeye.com emphasizes customer satisfaction and convenient online shopping.</i><br />Target victim <b>website</b>: <i>costelloeye.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>apeagers.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19122</link>
<guid>a0fc5fecef9ad44aaf6ddf8c90ae1503</guid>
<pubDate>Sun, 01 Dec 2024 14:45:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>apeagers.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a9164ff5ec33ea7e67801f26a9383c3c5e39db1b76ae4e2326fd619196aacf4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alpine-Ear-Nose--Throat</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19121</link>
<guid>f67cd61e7bcf9f4d6b2c3e19e2c2d36d</guid>
<pubDate>Sun, 01 Dec 2024 08:48:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Alpine-Ear-Nose--Throat</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7a40378da5d096bdb48face0ea312407ad0f4b8f661922dac34dc0ea5af219b</i><br /><br />Threat actor <b>description</b>: <i>Alpine ENT is committed to providing comprehensive, high-quality ear, nose and throat care to the entire family through all stages of life.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>backyarddiscovery.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19105</link>
<guid>fa4181f0908262b9a921cbf04f821dc6</guid>
<pubDate>Sat, 30 Nov 2024 04:53:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>backyarddiscovery.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0791e3c786302c9027942ed3ac72c439f030dbd7b037555dc5554e54effc7ad6</i><br /><br />Threat actor <b>description</b>: <i>Backyard Discovery is built for families. From a child’s first playset to structures that guard the parents’ newest outdoor interests, our products are meant to play a role in families’ lives for years and years. 

You can find our dedicated team hard at work in our Pittsburg, KS headquarters and diligently focused at every one of our distribution centers. Each of our innovators and specialists is passionate about helping families enjoy wonderful moments right in their own backyards — and you can see that focus in our high-quality gazebos, pergolas, swing sets, playhouses, and backyard leisure products.  - ~1TB of confidential data.</i><br />Target victim <b>website</b>: <i>backyarddiscovery.com</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trace3</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19104</link>
<guid>5c9ed990f67300b9ad87bd008cce0d88</guid>
<pubDate>Sat, 30 Nov 2024 03:30:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Trace3</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45275c538cafba8b76001a8d3964249d7f481c7d49b15af0f4bae44d8c8bc851</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.trace3.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Specialty-Bolt-And-Screw</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19103</link>
<guid>b091041b6a9c7b39ba303f8d4c950e4a</guid>
<pubDate>Sat, 30 Nov 2024 01:54:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Specialty-Bolt-And-Screw</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b1d648658cc614e261c117fed918d76faab04bccf538fa9de8d08b1e8f5ff33</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.specialtybolt.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bendheim</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19102</link>
<guid>7ab581c337ee3c0d15ab76aa483ecc87</guid>
<pubDate>Fri, 29 Nov 2024 22:48:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Bendheim</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8952c89983bbdca96015f320a6047495d4c81331d9e27e403f9bfd262a6b376</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.bendheim.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tillamook-Country-Smoker-tcsmoker.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19053</link>
<guid>7558a03211f17086e4b8d0fbd35e9a6a</guid>
<pubDate>Fri, 29 Nov 2024 14:21:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Tillamook-Country-Smoker-tcsmoker.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a5d258ddf884e333f7cb5aabd59099d964009ca381f175bfd114bbc918f75ed7</i><br /><br />Threat actor <b>description</b>: <i>Tillamook Country Smoker (TCS) is a long-standing producer of high-quality beef jerky and meat sticks distributed primarily through grocery, convenience mass, specialty and e-commerce channels.We are ready to upload more than 14 GB of internal corporate documents including: SSNs, inside financial and medical information, employee contact phones and emails, etc.</i><br />Target victim <b>website</b>: <i>tcsmoker.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Packard-Machinery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19055</link>
<guid>850618e22f83f152773d2a3e51168812</guid>
<pubDate>Fri, 29 Nov 2024 14:21:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Packard-Machinery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be8b2711d940624b080e914b69f880ede2f8d1b03e959943dc22761b886991b3</i><br /><br />Threat actor <b>description</b>: <i>Packard Machinery Co. is a premier distributor of both high end and economy class equipment. With a full compliment of Sales, Service, Parts & ApplicationsWe are ready to upload more than 25 GB of internal corporate documents including: inside financial information, customer and employee contacts personal phones and emails, NDAs etc.</i><br />Target victim <b>website</b>: <i>packardmachinery.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brookway-Landscape-Irrigation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19056</link>
<guid>1d03d95d9ecec536919aef1b00f99915</guid>
<pubDate>Fri, 29 Nov 2024 14:20:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Brookway-Landscape-Irrigation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de0f31f64bc71a46c90413d946641076d814343c1ad87b1d72c0b9842ec2ab03</i><br /><br />Threat actor <b>description</b>: <i>Brookway Landscape & Irrigation (Brookway Horticultural Services)is a local, family-owned and operated landscaping company operating throughout Texas.You will find a lot of internal financial documents, customer contacts, personal employees information, NDAs etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aviosupport</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19057</link>
<guid>7cbaaa9b7b79120a7e12db5b2e51137f</guid>
<pubDate>Fri, 29 Nov 2024 14:20:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Aviosupport</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ecba910d5037858c72cf5097e7bc5ad17fe41227df3ea8ee3f57f6be81b8ba0</i><br /><br />Threat actor <b>description</b>: <i>Aviosupport is a leader in the global distribution of aircraft spare parts to the commercial aerospace industry.We are ready to upload a lot of internal corporate documents including:  NDAs, insurance documents, customer contacts, employees contact with family info and many others data.</i><br />Target victim <b>website</b>: <i>aviosupport.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wadsworth-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19060</link>
<guid>8f2ba96517924ee3d08ec132c4bad818</guid>
<pubDate>Fri, 29 Nov 2024 14:20:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Wadsworth-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48a3d0d80fe9bd8e4f7f87e5fb702a09f738ec21fa19dc530ed36c5fa256d90c</i><br /><br />Threat actor <b>description</b>: <i>Wadsworth Solutions, founded in 1944 and located in Northern Ohioand Southeastern Michigan represents LG Air Conditioning Technologies along with Schneider Electric and over 40 other HVAC related lines.We are ready to upload a lot of internal corporate documents including: employee and customer contact phones and emails, inside financial documents, credit card numbers etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>AMI-Consulting-Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19061</link>
<guid>07662abf6d1635f05215d0614a1b6329</guid>
<pubDate>Fri, 29 Nov 2024 14:20:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>AMI-Consulting-Engineers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>80018d151727b029507d89e3981da45c4feace86b979719801c42425d645a8bf</i><br /><br />Threat actor <b>description</b>: <i>AMI is driving innovation in Ports & Harbors, Coastal & Riverine,Waterfronts & Marinas, Dams & Levees, Buildings, and Industrial Facilities.We are ready to upload more than 30 GB of internal corporate documents including: NDAs, human resources info, confidential agreements, SSNs, personal medical documents etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>HTT-Packaging--Design</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19062</link>
<guid>c703c1c23ad683836fe8c1acce9b850a</guid>
<pubDate>Fri, 29 Nov 2024 14:20:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>HTT-Packaging--Design</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>69aa637a2b9820e941823fdadf31ea22204177332c5974455e57ee210316974b</i><br /><br />Threat actor <b>description</b>: <i>HTT Packaging & Design offers contract manufacturing for cosmeticand personal care flexible packaging, including single-serve stick packs.We are ready to upload a lot of internal corporate documents including: SSNs, employee and customer contact phones and emails, NDAs, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sanderson-Stewart</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19064</link>
<guid>88e55a033cf994dc7a12e1cd3bd94148</guid>
<pubDate>Fri, 29 Nov 2024 14:20:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Sanderson-Stewart</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2995d84da36f7aea5a2ddab320cf46cd06f93a9a553a1bd85470b7e588e17db7</i><br /><br />Threat actor <b>description</b>: <i>Sanderson Stewart make: Infrastructure Engineering Surveying   Mapping Community Planning Placemaking Landscape Architecture Construction Administration   Inspection Branding   VisualizationWe are ready to upload a lot of internal corporate documents including: inside financial information, customer and employee contact emails and phones, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Touchstone-Home-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19065</link>
<guid>fe6f3afebbe889231eac68c1ba5f8815</guid>
<pubDate>Fri, 29 Nov 2024 14:20:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Touchstone-Home-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>316f7101a7002069fdc85edba437f3e0ecfa0aab4862528e3acfb2e9032b00ba</i><br /><br />Threat actor <b>description</b>: <i>Touchstone Home Products, Inc. is an industry leader in Electric Fireplace and TV Lift products for the home since 2005.We are ready to upload more than 20 GB of internal corporate documents including: employee and customer contact information, business licenses, insurance documents etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Astor-Chocolate</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19066</link>
<guid>7ed94938c403c962c1798fe420759807</guid>
<pubDate>Fri, 29 Nov 2024 14:20:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Astor-Chocolate</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>74272e881b8f4e709b4852e194c60c94a62066b8add6ade5ee1c034c577bf2ac</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1950, Astor Chocolate is a company that specializes inthe manufacturing of chocolate confections.We are ready to upload a lot of inside financial documentation, many customer and employee emails and phones etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>McFarlane-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19067</link>
<guid>7fc67a493d49abe6d0500d56675f41b2</guid>
<pubDate>Fri, 29 Nov 2024 14:20:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>McFarlane-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ccd73dbdd7c1d5b4cf2e2bb0c62b35c82515559444ed745eab53a0ae0314d376</i><br /><br />Threat actor <b>description</b>: <i>McFarlane, Inc. will be known as the best HVAC contracting firm in its market area of North Dakota and Northern Minnesota.You will find a lot of NDAs, customer contacts, driver licenses, employees contact information, SSNs etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Summit-Hosting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19068</link>
<guid>55b815e096cacb06e3e556d22e8d106c</guid>
<pubDate>Fri, 29 Nov 2024 14:20:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Summit-Hosting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c103b4b1990c01293be0ecef2a24f4dd5025d62d3d285930de180d9e17d538e1</i><br /><br />Threat actor <b>description</b>: <i>Summit Hosting provides cloud-based hosting to businesses all around the world.We are ready to upload a lot of NDAs, contracts with customers, driver licenses, internal confidential information, personal employees data etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>MSR-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19070</link>
<guid>5855ca6943b39eebcf37a20cf7e4626c</guid>
<pubDate>Fri, 29 Nov 2024 14:20:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>MSR-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1cc5f4a143f67796805c97ee2fe8457567400e58622dccca4a5edc8c45071af5</i><br /><br />Threat actor <b>description</b>: <i>MSR Group offers market research and data collection services. They offer advice, counsel, and a range of data gathering techniques.We are ready to upload a lot of NDAs, customers contact information, employees contact data etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>First-Chatham-Bank</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19072</link>
<guid>45b430710ad04765a6afd58d9d9fafca</guid>
<pubDate>Fri, 29 Nov 2024 14:20:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>First-Chatham-Bank</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c3f5e18d4a6461647446590e6cf8dcf2627595297aef1fcd0ca04b77723628a</i><br /><br />Threat actor <b>description</b>: <i>First Chatham Bank’s deposits are FDIC insured and it prides itself in providing businesses and individuals quality lending and banking services.We are ready to upload more than 9 GB internal corporate documents including: driver licenses, employee and customer contacts, inside financial documents etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Metal-Finishing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19073</link>
<guid>76d90b75c6cfb51ac5f82f265b06a6d7</guid>
<pubDate>Fri, 29 Nov 2024 14:20:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Metal-Finishing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8d14c14bbcbec3b60ffcf3a309634cd3dfefeb45fcf1f3e97340059aa9e5358a</i><br /><br />Threat actor <b>description</b>: <i>Metal Finishing Company, Inc. was established in Wichita Kansas USA in 1940, the largest family-owned aerospace processing facility in North America.We are ready to upload more than 40 GB internal corporate documents including: NDAs, license agreements, internal financial documents, employee and customer contact emails and phones etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>North-Shore-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19075</link>
<guid>58efaf15321bf4da55b2e668b73657c3</guid>
<pubDate>Fri, 29 Nov 2024 14:20:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>North-Shore-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>11da2fa5b34ac4b417f405d5fdd18a4895cd75252cee814d6d6d03a5064b3bbe</i><br /><br />Threat actor <b>description</b>: <i>North Shore Systems LLC is a computer software company that provides end-to-end digitization for all types of commercial/CRE loans. Based out of San Clemente, CA.We are ready to upload more than 100 GB internal corporate documents including: driver licenses, operating agreements, internal financial documents, SSNs, employees contacts etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Weld-Racing-weldracing.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19078</link>
<guid>264095b9e936a7831228d84f429f58c8</guid>
<pubDate>Fri, 29 Nov 2024 13:04:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>FOG</b> claims attack for <b>Weld-Racing-weldracing.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ccc1f91258f899da04c0e7905e339651c218356ae200fd66b1030c9bed2b9a6a</i><br /><br />Threat actor <b>description</b>: <i>10,1 GB</i><br />Target victim <b>website</b>: <i>weldracing.com</i>]]></description>
<category>FOG</category>
</item>
<item xmlns:dc='ns:1'>
<title>Colwell-Colour-colwellcolour.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19096</link>
<guid>7d2e114bb4f82968194866029ed60d81</guid>
<pubDate>Fri, 29 Nov 2024 13:01:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Colwell-Colour-colwellcolour.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3bd2a0d63f78d262beba6c9baf00e029869cdcc3fde13133befc6663b6e49839</i><br /><br />Threat actor <b>description</b>: <i>Colwell Colour is located in Kendallville, Indiana. Thi
s organization primarily operates in the Stationery bus
iness / industry within the Wholesale Trade - Nondurabl
e Goods sector.

We are ready to upload more than 6 GB of internal corpo
rate documents including: inside financial documents, c
ustomer and employee contacts, etc.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:E6C13C82063FEB2E9173F60
B3300F0E65B4B0503&dn=colwellcolour.com&tr=udp://tracker
.openbittorrent.com:80/announce&tr=udp://tracker.opentr
ackr.org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>colwellcolour.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dfa-Ny</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19093</link>
<guid>f8fe87eaaf9de9b65de232bcb8dd7e3d</guid>
<pubDate>Fri, 29 Nov 2024 13:01:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Dfa-Ny</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c0b7e612c6e7f1014f62cff0a5d9d05f5514b28a45249b413c133c2ec96ec9b</i><br /><br />Threat actor <b>description</b>: <i>Dfa Ny LLC is a company that operates in the Apparel & 
Accessories Retail industry.

You will find more than 3 GB of insurance documents, in
ternal corporate documents and financial information et
c.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:1082F82C698F5436E5AEB07
734C3628B4D4EE7CF&dn=dfanyllc.com&tr=udp://tracker.open
bittorrent.com:80/announce&tr=udp://tracker.opentrackr.
org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>dfanyllc.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cate-Equipment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19092</link>
<guid>89a00d1f45ff0e3d4647dcf08a8b02e4</guid>
<pubDate>Fri, 29 Nov 2024 13:01:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Cate-Equipment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>21e937235c3e1662f71c1be57792d42eebdbb0ba787e993c22a27b64efe33623</i><br /><br />Threat actor <b>description</b>: <i>Cate Equipment Company has been serving the constructio
n, mining & industrial industries throughout the Interm
ountain area since 1938 from our locations in Utah & Id
aho.

You will find a lot of customers contacts with phones a
nd addresses, internal financial documents, inside corp
orate correspondence, personal employee information wit
h phones and passwords etc

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:AAB02FE4BBBDA12A3C0FDE1
D3774F46784F5990C&dn=cate.com&tr=udp://tracker.openbitt
orrent.com:80/announce&tr=udp://tracker.opentrackr.org:
1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>cate.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Corman-Leigh</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19090</link>
<guid>ba01f7779044c1ca322b725274f04d35</guid>
<pubDate>Fri, 29 Nov 2024 13:01:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Corman-Leigh</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8cbdf16a9826cf089056653c759472728860029defb7bec06c86ab33543c42c2</i><br /><br />Threat actor <b>description</b>: <i>Corman Leigh is a residential and commercial property i
nvestment firm that seeks out strategic real estate opp
ortunities.

You will find many internal financial documents, custom
er phone numbers, emails and addresses, internal exchan
ge agreements, etc.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:CB1CD6C157283A0637C6121
C30F28F05BCB2E00A&dn=cormanleigh.com&tr=udp://tracker.o
penbittorrent.com:80/announce&tr=udp://tracker.opentrac
kr.org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>cormanleigh.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rengo-Packaging</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19086</link>
<guid>28e2ec06c30bf13443769498502ed048</guid>
<pubDate>Fri, 29 Nov 2024 13:01:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Rengo-Packaging</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f9e73b32022f7b66c27c686079068acffb53b28d89a5490166fc82eadb23c8c</i><br /><br />Threat actor <b>description</b>: <i>Rengo Packaging manufactures and distributes corrugated
packaging products.

You will find a lot of internal financial information, 
insurance documents, customer contacts, tax identificat
ion numbers, governments contacts etc.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:11298184BBDDE57AF8CD5B6
3684BCDCF16D9BEE4&dn=rengopackaging.com&tr=udp://tracke
r.openbittorrent.com:80/announce&tr=udp://tracker.opent
rackr.org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>rengopackaging.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lotus-Concepts-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19085</link>
<guid>3b711f9b6132fbe397bc5ff44c46133a</guid>
<pubDate>Fri, 29 Nov 2024 13:01:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Lotus-Concepts-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d5274845a5eb0475fecda73840a053e9018de4b27cac15da54d9a88d0c9aafbd</i><br /><br />Threat actor <b>description</b>: <i>Lotus Concepts is Denver's premier restaurant and night
life group specializing in hospitality, operations, ent
ertainment and real estate.

You will find a lot of personal employees data with med
ical documents, internal financial documentation, custo
mer contacts etc.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:5E7C678374CEE15C24AD0CA
9900308B0F20ABDCE&dn=lotusconceptsmgmt.com&tr=udp://tra
cker.openbittorrent.com:80/announce&tr=udp://tracker.op
entrackr.org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>lotusconceptsmgmt.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>4QuartersIT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19084</link>
<guid>94b21f11c7148f780f842edeee360ddb</guid>
<pubDate>Fri, 29 Nov 2024 13:01:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>4QuartersIT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d966635c9c48463712b5c85f33ad404c81e6da72469d194036e7a19532152a12</i><br /><br />Threat actor <b>description</b>: <i>4QuartersIT is a custom software and IT services compan
y headquartered in Jacksonville, Florida.

You will find a lot of employee and customer contacts, 
internal financial documents etc.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:E900DD0A3D8D431F8BA876C
4A2A0AB3229F1294F&dn=4quartersit.com&tr=udp://tracker.o
penbittorrent.com:80/announce&tr=udp://tracker.opentrac
kr.org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>4quartersit.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Magguilli-Law-FirmPPLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19082</link>
<guid>4aa2bbac27f1625907a53d2933a16e04</guid>
<pubDate>Fri, 29 Nov 2024 13:00:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Magguilli-Law-FirmPPLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>176cac068bfedba6a81a871fca135e7c55fe0f4ab478de8e998528a85e8ae5bd</i><br /><br />Threat actor <b>description</b>: <i>Lawrence P. Magguilli is the managing member of the Mag
guilli Law Firm, PLLC and concentrates his practice in 
the areas of creditors’ rights litigation, debt collect
ion and judgment enforcement. 

We have some financial corporate data, medical document
s etc.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:3920F718FF5C373CB92A05D
6B34178E3AA3E030B&dn=magguillilaw.com&tr=udp://tracker.
openbittorrent.com:80/announce&tr=udp://tracker.opentra
ckr.org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>magguillilaw.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Turf-Paradise</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19081</link>
<guid>6944d4d43c2ec200647b67e58153a123</guid>
<pubDate>Fri, 29 Nov 2024 13:00:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Turf-Paradise</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7fa3489d8215fff30d101d41c847f6c7bf86b7647001cb227a520a04cd7c850d</i><br /><br />Threat actor <b>description</b>: <i>Turf Paradise is a horse racetrack located in Phoenix, 
Arizona since 1956. Live race season is from October Ma
y.

You will find a lot of personal employees data with con
tact information.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:75C0B2C1D7E2A4F33FB31EB
6CA8FBFFA53785775&dn=turfparadise.com&tr=udp://tracker.
openbittorrent.com:80/announce&tr=udp://tracker.opentra
ckr.org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>turfparadise.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bennett-Porter-Wealth-Management-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19080</link>
<guid>863f443c06e0d5ee8103c6a11716e9cc</guid>
<pubDate>Fri, 29 Nov 2024 13:00:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Bennett-Porter-Wealth-Management-Insurance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9dc7157a4d4b50e2bf89f9f68d90b3ce0d1d5fad97878460ac2fc7152bddf80b</i><br /><br />Threat actor <b>description</b>: <i>Bennett & Porter is designed to operate as a "multi-family office
" model; offering a breadth of services that allow individuals, f
amilies and businesses to have a single point-of-contact for all 
their wealth management and insurance needs.

We are ready to upload more than 50 GB of internal corporate docu
ments including: inside financial information, customer contacts,
personal employees data and SSNs..
</i><br />Target victim <b>website</b>: <i>bennettandporter.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>brownpacking.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19050</link>
<guid>9016512cbdfaa7634ba35dd446297b7b</guid>
<pubDate>Fri, 29 Nov 2024 01:22:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>brownpacking.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3c060c8d18b544825b5b9c4ef639b876807da7d477e6a8c3a3f56de1bd32c3f</i><br /><br />Threat actor <b>description</b>: <i>USA - Brown Packing</i><br />Target victim <b>website</b>: <i>brownpacking.com</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>JTEKT-NORTH-AMERICA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19049</link>
<guid>ae93f6696a2a89b67aa6fb45092eded7</guid>
<pubDate>Fri, 29 Nov 2024 01:17:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>JTEKT-NORTH-AMERICA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>893f78218ac456c736648f282507ba5e84ef04e58468774b42b26e5da144a065</i><br /><br />Threat actor <b>description</b>: <i>893.63GB of Data</i><br />Target victim <b>website</b>: <i>jtekt-na.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>IA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19036</link>
<guid>3afe923266f0b23c836dcc7ce34a6a7a</guid>
<pubDate>Thu, 28 Nov 2024 13:11:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>IA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a00e8cb87298d78adfb01c57ef8f82108039f64814231a1fc62378cc50c2834</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>iacindustries.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bedminster-School-bedminsterschool.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19039</link>
<guid>16a8df1b9fc4ed0c3af66ea89567b0bb</guid>
<pubDate>Thu, 28 Nov 2024 12:51:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Bedminster-School-bedminsterschool.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d6ade78e64626da023b22178a5b8fc3c63556cc0d9c70dccb194fe3b002c9515</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>bedminsterschool.org</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>WPM-Pathology-Laboratory-wpmpath.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19038</link>
<guid>f559cf7514371d4acdaa13b23279b874</guid>
<pubDate>Thu, 28 Nov 2024 11:02:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>WPM-Pathology-Laboratory-wpmpath.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e26b8fc78f4bc2625f87db5248e77c79ac22a83a18c124da770fa4586f5fa14e</i><br /><br />Threat actor <b>description</b>: <i>3 GB</i><br />Target victim <b>website</b>: <i>wpmpath.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>elwood.k12.in.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19033</link>
<guid>41de57ab08378f2242821fadf055128b</guid>
<pubDate>Thu, 28 Nov 2024 08:13:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>elwood.k12.in.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ffba3057ee2709e4da8a7dfa6a049be51609c6b2c11f14ab1052ddc1e74b898</i><br /><br />Threat actor <b>description</b>: <i>Revenue $5 Million</i><br />Target victim <b>website</b>: <i>elwood.k12.in.us</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>scottelec.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19032</link>
<guid>d52a77a7e1cfe7d483b6539171b03e64</guid>
<pubDate>Thu, 28 Nov 2024 08:13:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>scottelec.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>abf636f01665c4388a2500aefc1df2b6d9427da344a213b5263a90ff3b376feb</i><br /><br />Threat actor <b>description</b>: <i>Revenue $19.6 Million</i><br />Target victim <b>website</b>: <i>scottelec.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>midlandtool.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19029</link>
<guid>dffa5b524eb9e13af2378a34612ddc03</guid>
<pubDate>Thu, 28 Nov 2024 08:07:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>midlandtool.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f7a91dd714b8c6dc758cda578d9136070a934048b6a87949c10a2844a2a0ec2</i><br /><br />Threat actor <b>description</b>: <i>Revenue $126  Million</i><br />Target victim <b>website</b>: <i>midlandtool.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>cloudofgoods.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19028</link>
<guid>6be210fa28284f66de0df4b76f288fe7</guid>
<pubDate>Thu, 28 Nov 2024 06:47:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>cloudofgoods.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9d87ecd2c4edee3f89c4e9b2a36ad7c262c7db6912323fcb8155d1a0df555880</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>cloudofgoods.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>corenroll.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19025</link>
<guid>69ceed2a4ffe2ae23f8abf71d534a4bd</guid>
<pubDate>Thu, 28 Nov 2024 05:15:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>corenroll.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db4c948f053a13cfc6688951fdf57c60368a7da6f378149a8c5f7064d5012e4d</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Corenroll.com is a company that specializes in streamlining the enrollment process for educational institutions and organizations. It offers a user-friendly platform designed to simplify student registration, manage course offerings, and track enrollment data efficiently. The company's services are aimed at improving administrative workflows, enhancing user experience, and providing comprehensive support for both educators and students.</i><br />Target victim <b>website</b>: <i>corenroll.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ventana-Micro-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19023</link>
<guid>7c9758f23dd298c91fc4bef194ac9b7b</guid>
<pubDate>Wed, 27 Nov 2024 21:04:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>raworld</b> claims attack for <b>Ventana-Micro-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3525596e986a0f63e67c6d8bb29bde58b3e8a7fa8f7726f0079c29982ac223a9</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Ventana Micro Systems is a technology company specializing in the development of high-performance RISC-V processors. The company focuses on delivering scalable and efficient computing solutions for data centers and edge computing applications. By leveraging the open RISC-V architecture, Ventana aims to provide innovative, customizable processors that balance performance, power efficiency, and flexibility.</i><br />Target victim <b>website</b>: <i>ventanamicro.com</i>]]></description>
<category>raworld</category>
</item>
<item xmlns:dc='ns:1'>
<title>alleghenycontract.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19019</link>
<guid>16d459c4b261f3015061a7cc7362851c</guid>
<pubDate>Wed, 27 Nov 2024 20:56:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>alleghenycontract.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>80cd0da3bb2902857a4462e10c665cb86e5437c05fd9978efe10a00c7d553a64</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Allegheny Contract is a company specializing in high-quality contract furniture solutions, primarily serving the hospitality industry. They focus on custom-designed furniture that balances aesthetics and functionality, offering a range of products like seating, tables, and casegoods. Known for their craftsmanship, they emphasize durability and design, catering to both large-scale projects and bespoke needs.</i><br />Target victim <b>website</b>: <i>alleghenycontract.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>tappi.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19020</link>
<guid>6c412bd41e67b8d773d5651ed76c984e</guid>
<pubDate>Wed, 27 Nov 2024 20:53:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>tappi.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5ad8f53102be594c41cbe4705fa84c2dc1b36e41e4cafbce781cf70818d5d8d8</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] TAPPI, or the Technical Association of the Pulp and Paper Industry, is a professional organization dedicated to the pulp, paper, packaging, and converting industries. It focuses on advancing knowledge and technology in these fields through education, networking, and research. TAPPI provides industry professionals with resources, conferences, standards, and publications to support innovation and growth.</i><br />Target victim <b>website</b>: <i>tappi.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grandview-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19018</link>
<guid>d3c54c14c14c2f5900dddd0d16974251</guid>
<pubDate>Wed, 27 Nov 2024 20:45:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Grandview-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>921cc4c21849d6e5623af205c6f6d9cf126fb3d2adaf867c46647b19f1f79c90</i><br /><br />Threat actor <b>description</b>: <i>The Grandview School District, with families and the community, will put students first by providing a high-quality education. GSD will nurture and empower each student to reach their full potential. We commit to empower each student to reach their full potential by ¡cultivating una cultura de success! The Grandview School District consists of three elementary schools, one middle school, one high school, and a contract learning center.</i><br />Target victim <b>website</b>: <i>www.gsd200.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>ahn.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19001</link>
<guid>5f2150c49f5aa191fdee5f8d26c3e50e</guid>
<pubDate>Wed, 27 Nov 2024 18:21:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ahn.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b991735b7b7e38244ebc912758c3858cc946e6f77fa0e1d4130f8f8bf24c3c72</i><br /><br />Threat actor <b>description</b>: <i>Greetings!

Today we are posting here the new company, "West Penn Allegheny Health System .Inc".

Company Description: West Penn Hospital, centrally located in Pittsburgh’s Bloomfield neighborhood since 1848, is regionally and nationally known fo...</i><br />Target victim <b>website</b>: <i>ahn.org</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>times-supermarket.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19002</link>
<guid>f178151bb5b19ff12afedbff97983140</guid>
<pubDate>Wed, 27 Nov 2024 16:55:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>times-supermarket.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d227fa6ade86e2255f12ba51585ad8e0d3436af45c207f27c2e6c0488ce9cfc</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Times Supermarket is a retail company focused on providing a wide range of grocery products and essentials. Known for its customer-centric approach, it offers fresh produce, meats, household goods, and more. The company emphasizes quality and convenience, catering to diverse consumer needs. Its stores are designed for easy navigation, ensuring a pleasant shopping experience for customers.</i><br />Target victim <b>website</b>: <i>times-supermarket.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gruber-Tool--Die-grubertool.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19014</link>
<guid>4e8f015d5644555f9723e2468c19fbe4</guid>
<pubDate>Wed, 27 Nov 2024 16:55:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Gruber-Tool--Die-grubertool.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dcc37c1a3f80dc0d8597e4f37444c1bb2f262cc56333fda928f38cd83f348875</i><br /><br />Threat actor <b>description</b>: <i>8,2 GB</i><br />Target victim <b>website</b>: <i>grubertool.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>wheelerassoc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19015</link>
<guid>a4e1d10a7a8bc2dae8f3d9936475502f</guid>
<pubDate>Wed, 27 Nov 2024 15:41:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>wheelerassoc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b0cdbaca2a5480f6dc0f14d0f38b6d00a57e8fa580364f5efb532a5ba7b5061</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Wheeler & Associates is a company specializing in property tax consulting and management services. They offer expertise in minimizing property tax liabilities for various clients, including commercial, industrial, and residential property owners. Their services include property tax assessment reviews, appeals, and strategic planning to ensure clients achieve optimal tax savings.</i><br />Target victim <b>website</b>: <i>wheelerassoc.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Signal-Health-Washington-signalhealthwa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19003</link>
<guid>1a81859544a7eff3e599b8c322559c00</guid>
<pubDate>Wed, 27 Nov 2024 14:07:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Signal-Health-Washington-signalhealthwa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>952f3e2ec2571d510041dd9d2a0c0d14bc8444929e730fd577437336dee89b6b</i><br /><br />Threat actor <b>description</b>: <i>1 GB</i><br />Target victim <b>website</b>: <i>signalhealthwa.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Interior-Metals</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18995</link>
<guid>39f1eea5596e2fb08737be60887d30df</guid>
<pubDate>Wed, 27 Nov 2024 13:05:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Interior-Metals</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>593c4a2614a010874c139fbc5d62fdd9c18494a941b0f2e071d52f07ccd429b0</i><br /><br />Threat actor <b>description</b>: <i>Interior Metals, a WBE certified company based in New York City, specializes in architectural sheet metal fabrications. While the company features custom convector enclosures and architectural grilles, Interior Metals has been providing building owners, developers, general contractors</i><br />Target victim <b>website</b>: <i>interiormetals.com</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.bent-tree.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18996</link>
<guid>9c16a45c187ff93ce1369ccefb4b2fa7</guid>
<pubDate>Wed, 27 Nov 2024 10:49:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.bent-tree.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79e7676377b931d59370548ae46e52f32c412dd43b6f9df0171181ee104eb8e5</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Bent Tree is a residential community located in the scenic foothills of the North Georgia mountains. It offers a variety of amenities, including an 18-hole golf course, tennis courts, and a clubhouse. The community focuses on outdoor living, providing access to hiking trails, fishing, and equestrian facilities. Bent Tree is designed for those seeking a tranquil lifestyle in a natural setting.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vermilion-Parish-School-System</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18993</link>
<guid>1041a92309a495fbb321890d3db9c32c</guid>
<pubDate>Wed, 27 Nov 2024 06:56:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Vermilion-Parish-School-System</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3fba5394e62c4cddb60510fe3dbfbff97e3a0ee27d57fdd41bcad1cd48c5de00</i><br /><br />Threat actor <b>description</b>: <i>Vermilion Parish School System Vermilion Parish School Board is a school district headquartered in Abbeville, Louisiana, United States. It was established in 1876.    More</i><br />Target victim <b>website</b>: <i>vpsb.net</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wisconsin-Lifting-Specialists</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18991</link>
<guid>c5b2a38cfaae2e8ed263a6af965bc117</guid>
<pubDate>Tue, 26 Nov 2024 21:39:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Wisconsin-Lifting-Specialists</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a33574c5a9ea22016aad68d5b91c92d3513fe308b16819f9d0b406f178ce117e</i><br /><br />Threat actor <b>description</b>: <i>documents, personal info</i><br />Target victim <b>website</b>: <i>wisconsinlifting.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pioneer-Urban-Land--Infrastructure-pioneerurban.in</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18988</link>
<guid>ba8ad81d576f0dc2f54732c1d37e09f3</guid>
<pubDate>Tue, 26 Nov 2024 16:39:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Pioneer-Urban-Land--Infrastructure-pioneerurban.in</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>baf37b9c2c0148caf080d9453fd13a8559e7b18b652b0dfddb5c4ae910fa9508</i><br /><br />Threat actor <b>description</b>: <i>10 GB</i><br />Target victim <b>website</b>: <i>pioneerurban.in</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pinnacle-Plastic-Products-pinnacleplasitcporducts.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18989</link>
<guid>922650f43f77a6fe2fcdbbe4558727e3</guid>
<pubDate>Tue, 26 Nov 2024 16:38:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Pinnacle-Plastic-Products-pinnacleplasitcporducts.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a3986dfb73ca338cd82d5a73b17b3cbcbb083b01e0094d14a1e059f71b583be</i><br /><br />Threat actor <b>description</b>: <i>5,3 GB</i><br />Target victim <b>website</b>: <i>pinnacleplasitcporducts.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Metroline-metrolinedirect.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18987</link>
<guid>e0afd7d95fb431e6cdc5a35e2a800726</guid>
<pubDate>Tue, 26 Nov 2024 13:08:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Metroline-metrolinedirect.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d6add1bdefe0418efc1f5dc97550c911f7a2b3abe48607cbffaba80ed010ce07</i><br /><br />Threat actor <b>description</b>: <i>1,3 GB</i><br />Target victim <b>website</b>: <i>metrolinedirect.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>walkingtree.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18981</link>
<guid>270b632137b56a48dd05c091225634ba</guid>
<pubDate>Tue, 26 Nov 2024 10:51:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>walkingtree.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d7a3f7840af28a3b90b40826feb2544a0bd8323cc15840f51e56d9006ec38a2f</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Walkingtree.org is a company focused on providing innovative technology solutions and services. They specialize in digital transformation, offering expertise in areas like software development, user experience design, and data analytics. With a commitment to quality and customer satisfaction, Walkingtree.org supports businesses in leveraging technology to achieve their strategic goals and enhance operational efficiency.</i><br />Target victim <b>website</b>: <i>walkingtree.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>TWRU-CPAs--Financial-Advisors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18982</link>
<guid>b1a6da1fe555b20268bf9ce70ed980e7</guid>
<pubDate>Tue, 26 Nov 2024 08:11:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>TWRU-CPAs--Financial-Advisors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>159a2b66faf0d648f913c82a7f564293b537c1a80cdcba5cca27eb8e2e9c4583</i><br /><br />Threat actor <b>description</b>: <i>TWRU CPAs & Financial Advisors specializes in helping small to medium size entrepreneurial clients to look beyond day-to-day operations and set goals for a successful future.</i><br />Target victim <b>website</b>: <i>twru.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>OfficeZilla.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18976</link>
<guid>7c99c295147d1724d147f57ca021b893</guid>
<pubDate>Tue, 26 Nov 2024 06:58:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>OfficeZilla.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe2820c8c6f3b574f497c3392e40f76940bc09fe874a94701cd0e9fd5e9468db</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] OfficeZilla.com is an online retailer specializing in office supplies, catering to businesses and individuals alike. The company offers a wide range of products including stationery, office furniture, cleaning supplies, and technology accessories. Known for competitive pricing and customer service, OfficeZilla.com aims to streamline the procurement process for office essentials, ensuring efficiency and convenience.</i><br />Target victim <b>website</b>: <i>OfficeZilla.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>cal-tool.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18978</link>
<guid>cc940c545866af6a3c3d40a49f48764a</guid>
<pubDate>Tue, 26 Nov 2024 06:27:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>cal-tool.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>27721633c5c23b627c811e822105a18bdf2af4e0f1d75e8f6cf36896aceca493</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Cal-Tool is a company specializing in precision machining and manufacturing solutions. They offer a range of services including CNC machining, custom tooling, and component production for various industries such as aerospace, medical, and automotive. With a focus on quality and innovation, Cal-Tool provides tailored solutions to meet the specific needs of their clients, ensuring high standards and efficiency.</i><br />Target victim <b>website</b>: <i>cal-tool.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>waltersgardens.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18979</link>
<guid>a4ccc8719a8ba70adb84997ac4148048</guid>
<pubDate>Tue, 26 Nov 2024 06:12:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>waltersgardens.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f30944aaf8311415b22670921f89adeb369bf3a3a4dcbaa69467175d1c45870c</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>waltersgardens.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>mdmcusa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18974</link>
<guid>78777365814e9626f0011c7e57a10c6d</guid>
<pubDate>Tue, 26 Nov 2024 00:57:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>mdmcusa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52296f33b1b9e10799e9558718a883b71a4df1e9aca35bf8bd52f562a4777c8c</i><br /><br />Threat actor <b>description</b>: <i>Revenue $5 Million</i><br />Target victim <b>website</b>: <i>mdmcusa.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>goformz.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18973</link>
<guid>6ab29d857e78e64e3ad7b59560c8b1b4</guid>
<pubDate>Tue, 26 Nov 2024 00:44:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>goformz.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e0177c2c8319797bcb5ab1972f3e7e593beb8406dad3390b570f4fb0964d7da7</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>goformz.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>empowersettlementservices.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18972</link>
<guid>8412670cc10f39db2e3285faaac95c5e</guid>
<pubDate>Tue, 26 Nov 2024 00:41:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>empowersettlementservices.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e5e4ce4a7089e547486030734f20b4d3544e0f00611b053a92324a8cf2ec38a</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>empowersettlementservices.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>karberinsulation.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18969</link>
<guid>afe7064469e1509a007b92118aee4524</guid>
<pubDate>Mon, 25 Nov 2024 22:46:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>karberinsulation.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d420acd27dc9760e7c4a4b9f2ef92de96d87a9e7cdf0465cb1db246e6e5371a7</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Karber Insulation is a company specializing in insulation solutions for residential, commercial, and industrial applications. They provide a range of services including installation of spray foam, fiberglass, and other insulation materials to enhance energy efficiency and comfort. The company emphasizes quality workmanship and customer satisfaction, serving clients with tailored insulation solutions to meet specific needs.</i><br />Target victim <b>website</b>: <i>karberinsulation.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Browne-McGregor-Architects</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19101</link>
<guid>e64cacc12d96e7d6fda6e292ffc84bf4</guid>
<pubDate>Mon, 25 Nov 2024 21:15:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Browne-McGregor-Architects</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6817252b3bff9e28d9f5d022c8f790ebd93c3a927ebd79c2e737e69b686a7b32</i><br /><br />Threat actor <b>description</b>: <i>Browne McGregor Architects is a Houston based architecture firm that was founded in 1995. However, our years of previous architectural work has shaped the firm’s project process, culture, and ultimately, the client experience. We are a mid-            ...</i><br />Target victim <b>website</b>: <i>www.brownemcgregor.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>glts.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18963</link>
<guid>e3c3ed9c2da870a3f68999b606834e14</guid>
<pubDate>Mon, 25 Nov 2024 20:49:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>glts.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5da3a9f2781754db5b5eb529952dc717c6c8ab060664abee07d8cee7426c1112</i><br /><br />Threat actor <b>description</b>: <i>The Greater Lawrence Technical School is a regional technical high school serving the four communities.</i><br />Target victim <b>website</b>: <i>glts.net</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kela-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18955</link>
<guid>71f2a06ddd81a01cbb537a99be9ef47b</guid>
<pubDate>Mon, 25 Nov 2024 18:59:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Kela-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34f21b65a9fb516fa99598526abaec6af67882c13508f6c7c6b7fdcf596c65e9</i><br /><br />Threat actor <b>description</b>: <i>Kela Health (founded 1941) - the developer and manufacturer of pharmaceuticals and food additives in the field of global health of animals, as well as develops and produces a limited series of pharmaceuticals and food additives for people. Kela Health corporate office is located in 48 Sint-lenaartseweg, Hoogstraten, Antwerpen 2320, BE. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fancy-Foods</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18956</link>
<guid>9763616920135ae280576494ba862400</guid>
<pubDate>Mon, 25 Nov 2024 18:59:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Fancy-Foods</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f846218e603253d14a99be867f3154d68e0e1a66c2233a35795e19721cc6e1a4</i><br /><br />Threat actor <b>description</b>: <i>Fancy Foods, Inc. is a food distribution company serving as a diversified supplier of protein food products and services to the retail, wholesale, and foodservice sectors in the New York, New Jersey, and Connecticut markets. Fancy Foods corporate office is located in 355 Food Center Dr Ste B12, Bronx, New York, 10474, United States and has 249 employees. </i><br />Target victim <b>website</b>: <i>fancyfoods.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>minneapolisparks.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18961</link>
<guid>232cd4ca5efa68c0aaacaf8a874c23ab</guid>
<pubDate>Mon, 25 Nov 2024 18:54:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>minneapolisparks.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b9bff343fca45cc43b85db93e907ab803b30a72508ef4db5185a342161bb0e8d</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] MinneapolisParks.org is the official website for the Minneapolis Park and Recreation Board, which manages the city's parks and recreational facilities. The organization is dedicated to providing diverse recreational opportunities, maintaining parkland, and enhancing the quality of life in Minneapolis. They offer programs, events, and activities for all ages, promoting community engagement and environmental stewardship.</i><br />Target victim <b>website</b>: <i>minneapolisparks.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Perfection-Plus-Services-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18957</link>
<guid>7e68a92c68139afdaf68b12df5566715</guid>
<pubDate>Mon, 25 Nov 2024 17:37:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Perfection-Plus-Services-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a61244a23bede2888a1897bfa264220cb877965004e676511c5be8534acf47d</i><br /><br />Threat actor <b>description</b>: <i>Perfection Plus Services Inc is a building materials company based out of 203 S Old Wire Rd, Wildwood, Florida, United States. </i><br />Target victim <b>website</b>: <i>perfectionplus.net</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>coppelltx.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18964</link>
<guid>51cf4faf3b8b705fbfa6d97bd1597b7f</guid>
<pubDate>Mon, 25 Nov 2024 17:00:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>coppelltx.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5fc5949a0162a3a5203b8dae156cfd25b6466a7e4692313f4c5e38f4224a11d0</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] CoppellTX.gov is the official website for the City of Coppell, Texas. It serves as a comprehensive resource for residents, businesses, and visitors, offering information on city services, government operations, community events, and local news. The site provides access to municipal resources such as permits, city council meetings, and public safety updates, enhancing civic engagement and transparency.</i><br />Target victim <b>website</b>: <i>coppelltx.gov</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>isd109.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18965</link>
<guid>cb7f08e109f0b2bfa5e7e2d1233fa6d6</guid>
<pubDate>Mon, 25 Nov 2024 16:57:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>isd109.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a33d4eca58b033dac6969bb63b45bd2a9788d9a5d83f998eb81ddbdcb8e89ef</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] isd109.org is the website for Winthrop Harbor School District 109, located in Winthrop Harbor, Illinois. The district serves the educational needs of students in the community, offering programs from early childhood through middle school. It emphasizes a supportive learning environment, with a focus on academic excellence, character development, and community engagement. The district is committed to providing quality education and fostering growth for all students.</i><br />Target victim <b>website</b>: <i>isd109.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>maynard.k12.ma.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18959</link>
<guid>5d7ee5401d8717dfb57e50a32f60eaf2</guid>
<pubDate>Mon, 25 Nov 2024 16:54:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>maynard.k12.ma.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a2a08c06e4714eda55eff91e073e15799eded0f7f0f1efa06fc5811cc4ec64f</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Maynard.k12.ma.us is the official website for the Maynard Public Schools, a school district in Maynard, Massachusetts. The district oversees public education for the town, offering educational programs from kindergarten through high school. It focuses on fostering a supportive learning environment, emphasizing academic excellence, community involvement, and student development.</i><br />Target victim <b>website</b>: <i>k12.ma</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>parkleigh.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18966</link>
<guid>be18f4dac22b7a34ce750a5e3e2eed21</guid>
<pubDate>Mon, 25 Nov 2024 16:54:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>parkleigh.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f3194440a159fcbfdc38ae3feb6bfefdc90cf6d992f0fe438a403c522010ac75</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Parkleigh is a unique boutique store located in Rochester, New York, offering an eclectic mix of gifts, home accessories, and personal care products. Known for its curated selection, the store features items from popular brands as well as local artisans. Parkleigh prides itself on providing a distinctive shopping experience with an emphasis on quality and customer service.</i><br />Target victim <b>website</b>: <i>parkleigh.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>dienesusa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18967</link>
<guid>b999a556e5f6186b8cba2dd848c22711</guid>
<pubDate>Mon, 25 Nov 2024 16:51:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>dienesusa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8fc3669803b1c947b2501f4b1ea69f194d292626f610564710c0d97f0cb71891</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Dienes USA specializes in precision cutting tools and industrial knives. They offer a range of products including slitting systems, knife holders, and circular knives, serving industries such as paper, plastics, and packaging. With a focus on innovation and quality, Dienes USA provides customized solutions and technical support to optimize cutting processes and improve efficiency.</i><br />Target victim <b>website</b>: <i>dienesusa.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>yunker.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18968</link>
<guid>7c1373b8fec010dba9b2cf06e7b232a7</guid>
<pubDate>Mon, 25 Nov 2024 16:47:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>yunker.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>724c8abc41ebf4ebd9fff45e9e5cfd0c7a63e9da56c5db2c69d44bcf504129d0</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Yunker.com is a company specializing in the design, production, and installation of signage and visual display solutions. They offer a range of services that include custom signs, graphics, and branding elements tailored to enhance retail environments and corporate spaces. With a focus on quality and innovation, Yunker.com aims to meet the unique needs of businesses seeking impactful visual communication.</i><br />Target victim <b>website</b>: <i>yunker.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Everything-Breaks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18952</link>
<guid>2328fb211593bf76f1e22ff0554cb420</guid>
<pubDate>Mon, 25 Nov 2024 15:21:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Everything-Breaks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b4bd1fe0f52115bf4eca6f8bb535bdc57ec0a1e7e8fd7f3bed85785a941b975</i><br /><br />Threat actor <b>description</b>: <i>With 20 years of experience working in the warranty business, the head honchos a...</i><br />Target victim <b>website</b>: <i>everythingbreaks.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Keable--Brown</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18953</link>
<guid>bc1cd298247f3f23db7249e6fc53f83c</guid>
<pubDate>Mon, 25 Nov 2024 15:21:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Keable--Brown</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e823b52685f4579cc72c6be97e74b9d6d11f060c8a89e180e225c2661bf2b58</i><br /><br />Threat actor <b>description</b>: <i>Commercial and Residential Real Estate Law, Business and Construction Law, Proba...</i><br />Target victim <b>website</b>: <i>keablelaw.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>JN-attorney</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18943</link>
<guid>09dbda0ec297f8e1fb8fa397efd0f70a</guid>
<pubDate>Mon, 25 Nov 2024 08:54:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>JN-attorney</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6043336a2398bbdc1e680176d41daf6c6fca5db1f1241b9637f9d7676378b14d</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>www.jnattorney.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Orshan-Spann--Fernandez-Mesa</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18950</link>
<guid>7d5e9e8f6bc4957b5054fb0f7efc417c</guid>
<pubDate>Mon, 25 Nov 2024 08:36:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Orshan-Spann--Fernandez-Mesa</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4eae8077bb9876a59d56aab512339ff83314c53a11ac7253032554f55eff8f2</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>orshanlaw.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>inv...nator</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18940</link>
<guid>610ceeb94cb57c1d8f401397ebf7d67f</guid>
<pubDate>Mon, 25 Nov 2024 03:42:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>inv...nator</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f0ca1d9816224f4ee449c1fee1175978ba0b4ac87d9f5e3ff0786fe3a5c86f7a</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>investmentdominator.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>RiverRestHome</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18939</link>
<guid>b3f9a0026fb6e31d468ed053f43eb6fb</guid>
<pubDate>Mon, 25 Nov 2024 03:39:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>RiverRestHome</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a59a64c8b518740c843ac0652178a00a1d9ccdade5c7baba5abbf4cea52c2056</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>RiverValleyRestHome.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>titlenine.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18934</link>
<guid>609ac774d3f0a0c93c19040f2c6eb105</guid>
<pubDate>Sun, 24 Nov 2024 19:11:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>titlenine.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04b17855ce5d1335b979da886e1607cf704897b3c1516e331d3e3ba685126550</i><br /><br />Threat actor <b>description</b>: <i>Revenue $60.8 Million</i><br />Target victim <b>website</b>: <i>titlenine.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>STIIIZY</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18932</link>
<guid>db6d9e1beb13d90e4a67706afb39e4e8</guid>
<pubDate>Sun, 24 Nov 2024 18:54:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>STIIIZY</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0acea15d38a828b705366d39ad56c6e886de21579e7e56f2fe5999013bfba799</i><br /><br />Threat actor <b>description</b>: <i>Client’s Personal data and ID’s Total personal records : 422,075 https://www.stiiizy.com/ Company representative should follow the instructions to contact us before time runs out</i><br />Target victim <b>website</b>: <i>stiiizy.com</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hypertype</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18928</link>
<guid>6b47262dddb733cc1874d230cac465d6</guid>
<pubDate>Sun, 24 Nov 2024 18:23:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Hypertype</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6bdc7ed05b76f1a0a2daa8f75a151ea9e0288202d0a86dbda117a7b043e4fca3</i><br /><br />Threat actor <b>description</b>: <i>Hypertype Inc. has been providing quality transcription service to Emergency Dep...</i><br />Target victim <b>website</b>: <i>ehypertype.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Concord-Orthopaedics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18929</link>
<guid>aa432ddb48f87d2c5114f1c11e7c68a5</guid>
<pubDate>Sun, 24 Nov 2024 16:52:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Concord-Orthopaedics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1bc8caecca1e04ad3cf500bf986355f2b923059aad10799d605ede5eb4c1989</i><br /><br />Threat actor <b>description</b>: <i>Medical records and personal data of all patients from 2018 More than 30,000 identity documents https://www.concordortho.com/ Company representative should follow the instructions to contact us before time runs out</i><br />Target victim <b>website</b>: <i>concordortho.com</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>co.cullman.al.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18927</link>
<guid>4d0ac884f6fdb0c44f281653697aa2cc</guid>
<pubDate>Sun, 24 Nov 2024 11:39:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>co.cullman.al.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a9f9271e6e384330b23d03a9ac2982e59d4b70d15514dd3bad02d9874ddf561</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] The website "co.cullman.al.us" represents Cullman County in Alabama. It serves as an online portal for county services, information, and resources. The site offers details about local government offices, departments, and officials, as well as public records, community events, and services for residents and businesses. It aims to enhance civic engagement and provide easy access to county-related information.</i><br />Target victim <b>website</b>: <i>www.co.cullman.al.us</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Silicom</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18926</link>
<guid>325d7dbceacce9431b328585eab8971c</guid>
<pubDate>Sun, 24 Nov 2024 11:36:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>handala</b> claims attack for <b>Silicom</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb598a23640a03e03da60a0c58cc23ea3849fc6dd3260c12331999ecaa4d1cf7</i><br /><br />Threat actor <b>description</b>: <i>The biggest and most feared cover company of unit 8200 was hacked! In all the assassinations and crimes of recent months, the 8200 unit has always played a very active role in them! The crimes of this unit are not hidden from anyone! But its members must realize today that they will no longer be…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>handala</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nationwide-Legal</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18922</link>
<guid>94a8e2d042a7d4aca7b47e7d1817795c</guid>
<pubDate>Sun, 24 Nov 2024 04:07:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Nationwide-Legal</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>55f5550538a2608b2bf1b5060e462f938e6123a80b6888ade9e42cb0e0757461</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>nationwidelegal.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jones--Mayer</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18913</link>
<guid>c58a78e3957eed1e6dcf540cda1a05b3</guid>
<pubDate>Sat, 23 Nov 2024 18:59:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Jones--Mayer</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b379aa45cd442c5a2c63eb3ec9342e4263a14ac1606bed36e69a2932155baf5</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>www.jones-mayer.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trinity-Petroleum-Management-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18908</link>
<guid>f4bd67327fd01a153081ab6cf611a0e6</guid>
<pubDate>Fri, 22 Nov 2024 23:35:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Trinity-Petroleum-Management-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd7140f4c48b3e857f03fa4b09252e38334e6e5c699726f9c8ea724c36decfb1</i><br /><br />Threat actor <b>description</b>: <i>Trinity Petroleum Management provides full-service outsourcing for the upstream oil and gas industry.</i><br />Target victim <b>website</b>: <i>trinitymgt.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>blr.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18907</link>
<guid>91726a6e8c9faa2bb5f26d442a59c203</guid>
<pubDate>Fri, 22 Nov 2024 18:56:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>blr.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6d8a3e85028588eabf867e7ca4336c4532a854506677af716c546cced856977</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] BLR.com is a company that provides compliance and training solutions for businesses. They specialize in delivering resources and tools to help organizations stay compliant with regulatory requirements in areas such as human resources, workplace safety, and environmental management. Their offerings include online training courses, webinars, publications, and software designed to streamline compliance processes and enhance workplace productivity.</i><br />Target victim <b>website</b>: <i>blr.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>madison-home.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18905</link>
<guid>82c000542cf828ca7c5d80972fb92c63</guid>
<pubDate>Fri, 22 Nov 2024 15:21:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>madison-home.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ef3aedbb6f6306b5604087ffd95074a1051e69e3bca11cd52d086002ede40ca</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Madison Home is a company specializing in home furnishings and decor. They offer a range of products, including furniture, lighting, and accessories, designed to enhance living spaces with style and comfort. Known for their commitment to quality and design, Madison Home provides customers with both modern and classic options to suit various tastes and home aesthetics.</i><br />Target victim <b>website</b>: <i>madison-home.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>sheboyganwi.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18906</link>
<guid>ae9402b067df450afb7e5e9cbeeb77ea</guid>
<pubDate>Fri, 22 Nov 2024 14:36:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chort</b> claims attack for <b>sheboyganwi.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77ec45ce448cd416e15c6425b33bc959f1e7d0c11e451b97c3e63aa070f24cf1</i><br /><br />Threat actor <b>description</b>: <i>Status: Wait for Decision - details: Wait for DecisionDatabases + Files of This Company Databases + Files of This Company</i><br />Target victim <b>website</b>: <i>sheboyganwi.gov</i>]]></description>
<category>chort</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zimmerman--Frachtman-PA-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18899</link>
<guid>ee42b626f7b6b71a7bceb60cf7108c25</guid>
<pubDate>Fri, 22 Nov 2024 04:21:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Zimmerman--Frachtman-PA-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>739abd2ae1195053d0b3985c23bd1e4c4c99ce13c80b9042c8c950673b8c1360</i><br /><br />Threat actor <b>description</b>: <i>At Zimmerman & Frachtman, every employee is a dedicated member of the team whose primary concern is defending the injured and seeking justice on behalf of our clients. We understand that no two cases are alike; therefore, no two cases are pre            ...</i><br />Target victim <b>website</b>: <i>www.zimmermanfrachtman.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hronopoulos</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18897</link>
<guid>e706c0ce5e39be9bd5b37ecb5a0f983c</guid>
<pubDate>Fri, 22 Nov 2024 01:22:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Hronopoulos</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba243b424aad406e60c8d8a358c9f8a5967a8e3b22113600ec8c141630d7492e</i><br /><br />Threat actor <b>description</b>: <i>Considering that all information about the Andreas Hronopoulos company does not correspond to the truth. For little time we leave here this description:

Internet Service Providers, Website Hosting & Internet-related Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>LenelS2</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18891</link>
<guid>64063a9bafbf19f37ef32a222116bcf1</guid>
<pubDate>Thu, 21 Nov 2024 22:50:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>LenelS2</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>66ffe455c4e8610cfbc02492712877ed5f95155ec225dd660c7f1dd388789cae</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.lenels2.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>suit-kote.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18890</link>
<guid>c0829dc52beb665d3e2fd05e36f97f35</guid>
<pubDate>Thu, 21 Nov 2024 21:08:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>suit-kote.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>edd1a879bdfbf8d4ad05f9e8b69f6650c3565631475e4d32c1a7702d16e40b83</i><br /><br />Threat actor <b>description</b>: <i>Suit-Kote Corporation is a privately-owned company that manufactures asphalt products, provides road construction and maintenance services, and engineers asphalt applications.SITE: www.suit-kote.com Address : 1911 Lorings Crossing Road, Cortland, NY 13045 United StatesTEL#: (607) 753-1100ALL DATA SIZE: ≈1.5tb 1. Personal documents, employees data 2. Financial data, Accounting 3. Users folders 4. Tax data, forms 5. confidential agrements, NDAs data & etc…</i><br />Target victim <b>website</b>: <i>suit-kote.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>curenta.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18898</link>
<guid>9a32593b6b1faea93bde76c43d1a8692</guid>
<pubDate>Thu, 21 Nov 2024 20:50:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>curenta.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f1fc773c14f36b2b75b3947cf616c58d1f2f593aba97132d20565ac3b644700</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Curenta is a healthcare technology company focused on enhancing the efficiency of medication delivery and management within long-term care facilities. By leveraging advanced logistics and digital solutions, Curenta aims to streamline pharmacy operations, improve patient care, and reduce costs. Their platform integrates with existing systems to optimize prescription handling and delivery processes.</i><br />Target victim <b>website</b>: <i>curenta.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Goldsmith--Hull</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18896</link>
<guid>9611804b80cdbabcc1e0774cec62ecd5</guid>
<pubDate>Thu, 21 Nov 2024 20:42:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Goldsmith--Hull</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>00a3f4d41287a93f2ffe402f354da905dc95ebc4f6ecc010a08ab96c55dfcee4</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Goldsmith & Hull is a law firm known for specializing in debt collection and creditor representation. They provide legal services focused on recovering outstanding debts and managing related legal proceedings. The firm's expertise includes handling various stages of debt recovery, from initial demand to litigation. They are recognized for their professional approach in managing creditor-debtor relationships.</i><br />Target victim <b>website</b>: <i>goldsmithcalaw.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brueck-Golosow-Kim--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18895</link>
<guid>4d3416f98cb21a9d46d59d2bce5be36b</guid>
<pubDate>Thu, 21 Nov 2024 20:42:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Brueck-Golosow-Kim--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>637e58d4d61602589bdd05bd628b5e3ad66852d5e353ffb25ebd5cc730d8b842</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Brueck Golosow Kim & Associates is a consulting firm known for its expertise in strategic management and organizational development. The company specializes in providing tailored solutions to enhance operational efficiency and drive growth for businesses across various industries. With a team of experienced professionals, they focus on delivering innovative strategies and insights to help clients achieve their long-term objectives.</i><br />Target victim <b>website</b>: <i>beauty-by-brueck.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Suneva-Medicalsunevamedical.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18882</link>
<guid>380c50225d67f81afaf12a795543782a</guid>
<pubDate>Thu, 21 Nov 2024 19:22:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Suneva-Medicalsunevamedical.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26290108c960a3e31175ded57aae1f2729bff0de921b4394e5080f0c840a920d</i><br /><br />Threat actor <b>description</b>: <i>Suneva Medical, based in San Diego, specializes in regenerative aesthetic produc...</i><br />Target victim <b>website</b>: <i>sunevamedical.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>United-Bakery-Equipment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18894</link>
<guid>39df222bffe39629d904e4883eabc654</guid>
<pubDate>Thu, 21 Nov 2024 19:15:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>United-Bakery-Equipment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b7af1b987fa15932cfd1c477a1b56cb16a3ed6fe514cc480b5f367691024706</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] United Bakery Equipment is a company specializing in the design and manufacture of high-quality bakery machinery. They offer a range of equipment including slicers, baggers, and other automated systems tailored for the baking industry. Known for innovation and reliability, the company serves both large-scale and smaller artisanal bakeries, focusing on efficiency and precision in their products.</i><br />Target victim <b>website</b>: <i>ubeusa.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>DMF-Lighting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18875</link>
<guid>d9376cb84f00869b10eb6203c61e705c</guid>
<pubDate>Thu, 21 Nov 2024 15:22:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>DMF-Lighting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>17181c0a29fd4edae2ed54ae125c9d1e1524ce2bd52c8d27d3b47bc845314609</i><br /><br />Threat actor <b>description</b>: <i>Founded 1988 and Headquartered in California, United States. DMF Lighting designs and builds LED downlighting that sets the bar for simplicity.
Over 600 GB of data ( projects , finacial statments , clients data ) stolen.</i><br />Target victim <b>website</b>: <i>www.dmflighting.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stalcop-Metal-Forming-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18876</link>
<guid>8cec19a74549d78a37f62fcefb8bebb4</guid>
<pubDate>Thu, 21 Nov 2024 15:22:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Stalcop-Metal-Forming-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>816cbdebbcc3be0c880fc242c11146d004698c5e3492ed22b77c5612688dde71</i><br /><br />Threat actor <b>description</b>: <i>STALCOP Metal Forming LLC is a repetitive manufacturer of customer designed specialty cold formed parts and precision machined components and sub-assemblies. By combining cold forming with various secondary processes, we can manufacture parts            ...</i><br />Target victim <b>website</b>: <i>stalcop.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hogan-Mfg-hoganmfg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18878</link>
<guid>1021707194b6d060f75860a9fa6b73a2</guid>
<pubDate>Thu, 21 Nov 2024 14:38:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Hogan-Mfg-hoganmfg.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>99c1aa4d402c830201af1c1bb14c1a4172b61ed356a8576f9ed9ae32a1b049c0</i><br /><br />Threat actor <b>description</b>: <i>10,5 GB</i><br />Target victim <b>website</b>: <i>hoganmfg.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fifteenfortyseven-Critical-Systems-Realty-1547realty.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18879</link>
<guid>5a627e71c819a28db64a0bf7064f7b39</guid>
<pubDate>Thu, 21 Nov 2024 14:37:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Fifteenfortyseven-Critical-Systems-Realty-1547realty.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc8050aede463a9e138e111c7dac4cca5f9e6cdfa16a4cf19fe41276bf86cf17</i><br /><br />Threat actor <b>description</b>: <i>6 GB</i><br />Target victim <b>website</b>: <i>1547realty.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kellerhals-Ferguson-Kroblin-PLLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18881</link>
<guid>b66a88fda29fe547dfd323335fac0230</guid>
<pubDate>Thu, 21 Nov 2024 14:35:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Kellerhals-Ferguson-Kroblin-PLLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91ad12da7343dfd69571301fdb38fed7bc036f31eb28d071dd9a14b4afdb7d7d</i><br /><br />Threat actor <b>description</b>: <i>Kellerhals Ferguson Kroblin PLLC (KFK) a full service law firm with offices in the U.S. Virgin Islands and New York, New York. KFK clients include investment managers, real estate developers, governments, high-tech manufacturers, e-commerce businesses, commercial tour operators, restaurant proprietors, as well as many large banking and financial institutions.</i><br />Target victim <b>website</b>: <i>kellfer.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Silverback-Exploration</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18880</link>
<guid>5f41caa07641b4b19aaf61278a061920</guid>
<pubDate>Thu, 21 Nov 2024 14:33:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Silverback-Exploration</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c4fac4aa3fc0d91efb0eda036c9538d2454a7dba0e47099d17be490373108f2f</i><br /><br />Threat actor <b>description</b>: <i>Silverback Exploration is a San Antonio-based, independent oil and gas company focused on the pursuit of leasing and drilling opportunities.</i><br />Target victim <b>website</b>: <i>silverbackexp.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>HM-Environmental-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18871</link>
<guid>cbeed2b064abe2fb4b0ea8b769027bee</guid>
<pubDate>Thu, 21 Nov 2024 00:38:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>arcusmedia</b> claims attack for <b>HM-Environmental-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d6eeb7e4e5cfd069da69cc4aca182b5444b2513f42749e71f95aa1ecdb0de83</i><br /><br />Threat actor <b>description</b>: <i>Days00006666Hours11119999Minutes22227777Seconds11115555


www.hmenvironmental.comHM Environmental Services, Inc. is a full-service, environmental, r…</i><br />Target victim <b>website</b>: <i>hmenvironmental.com</i>]]></description>
<category>arcusmedia</category>
</item>
<item xmlns:dc='ns:1'>
<title>James-H-Maloy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18859</link>
<guid>87b0578122b0ec5f80f2dcfd5d6f05b7</guid>
<pubDate>Wed, 20 Nov 2024 23:21:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>James-H-Maloy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6d984dbf27e4c31c2061bdd0b3360ea615fd568568ac7604435fe7261b219324</i><br /><br />Threat actor <b>description</b>: <i>Family owned heavy highway and site development contractor serving Upstate NYWe are ready to upload more than 11 GB  of internal corporate data including: insurance documents, a lot of driver licenses, employee contacts etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Automation-Tool--Die</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18860</link>
<guid>5d5fbd1cb768ac734508b626a52fa255</guid>
<pubDate>Wed, 20 Nov 2024 23:21:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Automation-Tool--Die</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b5742898c4505d1cbf61418fe47d8ee71dc6164dd67b06f0faf2470e40b1d0c</i><br /><br />Threat actor <b>description</b>: <i>Automation Tool & Die, Inc. offers exceptional product value by offering one stop, concept to completion, metal forming solutions.We are ready to upload more than 17 GB of internal corporate dataincluding employees contacts, confidential agreements, NDAs, employees email and phone numbers etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tampa-State-Bank</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18861</link>
<guid>b820fc868475ef544228c3c8fa6a685e</guid>
<pubDate>Wed, 20 Nov 2024 23:21:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Tampa-State-Bank</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e77d074454486772ea4a7dae51fde4b7b7e0deb234c2a8659e72a82ab4220e80</i><br /><br />Threat actor <b>description</b>: <i>The Tampa State Bank has been an anchor in the community for over100 years with full-service banking in Tampa & Marion Kansas. We are ready to upload more than 13 GB of internal corporate dataincluding: inside financial information, driver licenses, SSNs, employees contacts etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ship-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18862</link>
<guid>37915daf6e872d58791b5e5cb144fc4a</guid>
<pubDate>Wed, 20 Nov 2024 23:21:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Ship-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b96e1280c04d27fde944971ae193d1e14dd9272361013b23bd2639cc4b39045c</i><br /><br />Threat actor <b>description</b>: <i>Ship Services has established an impressive legacy over its 40 years of operation, providing essential maritime services across a wide spectrum.We are ready to upload more than 30 GB of internal corporate dataincluding: employee and customer contacts, SSNs, driver licenses, medical documents etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Volo-Internet-Tech</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18863</link>
<guid>6432821a1d5b2b35b3c47142fbf29a02</guid>
<pubDate>Wed, 20 Nov 2024 23:21:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Volo-Internet-Tech</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8550e5dd051b3ca3ffd5113e766705bfcce1a1d8b5c5ffbf2bca1589056c3ef</i><br /><br />Threat actor <b>description</b>: <i>Volo Internet Tech™ was founded in 2001 to provide a Fast, local,and Friendly Internet access.We are ready to upload more than 49GB of internal corporate data including: SSNs, NDAs, passports, driver licenses etc.</i><br />Target victim <b>website</b>: <i>volo.net</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Furniture-Mart-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18864</link>
<guid>48af87b587036693d6a3caf03db7dc02</guid>
<pubDate>Wed, 20 Nov 2024 23:21:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Furniture-Mart-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22488a55f56a1ef9ddf16d00390f9f4cd4aa88d2a38b8512547baf8b7f7012e6</i><br /><br />Threat actor <b>description</b>: <i>Furniture Mart USA has been ranked in the Top 100 Furniture Retailers in America.We are ready to upload more than 150GB of internal corporate dataincluding: confidential financial documents, personal employees contact information, SSNs, medical examiner’s certificates, driver licenses, customer contacts with phones, NDAs etc.</i><br />Target victim <b>website</b>: <i>furnituremartusa.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>PBS-AEROSPACE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18866</link>
<guid>4839aef58602c3debaf41ef02dd2ae15</guid>
<pubDate>Wed, 20 Nov 2024 22:53:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>PBS-AEROSPACE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed36c0b17b57c81c1124da04f074a9b99f40ec8aee79e95500db8b09a2559854</i><br /><br />Threat actor <b>description</b>: <i>PBS Group PBS GROUP, a.s. is a joint-stock company of the holding type, which is engaged in investments and the exercise of shareholder rights of engineering companies in the group. The main mission is the long-term development of these companies and the creation of synergic links in the provision of comprehensive product solutions in various industrial segments. The products and services of the companies included in the holding are sought after by customers from all over the world, especially in the aviation, energy and transport industries.  We have 2TB of confidential company data in our hands.  </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>RDS-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18867</link>
<guid>c53eb50893377ca287be8ce398855353</guid>
<pubDate>Wed, 20 Nov 2024 22:46:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>RDS-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8855a9883b2ec0a28967c3ed5f547c48fbf4c49c935e575378c5c370f8495e61</i><br /><br />Threat actor <b>description</b>: <i>RDS Electric has been providing electrical services in the Arizona area. RDS Electric corporate office is located in 6618 N 58th Dr, Glendale, Arizona, 85301, United States and has 31 employees.</i><br />Target victim <b>website</b>: <i>rdselectric.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bishop-Ireton-High-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18865</link>
<guid>5859426ed1a0862fad780bea63537ab9</guid>
<pubDate>Wed, 20 Nov 2024 20:17:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Bishop-Ireton-High-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c561caa3dd60d08b742f0bbf90b6f47450343fec098cda18e2d3ebf9ee14d172</i><br /><br />Threat actor <b>description</b>: <i>Bishop Ireton High School Bishop Ireton High School, a Catholic preparatory high school located in historic Alexandria, Va., began its proud heritage of academic excellence in 1964.</i><br />Target victim <b>website</b>: <i>bishopireton.org</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Berman-Law-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18850</link>
<guid>d4d0aec871cbad74e8af1af3065e8c2b</guid>
<pubDate>Wed, 20 Nov 2024 19:21:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Berman-Law-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d49ac2c90f891c004950069bb366aada1eb9f68fb73e6b99e39727244a422a8d</i><br /><br />Threat actor <b>description</b>: <i>Company has 48 hours to contact us if not we will release clients data and financials files on the blog .</i><br />Target victim <b>website</b>: <i>www.bermanlawgroup.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Prime-Group-US</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18851</link>
<guid>a02b64e3b99559f93257779a887d1a75</guid>
<pubDate>Wed, 20 Nov 2024 19:21:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Prime-Group-US</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>405095a01ad5b502997f73b4995dee6acf8a0990d83b8d61d1af4610c8eccad4</i><br /><br />Threat actor <b>description</b>: <i>Prime Group is a multifaceted business approach,exceptional construction products and vision toward quality of life serve.
We stole over 500gb of data that ww will release if the company does not contact us in 48 hours</i><br />Target victim <b>website</b>: <i>primegroupus.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.ekirkpatrick.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18852</link>
<guid>8c368c3a4eece69ea3177a5c36e9f7e4</guid>
<pubDate>Wed, 20 Nov 2024 19:21:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.ekirkpatrick.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>311da346f53f447dc436e6edad3b3394e265f3ac948e891bc85430d3781a2302</i><br /><br />Threat actor <b>description</b>: <i>On April 1, 1973, Mr. Robert S. Kirkpatrick, Sr. opened the doors of Kirkpatrick Management Company (KMC) with the belief that providing excellent customer service with a personal touch would create a successful business. Over four decades la            ...</i><br />Target victim <b>website</b>: <i>www.ekirkpatrick.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>LaMear--Rapert-LLC---Accounting-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18853</link>
<guid>74ad61495004090c5043987b671d1dda</guid>
<pubDate>Wed, 20 Nov 2024 19:21:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>LaMear--Rapert-LLC---Accounting-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>27c3b2ce942a64fddbd15a6bd97650073142970d4ce50f35bc545a6928d8b474</i><br /><br />Threat actor <b>description</b>: <i>Since 1921, we have been providing accounting, tax, audit, financial and advisory services all across the St. Louis area. Whatever your accounting and business needs, we are confident we can meet your needs and become your trusted partner in             ...</i><br />Target victim <b>website</b>: <i>lrcpa.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alpha-Care-Medical-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18854</link>
<guid>996d38f817b4ba74e4c38fb1286d28ab</guid>
<pubDate>Wed, 20 Nov 2024 19:21:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Alpha-Care-Medical-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b8a8ec976524122ff5073fe92e1a966def6afdaf667eb86ad4a20711ce6f3d5</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1993, Alpha Care Medical Group is an Independent Physicians Association (IPA) that specializes in delivering high-quality healthcare. We focus on Medi-Cal/Medicaid, Commercial, and Medicare and Dual Eligible (Medi-Medi) members in             ...</i><br />Target victim <b>website</b>: <i>www.alphacaremed.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Global-Results-Communications</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18923</link>
<guid>d7ea7a7dde348753a17428282d46081e</guid>
<pubDate>Wed, 20 Nov 2024 14:54:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Global-Results-Communications</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cee8ce30704c56d5386217c91da726ac99b6dca37d26d6d6c92192eb9a873d73</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>globalresultspr.com</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>polaraire.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18845</link>
<guid>e71d7330357be40fc2f0be46c7e9629a</guid>
<pubDate>Wed, 20 Nov 2024 07:21:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>polaraire.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f16c6e3f05cb11fc072096be5bef6fa5d1d26504b711f04f359fe1417c09d347</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Polaraire.com appears to be a company focused on providing advanced HVAC solutions, specializing in high-quality air conditioning and heating systems. They aim to deliver efficient climate control products and services, catering to both residential and commercial clients. Emphasizing innovation and customer satisfaction, Polaraire.com likely offers installation, maintenance, and repair services.</i><br />Target victim <b>website</b>: <i>polaraire.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Oxford-Auto-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18842</link>
<guid>087d2849417bebba8f772a34eae096e3</guid>
<pubDate>Wed, 20 Nov 2024 02:32:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Oxford-Auto-Insurance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc0a108490c27addcc489a01db93656575f720ad31665c8da6aad2196b288f5b</i><br /><br />Threat actor <b>description</b>: <i>Insurance</i><br />Target victim <b>website</b>: <i>oxfordauto.com</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>piburners.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18839</link>
<guid>02c988e1e2c701afc4dae1df08630f87</guid>
<pubDate>Tue, 19 Nov 2024 22:46:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>piburners.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>875172d0968ac76aa20b6b56bd6693ffad2076a1835eabbbde9e57e69e784974</i><br /><br />Threat actor <b>description</b>: <i>ZIP-156GB - Revenue $5 Million</i><br />Target victim <b>website</b>: <i>piburners.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>incocommercial.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18835</link>
<guid>f80476be1013db988be6d5ecbe74f053</guid>
<pubDate>Tue, 19 Nov 2024 22:38:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>incocommercial.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2dfd4d5b30025cd07831867626ef45e67c7f903ada19fc150ea3a81adb21279a</i><br /><br />Threat actor <b>description</b>: <i>ZIP-210GB - Revenue $5 Million</i><br />Target victim <b>website</b>: <i>incocommercial.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>ccseniorservices</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18832</link>
<guid>f376b03403415c12c017f20313af8c51</guid>
<pubDate>Tue, 19 Nov 2024 22:30:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>ccseniorservices</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c861351f12d05e9b4643aec27eb92be7b30dc30ef85998365804dd490f7e5bb0</i><br /><br />Threat actor <b>description</b>: <i>ZIP-50GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Safex.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18830</link>
<guid>bf4776290aafc806f1c892156a3a9d52</guid>
<pubDate>Tue, 19 Nov 2024 22:28:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>Safex.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6424ca33c64351270b7b3df29843423a0eabc5a6a049de26af4b5f131fd08b15</i><br /><br />Threat actor <b>description</b>: <i>ZIP-70GB - Revenue $5,4 Million</i><br />Target victim <b>website</b>: <i>Safex.us</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>millerservicecompany.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18829</link>
<guid>0006aabe0ba47a35c0b0bf6596f85159</guid>
<pubDate>Tue, 19 Nov 2024 22:26:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>millerservicecompany.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c018e59899f61715272f0734b5ab4592cce1aaf4e0b6c46a9b36f9848480ea0e</i><br /><br />Threat actor <b>description</b>: <i>ZIP-70GB</i><br />Target victim <b>website</b>: <i>millerservicecompany.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>westwood</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18825</link>
<guid>05a0c4a3f3a22424cf61ae7edb982888</guid>
<pubDate>Tue, 19 Nov 2024 22:19:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>westwood</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c040f7798acbad10c5571dc0accb1b4b810ca4bb461c5a3c34ba6ff422d27bd7</i><br /><br />Threat actor <b>description</b>: <i>ZIP-50GB - Revenue $8.1 Million</i><br />Target victim <b>website</b>: <i>westwood-cc.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>threadfxincbluedogmerch</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18824</link>
<guid>2425ad56cc45acbd2fc44f149d69a9b8</guid>
<pubDate>Tue, 19 Nov 2024 22:19:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>threadfxincbluedogmerch</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed8bd59401c523bf38361e627b9684f1de80548b3d961f6c518cdc8270b86228</i><br /><br />Threat actor <b>description</b>: <i>ZIP-70GB - Revenue $10.7 Million</i><br />Target victim <b>website</b>: <i>threadfxinc.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gilazo</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18819</link>
<guid>af7fc8485f40dc495bc626d6dbe7faf1</guid>
<pubDate>Tue, 19 Nov 2024 22:19:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>Gilazo</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be4cd8c81b884a8866b63a4728cb71b5ceb0b0f2ec2eadcf596117b6a0bc0dc4</i><br /><br />Threat actor <b>description</b>: <i>Revenue $5 Million</i><br />Target victim <b>website</b>: <i>gilazo.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Omara</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18816</link>
<guid>fac871f4c1d48cdd1cff6d175e6ed344</guid>
<pubDate>Tue, 19 Nov 2024 22:19:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>Omara</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6171b01b7f864ecc449200ce06f220705c1708070f51852225d80d9dc5ea8057</i><br /><br />Threat actor <b>description</b>: <i>Revenue $5.7 Million</i><br />Target victim <b>website</b>: <i>omara-ag.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Indesign-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18823</link>
<guid>a269ef5c1e7623a02a651fad5f2b8905</guid>
<pubDate>Tue, 19 Nov 2024 21:43:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Indesign-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff26592d5600300d983b71091eb857c46d8e989bb510ded4bc30bda5eeeff04c</i><br /><br />Threat actor <b>description</b>: <i>Indesign, LLC is a multi-discipline engineering design firm that provides full turnkey electronic product.
							We can share with you developments for big companies like Microsoft, IBM, Rolls-Royce, Intel, and many more. Large sql database, complete development projects, personal data of employees and much more.</i><br />Target victim <b>website</b>: <i>indesign-llc.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>mithun.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18889</link>
<guid>7a5225076df72bd20e29e49a68a02a9e</guid>
<pubDate>Tue, 19 Nov 2024 21:07:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>mithun.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f50f166c120ad612fe8eac1e4be8bfb4074aa1948326075cf7a51e50c7ba4be</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>mithun.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>mcleanmortgage.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18888</link>
<guid>6b479a29fe192bbdf1f628fb593a617e</guid>
<pubDate>Tue, 19 Nov 2024 21:05:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>mcleanmortgage.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b03aaa8c7b0cf5d46b7d5c713ee9ed623ecc002f6e4f003db2d9ef08b53ed34e</i><br /><br />Threat actor <b>description</b>: <i>McLean Mortgage Corporation is a mortgage brokerage based in Fairfax, Virginia, specializing in various loan products to assist clients in achieving home ownership. Established in 2008, the company has been operational for over 16 years and offers services across multiple locations.SITE: www.mcleanmortgage.com Address : 11325 Random Hills Road Suite 400 Fairfax, VA 22030 United StatesTEL#: (571) 405-2527ALL DATA SIZE: ≈1tb 1. Accounting 2. Financial data, Loans, Payrolls, Tax 3. Human Resources data 4. Confidential data 5. Customers, Clients personal docs 6. Personal documents users and employees & etc…</i><br />Target victim <b>website</b>: <i>mcleanmortgage.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>andyfrain.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18887</link>
<guid>8512ca31b3df709713364fc8510ace73</guid>
<pubDate>Tue, 19 Nov 2024 21:03:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>andyfrain.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>15560a8c6d81290ba3d097c7f1818887107a6b28b1ccd8114b5869bf2b74dd66</i><br /><br />Threat actor <b>description</b>: <i>Andy Frain Services is a professional services company with a rich history dating back to 1924. Founded by Andrew T. Frain, the company initially focused on solving gate crashing problems at Chicago Stadium hockey games. Andy Frain Services began with a small group of professional ushers who created an atmosphere of authority at sporting events. The company’s success at Chicago Stadium led to an opportunity at Wrigley Field, where William Wrigley Jr. was so impressed that he invested in outfitting Frain’s men with their iconic blue and gold uniforms.SITE: www.isaitaly.com Address : 761 Shoreline Drive Aurora, IL  60504 United StatesTEL#: 630-820-3820ALL DATA SIZE: ≈750gb 1. Accounting 2. Human Resources 3. Legal 4. Contracts 5. Payroll & etc…</i><br />Target victim <b>website</b>: <i>andyfrain.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Henderson-Stamping--Production</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18815</link>
<guid>7ce485cec479cf699806261f68fc8787</guid>
<pubDate>Tue, 19 Nov 2024 18:39:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Henderson-Stamping--Production</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7e819169b06072c37028ffb4cc7554c34cc086240d8264eae792e1e30a2abe9d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.hendersonstamping.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Diamond-Brand-Gear</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18814</link>
<guid>7da14b79a1aa9f61a28f0f972290f420</guid>
<pubDate>Tue, 19 Nov 2024 18:36:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Diamond-Brand-Gear</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>49ebb53bbbc54b09862ea34519ff4c4d5934b0781c2d53ffe18ce1be9f353ec8</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.diamondbrandgear.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Miller--Smith</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18812</link>
<guid>ff5f900bac84c058978c6b16f895131f</guid>
<pubDate>Tue, 19 Nov 2024 18:30:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Miller--Smith</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0aa686861985c64b5ee86d479ced28c108f5f9cdc91dba03c10f16ea4bda651b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.millerandsmith.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hive-Power-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18811</link>
<guid>ed148e0621fd22140747d13da484ba01</guid>
<pubDate>Tue, 19 Nov 2024 18:27:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Hive-Power-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9bf72dc83e7cf86d2ed592c9092f874e31d4837b7a35e367a9a22bdff0fbb32f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.hivepowerengineering.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>CMD</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18810</link>
<guid>772cf17cfbe478b49a62fc40c42fec68</guid>
<pubDate>Tue, 19 Nov 2024 18:23:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>CMD</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26364515aad84a3eccb981ef396fdb017ef04a74f8413da6f1d97f11fbba3dcb</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.cmd-corp.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>IVC-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18809</link>
<guid>f8bdcc67bbcdb2b701040f5926b90712</guid>
<pubDate>Tue, 19 Nov 2024 18:20:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>IVC-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>14d846666dafbb7fe4bdcf49c937528b48ff614ef887edaece827a0cf36f896e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ivctechnologies.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Birdair</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18808</link>
<guid>4d01d08b5ad58aa49c662d7f5bec012a</guid>
<pubDate>Tue, 19 Nov 2024 18:17:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Birdair</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9b5db946004a442f7b88c55838b3e4f63c6c48c23e481bcf644def2dca20be89</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.birdair.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vox-Printing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18807</link>
<guid>549fce6b9f4c5bcf6e671dd2720f3002</guid>
<pubDate>Tue, 19 Nov 2024 18:16:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Vox-Printing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2e2be03e5da43ce8dd2d5169d1ac3e7092d1627994531a901f798912ca2bf889</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.voxpackaging.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Burkburnett-Independent-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18804</link>
<guid>fda249ac9c2f34c67a05b556b53e197d</guid>
<pubDate>Tue, 19 Nov 2024 18:09:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Burkburnett-Independent-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89e18f583f0d76189a8f816e351301d3fa919884edbf4b856af4016723de1a4e</i><br /><br />Threat actor <b>description</b>: <i>1 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Valley-Planing-Mill-valleyplaning.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18805</link>
<guid>54bff62713e574c1097f56646402832a</guid>
<pubDate>Tue, 19 Nov 2024 18:08:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Valley-Planing-Mill-valleyplaning.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fdd355cc07c51360a9d56ae78d8011a183003cd5518c6c2807933c1323df6083</i><br /><br />Threat actor <b>description</b>: <i>5,6 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>IndicaOnline</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18792</link>
<guid>c590b9faf2b899f2c4dfe1a6dbd6d98e</guid>
<pubDate>Tue, 19 Nov 2024 16:54:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>IndicaOnline</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>893a80f26333ef87e1453b1461aae3dc7706e7128a2f3c98f73c65e0cd99ddb1</i><br /><br />Threat actor <b>description</b>: <i>Client’s Personal data and ID’s Total personal records : 422,075 https://indicaonline.com Company representative should follow the instructions to contact us before time runs out</i><br />Target victim <b>website</b>: <i>indicaonline.com</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Performance-Health--Fitness</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18803</link>
<guid>1008fbb2c94f286909e8d9db51540119</guid>
<pubDate>Tue, 19 Nov 2024 16:19:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Performance-Health--Fitness</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>550427e9a430fd817ef1b00b0bb4f92b50caf07d272b7987372b3db0675ffee0</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>www.performanceforhealth.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>smawins.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18793</link>
<guid>cd2b3387c4709f14cd79ed5995aba48e</guid>
<pubDate>Tue, 19 Nov 2024 14:41:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>smawins.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7aa3569a682bf0798f497883f29bd74e5068362878c6778926090b6ce5c02f01</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] I'm sorry, but I couldn't find any specific information on a company named "smawins.net." It's possible that it is a small or less-known company, or it could be a relatively new business or website that hasn't gained much online presence yet. If you have any other details or context about the company, I might be able to provide more assistance.</i><br />Target victim <b>website</b>: <i>smawins.net</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>chsplumbing.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18794</link>
<guid>75a380a0989c5ac111616ddc18c1f74c</guid>
<pubDate>Tue, 19 Nov 2024 14:38:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>chsplumbing.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d5a1d852392d5054da84d4786573fbab770b759e073b0d6d031514f7697943de</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] CHS Plumbing is a company specializing in plumbing services. They offer a range of solutions including installation, repair, and maintenance for both residential and commercial clients. Known for their reliable and professional service, the company employs experienced and certified plumbers to ensure quality workmanship. CHS Plumbing is committed to customer satisfaction and efficient service delivery.</i><br />Target victim <b>website</b>: <i>chsplumbing.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>tempaircompany.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18795</link>
<guid>6b45cf467a9c88001159a826e92c7437</guid>
<pubDate>Tue, 19 Nov 2024 14:34:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>tempaircompany.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>693ca0abea4e3c9ec733a10bbefc7523d85f61e1bdb4e1e1031f722569ccebb9</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] TempAirCompany.com specializes in providing advanced temperature control solutions for various industries. They offer a range of services including HVAC system installation, maintenance, and repair. Known for their energy-efficient and customizable solutions, TempAirCompany serves both residential and commercial clients, ensuring optimal indoor climate conditions and customer satisfaction.</i><br />Target victim <b>website</b>: <i>tempaircompany.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Anderson-Miller-LTD</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18800</link>
<guid>a043e8d539356a54a784943d765f2b3a</guid>
<pubDate>Tue, 19 Nov 2024 14:31:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Anderson-Miller-LTD</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>40c8d2c82798712223428a47874d5d20fd072931e4b559c51a75d7237ef897f3</i><br /><br />Threat actor <b>description</b>: <i>Hospitality</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>Premier-Tax-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18799</link>
<guid>7ba3a4da51c2c8898c7107605624dd11</guid>
<pubDate>Tue, 19 Nov 2024 14:30:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Premier-Tax-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>042aaba32dc92ba71f3de708de78f286ea2fa46ed4b0301774dc856aba99da3e</i><br /><br />Threat actor <b>description</b>: <i>Accounting Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southern-Oregon-Veterinary-Specialty-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18797</link>
<guid>7f2e5a082324d9d664489b795e7fd83a</guid>
<pubDate>Tue, 19 Nov 2024 14:28:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Southern-Oregon-Veterinary-Specialty-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0cd3f9edd586a6830837d82fa0cb1e11646f41cf0599d54b8e66d89eb8575fc8</i><br /><br />Threat actor <b>description</b>: <i>Healthcare Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>brylesresearch.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18777</link>
<guid>76fdca9cd791acce9582bb354b48e608</guid>
<pubDate>Tue, 19 Nov 2024 12:33:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>brylesresearch.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0465b6bacb40b0d765a1e47c6121671942c3e8a7767af7f40492327bf803d2d4</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Bryles Research is a company specializing in market research and data collection services. They focus on providing insights through various methodologies such as surveys, focus groups, and interviews. Their services support businesses in understanding consumer behavior and market trends, aiding in strategic decision-making. The company emphasizes accuracy, reliability, and tailored research solutions.</i><br />Target victim <b>website</b>: <i>brylesresearch.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>thinkecs.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18780</link>
<guid>1ac065e393605e57f3eb01f535522c98</guid>
<pubDate>Tue, 19 Nov 2024 12:24:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>thinkecs.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>39c1f5d15fa9e681a72295ea1fd0e53c74da7214d3fe109b0f36f95dec24fe61</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] ThinkECS is a company specializing in IT services and solutions, focusing on enhancing business operations through technology. They offer services such as cybersecurity, cloud computing, and IT infrastructure management. With a client-centric approach, ThinkECS aims to provide tailored solutions that improve efficiency and security, helping businesses to leverage technology for growth and innovation.</i><br />Target victim <b>website</b>: <i>thinkecs.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>gfemlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18790</link>
<guid>cbb686245ece57c9827c4bc0d0654a8e</guid>
<pubDate>Tue, 19 Nov 2024 12:10:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>gfemlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c36031d78afda3169de81ed03afa00e624b19f02a3c78472882bc82663291a05</i><br /><br />Threat actor <b>description</b>: <i>Gleason, Flynn, Emig & McAfee, Chartered was founded in 1983 as Gleason & Flynn, when the firm’s founders, Jim Gleason and Mike Flynn decided to create a firm of skilled and aggressive trial lawyers. Gerard Emig and Larry McAfee became shareholders in 1991 and 2006, respectively.  Over the years the firm has increased in size yet its mission has remained constant: The attorneys at GFEM are dedicated to using their experience and expertise to best service the legal needs of their clients.SITE: www.gfemlaw.com Address : 11 North Washington Street Suite 400, Rockville MD 20850-4278, USTEL#: 301.294.2110ALL DATA SIZE: ≈550gb 1. Corporate data 2. Users personal folders and documents 3. Customers data and personal docs 4. Confidential data & etc…</i><br />Target victim <b>website</b>: <i>gfemlaw.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>instinctpetfood.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18789</link>
<guid>06f16510fb0dc706bb81d01ff33df729</guid>
<pubDate>Tue, 19 Nov 2024 12:07:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>instinctpetfood.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e663f139fcf82a5c8b5bc324d90e575272d85565196cc1b7fb4ef2ae1890ee17</i><br /><br />Threat actor <b>description</b>: <i>Instinct Pet Food is a family-owned pet food company that makes natural, minimally processed food for dogs and cats. Their products include: frozen raw meals, freeze-dried raw meals, kibble, raw toppers, and wet food. Instinct Pet Food’s mission is to improve the lives of pets by providing them with real, natural food. They believe that raw nutrition is unmatched and that food has the power to change a pet’s life.SITE: www.naturesvariety.com | www.instinctpetfood.com Address : 55 West Port Plaza Drive, Suite 200 St. Louis, MO 63146 United StatesTEL#: (314) 590-5700ALL DATA SIZE: ≈1.5tb 1. Human Resources 2. Corporate data(Financial, Payroll, Tax, Accounting… 3. Users Personal folders and documents 4. R&D & etc…</i><br />Target victim <b>website</b>: <i>instinctpetfood.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>eatonmetal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18788</link>
<guid>fae01d4ee6963b74a037e46b2cf436cf</guid>
<pubDate>Tue, 19 Nov 2024 12:04:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>eatonmetal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5965a7f48ce85727828219503d25f2ad2fe8cdfed80b41a5112626e07c5dcae2</i><br /><br />Threat actor <b>description</b>: <i>Eaton Metal Products Company utilizes its (3) large production facilities in Denver, Salt Lake City & Pocatello, Idaho to fabricate a staggering number of vessel & tank types & sizes, all for a who’s who list of customers around the US & the world.SITE: www.eatonmetal.com Address : 4800 York St. Denver, CO 80216 United StatesTEL#: 303-296-4800ALL DATA SIZE: ≈650gb 1. Accounting 2. Home employees personal folders and docs 3. Payroll and dinancial data 4. Tax data and forms 5. Audits 6. NDA’s, Confidential data & etc…</i><br />Target victim <b>website</b>: <i>eatonmetal.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>continentalserves.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18787</link>
<guid>ce9d84d48b2448b7e7c4bac79f5a7bd9</guid>
<pubDate>Tue, 19 Nov 2024 12:01:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>continentalserves.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee37a902c8576bfee5a76658bc22bc47312312f0e01ecc89ce4aa8a87a0ac152</i><br /><br />Threat actor <b>description</b>: <i>CULTURE-BUILDING EXPERTS Founded in Detroit, Michigan in 1989, Continental has grown from an office coffee and vending provider to the Midwest leader in workplace food and beverage offerings. Spanning across Michigan, Indiana, Ohio and into Pennsylvania and New York through the acquisition of Cuyahoga Franklin Group, Continental serves clients of all sizes, from international industry leaders to small businesses, including manufacturing, technology, healthcare, education, commerce and more. With a cutting-edge technology suite, best-in-class logistics and infrastructure, and a commitment to personal client attention, we consistently rank as one of the top contract dining and refreshment providers in the nation. From 24/7 micro-markets to full-service cafés and food delivery, our customized programs provide the resources of a global company with the responsiveness only a local partner can offer.SITE: www.continentalserves.com Address : 700 Stephenson Hwy, Troy, MI 48083 United StatesTEL#: 248.414.1700ALL DATA SIZE: ≈900gb 1. Users, employees personal folders and docs 2. Financial data 3. Personal documents employees 4. Tax data 5. NDA’s, Confidential data 6. Human Resources & etc…</i><br />Target victim <b>website</b>: <i>continentalserves.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>wachter.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18786</link>
<guid>c50b8d55acad50abed2b155f67fc56b3</guid>
<pubDate>Tue, 19 Nov 2024 11:58:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>wachter.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c51ac99d24dbbaf4e052de0f38262a4fb00b35d2e706b0403b1a483f152c2a9</i><br /><br />Threat actor <b>description</b>: <i>Wachter is a technology integration company that designs, installs, and maintains technology for businesses across the United States.SITE: www.continentalserves.com Address : 16001 West 99th Street Lenexa, KS 66219 United StatesTEL#: 913-541-2500ALL DATA SIZE: ≈200gb 1. Employees personal folders and docs 2. Financial data 3. Confidential 4. Human Resources & etc…</i><br />Target victim <b>website</b>: <i>wachter.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>jonti-craft.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18785</link>
<guid>ba01738f996a524bd59e9a05c929ac06</guid>
<pubDate>Tue, 19 Nov 2024 11:55:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>jonti-craft.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>311d7d195c2ac80f71ca072932038e1a721059bfd8a0b79e18ba4c585bdf1ed1</i><br /><br />Threat actor <b>description</b>: <i>Jonti-Craft is a family-owned company that manufactures children’s furniture for a variety of settings, including classrooms, daycares, and waiting rooms.SITE: www.jonti-craft.com Address : 171 State Highway 68 PO Box 30, Wabasso MN 56293 USATEL#: (507) 342-5169ALL DATA SIZE: ≈700gb 1. Home users data 2. Financial data, Payroll 3. Personal 4. Human Resources 5. Engineering 6. Depts & etc…</i><br />Target victim <b>website</b>: <i>jonti-craft.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>rockportmortgage.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18783</link>
<guid>8ff4a061e94d139f016b2ca7dd0a1541</guid>
<pubDate>Tue, 19 Nov 2024 11:51:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>rockportmortgage.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f6e837399c251509c7b2716f5476cc861cb443cb73d7d374296c132e28cec40</i><br /><br />Threat actor <b>description</b>: <i>Rockport Mortgage is a leading national provider of FHA-insured financing programs and offers unique customized solutions for multifamily affordable and market-rate housing as well as healthcare and assisted living facilities.SITE: www.rockportmortgage.com Address : 17 Rogers Street Gloucester, MA 01930 United StatesTEL#: (978) 283-9208ALL DATA SIZE: ≈1.1tb 1. Employees personal documents 2. Financial data, Accounting, Payroll 3. Users personal folders 4. Customers data 5. Tax, confidential data & etc…</i><br />Target victim <b>website</b>: <i>rockportmortgage.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>San-Francisco-Ballet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18773</link>
<guid>2465d4a06fe6abc5abc6e62b728796bb</guid>
<pubDate>Tue, 19 Nov 2024 11:50:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>San-Francisco-Ballet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b5fc5e4c2360f25b469e950fb4217e40610338797512aa4aef8e37c3d3ac8e17</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] San Francisco Ballet, founded in 1933, is one of America's oldest professional ballet companies. Based in San Francisco, California, it is renowned for its artistic excellence and innovative performances. The company presents a diverse repertoire, including classical and contemporary works, and is committed to education and community engagement through various outreach programs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>kmcglobal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18782</link>
<guid>78004afc42f8815cdb68a5fe928b06d1</guid>
<pubDate>Tue, 19 Nov 2024 11:48:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>kmcglobal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>259f0a237b57630f591f1743e1e93f379a6322606029c6a56306e5281822634d</i><br /><br />Threat actor <b>description</b>: <i>KMC Global is a group of wholly-owned, autonomous companies which design and manufacture equipment that enhances how industry processes material. Serving customers in a broad spectrum of manufacturing sectors such as; food, chemical, automotive, mineral processing, industrial manufacturing, agricultural, foundry, metals recycling, and energy, each company helps these processing and manufacturing-based sectors optimize production and reduce waste. The equipment manufactured collectively by the group include; conveyors, material screeners, metal crushers, bulk bag loading and unloading equipment, coolant filtration equipment, and wastewater treatment equipment.SITE: www.kmcglobal.com Address : 5944 E N Ave Kalamazoo, MI 49048 United StatesTEL#: +1 (269) 382-8200ALL DATA SIZE: ≈1,4tb 1. Accounting 2. Payroll 3. Finance 4. Engineering 5. Marketing 6. Users personal folders, docs 7. Confidential docs, NDAs & etc…</i><br />Target victim <b>website</b>: <i>kmcglobal.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>interborosd.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18774</link>
<guid>f0a94cc746c82ccf258040d541a2e15e</guid>
<pubDate>Tue, 19 Nov 2024 09:55:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>interborosd.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>59952b7e506b42185510aadf56d40d249eace18364c2392866bdd37fb450beeb</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] I'm sorry, but I couldn't find any information about a company or organization called "interborosd.org." It's possible that it might be a lesser-known or local entity, or it could be a typo or misunderstanding regarding the name. If you have any additional context or information, I'd be happy to help further!</i><br />Target victim <b>website</b>: <i>interborosd.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Thebike.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18775</link>
<guid>82f2307042ab867c7b3d7d6a32ea52af</guid>
<pubDate>Tue, 19 Nov 2024 09:51:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>Thebike.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eef91827640cc9c51d9dab161ba52cfaf0a00235c5dbba5f46bd49445b5b15e6</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Thebike.com is a company that specializes in providing a wide range of bicycles and cycling accessories. They offer products for various types of cycling, including road, mountain, and urban biking. The company focuses on quality and innovation, ensuring that customers receive reliable and durable bikes. Their commitment to customer satisfaction is reflected in their comprehensive support and service options.</i><br />Target victim <b>website</b>: <i>Thebike.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>3ccaresystems.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18776</link>
<guid>6f0cdeedf664c24860cba8842e94b300</guid>
<pubDate>Tue, 19 Nov 2024 09:48:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>3ccaresystems.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>66b86add380bf74014a0b7f065a7953e0e7df4193c9e5cd245237fe2a2fbaedc</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] 3C Care Systems is a company specializing in healthcare technology solutions. It focuses on providing innovative software and services to enhance patient care and streamline healthcare operations. The company's offerings include electronic health records (EHR), practice management tools, and patient engagement platforms, all designed to improve efficiency and outcomes in healthcare settings.</i><br />Target victim <b>website</b>: <i>3ccaresystems.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Terra-Energy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18771</link>
<guid>a4cc3a85c7cda24dd3e028306403697d</guid>
<pubDate>Tue, 19 Nov 2024 03:29:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Terra-Energy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f3ddf4cdb12d6f49c7cf96b53d84bcdfaf090864e9eff989fbf0e109c54f315</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>terraenergy.io</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.depewgillen.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18722</link>
<guid>034449c8eea9c7448f6623888d85976b</guid>
<pubDate>Mon, 18 Nov 2024 22:53:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.depewgillen.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af13cdf4c307e644aa64e75027b451924de89e62d037ca3fbd49138229ae658e</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Depew Gillen Rathbun & McInteer, LC is a law firm based in Wichita, Kansas. They specialize in providing legal services in various areas including business law, environmental law, real estate, and litigation. The firm is known for its personalized approach and commitment to addressing the unique needs of each client, leveraging their extensive experience and knowledge in their practice areas.</i><br />Target victim <b>website</b>: <i>www.depewgillen.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nations-Homes-Commercial--Residential-Construction-South-Carolina-United-States</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18731</link>
<guid>dfa54381225d763cc2e6b12d2d6c64ac</guid>
<pubDate>Mon, 18 Nov 2024 21:02:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>Nations-Homes-Commercial--Residential-Construction-South-Carolina-United-States</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f8d939689a8bd737d1cf1156e781da594875f071dc119567a77acf4c6f0b757</i><br /><br />Threat actor <b>description</b>: <i>Nations Homes has earned a reputation as one of the finest custom homebuilders in Myrtle Beach, South Carolina.
<25 Employees
Revenue <$5 Million</i><br />Target victim <b>website</b>: <i>myrtlebeachcustomhomebuilder.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>PC-AfterHours</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18730</link>
<guid>098f2ddd79cd296bad7b7b41c2b68a3b</guid>
<pubDate>Mon, 18 Nov 2024 20:58:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>PC-AfterHours</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ae121859e683a74bc4da5174d17ea07159e53a46028b557b0d1ab273f8a5903</i><br /><br />Threat actor <b>description</b>: <i>Consumer Services · Minnesota, United States.
PC-AfterHours offers a variety of technical support services for Windows based computers and networks.
< 25 Employees
Revenue < $5 Million</i><br />Target victim <b>website</b>: <i>www.pcafterhours.net</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bells-Tax-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18729</link>
<guid>e654e714cf5c2214d7f9a62a87776b6f</guid>
<pubDate>Mon, 18 Nov 2024 20:58:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>Bells-Tax-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>08ae845e606c651b45e2ec5225fe3ff9d65ce050af6b752b3e7a40fd3fca5de2</i><br /><br />Threat actor <b>description</b>: <i>Accounting Services · California,
United States
Bells Tax Service | Bells Tax Service Modesto California Modesto Tax Services Bells Tax Service modesto, tax, preparation, corporate, trusts...
< 25 Employees
Revenue < $5 Million</i><br />Target victim <b>website</b>: <i>bellstaxservice.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>LA-LUCKY-Brand</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18727</link>
<guid>8c6883dccf708d874a324dc762133c1d</guid>
<pubDate>Mon, 18 Nov 2024 20:54:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>LA-LUCKY-Brand</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b189c42177e7df0eab1a3332219560d7aa77291e5b10b10cdba1d7dd44b7e8f7</i><br /><br />Threat actor <b>description</b>: <i>Grocery Retail · California,
United States
LA Lucky has been in business for over 28 years. In 2007, George Nguyen, a third generation of Asian foods entrepreneur, purchased LA Lucky with the idea of providing Asian retailers with a complete variety of food.
< 25 Employees
Revenue < $5 Million</i><br />Target victim <b>website</b>: <i>lalucky.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>eastgateauto.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18726</link>
<guid>58a91bb19671d3a3fb526644fdb27b61</guid>
<pubDate>Mon, 18 Nov 2024 20:33:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>eastgateauto.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>03fae1322887796f5f63c216e37166ff70ec517bece3ee533e55cebfdc12e11b</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Eastgate Auto is an automotive dealership specializing in the sale of new and used vehicles. The company offers a wide selection of cars, trucks, and SUVs from various manufacturers. In addition to vehicle sales, Eastgate Auto provides financing options, maintenance, and repair services. The dealership is committed to customer satisfaction, offering a comprehensive and personalized car-buying experience.</i><br />Target victim <b>website</b>: <i>www.eastgateauto.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>kciaviation.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18725</link>
<guid>5d5bbd55157f38a19f155390f2dc7430</guid>
<pubDate>Mon, 18 Nov 2024 20:30:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>kciaviation.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fb5b51dbd73985197fa8f3bad393e00bfed33432d5cbf26c5fdbd8d40e9be177</i><br /><br />Threat actor <b>description</b>: <i>KCI Aviation's headquarters is in Taylor County at 1211 AFG Road, Bridgeport, WV with a hangar in Buckhannon, WV.</i><br />Target victim <b>website</b>: <i>kciaviation.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>totaldevelopmentsolutions.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18718</link>
<guid>53adb96c287c3931b3bc41cebb003788</guid>
<pubDate>Mon, 18 Nov 2024 18:08:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>totaldevelopmentsolutions.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f0bec133e4b593259d6148241abf9abb10bf5bfd2911c692edfe42db11c36e6</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Total Development Solutions is a company specializing in comprehensive real estate services, including property development, project management, and construction solutions. They focus on delivering tailored, innovative solutions for residential, commercial, and industrial projects. With a commitment to quality and client satisfaction, they guide projects from concept to completion, ensuring efficiency and excellence at every stage.</i><br />Target victim <b>website</b>: <i>totaldevelopmentsolutions.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>jergenspiping.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18719</link>
<guid>83bdd5a91e556ca3b57aafab83ee8ef5</guid>
<pubDate>Mon, 18 Nov 2024 18:05:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>jergenspiping.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2dd0e5946191755b1135a715ad6c22a2f3e58a14328836797ecfaf9b31f88ec6</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Jergens Piping is a company specializing in high-quality piping solutions and services. They focus on delivering reliable and efficient piping systems for various industries, including industrial, commercial, and residential sectors. Their offerings typically include installation, maintenance, and repair of piping systems, emphasizing customer satisfaction and adherence to safety standards.</i><br />Target victim <b>website</b>: <i>jergenspiping.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>sealevelinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18720</link>
<guid>c0db9e6e227519325ef2007b71cef88e</guid>
<pubDate>Mon, 18 Nov 2024 18:02:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>sealevelinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f5d56816c4e545c15cbfd054112541f4998e5a56d6b19432f6d8d14108c464af</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Sealevel Systems, Inc. is a company specializing in industrial computing and I/O solutions. They design and manufacture products such as serial communication devices, digital I/O interfaces, and embedded computing systems. Their offerings are used in a variety of sectors, including military, aerospace, and industrial automation, focusing on reliability and performance in demanding environments.</i><br />Target victim <b>website</b>: <i>sealevelinc.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jornstax.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18721</link>
<guid>8e5fa18d56aaa32a82054e8e1433b160</guid>
<pubDate>Mon, 18 Nov 2024 17:59:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>Jornstax.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e68bae8eacadd149ca1622136934d71cb5efdc3a70c639d78b7e0fabca58a662</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Jornstax.com is a company specializing in tax services, offering comprehensive solutions for businesses and individuals. Their services include tax preparation, planning, and consultation, aiming to optimize financial outcomes and ensure compliance with tax regulations. Jornstax.com is known for its expert team, personalized approach, and commitment to helping clients navigate complex tax situations efficiently.</i><br />Target victim <b>website</b>: <i>Jornstax.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>allconstructiongroupwv.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18716</link>
<guid>d748adca7e034f5203e7cc99deb1e458</guid>
<pubDate>Mon, 18 Nov 2024 15:53:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>allconstructiongroupwv.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7906f2e63c6d5df7a4799534ea03d8ef79005392cd38eff7b4b5e93251babe8d</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] All Construction Group WV is a company specializing in a range of construction services in West Virginia. They focus on residential and commercial projects, offering services such as new builds, renovations, and repairs. Known for their commitment to quality and customer satisfaction, they employ skilled professionals and utilize modern techniques to ensure efficient and reliable construction solutions.</i><br />Target victim <b>website</b>: <i>allconstructiongroupwv.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Waters-Truck-and-Tractor-waterstruck.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18715</link>
<guid>1c9fcae7146273d7443f5b7eac02d56d</guid>
<pubDate>Mon, 18 Nov 2024 15:44:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Waters-Truck-and-Tractor-waterstruck.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1748f9b8803ebc93d9abd14b0086058e768f7fb1f3a1a8d02d2e696e0fcc10b</i><br /><br />Threat actor <b>description</b>: <i>3 GB</i><br />Target victim <b>website</b>: <i>waterstruck.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dorner-Law--Title-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18706</link>
<guid>8b92d91e16ea83d7e1445c852d32e724</guid>
<pubDate>Mon, 18 Nov 2024 13:28:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Dorner-Law--Title-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81bff16fd565770b4ddd30c2c0341a30fa682f7312daba82ea97076e33b78354</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>dornerlaw.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Monster-Electrical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18714</link>
<guid>53a321a3dd5fec15174c52abc7dca46a</guid>
<pubDate>Mon, 18 Nov 2024 13:24:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Monster-Electrical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7dfb1e426fc28bddf7a31c8ce1275057f428685cb7bf7398fa5b68d852e863c3</i><br /><br />Threat actor <b>description</b>: <i>Monster Electrical provides a wide variety of new power
distribution products and parts with a focus on electr
ical fuses and controls. 

You will find huge amount of corporate data, personal e
mployees data with SSNs, customer contact information e
tc.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:1DEBF17E9E1F2CBBD85BDB9
6AE5C34AA589C7A4E&dn=monsterfuses.com&tr=udp://tracker.
openbittorrent.com:80/announce&tr=udp://tracker.opentra
ckr.org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>monsterelectrical.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Maxus-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18713</link>
<guid>b56ecb91e505cc30ffba96419af1cf19</guid>
<pubDate>Mon, 18 Nov 2024 13:24:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Maxus-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63b494aacd30d7f10c4842ffcf5ac17fd5b65acf98b6e785ab15b036e67720a8</i><br /><br />Threat actor <b>description</b>: <i>Maxus Group delivers premier talent and technology solu
tions to our clients, through our integrated service li
nes. 

You will find a lot of information about contractors (N
DAs, SSNs and contact information), credit card screens
with CVV, internal financial documents, etc.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:DC5BB112A9427F8DAEE56BB
CF79BEE2BD6842730&dn=maxusgroup.com&tr=udp://tracker.op
enbittorrent.com:80/announce&tr=udp://tracker.opentrack
r.org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>maxusgroup.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Guard1</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18712</link>
<guid>42b5ce9d23645f2bae146063b2218ae7</guid>
<pubDate>Mon, 18 Nov 2024 13:24:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Guard1</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ebf09af2e585757991abecc2932ce201318478e64bb8f1022861da4729c211b5</i><br /><br />Threat actor <b>description</b>: <i>Guard1 is the platform that brings together software an
d hardware to make facilities safer.

You will find a lot of NDAs, employees insurance info, 
customer information with contacts, internal corporate 
financial documents, etc.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:A25F76FB534F5F0578B6734
91134186E95FF37A2&dn=guard1.com&tr=udp://tracker.openbi
ttorrent.com:80/announce&tr=udp://tracker.opentrackr.or
g:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>guard1.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bulbrite-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18711</link>
<guid>392a556942cd6324f0091a4a39e3845b</guid>
<pubDate>Mon, 18 Nov 2024 13:24:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Bulbrite-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e30bd49efb1f714e1aba8920fe9a9be1d00ad113a27198bb2d0aff3af8d8f07</i><br /><br />Threat actor <b>description</b>: <i>BULBRITE is a leading manufacturer and supplier of inno
vative, energy-efficient light source solutions renowne
d

You will find a lot of financial papers, employees pers
onal data, customers contacts etc.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:8285FC7CDC11405AE215E6A
4C2D9B42D89C9C918&dn=bulbrite.com&tr=udp://tracker.open
bittorrent.com:80/announce&tr=udp://tracker.opentrackr.
org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>bulbrite.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>H2OBX-Waterpark</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18710</link>
<guid>a1c7060e48b086dff8f6e99abbfb181f</guid>
<pubDate>Mon, 18 Nov 2024 13:24:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>H2OBX-Waterpark</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5af41803c050b4cdb1e3c3ef18d14171dd257763fe25902de2b4b33c3e2e5ad</i><br /><br />Threat actor <b>description</b>: <i>H2OBX Waterpark is North Carolina's newest resort-style
waterpark. With over 30 rides, slides and attractions,
there is no shortage of fun and memories to be made.

You will find a lot of information about internal accid
ents , personal information, employees data with addres
ses and emails, etc.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives password: h2obxwaterpark.com

MAGNET URL: magnet:?xt=urn:btih:86DC0989E2CD4366853553D
84E75C1183CC49CE8&dn=h2obxwaterpark.com&tr=udp://tracke
r.openbittorrent.com:80/announce&tr=udp://tracker.opent
rackr.org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>h2obxwaterpark.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Travis-Pruitt--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18709</link>
<guid>4d0b483a07ca95b34026e2238265e90b</guid>
<pubDate>Mon, 18 Nov 2024 13:24:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Travis-Pruitt--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ae7fe56a30e430207ffa5a3fa8ddab84bdb68717dd480a201b6c5d939ded14d2</i><br /><br />Threat actor <b>description</b>: <i>Travis Pruitt & Associates was founded in 1972 to provi
de quality engineering and surveying services to the me
tropolitan Atlanta market.

We have huge amount of employees data with emails, SSNs
, passports, driver licenses, etc.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives password: Admin#123!root

MAGNET URL: magnet:?xt=urn:btih:3086ABC0965C1FE0A319B7C
49EF9D748420C0C33&dn=travispruitt.com&tr=udp://tracker.
openbittorrent.com:80/announce&tr=udp://tracker.opentra
ckr.org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>travispruitt.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Followup-CRM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18699</link>
<guid>99e71865a8531658d3eb31c17119b66e</guid>
<pubDate>Mon, 18 Nov 2024 00:11:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Followup-CRM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>842acf167401b05f8c14cf0743658944f08cd1fe8b6abac85f89c896849a86e4</i><br /><br />Threat actor <b>description</b>: <i>N/A</i><br />Target victim <b>website</b>: <i>followupcrm.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nifast</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18691</link>
<guid>4349e27c2e58c3bbc0c91ac64210093e</guid>
<pubDate>Sun, 17 Nov 2024 19:24:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>termite</b> claims attack for <b>Nifast</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8bc9bf17e37db7f04f1664049d8840224218ecd0d14cf9a30802776283de5255</i><br /><br />Threat actor <b>description</b>: <i>Operating from 1987, Nifast is a specialist of fastening components and automobile parts with a broad business scope of vendor approval, sourcing, quality assurance and delivery.
</i><br />Target victim <b>website</b>: <i>www.nifast.com</i>]]></description>
<category>termite</category>
</item>
<item xmlns:dc='ns:1'>
<title>texanscan.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18678</link>
<guid>42c88875bb90aeed57f01609fef5d9d7</guid>
<pubDate>Sun, 17 Nov 2024 10:30:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chort</b> claims attack for <b>texanscan.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>154d7409313e0b0f0b974666027ecee9af67ca18b8d66917ad0ecff167f586e5</i><br /><br />Threat actor <b>description</b>: <i>Status: Not Available - details:  Databases + Files of This Company </i><br />Target victim <b>website</b>: <i>texanscan.org</i>]]></description>
<category>chort</category>
</item>
<item xmlns:dc='ns:1'>
<title>edwardsburgschoolsfoundation.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18677</link>
<guid>269cb020d9ca99cd774e42a274e6497c</guid>
<pubDate>Sun, 17 Nov 2024 10:28:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chort</b> claims attack for <b>edwardsburgschoolsfoundation.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89c89254120d08afd7a3b3f19c9a5b9e4e1b043b593b632999b02f9c71fd0fa3</i><br /><br />Threat actor <b>description</b>: <i>Status: Not Available - details:  Databases + Files of This Company </i><br />Target victim <b>website</b>: <i>edwardsburgschoolsfoundation.org</i>]]></description>
<category>chort</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tri-TechElectronics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18676</link>
<guid>e1f95004b4e3440796852f7ea802bbd5</guid>
<pubDate>Sun, 17 Nov 2024 10:26:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chort</b> claims attack for <b>Tri-TechElectronics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e766989091cee704cfe6fb9c67ab08b050569c79bfb6038c48bab8f23bc449b8</i><br /><br />Threat actor <b>description</b>: <i>Status: Published - details:  Databases + Files of This Company </i><br />Target victim <b>website</b>: <i>Tri-TechElectronics.com</i>]]></description>
<category>chort</category>
</item>
<item xmlns:dc='ns:1'>
<title>bartow.k12.ga.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18675</link>
<guid>0b1b7918f461a4dd8d877236543412d8</guid>
<pubDate>Sun, 17 Nov 2024 10:24:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chort</b> claims attack for <b>bartow.k12.ga.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b5a2b68db2bb6fb61a1d79dc58b4ad1d028ad5c3492cc4d78eaca3c368f8bdc</i><br /><br />Threat actor <b>description</b>: <i>Status: Published - details:  Databases + Files of This Company </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>chort</category>
</item>
<item xmlns:dc='ns:1'>
<title>hartwick.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18673</link>
<guid>a6fdefb2b99177b152b2392b43097665</guid>
<pubDate>Sun, 17 Nov 2024 10:22:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chort</b> claims attack for <b>hartwick.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db5b345396f5d0675e8635d3ce710935759d2f9bb23d4d9bd973a6c650590753</i><br /><br />Threat actor <b>description</b>: <i>Status: Wait for Decision - details:  Databases + Files of This Company </i><br />Target victim <b>website</b>: <i>hartwick.edu</i>]]></description>
<category>chort</category>
</item>
<item xmlns:dc='ns:1'>
<title>Apple-Electric-Ltd</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18658</link>
<guid>c187bf76c5a82332e5f2b2a0e6de02b6</guid>
<pubDate>Sat, 16 Nov 2024 17:55:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Apple-Electric-Ltd</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6d8137bdc61119999be6d26c718eb684862b0c173b89b908e6b63956e14e097</i><br /><br />Threat actor <b>description</b>: <i>Apple Electric Ltd. is solution electrical contractor providing a wide range of electrical, electronic and communications services to commercial and industrial customers. Apple Electrical Contractors corporate office is located in 7540 Andrews Hwy, Odessa, Texas, 79765, United States and has 40 employees.

Nov 14, 2024, 04:35:10 PM </i><br />Target victim <b>website</b>: <i>theappleelectric.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>LEGO-Construction-Co</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18659</link>
<guid>d29b398a474fadcb5441fb10975a5fb4</guid>
<pubDate>Sat, 16 Nov 2024 17:53:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>LEGO-Construction-Co</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>280c6dcbaf7eecaf81e6dd0aa783da70ee2f3d9d9af0efcda3fec0690563494d</i><br /><br />Threat actor <b>description</b>: <i>LEGO Construction Co. is a Florida-based construction firm headquartered in the heart of Miami, specialize in healthcare, education, federal projects, correctional facilities, transportation, and historic preservation. LEGO Construction corporate office is located in 1011 Sunnybrook Rd Ste 905, Miami, Florida, 33136, United States and has 34 employees. The total amount of data leakage is 849.5 GB

Nov 15, 2024, 06:29:55 AM </i><br />Target victim <b>website</b>: <i>legocc.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>brandywinecoachworks.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18663</link>
<guid>9b25fe42899f88af0aba784271eed051</guid>
<pubDate>Sat, 16 Nov 2024 15:05:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>brandywinecoachworks.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0db560cfc43bf0668ffc0255abccdc708c63899f233c7ac0f5762034e465d88e</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Brandywine Coach Works is an auto body repair company that specializes in collision repair services. They focus on providing high-quality repairs and customer service, ensuring vehicles are restored to their pre-accident condition. The company is known for its skilled technicians, state-of-the-art equipment, and commitment to using high-quality materials. They strive to deliver reliable and efficient repair solutions.</i><br />Target victim <b>website</b>: <i>www.brandywinecoachworks.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>kapurinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18662</link>
<guid>84b30ffe622e26fdc1e92969e4e874cc</guid>
<pubDate>Sat, 16 Nov 2024 15:02:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>kapurinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22e96957af8cd4e0b4045ef95892b93c3c9037aecd0b8b4d5a855dd4b2e52534</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] I'm sorry, but I don't have specific information about "kapurinc.com." It's possible that it's a smaller or less known company, or it may not have extensive publicly available information. If you have any specific questions or need assistance with a different topic, feel free to ask!</i><br />Target victim <b>website</b>: <i>www.kapurinc.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Addiction-Centers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18657</link>
<guid>570938f00c1f30c59530b15fc930dd0f</guid>
<pubDate>Sat, 16 Nov 2024 10:47:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>American-Addiction-Centers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>327e0885e549979aee1c7c7e2b739b10a0a2050fbbf28bb1a4347d862f13c690</i><br /><br />Threat actor <b>description</b>: <i>American Addiction Centers American Addiction Centers was founded in 2007. Since that time, we have grown into the largest network of rehab facilities nationwide, with programs in California, Florida, Texas, Nevada, Massachusetts, Mississippi, New Jersey, and Rhode Island.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>billyheromans.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18653</link>
<guid>c9c0d8a434fdbcee4cd69ea2ce1fe371</guid>
<pubDate>Fri, 15 Nov 2024 21:07:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>billyheromans.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8155553d8c25c44090cedfb3333025f60fae9c070f2d37855e8d134594460d30</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Billyheromans.com is the online presence of Billy Heroman’s Flowers & Gifts, a family-owned florist business based in Baton Rouge, Louisiana. Established in 1955, it is known for offering a wide range of floral arrangements, plants, and gifts for various occasions. The company emphasizes quality, creativity, and customer service, and provides delivery services in the local area.</i><br />Target victim <b>website</b>: <i>www.billyheromans.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>kenmore.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18652</link>
<guid>8de87e06e082806f690692c0ca47d3cc</guid>
<pubDate>Fri, 15 Nov 2024 21:04:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>kenmore.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d58b2782c29d6597dc899b4ebba350994b15274a2ba0f82f4c99da36c038928a</i><br /><br />Threat actor <b>description</b>: <i>kenmore.com</i><br />Target victim <b>website</b>: <i>www.kenmore.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Total-Patient-Care-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18646</link>
<guid>837d74cd0d4fbc51ead6d12738e01cba</guid>
<pubDate>Fri, 15 Nov 2024 20:53:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Total-Patient-Care-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>adeda7f39645e05dc2986c9278be3e76b723babf543a9a08da1aee822ac48625</i><br /><br />Threat actor <b>description</b>: <i>Medical records and personal information Company representative should follow the instructions to contact us before time runs out</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vector-Transport-vectortransport.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18648</link>
<guid>0b42ee7598a0141dfa0877206df38f9c</guid>
<pubDate>Fri, 15 Nov 2024 19:06:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Vector-Transport-vectortransport.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab3a9797e060149feb9b9eec6c39dfb3cc936276af32b83b9d93c113c3c1b14e</i><br /><br />Threat actor <b>description</b>: <i>19 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>marysville.k12.oh.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18651</link>
<guid>aa9fb775b71bb8fffdc3962bccab7cb0</guid>
<pubDate>Fri, 15 Nov 2024 19:01:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>marysville.k12.oh.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c2ef40eed28a7c7b92daf5bb6b304e547781609430fdee2621858976ef58a961</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Marysville.k12.oh.us is the domain for the Marysville Exempted Village School District located in Marysville, Ohio. The district serves a diverse student population with a focus on providing quality education through various academic programs, extracurricular activities, and community involvement. It emphasizes innovation, technology integration, and personalized learning to prepare students for future success.</i><br />Target victim <b>website</b>: <i>www.marysville.k12.oh.us</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>A-Sensitive-Touch-Home-HealthAlphastar-Home-Health-CareHeart-of-Texas-Home-Healthcare-Se</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18644</link>
<guid>94b6ce9c1dbb412dcc36e2850627056f</guid>
<pubDate>Fri, 15 Nov 2024 16:54:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>A-Sensitive-Touch-Home-HealthAlphastar-Home-Health-CareHeart-of-Texas-Home-Healthcare-Se</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>acdce04dfeb0a3bb0865853cad4410080297f6f46e1977d27670209f37eb3337</i><br /><br />Threat actor <b>description</b>: <i>Medical records and personal information Company representative should follow the instructions to contact us before time runs out</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pinger---USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18688</link>
<guid>c9fef0f5571c58ecd8c845e3b0f4b7f7</guid>
<pubDate>Fri, 15 Nov 2024 13:17:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hellcat</b> claims attack for <b>Pinger---USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6d8c1cbbf4d19893e4fd26159c12f88d61279d4759d5b7255069b20d23d7665</i><br /><br />Threat actor <b>description</b>: <i>We have successfully breached Pinger’s infrastructure, acquiring 111 GB of highly sensitive data. This includes over 9 million user records, private messages, voice messages, internal tools (such as phone number lookup and notification sender), backend systems, and source codes.
Pinger, a global leader in free texting and calling solutions with millions of active users, is now at risk of having its proprietary data and user information exposed, potentially causing significant reputational and operational damage.
To secure the deletion of this data and prevent its public release, we demand a payment of $150,000 USD in Monero (XMR) or Bitcoin (BTC). Failure to comply will result in the immediate dissemination of the compromised information.
</i><br />Target victim <b>website</b>: <i>pinger.com</i>]]></description>
<category>hellcat</category>
</item>
<item xmlns:dc='ns:1'>
<title>Live-Aquaria</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18639</link>
<guid>d58046673cab7fe068e4a84318bca447</guid>
<pubDate>Thu, 14 Nov 2024 22:44:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Live-Aquaria</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ecf3743bd2a7ec5047095f807e24f398ee525db285fc5234fe9ecbaa082d31c2</i><br /><br />Threat actor <b>description</b>: <i>LiveAquaria, the popular business to providing live cor
als and fish to both saltwater and freshwater hobbyists
.

There are lots of internal financial documents, persona
l employees files and other corporate data.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:4ECFA681B4FCAE848A050D8
A7E74FD672A249980&dn=drsfostersmith.com&tr=udp://tracke
r.openbittorrent.com:80/announce&tr=udp://tracker.opent
rackr.org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>drsfostersmith.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wright-Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18638</link>
<guid>f2a712f8728b51a565917305f8953475</guid>
<pubDate>Thu, 14 Nov 2024 22:44:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Wright-Engineers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e685d69c1c5ec6018c7469d8b9747241cd6c167d0127ca375429497729db60e</i><br /><br />Threat actor <b>description</b>: <i>Wright Engineers focuses on structural, mechanical, ele
ctric services and more. 

We have internal payment information with screenshots o
f personal data, medical documents, SSNs, driver licens
es etc.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password. 

MAGNET URL: magnet:?xt=urn:btih:821E6FEECECFD2FC69F0AD5
0E3BFC4AE492D77FC&dn=wrightengineers.com&tr=udp://track
er.openbittorrent.com:80/announce&tr=udp://tracker.open
trackr.org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>wrightengineers.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ocean-BeautySeafoods</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18636</link>
<guid>54821d182370046edc3fa2d37a254cdc</guid>
<pubDate>Thu, 14 Nov 2024 22:43:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Ocean-BeautySeafoods</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ad8d0b4b19a34a395ae24f18f7c32cdb7a32cfd304710a62d2931cf548fc0e8</i><br /><br />Threat actor <b>description</b>: <i>Ocean Beauty Seafoods is one of the largest and most su
ccessful seafood companies in North America, with seven
distribution locations across the Western United State
s.

We have lots of financial documents, personal employees
info etc.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:38152E2BB44184E9A1AF62E
9291B32675211D1C1&dn=oceanbeauty.com&tr=udp://tracker.o
penbittorrent.com:80/announce&tr=udp://tracker.opentrac
kr.org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>oceanbeauty.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>AACANet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18635</link>
<guid>7d4cedaeae71bbcefc5cf5fd6fdecd45</guid>
<pubDate>Thu, 14 Nov 2024 22:43:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>AACANet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>03d6511160025692ec76ad1ee623b2952e0aa7dcd90b3e99c924c060d17a184d</i><br /><br />Threat actor <b>description</b>: <i>AACANet, Inc. The American Alliance of Creditor Attorne
ys, is your one-stop destination for comprehensive nati
onwide consumer debt collection.

You can find a lot of internal corporate information, a
ccounting data and some personal files.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives password: Admin#123!root

MAGNET URL: magnet:?xt=urn:btih:6DDF5BA41FC8BBCBC6B6579
F02BCA9DEC2A9FEBF&dn=aacanet.org&tr=udp://tracker.openb
ittorrent.com:80/announce&tr=udp://tracker.opentrackr.o
rg:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>aacanet.org</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Datron-WorldCommunications</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18633</link>
<guid>6a70a091e469207c3709ce5f014f9f8b</guid>
<pubDate>Thu, 14 Nov 2024 22:42:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Datron-WorldCommunications</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e62df5d597929cfd5a0ebc104a31e4db75a30d998f774f2dabbe26cdfe326f70</i><br /><br />Threat actor <b>description</b>: <i>Datron World Communications, Inc. is the price-performa
nce leader for tactical military communications equipme
nt recognized globally for performance, ease of operati
on, serviceability and low life-cycle cost.

We have many NDAs, employees contact information, custo
mers data, accounting, HR etc.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:70610127D63741E4E203033
801A26AFC9220EC44&dn=dtwc.com&tr=udp://tracker.openbitt
orrent.com:80/announce&tr=udp://tracker.opentrackr.org:
1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>dtwc.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Duplo-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18632</link>
<guid>be19b5f3f1fab3af9028503f50c864db</guid>
<pubDate>Thu, 14 Nov 2024 22:42:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Duplo-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec3a1400b81d63b00229ef34544b025f2813b8ed4449c09027496adba13154a2</i><br /><br />Threat actor <b>description</b>: <i>Duplo USA Corporation is the leading provider of innova
tive print finishing solutions for the graphic arts ind
ustry. 

We have many personal information about customers and p
artners, internal financial papers, personal data etc.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:00D882B1CFA5F404BC80A23
52A5F8F8E1002BC37&dn=duplousa.com&tr=udp://tracker.open
bittorrent.com:80/announce&tr=udp://tracker.opentrackr.
org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>duplousa.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Falvey-LinenSupply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18630</link>
<guid>ab2d3ab32b06ce52072a27ea0b60fc6f</guid>
<pubDate>Thu, 14 Nov 2024 22:41:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Falvey-LinenSupply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36989d4809a3f3445409535acd4820809052cc0bb186d1c8973533efa71d8ee8</i><br /><br />Threat actor <b>description</b>: <i>Falvey Linen is a company that specializes in providing
linen products. It offers napkins, towels, mops, wet m
ops, logo mats, and other products. It caters to hotels
, healthcare, and cleaning sectors.

You will find medical documents, internal financial dat
a and employees contact information.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:8BF1A470366E75828EB6C5F
459A77BF924925DFF&dn=falveylinen.com&tr=udp://tracker.o
penbittorrent.com:80/announce&tr=udp://tracker.opentrac
kr.org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>falveylinen.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Action-COACH</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18628</link>
<guid>d878ff69f51f20f15d0b5c18e09bcf10</guid>
<pubDate>Thu, 14 Nov 2024 22:41:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Action-COACH</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6197e4f202805ba0a14108e54e653dfc49276885410922f31cf0ba0e94ca386e</i><br /><br />Threat actor <b>description</b>: <i>ActionCOACH has empowered thousands of businesses and t
heir leaders across the globe, spanning every conceivab
le industry. They specialize in helping business owners
achieve greater efficiency, build high-performing team
s, and increase profitability.

There is a lot of personal documents with SSNs, health 
documents, info about their relatives, driver license s
cans, NDAs etc.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives password: fk2vmf6vm3l

MAGNET URL: magnet:?xt=urn:btih:2D9667D4DF05DAE7AA56F40
96D730840130FA101&dn=actioncoach.com&tr=udp://tracker.o
penbittorrent.com:80/announce&tr=udp://tracker.opentrac
kr.org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>actioncoach.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Yazoo-ValleyElectric-Power-Assosiation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18627</link>
<guid>cc0f7d2f185eccc8dbfa0d0a2671cdf5</guid>
<pubDate>Thu, 14 Nov 2024 22:40:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Yazoo-ValleyElectric-Power-Assosiation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e3f3d9d2cef18157577cc032e4de8823552ae6600c3393dddf86dd349b2982f6</i><br /><br />Threat actor <b>description</b>: <i>Yazoo Valley Electric is a rural electric power associa
tion serving parts of six counties in Mississippi.

There is a lot of personal information about their empl
oyees, including SSNs. Also you will find many internal
corporate documents and financial data.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:4911D84C4159005189E6994
231CBD08272A705C7&dn=yazoovalley.com&tr=udp://tracker.o
penbittorrent.com:80/announce&tr=udp://tracker.opentrac
kr.org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>yazoovalley.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Allegheny-Millwork--Lumber</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18626</link>
<guid>4572837cfa3489c4ef6c180ff21eb8ca</guid>
<pubDate>Thu, 14 Nov 2024 22:40:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Allegheny-Millwork--Lumber</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f39153c5831057f66c2cd4e9b0ae02d5b88c5e291c3c03e31c0bd186948a89a2</i><br /><br />Threat actor <b>description</b>: <i>For nearly 40 years, Allegheny Millwork has earned a na
tional reputation as a leader in the custom millwork in
dustry

You can find many NDAs, personal files, insurance and p
ayment information about their employees and other insi
de corporate data.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives password: alleghenymillwork.com

MAGNET URL: magnet:?xt=urn:btih:C9B2105AC960B76CB107A57
4BF956CA8FD35302D&dn=alleghenymillwork.com&tr=udp://tra
cker.openbittorrent.com:80/announce&tr=udp://tracker.op
entrackr.org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>alleghenymillwork.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Irr-Supply-Centers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18625</link>
<guid>b91572fbabbb3e1fbd668d869cd2ba2d</guid>
<pubDate>Thu, 14 Nov 2024 22:40:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Irr-Supply-Centers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>907014087303e4626e7893449d85a0c113506e0e0b8bc21744be2654d9e9e4b2</i><br /><br />Threat actor <b>description</b>: <i>Irr Supply Centers, Inc. is a leading distributor of Pl
umbing, Heating, Cooling, Electrical, and Refrigeration
products serving a wide range of customers throughout 
Western/Central New York and Northern Pennsylvania.

You can find many medical documents with blood test res
ults, internal corporate information and other info.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:8853F11C930FA86C963075C
F8D19715BE1FE968B&dn=irrsupply.com&tr=udp://tracker.ope
nbittorrent.com:80/announce&tr=udp://tracker.opentrackr
.org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>irrsupply.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>SKS-Bottle-Packaging</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18619</link>
<guid>68f5f3544600e4839d80e3e5be1b9b09</guid>
<pubDate>Thu, 14 Nov 2024 22:39:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>SKS-Bottle-Packaging</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dba3570f4baa80c6ca744b8683c153812671e7348b2b84e0a56737de87d4813d</i><br /><br />Threat actor <b>description</b>: <i>SKS Bottle and Packaging was founded in 1986 and suppli
es a wide variety of glass, plastic and metal container
s, as well as caps and closures, to small businesses an
d large companies. About 30 GB of their corporate data 
are available for downloading now. 

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:20031F6DC78BC527A85D352
9BB93018C29727FCE&dn=sks-bottle&tr=udp://tracker.openbi
ttorrent.com:80/announce&tr=udp://tracker.opentrackr.or
g:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>sks-bottle.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Compass-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18616</link>
<guid>48e4527085f884352825f9f7df2846db</guid>
<pubDate>Thu, 14 Nov 2024 22:39:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Compass-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d80eb94aedcb5f3811c7d37743d7be3f4941ce8a7ed87140314cf0f45c6b05ed</i><br /><br />Threat actor <b>description</b>: <i>Compass Group is a company based in Italia. Compass Gro
up offers a wide range of services for companies, schoo
ls, hospitals, social and health facilities, business p
remises, sports and leisure. Data of this Italian giant
is available for downloading now. There are so many fi
les in the 107Gb of data we've taken from them. Finance
, HR, legal, personal and so on. 

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:79C275DCE0ADF1EFC5CA353
DBEF9209401236B7F&dn=compass.rar&tr=udp://tracker.openb
ittorrent.com:80/announce&tr=udp://tracker.opentrackr.o
rg:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>REV-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18615</link>
<guid>7979302d766d1aec8f3697ef54906887</guid>
<pubDate>Thu, 14 Nov 2024 22:38:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>REV-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bfee347867e3d08cd230e025180819b1556c8a2141b61ae7ee628123d765c162</i><br /><br />Threat actor <b>description</b>: <i>Rev Engineering Ltd is an offers flexible, durable, rel
iable and responsible electrical designs, products and 
services. 237 GB of their corporate data are available 
for downloading now. Feel free to check!

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:CEC236A03A8ABA59B66402C
016CBC1462593D90D&dn=reveng&tr=udp://tracker.openbittor
rent.com:80/announce&tr=udp://tracker.opentrackr.org:13
37/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>reveng.ca</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bergeron-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18614</link>
<guid>79b8072704504943c4a4e5900945f2a9</guid>
<pubDate>Thu, 14 Nov 2024 22:38:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Bergeron-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8c01cb1f0c8578b5ee033785488f2f5efaea6511dcfce874d9e1075fe52f6eb2</i><br /><br />Threat actor <b>description</b>: <i>Bergeron is an automotive company. It sells new and use
d cars, van, truck, SUVs, sedan, coupe, and other vehic
les of CHRYSLER, JEEP, RAM brands. The company also off
ers repair and maintenance services. 325 GB of data is 
available for downloading now.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:3CF729AD5CF8EACAAEED6C6
2CA1971D0843CD53C&dn=bergeron&tr=udp://tracker.openbitt
orrent.com:80/announce&tr=udp://tracker.opentrackr.org:
1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>bergeronltd.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Morehead-State-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18613</link>
<guid>ae98e3391c4268302e0e8f97c3c005bb</guid>
<pubDate>Thu, 14 Nov 2024 22:38:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Morehead-State-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>68a562390d3a4b937dd148c7e0d5f6adfa9c75114030b7b109b4fa10a803f353</i><br /><br />Threat actor <b>description</b>: <i>Morehead State University is a comprehensive public uni
versity with undergraduate and graduate programs, emerg
ing doctoral programs, and an emphasis on regional enga
gement. This university underwent our attack and lost a
lot of data. President Jay Morgan said "no personal da
ta has been compromised" (https://www.wmky.org/news/202
3-07-13/morehead-state-university-hit-by-cyber-attack).
But that was only a matter of time. Since we haven't b
een contacted from their part, we will upload every fil
e of this university we have. Complete personal informa
tion of students and employees, finance and marketing d
ata is available for downloading now.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:41E86CBB8BEF53B19BF73FC
303F1EFF6F6401E2B&dn=morehead&tr=udp://tracker.openbitt
orrent.com:80/announce&tr=udp://tracker.opentrackr.org:
1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>VOSS-ENTERPRISES</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18610</link>
<guid>eb453b86e59bbc3c6c3ec9f352469319</guid>
<pubDate>Thu, 14 Nov 2024 22:37:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>VOSS-ENTERPRISES</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>453fe8a6020ca8fd964c31138b7e81a162db41bd0770783d11003ed7d0590ddf</i><br /><br />Threat actor <b>description</b>: <i>Voss Enterprises's annual revenues are $1-$10 million a
nd has 10-100 employees. It is classified as operating 
in the Legal Services industry. Feel free to check thei
r data!

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:71BB16714C4F5AE99B248B3
9A45AF291EBE3BB7E&dn=vossenterprises.com&tr=udp://track
er.openbittorrent.com:80/announce&tr=udp://tracker.open
trackr.org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ascend-Packaging-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18609</link>
<guid>bdc7a663219b46189e7858f8bfe8fe41</guid>
<pubDate>Thu, 14 Nov 2024 22:37:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Ascend-Packaging-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac18f5905de83ca8467f01024fa3ecf4adf911703c76c8a716347baa245fce00</i><br /><br />Threat actor <b>description</b>: <i>Over 50 years ago, Ascend Packaging Systems was founded
on the mission to deliver packaging solutions that did
more than just function or work well. They provide the
equipment and tools companies needed to protect the in
tegrity of their products and boost the performance of 
their operations at the same time. The company has seve
ral exclusive distribution arrangements with global equ
ipment manufacturers. Data is available for downloading
.

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:0BA3542A9FB3ACDA7AD7881
10197F8131AFF85EF&dn=Thomaspackaging.com&tr=udp://track
er.openbittorrent.com:80/announce&tr=udp://tracker.open
trackr.org:1337/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>ascendpkg.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pemberton-Fabricators-Inc-Sexual-Harassment-videos-inside</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18606</link>
<guid>947d58595850e1144d54658c873d4b0b</guid>
<pubDate>Thu, 14 Nov 2024 22:35:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Pemberton-Fabricators-Inc-Sexual-Harassment-videos-inside</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7ee87f5dc3ae26192e0106be0aca32e23ec30bfcf728440055f935e8b182bb3e</i><br /><br />Threat actor <b>description</b>: <i>Pemberton Fabricators, Inc. fabricates light and heavy 
steel equipment, products, and parts. The Company offer
s custom control panels such as nuclear energy manageme
nt, materials handling, furnace and combustion control,
data acquisition, food processing, factory automation,
air handling, and waste treatment. Pemberton Fabricato
rs serves customers in the State of New Jersey. The dat
a is available for downloading. 

We have made the process of downloading company data as
simple as possible for our users. All you need is any 
torrent client (like Vuze, Utorrent, qBittorrent or Tra
nsmission to use magnet links). You will find the torre
nt file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:EDF1E8955926FFD28661162
097332FC78A212EBF&dn=pemfab&tr=udp://tracker.openbittor
rent.com:80/announce&tr=udp://tracker.opentrackr.org:13
37/announce&tr=wss://wstracker.online
</i><br />Target victim <b>website</b>: <i>pemfab.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Optical-Cable-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18601</link>
<guid>0bf0b26798f42e0ca56680ec6f103daa</guid>
<pubDate>Thu, 14 Nov 2024 22:33:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Optical-Cable-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d757b1be2b589059f0123482f5a12d8d2a4c99bda46be9458cdff5292a7f59da</i><br /><br />Threat actor <b>description</b>: <i>Optical Cable Corporation ("OCC®") is a leading  manufa
cturer of the highest quality tight-buffer fiber optic 
cables and  data communication connectivity solutions. 
Data is available to download.

We have made the process of uploading company data as s
imple as possible for our users. All you need is any to
rrent client (like Vuze, Utorrent, qBittorrent or Trans
mission to use magnet links). You will find the torrent
file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:C24A0A93DF1AF21C1DA242D
1D7D65E9F087F496F&dn=occfiber.com&tr=udp://tracker.open
bittorrent.com:80/announce&tr=udp://tracker.opentrackr.
org:1337/announce&tr=wss://litetracker.world
</i><br />Target victim <b>website</b>: <i>occfiber.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ultimus</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18600</link>
<guid>62ac449a212156a4889a47243fc12af8</guid>
<pubDate>Thu, 14 Nov 2024 22:33:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Ultimus</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>145b026600fdc8804c5ae1848f26383b1f7d4f4843b1489ccf60f5bb953ef098</i><br /><br />Threat actor <b>description</b>: <i>Developer of business software intended to automate, op
timize and integrate processes primarily in the financi
al, energy, and medical sector. The company offers busi
ness management, compliance, process automation, constr
uction management, and enterprise resource planning thr
ough a suite of platforms, helping businesses eliminate
unnecessary operations and transit towards business au
tomation seamlessly. All data you can see here.

We have made the process of uploading company data as s
imple as possible for our users. All you need is any to
rrent client (like Vuze, Utorrent, qBittorrent or Trans
mission to use magnet links). You will find the torrent
file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:7A6D039A3FAB25B312FBD09
84160B439F8EE1631&dn=ultimus.com&tr=udp://tracker.openb
ittorrent.com:80/announce&tr=udp://tracker.opentrackr.o
rg:1337/announce
</i><br />Target victim <b>website</b>: <i>ultimus.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dons-MobileGlass</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18598</link>
<guid>0e22f1562284b9c081be3a87527d6c70</guid>
<pubDate>Thu, 14 Nov 2024 22:32:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Dons-MobileGlass</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed9a999e7653ab2408bb69b85cff4656f71a0966af310c41cf95d7773cd02d0e</i><br /><br />Threat actor <b>description</b>: <i>Don's Mobile Glass is full service glass shop that spec
ializes in all things glass. You can see their accounti
ng, hr, drawings and other documents.

We have made the process of uploading company data as s
imple as possible for our users. All you need is any to
rrent client (like Vuze, Utorrent, qBittorrent or Trans
mission to use magnet links). You will find the torrent
file above.

1. Open uTorrent, or any another torrent client.
2. Add torrent file or paste the magnet URL to upload t
he data safely.
3. Archives have no password.

MAGNET URL: magnet:?xt=urn:btih:D0D83320FB63555E0A962AD
D6E6778DEEB6C0B9C&dn=donsmobileglass.com&tr=udp://track
er.openbittorrent.com:80/announce&tr=udp://tracker.open
trackr.org:1337/announce 
</i><br />Target victim <b>website</b>: <i>donsmobileglass.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mark-Thomas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18594</link>
<guid>671df07e9737de590613ae321ea1b687</guid>
<pubDate>Thu, 14 Nov 2024 22:15:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Mark-Thomas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>369ae428a7a4081d020922805d81880e6d0acaf10534056e8cf5b5cd0a1451d4</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1927, Mark Thomas & Company have provided land surveying, engineering...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>OMara-Ag-Equipment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18586</link>
<guid>ae881d2b0c249be429f54d61825d5f3f</guid>
<pubDate>Thu, 14 Nov 2024 20:15:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>OMara-Ag-Equipment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>83969510d14695f9ff87421fb17cd9c8416dde8ea0a69f085bdea063259d93a6</i><br /><br />Threat actor <b>description</b>: <i><p>Dear customers!</p><p>We are excited to offer exclusive access to over 93 GB of confidential data from OMara Ag Equipment, a leading company specializing in the design, manufacturing, and installation of equipment for the seed and grain industries. With a wide product range, including bulk seed corn dryers, custom bins and hoppers, bucket elevators, conveyors, and various seed drying systems, OMara Ag Equipment delivers value engineered solutions tailored to meet the specific needs of its clients.</p><p>Key Services and Offerings:<br>Plant Design: Expertly crafted layouts for efficient operations.<br>Custom Fabrication: Tailored equipment solutions to match unique requirements.<br>General Contracting: Comprehensive support from project initiation to completion.<br>Product Range: Includes advanced drying systems, conveyors, and storage solutions.</p><p>With over 150 years of combined team experience, OMara is committed to enhancing productivity and efficiency in seed production operations through high quality products and services.</p><p>This comprehensive data pack includes:<br>Employee Data: Personal details, passport and drivers license scans.<br>Client Information: Contact details, contracts, and service agreements.<br>Contracts and Agreements: Insurance policies, business contracts, and technical service agreements.<br>Financial Documents: Bank account statements, insurance and software service invoices, payment receipts, liability insurance certificates, tax forms, and notifications.<br>Licenses and Instructions: Licensing documentation and operational guides.<br>Personal Data: Dates of birth, identification scans.<br>Medical Records: Insurance details and related documentation.<br>And much more.</p><p>This data pack provides valuable insights into OMara Ag Equipments operations, making it particularly relevant for professionals in agricultural technology, manufacturing, business analysis, and related sectors.</p><p>To access this exclusive 93 GB data pack, click the Buy button and provide your contact details for registration. Our team will ensure a secure and confidential transaction.</p><p>Dont miss the opportunity to explore detailed information from OMara Ag Equipment with this exclusive data pack!</p></i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zyloware</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18587</link>
<guid>15341840eedadf2f53ad8571ac6078a2</guid>
<pubDate>Thu, 14 Nov 2024 20:15:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Zyloware</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d937c061b512890d94f542548e036a0ef9ffae4243696e1f4dfb01b33daeee82</i><br /><br />Threat actor <b>description</b>: <i><p>Dear customers!</p><p>We are excited to offer exclusive access to over 118 GB of confidential data from Zyloware, a family owned eyewear company with a rich history of innovation in the eyewear industry since 1923. Known for introducing groundbreaking designs like the first nylon frame Invincible, 1963 and the first American designer eyewear brand license with Gloria Vanderbilt in 1976, Zyloware continues to lead with a diverse portfolio of brands, including Stetson, Sophia Loren, and Shaquille ONeal Eyewear.</p><p>Key Offerings:<br>Innovative Eyewear: Frames and styles tailored to various customer preferences.<br>Supportive Resources: Social media guides, merchandising materials, training guides, and inclusive sizing tools.<br>Commitment to Quality and Fit: A focus on helping customers find the perfect frame to match their needs.<br>Zylowares legacy of blending heritage craftsmanship with modern innovation has solidified its position as a trusted name in the global eyewear market.</p><p>This comprehensive data pack includes:<br>Employee Data: Personal details, passport and drivers license scans.<br>Client Information: Contact details, contracts, and agreements.<br>Contracts and Agreements: Insurance policies, business contracts, and licensing agreements.<br>Financial Documents: Invoices, bank account details, credit reports, royalty and sales reports, tax declarations, and account statements.<br>Licenses and Summaries: Business licenses and tax summaries.<br>Personal Data: Dates of birth, identification documents.<br>Medical Information: Health insurance details, medical service records.<br>And much more.</p><p>This data pack offers deep insights into Zylowares operations, making it invaluable for professionals in eyewear manufacturing, retail, business analysis, and related sectors.</p><p>To access this exclusive 118 GB data pack, click the Buy button and provide your contact details for registration. Our team will guide you through a secure and confidential transaction.</p><p>Dont miss the opportunity to explore detailed information from Zyloware with this exclusive data pack!</p><p>&nbsp;</p></i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pine-Belt-Cars</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18588</link>
<guid>a6eea5aa95cc31102ab50d87b12ccde0</guid>
<pubDate>Thu, 14 Nov 2024 19:16:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Pine-Belt-Cars</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9107874c567573c62fc41f57216f3994925219d65ef33723fd8c600356a5708</i><br /><br />Threat actor <b>description</b>: <i><p>Dear customers!</p><p>We are excited to offer exclusive access to over 8 GB of confidential data from Pine Belt Cars, a family owned and operated automotive dealership group based in Lakewood, New Jersey, with a rich history dating back to 1937. Offering a wide selection of new and pre owned vehicles from brands like Chevrolet, Chrysler, Dodge, Jeep, Ram, Mazda, and Subaru, Pine Belt Cars is a trusted name in the automotive industry.</p><p>In addition to vehicle sales, Pine Belt Cars provides a complete suite of automotive services, including financing options, maintenance, and parts, all delivered with a dedication to customer satisfaction. Known for their personalized service and flexible financing solutions, the dealership group caters to a diverse clientele while maintaining strong ties to the community through regular support for local organizations and events.</p><p>This comprehensive data pack includes:</p><p>Employee data personal identification, drivers licenses, passports.<br>Client information contact details, purchase records.<br>Contracts and commercial agreements.<br>Technical documentation vehicle specifications, maintenance records.<br>Financial documents invoices, payroll, credit and tax records.<br>Legal documents company status, certificates, insurance policies.<br>Medical records vaccination details, health insurance policies, chronic condition histories, allergy information, family medical history.<br>And much more.</p><p>This data pack provides in depth insights into Pine Belt Cars operations, making it of interest to professionals in automotive retail, finance, business analysis, and other related sectors.</p><p>To access this exclusive 8 GB data pack, click the Buy button and provide your contact details for registration. Our team will guide you through a secure and confidential transaction.</p><p>Dont miss the opportunity to explore key information from Pine Belt Cars with this exclusive data pack!</p><p>&nbsp;</p></i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>DieTech-North-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18589</link>
<guid>160288422abcfcdf9437b3f0157f5a4f</guid>
<pubDate>Thu, 14 Nov 2024 19:16:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>DieTech-North-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>667c47f759370a9ca77eda6e17afb5ee7857e3e715830f7422a69591c95cc4eb</i><br /><br />Threat actor <b>description</b>: <i><p>Dear customers!<br>We are excited to offer exclusive access to over 85 GB of confidential data from DieTech North America, a leading provider of medium to large Class A metal stamping dies for the automotive industry. Founded in 1976 and headquartered in Roseville, Michigan, DieTech specializes in designing, constructing, and servicing dies used to manufacture automotive components like hoods, doors, and fenders. Following its acquisition by Cwks Holdings in May 2024, the company continues to play a significant role in the automotive manufacturing sector.</p><p>Key Services Provided by DieTech North America,<br>Die Design and Build, Creating advanced metal stamping dies for automotive components.<br>Die Tryout and Repair, Ensuring precise performance and extending tool lifespan.<br>Production Stamping, Supporting component manufacturing for automotive projects.<br>Engineering Changes, Adapting dies to evolving project specifications.<br>Contract Machining and Metal Finishing, Delivering high quality finishing solutions.<br>With its comprehensive expertise and innovative approach, DieTech North America supports the global automotive industry with reliable and efficient die solutions.</p><p>This comprehensive data pack includes,<br>Commercial Data, Pricing details, proposals, specifications, and contract terms.<br>Certificates and Standards, Documentation on quality assurance and compliance.<br>Operational and Internal Processes, Insights into workflows and procedures.<br>Project Files, CAD designs, CMM documentation, and technical details for die fabrication and inspection.<br>Technical Documentation, Files in .xlsx, .docx, and .pptx formats, including reports, checklists, and detailed specifications.<br>Tooling Files, Data for manufacturing equipment and scanning tools.<br>IT Group Files, Technical equipment management, software licenses, IP plans, and software update documentation.<br>This data pack offers unique insights into DieTech North Americas operations, making it invaluable to professionals in automotive manufacturing, engineering, and business analysis.</p><p>To gain access to this exclusive 85 GB data pack, click the Buy button and provide your contact details for registration. Our team will assist you in ensuring a secure and confidential transaction.</p><p>Dont miss the opportunity to access in depth information from DieTech North America with this exclusive data pack!</p><p>&nbsp;</p></i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cottles-Asphalt-Maintenance-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18590</link>
<guid>39b7696525c15ab11f34386e3ae943ae</guid>
<pubDate>Thu, 14 Nov 2024 19:16:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Cottles-Asphalt-Maintenance-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>35914cd7eea3747c0935ff7d6c54ba9da424d38b9f99b084da79d725b732f082</i><br /><br />Threat actor <b>description</b>: <i><p>Dear customers!</p><p>We are pleased to offer exclusive access to over 40 GB of confidential data from Cottles Asphalt Maintenance Inc., a family owned company with over 40 years of expertise in paving and infrastructure services. Based in Everett, Pennsylvania, Cottles serves clients across Pennsylvania, Maryland, Virginia, and supports larger projects nationwide. The company specializes in asphalt and concrete paving for residential, commercial, and municipal projects, delivering durable solutions for driveways, parking lots, and roadways.</p><p>Key Services Offered:<br>Asphalt and Concrete Paving: High quality paving for various infrastructure needs.<br>Drilling and Shoring: Including conventional and down the hole hammer drilling, and earth shoring systems like HPile, sheeting, and trench boxes.<br>Site Development: Services include excavation, stormwater management, and utility installation.<br>Bridge Construction and Rehabilitation: Expertise in projects ranging from residential bridges to interstate highway structures.<br>Design Build Services: Comprehensive project design, build, and permitting support to ensure regulatory compliance.</p><p>Cottles Asphalt Maintenance is committed to delivering high quality work with integrity and fairness, supported by a dedicated team ensuring efficiency and excellence in every project.</p><p>This comprehensive data pack includes:<br>Employee Data: Personal details, passport and drivers license scans.<br>Client Information: Contact details, service agreements.<br>Contracts and Commercial Agreements: Insurance policies and project contracts.<br>Financial Documents: Invoices, bank account details, credit reports.<br>Personal Data: Dates of birth, identification documents.<br>Medical Information: Health insurance details and related records.<br>And much more.</p><p>This data pack provides a unique look into Cottles Asphalt Maintenance Inc.s operations, making it invaluable for professionals in construction, infrastructure, business analysis, and related sectors.</p><p>To access this exclusive 40 GB data pack, click the Buy button and provide your contact details for registration. Our team will guide you through a secure and confidential transaction.</p><p>Dont miss the opportunity to explore detailed insights into Cottles Asphalt Maintenance Inc. with this exclusive data pack!</p><p>&nbsp;</p></i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Karl-Malone-Toyota</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18593</link>
<guid>4f9604e8959af0faa3ba6316b5cd1b23</guid>
<pubDate>Thu, 14 Nov 2024 19:15:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Karl-Malone-Toyota</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>288e5382c728de7a813324cbbd0f3543e1c1ef52b30a85f8a1281616196536d3</i><br /><br />Threat actor <b>description</b>: <i><p>Dear customers!</p><p>We are excited to offer exclusive access to over 120 GB of confidential data from Karl Malone Toyota, a trusted Toyota dealership located in Draper, Utah. Known for its extensive inventory of new and preowned Toyota vehicles, including popular models like the Camry, Corolla, RAV4, and Tacoma, Karl Malone Toyota is committed to meeting a wide range of customer preferences and automotive needs.</p><p>Key Services Offered:<br>Vehicle Sales: A broad selection of new and used Toyota vehicles tailored to customer requirements.<br>Service Center: Maintenance and repair services by trained technicians using genuine Toyota parts for optimal performance and reliability.<br>Flexible Financing: Assistance with purchasing or leasing vehicles through tailored financing options to ensure a seamless buying experience.<br>Customer Satisfaction: A commitment to creating a positive and convenient experience for all visitors.</p><p>Karl Malone Toyota is dedicated to supporting its customers at every stage of vehicle ownership, providing quality, convenience, and exceptional service.</p><p>This comprehensive data pack includes:<br>Employee data: Personal details, passports, drivers licenses.<br>Client information: Contact details, purchase records.<br>Contracts and agreements: Insurance policies, business contracts, and service agreements.<br>Financial documents: Invoices, bank statements, transaction reports, tax forms.<br>Business operation documents: Contracts, business profiles, government notifications, registration documents.<br>Personal data: Dates of birth, identification documents.<br>Medical records: Prescriptions, medical cards, health insurance documentation.<br>Insurance records: Insurance coverage documentation, policies.<br>And much more.</p><p>This data pack provides valuable insights into Karl Malone Toyotas operations, making it particularly relevant for professionals in automotive retail, finance, business analysis, and related fields.</p><p>To access this exclusive 120 GB data pack, click the Buy button and provide your contact details for registration. Our team will guide you through a secure and confidential transaction.</p><p>Dont miss the opportunity to explore detailed information from Karl Malone Toyota with this exclusive data pack!</p><p>&nbsp;</p></i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>DynamicSystems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18584</link>
<guid>8a9b0ba84645ef18e1848b5407a90dd2</guid>
<pubDate>Thu, 14 Nov 2024 07:38:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>DynamicSystems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>40c52ae52917358b6a852abde207695325a59e0a1dacbf4abd30093d28f71daa</i><br /><br />Threat actor <b>description</b>: <i>Dynamic Systems (founded in 1991) - provides technology solutions that make data management simple. Dynamic Systems corporate office is located in 880 N Park View Dr, El Segundo, California, 90245, United States and has 350 employees. </i><br />Target victim <b>website</b>: <i>dynamicsystemsinc.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dumont-Printing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18579</link>
<guid>3ec0e2c7f4536e7ce9e9ce183b1de9e8</guid>
<pubDate>Wed, 13 Nov 2024 23:10:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Dumont-Printing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>982b877e973a20bdc43f75941a3842a28bfb030c6cdfc58defdaf08a9aa19c95</i><br /><br />Threat actor <b>description</b>: <i>Dumont Printing has been an industry leader for over seventy years manufacturing quality printed collateral. Dumont provides graphic design, printing, variable data, finishing and mailing services.Employee and customer contacts, SSNs and driver licenses will be uploaded soon.</i><br />Target victim <b>website</b>: <i>dumontprinting.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Berexco-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18580</link>
<guid>c59115e88a6dbe2f1835af2d199ea43e</guid>
<pubDate>Wed, 13 Nov 2024 23:10:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Berexco-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eddbed294a59a9b4ad39777cbf13d43c074d3c659d1e453a1477dba701b7af4f</i><br /><br />Threat actor <b>description</b>: <i>Berexco is an independent oil and gas exploration and production company headquartered in Wichita, Kansas.Employees contacts, credit cards with CCV, internal financial documentation, contacts of service providers will be uploaded soon.</i><br />Target victim <b>website</b>: <i>berexco.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Intercomp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18581</link>
<guid>75b4f712b9a4860516a726646282d56a</guid>
<pubDate>Wed, 13 Nov 2024 23:10:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Intercomp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8c22523a836826c3b7b348fc9665b47a877ca474a07281d897d1d599464836c9</i><br /><br />Threat actor <b>description</b>: <i>Intercomp are the world’s largest manufacturer of portable weighing and measurement products, producing the highest quality products at competitive prices.Inside corporate correspondence, customers and employees contacts, internal corporate data will be available for downloading soon.</i><br />Target victim <b>website</b>: <i>intercompcompany.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>midstatesindustrial.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18569</link>
<guid>35dcd930df68a3b6194ad8764644721d</guid>
<pubDate>Wed, 13 Nov 2024 13:01:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>midstatesindustrial.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a05b571c3c5ba4a1f63a497e5a9e9a243363539ee1c38dd669f4c02fe2019f7b</i><br /><br />Threat actor <b>description</b>: <i>Mid-States Industrial, Incorporated was founded in 1992 with the objective of providing quality tank repair paired with specialized in-house engineering services.  For over 30 years, Mid-States has provided industrial maintenance, repair, and new...</i><br />Target victim <b>website</b>: <i>midstatesindustrial.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>sunnydayssunshinecenter.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18565</link>
<guid>58d07ec4a553036d571ae5d22ca4f5ac</guid>
<pubDate>Wed, 13 Nov 2024 09:18:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>sunnydayssunshinecenter.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5ef1e9d052e0de917fd4570ceb8fbccff55bb9f211ec758229d70228ac5406d5</i><br /><br />Threat actor <b>description</b>: <i>usa - Sunshine Center</i><br />Target victim <b>website</b>: <i>sunnydayssunshinecenter.com</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>clayplattefamily.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18567</link>
<guid>2f01807ad5d67de3e46e244252dd55e5</guid>
<pubDate>Wed, 13 Nov 2024 09:12:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>clayplattefamily.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab54c615977fdb0e9e575bea82f093c7750cbb70904b7b62d63428b3bd693676</i><br /><br />Threat actor <b>description</b>: <i>USA - Clay Platte Family Medicine Clinic</i><br />Target victim <b>website</b>: <i>clayplattefamily.com</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>askyouraccountant.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18568</link>
<guid>2b9417a4338deb0d31ef9b39d444413a</guid>
<pubDate>Wed, 13 Nov 2024 09:09:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>askyouraccountant.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee7fe83a2dba74bfd87cec210e67a58c8296bb5c6bae80cf80bcac6144db48ce</i><br /><br />Threat actor <b>description</b>: <i>usa - Accounting & Advisory Services,</i><br />Target victim <b>website</b>: <i>askyouraccountant.com</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>pmrcenter.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18570</link>
<guid>8eb3926a025bb86899f452f3dd675f04</guid>
<pubDate>Wed, 13 Nov 2024 09:06:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>pmrcenter.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a80ae2696ca85760e5052ac7da23d0a434315f18859ab67e27008d5bc9540186</i><br /><br />Threat actor <b>description</b>: <i>usa - The Physical Medicine and Rehabilitation Center</i><br />Target victim <b>website</b>: <i>pmrcenter.com</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>kansasrmc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18564</link>
<guid>87245f4b1d0d12cf1aaa77bc289037d4</guid>
<pubDate>Wed, 13 Nov 2024 07:19:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>kansasrmc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1000e08e54de8e9b36429d46d5593ebc341f820fd4ccae51090dc7a1631c5cfb</i><br /><br />Threat actor <b>description</b>: <i>usa - Kansas Regenerative medicine centre</i><br />Target victim <b>website</b>: <i>kansasrmc.com</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Artistic-Family-Dental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18558</link>
<guid>530ac99d68d3b582bb8e2b99519c73be</guid>
<pubDate>Wed, 13 Nov 2024 03:17:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Artistic-Family-Dental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>668a19a556ce5da08617c89d7b6156774cc2c9e102964f51ecc65bc07d222654</i><br /><br />Threat actor <b>description</b>: <i>Medical and personal data of 5000 patients https://artisticfamilydental.comhttps://sparklingsmilesdentist.com Company representative should follow the instructions to contact us before time runs out</i><br />Target victim <b>website</b>: <i>sparklingsmilesdentist.com</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Value-Dental-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18563</link>
<guid>1dc7f3464a4839e6009992502eabb7a1</guid>
<pubDate>Wed, 13 Nov 2024 02:17:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Value-Dental-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c23b058f9f83de034dff611d7903a431aa439d28ed932bdf6ba4c64cafeec889</i><br /><br />Threat actor <b>description</b>: <i>Medical and personal data of 5000 patients https://valuedentalcentercicero.com Company representative should follow the instructions to contact us before time runs out</i><br />Target victim <b>website</b>: <i>valuedentalcentercicero.com</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Asaro-Dental-Aesthetics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18562</link>
<guid>9d5a76df25154ff39e7052fa9c3234a6</guid>
<pubDate>Wed, 13 Nov 2024 02:15:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Asaro-Dental-Aesthetics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8f2fe7f5c95ca1fba3d3f440db9776a38ddb7941f1aa1768c6b5fcd142ca325f</i><br /><br />Threat actor <b>description</b>: <i>Medical and personal data of 3800 patients https://asarodentalaesthetics.com Company representative should follow the instructions to contact us before time runs out</i><br />Target victim <b>website</b>: <i>asarodentalaesthetics.com</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Associated-Pharmacies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18560</link>
<guid>906f101975a14177b22cb707a76c211d</guid>
<pubDate>Wed, 13 Nov 2024 00:34:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>American-Associated-Pharmacies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a66317b38ff5f0c4e726a60b4322844d41a77f218bea9182a59c648893f9362c</i><br /><br />Threat actor <b>description</b>: <i>American Associated Pharmacies (AAP) is a member-owned cooperative of over 2,000 independent pharmacies working together as a cohesive network. AAP in partnership with its subsidiaries, Associated Pharmacies, Inc. (API), Arete Pharmacy Network, and AllyScripts, provides the tools and resources needed for members to improve their bottom line and differentiate themselves from competitors. AAP members not only receive savings on brand prescriptions, generic prescriptions and OTC products through the API warehouse and their negotiated prime vendor agreement, but they also receive negotiated competitive managed-care contracts through the Arete Pharmacy Network. In addition to offering solutions such as API and Arete Pharmacy Network, AAP provides members access to a full-service specialty pharmacy, AllyScripts, that allows pharmacies to retain their patients and compete in the growing specialty segment without the costly investment. AAP is able to provide its members with the support and customized solutions they need to succeed in the marketplace. - It seems AAP does not care about their data. AAP has paid 1.3 million for decrypt and owe another 1.3 million for 1.469 TB of their data.  </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>Orange-County-Pathology-Medical-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18557</link>
<guid>4cca04f7f8c7da96be416403f6ccd791</guid>
<pubDate>Tue, 12 Nov 2024 20:16:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>raworld</b> claims attack for <b>Orange-County-Pathology-Medical-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf004edddd177c2d51b2917b2549b3ca6127fdadda16d8355975370bf76f6123</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Orange County Pathology Medical Group is a healthcare organization specializing in pathology services. Located in Orange County, California, the group provides diagnostic services and laboratory testing to support patient care. Their team of skilled pathologists works closely with healthcare providers to deliver accurate and timely results, contributing to effective patient diagnosis and treatment.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>raworld</category>
</item>
<item xmlns:dc='ns:1'>
<title>steppingstonesd.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18554</link>
<guid>b8b73364ac6cd496668497fd5d6c3c81</guid>
<pubDate>Tue, 12 Nov 2024 16:54:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>steppingstonesd.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>16ea3f6156e0a4d977ae38ba62b73ba1989f23ff5b005a8a37be773f3938cb9d</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Stepping Stones is a non-profit organization focused on providing educational and therapeutic services to individuals with developmental disabilities. It offers a range of programs aimed at enhancing the quality of life and fostering independence for children and adults. The organization emphasizes personalized care, community integration, and skill development to support its members and their families.</i><br />Target victim <b>website</b>: <i>steppingstonesd.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hillandale-Farms</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18553</link>
<guid>2d5b3be8503916af8d41e5add640b0b6</guid>
<pubDate>Tue, 12 Nov 2024 15:40:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Hillandale-Farms</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b146296931440f1e0966c4bc306b0c1e8dbae0b9328adcf41e8f6234368cc504</i><br /><br />Threat actor <b>description</b>: <i>Today, Hillandale Farms raises over 20 million chickens for eggs 
and is one of the top 5 egg producers in the country.

A lot of inside corporate information with customers contacts, in
surance information, personal employees data with credit cards de
tails and many others data will be uploaded soon.
</i><br />Target victim <b>website</b>: <i>hillandalefarms.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>jarrellimc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18551</link>
<guid>4894691a4bdf24b86f75d61c81842d4c</guid>
<pubDate>Tue, 12 Nov 2024 13:17:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>jarrellimc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ff77650efc3f7381d3cd617b7af94abbc5a488452520b6ee05212049cd363a7</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Jarrell Industrial Management Corp. (jarrellimc.com) specializes in industrial management and construction services. They offer solutions in project management, maintenance, and facility operations, focusing on sectors like manufacturing and infrastructure. The company emphasizes efficiency, safety, and quality in delivering tailored services to meet the specific needs of their clients.</i><br />Target victim <b>website</b>: <i>jarrellinc.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>TaxPros-of-Clermont</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18548</link>
<guid>a85dfcdc20a09f0a5d1799d902d1ce94</guid>
<pubDate>Tue, 12 Nov 2024 01:35:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>TaxPros-of-Clermont</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4f8074f58bc70402cdaa233d840f15e23ef775df9b2be4d12ab63cb5d9a2751</i><br /><br />Threat actor <b>description</b>: <i>For over 25 years, Tax Preparation/Consulting firm owned by CPA's and Attorney's...</i><br />Target victim <b>website</b>: <i>taxprosofclermont.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Supply-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18546</link>
<guid>17e9c3d5329fb4daa6c571a6108077b5</guid>
<pubDate>Mon, 11 Nov 2024 18:43:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Supply-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8a8f779c83e21243c2f0bbe5934985b596d94e813be93da05e97d1b2ae84ad8</i><br /><br />Threat actor <b>description</b>: <i>Supply Technologies, a subsidiary of ParkOhio(NASDAQ:PKOH), specializes in supplier selection and management, planning, implementing, managing the physical flow of product for world-class international manufacturing companies, and servicing customers in the various markets.</i><br />Target victim <b>website</b>: <i>www.supplytechnologies.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Amourgis--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18534</link>
<guid>c93fd94c6c44b2674f4e5c16e5a223eb</guid>
<pubDate>Mon, 11 Nov 2024 13:01:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Amourgis--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d37f70292cfe1db8edea7282fcfb8615c4236bbc31099588a871d990f9f527c5</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>www.amourgis.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dietzgen-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18537</link>
<guid>13d3be50c8094e8c1ddef177d73fd1fe</guid>
<pubDate>Mon, 11 Nov 2024 12:39:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Dietzgen-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>92705783cf9be0bb623cc82ba6f99964cd9d55f29edc883ae302ca4077e86cdb</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>www.dietzgen.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>nynewspapers.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18535</link>
<guid>879bc75de8d1dba8957dd08033933509</guid>
<pubDate>Mon, 11 Nov 2024 10:54:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>nynewspapers.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6db35a5e05f989bb5a25df9235162c46040255addeb780bdfb1e7b786a6d5443</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] "nynewspapers.com" is a digital platform that serves as a comprehensive directory and resource for newspapers in New York. It provides information on various publications across the state, catering to both local and regional audiences. The site is designed to help users find newspapers by location or type, offering details such as contact information and publication frequency, thereby supporting both readers and advertisers.</i><br />Target victim <b>website</b>: <i>nynewspapers.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>comarchs.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18536</link>
<guid>ff2d0926d6b07ff0179183a9d687989e</guid>
<pubDate>Mon, 11 Nov 2024 10:50:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>comarchs.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9e64152558408014d1bc49daa16c509362bc54f349a57cc2029f7527d4d33a5</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Comarch is a global IT company that specializes in designing, implementing, and integrating advanced IT solutions for various industries. Founded in 1993 and headquartered in Kraków, Poland, Comarch offers services in telecommunications, finance, banking, healthcare, and more. The company is known for its focus on innovative software and technology solutions aimed at improving business efficiency and customer engagement.</i><br />Target victim <b>website</b>: <i>comarchs.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>tolbertlegal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18533</link>
<guid>b7b12758057611429c53e417bf920882</guid>
<pubDate>Mon, 11 Nov 2024 10:47:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>tolbertlegal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47b160f6e56854b77985869e4d06ed21b62bedf5685a9ff431602115752235bd</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Tolbert Legal is a law firm that specializes in providing legal services in areas such as personal injury, family law, and criminal defense. Their team is dedicated to delivering personalized and effective legal solutions to meet the needs of their clients. With a focus on client satisfaction, they strive to offer professional guidance and representation to achieve favorable outcomes.</i><br />Target victim <b>website</b>: <i>tolbertlegal.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Immuno-Laboratories-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18486</link>
<guid>cdc1ce4ccb8971d465671618daf191b9</guid>
<pubDate>Sun, 10 Nov 2024 00:09:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Immuno-Laboratories-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea2723cd7d67fc0667f5867d4bb3bd924f0f46f380d68a0c73a0fb325b9044b2</i><br /><br />Threat actor <b>description</b>: <i>Immuno is a federally licensed medical laboratory. Immuno provides products and services to physicians with a focus on helping physicians by providing real relief for their patients with chronic unsolved conditions.</i><br />Target victim <b>website</b>: <i>immunolabs.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>ATSG-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18485</link>
<guid>f0cf02f00e9e36bff626386a006be59a</guid>
<pubDate>Sat, 09 Nov 2024 19:42:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>ATSG-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b937191e1138e6388646c8d30ba387bd805df9981481e844c7cc06307ddf8e9f</i><br /><br />Threat actor <b>description</b>: <i>ATSG, Inc. was founded in 1994 as an IT solution provider with an initial focus in the enterprise networking arena.</i><br />Target victim <b>website</b>: <i>atsg.net</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mizuno-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18484</link>
<guid>4147bb2fdd45a6a4e0876f7d5f12f0c2</guid>
<pubDate>Sat, 09 Nov 2024 19:41:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Mizuno-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1d05d2805c65bd58ce27eb645e962b6a84708a1ff4541d9f68fd3e05204737c</i><br /><br />Threat actor <b>description</b>: <i>Mizuno Corporation is a Japanese sports equipment and sportswear company, founded in Osaka in 1906 by Rihachi Mizuno.</i><br />Target victim <b>website</b>: <i>mizunousa.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Palmisano--Goodman-P.A.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18483</link>
<guid>41b182cde0c7b7efe3545795c447bbc5</guid>
<pubDate>Sat, 09 Nov 2024 19:40:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Palmisano--Goodman-P.A.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96894a07e4e6b84d075c9905cb0bb387e452eed2035657773daef58eaadfe4ae</i><br /><br />Threat actor <b>description</b>: <i>Palmisano & Goodman offers free consultations in personal injury and wrongful death cases as well as criminal and municipal court matters.</i><br />Target victim <b>website</b>: <i>palmisanoandgoodman.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Karman-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18479</link>
<guid>a6346d950811d61ce0c94a3db285df5a</guid>
<pubDate>Sat, 09 Nov 2024 13:35:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Karman-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d7be5e85d293e443a1ec506c479e27f2c6b75f0dcb4b3001e7afddbca8548e77</i><br /><br />Threat actor <b>description</b>: <i><p>Dear customers!<br>We are pleased to offer exclusive access to over 148 GB of confidential data from Karman Inc., a company renowned for designing, manufacturing, and distributing high quality Western apparel and footwear under iconic brands such as Roper Apparel Footwear, Stetson Apparel Boots, and Tin Haul. With a product range covering tops, bottoms, outerwear, shoes, and boots for men, women, and children, Karman Inc. has established itself as a leader in the Western apparel industry. The company is headquartered at 14100 E. 35th Place, Suite 100, Aurora, CO 80011.<br>This comprehensive data pack includes:<br>Employee data personal identification documents, passports, drivers licenses, property insurance, fiduciary responsibility policies<br>Client information contact details, purchase records<br>Contracts and commercial agreements business contracts, service agreements<br>Financial and accounting documents invoices, bank and financial statements, payment slips<br>Licenses and permits manufacturing, import export licenses<br>Tax documentation corporate tax returns, tax forms<br>Shareholder and management documents share information, asset management records<br>Confidential business correspondence<br>Medical records health screenings, medical service documents<br>And much more<br>These records provide invaluable insights into Karman Inc.s operations, making this data pack especially relevant for professionals in apparel, business analysis, finance, and other fields.<br>To gain access to this exclusive 148 GB data pack, simply click the Buy button and provide your contact details for registration. Our team will guide you through a secure and confidential transaction.<br>Dont miss this opportunity to access in depth information from Karman Inc. with this exclusive data pack!</p></i><br />Target victim <b>website</b>: <i>karmaninc.com</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Granite-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18478</link>
<guid>c5d0151996a2237cbfa36230613c683f</guid>
<pubDate>Sat, 09 Nov 2024 10:46:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Granite-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd539bd928b0ee7e24095753309e87613dbcbefcee7badb4874963a13b4baafc</i><br /><br />Threat actor <b>description</b>: <i>Granite School District The Granite School District is a public school district spread across central Salt Lake County, Utah, serving West Valley City, Millcreek, Taylorsville, South Salt Lake, and Holladay; Kearns and Magna Townships; and parts of West Jordan, Murray and Cottonwood Heights.</i><br />Target victim <b>website</b>: <i>graniteschools.org</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>WimCoCorp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18475</link>
<guid>0643aba5bbf86ece22ee145f322a9c6a</guid>
<pubDate>Sat, 09 Nov 2024 10:36:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>WimCoCorp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7537b018a63d0b4f90b412a027a216b6786347af1f305060caeb43d8d070df5b</i><br /><br />Threat actor <b>description</b>: <i>The Rawls family of Washington, North Carolina has owned and operated WIMCO (ori...</i><br />Target victim <b>website</b>: <i>wimcocorp.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>NEBRASKALAND</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18476</link>
<guid>4191992c18a06a78886b230886197d9b</guid>
<pubDate>Sat, 09 Nov 2024 09:38:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>NEBRASKALAND</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc875f16cb15aea184869186491197669db64591287ab8cc890853d219d4e966</i><br /><br />Threat actor <b>description</b>: <i>Nebraskaland, Inc. distributes and sells seafood and meat products to customers ...</i><br />Target victim <b>website</b>: <i>nebraskaland.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>bartleycorp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18473</link>
<guid>b88524c1561b782a1a78bd24d1712ffb</guid>
<pubDate>Fri, 08 Nov 2024 22:49:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>bartleycorp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e82c665375388cf5ce4b69d2f95c39f260308b0a9844a6631acc9862d6021d7f</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Bartleycorp.com is the website for Bartley Corp, a company specializing in concrete construction services. They offer a range of services including concrete foundations, excavation, waterproofing, and general contracting. With a focus on quality and reliability, Bartley Corp serves both residential and commercial clients, providing expert solutions tailored to each project's needs.</i><br />Target victim <b>website</b>: <i>bartleycorp.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>del-electric.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18469</link>
<guid>ad7d34f4c2a54e4ce2b243cbf1e5b85d</guid>
<pubDate>Fri, 08 Nov 2024 16:28:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>del-electric.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa3b508d7c3af12fdd205478371133377bab0db07d4fa662e6144a130bfa6e24</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Del-electric.com is a company specializing in electrical solutions and products. They offer a range of services including electrical installations, maintenance, and repairs. Their product line likely includes components such as circuit breakers, wiring, and lighting solutions. The company is dedicated to providing reliable and efficient electrical services to both residential and commercial clients.</i><br />Target victim <b>website</b>: <i>del-electric.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>liftkits4less.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18472</link>
<guid>9a497be23853d89b6f98fb990b49a55d</guid>
<pubDate>Fri, 08 Nov 2024 16:18:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>liftkits4less.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df1020ac0df3b55a93a7cf29293d8dd2cccfae9ccb64d1a8ed7b7a43436ea38d</i><br /><br />Threat actor <b>description</b>: <i>LIFTKITS4LESS.COM is the largest online seller of suspension lift kit systems.
clients' data: ID,Name,Email,Group,Phone,ZIP,Country,State/Province...</i><br />Target victim <b>website</b>: <i>liftkits4less.com</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.assurified.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18466</link>
<guid>a805e4d7fe9c62264963adc280161aa7</guid>
<pubDate>Fri, 08 Nov 2024 10:08:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>www.assurified.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e890bd37d84cebba79420495dc9b6e4315cd11259c8eea4e6a5e1412f1ae3a5</i><br /><br />Threat actor <b>description</b>: <i>Assurified revolutionizes risk management for multifamily real estate. Our AI-powered solutions and deep expertise in Total Cost of Risk (TCOR) opt...</i><br />Target victim <b>website</b>: <i>www.assurified.com</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>Marzzacco-Niven--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=19848</link>
<guid>d282f0519f8a6cbdb8cf7ac415e9d05d</guid>
<pubDate>Fri, 08 Nov 2024 09:12:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Marzzacco-Niven--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>59bfe671ed09a7260dcd39ca50e9e7a3d4c4b29de874f147d38a678ed5b5c816</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>klnivenlaw.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Healthcare-Management-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18464</link>
<guid>a584750e807e73159a3ec38cf03ec65f</guid>
<pubDate>Fri, 08 Nov 2024 08:30:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Healthcare-Management-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5d803cbef33ba97af1e5c721b8ff69c7e326108d6ad0aa4285bb23d5210a2fef</i><br /><br />Threat actor <b>description</b>: <i>Healthcare Management Systems (HMS) is a company that specializes in providing software solutions and services tailored for the healthcare industry. Based in Napa, California, HMS focuses on enhancing the operational efficiency of healthcare providers through its offerings, which may include electronic health records (EHR), practice management systems, revenue cycle management, and other healthcare IT solutions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>MedElite-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18456</link>
<guid>c0d447b768342332a35134881a57bef6</guid>
<pubDate>Fri, 08 Nov 2024 01:41:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>MedElite-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d38b99365a5929c3fd677d48adf43760b5c0cbb6881ecb56dfda1bbc7793a8bb</i><br /><br />Threat actor <b>description</b>: <i>Medical and personal data of 119,000 patients https://medelitegrp.com Company representative should follow the instructions to contact us before time runs out</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>nelconinc.biz</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18459</link>
<guid>a91edecd508cd9e5b3049e1918f0c6eb</guid>
<pubDate>Thu, 07 Nov 2024 23:11:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>nelconinc.biz</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c9dce64ad7a683a9f3378a9b3c6fead2031b4d0831bdb72c6b5531fb33a319fd</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] I'm sorry, but I don't have any specific information about a company named "nelconinc.biz." It is possible that it is a smaller or less well-known business, or that it has not been widely documented in the sources available to me. If you can provide more context or details, I might be able to help further or offer general advice on how to find information about a company.</i><br />Target victim <b>website</b>: <i>nelconinc.biz</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.bluco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18455</link>
<guid>8697e431350a17f3a1ce4ffaae7e3c16</guid>
<pubDate>Thu, 07 Nov 2024 22:42:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.bluco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>442807a4fdaffc877aa5134e18b6f1fba43169fb4f141f660aefc5af3f646cac</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Bluco Corporation specializes in modular fixturing solutions for welding and assembly. They provide precision-engineered components and systems that enhance manufacturing flexibility and efficiency. Their products cater to a variety of industries, including aerospace, automotive, and heavy equipment. Bluco is known for its innovation and commitment to quality, offering customized solutions and expert support.</i><br />Target victim <b>website</b>: <i>www.bluco.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Prime-Hospitality-Group-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18686</link>
<guid>5f74249208205551b0714e4c5dcca970</guid>
<pubDate>Thu, 07 Nov 2024 20:46:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Prime-Hospitality-Group-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9dcc5589db9c99e79f2658b644cc85c5d508fcffa7f42e09d5ac10fd0ed03c98</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>primehospitalitygroup.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Berman-Law-Group-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18685</link>
<guid>6613167eafbef4130c088f48920bfdea</guid>
<pubDate>Thu, 07 Nov 2024 20:44:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-Berman-Law-Group-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7c759679ffaa109d033f04b118d8aaf1a48b7d5557b848f7e0b29e28d1d82ea</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>bermanlawgroup.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>dzsi.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18445</link>
<guid>4198f9d67624156e01306d74490fff41</guid>
<pubDate>Thu, 07 Nov 2024 14:40:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>dzsi.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa15db2f27520a788a20654255d754a2e21c6fd8d7f792c0d47549486ab810ac</i><br /><br />Threat actor <b>description</b>: <i>DZS is a global leader of Network Edge, Connected Home/Enterprise and AI Cloud S...</i><br />Target victim <b>website</b>: <i>dzsi.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>futuremetals.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18446</link>
<guid>b6331792a66d1eab017c0f109aee728c</guid>
<pubDate>Thu, 07 Nov 2024 14:40:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>futuremetals.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>316d69781e2de8dd4852c9206517e973e09e11371eb311f7244f70b79181ba02</i><br /><br />Threat actor <b>description</b>: <i>The Future Metals Company
 Future Metals is a Marmon Group / Berkshire Hathaway ...</i><br />Target victim <b>website</b>: <i>futuremetals.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>geminiindustriesinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18448</link>
<guid>4fac3e83cefaf275364571830fe53dc2</guid>
<pubDate>Thu, 07 Nov 2024 13:04:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>geminiindustriesinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5bad8c56fed19b854fb6eda7b1ae98de33f16066b2e0b6b725dc511a4dc62445</i><br /><br />Threat actor <b>description</b>: <i>[AI generated] Gemini Industries Inc. is a company specializing in the manufacture and distribution of coatings, adhesives, and sealants. They serve a variety of industries, including automotive, aerospace, and construction. The company focuses on innovation and quality, offering customized solutions to meet specific client needs. Their commitment to sustainability and customer service is integral to their operations.</i><br />Target victim <b>website</b>: <i>geminiindustriesinc.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Winnebago-Public-School-Foundation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18450</link>
<guid>7d648593ea5e08ebed0b0bc4c8071dce</guid>
<pubDate>Thu, 07 Nov 2024 11:14:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Winnebago-Public-School-Foundation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>43af19d8d46299795d2f2ebf53471222677e60cee0b6f0f670e1ab3814579811</i><br /><br />Threat actor <b>description</b>: <i>Winnebago Public School Foundation Inc is a company that employs 20 to 49 people and has 1Mto5M of revenue. The company is headquartered in Winnebago.
							In your disposition , personal data of employees and students, SQL databases.</i><br />Target victim <b>website</b>: <i>winnebagopublicschools.org</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jomar-Electrical-Contractors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18449</link>
<guid>32535578dd55e867e5d193090c8a0c1f</guid>
<pubDate>Thu, 07 Nov 2024 08:59:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Jomar-Electrical-Contractors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eb0acfba83ae7a8ecfc590775866fedfa417c674e8f588cb4bf92954db37fca5</i><br /><br />Threat actor <b>description</b>: <i>Jomar Electrical Contractors the company is engaged in the construction of electrical systems in the commercial construction industry. Jomar corporate office is located in 770 N Sam Houston Pkwy E, Houston, Texas, 77060, United States and has 306 employees. The total amount of data leakage is 797.2 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Howell-Electric-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18443</link>
<guid>ff5b376f952246bd12b516e765403906</guid>
<pubDate>Thu, 07 Nov 2024 08:58:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Howell-Electric-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d49606fc724c08c047da8167084f2e924fcf4275d8c86faaab1981b9eb14ffba</i><br /><br />Threat actor <b>description</b>: <i>Howell Electric Inc. ( founded 1986 ) is a electrical contractor company. It offers design-build construction, security, access control, & CCTV systems. Howell Electric corporate office is located in 3390 Viso Ct, Santa Clara, California, 95054, United States and has 104 employees. The total amount of data leakage is 189.9 GB</i><br />Target victim <b>website</b>: <i>howellelectric.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18442</link>
<guid>ed2fb6eafdea28225b0158f329681aa3</guid>
<pubDate>Thu, 07 Nov 2024 03:19:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>New-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26958316928118d590da30e63118a81b673a8da225b4bd2bbb561ca67859d516</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>www.newlawoffice.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Postcard-Mania</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18439</link>
<guid>4b13504eff30b9bc375ea8dab99302d2</guid>
<pubDate>Thu, 07 Nov 2024 01:41:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Postcard-Mania</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a1b814e2118b008a5919958fdb7857771d728989309adcc708b1549e65eb1ec</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.postcardmania.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>brandenburgerplumbing.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18440</link>
<guid>81a1e36d1d8c565e1554959779ce2aad</guid>
<pubDate>Wed, 06 Nov 2024 22:44:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>brandenburgerplumbing.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>543929e41b08aac9e68cb65bc8c504f511fa8a37372737644169216e0d9411f0</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] Brandenburger Plumbing is a professional plumbing service company known for its expertise in residential and commercial plumbing solutions. They offer a wide range of services, including installations, repairs, maintenance, and emergency plumbing support. The company prides itself on its skilled technicians, prompt service, and customer satisfaction, ensuring high-quality workmanship on every job.</i><br />Target victim <b>website</b>: <i>brandenburgerplumbing.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>arcoexc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18441</link>
<guid>f6f4cb25b1ebd9e3b05e26c5101c99c7</guid>
<pubDate>Wed, 06 Nov 2024 22:41:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>arcoexc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>119a91f656014097e824f3757a6a061ddbdb04c516e513af23da21f0fb0bab59</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] I'm sorry, but I couldn't find specific information about a company named "arcoexc.com" based on the data I have up until October 2023. It's possible that the company is either very new, not widely recognized, or its name is not widely used in publicly available resources. If you have more context or details about the company, I might be able to help further!</i><br />Target victim <b>website</b>: <i>arcoexc.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lincoln-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18437</link>
<guid>0c7428cf58f0f3904634fab419d326e2</guid>
<pubDate>Wed, 06 Nov 2024 21:18:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Lincoln-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3adfe5af094e2d25b6f1e9adc15f8fd0419bfbd08ce6e1b30cfa39d5db696195</i><br /><br />Threat actor <b>description</b>: <i><p>Dear customers!</p><p>We are pleased to offer you exclusive access to over 21 GB of confidential data from Lincoln University, the United States first degree granting Historically Black College and University HBCU, established in 1854 and located in Pennsylvania. Lincoln University offers a comprehensive liberal arts education with a range of undergraduate and graduate programs, fostering a diverse and inclusive environment that welcomes students from all cultural and ethnic backgrounds. With a commitment to academic excellence and personalized support, the university provides small class sizes and dedicated faculty, along with numerous opportunities for experiential learning through research, internships, and study abroad programs.</p><p>This comprehensive data pack includes:</p><p>Employee data personal details, insurance information, Social Security details<br>Contracts and agreements payment terms, supplier and service agreements<br>Insurance policies and commercial agreements<br>Financial documents supplier invoices, tax information, bank transaction records, account balances<br>Personal data names, dates of birth, insurance details<br>Medical information insurance coverage, medical histories, treatment records, insurance plans<br>And much more<br>This data pack provides detailed insights into Lincoln Universitys operations and may be of significant interest to professionals in higher education administration, business analysis, and other related fields.</p><p>To gain access to this exclusive 21 GB data pack, click the Buy button and provide your contact details for registration. Our team will guide you through a secure and confidential transaction.</p><p>Dont miss this opportunity to access in depth information from Lincoln University with this exclusive data pack</p></i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wholesale-Fuel-Distributors-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18543</link>
<guid>7a6b3e0e06f590735da57d63d5040639</guid>
<pubDate>Wed, 06 Nov 2024 20:48:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>helldown</b> claims attack for <b>Wholesale-Fuel-Distributors-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5aa83961d094e786e2768210f9ead5b1c000d5d4c433b23ef77246c13654fa91</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>wfdistributors.com</i>]]></description>
<category>helldown</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cape-Cod-Regional-Technical-High-School-capetech.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18435</link>
<guid>6076870474b1ea11f0fbdbaffe86d3fc</guid>
<pubDate>Wed, 06 Nov 2024 15:17:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Cape-Cod-Regional-Technical-High-School-capetech.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53b00d77d53419d933d771178052198877026ba090a6b54c15b776fa36f9a55a</i><br /><br />Threat actor <b>description</b>: <i>6 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>GSR-Andrade-Architects-gsr-andrade.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18436</link>
<guid>596a620aab59381e1f972c6908d3c3d0</guid>
<pubDate>Wed, 06 Nov 2024 15:16:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>GSR-Andrade-Architects-gsr-andrade.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b5c6354d2e504393cf4587be286e497a6482f422ad3d7cc82cb977111865757</i><br /><br />Threat actor <b>description</b>: <i>65 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Smittys-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18434</link>
<guid>3ee8f69c3f1997e48453817706c37260</guid>
<pubDate>Wed, 06 Nov 2024 13:28:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Smittys-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5bbcac7d45466813ff7b4fc0679b4ad61603984c92fc1c334eca10ae39562b4c</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.smittysinc.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>fuelco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18421</link>
<guid>dda594513217fac90bbe56e5248d576c</guid>
<pubDate>Wed, 06 Nov 2024 12:30:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>helldown</b> claims attack for <b>fuelco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8a0d47c234975c7a9e809eedb1dd987093192067dc91ae58f2f7de8cba177ac</i><br /><br />Threat actor <b>description</b>: <i>fuelco-us.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>helldown</category>
</item>
<item xmlns:dc='ns:1'>
<title>VALLEYFIRM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18422</link>
<guid>70cd9109e88def5e20c6887a8d9af139</guid>
<pubDate>Wed, 06 Nov 2024 12:30:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>helldown</b> claims attack for <b>VALLEYFIRM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3bb757a04ff1044193d8385bbb01b2f08975a66c4c833127589bbff84d5b8a6c</i><br /><br />Threat actor <b>description</b>: <i>valleyfirm.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>helldown</category>
</item>
<item xmlns:dc='ns:1'>
<title>children</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18423</link>
<guid>9d0bbb435db57b64859584c8e160a485</guid>
<pubDate>Wed, 06 Nov 2024 12:30:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>helldown</b> claims attack for <b>children</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f093ce256827fe7b5ee9fe8b60cf1643d2f0f7d61c15cafc2d6fcfcd28a7d47f</i><br /><br />Threat actor <b>description</b>: <i>generaldentistryforchildren.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>helldown</category>
</item>
<item xmlns:dc='ns:1'>
<title>knoxlawcenter</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18424</link>
<guid>8c79efb56648ced184df825121b9a698</guid>
<pubDate>Wed, 06 Nov 2024 12:30:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>helldown</b> claims attack for <b>knoxlawcenter</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>063daf17f45b93f263bcd8c38cb9a322af810ab3b87b9af58bbce8fd20180f07</i><br /><br />Threat actor <b>description</b>: <i>www.knoxlawcenter.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>helldown</category>
</item>
<item xmlns:dc='ns:1'>
<title>AMERICANVENTURE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18425</link>
<guid>fc60f5d7abc2e080599bb6dc465db54d</guid>
<pubDate>Wed, 06 Nov 2024 12:30:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>helldown</b> claims attack for <b>AMERICANVENTURE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>71d3cdff66407454414cd5c8eead4f70aac9bc95d9b8484bec10a8f076df387b</i><br /><br />Threat actor <b>description</b>: <i>americanventures.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>helldown</category>
</item>
<item xmlns:dc='ns:1'>
<title>CSIKBS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18426</link>
<guid>af8772553fadf9c4d0e4b49aec689da3</guid>
<pubDate>Wed, 06 Nov 2024 12:30:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>helldown</b> claims attack for <b>CSIKBS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26c355fac86a61ce5b5e1acabaa4766e555d570a6cfea260bbc32d260adda303</i><br /><br />Threat actor <b>description</b>: <i>www.csikitchenandbath.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>helldown</category>
</item>
<item xmlns:dc='ns:1'>
<title>SANJACINTOCOUNY</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18427</link>
<guid>66980d8dbb15775ee061e7205c90fac8</guid>
<pubDate>Wed, 06 Nov 2024 12:30:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>helldown</b> claims attack for <b>SANJACINTOCOUNY</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b9fc03d1a5b85a768974bc8abf08ef735de20fadb79106be9a72134b53dc1234</i><br /><br />Threat actor <b>description</b>: <i>www.co.san-jacinto.tx.us</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>helldown</category>
</item>
<item xmlns:dc='ns:1'>
<title>compassfs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18428</link>
<guid>8e3f7abc5de7f3c97a1207a55a38e6bd</guid>
<pubDate>Wed, 06 Nov 2024 12:30:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>helldown</b> claims attack for <b>compassfs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a60e46ba054012071b373106c2116d0226fed426d45c824e36f0e4b12e523969</i><br /><br />Threat actor <b>description</b>: <i>www.compassfs.net</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>helldown</category>
</item>
<item xmlns:dc='ns:1'>
<title>metroelectric.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18433</link>
<guid>e6dbc8adead86fe2fcc18a8682c1ec7e</guid>
<pubDate>Wed, 06 Nov 2024 10:49:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>metroelectric.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af8cd39b00696ded68cd3ff9ceb3bf27df8fc6bfbb6fad726b75b2d389f762b4</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] MetroElectric.com is a company specializing in electrical services, offering solutions for residential, commercial, and industrial clients. They provide services such as electrical installations, maintenance, and repairs, focusing on safety and efficiency. With a team of skilled electricians, MetroElectric.com emphasizes customer satisfaction and timely project completion, ensuring high-quality workmanship and reliable service.</i><br />Target victim <b>website</b>: <i>metroelectric.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alliance-Technical-Group-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18413</link>
<guid>15b3cc9bb49f2b301401591d1b394ef5</guid>
<pubDate>Wed, 06 Nov 2024 10:02:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Alliance-Technical-Group-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f3485a9b03e85f77f8ea0ffd59c928d4b3a31682c096da8704b9ef9a377ff53</i><br /><br />Threat actor <b>description</b>: <i>Alliance Technical Group -  company provides solutions problems of environmental management and compliance for some of the foremost companies and brands in North America. Alliance Technical Group corporate office is located in 255 Grant St SE Ste 600, Decatur, Alabama, 35601, United States and has 1,400 employees. The total amount of data leakage is 1.2 TB</i><br />Target victim <b>website</b>: <i>alliancetg.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>ov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18415</link>
<guid>6f14ca8be6ec0fa38b261c92c3bd61a9</guid>
<pubDate>Wed, 06 Nov 2024 10:02:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>ov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>76b79603ce7bb3bf1384408a8cb9ac13526e467acd50b324738716664cece13a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>S--W-Kitchens</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18411</link>
<guid>c1bf083e0d09941f097cbe30648a588d</guid>
<pubDate>Wed, 06 Nov 2024 04:53:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>S--W-Kitchens</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d968538b4addfe54235af7cb39a22f477d798ef51634e45115e7f0fbfdd76d03</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.sandwkitchens.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Paragon-Plastics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18408</link>
<guid>d5e50295cc02e37f39533a47aa4a9549</guid>
<pubDate>Wed, 06 Nov 2024 03:19:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Paragon-Plastics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>02444fd70503ede0116e32eb7b7fa36db905b7eae54d8d2fc5327bf9b5dd7ab8</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.paragonplastics.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Delfin-Design--Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18405</link>
<guid>99f7ba97af7b4f90942732788cdb9652</guid>
<pubDate>Wed, 06 Nov 2024 01:45:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Delfin-Design--Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6ee7ad770e0bf9b2c76874fdb601e884420e3c568f573a8fe683c9f304eb6c7</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.delfinfs.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>pacificglazing.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18409</link>
<guid>9ba08ffbc78a3abe400d52a09619729b</guid>
<pubDate>Tue, 05 Nov 2024 23:43:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>pacificglazing.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e97130501c53b25825f58363fba9adf0c40020f3c1c43b1d6d63398b8d5562f</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] Pacific Glazing is a company specializing in glass and glazing services, catering to both residential and commercial clients. They offer a range of products, including windows, doors, curtain walls, and skylights, focusing on quality craftsmanship and innovative design. Known for their customer-centric approach, Pacific Glazing emphasizes sustainability and energy efficiency in their projects.</i><br />Target victim <b>website</b>: <i>pacificglazing.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dome-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18404</link>
<guid>94858b3183416388f875c40709de9fc2</guid>
<pubDate>Tue, 05 Nov 2024 22:47:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Dome-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6f609ede04160ed3137ebc6b7aa0f140608ffc03be6b3a2fbcbbaba7c71b71d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.domebuilds.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>ebrso</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18402</link>
<guid>7ba9f9814b71251de63c083324ef94bb</guid>
<pubDate>Tue, 05 Nov 2024 22:06:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>ebrso</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de2a6379e516ac9803634b86323c6f8e241859875a5d16c31ffb92c54aae89b6</i><br /><br />Threat actor <b>description</b>: <i>Located in Baton Rouge, Louisiana, the East Baton Rouge Parish Sheriff's Office is very proud to serve this community. Led by Sheriff Sid Gautreaux.</i><br />Target victim <b>website</b>: <i>www.ebrso.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>nwhealthporter.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18407</link>
<guid>566e96da65fa4b847660a8c1c2f80170</guid>
<pubDate>Tue, 05 Nov 2024 22:00:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>nwhealthporter.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a2e90376bfc8fad7e72d45929f93118c1114efec63301723c1ac466017cd80f5</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] I'm sorry, but I couldn't find detailed information about a company specifically named "nwhealthporter.com." It's possible that the company might be lesser-known or that the name might not refer to a widely recognized entity. If you have more context or details about the company, such as its industry or services, I could try to help you further.</i><br />Target victim <b>website</b>: <i>nwhealthporter.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>wexfordcounty.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18406</link>
<guid>2bea5e5b33433b178530244c7a0ed8b0</guid>
<pubDate>Tue, 05 Nov 2024 21:51:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>wexfordcounty.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c9b4bf1b9f6e9e6cdf0fb987b0641189c40bd52a62e346ccfe01c904e25cd1d</i><br /><br />Threat actor <b>description</b>: <i>Located in Northern Lower Michigan, Wexford County boasts a population of approximately 35,000, with a combination of an industrial/recreational demographic base.   - 1 TB Data

Network Admins:
Joe Porterfield (jporterfield@wexfordcounty.org)
Jami Bigger (jbigger@wexfordcounty.org) 231-779-9452 Passwords: ["August24!", "September24!", "October24!"]
 
MSSP:
Sophia Masotti-Jordan (sophia@karhucyber.com) 616-856-5678</i><br />Target victim <b>website</b>: <i>wexfordcounty.org</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>Model-Die--Mold</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18400</link>
<guid>fb26ceb5a996b8a4736c4e9ad00f7362</guid>
<pubDate>Tue, 05 Nov 2024 19:36:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Model-Die--Mold</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a5c019d87dbcc172f1be12183d7b37e1bc8a16a630047d98fae5bfd08ece331</i><br /><br />Threat actor <b>description</b>: <i>Model Die & Mold, Inc. Designs and Manufactures Injection and Compression molds....</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Falco-Sult</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18401</link>
<guid>c0bfb256b9fec5f359c01de122c510ba</guid>
<pubDate>Tue, 05 Nov 2024 16:46:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Falco-Sult</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c17385df25738907cd1288db5bd10e4ced2b9dbc02ff657dba20b468cc0f176f</i><br /><br />Threat actor <b>description</b>: <i>Falco Sult is in the business of helping our clients be successful. Motivated by solving problems and providing value added services, we combine a personal approach with unmatched expertise that takes the stress out of finances and positively impacts your bottom line.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Webb-Institute</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18399</link>
<guid>08283f2d7262ce7c4b9e38cff7905e7c</guid>
<pubDate>Tue, 05 Nov 2024 14:46:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Webb-Institute</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5caf23b8556927d1dd51b211c6a89016eb5597a831d59e2527ff33430bc0cbf1</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1889 by New York-based ship builder William H. Webb, Webb Institute is a highly selective, top-ranked undergraduate institution,</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>sundt.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18397</link>
<guid>e41ca9097b60bdb7c752d6d8867781a8</guid>
<pubDate>Tue, 05 Nov 2024 11:21:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>sundt.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>677b097c0ab3d093d9ae5e72683841edca15b54472b5d76a48e6a80704a9dde7</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] Sundt Construction, Inc., accessible via sundt.com, is a prominent construction company founded in 1890 and headquartered in Tempe, Arizona. It specializes in building, industrial, transportation, and concrete services, serving both public and private sectors. Sundt is employee-owned and is recognized for its commitment to safety, innovation, and sustainable building practices.</i><br />Target victim <b>website</b>: <i>sundt.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.colonialbh.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18394</link>
<guid>87549e74d3546183365ad3f438a48fc4</guid>
<pubDate>Tue, 05 Nov 2024 09:28:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.colonialbh.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>923d77a20d081fc40b27e14b5fbc894cc3ae71888b5fc00476b59288b2b4c9e6</i><br /><br />Threat actor <b>description</b>: <i>Colonial Behavioral Health, is the local Community Services Board serving the citizens of James City County, the City of Poquoson, the City of Williamsburg and York County. It's mission is to facilitate recovery and resiliency of individuals             ...</i><br />Target victim <b>website</b>: <i>www.colonialbh.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Memorial-Hospital--Manor</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18395</link>
<guid>9063c84e769a726bd4687c8a230e2e71</guid>
<pubDate>Tue, 05 Nov 2024 09:18:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>Memorial-Hospital--Manor</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6e133275a67035859414e151b05812694121b5d1d6d9ce829b9959810d212864</i><br /><br />Threat actor <b>description</b>: <i>Memorial Hospital and Manor celebrated its 50th Anniversary in 2010. Memorial Hospital was officially dedicated on Sunday, April 3, 1960, and opened its doors to receive patients the following day. The 80-bed hospital was built under the Hill-Burton Hospital Survey & Construction Act of 1946. The Hill-Burton Act initiated the concept of local, state, and federal cost sharing of healthcare facilities, and provided federal funds for construction and renovation of more than 9,000 medical facilities, particularly in lower income areas. While two-thirds of the money was provided by the Federal government and the State of Georgia, Memorial Hospital has always been operated by the Hospital Authority of the City of Bainbridge and Decatur County.

Prior to the opening of Memorial Hospital, two private hospitals served the healthcare needs of Decatur and surrounding counties. In 1916, Riverside Hospital was built and operated by Dr. J. D. Chason, Dr. Gordon Chason, Dr. R. F. Wheat, and Dr. Willie Lee Wilkinson. Shortly after the Riverside Hospital was built, Dr. A.E.B. Alford came to Bainbridge and built the Bainbridge Hospital. The Flint River provided easy access to these hospitals for people in rural areas and nearby towns, making Bainbridge a healthcare center for the tri-state area.  Memorial Hospital was given its name in memoriam to those pioneers who made Bainbridge the medical center of Southwest Georgia, Northern Florida, and Southeastern Alabama for many decades. - 1.15 TB Data</i><br />Target victim <b>website</b>: <i>mh-m.org</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>McMillan-Electric-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18393</link>
<guid>bc9da2969b7d8fa3534b851b41340cb4</guid>
<pubDate>Tue, 05 Nov 2024 08:45:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>McMillan-Electric-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ca5ff4e5795f3dbafb3967cd184283eda839e058c1f2d18efb9713d16e435dd</i><br /><br />Threat actor <b>description</b>: <i>McMillan Electric Company (founded in 1976) is a custom motor and motor products manufacturer for OEMs. MCMILLAN ELECTRIC corporate office is located in 400 Best Rd, Woodville, Wisconsin, 54028, United States and has 226 employees</i><br />Target victim <b>website</b>: <i>mcmillanco.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>AXIOM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18387</link>
<guid>86f2df8b1f35b23f913ca2da72522a36</guid>
<pubDate>Mon, 04 Nov 2024 22:34:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>AXIOM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5787f701b751069fd330d6289a3200bce27ecd8f812ed70fee2b8999f104bfdd</i><br /><br />Threat actor <b>description</b>: <i>Axiom Constructors is a local, family-owned business dedicated to providing sustainable and quality concrete solutions to the Salt Lake City community. Our founder, Richard Jessop, grew up in the trade and worked for several small concrete co            ...</i><br />Target victim <b>website</b>: <i>www.axiom.work</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.drbutlerandassociates.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18380</link>
<guid>12a7b6573d17a1b1d5c255711e816b8b</guid>
<pubDate>Mon, 04 Nov 2024 18:55:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.drbutlerandassociates.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>082dda079fd17c0d409463ea32887b02354b772cf99ed7ed2b53d04a1ec81ead</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] Dr. Butler & Associates is a company that specializes in healthcare consulting services. They focus on providing expert guidance and solutions to healthcare organizations, aiming to improve operational efficiency and patient care quality. The company is known for its strategic insights and tailored approaches to meet the unique needs of each client, leveraging industry expertise to drive impactful results.</i><br />Target victim <b>website</b>: <i>www.drbutlerandassociates.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.mssupply.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18378</link>
<guid>3c9501685cdd590f6212d7d7833bddf4</guid>
<pubDate>Mon, 04 Nov 2024 16:52:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.mssupply.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91886e9fbed25ad6b40130ceb26794b39879edabd2543f950bbbd19aad2a4208</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] MSSupply.com is a company that specializes in providing safety equipment and industrial supplies. They offer a wide range of products including personal protective equipment, facility maintenance items, and tools for various industries. The company focuses on delivering quality products to enhance workplace safety and efficiency, catering to the needs of businesses across different sectors.</i><br />Target victim <b>website</b>: <i>www.mssupply.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Whitaker-Construction-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18382</link>
<guid>043e734f76edb5743d9b26ef5c372c51</guid>
<pubDate>Mon, 04 Nov 2024 14:54:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Whitaker-Construction-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87cb249f698c398813e0b02c8fa8ff833f14a39efb737f232086099d154b92b0</i><br /><br />Threat actor <b>description</b>: <i>Whitaker Construction Group Inc is a company that operates in the commercial & residential construction industry. Whitaker Construction Group corporate office is located in 2752 Concrete Ct, Paso Robles, California, 93446, United States and has 19 employees. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>fullfordelectric.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18375</link>
<guid>7b4848a738dcc0cdec27a76906693b3e</guid>
<pubDate>Mon, 04 Nov 2024 14:50:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>fullfordelectric.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>abaf7672e8addb6bdbbd6896f5dac99a41f7f0c8e4ea720914fc3427fdbfd803</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] Certainly! Fullford Electric is a company specializing in electrical services, offering a range of solutions including residential, commercial, and industrial electrical installations and repairs. They focus on providing high-quality workmanship, ensuring safety, and delivering reliable customer service. Their experienced team is dedicated to meeting clients' needs with efficient and innovative electrical solutions.</i><br />Target victim <b>website</b>: <i>fullfordelectric.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>San-Francisco-Ballet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18379</link>
<guid>bd11474c79e4222d48e8c1521f8d4e3b</guid>
<pubDate>Mon, 04 Nov 2024 13:27:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>San-Francisco-Ballet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c0c9a241e5781e55f66c5390380c9f0ddb5f3cfce09ea0e598cf51e732a7f28</i><br /><br />Threat actor <b>description</b>: <i>San Francisco Ballet, long recognized for pushing boundaries in dance, has a history of making history. Founded in 1933, the company staged the first full-length American productions of Coppélia (1938) and Swan Lake (1940) and, in 1944, we launched an annual holiday tradition when we produced the first full-length production of Nutcracker in the US.  The Company is led by Artistic Director, Tamara Rojo. SF Ballet is accompanied by its own orchestra and operates one of the country’s most prestigious schools of ballet. Today we build on our heritage by commissioning groundbreaking dance from today’s top choreographers, by uncovering new choreographic talent, and by staging modern classics and the works that make up the canon of classic ballet. Our approach defines ballet in the 21st century, and it makes San Francisco Ballet the essential place to see the most adventurous dance in America.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>csucontracting.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18376</link>
<guid>88c260111b6362d72c61018f03aba757</guid>
<pubDate>Mon, 04 Nov 2024 11:33:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>csucontracting.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46fb3d69b26458b87174586636adc817461fedf2944c5421f5901f78787013b1</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] CSU Contracting is a company specializing in construction and contracting services. They offer a range of services including general contracting, project management, and design-build solutions. With a focus on quality and customer satisfaction, they handle projects of various sizes and complexities, ensuring timely completion and adherence to client specifications. Their expertise spans residential, commercial, and industrial sectors.</i><br />Target victim <b>website</b>: <i>csucontracting.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>redphoenixconstruction.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18377</link>
<guid>8285becb29953a330876e9a606ac81d4</guid>
<pubDate>Mon, 04 Nov 2024 11:30:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>redphoenixconstruction.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c8da1b83272671dc0b645c0f7df426a8493fbccb576cacb1bf6a37e3028a1e5</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] Red Phoenix Construction is a company specializing in construction and renovation services. They focus on delivering high-quality craftsmanship for residential and commercial projects. The company is known for its attention to detail, reliability, and commitment to customer satisfaction. Their services include new builds, remodels, and various construction solutions tailored to client needs.</i><br />Target victim <b>website</b>: <i>redphoenixconstruction.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Air-Specialists-Heating--Air-Conditioning</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18372</link>
<guid>0504009e78c51e294b80953cfca0cf55</guid>
<pubDate>Mon, 04 Nov 2024 10:55:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Air-Specialists-Heating--Air-Conditioning</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>15b42b0ff18f4f9b56017e6d67794cba2e4c817cd93441e28aced6e530ae5b12</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>www.airspecialist.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>caseconstruction.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18370</link>
<guid>fb1f13df81c7bee04d8a083204858880</guid>
<pubDate>Mon, 04 Nov 2024 08:54:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>caseconstruction.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5bf7e91353d5bd94e03784fbfbf7afe4677e206ecd1d83141e8e816cf6f6ff73</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] Case Construction Equipment is a leading manufacturer of construction machinery and equipment. The company offers a wide range of products, including backhoe loaders, excavators, motor graders, wheel loaders, and skid steer loaders, designed for various applications in construction, landscaping, and agriculture. Case is recognized for its innovation, reliability, and customer-focused solutions.</i><br />Target victim <b>website</b>: <i>caseconstruction.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>krigerconstruction.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18373</link>
<guid>92ac757bddb78e13c6431c71abc7216f</guid>
<pubDate>Mon, 04 Nov 2024 07:30:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>krigerconstruction.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>289e726619ea4b8d57abbaa953c784e194a11cf58f6752e4751424659d558248</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] Kriger Construction is a company specializing in construction and engineering services. They offer a range of services including residential, commercial, and infrastructure projects. Known for their commitment to quality and innovation, Kriger Construction emphasizes safety and sustainability in all their projects. Their team of skilled professionals works closely with clients to deliver customized solutions that meet specific needs and timelines.</i><br />Target victim <b>website</b>: <i>krigerconstruction.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>lambertstonecommercial.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18369</link>
<guid>971c6340495b40cce8b7ef650650a599</guid>
<pubDate>Mon, 04 Nov 2024 06:57:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>lambertstonecommercial.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0d0df43164a1668f1395a06f630c377db5d280528577779866fbbed74a1a53c3</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] Lambert Stone Commercial is a real estate company specializing in commercial property services. They offer expertise in property sales, leasing, and management, catering to various business needs. With a focus on customer satisfaction, Lambert Stone Commercial aims to provide tailored solutions for clients looking to buy, sell, or lease commercial spaces, ensuring professional and efficient service.</i><br />Target victim <b>website</b>: <i>lambertstonecommercial.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Law-Offices-of-Jed-Silverman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18364</link>
<guid>51516ca3355ddd1669176f3c766ff881</guid>
<pubDate>Sun, 03 Nov 2024 12:17:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-Law-Offices-of-Jed-Silverman</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8f14d54147a7f67e41d67a295c8506bc342ecb9a9454cfc21676f4e82e03df88</i><br /><br />Threat actor <b>description</b>: <i>As the founder and principal attorney of the Law Offices of Jed Silverman, I am dedicated to providing effective and aggressive representation for clients facing criminal charges in Texas and across the nation. I am one of the few lawyers in             ...</i><br />Target victim <b>website</b>: <i> www.jedsilverman.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Russell-Law-Firm-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18367</link>
<guid>8127b04e1b79f3db3e44bb55cae8d492</guid>
<pubDate>Sun, 03 Nov 2024 06:39:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Russell-Law-Firm-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42098b7dab07fec48240b491d6367b64a54f7c3f6b66deac928aeb34507f6695</i><br /><br />Threat actor <b>description</b>: <i>The Russell Law Firm, LLC specializes in personal injury, auto accidents, DWI/DUI defense, wrongful death, and family law.</i><br />Target victim <b>website</b>: <i>dannyrusselllaw.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>L--B-Transport-L.L.C.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18366</link>
<guid>a46271b12bd598c1859e0b7118dad925</guid>
<pubDate>Sun, 03 Nov 2024 06:35:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>L--B-Transport-L.L.C.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a10f7856ae67aa2687c10dc9aa6e0df743426026ecaf7c862dab073d2db6439e</i><br /><br />Threat actor <b>description</b>: <i>L&B stands for high quality transportation services with terminal locations throughout the Southern United States.</i><br />Target victim <b>website</b>: <i>landbtransport.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>SVP-Worldwide</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18358</link>
<guid>d926f01bf79efe88c67b87d5fbc16bb1</guid>
<pubDate>Sat, 02 Nov 2024 14:07:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>SVP-Worldwide</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b5c751001042cd7798018e0485e7301296d1d3894be1dc58f392ee0ada47218</i><br /><br />Threat actor <b>description</b>: <i>SVP Worldwide, founded in 2004 and headquartered in Lavergne, Tennessee, designs, manufactures, and distributes sewing, quilting</i><br />Target victim <b>website</b>: <i>svpworldwide.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>DieTech-North-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18344</link>
<guid>b542ca4b39e12006c810855b4a053e1c</guid>
<pubDate>Fri, 01 Nov 2024 23:28:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>DieTech-North-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c263eab19e83ef61265678babc37326f1e07d295a08454e4d3510ea744532e7a</i><br /><br />Threat actor <b>description</b>: <i>DieTech North America offers world-class engineering, construction, and tryout services for medium and large Class-A metal stamping dies. Services Offered include Black Box Die Build and Tryout, Tryout Completion, Engineering changes and Die             ...</i><br />Target victim <b>website</b>: <i>www.dietechna.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.fatboysfleetandauto.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18348</link>
<guid>ce6907d94233d611e2f8349ab3b38264</guid>
<pubDate>Fri, 01 Nov 2024 21:38:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.fatboysfleetandauto.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc5e354398d14dc323528d576959e8c12e8fdd5396af0245312e85c33da602ba</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] Fat Boys Fleet and Auto is a company specializing in automotive services. They offer a range of services including maintenance and repair for both fleets and individual vehicles. The company is known for its customer-focused approach, providing reliable and efficient solutions to keep vehicles running smoothly. Their team of skilled technicians is dedicated to ensuring high-quality service and customer satisfaction.</i><br />Target victim <b>website</b>: <i>www.fatboysfleetandauto.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.ua4rent.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18352</link>
<guid>b52d310fcbd748b53d3a30c784eb338d</guid>
<pubDate>Fri, 01 Nov 2024 21:27:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.ua4rent.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>100ccd02924688ebcc6b71051df36a62e5b051928012d6034ead58bb2ffa8dd7</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] UA4Rent is a company specializing in rental properties, primarily focused on providing accommodations for students and professionals. They offer a range of housing options, from apartments to shared housing, catering to various budget levels and preferences. With an emphasis on convenient locations and quality service, UA4Rent aims to simplify the rental process and ensure tenant satisfaction through responsive management and support.</i><br />Target victim <b>website</b>: <i>ua4rent.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.rosito-bisani.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18353</link>
<guid>a62f1a3185f18d39a7b823f94ddea28a</guid>
<pubDate>Fri, 01 Nov 2024 21:26:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.rosito-bisani.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eed514142d78d9ad4389dc59e85eeec180a5a9b1eb4db3b52229a5ce28d060bb</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] Rosito Bisani is a company specializing in the distribution of high-quality commercial kitchen equipment. They offer a range of products including espresso machines, pasta cookers, and pizza ovens, catering to the food service industry. Known for their commitment to quality and customer service, Rosito Bisani serves restaurants, cafes, and other hospitality businesses with reliable and innovative solutions.</i><br />Target victim <b>website</b>: <i>rosito-bisani.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>obe.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18345</link>
<guid>4793bfc98253b5452fe8c1baf48e8032</guid>
<pubDate>Fri, 01 Nov 2024 21:25:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>obe.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d900ecb68c5dcc10f49555172b0011d76e609435a53ff2622965918d0a66935c</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] OBE.com is a company specializing in providing advanced online business solutions and digital services. It focuses on assisting businesses in enhancing their online presence through innovative technology and strategic digital marketing practices. The company is known for its expertise in web development, e-commerce solutions, and data-driven marketing strategies, aiming to drive growth and efficiency for its clients.</i><br />Target victim <b>website</b>: <i>obe.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>lighthouseelectric.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18346</link>
<guid>3458a90e2c8e0d2ddb87e1c47cc32eea</guid>
<pubDate>Fri, 01 Nov 2024 21:22:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>lighthouseelectric.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56b73a002bde6fc42d0a281597d720617ac938aa1da6dd3567c6d9c3f59616c0</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] LighthouseElectric.com is a company specializing in electrical contracting services. They offer a range of solutions including design-build, electrical construction, and maintenance services. Their expertise spans various sectors such as commercial, industrial, and institutional projects. With a focus on innovation and quality, they aim to deliver efficient and reliable electrical systems tailored to client needs.</i><br />Target victim <b>website</b>: <i>lighthouseelectric.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>JS-McCarthy-Printers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18355</link>
<guid>943c84b16aaafd25f1c0d243cdd357d6</guid>
<pubDate>Fri, 01 Nov 2024 21:19:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>JS-McCarthy-Printers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>211bb34698c02ff5e38ab9671fcbe4e4970dfe5a4ca932d3db84def093853c13</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.jsmccarthy.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>CGR-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18354</link>
<guid>923380fe3bc45ac9ca087f0233cf678b</guid>
<pubDate>Fri, 01 Nov 2024 21:16:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>CGR-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>861a7aa6baee2fc99b801fdb62ddfe1db29c0694f4ea19da3d598027da6a85dc</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.cgrtech.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>United-Sleep-Diagnostics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18341</link>
<guid>fbe486dc4c014eb61a0c91e34cc6f301</guid>
<pubDate>Fri, 01 Nov 2024 18:42:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>United-Sleep-Diagnostics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c305c58403761dd026f0d29e5b33aefcd1b146f55b9b9beea9602a65ee6b53d</i><br /><br />Threat actor <b>description</b>: <i>United Sleep Diagnostics specializes in the monitoring of sleep disorders. United Sleep Diagnostics corporate office is located in 3635 Bell Blvd Ste 202, Bayside, New York, 11361, United States and has 106 employees. The total amount of data leakage is 1.20 TB
</i><br />Target victim <b>website</b>: <i>uniteddx.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hope-Valley-Recovery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18338</link>
<guid>9c6ebba8ac5389aed2beda98d31e91af</guid>
<pubDate>Fri, 01 Nov 2024 13:37:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Hope-Valley-Recovery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4cc1aeb0f5ff4382ddae4f41a4889dfc38fd72d55886c64d0dd90953b611024f</i><br /><br />Threat actor <b>description</b>: <i>Hope Valley Recovery Hope Valley Recovery is built around a non-judgmental, client-centered approach; where we assist and guide the client as they pave a path to recovery.</i><br />Target victim <b>website</b>: <i>hopevalleyrecovery.com</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.mltmua.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18329</link>
<guid>dba396ce4ff24aaf5597b973a6fcb6df</guid>
<pubDate>Fri, 01 Nov 2024 09:35:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.mltmua.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48e21469d49a43218dc6ff78cae166e07e5a2ce80ac421d6df7fe3d885493357</i><br /><br />Threat actor <b>description</b>: <i>The Mount Laurel MUA was created by Mount Laurel Township in 1965 for the purpose of providing water and wastewater services to the Township of Mount Laurel.

The MUA is a public entity however it is funded entirely by revenues related to w            ...</i><br />Target victim <b>website</b>: <i>www.mltmua.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Heritage-Golf</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18314</link>
<guid>eb98676e8ee16adce38796051a5cc7ff</guid>
<pubDate>Fri, 01 Nov 2024 03:35:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Heritage-Golf</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5aa4ed105d7f7b8d0b0bc7dfe347775fadcd9b1ca4c66da10567df17a8239fee</i><br /><br />Threat actor <b>description</b>: <i>Heritage Club is one of the premier golf courses in the Myrtle Beach area, residing on southern Grand Strand.</i><br />Target victim <b>website</b>: <i>www.heritagegolflinks.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>AIMS-Inc.--Fuel-Business-Accounting-Software-Jobber-Software--Wholesale-Petroleum-Acco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18319</link>
<guid>d80f1f9d6b7d30df67ed49f1deee94d9</guid>
<pubDate>Fri, 01 Nov 2024 03:35:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>AIMS-Inc.--Fuel-Business-Accounting-Software-Jobber-Software--Wholesale-Petroleum-Acco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>475859f6f4a82092af7cc4523eacfa3d6522a45669f3f60752926c26b39faabe</i><br /><br />Threat actor <b>description</b>: <i>We have over 200 GB of clients data and other informations stolen from their servers . Company has 48 hours to contact us</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>aziz-oil</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18321</link>
<guid>bd226797c6f94e77d81ea064be12e2ee</guid>
<pubDate>Fri, 01 Nov 2024 03:35:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>aziz-oil</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19f9e2ae5808b39878ba794196dccf26cba08afcc29099bd1faff2eb44c73d4e</i><br /><br />Threat actor <b>description</b>: <i>Being a petroleum distributor, we understand that the only way we will succeed is when store owners succeed.



We challenge ourselves to do things differently and better, we act as a “coach” to help store owners reach the next level             ...</i><br />Target victim <b>website</b>: <i>azizoil.us</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>PetroSouth</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18322</link>
<guid>867d6c2fa26c1218f8a23d56c21fbea2</guid>
<pubDate>Fri, 01 Nov 2024 03:35:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>PetroSouth</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0898ec5072efd1428149cab49e828efcb5c28fa54c3faada3521009262891b5c</i><br /><br />Threat actor <b>description</b>: <i>Whether you operate a station in need of a business boost or a customer simply looking for a better deal on gas, PetroSouth has something for everyone.

Want to energize your business? PetroSouth has the total package you’ve been looking             ...</i><br />Target victim <b>website</b>: <i>www.petrosouth.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arctrade</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18312</link>
<guid>b2f71e709eff7ed487160747496fc207</guid>
<pubDate>Fri, 01 Nov 2024 01:49:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Arctrade</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>146a556b5ec0409a10f718ba49ac7cf7a830db9fd533db1e01e5bacded42121b</i><br /><br />Threat actor <b>description</b>: <i>Time to resolve : More than 40,000 customers info and other internal data https://arctrade.com ISO, State,LDC,Load Zone,Customer,LDC Acct ID #,Account Group,Is Special Needs,Is Switch Hold,Customer Added Date,Last Upload Date,Current Status,Current Status Change Date,Latest EDI Date,Contract Approval Date,Contract Status,Legal Document Language,Contract,Deal Type,Fixed Rate (MWh),Broker Fee Rate (MWh),Original Contract Begin,Original Contract End,Actual Contract Begin,Actual Contract End,Renewal Contract […]</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Guardian-Healthcare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18339</link>
<guid>60e6ecda2f69cba0035c7d675fdd9c7c</guid>
<pubDate>Thu, 31 Oct 2024 21:04:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>Guardian-Healthcare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>16c6dceab1b76c9848939c99a85a2763519288c6ee131f3df7952f3eb3df4ec9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>guardianhc.com</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>Houston-Housing-Authority</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18303</link>
<guid>eb7bfee7a00af6aedab37fdb7fc71d64</guid>
<pubDate>Thu, 31 Oct 2024 18:02:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Houston-Housing-Authority</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9499f47326cda3a5c7703d131b4f479d1b316557f199740a90ebc4ff7045b6e7</i><br /><br />Threat actor <b>description</b>: <i><p>Dear customers!</p><p>We are excited to offer you exclusive access to over 38 GB of confidential data from the Houston Housing Authority HHA, an agency dedicated to providing affordable housing options and support services for low income residents in Houston. Serving over 60,000 individuals, HHA operates various programs, including the Housing Choice Voucher Program formerly Section 8 and public housing initiatives, offering rental assistance to families, seniors, and persons with disabilities to help them secure private housing in the community.</p><p>HHA manages public housing properties and collaborates with community partners to deliver additional services like education, job training, and family self sufficiency programs, aiming to enhance residents economic opportunities. The organization operates under federal guidelines from the U.S. Department of Housing and Urban Development HUD and adheres to fair housing regulations to ensure equitable access.</p><p>This comprehensive data pack includes:</p><p>Employee data personal details, Social Security cards, ID scans<br>Client information contact details, rental assistance records<br>Contracts and agreements confidentiality agreements, service contracts<br>Financial documents real estate purchase records, invoices, debt obligations<br>Liability insurance certificates and tax forms<br>Personal data dates of birth, Social Security numbers, ID scans<br>And much more<br>These records offer valuable insights into the Houston Housing Authoritys operations, providing essential information for professionals in the housing sector, public administration, and business analysis.</p><p>To gain access to this exclusive 38 GB data pack, simply click the Buy button and provide your contact details for registration. Our team will assist you in ensuring a secure and confidential transaction.</p><p>Dont miss this opportunity to explore key information from the Houston Housing Authority HHA with this exclusive data pack!</p><p>&nbsp;</p></i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>freedomhomecare.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18304</link>
<guid>8210d4caae707aa1f8be6d3fd558812b</guid>
<pubDate>Thu, 31 Oct 2024 16:55:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>freedomhomecare.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b59c54874b20c149f99fea55f510bfee3487c9d6e593afdebb618098ba5a65f</i><br /><br />Threat actor <b>description</b>: <i>We are here for you whenever you need us, for however long you need us. At Freedom Home Care and Medical Staffing, we never lose sight of the details and focus on the customer service our clients have come to expect.

Since our founding in 1997,...</i><br />Target victim <b>website</b>: <i>freedomhomecare.net</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>inhometexas.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18308</link>
<guid>fb5f57dae37645528974bdaa079a4746</guid>
<pubDate>Thu, 31 Oct 2024 13:30:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>inhometexas.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a38851d7d5239edd48ddde3c9d72e81e5545af0c3c8c57c52841de7f57e2346</i><br /><br />Threat actor <b>description</b>: <i>In-Home Attendant Services partners with individuals of every age and disability to assist them with living a more independent lifestyle. With either the CDS or Agency option, you have choices that help you take charge of who comes into your...</i><br />Target victim <b>website</b>: <i>inhometexas.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>sandray.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18306</link>
<guid>1b43914f3e2e1f22b1090eb86d69fe11</guid>
<pubDate>Thu, 31 Oct 2024 13:26:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>sandray.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c47c07bae4ccca5109505c4e98bc7e1749a997a1663c3cd1c0653e1239d34d53</i><br /><br />Threat actor <b>description</b>: <i>Sandray Precision Grinding Inc is located in Rockford, Illinois and has served the Midwest region for 50 years of grinding experience. Sandray Precision Grinding Inc operates in 2 buildings with 34,000 square feet and has a wide variety of...</i><br />Target victim <b>website</b>: <i>sandray.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>mpspromotions.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18305</link>
<guid>20d3a3223886430b6e2d17c9536ff9fd</guid>
<pubDate>Thu, 31 Oct 2024 13:24:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>mpspromotions.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a451aed99e0b419d1a9f1c7d765f0f3e1ecd6b6fbaac885788d74c953c939f57</i><br /><br />Threat actor <b>description</b>: <i>Our team succeeds in providing an affordable and reliable redemption service for all promotional needs. Our services are designed especially for new coupon users and small to mid-size consumer product companies.
Our business model and service...</i><br />Target victim <b>website</b>: <i>mpspromotions.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>hacla.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18301</link>
<guid>41111c8e0e924d1df17bf19f0da5c100</guid>
<pubDate>Thu, 31 Oct 2024 11:15:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>hacla.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a77a419bd42e702dfb6bb7d05571c4e283aa4d12a98aef6e05366c7653d5df7</i><br /><br />Threat actor <b>description</b>: <i><p>Federal.<br><br>“The Housing Authority of the City of Los Angeles (HACLA) is a public agency established in 1938 to provide affordable housing options to low-income residents of Los Angeles.”<br><br>Website: <a href="https://www.hacla.org/">https://www.hacla.org/</a><br><br>Revenue : $1.9B<br><br>Address: 2600 Wilshire Blvd Fl 5, Los Angeles, California, 90057, United States<br><br>Phone Number: &nbsp;(213) 252-5313<br><br><mark class="marker-yellow"><strong>Download link #1:</strong></mark> &nbsp;<a href="https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/HACLA/PROOF/">https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/HACLA/PROOF/</a><br><br><mark class="marker-yellow"><strong>Mirror:</strong></mark> <a href="https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/HACLA/PROOF/">https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/HACLA/PROOF/</a><br><br><mark class="marker-yellow"><strong>DATA DESCRIPTIONS:</strong></mark> Personal Identifiable Information, actual database backups, financial documents, executives\employees personal data, customer personal information, corporate confidential data and correspondence, etc.</p><p><img src="/uploads/SS_Card_f1e845c8c5.png" alt="SS Card.png"><img src="/uploads/Marisela_Ocampo_passport_956fdeb9ec.png" alt="Marisela Ocampo passport.png"><img src="/uploads/Patrick_Gregorian_passport_b6456d245f.png" alt="Patrick Gregorian passport.png"><img src="/uploads/HACLA_Audit_Information_2b49807173.png" alt="HACLA-Audit Information.png"><img src="/uploads/Mom_ID_and_SS_card_2024_8f4fbcf065.png" alt="Mom ID and SS card 2024.png"></p></i><br />Target victim <b>website</b>: <i>hacla.org</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Paul-White-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18288</link>
<guid>73091f523aa6c6f44674cdb664bf39b3</guid>
<pubDate>Thu, 31 Oct 2024 01:46:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Paul-White-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea76b499eb742ce3eb9ab611e704e2d9ea861c9a7742667888548bc878817314</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.paulwhitecompany.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Maval-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18285</link>
<guid>614f4f0d8a780ed18742f0193cd31af4</guid>
<pubDate>Wed, 30 Oct 2024 22:53:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Maval-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b766069b1c3ef6e26fee679438e9de732d7612d3db54752829d9faad6524ed0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.mavalgear.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Unlimited-Lawn-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18293</link>
<guid>d64295c7aa041a80e7d99b7aee97a920</guid>
<pubDate>Wed, 30 Oct 2024 22:33:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Unlimited-Lawn-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>58806aa04359ddcf403d3ae9bacdcada35f9f0b53764fc1d6fa253c65d77f718</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.unlimitedlawncare.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pureflow-Airdog</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18292</link>
<guid>d805f6b15edb8bceaf116526fad1609c</guid>
<pubDate>Wed, 30 Oct 2024 22:29:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Pureflow-Airdog</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac9340bdde11584f8a6d044139d79a4e7d18af72fe793d95bbd158aada418290</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.pureflowairdog.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>iFocus-Consulting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18291</link>
<guid>7d62228d788292ee693d12fd549e7745</guid>
<pubDate>Wed, 30 Oct 2024 22:26:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>iFocus-Consulting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa435cae7752d0181df66d47a7aa7f36b14a11d5d926265306ac0b0e4721f484</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ifocus.us</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pelsue</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18290</link>
<guid>06992f330e7e9270e0745934c304d173</guid>
<pubDate>Wed, 30 Oct 2024 22:23:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Pelsue</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b535496d0eefaa8489e29cfc0d8e054a485c4ffee3f34e7a8e8e8b2acdc3ef5c</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.pelsue.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sunrise-Express</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18289</link>
<guid>860df126db301831a32055bea29fb4da</guid>
<pubDate>Wed, 30 Oct 2024 22:17:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Sunrise-Express</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea9fa4d20e4d644e857efdf8e581a692c9ff3054019814d3d2c41291ffc7fe2b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.sunriseexpress.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jillamy-jillamy.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18281</link>
<guid>54c68c4d1dc2b4c2bbb2566f476d3157</guid>
<pubDate>Wed, 30 Oct 2024 15:55:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Jillamy-jillamy.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>49b4cbfcf437fbb3e40436a0fd340197b39e96bd6cc89c49f2ddb850c7bec4fc</i><br /><br />Threat actor <b>description</b>: <i>28 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>SmartSource-smartsource-inc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18280</link>
<guid>9ae2fccde08d974bbdc5ca567c08c19a</guid>
<pubDate>Wed, 30 Oct 2024 14:00:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>SmartSource-smartsource-inc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1bce2ae8a9f54d2726ba516e8b8bd1c9421feeefaa011d9b02682f6feff597c0</i><br /><br />Threat actor <b>description</b>: <i>81 GB</i><br />Target victim <b>website</b>: <i>smartsource-inc.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>tlie.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18279</link>
<guid>b7bc207b68ea9a373b68fbff4f6fdf49</guid>
<pubDate>Wed, 30 Oct 2024 10:33:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>tlie.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>39c453481082eb8158f3ce6b3ec9a19e6beae8c3dc08f212060edfe1006221cd</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] TLIE.org is an organization focused on providing educational resources and support for language instruction. It aims to enhance learning experiences through innovative teaching methods and materials. The organization collaborates with educators to develop effective strategies for language acquisition, fostering a community dedicated to improving language education and proficiency.</i><br />Target victim <b>website</b>: <i>tlie.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>CO.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18284</link>
<guid>4f8a318403063fea751813e0991d5bf6</guid>
<pubDate>Tue, 29 Oct 2024 22:17:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>CO.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33f828a1a59c1a9670838415ce7b36b7cc2e65903ea2e13cb975b617208d10c8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Spirit-Lake-Community-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18274</link>
<guid>9b7edc4dfd8e15db7b795826ad0a967b</guid>
<pubDate>Tue, 29 Oct 2024 21:52:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Spirit-Lake-Community-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba12381bb7996e3c1e0fd4c5247bb835b393440138e526bd499d8b6d9c1539fe</i><br /><br />Threat actor <b>description</b>: <i>The Spirit Lake Community School District is a rural public school district based in Spirit Lake, Iowa, United States. The district includes three schools: Spirit Lake High School, Spirit Lake Middle School, Spirit Lake Elementary School. At the beginning of 2024, the number of students enrolled was 1304 people, the number of teachers was 100 people.</i><br />Target victim <b>website</b>: <i>spirit-lake.k12.ia.us</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.baymark.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18273</link>
<guid>702e52be319c9b692e5225702830df04</guid>
<pubDate>Tue, 29 Oct 2024 21:22:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.baymark.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e9051909d35a78f4209bd9fce2bdf50a829966fc677d84ecabc275548b2f56bf</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] BayMark Health Services is a leading provider specializing in the treatment of opioid addiction and related conditions. They offer medication-assisted treatment programs, incorporating medications like methadone and buprenorphine, alongside counseling and support services. With numerous facilities across North America, BayMark is dedicated to helping individuals achieve recovery and improve their quality of life.</i><br />Target victim <b>website</b>: <i>www.baymark.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Astac</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18277</link>
<guid>776af9671dbfa3ac15c6e0711001bdea</guid>
<pubDate>Tue, 29 Oct 2024 21:19:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Astac</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c1e3df795d225c011c8325a0cf4226aeffc062099aa5225193c0105ec7ecb6d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.astac.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dana-Safety-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18276</link>
<guid>98b1e16f65a1500023372d2b362c0991</guid>
<pubDate>Tue, 29 Oct 2024 21:16:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Dana-Safety-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a168384893ab43e81a852a9af0cf3f97efa497092dedf814409314ffe68ea900</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.danasafetysupply.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dirksen-Screw-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18275</link>
<guid>1e0150ca25987676d127c0563c500ade</guid>
<pubDate>Tue, 29 Oct 2024 21:13:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Dirksen-Screw-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8fade74428e63eac1709475b41e2068b0bf3a7dda951cbb78b7f2de3e8d0b8ae</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.dirksenscrew.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>hcfinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18269</link>
<guid>671dc7ee02cacc4826f3e4b105508805</guid>
<pubDate>Tue, 29 Oct 2024 19:29:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>hcfinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a5d227b7df9af0de60076a8a4627b6bebd073ce06332750324c15aa8e480b4a</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] HCF Inc. is a company specializing in financial services, focusing on providing customized insurance and investment solutions. With a commitment to client-centric service, they offer a range of products including life insurance, retirement planning, and wealth management. Their expertise lies in tailoring strategies to meet individual and business needs, ensuring financial security and growth for their clients.</i><br />Target victim <b>website</b>: <i>hcfinc.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.ztexconstruction.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18270</link>
<guid>979a659fe9f4cc5f2dfef047b5da50ab</guid>
<pubDate>Tue, 29 Oct 2024 19:26:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.ztexconstruction.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33f35fe9a34ca659f6925bf5f01d4a0d53701bd773abfc766f1b0e13a827ea20</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] ZTEX Construction is a Texas-based construction firm specializing in heavy civil, commercial, and residential projects. They offer services including earthwork, concrete paving, underground utilities, and site development. Known for quality workmanship and timely project delivery, ZTEX serves clients across various sectors, leveraging advanced technology and skilled professionals to meet diverse construction needs.</i><br />Target victim <b>website</b>: <i>www.ztexconstruction.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>daserv.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18272</link>
<guid>7fcfe08f607be8a5080919cac82eb78a</guid>
<pubDate>Tue, 29 Oct 2024 19:17:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>daserv.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7cff7afbad212ee9dc5bf2f27e6daac2cbc471af1b8f87f38edd976dcfdb5c10</i><br /><br />Threat actor <b>description</b>: <i>Distribution Alternatives, Inc. (DA) is a third-party logistics (3PL) company that offers warehousing, fulfillment, and distribution services: DA offers a range of services, including warehousing, pick and pack fulfillment, LTL shipping, EDI processing, and more. They also provide direct-to-consumer fulfillment for e-commerce and catalog orders.SITE: www.daserv.com Address : 6870 21st Avenue South Lino Lakes, Minnesota 55038 United StitesTEL#: 800-346-3245ALL DATA SIZE: ≈450gb 1. Financial data, Accounting 2. Employees, Customers forms with personal info 3. Human Resources 4. Users folders with personal docs 5. Tax, 401k data forms, confidential agrements, NDAs… & etc…</i><br />Target victim <b>website</b>: <i>daserv.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>celo.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18271</link>
<guid>7c36d0294e81c33334bc3ba033bddab8</guid>
<pubDate>Tue, 29 Oct 2024 19:14:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>celo.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a04cafe646f631c9a87c129ed5d2f5f4f33a1b03fd59c30bf53160d88e5617c</i><br /><br />Threat actor <b>description</b>: <i>CELO is a brand dedicated to the design and manufacture of high-precision fixing and fastening solutions for the fields of industry and construction.SITE: www.celo.com Address : 2929 32nd St SE, Grand Rapids Michigan, 49512 United StatesALL DATA SIZE: ≈250gb 1. Human Resources 2. Finance data 3. Accounting 4. Payroll 5. 401k, Tax data 6. Users: Employees personal folders and docs 7. Clients & etc…</i><br />Target victim <b>website</b>: <i>celo.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>CLAS-Information-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18258</link>
<guid>6d98e78fc02e40d38aeabfc690361271</guid>
<pubDate>Tue, 29 Oct 2024 18:35:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>CLAS-Information-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>85efb4b8cda5db82a5f0ec03335be69647c621aee6d08d39960e471cc1213a30</i><br /><br />Threat actor <b>description</b>: <i>CLAS Information Services is a legal and financial services firm specializing in the search, filing and retrieval of public records in the United States and abroad.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>rosenlegal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18267</link>
<guid>13c0a0edfa0a93c79ff4c6b17dd8d9fb</guid>
<pubDate>Tue, 29 Oct 2024 17:25:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>rosenlegal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6d2547d645f3bb92c362e3eb130714fc11daab694eb8d944315985abda654ad</i><br /><br />Threat actor <b>description</b>: <i>The Rosen Law Firm, P.A. is dedicated to recovering damages for shareholders victimized by securities fraud and directors’ and officers’ breaches of fiduciary duty. Our attorneys have a wealth of knowledge and experience handling complex financial litigation and winning significant victories and settlements for our clients. By focusing exclusively on securities class actions and shareholder litigation, we have risen to the forefront of plaintiffs’ firms and have recovered damages totaling hundreds of millions of dollars for our clients.SITE: www.rosenlegal.com Address : 275 Madison Avenue, 40th Floor New York, NY 10016 United StatesTEL#: 212.686.1060ALL DATA SIZE: ≈500gb+ 1. Clients personal docs and forms 2. Employees personal folders & documents 3. Financial, Accountings, Payroll, Tax data 4. Customers data 5. Confidential data, NDAs data & more etc…</i><br />Target victim <b>website</b>: <i>rosenlegal.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>weberpackaging.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18266</link>
<guid>b2ec5fbfb158548e1c4a3c02b2752a51</guid>
<pubDate>Tue, 29 Oct 2024 17:22:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>weberpackaging.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9cdd495cd240c0769ff6e08c9e344685560e78b916904a27123e287623d53707</i><br /><br />Threat actor <b>description</b>: <i>Weber Packaging Solutions is a leading innovator in the design, engineering, manufacture and supply of high-performance pressure-sensitive labels, labeling systems and ink jet systems.SITE: www.weberpackaging.com Address : 711 W. Algonquin Rd. Arlington Heights, IL 60005 United StatesTEL#: 1.800.843.4242ALL DATA SIZE: ≈900gb 1. Personal documents 2. Financial data, Accounting, Payroll 3. Human Resources 4. Budgets 5. Confidential data, NDA & etc…</i><br />Target victim <b>website</b>: <i>weberpackaging.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Surfnet-Communications</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18264</link>
<guid>a1bdeb626662373c4e0f1784388a52b7</guid>
<pubDate>Tue, 29 Oct 2024 17:19:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>arcusmedia</b> claims attack for <b>Surfnet-Communications</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8d77bc02f3a2928063fec49019d173713c8da6b98ef5b61da9441b162be4c20</i><br /><br />Threat actor <b>description</b>: <i>www.surfnetc.com Surfnet Communications is a high-speed...</i><br />Target victim <b>website</b>: <i>surfnetc.com</i>]]></description>
<category>arcusmedia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jordan-Public-Schools-httpswww.jordan.k12.mn.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18257</link>
<guid>df0513ec662f50b4860af9c19f5ddc70</guid>
<pubDate>Tue, 29 Oct 2024 13:43:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Jordan-Public-Schools-httpswww.jordan.k12.mn.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d4673abd754c73c825906fc09810898948d4d6d054d21dee05515778d71bb23f</i><br /><br />Threat actor <b>description</b>: <i>11 GB</i><br />Target victim <b>website</b>: <i>jordan.k12.mn.us</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sage-Automotive-Interior-sageautomotiveinteriors.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18255</link>
<guid>7ce6aa193902742535f640eff746a494</guid>
<pubDate>Tue, 29 Oct 2024 12:23:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Sage-Automotive-Interior-sageautomotiveinteriors.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>27968a78dd7f3408a69e70d1774270339cc3b6e469024c10e7ba867cc987836d</i><br /><br />Threat actor <b>description</b>: <i>76 GB</i><br />Target victim <b>website</b>: <i>sageautomotiveinteriors.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>nathcompanies.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18256</link>
<guid>70e5f57f75c29b0811aa98799bb0a61f</guid>
<pubDate>Tue, 29 Oct 2024 12:21:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>nathcompanies.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca7c1ccb4de1084ceb8cb8d31933fcdd6633cbb27727b4da47b852d212af601c</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] Nath Companies is a diversified business group engaged in hospitality, real estate, and development sectors. The company operates hotels, restaurants, and offers management services. It focuses on delivering quality service and creating value in its ventures. With a commitment to excellence and innovation, Nath Companies aims to enhance customer experiences and expand its market presence.</i><br />Target victim <b>website</b>: <i>nathcompanies.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Berridge-Manufacturing-Co.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18253</link>
<guid>152aa228ed62715e2acd4f88ef0f2a2e</guid>
<pubDate>Tue, 29 Oct 2024 10:14:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>Berridge-Manufacturing-Co.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>545db93ee5fcf175a21c9f84b900bf2269d423ae46fcfd973cc7f1352cb1b346</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] Berridge Manufacturing Co. specializes in the production of high-quality metal roofing and siding products. Established in 1970, the company is known for its innovative design and engineering, offering a wide range of metal panels, architectural products, and portable roll-forming machines. Berridge is committed to sustainability and provides solutions for both residential and commercial applications.</i><br />Target victim <b>website</b>: <i>berridge.com</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mastery-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18250</link>
<guid>d40c4b6c8105a36bbe7f46b2375446e6</guid>
<pubDate>Tue, 29 Oct 2024 04:39:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Mastery-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ce88343214cc0d0a3b3df9a52dadc2e91a56ac6a70e733d59b8d7a0c2c67840</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2001, Mastery Charter Schools is a charter school network in Philadelphia, Pennsylvania and Camden, New Jersey.</i><br />Target victim <b>website</b>: <i>www.masterycharter.org</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>KS-Tool--Mfg-Co.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18248</link>
<guid>83756b985266168d0d29c6c9a146db50</guid>
<pubDate>Mon, 28 Oct 2024 22:11:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>KS-Tool--Mfg-Co.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25d2eaf45a87556c4d2d008d81a9c4290615aa796ffab67db9d6eb3cfa64689f</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] K&S Tool & Mfg Co. is a company specializing in precision manufacturing and tooling services. They offer a range of services including CNC machining, custom tool making, and engineering support. Known for high-quality craftsmanship and reliability, K&S serves various industries by providing tailored solutions that meet specific client needs. Their commitment to innovation ensures they stay at the forefront of manufacturing technology.</i><br />Target victim <b>website</b>: <i>ks-tool.com</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>phxcmp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18244</link>
<guid>52a1b56880f19a7eee1c913d37b9a4ba</guid>
<pubDate>Mon, 28 Oct 2024 18:23:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>phxcmp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc56159e16300496e3c7d8e7a641c4876b85e8df5de0ea296b3d63cd3f59eeaa</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] I'm sorry, but I couldn't find any information on a company specifically identified as "phxcmp.com." It's possible that the company is either not widely recognized, operates under a different name, or is a relatively new or niche entity that hasn't garnered significant public attention. If you have any additional details or context, I'd be happy to try assisting you further.</i><br />Target victim <b>website</b>: <i>phxcmp.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>mmpunion.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18241</link>
<guid>de25b9df3e268442417dc026149880e4</guid>
<pubDate>Mon, 28 Oct 2024 18:17:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>mmpunion.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>002d5610402ea3bc30dff414db40e38013e12220e99983afba102d18d9c1c77f</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] I'm sorry, but I don't have specific information about "mmpunion.com." It's possible that it's a smaller or less well-known company, or that it falls outside the scope of available data. For detailed and accurate information, I recommend checking the company's official website or searching for recent articles or reviews about them.</i><br />Target victim <b>website</b>: <i>mmpunion.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>flueid.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18237</link>
<guid>d0f4d66ae3725509ded460e6a0c4e38d</guid>
<pubDate>Mon, 28 Oct 2024 14:48:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>flueid.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>904305d93dd0e0d4422bcc1d38ff8b907bafa6afebc7393de3cbf3266116eeae</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] Flueid is a technology company that focuses on streamlining the real estate transaction process. They provide digital solutions to enhance efficiency and transparency in property transactions, offering services like title data and analytics. Their platform integrates with existing systems to automate workflows, aiming to reduce closing times and improve the overall experience for stakeholders in the real estate market.</i><br />Target victim <b>website</b>: <i>flueid.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Evergreen-SD50-evergreensd50.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18239</link>
<guid>fa6d3cc166fbfbf005c9e77d96cba283</guid>
<pubDate>Mon, 28 Oct 2024 13:17:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Evergreen-SD50-evergreensd50.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6d2191741bb6b9f93aec364f8e4c904e8e30ae1924794d9ad1f5cf4c88ca1ca9</i><br /><br />Threat actor <b>description</b>: <i>5,1 GB</i><br />Target victim <b>website</b>: <i>evergreensd50.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>guymontigers.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18236</link>
<guid>d5645f3d4fef0a78cc97068102507570</guid>
<pubDate>Mon, 28 Oct 2024 13:07:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>guymontigers.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9048b3b8a26d8d976ebb5751c9ff0fc13ae229b8485197d63699015fd9094448</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] Guymontigers.com is the official website for Guymon Public Schools, located in Guymon, Oklahoma. It serves as a central hub for information related to the district, including updates on school events, academic programs, sports activities, and community engagement. The site provides resources for students, parents, and staff, aiming to enhance communication and support educational initiatives within the district.</i><br />Target victim <b>website</b>: <i>guymontigers.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>harrispersonalinjury.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18233</link>
<guid>690af400ca2ca5b18049a36bdf1974d8</guid>
<pubDate>Mon, 28 Oct 2024 10:52:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>harrispersonalinjury.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2bfb31da61f7941b89fb7a14454e07d9f738618388887344eb5ffbc4c63db130</i><br /><br />Threat actor <b>description</b>: <i>[IA generated] Harris Personal Injury Lawyers, Inc. is a law firm specializing in personal injury cases. They provide legal representation to individuals who have been injured due to accidents, offering services such as negotiating settlements and advocating for clients in court. The firm is known for its commitment to securing fair compensation for clients and operates primarily in California, emphasizing personalized legal support.</i><br />Target victim <b>website</b>: <i>harrispersonalinjury.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Texas-Tech-University-Health-Sciences-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18226</link>
<guid>ddd580fa02bd7a37592bca4068165e0e</guid>
<pubDate>Sun, 27 Oct 2024 10:17:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Texas-Tech-University-Health-Sciences-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5801d9c5e4f2e74804be0ff999737092194a9428afe184861a7aa1aca6af17fb</i><br /><br />Threat actor <b>description</b>: <i>Beginning in 1969 as the Texas Tech University School of Medicine, Texas Tech University Health Sciences Center (TTUHSC) is now a five-school, comprehensive health-related university with campuses in Abilene, Amarillo, Dallas/Fort Worth, Lubbock and Midland/Odessa.
							We present to you a large collection of confidential documents, including - patient data, medical research, a large set of SQL databases.</i><br />Target victim <b>website</b>: <i>ttuhsc.edu</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>TV-Guide-Magazine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18221</link>
<guid>e7fe8c27f5a7ad85187a9a17758e7043</guid>
<pubDate>Sun, 27 Oct 2024 03:27:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>TV-Guide-Magazine</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd4c77ef61bc4244301e851513d19269cfb964bec0c90f534e2a4f0944b7ff97</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.tvguidemagazine.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Positive-Business-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18219</link>
<guid>67845006067b1ce96cc0e291320e7149</guid>
<pubDate>Sun, 27 Oct 2024 01:48:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Positive-Business-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c309b567eb488e8a750c872380d5cd2f8e6c9cbcd5ed54ce12a6373a406e9ee</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.pbsinet.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>C--C-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18218</link>
<guid>87b15134b115585c4e90a845797d72aa</guid>
<pubDate>Sat, 26 Oct 2024 22:53:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>C--C-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f058cf525b84f4a711915c213b468ebd7d1780a96646c1695441386e90dd9c8</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.cncinds.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Eye-Clinic-Surgicenter</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18216</link>
<guid>1255580674a2f99d63e59950c956bf97</guid>
<pubDate>Sat, 26 Oct 2024 19:35:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>The-Eye-Clinic-Surgicenter</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c17a5021b7d20494572ccb24216807501ac9118dc15a017dc95fcd884525f2d4</i><br /><br />Threat actor <b>description</b>: <i><p>Dear customers!</p><p>We are thrilled to offer you exclusive access to over 59 GB of confidential data from The Eye Clinic Surgicenter, a renowned provider of comprehensive eye care located in Billings, Montana, with additional locations in Red Lodge, Lander, and Thermopolis. For over four decades, The Eye Clinic Surgicenter has led the way in eye care services, offering general eye care, LASIK, cataract surgery, glaucoma treatment, corneal procedures, and retinal care. As a pioneer in advanced technology, it was the first in Montana to introduce procedures like corneal cross linking and iStent surgery for glaucoma.</p><p>The clinics LASIK services are especially noteworthy, featuring advanced techniques such as wavefront guided LASIK for a highly customized vision correction experience. For patients not suitable for traditional LASIK, they provide alternative options like PRK and LASEK. The Eye Clinic Surgicenter is committed to delivering personalized care using state of the art equipment, with board certified surgeons ensuring top quality outcomes for vision correction procedures.</p><p>Specialized treatments at the clinic are enhanced by collaborations with expert retinal consultants, who address complex eye conditions including macular degeneration, diabetic retinopathy, and retinal detachment. This enables the clinic to provide comprehensive care that covers both routine and advanced eye health needs.</p><p>This comprehensive data pack includes:</p><p>Employee data e.g., addresses, dates of birth, phone numbers, SSNs, drivers license scans<br>Client information including medical records, diagnoses, lab test results<br>Financial documents bank statements, tax forms<br>Personal data addresses, dates of birth, phone numbers, SSNs<br>Agreements and certificates<br>Medical reports and health certificates<br>Documents from government and insurance agencies<br>Termination letters<br>Insurance policy details<br>These records provide invaluable insights into The Eye Clinic Surgicenters operations and may be of significant interest to healthcare professionals, business analysts, and other stakeholders.</p><p>To gain access to this exclusive 59 GB data pack, simply click the Buy button and provide your contact details for registration. Our team will promptly reach out to ensure a secure and confidential transaction.</p><p>Dont miss the opportunity to uncover valuable information from The Eye Clinic Surgicenter with this exclusive data pack!<br>&nbsp;</p></i><br />Target victim <b>website</b>: <i>theeyeclinicsurgicenter.com</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Westwood-Country-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18217</link>
<guid>8849f0a976aa5332853e848655a1d28f</guid>
<pubDate>Sat, 26 Oct 2024 19:35:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Westwood-Country-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>973a523fba2bf7f41347218f8e301ee8e58dfc413a7060e9d2bb6796c477575c</i><br /><br />Threat actor <b>description</b>: <i><p>Dear customers!</p><p>We are excited to offer exclusive access to over 31 GB of confidential data from Westwood Country Club, a prestigious private club located in Saint Louis, Missouri. Established in 1907, Westwood Country Club boasts a rich history, offering its members an array of recreational and social amenities, including an 18 hole golf course, tennis courts, swimming facilities, and dining options. Known for its classic charm, the club has evolved over the years to maintain its heritage while updating facilities to meet modern standards.</p><p>The golf course at Westwood is a key feature, designed to promote a walking first experience, complemented by a caddie program. Westwood adheres to a formal dress code for all activities, providing members with guidelines for golf, tennis, and social events. Membership grants exclusive access to various dining services, event reservations, and social functions, fostering a tight knit community.</p><p>This comprehensive data pack includes:</p><p>Employee data personal details, contact information<br>Member information contact details, marital status, club member recommendations<br>Contracts and agreements insurance policies, commercial agreements<br>Financial documents bank statements, credit agreements, invoices<br>Membership documents applications, operational documents<br>Sales and tax reports checks, receipts<br>Medical documents and consent forms child medical care consents, liability insurance certificates<br>And much more<br>This data pack provides valuable insights into Westwood Country Clubs operations and may be of significant interest to professionals in the private club industry, business analysis, and other stakeholders.</p><p>To gain access to this exclusive 31 GB data pack, simply click the Buy button and provide your contact details for registration. Our team will assist you in ensuring a secure and confidential transaction.</p><p>Dont miss the opportunity to access detailed information from Westwood Country Club with this exclusive data pack!</p><p>&nbsp;</p></i><br />Target victim <b>website</b>: <i>westwoodcc.com</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Legacy-Treatment-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18212</link>
<guid>7df2a3f0d266869c59413708e4acdb01</guid>
<pubDate>Sat, 26 Oct 2024 11:38:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Legacy-Treatment-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>59e4c1ea0844c824c87cf1bd14547a52d5f2ae94a841af61c6e49557786a2200</i><br /><br />Threat actor <b>description</b>: <i>Legacy Treatment Services has locations in Burlington, Atlantic, Camden, and Middlesex counties. They offer mental and behavioral health services, addiction services, counseling, medication management and more. 
							And we offer you internal documents, patient records, and a large SQL database.</i><br />Target victim <b>website</b>: <i>legacytreatment.org</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Evergreen-Public-Schools-evergreenps.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18199</link>
<guid>f925407353b2aaefee1a0c3b31be5fc1</guid>
<pubDate>Fri, 25 Oct 2024 16:02:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Evergreen-Public-Schools-evergreenps.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>90722f31b273562f16cf85b0a44ffe763625d592a34f4deb4f88b57099e2c51f</i><br /><br />Threat actor <b>description</b>: <i>5,1 GB</i><br />Target victim <b>website</b>: <i>evergreenps.org</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>hcsgcorp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18195</link>
<guid>984061ae6a225595438e55d05ee4f273</guid>
<pubDate>Fri, 25 Oct 2024 13:23:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>underground</b> claims attack for <b>hcsgcorp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d8ca1e4ef4a114249fc228bad4225756a305d27f57184e9e7f5987596284ec5d</i><br /><br />Threat actor <b>description</b>: <i>Revenue:$1.7 Billion - Country :USA</i><br />Target victim <b>website</b>: <i>hcsgcorp.com</i>]]></description>
<category>underground</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cucamonga-Valley-Water-District-cvwdwater.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18193</link>
<guid>fac20ee3c5bc1659bc8e6ba2771c5b31</guid>
<pubDate>Fri, 25 Oct 2024 13:11:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Cucamonga-Valley-Water-District-cvwdwater.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5eea6d96842d478d0b8d3e8c499772a6df73be270f8da132600ab80ee6528f04</i><br /><br />Threat actor <b>description</b>: <i>41 GB</i><br />Target victim <b>website</b>: <i>cvwdwater.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Evergreen-Local-School-District-evgvikings.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18194</link>
<guid>2b2789af28ab82a0de59e102b5bb89a0</guid>
<pubDate>Fri, 25 Oct 2024 13:10:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Evergreen-Local-School-District-evgvikings.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>233441995c06bd04b3658893a00d78845ca65784ce87ac06b2736cf65117161a</i><br /><br />Threat actor <b>description</b>: <i>5,1 GB</i><br />Target victim <b>website</b>: <i>evgvikings.org</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Precision-Electrical-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18185</link>
<guid>702f5b573e1388350c31d2dcd21275d4</guid>
<pubDate>Fri, 25 Oct 2024 10:12:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Precision-Electrical-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>157f622d13d3e23911020e41db19c0a8216724569b4fc2f7572e9ae7a1e1604f</i><br /><br />Threat actor <b>description</b>: <i>PROOFS(DOCUMENTS, DL)</i><br />Target victim <b>website</b>: <i>precisionelectricalsystems.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Denkali</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18186</link>
<guid>09c180f92cbf0a9427599a415783ad77</guid>
<pubDate>Fri, 25 Oct 2024 10:12:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Denkali</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad1734595f12eab25ccfd8b841942e7e0b4de0ebf392fc3c62a25498fe5bb9a4</i><br /><br />Threat actor <b>description</b>: <i>PROOFS (PROJECTS, DOCUMENTS)</i><br />Target victim <b>website</b>: <i>denkali.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>HUBBARDHALL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18189</link>
<guid>7da5911f451a4d399d9739416bec1535</guid>
<pubDate>Fri, 25 Oct 2024 07:02:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HUBBARDHALL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e198bfbd69824315d93b8b1ff48aed5cd7a5680c7ad7dc7d8a8abbca30d545f8</i><br /><br />Threat actor <b>description</b>: <i>_URL_</i><br />Target victim <b>website</b>: <i>HUBBARDHALL.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>omara-ag.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18182</link>
<guid>1bc0eecbf9203e4e6aaf81a7ca635c62</guid>
<pubDate>Fri, 25 Oct 2024 06:42:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>omara-ag.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6f511d16daab2cf65199225f910c65eb6abbce23805074dbac52b5e9ec6d2f0</i><br /><br />Threat actor <b>description</b>: <i>I'm sorry, but I don't have specific information about "omara-ag.com" in my training data up to October 2023. It's possible that it's a smaller or lesser-known company, or it might have been established after my last update. For accurate and detailed information, I recommend checking the company's official website or looking for recent sources that might have information about them.</i><br />Target victim <b>website</b>: <i>www.omara-ag.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>nrcs.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18181</link>
<guid>2ccec25c9dd14baf6eefcf64304fa638</guid>
<pubDate>Fri, 25 Oct 2024 06:39:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>nrcs.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7fff71d5d80103aafcdf2924726e2ad6591f207d020ca60c00a79d9f6ae44358</i><br /><br />Threat actor <b>description</b>: <i>NRCS.net is an Italian-based company specializing in the development and provision of software solutions for the hospitality and retail sectors. It offers a range of services, including point-of-sale systems, management software, and digital payment solutions. The company focuses on enhancing operational efficiency and customer experience through innovative technology tailored to client needs.</i><br />Target victim <b>website</b>: <i>www.nrcs.net</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>zyloware.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18180</link>
<guid>f3d205b3f8c2bb28c46e204c6f1b499d</guid>
<pubDate>Fri, 25 Oct 2024 05:07:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>zyloware.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f8d265893c46a14a77536e77a96ccbb20af1ac0a36fc7ddd40ced587e91f457</i><br /><br />Threat actor <b>description</b>: <i>Zyloware is a prominent eyewear company known for its innovative designs and high-quality products. Established in 1923, it has a rich history in the optical industry and offers a wide range of eyewear, including fashion-forward glasses and sunglasses for men and women. The company is committed to style, comfort, and durability, and caters to various consumer needs through its diverse brand portfolio.</i><br />Target victim <b>website</b>: <i>www.zyloware.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>unitedsprinkler.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18178</link>
<guid>821e779cfa8e08b266028c1955cf8ab7</guid>
<pubDate>Fri, 25 Oct 2024 03:38:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>unitedsprinkler.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f0ec9e31ea4b4657b75eab58cc8d3ad8256439726d8ecbb9152a58d0ebf9365d</i><br /><br />Threat actor <b>description</b>: <i>United Sprinkler is a company specializing in the design, installation, and maintenance of fire protection sprinkler systems. They serve a variety of sectors, including residential, commercial, and industrial. United Sprinkler is known for its commitment to safety, quality service, and compliance with fire safety regulations, aiming to provide reliable fire protection solutions to their clients.</i><br />Target victim <b>website</b>: <i>unitedsprinkler.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pacific-Pulmonary-Medical-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18173</link>
<guid>9ebd41e6cbc1e14780805f6fc0d65867</guid>
<pubDate>Fri, 25 Oct 2024 03:25:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Pacific-Pulmonary-Medical-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>761b7c65b4a7800a58844e5fb38bae2277c9095118b66e9c21f998c2f93dfa37</i><br /><br />Threat actor <b>description</b>: <i>Medical records and personal data of all patients from 2021 Company representative should follow the instructions to contact us before time runs out https://pacificpulm.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Centrillion-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18177</link>
<guid>8288eb462e80418e70a393d245a984ce</guid>
<pubDate>Fri, 25 Oct 2024 02:10:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Centrillion-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4b648699ab1d5d8128d87ac35668aeaf329f64075f7454093b54d82790358d3d</i><br /><br />Threat actor <b>description</b>: <i>!!! IF THE COMPANY DOES NOT CONTACT US SOON, THE DATA WILL BE PUBLISHED !!!!  In situ synthesized DNA Chips can produce billions of different DNA sensors in a single wafer. Centrillion was founded to enable next generation DNA Chips and their applications.</i><br />Target victim <b>website</b>: <i>www.centrilliontech.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aspen-Healthcare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18171</link>
<guid>5c268beaeaed497f6d7b38ed84745895</guid>
<pubDate>Fri, 25 Oct 2024 01:48:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Aspen-Healthcare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d1f288680b32228258fb8db8e47b327c703c71e5dbd3572b46f785ae86a2b336</i><br /><br />Threat actor <b>description</b>: <i>More than 1500 Medical Records and Personal Information https://aspenhealthcareservices.com Time until publication:</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Spine-by-Villamil-MD</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18175</link>
<guid>ca5d2301e833bedfa62053bb8210da20</guid>
<pubDate>Fri, 25 Oct 2024 00:37:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Spine-by-Villamil-MD</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>965fbb936d644f8dc48c7283667b68af12c4ab2d138348b8ffe34e64dac89474</i><br /><br />Threat actor <b>description</b>: <i>More than 1000 medical data of the company’s patients https://spinebyvillamilmd.com/ Time until publication:</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.resourceinternational.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18172</link>
<guid>f03f48732b859ddd3d3fdd90c2d2d8bb</guid>
<pubDate>Thu, 24 Oct 2024 21:39:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.resourceinternational.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6f87144f3349ecfc0090133f386cbedcbf1178bf3504dbc7935cf4301f67d18</i><br /><br />Threat actor <b>description</b>: <i>Resource International is an engineering and consulting firm specializing in civil engineering, environmental services, and construction management. They offer a range of services including design, surveying, and inspection for infrastructure projects. The company focuses on delivering innovative solutions and ensuring quality and sustainability in their projects, serving both public and private sector clients.</i><br />Target victim <b>website</b>: <i>www.resourceinternational.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>McElroy-Quirk--Burch-APC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18165</link>
<guid>825ab77fe4eb3419db2fc9c6ceff7146</guid>
<pubDate>Thu, 24 Oct 2024 21:03:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>McElroy-Quirk--Burch-APC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a5dfcfdf01f688185fd22da6190b01bb29cb25abdd3c1976e85dbe5aa3b53078</i><br /><br />Threat actor <b>description</b>: <i>McElroy, Quirk & Burch, APC is a company that operates in the Accounting Services industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>bulloch.solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18169</link>
<guid>b0cf1ee86c16266cb50942fcaac40fe8</guid>
<pubDate>Thu, 24 Oct 2024 20:20:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>bulloch.solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f676da7dd1177c79f8daea4f42fb2ed2966acc4e4f8047aaef2308cbe067611</i><br /><br />Threat actor <b>description</b>: <i>bulloch.solutions is a company that specializes in providing innovative technology and communication services. They focus on delivering reliable internet, phone, and other connectivity solutions tailored to meet the needs of both residential and business customers. Known for their customer-centric approach, bulloch.solutions emphasizes quality service and support, ensuring seamless integration and optimal performance for their clients.</i><br />Target victim <b>website</b>: <i>bulloch.solutions</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.kciconst.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18170</link>
<guid>ad801013f6b931f32fd2ac60bfab8126</guid>
<pubDate>Thu, 24 Oct 2024 20:17:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.kciconst.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>494bb6bd0ea0b3125108f175e4a226f0a82ca7402735ae5b652b105618e97c36</i><br /><br />Threat actor <b>description</b>: <i>KCI Construction is a company specializing in construction services, including commercial, industrial, and infrastructure projects. They focus on delivering high-quality construction solutions, emphasizing safety, efficiency, and innovation. With a team of experienced professionals, KCI Construction aims to meet client needs and exceed expectations through comprehensive project management and execution.</i><br />Target victim <b>website</b>: <i>www.kciconst.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Drug-and-Alcohol-Treatment-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18167</link>
<guid>676146e02384d1b95d54608ca2c60009</guid>
<pubDate>Thu, 24 Oct 2024 18:39:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Drug-and-Alcohol-Treatment-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eb210d3d885081511c3aecd6df27f64c409d8b1edd3583684ce5c508dfbcc2cd</i><br /><br />Threat actor <b>description</b>: <i>Drug and Alcohol Treatment Service is Lackawanna County's leading outpatient drug and alcohol treatment center. The focus of treatment at DATS is centered on changing destructive behaviors and developing a lifestyle free of mood altering drugs.
							At your disposal is the SAGE accounting database, personal data of employees, SQL database, personal data of patients</i><br />Target victim <b>website</b>: <i>datsrecovery.org</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>tuggleduggins.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18166</link>
<guid>950b5a3a313f74ceb036a5196ef6f735</guid>
<pubDate>Thu, 24 Oct 2024 17:07:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>tuggleduggins.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a040ae828c1c3b67546a61236aee63dc69dba522e5b2899e0c19bcda9cf7ba3d</i><br /><br />Threat actor <b>description</b>: <i>In choosing a law firm for your business and personal needs, a good starting point is reputation. Tuggle Duggins has over a 42 year heritage of serving businesses and owners in virtually all aspects of business law, taxation, dispute resolution and litigation, bankruptcy, real estate, commercial transactions, and wealth management.SITE: www.tuggleduggins.com Address : 400 Bellemeade Street, Suite 800 Greensboro, NC 27401 Unated StatesTEL#: 336.378.1431ALL DATA SIZE: ≈300gb 1. Corporate data, Financial data… 2. NDA, Confidential data, Confidential Agreements, etc… 3. Human Resources, Payroll, Tax 4. Personal employees documents and info 5. Clients, customers data & etc…</i><br />Target victim <b>website</b>: <i>tuggleduggins.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Value-City-NJ-valuecitynj.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18153</link>
<guid>409072cb60e202d2797a91e395909240</guid>
<pubDate>Thu, 24 Oct 2024 15:35:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Value-City-NJ-valuecitynj.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>999121487dc2019ebd56c39d1c5ce984e0497a5d8efa1a9bef19ff18b3073f34</i><br /><br />Threat actor <b>description</b>: <i>25 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>pkaufmann.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18155</link>
<guid>0abf05b2c2c603eaaa68e9b8526393bc</guid>
<pubDate>Thu, 24 Oct 2024 15:32:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>pkaufmann.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6d74a731494ddb5b21ecbf90dbed6c375b68065a27a2611b12e7771b1a473a7f</i><br /><br />Threat actor <b>description</b>: <i>P/Kaufmann Fabrics is the premier home furnishings textile converter, having supplied our customers with expertly-crafted designs for over sixty fi...</i><br />Target victim <b>website</b>: <i>pkaufmann.com</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>carolinaarthritis.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18152</link>
<guid>cea82cba7b2d06851ba0448f43b1fdc1</guid>
<pubDate>Thu, 24 Oct 2024 14:15:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>carolinaarthritis.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa91b4ee8b64752af79add0cc3c8542f611bc3921aa0f4415945bfab2360fe66</i><br /><br />Threat actor <b>description</b>: <i>Welcome to Carolina Arthritis
Since its founding in 1991, Carolina Arthritis has been leading the way in the diagnosis and treatment of arthritis, musculoskeletal disorders, connective tissue diseases, autoimmune illnesses and osteoporosis. At...</i><br />Target victim <b>website</b>: <i>carolinaarthritis.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>Apache-Mills-Inc.-apachemills.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18150</link>
<guid>cd4b78a5026aaff9159f31e5c5997089</guid>
<pubDate>Thu, 24 Oct 2024 14:05:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Apache-Mills-Inc.-apachemills.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>299eb05e5b897b351f032aa176ff02c74ba28f51678de24e17e7ebfb26ccade2</i><br /><br />Threat actor <b>description</b>: <i>27 GB</i><br />Target victim <b>website</b>: <i>apachemills.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>thompsoncreek.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18147</link>
<guid>41371be284c70c592049717c38e42081</guid>
<pubDate>Thu, 24 Oct 2024 14:03:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>thompsoncreek.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>847b46a1d718e959f0bf460ed93294f95809f0f4418b5a473d42860304aeaffb</i><br /><br />Threat actor <b>description</b>: <i>Thompson Creek® Window Company is the Mid-Atlantic region’s premier home improvement replacement products company. We have been customizing and ...</i><br />Target victim <b>website</b>: <i>thompsoncreek.com</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.northernsafety.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18148</link>
<guid>4602b477ded0c16df6befcd8447cea0d</guid>
<pubDate>Thu, 24 Oct 2024 14:02:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>www.northernsafety.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b66c44f3eb232444a2ba0cb47b6d9b6270b51b8a9ebf28f4750bdd2c66a2b4ce</i><br /><br />Threat actor <b>description</b>: <i>Northern Safety Co., Inc. operates as a personal safety equipment distributor company. The Company offers disposable respirators, earplugs, first a...</i><br />Target victim <b>website</b>: <i>www.northernsafety.com</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>mgfsourcing.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18149</link>
<guid>681edca905f93d0d1ddd5f82b0385bae</guid>
<pubDate>Thu, 24 Oct 2024 14:01:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>mgfsourcing.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca662a1ac2a65fef8c743b1dd1264215d59ba5c9816b27d24469f2c1c162b289</i><br /><br />Threat actor <b>description</b>: <i>MGF Sourcing is an independent US-led global sourcing company founded in 1970. We focus on US-based specialty apparel retailers and, with our stron...</i><br />Target victim <b>website</b>: <i>mgfsourcing.com</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>drizly.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18142</link>
<guid>43a0340391b5cdbed42a609a0c2361a5</guid>
<pubDate>Thu, 24 Oct 2024 13:54:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>drizly.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>99f641f7b98d0ee63c7b1192bee1cccbdc0b0b22d3d182d4705766bd41eaec42</i><br /><br />Threat actor <b>description</b>: <i>Databases of users of the E-Commerce platform "Drizly" (a platform for the sale of alcoholic beverages). 2 479 145 lines. dates of birth, device in...</i><br />Target victim <b>website</b>: <i>drizly.com</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>robinhood.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18143</link>
<guid>c490f96bbae13d62132dda54ef1ec86e</guid>
<pubDate>Thu, 24 Oct 2024 13:51:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>robinhood.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bbba5c7a7bc0c4340b7501f44327601dcb2df759f46f9247a3e0a62fc4b70f17</i><br /><br />Threat actor <b>description</b>: <i>Robinhood Broker Clients' Data.
7 732 244 lines of emails</i><br />Target victim <b>website</b>: <i>robinhood.com</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eagle-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18131</link>
<guid>2635749c5721bb3d5021ce2144ca0146</guid>
<pubDate>Thu, 24 Oct 2024 04:54:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Eagle-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1440a91adf6d9e414ca9f5b6fa4cccd8f9e657ef423d6ce4f6b371f54a8c89a1</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.eagleindinc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Action-Heating--Cooling</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18120</link>
<guid>160743788aa7329fe5ebd7d19383e361</guid>
<pubDate>Thu, 24 Oct 2024 03:21:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Action-Heating--Cooling</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e159369232ce25baa186f58891b1d5c948e4883f629b39d6b56a454bcfdf188b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.actionwi.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Povman-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18122</link>
<guid>6110f81cb5fe9566dec78d1dbf08a8dc</guid>
<pubDate>Thu, 24 Oct 2024 03:13:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>The-Povman-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52834d1070652bd0e03dae17945833ded642a7577c299185835a2d313e2374e6</i><br /><br />Threat actor <b>description</b>: <i>For over 50 years, Morton Povman, Esq. and Bruce Povman, Esq have been among the leading attorneys representing individuals and families whose lives have been devastated by serious personal injury, wrongful death or medical malpractice caused by the negligence of others in New York City, the State of New York and beyond.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>LifeMine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18123</link>
<guid>8bd3e786ec96aa813bd2c1bbb1117679</guid>
<pubDate>Thu, 24 Oct 2024 03:13:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>LifeMine</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>775705ed9eb82d283c2f8d35e8e6c240ea3ca95650a7ddb96fb4d22d498c0b54</i><br /><br />Threat actor <b>description</b>: <i>Developer of a drug discovery platform designed to elucidate human biology and c...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Iron-World-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18132</link>
<guid>c003c81e1a36826b21e90f7e93c675d1</guid>
<pubDate>Thu, 24 Oct 2024 00:56:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Iron-World-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d518ad2df15583da830b0817a9f59b1ebc3de6a1ab807ebb7852a63b54d8bbba</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ironworldfencing.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mainelli-Mechanical-Contractors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18130</link>
<guid>77e86f5489a21d225ec448dce1fec3a7</guid>
<pubDate>Thu, 24 Oct 2024 00:47:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Mainelli-Mechanical-Contractors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b85f8f23ff10222fe93c7bd4985d6e84d7273b9ef4da30ba851b0282a724ed89</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.mainellimechanical.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>TU-Parks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18129</link>
<guid>181ec6b7c833c0340d5120dba27c3bb0</guid>
<pubDate>Thu, 24 Oct 2024 00:44:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>TU-Parks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4d09b02ccc8f371556a4e5e7bd23907e926739c5e9f9015a82712e418bcb918</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.tuparks.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ivanhoe-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18128</link>
<guid>718010c95cc6dac83386e13c4635def8</guid>
<pubDate>Thu, 24 Oct 2024 00:41:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Ivanhoe-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>427553b615a703a4cf7f222dbecfc39402975a48329959c2d29de564130bd0ae</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ivanhoeclub.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>By-Design-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18117</link>
<guid>1452f0389a6958d1dde205a3c5d29495</guid>
<pubDate>Wed, 23 Oct 2024 18:35:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>By-Design-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0fa895be828bfaff6b00ed557d4272820426343ce7b7c78ed65191867b03e804</i><br /><br />Threat actor <b>description</b>: <i><p>Dear customers!</p><p>We are thrilled to present you with exclusive access to over 550 GB of confidential data from By Design LLC, a premier fashion company established in 1994. By Design is dedicated to empowering women with stylish, comfortable, and affordable clothing through its unique brands, each catering to different styles and occasions. Their contemporary collections feature jackets, tops, knits, skirts, pants, and dresses, designed to create an effortless and glamorous look.</p><p>By Design s brands include:</p><p>Love By Design: A contemporary junior line featuring a mix of fresh trends and classic looks with vibrant colors and prints, suitable for any occasion.<br>Madison Michelle: Elegant and stylish options for special occasions.<br>Rich and Famous: A lifestyle brand focused on sustainable fashion.<br>Carolyn Taylor: High quality sweaters with classic elements like cable knit patterns and ribbed trims.<br>Watermelon Sugar: Casual and fun clothing that embodies a laid back vibe.</p><p>The company prioritizes responsible sourcing and sustainability, conducting annual reviews of manufacturing partners to ensure they adhere to environmental and ethical standards. By Design s executive team brings extensive experience in the apparel and retail industries, driving the company s success through strategic guidance and leadership.</p><p>This comprehensive data pack includes:</p><p>Employee data<br>Client information<br>Scanned payment documents<br>Personal data including dates of birth and scans of driver s licenses<br>Business proposals and audit results<br>Internal financial documents<br>Agreements and certificates<br>And much more<br>These records provide valuable insights into By Design s operations and may be of significant interest to fashion industry professionals, business analysts, and other stakeholders.</p><p>To gain access to this exclusive 550 GB data pack, simply click the &nbsp;Buy &nbsp;button and provide your contact details for registration. Our team will promptly reach out to ensure a secure and confidential transaction.</p><p>Don t miss the opportunity to uncover valuable information from By Design LLC with this exclusive data pack!</p></i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wayne-County</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18119</link>
<guid>f41ba39ddd5e6fba9016468c5964b05a</guid>
<pubDate>Wed, 23 Oct 2024 17:34:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Wayne-County</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1840b9174ebc3f61c93038228adf4b43231dd6bbe235594ff94c6afe5958b41b</i><br /><br />Threat actor <b>description</b>: <i>Wayne County is located in the state of Michigan, United States. We offer you more than 130 SQL databases . 
							A large collection of confidential criminal investigation files, personal data of residents.</i><br />Target victim <b>website</b>: <i>waynecounty.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Goshen-Central-School-District-gcsny.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18115</link>
<guid>0caaa766dc911a0ba41070269c4a9758</guid>
<pubDate>Wed, 23 Oct 2024 14:30:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Goshen-Central-School-District-gcsny.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec20a9d2cf742c8a1d42026de503508b810dcea67cccd8588ad4cff16b4d241b</i><br /><br />Threat actor <b>description</b>: <i>10 GB</i><br />Target victim <b>website</b>: <i>gcsny.org</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mar-Bal-mar-bal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18116</link>
<guid>f474573a89a8f1da580cbfd9b0fecd33</guid>
<pubDate>Wed, 23 Oct 2024 13:09:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Mar-Bal-mar-bal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ff3b2ca86cc5d9e6a927f26fbe6110c2cd88335aec1df90bc04b0e6f6e11f18</i><br /><br />Threat actor <b>description</b>: <i>37 GB</i><br />Target victim <b>website</b>: <i>mar-bal.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>elnamagnetics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18113</link>
<guid>ca9eac0c76de0cab71d5b50951fe4c5f</guid>
<pubDate>Wed, 23 Oct 2024 13:07:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>elnamagnetics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>70a0728b6ab21ff08454a0730281f538ec64dc04c7537c5cbb3369ebc7a820ee</i><br /><br />Threat actor <b>description</b>: <i>Elnamagnetics.com is a company specializing in magnetic materials and components. They offer a wide range of products, including ferrite cores, transformers, inductors, and custom magnetic solutions. Their services cater to various industries such as electronics, telecommunications, and automotive. With a focus on innovation and quality, they provide technical support and engineering expertise to meet specific customer needs.</i><br />Target victim <b>website</b>: <i>elnamagnetics.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Easterseals</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18111</link>
<guid>cac8ec2e0e8d39ca1612df964d942c01</guid>
<pubDate>Wed, 23 Oct 2024 10:52:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Easterseals</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6691c013b094439c53596749d7ce5053c770ed549169ccdd9b329292f1cd7942</i><br /><br />Threat actor <b>description</b>: <i>Easterseals Easterseals is leading the way to full equity, inclusion, and access through life-changing disability and community services.</i><br />Target victim <b>website</b>: <i>easterseals.com</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tricon-Energy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18110</link>
<guid>8480ce3751484ef6ea7471ad04eaa9a7</guid>
<pubDate>Wed, 23 Oct 2024 10:34:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Tricon-Energy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3b81492c4684f4e247a93eff3905d39c301f96cb1737782d77ca24be90ccff9</i><br /><br />Threat actor <b>description</b>: <i>TRICON is an international trader and marketer for main petrochemicals, essentia...</i><br />Target victim <b>website</b>: <i>triconenergy.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>IdeaLab</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18108</link>
<guid>e7803c8c6041d459fe3d7db32af97830</guid>
<pubDate>Tue, 22 Oct 2024 20:40:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>IdeaLab</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87fe9eaf636df3e9e6da82230e19af2f5c644dc3fd23c362e866f83198b202c2</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>www.idealab.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lincoln-University-lincolnu.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18106</link>
<guid>16b872fc557900838e19f750151167e4</guid>
<pubDate>Tue, 22 Oct 2024 16:05:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Lincoln-University-lincolnu.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>083daf8ae679b5a3f7b5cf82ad4150014c4a35e5c86bf7f37bbc755890323fda</i><br /><br />Threat actor <b>description</b>: <i>10 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clear-Connection-clearconnection.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18103</link>
<guid>c2b8ebbde383625a81ba05a0f7b7192d</guid>
<pubDate>Tue, 22 Oct 2024 14:38:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Clear-Connection-clearconnection.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>32f18dd5d1dfb70ac3bd944f16f6a1f8c6456b199a90bf298c7f33d1ecc1e7f2</i><br /><br />Threat actor <b>description</b>: <i>71 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Precision-Steel-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18102</link>
<guid>3cdacdba0a3e4bf931fbe577ee4f94f7</guid>
<pubDate>Tue, 22 Oct 2024 13:18:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>Precision-Steel-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>204b782e49ccaa731afdc14f914ab5b94ee446b2d2ab90f105ad3ef4bae8ea42</i><br /><br />Threat actor <b>description</b>: <i>!!! The total volume of documents is 150GB, with 10GB uploaded. We will send the remaining documents upon request. !!!Precision Steel Services provides our customers quality steel products MANUFACTURED IN THE USA.We specialize in carbon plate and bar as well as tool steel products. Our company offers many popular value-added services including plasma and oxy-propylene cutting, sawing, rotary and surface grinding and many more.All our products are delivered on our own fleet of trucks, throughout the states of Ohio, Indiana, Michigan and Ontario. We also work with a great team of outside carriers to ship product all over the country.Since 1974, we have not only been a trusted steel supplier, but a partner with a variety of industries by providing quality processed products quickly – saving our customers both time and money.•   Financial document, accounting reports, backup, customer database, personal information of employees and clients, drawings. https://www.precision-steel.com</i><br />Target victim <b>website</b>: <i>www.precision-steel.com</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>tkg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18093</link>
<guid>4bdef5fb6ba59b1bfe0db68275c452ab</guid>
<pubDate>Tue, 22 Oct 2024 11:35:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>tkg.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>62a89041e34f44c29ecda3ace6a2d94637be087c5ae7084f51ceebf8d6e2ed30</i><br /><br />Threat actor <b>description</b>: <i>From websites and marketing to IT services, TKG provides digital marketing services for clients in a variety of industries. See how we can help you.</i><br />Target victim <b>website</b>: <i>tkg.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>bwdtechnology.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18095</link>
<guid>b8ddd4e23c3d98fe4c4c61177afffac2</guid>
<pubDate>Tue, 22 Oct 2024 11:28:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>bwdtechnology.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4453786e3be090a17ddbf08c4761f1f1bb086cbccb35eaf0e1ab6d49697959ef</i><br /><br />Threat actor <b>description</b>: <i>BWD Technology is a company specializing in developing innovative software solutions and digital services. They focus on delivering custom applications, IT consulting, and systems integration for various industries. With a commitment to quality and efficiency, BWD Technology aims to enhance business operations and drive digital transformation for their clients through cutting-edge technology and expert support.</i><br />Target victim <b>website</b>: <i>bwdtechnology.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>davisbrothersinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18096</link>
<guid>95f769a19dba19de542eff79365e3529</guid>
<pubDate>Tue, 22 Oct 2024 11:25:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>davisbrothersinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a9198487084f5af9f1ea402f505fdba923561a596ba33e78fab5b3e4c074a6a</i><br /><br />Threat actor <b>description</b>: <i>Davis Brothers Inc. is a company specializing in construction and landscaping services. They offer a range of solutions including residential and commercial construction, site preparation, and custom landscaping. Known for their attention to detail and customer satisfaction, Davis Brothers Inc. combines expertise with quality materials to deliver projects on time and within budget, serving their local community with dedication.</i><br />Target victim <b>website</b>: <i>davisbrothersinc.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>dennissupply.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18098</link>
<guid>99897197639505c33a5007bc38d456c3</guid>
<pubDate>Tue, 22 Oct 2024 11:19:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>dennissupply.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b482aa717261798cb05d79889d709ad2c6a98fd55de09026b9ca9a5602497937</i><br /><br />Threat actor <b>description</b>: <i>Dennis Supply is a company specializing in the distribution of HVACR (Heating, Ventilation, Air Conditioning, and Refrigeration) equipment and supplies. They offer a wide range of products, including parts and tools for both residential and commercial applications. Known for their customer service and technical support, Dennis Supply serves contractors, technicians, and businesses across the industry.</i><br />Target victim <b>website</b>: <i>dennissupply.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>specpro-inc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18099</link>
<guid>c4896e2b7f31bdb285363d1ef8ce327e</guid>
<pubDate>Tue, 22 Oct 2024 11:15:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>specpro-inc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60801fb355b3fc9dc697277b521b5126eacc1fab21af902b8dc0a32bb233c935</i><br /><br />Threat actor <b>description</b>: <i>SpecPro, Inc. is a professional services company specializing in environmental, engineering, and technical solutions. They provide a range of services including environmental compliance, project management, and engineering support. Their focus is on delivering sustainable and efficient solutions to government and commercial clients, leveraging expertise to meet complex project requirements effectively.</i><br />Target victim <b>website</b>: <i>specpro-inc.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Mechanical-inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18089</link>
<guid>9da3bbc7c90afeae7fe153b1ff238c35</guid>
<pubDate>Tue, 22 Oct 2024 06:59:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>American-Mechanical-inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>28b06b51147e055a86f04caf271d956a6b11b03f383fb15bc627443c46c0e556</i><br /><br />Threat actor <b>description</b>: <i> American Mechanical, inc. - company design, install and service heating, ventilating and air-conditioning systems for the commercial and industrial marketplace. The company's corporate office is located at 1275 Boulevard Way, Walnut Creek CA, 94595</i><br />Target victim <b>website</b>: <i>ami-hvac.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Medical-Billing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18086</link>
<guid>4d8d751988a68fec6e98d0a65284f530</guid>
<pubDate>Tue, 22 Oct 2024 06:58:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>American-Medical-Billing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a6d1cd4f5b5bf6bba0733d1d2c15138d8fa6b53034c29bd4314aa3587fca544</i><br /><br />Threat actor <b>description</b>: <i>American Medical Billing (founded in 1994) provides complete medical billing services to health care providers. American Medical Billing corporate office is located in 100 E Irving Park Rd Ste 200, Roselle, Illinois, 60172, United States and has 19 employees. </i><br />Target victim <b>website</b>: <i>americanmedicalbillingassociation.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>onedayevent.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18082</link>
<guid>ad5db5924e3e97ed8a387a499efa9fa0</guid>
<pubDate>Tue, 22 Oct 2024 00:42:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>onedayevent.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c923ac925aa05468cdfeaea7f8393cbf8da21f60a8978c94a743f7f634eefc58</i><br /><br />Threat actor <b>description</b>: <i>One Day Event Insurance is a special event insurance company that sells event liability insurance for all types of events such as weddings, birthdays, vendors, concerts, barmitzvahs, and festivals.</i><br />Target victim <b>website</b>: <i>onedayevent.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>temple-inc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18080</link>
<guid>b0b36c71ef0a155300c69a618bf9b9f5</guid>
<pubDate>Mon, 21 Oct 2024 22:50:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>temple-inc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>405fdf76aa47c3f4dbb41219b48da66bdb84efb9db0b9ba3e1f6391fdd1e474c</i><br /><br />Threat actor <b>description</b>: <i>Temple, Inc., located in Decatur, Alabama, is a family-owned company that’s been serving the South since 1954. Throughout the years, the people of Temple, Inc. have worked to develop enduring relationships with city, county, and state agencies, utility departments, engineering firms, electrical services contractors, and vendor partners. A commitment to Integrity, outstanding Service, and Relationships endure as the guiding principles of our business.SITE: www.temple-inc.com Address : 305 Bank Street Decatur, AL 35601 Unated StatesALL DATA SIZE: ≈200gb 1. Home emplyees folder 2. Temple Corporate data 3. Projects, drawings 4. Accounting, Financial data 5. Customer contracts & etc…</i><br />Target victim <b>website</b>: <i>temple-inc.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>milleredge.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18079</link>
<guid>2621c58bc55296ad5035c73e74ff76ca</guid>
<pubDate>Mon, 21 Oct 2024 22:47:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>milleredge.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d06b9fb8625d33b9677f8ffe763ac06afafa3c63e6e64d623005bcde32cc85bd</i><br /><br />Threat actor <b>description</b>: <i>Miller Edge is the leading North American manufacturer of UL 325 recognized safety accessories for motorized doors and automated vehicular gate systems. The product line includes touch sensitive and non-contact devices such as sensing edges and photo eyes, in addition to a complete line of accessories designed to ease installation and enhance the level of safety for automatic door and gate systems. Our Engineering staff is ready to assist you with any special design applications. We invite you to check out our product lines and call our friendly Customer Service staff with any questions you may have.SITE: www.milleredge.com Address : 300 N Jennersville Rd, West Grove, Pennsylvania 19390, United StatesALL DATA SIZE: ≈600gb 1. Emplyees personal data 2. Corporate data: Human Resources, Financial, Tax, Payroll data & etc… 3. Accounting data 4. Engineering data 5. Customer, Contracts, Confidential data & etc…</i><br />Target victim <b>website</b>: <i>milleredge.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>gkcorp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18078</link>
<guid>1fcd3375fa870e5dd99c71f5d52b4825</guid>
<pubDate>Mon, 21 Oct 2024 22:44:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>gkcorp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>32f9ee4f3365dd0633dfb4b1dcde7738d52bce4425feee5e239ad4c19ddef2db</i><br /><br />Threat actor <b>description</b>: <i>The Kaiser Enterprise is made up of multiple divisions & subsidiaries. From a turn-key paint shop, to a battery manufacturing facility, to a turn-key hyperscale data center, to a wastewater treatment facility: the Kaiser Enterprise has a wide range of capabilities. Importantly, this team has the in-house resources to design, engineer, fabricate and install.SITE: www.gkcorp.com Address : 5555 New King Drive Troy, MI 48098 United StatesTEL#: 313.368.3100ALL DATA SIZE: ≈1.5tb+ 1. Corporate data 2. Accounting, Finance 3. Budget 4. Emoployees personal docs 5. Human Resources 6. Projects 7. Confidential data, NDAs 8. Development data & etc…</i><br />Target victim <b>website</b>: <i>gkcorp.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>ssbwc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18077</link>
<guid>5aca824c107cec453babb8f014aa93d1</guid>
<pubDate>Mon, 21 Oct 2024 22:41:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>ssbwc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c1b3b27ba84c0dac208b2d1d69ca3768a80b4b7b97e059faa8a645fc792cc05</i><br /><br />Threat actor <b>description</b>: <i>Silver Springs Bottled Water Company was founded in 1986 and the Richmond Family purchased the company in 1991. Driven by the market’s demand for water as a beverage and with the customer as the controlling officer, Silver Springs Bottled Water Company has quickly become Florida’s largest privately held bottled water company.SITE: www.ssbwc.com Address : P.O. Box 926 Silver Springs, Florida 34489 United StatesTEL#: (877)-556-1854ALL DATA SIZE: ≈600gb+ 1. Emplyees personal folders and documents 2. Corporate data: Global, HR, Personal and etc… 3. Projects 4. Financial data, Accounting 5. Customer contracts, Confidential data & etc…</i><br />Target victim <b>website</b>: <i>ssbwc.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Philadelphia-Macaroni-philamacaroni.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18066</link>
<guid>35bfa72d9899bf43087e4ea42e4a6423</guid>
<pubDate>Mon, 21 Oct 2024 15:06:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Philadelphia-Macaroni-philamacaroni.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>728d18901663b103e14a998caddbaa0046f10a933ce8cd9c4df98fbee31343f2</i><br /><br />Threat actor <b>description</b>: <i>102 GB</i><br />Target victim <b>website</b>: <i>philamacaroni.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trimarc-Financial-trimarc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18061</link>
<guid>b64f6155563e634a2e0c13b684e73a1f</guid>
<pubDate>Mon, 21 Oct 2024 12:08:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Trimarc-Financial-trimarc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce1156c11bdf90483953dde2307214fd84f812504749beb84f01e55d075594b5</i><br /><br />Threat actor <b>description</b>: <i>3 GB</i><br />Target victim <b>website</b>: <i>trimarc.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arango-Billboard</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18057</link>
<guid>706449df952ee5a68b92454ec61a18c4</guid>
<pubDate>Mon, 21 Oct 2024 10:23:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Arango-Billboard</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f416f9a48c005ef663a89e140a4b77400cfb1aeab255ca15782c5f8f97c9680b</i><br /><br />Threat actor <b>description</b>: <i><p>Dear customers!</p><p>We are offering exclusive access to over 15 GB of confidential data from Arango Billboard &nbsp;Construction Co., LLC, a Miami, Floridabased company specializing in outdoor advertising and general construction services. Founded in August 2015, Arango is well known for its expertise in the installation and maintenance of billboards, including digital and LED conversions. The company handles a variety of projects across Florida, converting traditional billboards to digital formats, installing new signs, and managing construction permits for billboard installations, reflecting its active role in Floridas advertising infrastructure.</p><p>Operating out of its location on NW 60th Street, Arango serves clients in the surrounding areas and is involved in projects ranging from smallscale updates to large billboard installations, which may include structural work and electrical permits.</p><p>This comprehensive data pack includes:</p><p>Employee data personal details, dates of birth, drivers license scans<br>Contracts and agreements<br>Financial documents bank statements, credit applications, financial reports<br>Tax documents tax returns, payment receipts<br>Personal data contact information, insurance cards<br>Medical information treatment forms, health insurance policies<br>And much more<br>This data pack offers valuable insights into Arango Billboard &nbsp;Construction Co.s operations, making it of significant interest to professionals in outdoor advertising, construction, and business analysis.</p><p>To gain access to this exclusive 15 GB data pack, click the Buy button and provide your contact details for registration. Our team will assist you with a secure and confidential transaction.</p><p>Dont miss this opportunity to access key information from Arango Billboard &nbsp;Construction Co., LLC with this exclusive data pack!</p><p>&nbsp;</p></i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Transak-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18158</link>
<guid>ba00c3e6292cc2a52a34e7b373a4a9eb</guid>
<pubDate>Sun, 20 Oct 2024 21:02:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>Transak-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3fbc4c9cb6f1ccc467b83277953fac63e6610b5703a6b594ac9ffdaddf0d180c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>transak.com</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>Petropolis-Pet-Resort</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18053</link>
<guid>367df17877b8e778ae3fdc03213438e3</guid>
<pubDate>Sun, 20 Oct 2024 18:08:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>arcusmedia</b> claims attack for <b>Petropolis-Pet-Resort</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>617f5895a4a6f5ba2cae28813fbad469b5c1cc8cbec7f544f1df37c040948841</i><br /><br />Threat actor <b>description</b>: <i>www.petropolis.comPetropolis Pet Resort has offered everything...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>arcusmedia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Superior-Quality-Insurance-Agency</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18054</link>
<guid>51331fcd89d45304a118755678da4a8b</guid>
<pubDate>Sun, 20 Oct 2024 18:07:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>arcusmedia</b> claims attack for <b>Superior-Quality-Insurance-Agency</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>92285a2c0eac94648c7117f07a5062ee0e42daa14528c395d41830076fc5a896</i><br /><br />Threat actor <b>description</b>: <i>Superior Quality Insurance is a company...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>arcusmedia</category>
</item>
<item xmlns:dc='ns:1'>
<title>mh-mech.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18041</link>
<guid>a4396f61160d9bfa1ea9114dacd37247</guid>
<pubDate>Sat, 19 Oct 2024 21:20:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>mh-mech.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1985eb5c170f5ebd07c33911b82c9a954a361e7966ee0e5ff57066e74a17a7d5</i><br /><br />Threat actor <b>description</b>: <i>MH-Mech is a company specializing in mechanical engineering solutions, offering a wide range of services that include design, manufacturing, and maintenance of industrial machinery. They focus on providing innovative and efficient solutions tailored to meet the specific needs of their clients across various industries. Their expertise lies in precision engineering and high-quality craftsmanship.</i><br />Target victim <b>website</b>: <i>mh-mech.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>sizeloveconstruction.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18042</link>
<guid>7e132d103ce54fda527e88a13a3d1540</guid>
<pubDate>Sat, 19 Oct 2024 21:17:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>sizeloveconstruction.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f27dd84d5ffbcecb098ad0a3ac1a6c35e3dcd58924f262d0f8c7f71d1881483</i><br /><br />Threat actor <b>description</b>: <i>Sizelove Construction is a company specializing in construction and contracting services. They focus on delivering high-quality building solutions, working on a range of projects from residential to commercial developments. Known for their attention to detail and customer satisfaction, Sizelove Construction emphasizes timely project completion and adherence to budget, ensuring professional and reliable service.</i><br />Target victim <b>website</b>: <i>sizeloveconstruction.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>rcschools.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18045</link>
<guid>8b3bff7384cfaa945eaf210e4df4692f</guid>
<pubDate>Sat, 19 Oct 2024 21:08:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>rcschools.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>baca99ab960297eab02bc205d21c441c39be04f778ed619257e038f67e814246</i><br /><br />Threat actor <b>description</b>: <i>RCSchools.net represents Rutherford County Schools, a public school district in Tennessee. The district serves a diverse student population, providing education from pre-kindergarten through 12th grade. It emphasizes academic excellence, innovative teaching, and community involvement. The district offers various programs, including advanced academics, arts, and athletics, to support student development and success.</i><br />Target victim <b>website</b>: <i>www.rcschools.net</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>mopsohio.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18044</link>
<guid>3ff5042bc9d37fc481ca2b15f46618d7</guid>
<pubDate>Sat, 19 Oct 2024 21:05:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>mopsohio.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>677f6169624a8440179aaffbdf0dd1bf2d0ecad10d72620f832ef56217a59f45</i><br /><br />Threat actor <b>description</b>: <i>As of my last update, there is no specific information available about "mopsohio.com." It's possible that it could be a small business, a local organization, or a newly established website that isn't widely recognized. For the most accurate and up-to-date information, I recommend visiting the site directly or conducting a search to learn more about its offerings and focus.</i><br />Target victim <b>website</b>: <i>mopsohio.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kansas-City-Hospice</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18043</link>
<guid>877d85181eb41f6b8db45bd2d29a97b4</guid>
<pubDate>Sat, 19 Oct 2024 21:02:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Kansas-City-Hospice</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b832a6e9926f1897898001d419225a27f3fc4f68b274855ddb8d8016c59efb0</i><br /><br />Threat actor <b>description</b>: <i>Kansas City Hospice is a nonprofit organization providing compassionate end-of-life care and support in the Kansas City area. It offers hospice and palliative care services aimed at enhancing the quality of life for patients with terminal illnesses and their families. Their interdisciplinary team addresses physical, emotional, and spiritual needs, ensuring comfort and dignity in a supportive environment.</i><br />Target victim <b>website</b>: <i>www.kchospice.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Michael-J-Gurfinkel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18040</link>
<guid>152c97a9bb6f2ababc2c73a46cfef7a3</guid>
<pubDate>Sat, 19 Oct 2024 20:53:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Michael-J-Gurfinkel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d64f4de8c12a458e6e26c598f42d8486af63c68272a7ff8a851789dfa95ff7cf</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>www.gurfinkel.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>KMC-Controls</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18036</link>
<guid>60cab8d25a3d32111c3290219c0b872b</guid>
<pubDate>Sat, 19 Oct 2024 18:54:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>KMC-Controls</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a05c71411374f6f7a1b6cfa66a29366172495d8bfbf407cd4eb8f1ae80b6bec5</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>www.kmccontrols.com.hk</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>SPECTRUMCHEMICAL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18039</link>
<guid>62b4521aec8fe13ad75560a2b41b2f95</guid>
<pubDate>Sat, 19 Oct 2024 16:19:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SPECTRUMCHEMICAL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>98d30faacc62854161e52344db927926660018b7a90c28a53d26568f91dd6dfb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>SPECTRUMCHEMICAL.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zierick-Manufacturing-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18032</link>
<guid>84464b3e226fd6b271dd79e4216a5245</guid>
<pubDate>Sat, 19 Oct 2024 10:25:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Zierick-Manufacturing-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e81167196de08c1abac948734c22028100c791cfba0f6a05d1f4864cea6322db</i><br /><br />Threat actor <b>description</b>: <i>Zierick Manufacturing Corporation
Since 1919, Zierick Manufacturing Corporation has been providing innovative solutions to the challenges posed by complex interconnection requirements. Today, we believe in an integrated approach to design for manufacture and assembly, working with our customers to determine the ideal product for their application. In this way, we can move more efficiently and economically from design concept to successful assembly. Through this collaborative process our engineers have developed many industry breakthroughs in durability, reliability, and efficiency.
The engineers at Zierick have developed:

    A mounting design which improves PCB-to-terminal retention
    A harsh environment IDC
    An economical and reliable way to attach a discrete wire to a PCB
    A mechanical hold-down that increases mounting integrity
    Solder-wicking prevention technologies
    A circuit board parallel stacking system
    Repeatable and reliable receptacles
    A board stuffing service for companies without high speed insertion equipment
    Custom solutions

Besides pioneering the above technologies, Zierick also manufactures assembly equipment, interconnection hardware and taped terminals. In addition to our standard Board-to-Board and Wire-to-Board solutions, Zierick has provides custom stamping capability, setting the standard in both design leadership and quality tooling and stamping.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>Open-Range-Field-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18033</link>
<guid>80fe651f52abe7a9ea11a3cc79f5a170</guid>
<pubDate>Sat, 19 Oct 2024 10:25:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Open-Range-Field-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>646e51dff4882b6dff16af65e54a39be9048033ba8f05b12130f9ed0d881c6b2</i><br /><br />Threat actor <b>description</b>: <i>Open Range Field Services
Open Range Field Services, LLC was established in 2014 by Kent Dyson, James Kantola, and Ron Nelson. The company's headquarters is located in Pampa, TX. Open Range is a full-service surveying and mapping company specializing in the development and construction of energy-related infrastructure and assets. The organization's primary objective is to serve the energy and construction industry by providing responsive and innovative geospatial data solutions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>McCody</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18025</link>
<guid>7c2298145b05dcbb16dac39a625011c4</guid>
<pubDate>Sat, 19 Oct 2024 03:20:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>McCody</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26111bc9505a6c7d140ba8fe6d34279dbe2f5cdf5fa79f9ac134b31ff63ad97a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.mccody.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>ask.vet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18030</link>
<guid>231182acb75cdce3350df92d900c7f91</guid>
<pubDate>Sat, 19 Oct 2024 02:41:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>ask.vet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8637de1a0de3ace9e17b79afa0a81d9dfa41172955c8e7315420216a21356973</i><br /><br />Threat actor <b>description</b>: <i>AskVet provides virtual pet care services, offering 24/7 consultations through an AI-powered platform for pet owners. They are focused on delivering real-time support for pet health management.</i><br />Target victim <b>website</b>: <i>ask.vet</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Country-Inn-038-Suites-by-Radisson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18024</link>
<guid>44cfe8d9745f15f8c1534bf55714ad0a</guid>
<pubDate>Sat, 19 Oct 2024 01:45:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Country-Inn-038-Suites-by-Radisson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf8f0b5be7bb77b423956172e4b6142a83d716ca4fed1c6afc480bf3b0d958d1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mid-State-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18028</link>
<guid>999adfe23d3bda876af50397a462f7d8</guid>
<pubDate>Fri, 18 Oct 2024 23:26:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Mid-State-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96a24bb942cc3d4308bb8fdfa5e22330a490de120848e1a5c9cb6617c6652a5b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.midstateelectric.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Strainrite-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18027</link>
<guid>305a36410e0226dff92a16e99555ba5f</guid>
<pubDate>Fri, 18 Oct 2024 23:17:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>The-Strainrite-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6651da5e851f6a1b54e15eb8136a78f01407f698751b702f7eb907ed0fa39146</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.strainrite.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Absolute-Machine-Tools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18022</link>
<guid>aeb1a5f7eb1d81499e7d93dd105d9430</guid>
<pubDate>Fri, 18 Oct 2024 22:56:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Absolute-Machine-Tools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2bf332c9b804d43bd1eefb9312f22ff55b6c432ba6c4c29f3cb30ae4260d6617</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.absolutemachine.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Neighbors-Credit-Union</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18021</link>
<guid>9677548ee4ee2f157590053c5c5f56c4</guid>
<pubDate>Fri, 18 Oct 2024 18:37:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Neighbors-Credit-Union</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0448de5750aaacf53b2910e1ca4e248378a6ee06a95321fc082b6296abf1ec36</i><br /><br />Threat actor <b>description</b>: <i>Neighbors Credit Union is a not-for-profit, full service financial institution where every member has a voice in how our credit union works, and how each of us is served. Our service promise to you: making your financial life easy, trustworthy and life changing ... for everyday money management to special occassions and monumental accomplishments. Because that's what being a great Neighbor is all about.</i><br />Target victim <b>website</b>: <i>neighborscu.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fromm-FrommBeauty.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18020</link>
<guid>75f3a8fbbb2af06371e02ea8bce5aa65</guid>
<pubDate>Fri, 18 Oct 2024 17:02:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Fromm-FrommBeauty.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42117c2b072750e9224eab0b67b1303ba5c017a5b81a20d3818364a1493e7cbe</i><br /><br />Threat actor <b>description</b>: <i>16 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.qal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18016</link>
<guid>3ab58ac7f8dbc97557145ef30f1a486a</guid>
<pubDate>Fri, 18 Oct 2024 09:12:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.qal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1cf7b4c99ece58e772ebac1136633d31d731d1853e637fd038429e0fa643f73</i><br /><br />Threat actor <b>description</b>: <i>QAL, or Queensland Alumina Limited, is a prominent alumina refinery based in Queensland, Australia. It specializes in the production of alumina, a vital raw material used in aluminum manufacturing. The company is known for its commitment to sustainable practices and environmental responsibility. QAL plays a crucial role in the local economy, providing employment and supporting the aluminum industry.</i><br />Target victim <b>website</b>: <i>www.qal.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dubin-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18011</link>
<guid>45ebd93b65d907b7f84545b9aed9af8f</guid>
<pubDate>Fri, 18 Oct 2024 01:47:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Dubin-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9d4dcb602792a38e8305d391a02773edf0dbca564cf7cbbfdef1a266c39f0e3</i><br /><br />Threat actor <b>description</b>: <i>!!! IF THE COMPANY DOES NOT CONTACT US SOON, THE DATA WILL BE PUBLISHED !!!!  The Dubin Group is one of the premier attorney search firms in the country. We specialize in the permanent placement of attorneys for law firms and corporate legal departments.</i><br />Target victim <b>website</b>: <i>dubingroup.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>RDC-Control-Ltd</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18012</link>
<guid>ae2308e6a29b8ed8d6cac3410fcf3191</guid>
<pubDate>Fri, 18 Oct 2024 01:44:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>RDC-Control-Ltd</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7adc22ce98c12ec1fb1d2092b36eb9baf43fb51ea263c068770e2d5106e9927</i><br /><br />Threat actor <b>description</b>: <i>!!! IF THE COMPANY DOES NOT CONTACT US SOON, THE DATA WILL BE PUBLISHED !!!!  RDC Control is a North American manufacturer of NFPA tie rod construction heavy duty steel and stainless steel pneumatic cylinders and hydraulic cylinders.</i><br />Target victim <b>website</b>: <i>rdccontrol.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>CreaGen-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18007</link>
<guid>f2aaab100e39e5fd93ff0bbb01d4f212</guid>
<pubDate>Fri, 18 Oct 2024 01:44:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>CreaGen-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>011dbd4ce2ab1ff7899920cfe7afec215ffc472008dc74b5b78c13eb8d4bc6f3</i><br /><br />Threat actor <b>description</b>: <i>Research data and other internal documents,contracts ,laboratory tests https://creageninc.com Time to resolve :</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Propak-Corp.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18162</link>
<guid>ee85e073c07e87d0df12a23e4ce7bb4e</guid>
<pubDate>Thu, 17 Oct 2024 21:11:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Propak-Corp.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e886b7bf64deeb7be83fc2dd4e0e6536e1384bd7c0656bbe3e8c6ec92bd3110a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>propak.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>MRI-Radiology-Network-P.A.--University-MRI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18161</link>
<guid>03b6e2856f286e362632584b8574146e</guid>
<pubDate>Thu, 17 Oct 2024 21:09:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>MRI-Radiology-Network-P.A.--University-MRI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>92fddce102396f1ebd1ef1c8a54660bf39ef668e10579497e161843348fe2260</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>universitymri.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aiken-Electric-Cooperative-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18159</link>
<guid>1f33f9a831253704b1f9d34523f001ae</guid>
<pubDate>Thu, 17 Oct 2024 21:06:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Aiken-Electric-Cooperative-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>084a7cf1e3cd1a888a264636affa15276a87d40092219c5c284a7730be952fb5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>aikenco-op.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>oklahomasleepinstitute.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18002</link>
<guid>49b8ba8f9e5b7b260a306c25393a4181</guid>
<pubDate>Thu, 17 Oct 2024 19:00:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>oklahomasleepinstitute.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ce1afefa18119e4ce968ebbae6a5f8f23150935c1b3585a574a13b3de16ca78</i><br /><br />Threat actor <b>description</b>: <i>The Oklahoma Sleep Institute, founded in 2003, is dedicated to providing the highest quality sleep medicine to the community. We are a comprehensive Sleep Disorder Clinic staffed by Advanced Registered Nurse Practitioners and a Board Certified Sle</i><br />Target victim <b>website</b>: <i>oklahomasleepinstitute.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.chiltonisd.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18003</link>
<guid>6563f4cdc1f2ef1ad710ad6772ea022b</guid>
<pubDate>Thu, 17 Oct 2024 15:19:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.chiltonisd.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d52513a388abb41527c5dbd5dadd5c9df97e3c88b6093c724f3cc9676dc9a9cd</i><br /><br />Threat actor <b>description</b>: <i>Chilton Independent School District is an educational organization located in Chilton, Texas. It serves the local community by providing K-12 education. The district is committed to fostering a supportive and challenging learning environment, aiming to empower students with the essential skills and knowledge for future success. Chilton ISD emphasizes academic excellence, extracurricular engagement, and community involvement.</i><br />Target victim <b>website</b>: <i>www.chiltonisd.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.kersey.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18004</link>
<guid>e14f2c0c9152f1c78681652ff1189f2b</guid>
<pubDate>Thu, 17 Oct 2024 15:16:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.kersey.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>534d0ee3298d7ff9d060d74e0c9e79dcbc17d06241daeb52551eb87a34865fbc</i><br /><br />Threat actor <b>description</b>: <i>Kersey is a company specializing in the distribution of industrial and commercial equipment. They focus on providing high-quality products and services to meet the needs of various industries. The company emphasizes customer satisfaction and offers a range of solutions tailored to specific business requirements. Kersey is known for its reliability and commitment to innovation in its field.</i><br />Target victim <b>website</b>: <i>www.kersey.net</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.aristoiclassical.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18005</link>
<guid>1194292054da355d3be4c0d3b69b9d9f</guid>
<pubDate>Thu, 17 Oct 2024 15:13:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.aristoiclassical.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>67199e9572f9df434da862d66f6c12f10ac8f4a6b3022cdd253668a247acc6ba</i><br /><br />Threat actor <b>description</b>: <i>Aristoiclassical.org is a company dedicated to promoting classical education and the arts. They focus on providing resources, workshops, and events that emphasize the importance of classical studies, including literature, philosophy, and the fine arts. The organization aims to foster a deeper appreciation for classical traditions and encourage critical thinking and creativity in modern educational contexts.</i><br />Target victim <b>website</b>: <i>www.aristoiclassical.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.camelotservices.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18006</link>
<guid>e2a0be057e5dde0a3d390d4b78189580</guid>
<pubDate>Thu, 17 Oct 2024 15:09:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.camelotservices.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d196030c91311df50b52cc4c9243c86bb2dc9c1aea8cd23175b9931195818e20</i><br /><br />Threat actor <b>description</b>: <i>Camelot Services is a company specializing in facilities management and property services. They offer a range of solutions including security, maintenance, and cleaning services tailored to the needs of both residential and commercial properties. With a focus on quality and efficiency, Camelot Services aims to enhance property value and ensure a safe, well-maintained environment for their clients.</i><br />Target victim <b>website</b>: <i>www.camelotservices.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>HiCare.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=18000</link>
<guid>c92b26f68689c7af56b0b08721897732</guid>
<pubDate>Thu, 17 Oct 2024 13:45:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>HiCare.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7beb9f3d5d219a4f13ccb08b540aabb2f88557bed9cc9cea1faf62da7faeeaa8</i><br /><br />Threat actor <b>description</b>: <i>HiCare.net is a company specializing in pest control and hygiene solutions. It offers a range of services aimed at residential and commercial clients, focusing on eliminating pests like termites, cockroaches, and rodents. HiCare emphasizes the use of eco-friendly and safe methods. Known for its professional service, it aims to provide effective, long-term solutions for a clean and pest-free environment.</i><br />Target victim <b>website</b>: <i>HiCare.net</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Welker-welker.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17986</link>
<guid>7bf023ca6853abd395cab03f83945d24</guid>
<pubDate>Wed, 16 Oct 2024 18:03:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Welker-welker.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47d60377579070ee6e2bffe66baf164344e5f0ded436645e9b3f19c74728894f</i><br /><br />Threat actor <b>description</b>: <i>27,6 GB</i><br />Target victim <b>website</b>: <i>welker.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cordogan-Clark-and-Associates-cordoganclark.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17987</link>
<guid>509421719867b607d48a0a1b0ae35c89</guid>
<pubDate>Wed, 16 Oct 2024 18:02:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Cordogan-Clark-and-Associates-cordoganclark.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5699f92a435b2160e1a82ca6ea84ab8b1983d2cb49f83875f7e5507bc2803c4f</i><br /><br />Threat actor <b>description</b>: <i>107 GB</i><br />Target victim <b>website</b>: <i>(cordoganclark.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>DoctorsToYou.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17980</link>
<guid>e939047fc28d6f8d31c08856543a7367</guid>
<pubDate>Wed, 16 Oct 2024 13:47:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>DoctorsToYou.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f8e7a716c84b17672eb77cfb14da43499432ae72e46c6d71601a1be725399bc0</i><br /><br />Threat actor <b>description</b>: <i>DoctorsToYou.com is a healthcare service company that connects patients with medical professionals, providing timely and convenient access to care. It focuses on delivering personalized medical services, often offering telemedicine options and in-person visits. The company aims to enhance patient experience by ensuring quick response times and high-quality, compassionate care tailored to individual needs.</i><br />Target victim <b>website</b>: <i>DoctorsToYou.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Food-Sciences-Corporation-foodsciences.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17977</link>
<guid>f1b4a1e8b4c12f7c7f2e390c76b4cc12</guid>
<pubDate>Wed, 16 Oct 2024 13:36:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Food-Sciences-Corporation-foodsciences.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f4849aa852fd718fb7645acbfdd16c3efbb46eca00d8860a03a29b821869b426</i><br /><br />Threat actor <b>description</b>: <i>86 GB</i><br />Target victim <b>website</b>: <i>foodsciences.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>G-plans.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17974</link>
<guid>d0dcf063a9c7678ef849da47e7b5c359</guid>
<pubDate>Wed, 16 Oct 2024 07:48:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>G-plans.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c61023eb77dc2d785e6660410e875df060dd755b44b216f61b65e4dc44b360d</i><br /><br />Threat actor <b>description</b>: <i>G-plans.com is a nutrition and wellness company that offers personalized meal plans based on metabolic typing. Founded by Dr. Philip Goglia, the platform provides customized diet and fitness plans to help individuals achieve their health goals. Users complete a questionnaire to determine their metabolic type, and the service delivers tailored meal recommendations, aiming to optimize metabolism and improve overall well-being.</i><br />Target victim <b>website</b>: <i>G-plans.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>CETRULO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17973</link>
<guid>619d6b6bff9a5152560ae73fb2264006</guid>
<pubDate>Wed, 16 Oct 2024 00:20:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>CETRULO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6dd39a74c37580221a24ea5bdb14b259042be7ad458a4663d61a507219bad141</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.cetllp.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nor-Well</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17972</link>
<guid>d91eef84694cd9a010815de5851b4be9</guid>
<pubDate>Wed, 16 Oct 2024 00:17:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Nor-Well</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e9a4ec42b8e6bd945ef36e9d3f6e837b8852125dde279546c7e554b1dab3c4e2</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.nor-wellcompany.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kuhn-and-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17971</link>
<guid>942d56c3022c0cbed8b956292110a54f</guid>
<pubDate>Wed, 16 Oct 2024 00:14:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Kuhn-and-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ffbc80a1f68de87d84bc22ecde18a6f86cff8e474bfde73eae00b81608fc266</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.kuhnandassociates.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Corporate-Job-Bank</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17966</link>
<guid>edeb62f97ac41e4eeddaea9bc6a93f33</guid>
<pubDate>Tue, 15 Oct 2024 23:35:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Corporate-Job-Bank</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87b9aadc529fdc89947d933271cdc30ee1330a0aebb5002b6f1f1c1e629e825b</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1985 and headquartered in Tempe, Arizona, Corporate Job Bank is a staffing organization and a full service personnel firm.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lein-Law-Offices</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17967</link>
<guid>a52357f1ce8160dee6563b6a3391ffa8</guid>
<pubDate>Tue, 15 Oct 2024 23:35:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Lein-Law-Offices</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>191a6644119a22ce6d3fa45ba39ae20e120b5ba3ee23926064bc917189231a4a</i><br /><br />Threat actor <b>description</b>: <i>Lein Law Offices is a personal injury law firm that provides legal advisory services. Its practice areas include wrongful death, dog bites, bankruptcy, estate planning and probate, title insurance, third-party negligence claims, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Boston-Childrens-Health-Physicians</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17968</link>
<guid>916cbd6f20415c2214d441deaefedf75</guid>
<pubDate>Tue, 15 Oct 2024 22:35:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Boston-Childrens-Health-Physicians</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5bc1304db5e79722305815318750704eb33dea2d5f2698ea277709266d866b14</i><br /><br />Threat actor <b>description</b>: <i>Boston Children's Health Physicians is a large multi-specialty group with more than 300 clinicians providing comprehensive care for newborns, children, and adolescents. BCHP is a part of the Boston Children’s Hospital network of care, allowing them the opportunity to collaborate with additional specialists and to be connected to a world-class team.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Henry-County-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17969</link>
<guid>e7ee1d51662c87138516981a77133f0d</guid>
<pubDate>Tue, 15 Oct 2024 19:45:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Henry-County-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52e6f658b01bf2199a8adc8c4cbcd574b4efe24a6a85465dbf8f1daecb1a9e01</i><br /><br />Threat actor <b>description</b>: <i>Henry County Schools We strive to provide our students and families access to the most skilled professional educators available. We take pride in our offerings in the areas of academics, athletics, arts, and social/emotional supports.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Central-Pennsylvania-Food-Bank</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17962</link>
<guid>8fdf49df8918609c0e4e1b06f2a0bb10</guid>
<pubDate>Tue, 15 Oct 2024 16:33:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Central-Pennsylvania-Food-Bank</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>316876376b7726ebd3ad88470d9fd04a29614edf7764e2f2f0868d10906e85f7</i><br /><br />Threat actor <b>description</b>: <i>20 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Promise-Technology-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17982</link>
<guid>0c3508c6e86bfc75fabd0d0b54eef7a1</guid>
<pubDate>Tue, 15 Oct 2024 16:32:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>Promise-Technology-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4abb8f0f5e57989d7bcefb2be8c621251a5d2ad2114932d85cf8e0ae47d3e3a6</i><br /><br />Threat actor <b>description</b>: <i>We will publish every 3 days a new part, from old to new and at the end we will publish fresh source code (2024 and future developments) and internal databases 2024.</i><br />Target victim <b>website</b>: <i>promise.com</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ultimate-Removal</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17956</link>
<guid>eb4ab9e8db10f6fd9c9a5085f3a75fdd</guid>
<pubDate>Tue, 15 Oct 2024 14:25:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Ultimate-Removal</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>443f9e9043e7b10b9f2d4385ceb615183fffc6c7a6a047305f9584fec71a95ee</i><br /><br />Threat actor <b>description</b>: <i>Ultimate Removal, Inc. is a demolition contractor in the "tenant improvement" niche of commercial construction. Ultimate Removal corporate office is located in 2168 Pomona Blvd, Pomona, California, 91768, United States and has 88 employees. The total amount of data leakage is 952.40 GB</i><br />Target victim <b>website</b>: <i>ultimateremoval.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ideker</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17957</link>
<guid>594d4972c80e32661a4bb50f4b663bc5</guid>
<pubDate>Tue, 15 Oct 2024 14:25:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Ideker</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38cfe7a9516ccb55d419ce0d6af984b4396559c345c123238fa8bc2421faf034</i><br /><br />Threat actor <b>description</b>: <i>Ideker, Inc. is a family owned construction company specializing in heavy highway construction. Ideker corporate office is located in 4614 S 40th St, Saint Joseph, Missouri, 64503, United States and has 90 employees.</i><br />Target victim <b>website</b>: <i>ideker.net</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Inner-City-Education-Foundation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17958</link>
<guid>d8ac3b01ba19729174a8f1e63c9e937c</guid>
<pubDate>Tue, 15 Oct 2024 14:25:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Inner-City-Education-Foundation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>80dd2ddbe4a33f412c128a070196b13481b7a7aeae09288c1f54073928d4fc34</i><br /><br />Threat actor <b>description</b>: <i>Inner City Education Foundation (ICEF) operates 7 schools educating approximately 3,000 students. The ICEF corporate office is located in 3855 W Slauson Ave, Los Angeles, California, 90043, United States and has 259 employees.</i><br />Target victim <b>website</b>: <i>icefps.org</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>SystemPavers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17959</link>
<guid>8e0b297f1a21f8ee84759d0f12ec55fc</guid>
<pubDate>Tue, 15 Oct 2024 14:25:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>SystemPavers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>44bb611695f20e5be20dfd60cc4f2f66a53452451bfd0d74e03f0c448582402f</i><br /><br />Threat actor <b>description</b>: <i>System Pavers is a design and installation company in the outdoor remodel industry. System Pavers inc. corporate office is located in 1570 Brookhollow Dr, Santa Ana, California, 92705, United States and has 496 employees.</i><br />Target victim <b>website</b>: <i>SystemPavers.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Microworks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17961</link>
<guid>9184a041ce18953012722dcfa9052c39</guid>
<pubDate>Tue, 15 Oct 2024 12:26:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Microworks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4332f4b31d25d882ec20976d8d6ae0e6201f0952ea21adb07687d1269eab37c6</i><br /><br />Threat actor <b>description</b>: <i>Microworks Microworks Point of Sale Prism offers an ideal computer system for pizza delivery, restaurant management, and franchise food service.</i><br />Target victim <b>website</b>: <i>microworks.com</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Parnell-Defense</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17960</link>
<guid>f678a3b7005a6251cb0cf3a28f523cb3</guid>
<pubDate>Tue, 15 Oct 2024 12:21:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Parnell-Defense</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0949536d59bcd9406c0e26c94c2a8853c0494a68f9c863d36b33b4700ade8257</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>parnelldefense.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aaren-Scientific</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17955</link>
<guid>a25328715ddbaafaf2a70718e94220ac</guid>
<pubDate>Tue, 15 Oct 2024 10:32:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Aaren-Scientific</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c983c7286aaa1552e8e781e47beb69732c1c80bcf621ca9c0706579a4d930ace</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>www.aareninc.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Byerly-Aviation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17949</link>
<guid>80789d636d68ec8ac889de80365bbd57</guid>
<pubDate>Tue, 15 Oct 2024 03:26:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Byerly-Aviation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>75a981ee51525806eefcb18f590d9bb61d61bee51fe055f7eaf3576047d35303</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.byerlyaviation.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rescar-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17952</link>
<guid>7bf570282789f2798b7d6c1714e63ce9</guid>
<pubDate>Tue, 15 Oct 2024 00:19:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Rescar-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19918f072172df344f617a1af90122a207e26a2b521d3f443f1025ce9cbffe15</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.rescar.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Concord</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17951</link>
<guid>632245ec65eb39b085d24c066adb2729</guid>
<pubDate>Tue, 15 Oct 2024 00:16:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Concord</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e86b398478626c9b88d1163a7e115e89782f791f25b6dbf5052a40c259a7f385</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.concord.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>OzarksGo</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17950</link>
<guid>d450f01b90e9cfa5848596f1e6457c17</guid>
<pubDate>Tue, 15 Oct 2024 00:13:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>OzarksGo</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d1871ce300c30461ef7eb2957b69a07bc1d0c3e4a30bdb644664f905241e2b7</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ozarksgo.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Courtney-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17948</link>
<guid>95f0ad1e97ff725ea4a2e6bd761a83f1</guid>
<pubDate>Mon, 14 Oct 2024 22:46:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Courtney-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>983b37ede7c70d04cefd4157d5e7987b7d0a7a58320be91e195dcd631f2d84f0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.courtneyconstruction.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Henneman-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17946</link>
<guid>dc4ff0eb47dc4499c160ae22d8413116</guid>
<pubDate>Mon, 14 Oct 2024 18:15:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Henneman-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1bac737bada3c4f07c6aa254290692c0b46c6f47e17ef6bfb332a31d66ce59c1</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.henneman.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Misionero-Vegetables</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17945</link>
<guid>4fc3c058fbd02c7eb33beb9693413fa2</guid>
<pubDate>Mon, 14 Oct 2024 18:12:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Misionero-Vegetables</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc9e7d0a7ae6ddf8a5de7fa0b636a12a0f5eb560b1f3573244ec244c7f47c25e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.misionero.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>caseparts.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17941</link>
<guid>2abbf46f3779778a616848a833a5f1d0</guid>
<pubDate>Mon, 14 Oct 2024 16:34:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>caseparts.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1b9e3243084ea006983bf44b52c70254df8f34659141b7b18cfaebbc13d64d5</i><br /><br />Threat actor <b>description</b>: <i>Case Parts Company are a 45 year-old commercial refrigeration parts distributor and light manufacturer.  Our staff of 66 employees service three fully independent branch operations in St. Louis, Seattle and world headquarters in Los Angeles. Our customer base is national in scope. We add about 100 new customers per month.SITE: www.caseparts.com Address : 877 Monterey Pass Road Monterey Park, CA 91754, US</i><br />Target victim <b>website</b>: <i>caseparts.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cathexis-Holdings-LP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17934</link>
<guid>9216f34dc82ae586c1d6c37bdb8e8edf</guid>
<pubDate>Sun, 13 Oct 2024 19:52:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Cathexis-Holdings-LP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c652a9717ff43349c5ca0f57bffca7513ac267a012348f47bfca95aea2f8422d</i><br /><br />Threat actor <b>description</b>: <i>Today, we unveil nearly 3 million files from the "Cathexis Holdings LP" corporate network. Dive into a wealth of SQL databases, email backups, and an expansive collection of corporate documents that offer unparalleled insights into one of the most diverse investment firms out there. Now, the information that drives billion-dollar decisions is at your fingertips, absolutely free! Transform your business with data that others pay a fortune for your path to insider knowledge starts today</i><br />Target victim <b>website</b>: <i>cathexis.com</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rocky-Mountain-Gastroenterology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17930</link>
<guid>4410a22591c15bc707367093e5b8e8df</guid>
<pubDate>Sun, 13 Oct 2024 13:51:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Rocky-Mountain-Gastroenterology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3dbf7692f6c29bab8a12224905915b29d14d40eec88932457c66518b5d2a9bf8</i><br /><br />Threat actor <b>description</b>: <i>Rocky Mountain Gastroenterology is a healthcare provider specializing in the diagnosis and treatment of gastrointestinal disorders. Based in Colorado, the practice offers services such as endoscopy, colonoscopy, and liver disease management. Their team of experienced gastroenterologists is committed to providing high-quality, patient-centered care in a compassionate and professional environment.</i><br />Target victim <b>website</b>: <i>rockymountaingastro.com</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Construction-Systems-inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17932</link>
<guid>bbc90218e55a81732f0f78c16cbf2b6f</guid>
<pubDate>Sun, 13 Oct 2024 10:12:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Construction-Systems-inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>caba5a6697cf691b8977a38aadce3eda1499f8c99050fabde1ea8375529ffcd0</i><br /><br />Threat actor <b>description</b>: <i>Construction Systems inc. provides complete commercial renovation and specialties installation services for medical, commercial office, industrial, retail, education and etc. Construction Systems corporate office is located in 2865 E 14th Ave, Columbus, Ohio, 43219, United States and has 105 employees.The total amount of data leakage is 80.80 GB</i><br />Target victim <b>website</b>: <i>consysohio.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Timber</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17929</link>
<guid>434ecb7fb070a3a84878f270c096d142</guid>
<pubDate>Sun, 13 Oct 2024 08:47:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Timber</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1c2b5cdda71e7c3f6629359f916d3aae4654845065ce4115b9af21283d6471d</i><br /><br />Threat actor <b>description</b>: <i>Timber
Timber was founded for the sole purpose of creating compelling content for clients. We strive to look at each project as a unique opportunity to make something memorable. From visual effects to finishing, our collective experience draws from a wide range of disciplines. Timber’s talented team is comprised of artists who have honed their craft at some of the most respected post production companies in the industry. Our goal is to help our clients fully realize all their creative endeavors. Thank you for stopping by!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>NextStage.AI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17924</link>
<guid>c7b37a482b73fdc8678befad9b25ea29</guid>
<pubDate>Sat, 12 Oct 2024 13:49:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>NextStage.AI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e64c56c51717a869e262004a3cf4cf1da10acc021aa141eaff07a3e0ae2a06c</i><br /><br />Threat actor <b>description</b>: <i>NextStage.AI is a company specializing in artificial intelligence solutions designed to enhance business processes. They focus on developing AI-driven tools that streamline operations, improve decision-making, and foster innovation across various industries. By leveraging advanced machine learning algorithms, NextStage.AI aims to help organizations optimize efficiency and maintain a competitive edge in the market.</i><br />Target victim <b>website</b>: <i>NextStage.AI</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Protective-Industrial-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17921</link>
<guid>ebb859c7a465117f88b3cfd9d84be9c0</guid>
<pubDate>Fri, 11 Oct 2024 19:08:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Protective-Industrial-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b02277f53b93b80cae13e13bf964e1844f193e0bab82b95299e8f2e9f31de2e7</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>us.pipglobal.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rumpke-Consolidated-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17922</link>
<guid>553243dd8371b54582fea4dc6ea7b352</guid>
<pubDate>Fri, 11 Oct 2024 19:01:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Rumpke-Consolidated-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>70f8a0bb29abb200246ca6aefd5498febd5dc7d764b6c9f49c27875e6f4fa8f3</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>www.rumpke.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Elmore-Goldsmith</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17918</link>
<guid>11757761dafa3e68756adb17cfa9d730</guid>
<pubDate>Fri, 11 Oct 2024 16:07:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Elmore-Goldsmith</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9558f3b681a53108006cdc2db445b1e34dfa8e82bbf1f92295f0f160cb2c2ca1</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>www.elmoregoldsmith.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>practicesuite.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17912</link>
<guid>ed9a0ea088b6430b53ccbeac1cb6c49a</guid>
<pubDate>Fri, 11 Oct 2024 14:40:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>practicesuite.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>54daaea7106f9712a9bd196a88e100f47e9dd4881670b086899a2882a0ede325</i><br /><br />Threat actor <b>description</b>: <i>PracticeSuite is a healthcare technology company that offers a comprehensive cloud-based practice management and electronic health records (EHR) platform. It serves medical practices by streamlining administrative tasks, billing, scheduling, and patient management to enhance operational efficiency. The platform aims to improve healthcare delivery and financial performance for medical providers.</i><br />Target victim <b>website</b>: <i>practicesuite.us</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>peorialawyers.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17913</link>
<guid>f1f3fa16a9b404156622b361d6a39ef5</guid>
<pubDate>Fri, 11 Oct 2024 14:37:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>peorialawyers.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec54778cabb6dd0cc88920acc05e65b47de248d606f6aa7c86d853c40a226c79</i><br /><br />Threat actor <b>description</b>: <i>Peorialawyers.com is a legal firm based in Peoria, Illinois, specializing in various areas of law, including personal injury, family law, criminal defense, and estate planning. The firm is dedicated to providing personalized legal services to its clients, with a focus on achieving favorable outcomes. Their team of experienced attorneys is committed to guiding clients through the legal process with professionalism and care.</i><br />Target victim <b>website</b>: <i>peorialawyers.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Doctors-Regional-Cancer-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17906</link>
<guid>d4e3e8180a65648886ff348c7a6bbff5</guid>
<pubDate>Thu, 10 Oct 2024 20:29:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Doctors-Regional-Cancer-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a71484959bff7ba5e4d69f0a456c0848e5fe2c4766661df3afdc36256221716</i><br /><br />Threat actor <b>description</b>: <i>Doctors Regional Cancer Treatment Center has been providing oncology services to the communities we serve for more than 30 years. In fact, we were the first program of our kind in the region. From 1987 through today, our expert team has helped guide patients and their families through all stages of cancer treatment, diagnosis and recovery. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Axis-Health-System</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17907</link>
<guid>34482dc7c754a30aba97065d165b1b38</guid>
<pubDate>Thu, 10 Oct 2024 19:00:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Axis-Health-System</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ef6ebfa52c1d274ef9dea865dc36a43825246c9c3ef295df5effff36afd856c</i><br /><br />Threat actor <b>description</b>: <i>Axis Health System Axis Health System is a private, nonprofit healthcare organization established in 1960, providing healthcare to residents of Southwest & Western Colorado.</i><br />Target victim <b>website</b>: <i>axishealthsystem.org</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Law-Office-of-Omar-O-Vargas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17904</link>
<guid>ee57534b6283d20f8e089075ae8d976b</guid>
<pubDate>Thu, 10 Oct 2024 16:41:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>The-Law-Office-of-Omar-O-Vargas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b2b9b9ef5136a349d6af0944bf7b442edc6af57760d28be41917000ed7de9e1</i><br /><br />Threat actor <b>description</b>: <i>The Law Office of Omar O. Vargas is a legal practice specializing in immigration law. The firm is dedicated to providing personalized legal services to individuals and families navigating the complexities of U.S. immigration. With a focus on understanding each client's unique situation, the office offers assistance with visas, green cards, citizenship, and deportation defense.</i><br />Target victim <b>website</b>: <i>quenotedeporten.com</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Structural-and-Steel-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17905</link>
<guid>6fdf8aeb15cf3b343dcfc6d1b5f09b85</guid>
<pubDate>Thu, 10 Oct 2024 15:02:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Structural-and-Steel-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a92ea069918c99769f93116cd820e5132443c4adfa8b7348d970bdc8d4ea0430</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>www.s-steel.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>medexhco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17903</link>
<guid>c57330a3a53f27a63f881d14065f4c46</guid>
<pubDate>Thu, 10 Oct 2024 12:10:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>medexhco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8fa90a8290fc35b25eebe86044f2769c0461473b124968ed1a353faa3408823c</i><br /><br />Threat actor <b>description</b>: <i>"Medex HCO" is a company specializing in healthcare solutions, focusing on delivering innovative medical products and services. They aim to enhance patient care through cutting-edge technology and comprehensive healthcare management systems. The company is committed to quality, reliability, and improving health outcomes, catering to various healthcare providers and facilities.</i><br />Target victim <b>website</b>: <i>medexhco.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Atlantic-Coast-Consulting-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17897</link>
<guid>1e868c65150dfeeed59bece39216bfe9</guid>
<pubDate>Thu, 10 Oct 2024 11:11:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Atlantic-Coast-Consulting-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c93d6d36afdf208d46dd403ba47c6eaff3a511d5bda704b37b431e8e1891b11</i><br /><br />Threat actor <b>description</b>: <i>Atlantic Coast Consulting Inc is a professional firm specializing in environmental consulting and engineering services. They focus on waste management, environmental compliance, and sustainable solutions for various industries. The company is known for its expertise in permitting, site assessments, and regulatory compliance, helping clients navigate complex environmental regulations efficiently.</i><br />Target victim <b>website</b>: <i>atlcc.net</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Barnes-Cohen-and-Sullivan</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17899</link>
<guid>4918d9ac5352e49e376ab89695d64f98</guid>
<pubDate>Thu, 10 Oct 2024 11:11:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Barnes-Cohen-and-Sullivan</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b56f974ef63d245e52358efc515fcc24ceb4af437bc743715d774175c31aed7</i><br /><br />Threat actor <b>description</b>: <i>I'm sorry, but I couldn't find any information on a company named "Barnes Cohen and Sullivan." It's possible that it might be a small or private entity not widely recognized, or the name could be fictional or misspelled. If you have any additional details or context, I might be able to assist you further.</i><br />Target victim <b>website</b>: <i>barnescohenandsullivan.com</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Glacier</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17902</link>
<guid>e0dc61eceffa1a7dff9d396b4b7c5011</guid>
<pubDate>Thu, 10 Oct 2024 09:08:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Glacier</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa24414e666f981259cc2ca3deaa3baa7ed32e52595cea03f2e81715f2277821</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>glacier-gts.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>FortyEighty-Architecture</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17895</link>
<guid>6a992afb7a430eb66b188393aafe3105</guid>
<pubDate>Thu, 10 Oct 2024 00:12:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>FortyEighty-Architecture</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7626076393c06fcf57ffc23d1e7924193e736eddcfdcb8113f64aa29e3e36507</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.fortyeighty.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>RobbJack--Crystallume</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17894</link>
<guid>84e9f7f4ff1920227cbdf05cb52f0ae7</guid>
<pubDate>Thu, 10 Oct 2024 00:09:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>RobbJack--Crystallume</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f50500dbc9cfe5dfcda2f863a5ef61e68bc1b0081cbd44148a78a869a361866</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.robbjack.com www.crystallume.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Universal-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17893</link>
<guid>0493e5b59fade7763f1173a229de080b</guid>
<pubDate>Thu, 10 Oct 2024 00:06:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Universal-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c87e4553527821755492d3179ef4eb6da64c98de9111bb485542ad4846180698</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.universalcompanies.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wild-Apple-Graphics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17880</link>
<guid>2fabd3cec7e3cbe3dbe4b3f4b11cea18</guid>
<pubDate>Wed, 09 Oct 2024 20:45:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Wild-Apple-Graphics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e4b05b5d4958bca5fcacb0cff88aa37fa32749233f02c43856c7234b884791f1</i><br /><br />Threat actor <b>description</b>: <i>Art licensing agency Wild Apple offers a diverse collection of trend-right, art and pattern collections for home and wall decor licensing. At Wild Apple, we're not just in the business of art—we're a full-service art licensing agent breathing life into spaces worldwide. Our clients count on us for an ever-evolving collection of compelling, market-ready artwork.https://wildapple.com/</i><br />Target victim <b>website</b>: <i>wildapple.com</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Futureguard</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17888</link>
<guid>63f73cf1450f9d04d966da4d2390c57c</guid>
<pubDate>Wed, 09 Oct 2024 20:33:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Futureguard</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>669a776d8f723111c854b9b8a6b7104e8c46d639773d342e9811cedb25c2d706</i><br /><br />Threat actor <b>description</b>: <i>Futureguard manufactures and sells a broad range of awning and door canopy products through a variety of distribution channels ranging from an extensive network of professional awning dealers through building supply channels including Home Depot, Lowes and Menards to internet direct. Our NuImage Awning brand features awnings to fit every application and budget. In our pro dealer line, our three German engineered, U.S. Built and CE certified retractable fabric patio awnings are the best in the business.
https://www.futureguard.net/</i><br />Target victim <b>website</b>: <i>futureguard.net</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stone-Future-inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17890</link>
<guid>b366e33cd37f1326eec87240432209e9</guid>
<pubDate>Wed, 09 Oct 2024 20:31:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Stone-Future-inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>670052d76c829646b2557aaddbbd5992753295165caf9d72092aa7c664164683</i><br /><br />Threat actor <b>description</b>: <i>Stone Futures was established in 2005 with the aim of becoming the markets' premier energy and metal trading house. Stone Futures also provides our Clients direct market trading on all major global exchanges using state of the art trading systems, clearing, risk and margining facilities within a friendly, relaxed and supportive environment. 
https://stonefuture-usa.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>CANEA-ONE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17846</link>
<guid>48bf5ec2321aff9218176a1c3d034f33</guid>
<pubDate>Wed, 09 Oct 2024 14:02:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>CANEA-ONE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>49c882fa6e4f4b655019fce8ef17a18511e369f95764416f53f346f0fa43abfd</i><br /><br />Threat actor <b>description</b>: <i>CANEA ONE is a comprehensive software suite designed to enhance organizational performance through effective management of processes, projects, documents, and strategies. It integrates various tools to streamline workflows, improve collaboration, and ensure compliance. The platform is tailored for businesses seeking to optimize efficiency and drive continuous improvement across their operations.</i><br />Target victim <b>website</b>: <i>canea.com</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>ICS-Nett</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17847</link>
<guid>c7aa952887ba7e5c61905abd5cbfbb0c</guid>
<pubDate>Wed, 09 Oct 2024 14:02:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>ICS-Nett</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52ed59d0a584ea1038a237a6347da9eb9d923b0867c3744ce895bec7360036a6</i><br /><br />Threat actor <b>description</b>: <i>Founded as a Small Disadvantaged Business (SDB) and a Minority Business Enterprise (MBE) in 2003, ICS Nett has maintained a “step ahead of the game” approach to cutting-edge and innovative solutions to modernize, digitalize, and successfully serve government, military, public, private industry, and international clients
ICS Nett’s Subject Matter Experts (SMEs) help organizations with advanced cybersecurity, cloud solutions, large scale data, predictive analytics, IT infrastructure optimization, software, wireless app development, emerging healthcare IT, and advance customer engagement for sustainability and optimization.
Mission
Our mission is to provide customized solutions that meet our clients’ unique needs and exceed their expectations
Vision
Our vision is to be a trusted partner to our clients and to continuously innovate and improve our services to meet their evolving needs
Meet the Team.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>AHI-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17849</link>
<guid>8afff222218019723b959bbe4edc1104</guid>
<pubDate>Wed, 09 Oct 2024 14:02:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>AHI-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a517fda2167172340bab5c415d0893778780a14f5d332aca53209a8fce5828d</i><br /><br />Threat actor <b>description</b>: <i>Welcome to AHI Supply
AHI Supply is a leading manufacturer and supplier of quality construction products.  We are committed to manufacturing superior products at an affordable price with a focus on customer satisfaction and service. AHI Supply works with clients and distributors to provide innovative construction solutions that contribute to their success and competitive advantage. Our company has been serving the general public and the construction community in Texas since 1982. Today, AHI Supply operates three production and distribution facilities in Houston, Austin, and Dallas to better serve the construction community in Texas and neighboring states. We take pride in our quality products, superior knowledge, on-time deliveries and our committed customer service. Our exceptional sales staff can assist you with your project regardless of size.
We specialize in custom architectural products, including Cast Stone, Spectrum Colored Cements, stucco coatings, foundation and masonry products, fireplace material, masonry cleaners, structural steel, equipment and hand tools, and more. Since our beginnings in 1982 in Pearland, TX, we have introduced many innovative products and seen tremendous growth. Our Spectrum cement line which includes Gray, White, and Colored Portland & Lime Cements—as well as Colored Masonry Cements has been well received by the construction industry.
Our Tex-Clean brand masonry cleaners were introduced in 1986 and in 1988 we opened our Cast Stone department. These developments, along with the continued success of our Spectrum cements, have allowed us to become one of the most trusted names in the business. Over the years, we have introduced other successful product lines, such as our Spectrum Stucco Wall coatings and Ameristeel Structural Steel products. Please let us know how we can be assistance to you!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rio-Marine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17856</link>
<guid>19bdcfcac36f518cfedf1a364db02793</guid>
<pubDate>Wed, 09 Oct 2024 14:02:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>Rio-Marine</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30a8bb5b863633b5a93dc9df86649e44580e9c530c64a5e7ff3721b8f2b88fa0</i><br /><br />Threat actor <b>description</b>: <i>Our History and Growth
Ronald Dansby, with his many years of experience in the marine industry, quickly sought to make Rio achieve its greatest potential.
Expanding and improving the quality of the services provided was the first step to getting Rio where it is today. Rio now has experienced technicians to help in the fields of electrical devices and general problems, barge and engine maintenance, audio gauging of barge hulls, and controls and hydraulics.
Our superior service and our many office locations have made Rio a very recognized and respected service company that has served faithfully since 1929.
Company Timeline 1929 to 2023
1929
Founding of Glynn Electric
Originally Glynn Electric, Rio Marine was founded back in 1929 by Leo Glynn.
2002
Business sold to Ronald Dansby
With his many years of experience in the marine industry, Ronald Dansby quickly sought to make Rio achieve its greatest potential. Expanding and improving the quality of the services provided was the first step to getting Rio where it is today.
2000s
Rio Expansion
Rio Marine has not only expanded its services, but also the locations. Offices are now located along the Gulf Coast, ranging from Corpus Christi, TX to Mobile, AL. The scattered locations provide Rio with a distinct advantage in its timely services, allowing a swift response to almost anywhere along the Gulf Coast.
2023
Rio Marine adds new divisions to broaden our service capabilities:
Rio Marine
Rio Controls & Hydraulics
Rio Electronics
Rio Power Management
New Houston Office
Rio moves into new updated Houston office in Channelview to better serve our clients.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>InCare-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17857</link>
<guid>d3b8cc3e6c9693062cdfde1a234f8fcc</guid>
<pubDate>Wed, 09 Oct 2024 14:02:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>InCare-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c237c46024fafa609788c6227352548f3b45a0dc0ca83529e07ab42b3b1cdd40</i><br /><br />Threat actor <b>description</b>: <i>Our Story
Thrive began in 2000 as a modest IT services firm in Concord, Massachusetts. The pioneering original founders believed no one wanted break/fix anymore and were one of the first companies in the world to create proactive managed services for the SMB market. Thrive has since become a global leader in cybersecurity, Cloud, and digital transformation Managed Services. The company was acquired by Staples in 2007, MetTel in 2014, and then recapitalized by Private Equity firm M/C Partners in 2016 and Court Square Capital in 2021, which ushered in a new era of resilience, growth, and industry leadership.
Since 2017, Thrive has secured funding and expanded the company’s global footprint across North America, Europe, and the Asia-Pacific region through a steady march of over 20 strategic acquisitions.
Our comprehensive end-to-end solutions, anchored by an unrivaled NextGen portfolio of managed cybersecurity and Cloud offerings, enable businesses to transform digitally and securely. Amid the success, Thrive has won awards for creating innovative, outsourced IT solutions to meet clients’ global technology requirements. Yet, our company’s true strength lies in our employees’ passion and dedication. Thrive’s diverse and talented team embodies a culture of collaboration, learning, teamwork, and continuous growth that powers our clients’ digital transformation journeys and delivers tremendous ROI.
Thrive is not just a company; it’s a testament to what happens when a community of passionate individuals comes together to unleash the full potential of technology and human collaboration. Our story is one of continuous evolution, innovation, and a steadfast commitment to technology excellence on our customers’ behalf. Thrive can only be successful when our clients win, and we are just getting started.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Roberts-Family-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17861</link>
<guid>ebf4a67ad8e64265c8777f8c0fe5c1c4</guid>
<pubDate>Wed, 09 Oct 2024 14:02:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>The-Roberts-Family-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>68792fbd2b46f7f53bf8f260847286f90b63196c69130ada49e1db3b4d0eb30d</i><br /><br />Threat actor <b>description</b>: <i>Since his time at University of Florida’s Law School, David Roberts has become some of Orlando’s most valued attorneys, due to his dynamic approach and decades of experience. Over the years, the legal team at The Roberts Family Law Firm in Orlando has become known for their aggressive representation and high level of customer service. When it comes to finding a Divorce lawyer in Orlando that has the knowledge and tenacity you’re looking for, look no further than The Roberts Family Law Firm.
Our family law firm in Orlando helps our clients at every stage of their case -- mediation, negotiation, litigation, and post-judgement modification.We have handled more than a thousand family law cases, and have been recognized by the American Institute of Family Law Attorneys for our commitment to client satisfaction.
Comfort When You Need It
Our team of legal experienced counselors aims to provide quick action on family law cases. Along with representation, our family law attorneys want to ease the discomfort our clients feel when dealing with a tough situation. Having a well-respected lawyer defending their best interests may be enough to lift the load off a troubled client.
Orlando Family Attorneys You Can Trust
Our attorneys take on cases as if they are their own. We understand the stress, heartbreak, and financial burden that family problems can bring an individual. The experienced lawyers at The Roberts Family Law Firm, give every client the respect they deserve by taking the time to thoroughly listen to their wants and needs. We also take extra time to ensure our clients are informed about their decisions and possibilities.
Our office in Downtown Orlando make it easier than ever to meet with a trusted attorney. Our lawyers are flexible and will always do their best to find a time and location that is convenient for you.
Are you going through a devastating divorce or fighting a child support lawsuit? If so, the aggressive divorce attorneys at our Orlando family law firm want to help. By connecting with one of our family law attorneys, you’ll have a team of legal experts that have the knowledge and fortitude to guide you through the process.
Contact Our Orlando Family Law Firm
To ensure your rights are protected schedule a consultation with our highly experienced family lawyers in Central Florida today! Please contact us at (407) 426-6999. You may also fill out the online form located on this page and one of our experienced and knowledgeable family law attorneys will contact you shortly. We value your privacy and will keep your information confidential. We represent clients in Orlando and throughout Central Florida, with our office in Orlando. We have free parking available</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>EARTHWORKS-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17863</link>
<guid>a666b5dec0048c93e4e6cf6fda6e09bd</guid>
<pubDate>Wed, 09 Oct 2024 14:02:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>sarcoma</b> claims attack for <b>EARTHWORKS-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dfda817f848cb1c4c5919da6619b0ca8884cae2bc158d9133174f893d197ee47</i><br /><br />Threat actor <b>description</b>: <i>The EARTHWORKS Group, Inc. is a turn-key planning and design firm established in 1996 with the mission of providing individualized, technically competent, responsive, yet cost effective engineering and environmental management services to clients throughout the southeastern United States. 
We provide Engineering, Architectural, Environmental, Land Planning, Geographic Information Systems, Structural, Construction Management, Wetland Mitigation Banking, Project Marketing and other consulting services for public and private sector clients. We work closely with our clients during the design process to address technical issues pertaining to infrastructure, building, and other regulatory requirements.
EARTHWORKS’ personnel has an excellent track record of working with the multitude of local, state and federal agencies to obtain necessary development approvals to start your project.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>sarcoma</category>
</item>
<item xmlns:dc='ns:1'>
<title>tankstar.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17842</link>
<guid>38350940d98a0cfddfa72b890eaa1fe0</guid>
<pubDate>Wed, 09 Oct 2024 13:35:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>tankstar.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5edcb2eab10d6b17bed3566e2a59d207caa8766708c6cee235fbedf19d2ae9eb</i><br /><br />Threat actor <b>description</b>: <i>Logistic company https://www.tankstar.com/ We have huge amount of data in our ha...</i><br />Target victim <b>website</b>: <i>tankstar.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>victrongroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17845</link>
<guid>d5a6c99c922f6812fee92973a43ce0db</guid>
<pubDate>Wed, 09 Oct 2024 10:03:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>victrongroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fab1342b2d413d65a8d7514851ce0e60b4c34a0c34a8937a4d1512cf9b18264e</i><br /><br />Threat actor <b>description</b>: <i>Victron Energy is a premier fuel distributor founded by Ali Sharaf. Beginning with a single convenience store, Ali grew his business by providing the best possible customer experience and was a pioneer in larger format convenience stores co-branded with restaurants.</i><br />Target victim <b>website</b>: <i>victrongroup.com</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>FULTON.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17844</link>
<guid>ecc55a04fb8a317e1733cf921f798162</guid>
<pubDate>Wed, 09 Oct 2024 09:36:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>FULTON.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1dd059b0e358072a54387d087251d939231f69d9038ce2fbbee05b1410fdcb54</i><br /><br />Threat actor <b>description</b>: <i>Fulton - A Worldwide Leader in Heat Transfer Equipment and Innovations</i><br />Target victim <b>website</b>: <i>FULTON.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Orbit-Software-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17843</link>
<guid>c9cf439982f9d0f89ac7f1ed43e85f7d</guid>
<pubDate>Wed, 09 Oct 2024 09:29:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Orbit-Software-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc8018fd138ea3320b7fa132b671fe329e5110b06bc8bb71fbc523340b5bcca8</i><br /><br />Threat actor <b>description</b>: <i>Orbit Software specializes in providing user friendly, cutting edge software programs for generating and managing school bus routes.  We also provide hardware used for GPS tracking of vehicles & students.</i><br />Target victim <b>website</b>: <i>www.busboss.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eagle-Recovery-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17839</link>
<guid>acf513e9f985ebc190acca290a8a6540</guid>
<pubDate>Tue, 08 Oct 2024 22:24:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Eagle-Recovery-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c61ae9099b5221d708dddebecb091ad5ebf76a003c46fb1980cc6172ec29468b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.eaglerecovery.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Smokers-Choice</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17837</link>
<guid>4cd47670c605946a8bf48d658c4705f0</guid>
<pubDate>Tue, 08 Oct 2024 22:18:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Smokers-Choice</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0fed9077dc1d2a11ee78144777d5d1b1b8ae2314ad55b76c02d4f6809c45d44d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.smokerschoiceusa.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Saratoga-Liquor</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17836</link>
<guid>4851e9a2a49e54a3adc2dcbacd64fffc</guid>
<pubDate>Tue, 08 Oct 2024 22:15:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Saratoga-Liquor</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18cf6c9eb50f3c8824bdc0320a98510b5a1bf3caefa480846699cbff04474471</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.saratogaliquor.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Accounting-Resource-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17835</link>
<guid>50454f95bbf5e6478cc0a55d08338731</guid>
<pubDate>Tue, 08 Oct 2024 22:12:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Accounting-Resource-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>809d37cdd9115c3346409dae6dae518fbe873e6e31dcafc22653e24de892593e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.accountingresourcegrp.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aaren-Scientific</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17832</link>
<guid>c6d18b0ed03091006bd1785ae97156e5</guid>
<pubDate>Tue, 08 Oct 2024 20:38:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Aaren-Scientific</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a941bbf4740660c617ac7c432e7f65acb8e607f7b8e78d9daa01f8764456f743</i><br /><br />Threat actor <b>description</b>: <i>Canada</i><br />Target victim <b>website</b>: <i>www.aareninc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trinity-Wholesale-Distributors-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17828</link>
<guid>57a33a900c373d400a96043e9ef92461</guid>
<pubDate>Tue, 08 Oct 2024 19:31:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Trinity-Wholesale-Distributors-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1722f166d76ee3c866f721f0ceab1404fed0e89aa8bb70394031dd906936f6c</i><br /><br />Threat actor <b>description</b>: <i>Trinity Wholesale Distributors Inc is a company specializing in the distribution of a wide range of products, often focusing on pharmaceuticals, health, and wellness items. They are known for their efficient logistics and supply chain management, serving various retailers and healthcare providers. Trinity emphasizes customer service, reliability, and competitive pricing in the wholesale distribution market.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>blalockcompanies.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17829</link>
<guid>719c6c64efb8dbf088b2677dee1a2c2e</guid>
<pubDate>Tue, 08 Oct 2024 19:16:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>blalockcompanies.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ff2160a3e6c8f2ed6c46916935f21da7f346d667746a8675fcb906df6b8d966</i><br /><br />Threat actor <b>description</b>: <i>Blalock Companies is a multifaceted organization known for its expertise in construction, transportation, and materials supply. It offers services in site development, road construction, and asphalt paving. Additionally, the company provides quality construction materials, including aggregates and ready-mix concrete. With a strong regional presence, Blalock Companies is committed to safety, quality, and customer satisfaction.</i><br />Target victim <b>website</b>: <i>blalockcompanies.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>okcabstract.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17830</link>
<guid>94e19ae9b74d13ad42e20407ffe4d95d</guid>
<pubDate>Tue, 08 Oct 2024 17:48:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>okcabstract.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4062c2a668974a3ffe2547e88a8f6137ce6cdd4d3206d6a9189010824ccd091f</i><br /><br />Threat actor <b>description</b>: <i>OKC Abstract is a company that provides title and abstract services, primarily focusing on real estate transactions in Oklahoma. They offer services such as title searches, title insurance, and escrow services to facilitate smooth property transactions. With an emphasis on accuracy and efficiency, OKC Abstract aims to ensure that property titles are clear and free of any legal issues or encumbrances.</i><br />Target victim <b>website</b>: <i>okcabstract.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advantage-CDC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17822</link>
<guid>4974a9fe76a5b447c35ad12a15fa0260</guid>
<pubDate>Tue, 08 Oct 2024 17:33:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Advantage-CDC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc3fc866955a78058b7aacef321974797a26b6a91f2235530184048a582cf161</i><br /><br />Threat actor <b>description</b>: <i>Advantage CDC is a community development corporation focused on fostering economic growth and revitalization in underserved areas. It provides services such as business loans, technical assistance, and support for small businesses and entrepreneurs. The organization aims to empower communities by facilitating access to financial resources and promoting sustainable development initiatives.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sit--Sleep</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17823</link>
<guid>2e565cdec9dcdff44afa2b1ea71c2c2c</guid>
<pubDate>Tue, 08 Oct 2024 17:33:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Sit--Sleep</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b2eab4694cbe885834df93359884fc3067aa8c6aa84d3449381a715f25f7a5a8</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1978 and headquartered in Gardena, California, Sit 'n Sleep is a matt...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Blain-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17825</link>
<guid>36e6bfe59546f6b2f2a4c16eebfac314</guid>
<pubDate>Tue, 08 Oct 2024 16:38:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Blain-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>750eabb72b545459629946940a4312b1257563f5f010dd5d8a9d96a4b907c48f</i><br /><br />Threat actor <b>description</b>: <i>Blain Supply, Inc. operates as a specialty discount retailer in the United State...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Davis-Pickren-Seydel-and-Sneed-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17821</link>
<guid>74ca370079f9b8a16f111e4f943bfe24</guid>
<pubDate>Tue, 08 Oct 2024 14:33:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Davis-Pickren-Seydel-and-Sneed-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>183a1a2f8d91b165f74c6fa80fa85ff9186512c5f3223b32642f5b3797001d6c</i><br /><br />Threat actor <b>description</b>: <i>Davis Pickren Seydel & Sneed LLP is a law firm that provides a range of legal services. Known for its expertise in environmental law, real estate, and business litigation, the firm serves a diverse clientele, including corporations, small businesses, and individuals. With a focus on personalized service, they aim to deliver effective legal solutions tailored to their clients' needs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>corporatejobbank.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17827</link>
<guid>c2b0e140029533c81a1793e5930e29ed</guid>
<pubDate>Tue, 08 Oct 2024 13:06:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>corporatejobbank.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8a8cc8a140ceed5d15a7aba473d7cbc702073d89b7eb72432f278d436bbbd95</i><br /><br />Threat actor <b>description</b>: <i><p>Business Services.<br><br>“Founded in 1985 and headquartered in Tempe, Arizona, Corporate Job Bank is a staffing organization and a full service personnel firm providing temporary, temp-to-hire, and direct hire services ranging from the production personnel to the upper levels of management”<br><br>Website: <a href="https://corporatejobbank.com/">https://corporatejobbank.com/</a><br><br>Revenue : $22.8M<br><br>Address: 1955 E Broadway Rd Ste 102, Tempe, Arizona, 85282, United States<br><br>Phone Number: (480) 966-0709<br><br><mark class="marker-yellow"><strong>Download link #1:</strong></mark> &nbsp;<a href="https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/CJB/PROOF/">https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/CJB/PROOF/</a><br><br><mark class="marker-yellow"><strong>Mirror:</strong></mark> <a href="https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/CJB/PROOF/">https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/CJB/PROOF/</a><br><br><mark class="marker-yellow"><strong>DATA DESCRIPTIONS:</strong></mark> Personal identifiable information, corporate confidential documents\correspondence, employees and executives personal data, projects, customer information, etc.</p><p><img src="/uploads/Jesse_Vargas_ID_s_2623babe5f.png" alt="Jesse Vargas ID's.png"><img src="/uploads/Meseret_Desta_I_Ds_efdb1117b8.png" alt="Meseret Desta IDs.png"><img src="/uploads/Melissa_Ayala_IDS_d266d974a7.png" alt="Melissa Ayala IDS.png"><img src="/uploads/Gualupe_Chavez_ID_s_f2d46618f1.png" alt="Gualupe Chavez ID's.png"><img src="/uploads/Josefina_Canevett_ID_s_9df8608ba4.png" alt="Josefina Canevett ID's.png"></p></i><br />Target victim <b>website</b>: <i>corporatejobbank.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>nspproteins.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17818</link>
<guid>b4a3c653ae58ddb2b96bd00536fb0620</guid>
<pubDate>Tue, 08 Oct 2024 06:59:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>nspproteins.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b50f6be2527ab3970ea1aeb02c11d3e8ada0eca5d3d31cf4eafc953b1a4b6cd</i><br /><br />Threat actor <b>description</b>: <i>NSP Proteins is a company specializing in the production and supply of high-quality protein ingredients for various industries, including food, nutrition, and health. They focus on innovation and sustainability, offering products that cater to the growing demand for plant-based and functional proteins. Their commitment to quality and customer service positions them as a reliable partner in the protein supply sector.</i><br />Target victim <b>website</b>: <i>nspproteins.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>premierpackaging.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17813</link>
<guid>b5f0eccbcd9f75f539a2d44326694b59</guid>
<pubDate>Tue, 08 Oct 2024 06:45:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>premierpackaging.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06f90af5001953cfcd57b0cf37fedc535edd0a8dc789471da15a431d0ed3c091</i><br /><br />Threat actor <b>description</b>: <i>Premier Packaging is a company specializing in packaging solutions, offering a wide range of products and services tailored to various industries. They focus on innovation, sustainability, and customizability, providing everything from standard packaging materials to bespoke designs. With an emphasis on efficiency and customer satisfaction, Premier Packaging aims to meet diverse packaging needs while promoting eco-friendly practices.</i><br />Target victim <b>website</b>: <i>premierpackaging.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>htetech.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17812</link>
<guid>8a5d67822c772017ee2e734f9387f00e</guid>
<pubDate>Tue, 08 Oct 2024 06:43:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>htetech.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>423d23dee2b95addaead1af919b36e5f4c980eacd3dd165cf3bd15a5b958a4ac</i><br /><br />Threat actor <b>description</b>: <i>HTE Technologies is a company specializing in industrial automation solutions, providing products and services that enhance manufacturing efficiency and productivity. They offer a range of equipment, including robotics, pneumatics, and motion control systems, along with maintenance and repair services. Their focus is on optimizing processes for industries like automotive, packaging, and food and beverage.</i><br />Target victim <b>website</b>: <i>htetech.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>fleetequipment.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17810</link>
<guid>4a4b16d454ca9f9075c129f6a0384d3d</guid>
<pubDate>Tue, 08 Oct 2024 06:39:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>fleetequipment.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6932cb1b2d276d725ce40801e39fe269a99fa83529cf9ea3de18b1d559d00163</i><br /><br />Threat actor <b>description</b>: <i>FleetEquipment.com is a platform providing news, insights, and analysis related to the commercial trucking and transportation industry. It covers topics such as vehicle maintenance, fleet management, equipment innovations, and industry trends. The site serves as a resource for fleet owners, managers, and technicians, offering expert advice and updates on regulations and technology advancements.</i><br />Target victim <b>website</b>: <i>fleetequipment.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>atd-american.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17808</link>
<guid>cb2363f42ebd481f5b01d11a3c574536</guid>
<pubDate>Tue, 08 Oct 2024 06:35:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>atd-american.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d056c0b67e4bd12a24cb63780f40eca805e671ce0ffee76fed6fca5d9827e3f</i><br /><br />Threat actor <b>description</b>: <i>ATD American is a company specializing in providing a wide range of products for educational, hospitality, and healthcare markets. They offer furniture, textiles, and various supplies tailored to meet the needs of these sectors. With a focus on quality and customer service, ATD American aims to deliver reliable and cost-effective solutions to enhance environments in schools, hotels, and healthcare facilities.</i><br />Target victim <b>website</b>: <i>atd-american.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>allianceind.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17807</link>
<guid>85d2d76eaf4c26e2a958fbf8068b5a52</guid>
<pubDate>Tue, 08 Oct 2024 06:32:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>allianceind.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dee04b54fe7ee96e2bb3b84cbd25a300b32ac7fabd066f5281148fb5d6951680</i><br /><br />Threat actor <b>description</b>: <i>Alliance Industries, Inc. is a company that specializes in manufacturing and distributing industrial products and solutions. With a focus on quality and innovation, they serve a variety of sectors, including automotive, aerospace, and manufacturing. The company is committed to sustainability and customer satisfaction, offering tailored solutions to meet the unique needs of its clients.</i><br />Target victim <b>website</b>: <i>allianceind.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>totalelectronics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17804</link>
<guid>ab67d7cd6af126c743b9fcec4039e9da</guid>
<pubDate>Tue, 08 Oct 2024 06:28:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>totalelectronics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6724d536126a3d0be952360723e983acfc70c1e0fc7cd839e3ce1a0b11234679</i><br /><br />Threat actor <b>description</b>: <i>TotalElectronics.com is a comprehensive online retailer specializing in consumer electronics. They offer a wide range of products, including the latest smartphones, laptops, tablets, and home entertainment systems. Known for competitive pricing and exceptional customer service, TotalElectronics.com provides fast shipping and a user-friendly shopping experience, catering to tech enthusiasts and everyday consumers alike.</i><br />Target victim <b>website</b>: <i>totalelectronics.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>Albany-College-of-Pharmacy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17801</link>
<guid>b1709d399a1bcd12fc1ce06cce6be277</guid>
<pubDate>Tue, 08 Oct 2024 05:16:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Albany-College-of-Pharmacy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96bf8239a496ef2ddb1c43bbed03f6e25fe6bf314054945f84aa4b3873f062d6</i><br /><br />Threat actor <b>description</b>: <i>Albany College of Pharmacy and Health Sciences (formerly Albany College of Pharmacy) is a private, independent college with a campus in Albany, New York. ACPHS is home to approximately 900 students and 115 full-and-part time faculty. Albany College of Pharmacy and Health Sciences corporate office is located in 106 New Scotland Ave Rm Ob211p, Albany, New York, 12208, United States and has 434 employees.</i><br />Target victim <b>website</b>: <i>acphs.edu</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Superior-Court-of-California</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17799</link>
<guid>b54b3dca23a2737365dc418ab508152b</guid>
<pubDate>Mon, 07 Oct 2024 19:39:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>The-Superior-Court-of-California</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e2e8df3846b3b0d63fdaa4c8cac8ee97f30498e50e003b9a2fad3acb8496fad</i><br /><br />Threat actor <b>description</b>: <i>The Superior Court of California is a state trial court with jurisdiction over civil, criminal, family, probate, and juvenile cases. It operates in each of California's 58 counties, handling legal matters according to state laws. The court's primary role is to ensure justice by providing fair and accessible resolutions to legal disputes, upholding the rule of law, and protecting rights.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Broward-Realty-Corp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17796</link>
<guid>6c7a107981f9c2a0ed55efce297bd1e2</guid>
<pubDate>Mon, 07 Oct 2024 01:46:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Broward-Realty-Corp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce5be3e50bf4ebdb332f162de08f7fe13366ce4b3887a96b16b03a7355f4477f</i><br /><br />Threat actor <b>description</b>: <i>Company must contact and resolve the issue by the end of October 21 or all data will be published 2972 NW 60th St, Fort Lauderdale FL 33309Phone 954-645-7020 & 954-645-7733 Marylou Adams marylou@browardrealtycorp.com 954-444-6626George Weaver gweaver5300@aol.com 954-806-3268Zsa-Zsa Weaver zsazsa@browardrealtycorp.com 754-215-9533</i><br />Target victim <b>website</b>: <i>browardrealtypartners.com</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>AOSenseNASA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17792</link>
<guid>2544d963fbd32a5e0649e7a244cc921b</guid>
<pubDate>Sun, 06 Oct 2024 06:37:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>AOSenseNASA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>782779c11b4005f69793b75aab5bf38ab7796423709f2747c648762febf8eb77</i><br /><br />Threat actor <b>description</b>: <i>US</i><br />Target victim <b>website</b>: <i>www.aosense.com</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>Creative-Consumer-Concepts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17788</link>
<guid>fbb25c1fc3c9ad12a80d06b6218932d8</guid>
<pubDate>Sun, 06 Oct 2024 03:31:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Creative-Consumer-Concepts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>808839eac5c02a18b56ab0df04522d1843c598a9eebfb9ea63fec6704c4526e1</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.c3brandmarketing.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Power-Torque-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17790</link>
<guid>d881b3c19eeb9941a2ae1b1afe343442</guid>
<pubDate>Sat, 05 Oct 2024 23:39:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Power-Torque-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>161223a9adecd7db694d8672d3fba92447ced4a431f74d54693550a1843de65b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.powertorqueservices.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.ravencm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17786</link>
<guid>352d47cf1a528e7f85aca7ef55669802</guid>
<pubDate>Sat, 05 Oct 2024 20:31:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.ravencm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8847bcfe1443bb592673263f1438cac26170d857df4bacd5d90a31f5c1d6bf00</i><br /><br />Threat actor <b>description</b>: <i>RavenCM is a company that specializes in comprehensive community management solutions. It focuses on providing tools and services to enhance the management of homeowner associations and similar communities. Their offerings typically include accounting, administrative support, and communication platforms designed to streamline operations, improve resident engagement, and ensure efficient community governance.</i><br />Target victim <b>website</b>: <i>www.ravencm.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>HARTSON-KENNEDY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17781</link>
<guid>95444b7e1845b5a61dd3c44576b7548a</guid>
<pubDate>Sat, 05 Oct 2024 11:16:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HARTSON-KENNEDY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>13da12a7c671a75eb08a208535e0a8635bde57fd1b97a481e1ae962c59e1edf3</i><br /><br />Threat actor <b>description</b>: <i>_URL_</i><br />Target victim <b>website</b>: <i>HARTSON-KENNEDY.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BNBuilders</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17780</link>
<guid>c70cfa5c5ab75a16467bc95abaf5dc2a</guid>
<pubDate>Sat, 05 Oct 2024 09:10:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>BNBuilders</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>153acb8cd99a3f97a1c828c16d197b778aedbd2da4a3e1424332d67b28f03ba8</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>www.bnbuilders.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>CL-Ward</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17771</link>
<guid>6a9c2c5b1ab7052170218c0924b51953</guid>
<pubDate>Fri, 04 Oct 2024 22:45:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>CL-Ward</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f2758602aa5062506441f9af9d27df754cf7d21469f70d5e2e494bc00f93513c</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.goclward.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wilmington-Convention-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17775</link>
<guid>8844778f691c8c52cd208ba06e9886ae</guid>
<pubDate>Fri, 04 Oct 2024 22:43:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Wilmington-Convention-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f802b29d8c779391d4d042d11c5f19fcf62dd53e8d589c2bd7a6213ce2ef577e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.wilmingtonconventions.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Guerriere--Halnon</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17774</link>
<guid>aeeb6d8bc184c5473157d214fd1dd3e8</guid>
<pubDate>Fri, 04 Oct 2024 22:40:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Guerriere--Halnon</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5d2ebbb510fe123ea9ce46d31973578f63346b2421437ced14c2641550acc6d5</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.guerriereandhalnon.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Petes-Road-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17772</link>
<guid>dd14656b73fce3fc005bc64da1926cc4</guid>
<pubDate>Fri, 04 Oct 2024 21:07:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Petes-Road-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b698a0f580859650efc560e4599ad35dfb4df532009d085d7438bfdf799922bc</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.petesrs.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>kleberandassociates.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17770</link>
<guid>a96ee5a57893e40c5cc729c5b3e09b2f</guid>
<pubDate>Fri, 04 Oct 2024 18:08:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>kleberandassociates.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1dbc11543bfd199a511365575ea3ffaababec591e399f232a464d5f52baf4bc4</i><br /><br />Threat actor <b>description</b>: <i>Kleber & Associates is a marketing and communications firm that specializes in the home and building products industry. The company focuses on delivering integrated marketing strategies, including public relations, branding, and digital marketing, to help clients enhance their market presence. Known for its expertise in the sector, Kleber & Associates aims to connect brands with their target audiences effectively.</i><br />Target victim <b>website</b>: <i>kleberandassociates.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Riley-Gear-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17762</link>
<guid>e1c3542ba77f0ee225d53940a10569f9</guid>
<pubDate>Fri, 04 Oct 2024 16:40:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Riley-Gear-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc3d11ab0d190632720966ca4483b502a98b178bf52ea8086cd6c2b364e6adad</i><br /><br />Threat actor <b>description</b>: <i>Riley Gear Corporation, based in St. Augustine, Florida, can execute to the highest gear precision standards set by the American Gear Manufacturers Association. We are ready to upload more than 20 GB of data among which you will find NDAs and much information about their employees with SSNsand other personal data.</i><br />Target victim <b>website</b>: <i>rileygear.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>TANYA-Creations</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17763</link>
<guid>409a410d6e59c8601f0e6c0abc389120</guid>
<pubDate>Fri, 04 Oct 2024 16:40:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>TANYA-Creations</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3de4e9c8c2bb234d5250e3c93f91938ff208ae4d6743ec914dd81fef3b178850</i><br /><br />Threat actor <b>description</b>: <i>Unique Designs, Inc is an award-winning design, sales, and distribution company with over 40 years’ experience serving the privatelabel needs of the retail industry.A lot of NDAs, personal information of their employees and their relatives, including SSNs, emails, passports, driver licenses. Also you can find info containing their customers data with phones,emails and addresses.</i><br />Target victim <b>website</b>: <i>tanyacreations.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>mullenwylie.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17767</link>
<guid>25191c004221d083d28c75d74b00518e</guid>
<pubDate>Fri, 04 Oct 2024 15:53:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>mullenwylie.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f96652a1fd2a665f16e273a38b69f62ab0e455d728d696bba54fafa5af12253</i><br /><br />Threat actor <b>description</b>: <i>Mullen Wylie is a company that specializes in providing innovative solutions in the fields of architecture and design. They focus on creating sustainable and aesthetically pleasing environments that meet the needs of their clients. With a team of skilled professionals, Mullen Wylie combines technology and creativity to deliver projects that enhance both functionality and visual appeal.</i><br />Target victim <b>website</b>: <i>mullenwylie.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>GenPro-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17766</link>
<guid>a530271b32d4cca7b2817af7bc0de0db</guid>
<pubDate>Fri, 04 Oct 2024 15:48:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>GenPro-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>74aa49e65ca13705761911a7c0f7bf22b0196995264be4cf4e8c26dc38f01196</i><br /><br />Threat actor <b>description</b>: <i>"Genpro, Inc. is an integrated 3PL with over 30 years of experience and a deep bench of proven professionals on both the shipper and carrier side. Real-time market intelligence keeps our shippers and carriers up-to-date on current pricing, availability and market trends. Our advanced technology facilitates data connectivity across platforms and systems. We're recognized as a trusted advisor, liaison, and partner for logistics planning and solutions in the most demanding, competitive and time sensitive applications."</i><br />Target victim <b>website</b>: <i>genproinc.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>CopySmart-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17765</link>
<guid>17827012d084a8cfe269cb35c89e8242</guid>
<pubDate>Fri, 04 Oct 2024 14:58:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ciphbit</b> claims attack for <b>CopySmart-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>babd3a0e1a5210106c5769bf25ec62fbc085b55fa4ccfef6ef406e36128c5a12</i><br /><br />Threat actor <b>description</b>: <i>CopySmart LLC is a dynamic company specializing in providing innovative document management solutions and printing services. Known for its customer-centric approach, CopySmart offers a range of services including high-quality printing, copying, and scanning. The company is committed to sustainability and efficiency, leveraging advanced technology to meet the diverse needs of its clients across various industries.</i><br />Target victim <b>website</b>: <i>www.copysmart.us</i>]]></description>
<category>ciphbit</category>
</item>
<item xmlns:dc='ns:1'>
<title>North-American-Breaker</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17759</link>
<guid>54a6299f9bc0e98a0b01b8364b4bc0af</guid>
<pubDate>Fri, 04 Oct 2024 14:34:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>North-American-Breaker</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3bd6e33bb4fb1dcb962472411a13bd0df0b047298fdbf5615873e3b5277fc9de</i><br /><br />Threat actor <b>description</b>: <i>NABCO sells business to business through wholesale distribution only and will not sell directly to contractors or end users. We are expanding into new product lines as well as new markets, while constantly expanding our footprint in the electrical wholesale market.We have more than 100 GB of data. There are a lot of confidentialfiles, including NDA's, addresses, phones, emails and SSN's of their employees.</i><br />Target victim <b>website</b>: <i>nabcous.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>GW-Mechanical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17761</link>
<guid>be90834ac3a868b530c41f044ebc4ed1</guid>
<pubDate>Fri, 04 Oct 2024 12:17:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>GW-Mechanical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>913ff0168d646194f05368ae3596e90ab1f5ee21a905112e0091e6d39fb4e184</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>www.gwmechanical.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dreyfuss--Blackford-Architecture</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17760</link>
<guid>7a101913ba86716f839a622ab65bdf3d</guid>
<pubDate>Fri, 04 Oct 2024 12:14:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Dreyfuss--Blackford-Architecture</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ece8247f6a3b9206102108e485d32eac7f2bfe7a521a7b98a2df8b121347084c</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>www.dreyfussblackford.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>McGaughey--Keaney-CPAs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17754</link>
<guid>3e9cead2c9b3e1d6763b44f9d32ee667</guid>
<pubDate>Fri, 04 Oct 2024 10:38:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>McGaughey--Keaney-CPAs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9d87eb05d2380946cde58e1f8bc44f0bcad84cee4101ff15587937d761e9c18b</i><br /><br />Threat actor <b>description</b>: <i>McGaughey & Keaney CPAs is a company that operates in the Accounting Services industry. It employs 1to4 people and has under500K of revenue. As of January 1, 2017, we are operating as McGaughey & Keaney CPA's, LLP. We are committed to providi            ...</i><br />Target victim <b>website</b>: <i>www.taxplancpa.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>DPC-DATA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17753</link>
<guid>187bec2578ef4a5cb35bdfbe8fc8088e</guid>
<pubDate>Fri, 04 Oct 2024 09:18:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>DPC-DATA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d69f4198ef4feda8c761f72b825339fa0e718e2caecbb63a717429310550dcac</i><br /><br />Threat actor <b>description</b>: <i>We have over 400 GB of data from this company , they have 96 hours to contact us if not we will make a public auction to sell the data . 
The DPC DATA executive team is known for leadership in building and delivering digital information solu            ...</i><br />Target victim <b>website</b>: <i>www.dpcdata.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Conductive-Containers-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17752</link>
<guid>58ca56b8d08b89f6972767847e087c72</guid>
<pubDate>Fri, 04 Oct 2024 03:07:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Conductive-Containers-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d6fcf4998c38e074c48855f238999f5e41ab7d4e084c2fa22f77e9027b3cecbc</i><br /><br />Threat actor <b>description</b>: <i>The data will be released soon if the company doesn't contact us.  We offered Corstat, Corstat and more Corstat to shield products from static. Sometimes we got creative and added foam for extra cushioning. Today Corstat is still the most trusted static shielding box and the foundation of many of our static control solutions, but we’ve also grown in our manufacturing capabilities and ESD package design creativity.  Today, CCI is about design and engineering, vertical integration and a whole lot of inventory.  We take pride in providing unique static protective packaging solutions that match the way you want your system to work and our vertically integrated processes put us in the position to choose the most cost effective way to meet your needs. When you add our package design and manufacturing expertise with our raw material inventory and stock selection, you have CCI’s formula for success.      Thermoforming of ESD safe plastics     Industry leader in conductive fluted plastic with Durastat totes, custom printing and die cutting     Injection molded conductive boxes and parts     Fabricating of proprietary permanent ESD foams     Complete package assemblies     In-house tooling and rapid prototyping     Developed exciting Tacki Pak technology     Introduced KleenStat Flex – a permanent, low F.O.D. ESD safe materials that is tough, flexible and ultra clean</i><br />Target victim <b>website</b>: <i>corstat.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>Barnes--Cohen</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17749</link>
<guid>ff6dec2c39768126491474050424b2ed</guid>
<pubDate>Thu, 03 Oct 2024 19:04:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trinity</b> claims attack for <b>Barnes--Cohen</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d24770d58bc403c553fce89172413600e23e47e28a5a91a41fe600d81c6084f2</i><br /><br />Threat actor <b>description</b>: <i>15Gb - Revenue: <$5 Million - Publication date: 2024-11-04</i><br />Target victim <b>website</b>: <i>www.bbcjustice.com</i>]]></description>
<category>trinity</category>
</item>
<item xmlns:dc='ns:1'>
<title>TRC-Worldwide-Engineering-Trcww</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17745</link>
<guid>3f194fbcc671d39373d095ac1e4aab4d</guid>
<pubDate>Thu, 03 Oct 2024 15:40:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>TRC-Worldwide-Engineering-Trcww</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>28076a82a7aa78cea1dcd7d1bfdb8702a62aef9156103e14eabc97f0355c8e1f</i><br /><br />Threat actor <b>description</b>: <i>TRC Worldwide Engineering is an international and nationally recognized professional services firm employing over 500  people across the U.S. and India.We received a large number of documents regarding their projects and work with their partners, including engineering designs, building schematics, financial documents and personal information.</i><br />Target victim <b>website</b>: <i>TRCWW.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rob-Levine--Associates-roblevine.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17746</link>
<guid>d78931067f2c9f1cfb9165f1d73e67e7</guid>
<pubDate>Thu, 03 Oct 2024 15:40:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Rob-Levine--Associates-roblevine.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d8b91025e62d53e1b051725fee92eca442ac5888171b90c0273a8e3f16023f9c</i><br /><br />Threat actor <b>description</b>: <i>Over 20 years ago, the personal injury law office of Rob Levine &Associates opened for business in Rhode Island. Since then, leadattorney Rob Levine has become known to have one of the most aggressive approaches to personal injury litigation in the tri-statearea.  His dedication to helping Veterans and those in need of Social Security benefits has grown the practice into a nationwide law firm.We have a huge amount of data (more than 300 GB) most of which ismedical records of military veterans. Besides that you can find payments details, personal information (for example driver licenses) and many others.</i><br />Target victim <b>website</b>: <i>roblevine.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>LIFTING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17744</link>
<guid>162c8a1cc0a8f18f8120a829f749e37f</guid>
<pubDate>Thu, 03 Oct 2024 08:57:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>LIFTING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f992ce05f16ec188dbc9c05bacd8e603f396ce6dcc042786b69a88bf512f0c72</i><br /><br />Threat actor <b>description</b>: <i>The nation&#039;s largest rigging equipment supplier with coast-to-coast coverage. Buy Rigging Equipment &amp; Rigging Supplies Online at the Best Prices.</i><br />Target victim <b>website</b>: <i>LIFTING.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Emerson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17742</link>
<guid>43e546371f8128e1e37bc52d5b200213</guid>
<pubDate>Thu, 03 Oct 2024 08:36:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Emerson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>31c85e5fc427a826a8d4c3ad11a9c55e3e6edcf55b5d549937c316f0d207e98d</i><br /><br />Threat actor <b>description</b>: <i>Emerson is a technology, software, and engineering company providing solutions for customers in industrial and commercial industries. Emerson corporate office is located in 8000 W Florissant Ave, St. Louis, Missouri, 63136, United States and has 67,000 employees. This is oracle database of their subsidiary company Zedi. The total amount of data leakage is 938.00 GB</i><br />Target victim <b>website</b>: <i>emerson.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Golden-Age-Nursing-Home</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17740</link>
<guid>3297e7aeefb93094955d36536f1fe275</guid>
<pubDate>Thu, 03 Oct 2024 07:01:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Golden-Age-Nursing-Home</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>681b3bbf77ccc5430361269ade49c98e26ae395854f25e35be083a6235004e8b</i><br /><br />Threat actor <b>description</b>: <i>Golden Age Nursing Home Golden Age Nursing Home is a Medicare-certified facility providing short- and long-term nursing and rehabilitative services.</i><br />Target victim <b>website</b>: <i>goldenageguthrie.com</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>mccartycompany.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17732</link>
<guid>579763cfc99f19d44eab37da12fd1191</guid>
<pubDate>Wed, 02 Oct 2024 20:49:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>mccartycompany.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5fd7b18ce5a7e5157079e44e5db09e7815a424c9e2cd3c639e0e6483ec065b9f</i><br /><br />Threat actor <b>description</b>: <i>McCarty Company is a full-service architecture, design, and construction firm that specializes in providing innovative and creative solutions for residential and commercial projects. They focus on delivering high-quality, sustainable designs and have a team of experienced professionals dedicated to meeting client needs and expectations. Their services include architecture, interior design, and construction management.</i><br />Target victim <b>website</b>: <i>mccartycompany.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>domainindustries.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17734</link>
<guid>409ebc36b2594e602977091b76c85d42</guid>
<pubDate>Wed, 02 Oct 2024 20:43:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>domainindustries.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d21e045dac1c3b28737d405569f178c5d9f4102e2ae7401d0879386667375904</i><br /><br />Threat actor <b>description</b>: <i>Domain Industries, Inc. is a U.S.-based company specializing in providing high-quality products and services for the kitchen and bath industry. They offer a wide range of materials, including sinks, faucets, and countertops, designed to meet both residential and commercial needs. Known for their commitment to innovation and customer satisfaction, Domain Industries supports its clients with reliable solutions and excellent service.</i><br />Target victim <b>website</b>: <i>domainindustries.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>ironmetals.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17735</link>
<guid>19d9438c1c41a576fbf6738854a84a28</guid>
<pubDate>Wed, 02 Oct 2024 20:40:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>ironmetals.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>85445684ae40259f171ffcf8bb6d83e99d68ce1e6bd5ab74f2087420b0bd990c</i><br /><br />Threat actor <b>description</b>: <i>Ironmetals.com is a comprehensive online platform dedicated to the metal industry. It offers a wide range of products, including steel, aluminum, copper, and other metals, catering to various industrial needs. The company emphasizes quality, competitive pricing, and efficient delivery services. Additionally, Ironmetals.com provides industry insights, technical support, and custom solutions to meet specific client requirements.</i><br />Target victim <b>website</b>: <i>ironmetals.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>rollxvans.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17736</link>
<guid>6765fdb59f493d80bfd440a3df5ec395</guid>
<pubDate>Wed, 02 Oct 2024 20:37:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>rollxvans.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9163bf69b951ef83a0c690a36a95638ae8e2e523395dda75888e023bfd9b9154</i><br /><br />Threat actor <b>description</b>: <i>Rollx Vans specializes in manufacturing and selling wheelchair-accessible vehicles. They offer customized minivans and full-size vans with features such as lowered floors, ramps, and hand controls to enhance mobility for individuals with disabilities. The company focuses on quality, safety, and customer satisfaction, providing both new and used options, as well as nationwide delivery and support services.</i><br />Target victim <b>website</b>: <i>rollxvans.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>ETC-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17730</link>
<guid>05a0eed59f4254eb0a5103e13fdba02b</guid>
<pubDate>Wed, 02 Oct 2024 16:57:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>ETC-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>106a66333237536af4c7a0d97c017420b7b8c0cee87df296f2025fae0917e413</i><br /><br />Threat actor <b>description</b>: <i>ETC Companies is a General Contractor with a primary focus on large scale affordable housing initiatives throughout the United States. 10Gb to be released. SSNs, passports, DLs, birth certificates and many other personal docs. NDAs, agreements and detailed financial data can be found as well.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Branhaven-Chrysler-Dodge-Jeep-Ram</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17731</link>
<guid>e12660adc7b1a88a9df3f14dcde95197</guid>
<pubDate>Wed, 02 Oct 2024 16:24:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Branhaven-Chrysler-Dodge-Jeep-Ram</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>347325923519cfb4d7ff3e6820a3a6f1cbe98a9fa595f110ae7765288490bf51</i><br /><br />Threat actor <b>description</b>: <i>Branhaven Chrysler Dodge Jeep RAM has been serving drivers in New Haven, Hartford, Middletown</i><br />Target victim <b>website</b>: <i>branhaven.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Forshey-Prostok-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17727</link>
<guid>24c8db16d24d12cce5c8a9e1d9c8678f</guid>
<pubDate>Wed, 02 Oct 2024 15:35:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Forshey-Prostok-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c7a02c1b94c4bccb1031d32512f1e8290022c91b70f45e8fb0dcfc2ba8e9333</i><br /><br />Threat actor <b>description</b>: <i>We have  over 300 GB of clients and financial files downloaded from their servers , company has 48 hours to contact us .</i><br />Target victim <b>website</b>: <i>forsheyprostok.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Quantum-Healthcare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17725</link>
<guid>99e84b6c12714d479c245f276d377be0</guid>
<pubDate>Wed, 02 Oct 2024 07:03:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Quantum-Healthcare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff645caeb049438c3b38561620c2b3e300e07d49cb9e34dc285cb1149c40d777</i><br /><br />Threat actor <b>description</b>: <i>Quantum Healtcare</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>United-Animal-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17715</link>
<guid>03f49b05efdd5edf3b57ed84b1cfb226</guid>
<pubDate>Tue, 01 Oct 2024 19:54:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>United-Animal-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7766a8f347b59c8d9ec2d269fc0d91b9b00971943a8147c23ce82684766e78e7</i><br /><br />Threat actor <b>description</b>: <i>We have over 1000 GB of data from this company , they have 96 hours to contact us if not we will make a public auction to sell the data . United Animal Health, Inc. is now a prosperous international company with over 325 employees, nine feed             ...</i><br />Target victim <b>website</b>: <i>www.unitedanh.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cascade-Columbia-Distribution</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17713</link>
<guid>e2db197e07804d57f3af6c3bd1368f5e</guid>
<pubDate>Tue, 01 Oct 2024 17:49:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Cascade-Columbia-Distribution</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>feb0efb93bdb937d6e4a9978a0da27e63236c35b82833b605c8b41045e4f2a75</i><br /><br />Threat actor <b>description</b>: <i>Cascade Columbia Dist Co is a chemicals company based out in the United States. We are going to release the data soon. Accounting and financial data, detailed employees data, projects, contracts,customer files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Labib-Funk-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17720</link>
<guid>743006f5b956eb5d80f0662463426b2b</guid>
<pubDate>Tue, 01 Oct 2024 17:44:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>Labib-Funk-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1db333cf8481ca01d542e296b528063bc9555e25b3eb3108b9576237d9aeed0</i><br /><br />Threat actor <b>description</b>: <i>Labib Funk + Associates is a design and architecture firm specializing in a variety of projects, including commercial, institutional, multifamily, mixed-use, and hospitality developments. They offer services in seismic retrofitting and affordable housing and have completed notable projects like the Intuit Dome, Lakers Training Facility, and NFL Media HQ. The firm's portfolio showcases a wide range of architectural work, emphasizing innovation and functionality.</i><br />Target victim <b>website</b>: <i>www.labibfunk.com</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Research-Electronics-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17719</link>
<guid>e1c9f6b9513b24b26622680af713ffe3</guid>
<pubDate>Tue, 01 Oct 2024 17:40:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>Research-Electronics-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f60670084ca73861efb5ff09bbf0586b8fbfde12235ff374057868c1c8e78c3</i><br /><br />Threat actor <b>description</b>: <i>REI specializes in the design and manufacture of electronic test equipment for security applications. The company was founded in 1983 in Cookeville, Tennessee, U.S.A. by Bruce Barsumian, who later partnered with Tom Jones (GM) in 1995. In June 2019 REI became an Electronic Technologies  subsidiary of HEICO Corporation (Hollywood, FL, USA). REI customers include government agencies, law enforcement organizations, corporate security personnel, and TSCM professionals worldwide that have a need and responsibility to protect sensitive information.</i><br />Target victim <b>website</b>: <i>reiusa.net</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>ShoreMaster</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17714</link>
<guid>6f612fb837c33214c0bdae50c8189d16</guid>
<pubDate>Tue, 01 Oct 2024 16:59:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>ShoreMaster</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c06e5d4bd90497580684fc3ddc8d90a13b3d97e33d1719d38de99614791e8724</i><br /><br />Threat actor <b>description</b>: <i>ShoreMaster is a customer-focused, market driven company manufacturing quality products safely and efficiently. We got about 15Gb of data. We will release it soon. Confidential files, agreements,employee files with personal data, lists with SSNs and many other interesting files.</i><br />Target victim <b>website</b>: <i>shoremaster.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>aberdeenwa.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17716</link>
<guid>88fb5550341fd3bb49edeb9c7a006747</guid>
<pubDate>Tue, 01 Oct 2024 16:06:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>aberdeenwa.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d81073c1b91dc914332a79481b6171e2495d8667872150f5c6c8e64a077eb3d2</i><br /><br />Threat actor <b>description</b>: <i>Aberdeenwa.gov represents the official website for the city of Aberdeen, Washington. It serves as a comprehensive resource for residents, businesses, and visitors, offering information on local government services, community events, public safety, and city ordinances. The site provides access to city council meetings, permits, and various online services to enhance civic engagement and streamline municipal operations.</i><br />Target victim <b>website</b>: <i>aberdeenwa.gov</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>CSG-Consultants</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17710</link>
<guid>9e284987861e168601af5d3582b0fede</guid>
<pubDate>Tue, 01 Oct 2024 15:52:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>CSG-Consultants</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>331e89ff0bbfed2d7fe3d43cf1c7044a6829f64c5e117c25b93d4cde4a138555</i><br /><br />Threat actor <b>description</b>: <i>CSG Consultants is a civil engineering company providing building, engineering, and construction management services. 15Gb of datato be released soon. Lots of passports, DLs, birth certs and other employees docs. You will also find NDAs, client's information,projects and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>performance-therapies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17700</link>
<guid>7349029dfd97a1861bdbcc913734aacf</guid>
<pubDate>Tue, 01 Oct 2024 10:28:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>performance-therapies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2614546e49fb96b05d512f7f1496085bcda25d892579f0b24e1f4cda4e9c9a0b</i><br /><br />Threat actor <b>description</b>: <i>Performance Therapies, P.C. has grown tremendously since its inception in 1999 in the basement of our founder’s home.

Through hard work and dedicated service our employees have been able to demonstrate phenomenal growth. We now have a te            ...</i><br />Target victim <b>website</b>: <i>www.ptforhealth.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>howardcpas.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17696</link>
<guid>96d1382d50a8e569d7ad3d9ee104a1f7</guid>
<pubDate>Tue, 01 Oct 2024 01:35:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>howardcpas.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9bff9b9b5756bff0d597480bf882e0ddd8c03dc27e4cf40318c793078d4df5a4</i><br /><br />Threat actor <b>description</b>: <i>Howard CPAs is a professional accounting firm offering comprehensive financial services including tax planning, auditing, consulting, and bookkeeping. Their team of experienced CPAs focuses on personalized solutions to meet the unique needs of individuals and businesses. Known for their commitment to accuracy and client service, they aim to help clients achieve financial success and compliance.</i><br />Target victim <b>website</b>: <i>howardcpas.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>Community-Hospital-of-Anaconda</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17678</link>
<guid>22fbcf3708d8f7c3ab8c89b7fa8ffcd9</guid>
<pubDate>Mon, 30 Sep 2024 19:25:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Community-Hospital-of-Anaconda</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9933f25d01e4724631277fd332a78b71bcb88c1d959317938c752f44c28ed417</i><br /><br />Threat actor <b>description</b>: <i>The Community Hospital of Anaconda, located in Anaconda, Montana, is a healthcare facility dedicated to providing comprehensive medical services to the local community. It offers a range of services including emergency care, inpatient and outpatient treatments, surgical procedures, and specialized care. The hospital is committed to delivering high-quality, patient-centered care in a compassionate and supportive environment.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>IDEALEASE-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17691</link>
<guid>4ec31eeaba1b784b650382236495532d</guid>
<pubDate>Mon, 30 Sep 2024 18:40:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>IDEALEASE-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7aff42fda44cc81fa22d02333b05935d618860315a83f3d9f543c263f40d9906</i><br /><br />Threat actor <b>description</b>: <i>https://www.idealease.com/ Idealease is a leading provider of commercial truck leasing, rental, and maintenance solutions, serving businesses of all sizes across various industries. With a focus on reliability and customer satisfaction, Idealease offers flexible lease and rental options, along with comprehensive maintenance programs to keep fleets operating efficiently. Their expert team ensures that businesses receive tailored solutions that meet their specific transportation needs, backed by nationwide support and a commitment to safety and compliance. By partnering with Idealease, companies can optimize their fleet management, reduce operational costs, and focus on their core business operations with confidence.</i><br />Target victim <b>website</b>: <i>www.idealease.com</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Control-Panels-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17690</link>
<guid>b237e7e6bada3f572c342dc4bbcda0d2</guid>
<pubDate>Mon, 30 Sep 2024 18:37:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>Control-Panels-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>088bce35735ac36ba30400ebda5c92ca8e28c5edc3f28c78ad1a912ba53e02f5</i><br /><br />Threat actor <b>description</b>: <i>Control Panels USA is a premier provider of custom control panel solutions, serving a diverse range of industries including water treatment, manufacturing, energy, and more. With a strong emphasis on quality, precision, and reliability, they specialize in designing, engineering, and manufacturing control panels that meet the specific requirements of each project. Their expertise spans across various types of panels, including UL-listed, PLC, HMI, and SCADA systems, ensuring seamless integration and optimal performance. Control Panels USA is committed to delivering top-tier products and services, offering comprehensive support from initial concept to installation, and helping clients achieve efficient and safe operations.</i><br />Target victim <b>website</b>: <i>www.controlpanelsusa.net</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Spectrum-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17689</link>
<guid>8f32d19b3dab923e94b33d24c8fd4cb4</guid>
<pubDate>Mon, 30 Sep 2024 18:34:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>Spectrum-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>70fe565c6ddfc1dcfab66656aa299cab7b45113f358a64adac82fac713c6e805</i><br /><br />Threat actor <b>description</b>: <i>Spectrum Furniture is a leading manufacturer of innovative and high-quality furniture solutions designed for educational, corporate, and healthcare environments. Specializing in technology-friendly furnishings, Spectrum offers a wide range of products including lecterns, desks, charging carts, and collaborative furniture tailored to support modern learning and working spaces. With a focus on durability, functionality, and user comfort, their products are crafted to enhance both the user experience and the integration of technology. Spectrum Furniture is known for its commitment to quality, ergonomic design, and the ability to customize solutions that meet the unique needs of clients, fostering productive and flexible environments.</i><br />Target victim <b>website</b>: <i>www.spectrumfurniture.com</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brechbuhler-Scales-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17687</link>
<guid>29408e40f29b755231e852fb76b71b4b</guid>
<pubDate>Mon, 30 Sep 2024 18:28:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>Brechbuhler-Scales-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4946ff8fcc80ebd871f2e28856daaf98e2201c86982e4436076b85c2c93b700c</i><br /><br />Threat actor <b>description</b>: <i>Brechbuhler Scales Inc. is a leading provider of weighing solutions, offering a wide range of products and services to meet the needs of various industries. With a focus on precision, quality, and innovation, the company specializes in providing scales and weighing systems for commercial, industrial, and laboratory use. Their expert team is committed to delivering customized solutions, from installation and calibration to ongoing maintenance and support, ensuring accuracy and reliability in every application. Brechbuhler Scales Inc. has established a reputation for excellence, catering to clients with state-of-the-art equipment and unparalleled customer service.</i><br />Target victim <b>website</b>: <i>www.brechbuhler.com</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>MDSi-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17686</link>
<guid>c112115f1c81e4f4b74a738aef045c30</guid>
<pubDate>Mon, 30 Sep 2024 18:24:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nitrogen</b> claims attack for <b>MDSi-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5286b3943d9752e6b8bbf7867c9191d4a2e5469c909451cf602afbb3b33809b9</i><br /><br />Threat actor <b>description</b>: <i>MDSI (Material Design Systems, Inc.) is a leading provider of innovative material handling and storage solutions, catering to businesses across various industries. With a commitment to optimizing workflow and enhancing operational efficiency, MDSI specializes in designing, engineering, and installing custom storage systems, including mezzanines, pallet racking, conveyor systems, and more. Their team of experts works closely with clients to develop tailored solutions that maximize space, improve safety, and streamline processes. MDSI stands out for its dedication to quality, exceptional customer service, and delivering turnkey solutions that help businesses achieve their productivity and storage goals.</i><br />Target victim <b>website</b>: <i>www.mdsiinc.com</i>]]></description>
<category>nitrogen</category>
</item>
<item xmlns:dc='ns:1'>
<title>carlile-group.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17684</link>
<guid>0023daa5a44ef6fbe42379f24e00254c</guid>
<pubDate>Mon, 30 Sep 2024 17:50:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>carlile-group.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7cb996ab94e4ae675088e455f4e638afea9188499702bb7c6ff1bb7c89533d26</i><br /><br />Threat actor <b>description</b>: <i>The Carlile Group is a collective of experts committed to advancing the science of buildings. We collaborate to assist owners in creating, enhancing, and maintaining our built environment.</i><br />Target victim <b>website</b>: <i>carlile-group.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lee-Hoffoss-Injury-Lawyers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17674</link>
<guid>0f92c979a6541ca6b7f292ae1dcf5ec8</guid>
<pubDate>Mon, 30 Sep 2024 16:24:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Lee-Hoffoss-Injury-Lawyers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>55560f8df1a178eaea7da40aea8dea778b8779431c3721b163c820d0ee97ceb8</i><br /><br />Threat actor <b>description</b>: <i>Lee Hoffoss Injury Lawyers is a legal firm specializing in personal injury cases, based in Lake Charles, Louisiana. They offer comprehensive legal services for victims of accidents, including car crashes, workplace injuries, and medical malpractice. The firm is known for its client-focused approach, dedicated advocacy, and a strong track record in securing favorable settlements and verdicts.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>McAbee-Construction-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17669</link>
<guid>7e67622685947b49f374229b83be6cd6</guid>
<pubDate>Mon, 30 Sep 2024 13:24:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>McAbee-Construction-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>03193935236590a13ba44f773f21744abdcec65222951df27a1c854fdb176847</i><br /><br />Threat actor <b>description</b>: <i>We have over 593 GB of data from this company , they have 48 hours to contact us if not we will make a public auction to sell the data .
McAbee (McAbee Construction, Inc.) was founded in 1962 by Leroy McAbee Sr. and has set the standards for            ...</i><br />Target victim <b>website</b>: <i>mcabeeinc.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sub-Zero-Wolf-and-Cove</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17671</link>
<guid>5624e6ca4bb96789d1a7658ac27895d1</guid>
<pubDate>Mon, 30 Sep 2024 11:45:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Sub-Zero-Wolf-and-Cove</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3845d0d7ff4e443d9568b9b4798cecf4bd548718f6e85b074e043700b320a2f7</i><br /><br />Threat actor <b>description</b>: <i>Sub-Zero, Wolf, and Cove is an American brand of residential major kitchen appliances including refrigeration and preservation products. Sub-Zero, Wolf, and Cove corporate office is located in 4717 Hammersley Rd, Madison, Wisconsin, 53711, United States and has 2,648 employees. The total amount of data leakage is 760.60 GB</i><br />Target victim <b>website</b>: <i>subzero-wolf.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Plastics-Plus</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17672</link>
<guid>c2a51f28f7e17c648db03e7caca038de</guid>
<pubDate>Mon, 30 Sep 2024 11:34:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Plastics-Plus</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>84b7490f737703f432a51bfb5546ae641626e6945f0fc671bd38ff78f9abc0f5</i><br /><br />Threat actor <b>description</b>: <i>Plastics Plus Since our founding in 1990, Plastics Plus has emerged as a leader in the plastic resin distribution industry. As a privately held company, we've dedicated ourselves to mastering the distribution of thermoplastics, serving a wide range of industries with our expertise.</i><br />Target victim <b>website</b>: <i>plasplus.com</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Freshstart-Credit-Repair</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17668</link>
<guid>e0d1b5ce9153ef8740cff2ad288b5b53</guid>
<pubDate>Mon, 30 Sep 2024 07:25:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Freshstart-Credit-Repair</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3774b494eac83d56acf01d6699038f7b22560097f11b2aaccb710f9f6a3f63fe</i><br /><br />Threat actor <b>description</b>: <i>Freshstart Credit Repair is a company dedicated to helping individuals improve their credit scores and financial health. They offer personalized credit repair services, including credit report analysis, dispute resolution with credit bureaus, and financial education. Their goal is to empower clients to achieve better creditworthiness and financial stability through tailored strategies and professional support.</i><br />Target victim <b>website</b>: <i>toafreshstart.com</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Andantex-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17653</link>
<guid>ed54e9a013d6bbc378503bdb4ca43c27</guid>
<pubDate>Mon, 30 Sep 2024 01:46:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Andantex-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4887d4f5379a97175b9708f96d7b64bf1177af061fa1ed7a731f34dbd1c927b9</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.andantex.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>weisermemorialhospital.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17666</link>
<guid>3e307b6a012bf8bed4eeffa52b3ab454</guid>
<pubDate>Mon, 30 Sep 2024 01:34:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>weisermemorialhospital.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c6e2a398593e28c2f53eeca77458787fd3a8a3b940d8a77e2fd140ee1c91a280</i><br /><br />Threat actor <b>description</b>: <i>Weiser Memorial Hospital is a full service not-for-profit community hospital that has been serving the healthcare needs of Washington County and surrounding areas since 1950. In recent years, the hospital has grown to include the Surgical and Specialty Clinic that provides access to numerous specialists, as well as Family Medical Center, a family practice clinic that provides access to local family physicians.  - 200 GB Data

Adam Hollman likes to waste time. 

Persons Responsible: 
Adam Hollman ( adam.hollman@arcticwolf.com +1-612-887-1547)
David Allwein ( dallwein@weiserhospital.org +1-208-230-1092 )
Steven Hale ( shale@weiserhospital.org +1-808-282-6001 / +1-208-549-4450)</i><br />Target victim <b>website</b>: <i>weisermemorialhospital.org</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>Affirm-Agency</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17652</link>
<guid>bb43b255f1e4020e7ad8f6cd9d39fa9d</guid>
<pubDate>Sun, 29 Sep 2024 22:48:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Affirm-Agency</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d89c8ecb8aa287cc2c31ec1a15614f65e07af97de72744dff11505e13fe6afc0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.affirmagency.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>InteriorWorx-Commercial-Flooring</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17663</link>
<guid>2fd78cae85017cecbfbe152b9133965f</guid>
<pubDate>Sun, 29 Sep 2024 21:54:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>InteriorWorx-Commercial-Flooring</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9137ee009d2d4705edd32f5e489b3be784ee251bcced0dbe7ef0310c23faaaba</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.interiorworxcommercialflooring.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Performance-Food-Centers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17662</link>
<guid>ba0c22ae21290ef88181d910254d9ac8</guid>
<pubDate>Sun, 29 Sep 2024 21:51:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Performance-Food-Centers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c8008e6b740479f3aae1e654b3731c7fcc6c16ab2d6cfc2f04adfdd09ffaecd</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.performancefoodcenters.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>GS-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17660</link>
<guid>277a706543f94af84aa87dd5a4015765</guid>
<pubDate>Sun, 29 Sep 2024 21:39:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>GS-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a3ee45cc36cc2355107f89a3c14a088758ee6a6f5217b5c429f91a066b4adc2</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.gssolutions.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Rubber-Resources</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17658</link>
<guid>548b57cc0fd23358084548f3bbd9fdbc</guid>
<pubDate>Sun, 29 Sep 2024 21:32:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>The-Rubber-Resources</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>44d9079247f5c1764b88626a8e35b8fd7f98894f8373a829f03bb71cf9b9253a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.rubber-resources.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Classic-Business-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17657</link>
<guid>c654fadc9a9b502997ce42c9dc82ece2</guid>
<pubDate>Sun, 29 Sep 2024 21:29:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Classic-Business-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26ff003df167a928a87ec34554ed33c2d05459128d62c29fc8b8f6072a88933c</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.classicbusiness.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Garvey</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17656</link>
<guid>827db779e3e645101720d62feaea0cde</guid>
<pubDate>Sun, 29 Sep 2024 21:26:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Garvey</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>61bcf511a617529cc58a66404589d9f5e324f284260407ab9588e9c833e902fb</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.garveyscarpet.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Divine-Interprises-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17654</link>
<guid>68cc84f0834098558e316e76dc5d8c7b</guid>
<pubDate>Sun, 29 Sep 2024 21:22:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Divine-Interprises-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b97e37b3454810b2a9506f5931a8621edbe59b3b12777ae26d15e759cac133d0</i><br /><br />Threat actor <b>description</b>: <i> Divine Enterprises Inc., is a growing transportation company, that specializes in providing logistic solutions to the Continental United States and Canada for variety of industries. Our company has years of experience providing qualified truckload, less-than- truckload, expedited services for temperature controlled freight and services to pharmaceutical manufacturers. Company dedication to constant improvements and exemplary customer service, has given us the opportunity to earn the business of many large Pharmaceutical companies across the globe. Our commitment to excellent service has built a strong base for further development in the years to come.</i><br />Target victim <b>website</b>: <i>divinetrans.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>DINAS-Corp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17655</link>
<guid>77be765d0fa6addb7d2d99c79ef76ff3</guid>
<pubDate>Sun, 29 Sep 2024 21:21:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>DINAS-Corp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06cfdb79689ebe32167382c8efa159c1c3628db280dd82bc8619b79c8fb05963</i><br /><br />Threat actor <b>description</b>: <i> DINAS is a wholesale distributor specializing in the sale of Latin American goods. With roots starting in the sale of Colombian products, we have diversified to include products inspired from other countries (Peru, Mexico, Brazil, Thailand, Costa Rica, etc). Everyday we strive to improve our products, and bring our clients a wider selection of goods to chose from. Since 1994, we have been providing over two decades of service to the continental USA, and hope to continue to expand our reach.</i><br />Target victim <b>website</b>: <i>dinascorp.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>4B-Components</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17651</link>
<guid>60c4c8272e3838f9e57e80f4363afc78</guid>
<pubDate>Sun, 29 Sep 2024 20:52:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>4B-Components</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca94210413552bcb1ad1a00d7cee9e5d0cd87c4cdfeb2a9b4a962b93eee9f4df</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.go4b.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Moeller-Door-and-Window</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17646</link>
<guid>eef7c9b1b1d71701f94d9a90f02adde5</guid>
<pubDate>Sun, 29 Sep 2024 13:23:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Moeller-Door-and-Window</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab8a30181810abb576574d4126b954acdde4eb8890a355fd818bc26be674c331</i><br /><br />Threat actor <b>description</b>: <i>Moeller Door and Window is a reputable company specializing in high-quality door and window solutions. They offer a wide range of products, including energy-efficient windows, stylish doors, and custom designs tailored to customer needs. Known for their exceptional craftsmanship and customer service, Moeller Door and Window serves both residential and commercial clients, ensuring durability and aesthetic appeal in every project.</i><br />Target victim <b>website</b>: <i>moellerdoorandwindow.com</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>rockymountaingastro.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17640</link>
<guid>06dea2c13dd7f20a509f3d4d411c2591</guid>
<pubDate>Sat, 28 Sep 2024 20:53:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>rockymountaingastro.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48d0dc957cd63b443ffeb4f681a70a111f292327a1c49f9297f1f9fea08ced6a</i><br /><br />Threat actor <b>description</b>: <i>Rocky Mountain Gastroenterology is a healthcare provider specializing in the diagnosis and treatment of gastrointestinal disorders. They offer a range of services including endoscopy, colonoscopy, and liver disease management. The practice is committed to patient-centered care, utilizing advanced technology and a team of experienced gastroenterologists to ensure high-quality medical treatment.</i><br />Target victim <b>website</b>: <i>rockymountaingastro.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.contegritygroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17639</link>
<guid>87d2df31d91c857ffb1a3d5caf45f766</guid>
<pubDate>Sat, 28 Sep 2024 18:59:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.contegritygroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63a5c46668cf733d33207776a593dda848db57d2dfd7cb8ae421a8acb92948ba</i><br /><br />Threat actor <b>description</b>: <i>Contegrity Group, Inc. specializes in professional development and organizational consulting. They focus on enhancing leadership capabilities and fostering effective teamwork within organizations. Their services include workshops, coaching, and tailored consulting engagements aimed at improving communication, productivity, and overall organizational health.</i><br />Target victim <b>website</b>: <i>www.contegritygroup.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southern-Fire-Sprinkler</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17638</link>
<guid>4ab35559cc92240547c18e228f234484</guid>
<pubDate>Sat, 28 Sep 2024 15:02:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ciphbit</b> claims attack for <b>Southern-Fire-Sprinkler</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96276cafd3a596e9a62aa1f6762afc1d5ce09fffd169e14b832c6bb602cfc42b</i><br /><br />Threat actor <b>description</b>: <i>Southern Fire Sprinkler is a specialized company dedicated to the design, installation, and maintenance of fire sprinkler systems. They offer comprehensive fire protection solutions for both residential and commercial properties, ensuring compliance with safety regulations. With a team of experienced professionals, they focus on high-quality service, reliability, and customer satisfaction to safeguard lives and property.</i><br />Target victim <b>website</b>: <i>www.southernfiresprinkler.com</i>]]></description>
<category>ciphbit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Direct-Access-Partners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17632</link>
<guid>ac29e4f3b0ca96436d431a0ae7746ce7</guid>
<pubDate>Sat, 28 Sep 2024 01:39:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Direct-Access-Partners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34c5bca746c9432cfd45e40304fa7c2011b2764b2a4a28e98619bff3446c6305</i><br /><br />Threat actor <b>description</b>: <i>Direct Access Partners was a financial services firm that specialized in providing brokerage and investment advisory services. The company offered institutional clients access to global markets, trade execution, and research services. It was known for its expertise in emerging markets and fixed-income trading. However, it faced legal issues and regulatory scrutiny, leading to its eventual downfall.</i><br />Target victim <b>website</b>: <i>directaccesspartners.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>actionfirepros.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17628</link>
<guid>60aaa4b2fc3fcf6a41c454149ab76592</guid>
<pubDate>Fri, 27 Sep 2024 11:03:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>actionfirepros.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0debdbf435d03796186097ffca1efb8191cc538a98f49134d641c2d5aee04678</i><br /><br />Threat actor <b>description</b>: <i><p>Commercial &amp; Residential Construction<br><br>“We pride ourselves on our thoroughness and our follow through. We are there until the job is done to the customer's satisfaction. We keep our promises. We are accountable for our work and our word. Our integrity is unwavering and we follow the rules. When we make a commitment, customers know we will keep it. You can count on us.”<br><br>Website: <a href="https://actionfirepros.com/">https://actionfirepros.com/</a><br><br>Revenue : $17.4M<br><br>Address: 3709 S Interstate Hwy 35 E, Waxahachie, Texas, 75165, United States<br><br>Phone Number: (254) 235-8300<br><br><mark class="marker-yellow"><strong>Download link #1:</strong></mark> &nbsp;<a href="https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/ACTIONFIREPROS/PROOF/">https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/ACTIONFIREPROS/PROOF/</a><br><br><mark class="marker-yellow"><strong>Mirror:</strong></mark> <a href="https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/ACTIONFIREPROS/PROOF/">https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/ACTIONFIREPROS/PROOF/</a><br><br><mark class="marker-yellow"><strong>DATA DESCRIPTIONS:</strong></mark> Personal Identifiable Information, financial documents, customer data, corporate documents\contracts, employees\executives personal data, corporate correspondence, etc.</p><p><img src="/uploads/Passport_8a7fd3ad6e.png" alt="Passport.png"><img src="/uploads/Drivers_License_Exp_03_06_32_07f3a38439.png" alt="Drivers License Exp 03-06-32.png"><img src="/uploads/Drivers_License_Exp_10_31_25_0fa45338e2.png" alt="Drivers License Exp. 10-31-25.png"><img src="/uploads/Accident_Report_Guide_05298f1d94.png" alt="Accident Report Guide.png"><img src="/uploads/Executed_contract_65f4825a05.png" alt="Executed contract.png"></p></i><br />Target victim <b>website</b>: <i>actionfirepros.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mile-Hi-Foods</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17615</link>
<guid>544ff8e864cd5c862e831d8ec121b5b8</guid>
<pubDate>Thu, 26 Sep 2024 22:49:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Mile-Hi-Foods</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>486336cd3a551bcab486f9e2f89e6797e9aaf324e06adfffb10f15bcd099c9fc</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.milehicompanies.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shenango-Area-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17612</link>
<guid>d24d56c57e0ef80faefa1aa30b38b4d0</guid>
<pubDate>Thu, 26 Sep 2024 20:49:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Shenango-Area-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b915d2f8c2f04d28fcf121181e6879c9110fce661c43e1f06f88308a8eecab45</i><br /><br />Threat actor <b>description</b>: <i>Shenango Area School District The Shenango Area School District is located in southern Lawrence County, conveniently situated 45 miles north of Pittsburgh and 90 miles south of Erie.  The district encompasses 25 square miles, which includes both Shenango Township and South New Castle Borough.    More</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zimmerman--Walsh</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17617</link>
<guid>bbf2cce2c026133d6a9da7d08fc36cf2</guid>
<pubDate>Thu, 26 Sep 2024 19:14:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Zimmerman--Walsh</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a4784301ea7ecd1dcc0f77a3d4ed57570a137149bff80e3938ceb4941cd26084</i><br /><br />Threat actor <b>description</b>: <i>At Zimmerman & Walsh, LLP, we are dedicated to carrying on the legacy of founder Steven P. Zimmerman who passed away in 2015. Every day, we are proud to serve our fellow community members at an affordable rate as attorney Zimmerman did at his firm for 16 years. With unmatched compassion, enthusiasm and experience, we are not your typical Illinois law firm. Our team works together to ensure we are as thorough as possible when it comes to handling cases. We are more than just a law firm. We treat our clients like family, and we will protect your interests from the onset.</i><br />Target victim <b>website</b>: <i>www.zimwalsh.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>chcm.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17619</link>
<guid>6a89030139adc3d2fc4aade3433e8d16</guid>
<pubDate>Thu, 26 Sep 2024 19:06:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>chcm.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4eb6ac95305290a1f53720cbad75a942229d50a766001f8fa49c5ea8beaff2f</i><br /><br />Threat actor <b>description</b>: <i>Greetings!  Today we are posting here the new company, "College Hospital Costa Mesa".  Company Description: College Hospital Costa Mesa is a facility specializing in psychiatric and medical/surgical services as well as outpatient telehealth, and...</i><br />Target victim <b>website</b>: <i>chcm.us</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ful.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17614</link>
<guid>499b9a5e43ad2e70083e6107e95deb88</guid>
<pubDate>Thu, 26 Sep 2024 18:56:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Ful.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea91267090d09bd59d1dd692124bb7d16346fb529406ad96a890e5e52396b1a4</i><br /><br />Threat actor <b>description</b>: <i>Country: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>English-Construction-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17608</link>
<guid>8eb9becbba23d2ccdccddd9ac3f4a02d</guid>
<pubDate>Thu, 26 Sep 2024 12:17:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>English-Construction-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>39a280932ca983589e9b840924bdc246343670078d0d9cf67459df9d71b16d1c</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1909 and headquartered in Lynchburg, Virginia, English Construction C...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Concord-Management-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17597</link>
<guid>07844316ab7bf7fb3e3378086ddd2ac5</guid>
<pubDate>Wed, 25 Sep 2024 16:26:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Concord-Management-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>687fa8008cbc5a4eaa292e09d6ef1340c9a59ce5584a89fd9a446f5fe65ea088</i><br /><br />Threat actor <b>description</b>: <i>Concord Management Services LLC is a company that operates in theArchitecture, Engineering & Design industry. 23Gb of data will be uploaded soon. There are files of 2 more companies inside the archive. We got detailed personal employee information SSNs, addresses, phones etc. Numerous financial files, agreements and other business files will be available soon as well.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>IP-blue-Software-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17599</link>
<guid>ae64862963de122e67bd777f85f5bfb9</guid>
<pubDate>Wed, 25 Sep 2024 13:29:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>IP-blue-Software-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3eba944d2a781e466486d33f14d9d05373d4bc09c5a72d815d258d0082513fbf</i><br /><br />Threat actor <b>description</b>: <i>IP blue specializes in the development of VoIP softphone products for Windows and Windows Mobile Platforms, Softphones for Cisco IP PBX Platform, 508 compliant Softphones for Visually Impaired and Deaf. P blue Software Solutions corporate office is located in 15 NE Lofting Way, Stuart, Florida, 34996, United States and has 7 employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pennvet.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17600</link>
<guid>82a008560ab8fa4bd01994e2ff52bb6a</guid>
<pubDate>Wed, 25 Sep 2024 13:26:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Pennvet.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9bdf0997b7af322b4909dd5e077339bb6b916d267197cbc9639c20b95881e73</i><br /><br />Threat actor <b>description</b>: <i>Country: USA</i><br />Target victim <b>website</b>: <i>Pennvet.com</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>triverus.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17588</link>
<guid>b6d1a7cca965983d426be9f927e1eb4d</guid>
<pubDate>Wed, 25 Sep 2024 08:27:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>triverus.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e84c16fc27e316a24b755b6683f7eea489980b7e6b3acfc242628ad730e0ae7d</i><br /><br />Threat actor <b>description</b>: <i>Triverus vehicles use high-efficiency cleaning and recovery technology, and are ...</i><br />Target victim <b>website</b>: <i>triverus.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.amchar.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17593</link>
<guid>c4e21b9d9df296ee17ddab3dbbc851f5</guid>
<pubDate>Wed, 25 Sep 2024 08:01:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>www.amchar.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa9ca49f995e607482cfe71d4d3c90041ad5f998612441639fdacd48de028bb4</i><br /><br />Threat actor <b>description</b>: <i><p>FIrearms Retail.<br><br>“AmChar Wholesale, Inc. has been in the firearms business since 1980. During the last 40 years, we have become one of the top distributors in the industry for law enforcement entities and independent dealers in the United States. AmChar is backed by industry professionals who have been in the firearms business for over a half century.”<br><br>Website: <a href="https://www.amchar.com/">https://www.amchar.com/</a><br><br>Revenue : $28.7M<br><br>Address: 100 Airpark Dr Fl 1, Rochester, New York, 14624, United States<br><br>Phone Number: (585) 328-3951<br><br><mark class="marker-yellow"><strong>Download link #1:</strong></mark> &nbsp;<a href="https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/AMCHAR2/PROOF/">https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/AMCHAR2/PROOF/</a><br><br><mark class="marker-yellow"><strong>Mirror:</strong></mark> <a href="https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/AMCHAR2/PROOF/">https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/AMCHAR2/PROOF/</a><br><br><mark class="marker-yellow"><strong>DATA DESCRIPTIONS:</strong></mark> Personal Identifiable Information, financial documents, database backups, employees personal documents, corporate data\contracts, customer information, corporate correspondence, etc.</p><p><img src="/uploads/PETRITSCH_DEBRA_DL_SSN_CARDS_000177_d009972c65.png" alt="PETRITSCH DEBRA DL SSN CARDS_000177.png"><img src="/uploads/STEBOR_RICHARD_IDENTIFICATION_4dc216886f.png" alt="STEBOR RICHARD IDENTIFICATION.png"><img src="/uploads/Beazley_Cyber_Insurance_Application_Above_250_M_AHI_2023_2024_Signed_10_2_2023_748f87e5f8.png" alt="Beazley Cyber Insurance Application (Above 250M) - AHI 2023-2024 Signed 10.2.2023.png"><img src="/uploads/ET_Arms_July_2024_First_Savings_CC_Statement_Tony_Di_Chario_9ba3146f36.png" alt="ET Arms July 2024 First Savings CC Statement - Tony DiChario.png"><img src="/uploads/2023_AWI_Consolidated_Budget_Financials_Package_b14ef91e55.png" alt="2023 AWI Consolidated Budget Financials Package.png"></p></i><br />Target victim <b>website</b>: <i>www.amchar.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>gsdwi.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17583</link>
<guid>ebda20d540b40dac77b3b49b59414c87</guid>
<pubDate>Wed, 25 Sep 2024 03:25:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>gsdwi.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b260d235d93e0c5fa6e72358373d57c2ab07f579c56240b1bc8492b26f44f3fd</i><br /><br />Threat actor <b>description</b>: <i>Certainly! The Germantown School District, often referred to by its website "gsdwi.org," is an educational organization located in Germantown, Wisconsin. It serves the community by offering comprehensive K-12 education, focusing on academic excellence, innovative teaching, and student development. The district prioritizes a collaborative environment to foster growth and prepare students for future success.</i><br />Target victim <b>website</b>: <i>gsdwi.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>PetEdge</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17580</link>
<guid>787e31211573dd825e7f26a9b6725b25</guid>
<pubDate>Wed, 25 Sep 2024 01:48:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>PetEdge</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f66821c8139992b1afd35dcc4655ffddbe7d3d253681dc159e9e31bbec3d52a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.petedge.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>libraries.delaware.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17585</link>
<guid>ee49fef85e1bed67b9f530391b9c74d9</guid>
<pubDate>Tue, 24 Sep 2024 23:21:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>libraries.delaware.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>58bae8dcb0b1a2f6c78b7bba7ff5082e2303759e609aceab2a65de869914f1fe</i><br /><br />Threat actor <b>description</b>: <i>Libraries.delaware.gov is the official online portal for the Delaware Division of Libraries, offering access to a wealth of resources and services. It connects residents to public libraries across the state, providing information on library locations, events, digital collections, and educational programs. The platform aims to support lifelong learning, community engagement, and access to information for all Delawareans.</i><br />Target victim <b>website</b>: <i>libraries.delaware.gov</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hughes-Gill-Cochrane-Tinetti</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17584</link>
<guid>5b7d718b0db551bd2f9ca025f8bb15e0</guid>
<pubDate>Tue, 24 Sep 2024 23:06:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Hughes-Gill-Cochrane-Tinetti</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f768bfe8ae45fafc36607f49099a1649464543a36141f9303a00727f0d91e65</i><br /><br />Threat actor <b>description</b>: <i>Headquartered in Walnut Creek, HGCT is a California law firm, with Bay Area roots, and strong local relationships. We focus exclusively on clients in the greater Northern California area and each of our attorneys is a recognized expert in community association law. Hughes &amp; Gill was founded in 2002 by Michael Hughes and John Gill. Michael Cochrane became a shareholder in 2008, bringing his considerable litigation expertise to the firm. The evolution to HGCT was complete upon Amy Tinetti’s promotion from principal to shareholder in 2017.  Downloads: http://cicadacnft7gcgnveb7wjm6pjpjcjcsugogmlrat7u7pcel3iwb7bhyd.onion/hughes_hill-dataleak</i><br />Target victim <b>website</b>: <i>hughes-gill.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>Menninger-Clinic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17586</link>
<guid>613cfe07a22da823b7ba60968c73ab73</guid>
<pubDate>Tue, 24 Sep 2024 23:03:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Menninger-Clinic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d636faf033b31810ddc35cfe075b13c309a031f8879b64a7e523ce299a4d726e</i><br /><br />Threat actor <b>description</b>: <i>Despite repeated attempts to contact menningerclinic.org we were ignored. The negligence of the management of this organization surprised us. This leaves us with no choice but to start publishing data. Menningerclinic.org has 72 hours to contact us and resolve the situation without exposing their employees to the problems they will face.</i><br />Target victim <b>website</b>: <i>menningerclinic.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>cottlesinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17579</link>
<guid>258751af1eef4a2f85c22416c3d3ab36</guid>
<pubDate>Tue, 24 Sep 2024 19:31:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>cottlesinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c3ad35fcd9e55fdd59037c364ddcede0d5f49f567584229914f1f40db90e40f</i><br /><br />Threat actor <b>description</b>: <i>Cottles Inc. is a dynamic company specializing in innovative packaging solutions. They offer a wide range of services including custom packaging design, sustainable materials, and supply chain management. With a strong focus on quality and customer satisfaction, Cottles Inc. aims to meet the diverse needs of various industries, ensuring products are well-protected and presented.</i><br />Target victim <b>website</b>: <i>cottlesinc.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crown-Mortgage-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17577</link>
<guid>ee77e8fb3cbe33ba56700de13ae53f36</guid>
<pubDate>Tue, 24 Sep 2024 16:31:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Crown-Mortgage-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79101152d47a841704ee49dc5ec4a6cc0aa50e4df30ada2e6ed8476f9f9ab6a4</i><br /><br />Threat actor <b>description</b>: <i>Crown Mortgage Company, located in Oak Lawn, IL, is a local Chicago mortgage lender serving Chicagoland in Northeast Illinois.  Published data coming soon...</i><br />Target victim <b>website</b>: <i>crownmortgagecompany.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>First-Choice-Sales--Marketing-Group-First-Choice</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17576</link>
<guid>0200485a867c03eb6d1469fb284333f2</guid>
<pubDate>Tue, 24 Sep 2024 14:30:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>First-Choice-Sales--Marketing-Group-First-Choice</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a866629eca35f8f478a4e39dea6a47c1223f9d3901a32319d96f954b20b6d79</i><br /><br />Threat actor <b>description</b>: <i>First Choice Sales & Marketing Group (First Choice) is a global consumer products management firm, based in Memphis, Tennessee.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>tellurianinc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17563</link>
<guid>b952fb76427d6ab439fbd2b78f691ba5</guid>
<pubDate>Mon, 23 Sep 2024 20:52:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>tellurianinc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>104286061731499e89a1f645f702647639458acc2cd46b81832b801ffa70bf6b</i><br /><br />Threat actor <b>description</b>: <i>Tellurian Inc. is a company focused on developing and delivering natural gas and energy solutions. It aims to create low-cost natural gas production, liquefied natural gas (LNG) infrastructure, and global energy trading capabilities. The company is dedicated to meeting the world's growing energy needs while prioritizing sustainability and environmental responsibility.</i><br />Target victim <b>website</b>: <i>tellurianinc.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>cucinatagliani.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17568</link>
<guid>1e4503555f3509d72f0ae55f8c3880d0</guid>
<pubDate>Mon, 23 Sep 2024 20:34:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>cucinatagliani.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29d4453c155c284fc3945e4df413fe0a3eb77bcb83d0720ca468e81010893a55</i><br /><br />Threat actor <b>description</b>: <i>Cucinatagliani.com is a company specializing in authentic Italian cuisine, offering a range of products and services that bring the rich flavors of Italy to your home. They provide high-quality ingredients, recipes, and kitchen accessories, all inspired by traditional Italian cooking. Their focus is on delivering an exceptional culinary experience, emphasizing freshness, authenticity, and taste.</i><br />Target victim <b>website</b>: <i>cucinatagliani.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>f-t.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17560</link>
<guid>97194d08565841c08a6d1ce3c82da0b3</guid>
<pubDate>Mon, 23 Sep 2024 19:01:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>f-t.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>afbfb2411c153776f9531651898ce56572da6abe037dfee7af15dee7be02e5b5</i><br /><br />Threat actor <b>description</b>: <i>Fitzemeyer & Tocci (F&T) is a leading engineering and construction management firm that specializes in designing and building complex facilities for healthcare, academic, research, and science and technology institutions.</i><br />Target victim <b>website</b>: <i>f-t.com</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>DIamond-Contracting-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17556</link>
<guid>1af2f80dc87577a2c309b3ee992a07c5</guid>
<pubDate>Mon, 23 Sep 2024 16:30:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>DIamond-Contracting-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c656b75454d61314544af776f65357215c32f625987238b1e85efddacf8061d</i><br /><br />Threat actor <b>description</b>: <i>Diamond Contracting is located in Peoria, Arizona. This organization primarily operates in the Special Trade Contractors, nec business / industry within the Construction - Special Trade Contractors sector. This organization has been operating            ...</i><br />Target victim <b>website</b>: <i>www.diamondcontractingaz.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Avi-Resort--Casino</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17557</link>
<guid>0d6d4bd865309c75246109d2d83a5fb6</guid>
<pubDate>Mon, 23 Sep 2024 16:30:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Avi-Resort--Casino</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>50a6092cb090bc7e0016c9e6233ebe253b31bd97657183b32284d27eaa86a964</i><br /><br />Threat actor <b>description</b>: <i>AVI Casino Enterprise, Inc., doing business as AVI Resort & Casino, provides lodging and hospitality services. We will upload 17Gbof their files soon. You will find employee personal docs, finance information, clients data. So, there are a lot of interesting files inside: credit cards, DLs, payment docs...</i><br />Target victim <b>website</b>: <i>avicasino.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brown-Bottling-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17554</link>
<guid>9831384e2ed3938f00b8fb98b3424649</guid>
<pubDate>Mon, 23 Sep 2024 15:31:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Brown-Bottling-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c11a960438b154dea71a42c6795026c17d28a013046ac9707976ab94c9071c34</i><br /><br />Threat actor <b>description</b>: <i>Brown Bottling Group is a franchise distributor for Pepsi Cola and Dr Pepper Beverages representing the top-selling products in virtually every category of the beverage industry covering soft drinks, juices, sport drinks, water, coffee and tea. In the data we are going to upload you can find some personal information of employees including medical info. Financial and projects data is represented as well.</i><br />Target victim <b>website</b>: <i>browngroup.net</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Detroit-Public-TV</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17551</link>
<guid>ff328be2f8736ee3709a537622dc4f90</guid>
<pubDate>Mon, 23 Sep 2024 12:24:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Detroit-Public-TV</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e825fe4718877be9396c97493b0403189b7d0ce5e5348d243d415162af3dc97</i><br /><br />Threat actor <b>description</b>: <i>As a non-commercial, educational public television station serving the Detroit metropolitan area, Detroit PBS, licensed to Detroit Public Media, offers a diverse range of programming aimed at educating, informing, and entertaining audiences o            ...</i><br />Target victim <b>website</b>: <i>www.detroitpbs.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ten8fire.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17555</link>
<guid>9b20ac4d9a8059cae3c7c4733bbc40a3</guid>
<pubDate>Mon, 23 Sep 2024 11:34:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>ten8fire.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d2ba98fe3fb5222a69c58efe5beb8044ae2bd3e138ddb0388be5f91c90b4862</i><br /><br />Threat actor <b>description</b>: <i><p>Emergency products<br><br>“Ten-8 Fire Equipment, Inc. is a distributor of fire and emergency apparatus and equipment. They strive to serve the emergency response field with reliability and integrity. From their professional sales staff to their dedicated service team and 7 service locations, Ten-8 is committed to providing exceptional care to the fire and emergency field.”<br><br>Website: <a href="https://ten8fire.com/">https://ten8fire.com/</a><br><br>Revenue : $149M<br><br>Address: 2904 59th Avenue Dr E, Bradenton, Florida, 34203, United States<br><br>Phone Number: (941) 756-7779<br><br><mark class="marker-yellow"><strong>Download link #1:</strong></mark> &nbsp;<a href="https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/TEN8/PROOF/">https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/TEN8/PROOF/</a><br><br><mark class="marker-yellow"><strong>Mirror:</strong></mark> <a href="https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/TEN8/PROOF/">https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/TEN8/PROOF/</a><br><br><mark class="marker-yellow"><strong>DATA DESCRIPTIONS:</strong></mark> Personal Identifiable Information, accounting\payroll, database backups, customer data, contracts, employees\executives personal and corporate data, corporate correspondence, etc.</p><p><img src="/uploads/Signed_Drawing_9_11_19_3b1a1029ce.png" alt="Signed Drawing 9.11.19.png"><img src="/uploads/SG_19_11015_PC_Fully_Executed_Agreement_ad8216ab8d.png" alt="SG-19-11015-PC - Fully Executed Agreement.png"><img src="/uploads/Sean_Olander_Drivers_License_6f12ec6386.png" alt="Sean Olander Drivers License.png"><img src="/uploads/Ten_8_Fire_and_Safety_Financial_Statements_YTD_September_2023_a33094037e.png" alt="Ten-8 Fire &amp; Safety Financial Statements YTD September 2023.png"><img src="/uploads/Contractor_Affadavit_and_Agreement_22fdad3257.png" alt="Contractor Affadavit and Agreement.png"></p></i><br />Target victim <b>website</b>: <i>ten8fire.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Graminex</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17549</link>
<guid>03e696f87d7c24d74e62fd51b81a7140</guid>
<pubDate>Mon, 23 Sep 2024 08:34:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Graminex</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>223d6f62ca873aff3abd034223d675cc25190abdbcb181557ac3f9dbce9d3d39</i><br /><br />Threat actor <b>description</b>: <i>Graminex®, L.L.C. is the leading producer of natural and solvent-free Graminex® Flower Pollen Extract. </i><br />Target victim <b>website</b>: <i>graminex.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Woodard--Hernandez--Roth--Day</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17544</link>
<guid>c525c5b4aeee6eafd496d0d0cc424ced</guid>
<pubDate>Sun, 22 Sep 2024 05:22:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Woodard--Hernandez--Roth--Day</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1d477b38a3088329e1c1ec091d9a4c115b01a7e56c5cd0744875f5e03717b54</i><br /><br />Threat actor <b>description</b>: <i>Woodard, Hernandez, Roth & Day, L.L.C. provides effective legal counsel throughout Sedgwick County. Located in Wichita, our firm skillfully handles Trusts and Estates, Estate Planning and Wills and Probate matters. We provide outstanding advi            ...</i><br />Target victim <b>website</b>: <i>www.woodard-law.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>savannahcandy.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17543</link>
<guid>e90cf065b8feb3cc423ed91808e53a1d</guid>
<pubDate>Sat, 21 Sep 2024 16:51:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>savannahcandy.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc8e361954d17b75c337041fb365a56716ffaba98661c294bc73a427c8d58c5b</i><br /><br />Threat actor <b>description</b>: <i>Savannah Candy Kitchen, found at savannahcandy.com, is renowned for its Southern confections, particularly pralines, divinity, and Southern pecan pies. Rooted in Southern tradition, the company combines family recipes with high-quality ingredients. They offer a wide array of sweets, gift baskets, and corporate gifts, delivering a taste of Southern hospitality to customers nationwide.</i><br />Target victim <b>website</b>: <i>savannahcandy.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Acho.io</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17541</link>
<guid>596239013dbdab4591cefef9be5a5f58</guid>
<pubDate>Sat, 21 Sep 2024 14:50:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>Acho.io</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de40a0ff654fe7a96e1416b5e5fc124a40ed396b894bb12ae934427b9fac6802</i><br /><br />Threat actor <b>description</b>: <i>Acho.io is a data platform designed to simplify and streamline the process of data integration, transformation, and analysis. It offers tools for connecting various data sources, creating workflows, and visualizing data without requiring extensive coding knowledge. The platform aims to make data management more accessible to businesses, enabling users to gain insights and make data-driven decisions efficiently.</i><br />Target victim <b>website</b>: <i>Acho.io</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Noble-Environmental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17536</link>
<guid>2975c2a0df49e48104fc44a7838db7f7</guid>
<pubDate>Sat, 21 Sep 2024 03:20:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Noble-Environmental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>51390f77947deca78f03eb4f1411c5618a8ff16bfc5a4f1345ce1e6818fa185e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.nobleenviro.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Omega-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17539</link>
<guid>122a3db2ed92de4629b8d0887e498195</guid>
<pubDate>Fri, 20 Sep 2024 23:41:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Omega-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ad651a1f3574ceb2e3d2f6039cbcf48c687c1d8ede552c19d0c2984251dc32f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.omega-industries.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pacific-Coast-Building-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17538</link>
<guid>ba01baa4856d494a66a0d5eca39f5418</guid>
<pubDate>Fri, 20 Sep 2024 23:38:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Pacific-Coast-Building-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf756ca9a39e8900fdfed667ddf0c67372c45f45c519a113d2c45fb88b1c28e0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.paccoast.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Thompson-Construction-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17537</link>
<guid>09d748adfe5109a59f214f25e80697d1</guid>
<pubDate>Fri, 20 Sep 2024 23:35:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Thompson-Construction-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7e89f2b11e9594c35bf1b857ab836eadf9747b2befa1591f804964bb891e8913</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.tbmdf.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jackson-Paper-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17533</link>
<guid>838dc9de386130f83f625a98d1ea561f</guid>
<pubDate>Fri, 20 Sep 2024 22:52:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Jackson-Paper-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d4cf3f862f51f409cc12bd9461b22d45db332cbd4a04d4cfbf9c0b08cf40fee3</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.jacksonpaper.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Visionary-Homes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17535</link>
<guid>09a11be6989d5a0e438dd9e589210a79</guid>
<pubDate>Fri, 20 Sep 2024 20:35:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Visionary-Homes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bfe925551c61bba37defabd04cdd5a6abc55ca6aabad6168ab685d909463f8aa</i><br /><br />Threat actor <b>description</b>: <i>Visionary Homes is a homebuilding company known for crafting high-quality, customizable homes. They focus on innovative design, energy efficiency, and superior craftsmanship. Catering to various lifestyles and budgets, Visionary Homes offers a range of floor plans and communities. Their commitment to customer satisfaction and attention to detail sets them apart in the residential construction industry.</i><br />Target victim <b>website</b>: <i>visionaryhomes.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>KW-Realty-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17530</link>
<guid>f69a675d7f12614552304ed2636e7044</guid>
<pubDate>Fri, 20 Sep 2024 18:24:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>KW-Realty-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d659468e4b6a6ec18d813de423d5d02136ecf087b8e439bde4ff6adfdc50d2a2</i><br /><br />Threat actor <b>description</b>: <i>At the core of Keller Williams Realty is a conviction that who you are in business with matters. We believe that the company we keep can contribute to our lives in untold ways. To help cement this understanding, we’ve formalized a belief sy            ...</i><br />Target victim <b>website</b>: <i>www.kwrealtygroup.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Capital-Printing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17532</link>
<guid>de30cdee564cda7c29b1d761cc3f753d</guid>
<pubDate>Fri, 20 Sep 2024 18:01:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Capital-Printing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af45b2190f13a658a8cf9c4161a45860fa949fe6f8741385e72a657e6f899dfb</i><br /><br />Threat actor <b>description</b>: <i>If the company does not contact us by 09.22.24 18:00 UTC, the data will be published!  Capital Printing offer expertise in conceptualizing, engineering and manufacturing your unique packaging projects. "Thirty years ago, Nolan Russo founded Capital Printing with the commitment to always honor and respect those who trusted him with their work." (c) www.capitalprintingcorp.com We stolen 5 TB of data, clients, work projects, accounting, banking documents, HR. The data will be published if the company refuses to cooperate and protect the private documents and interests of its clients and employees. We want to make sure that Capital Printing corp really lives up to its claims, respects its clients and values ​​its 30-year business  !!! The company decided to receive money from the insurance company in order to steal it, ignoring its employees and clients (proof in screenshots) !!! And this means their time is coming to an end...  If the company does not contact us by 09.22.24 18:00 UTC, the data will be published!</i><br />Target victim <b>website</b>: <i>capitalprintingco.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>virainsight.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17529</link>
<guid>4fa87f4ab207dc8c3e6126a0b7734d3c</guid>
<pubDate>Fri, 20 Sep 2024 16:53:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>virainsight.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8581729a604610d5650004a80565da9d2a1dc47d71fe9333f5f5938d2884a6ba</i><br /><br />Threat actor <b>description</b>: <i>Virainsight.com is a company specializing in retail display solutions and fixtures. They design and manufacture custom displays, fixtures, and environments to enhance retail spaces and improve customer experiences. Their expertise spans from initial concept and design to production and installation, catering to various retail sectors to create engaging and functional retail environments.</i><br />Target victim <b>website</b>: <i>virainsight.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Juice-Generation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17531</link>
<guid>ef96003dff3714cf3720aee9b14503b7</guid>
<pubDate>Fri, 20 Sep 2024 16:32:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Juice-Generation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>610801d26a6da93b4c1516e8aa73a63af425bffb699fc967441cfeb5d67abac6</i><br /><br />Threat actor <b>description</b>: <i>10 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>River-Region-Cardiology-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17528</link>
<guid>c7f7f308ee310f29336ab9d0f2af9a10</guid>
<pubDate>Fri, 20 Sep 2024 13:23:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>River-Region-Cardiology-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec4be8a9d977b2dfb28d17a30b81a4c49d56b70fb5915d6ea7afc2b16b246b1f</i><br /><br />Threat actor <b>description</b>: <i>River Region Cardiology provides advanced imaging, testing, and treatments.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Greene-Acres-Nursing-Home</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17527</link>
<guid>a18128daad05bf1de8ab6530a5f3b287</guid>
<pubDate>Fri, 20 Sep 2024 10:54:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Greene-Acres-Nursing-Home</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5dd031a09fa6cd002220528b99ad29f247f3f0e6cefab6b282923369af2d2c76</i><br /><br />Threat actor <b>description</b>: <i>Greene Acres Nursing Home A recognized leader in the provision of superior rehabilitation and long term care services, Greene Acres Nursing Home is the largest non-profit, nursing home in Greene County.</i><br />Target victim <b>website</b>: <i>ganh.org</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>seaglesafety.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17523</link>
<guid>ad177a1b319fe986e2030fc03d2df126</guid>
<pubDate>Thu, 19 Sep 2024 19:57:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>seaglesafety.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d499463e27c453c94faad81fe5e08f292cb985a18ae6bc81ac9915a4bc16889</i><br /><br />Threat actor <b>description</b>: <i>Seagle Safety is a company specializing in providing comprehensive safety solutions for various industries. They offer a range of products and services, including safety equipment, consulting, training, and compliance assistance. Their focus is on ensuring workplace safety, reducing risks, and enhancing occupational health standards. Seagle Safety is dedicated to helping businesses maintain a safe and compliant working environment.</i><br />Target victim <b>website</b>: <i>seaglesafety.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>a1mobilelock.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17520</link>
<guid>478423056f0942a464052ccc8e0d064d</guid>
<pubDate>Thu, 19 Sep 2024 19:55:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>a1mobilelock.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>397f5c4a62363e9b7f164b2eae1b7e008a435feec3d31dbd2e9d129f89c7155f</i><br /><br />Threat actor <b>description</b>: <i>A1 Mobile Lock is a professional locksmith service specializing in automotive, residential, and commercial lock solutions. They offer a range of services including lockouts, rekeying, lock installation, and key duplication. With a focus on customer satisfaction and security, A1 Mobile Lock provides reliable and efficient mobile locksmith services to ensure prompt assistance when needed.</i><br />Target victim <b>website</b>: <i>a1mobilelock.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>patricksanderscompany.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17518</link>
<guid>73c2bf297c5aec4bcbdeb4435328c335</guid>
<pubDate>Thu, 19 Sep 2024 19:53:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>patricksanderscompany.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4c24ed25ce50365678454212aa8b558a30ae359447396ae44c0ad48deadd33d</i><br /><br />Threat actor <b>description</b>: <i>Patrick Sanders Company specializes in offering bespoke digital marketing solutions tailored to businesses of all sizes. With a focus on innovative strategies, the company provides services such as SEO, content creation, social media management, and pay-per-click advertising. Their dedicated team aims to enhance online presence, drive traffic, and boost conversions for clients, ensuring measurable results and sustained growth.</i><br />Target victim <b>website</b>: <i>patricksanderscompany.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>thinksimple.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17517</link>
<guid>ea970b934031dcce24ca218b017a5503</guid>
<pubDate>Thu, 19 Sep 2024 19:50:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>thinksimple.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>94e7cd645816cf115c57394a657a2c92a7f9d2610eb5b7c736a62f7cc8e06224</i><br /><br />Threat actor <b>description</b>: <i>Think Simple is a design-driven company that focuses on creating innovative and user-friendly products and solutions. They emphasize simplicity and functionality in their designs, aiming to enhance user experience and streamline complex processes. Their expertise spans various industries, and they are known for their ability to transform ideas into practical, elegant solutions.</i><br />Target victim <b>website</b>: <i>thinksimple.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>pesprograms.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17516</link>
<guid>c97fc9737012376eee6fe4e2c9191c4d</guid>
<pubDate>Thu, 19 Sep 2024 19:48:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>pesprograms.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a897236e0653ae91942451e3060572d307eb39a1b22bd8d976c9fb50fe116ae</i><br /><br />Threat actor <b>description</b>: <i>Pesprograms.com is a company focused on providing innovative educational software solutions. They specialize in creating interactive programs designed to enhance learning experiences across various subjects and age groups. Their offerings include personalized learning tools, engaging educational games, and comprehensive assessment systems. The company aims to integrate technology seamlessly into education, fostering improved learning outcomes and a deeper understanding of the material.</i><br />Target victim <b>website</b>: <i>pesprograms.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>palmfs.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17515</link>
<guid>8c55f710dea335821c0884d990c62b77</guid>
<pubDate>Thu, 19 Sep 2024 19:46:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>palmfs.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>053865d96e9e0f41b9ee06f327a34c96964999ec7b1693b1e7058eceaadd1787</i><br /><br />Threat actor <b>description</b>: <i>Palmfs.com is a company specializing in advanced data storage solutions. It offers innovative file system technologies designed to enhance performance, reliability, and scalability for various computing environments. Catering to industries with demanding data needs, Palmfs.com focuses on delivering efficient, high-speed storage options that support complex workloads and large-scale data management.</i><br />Target victim <b>website</b>: <i>palmfs.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>libertyfirstcu.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17506</link>
<guid>07b1e246e902a97f8d4ed5f0408fa838</guid>
<pubDate>Thu, 19 Sep 2024 16:54:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>libertyfirstcu.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96c6789255543cce8225388a199955c4c290cb461028002631c46e77bf15106b</i><br /><br />Threat actor <b>description</b>: <i>Liberty First Credit Union is a financial institution located in Lincoln, Nebraska. It provides a range of financial services, including savings and checking accounts, loans, mortgages, and investment options. The credit union emphasizes member-focused service, competitive rates, and community involvement, aiming to help individuals achieve their financial goals.</i><br />Target victim <b>website</b>: <i>libertyfirstcu.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>avl1.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17507</link>
<guid>2365a4db507862569752334234a29b50</guid>
<pubDate>Thu, 19 Sep 2024 15:15:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>avl1.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>627b5f7287aa779eb01a20dccebe8122923ca34d7de3e223578f884d3988cc01</i><br /><br />Threat actor <b>description</b>: <i>AVL1.com is a premier provider of audio, video, and lighting solutions for events and installations. Specializing in cutting-edge technology, they offer comprehensive services including system design, equipment rental, and technical support. Known for their expertise and reliability, AVL1.com caters to a diverse clientele, ensuring high-quality production for corporate events, concerts, and more.</i><br />Target victim <b>website</b>: <i>avl1.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>tims.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17504</link>
<guid>d0b7f2a36b6838fe81fcee29d2f410a2</guid>
<pubDate>Thu, 19 Sep 2024 08:50:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>tims.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87f401c34bb6bbd8cea1a7a89a7e1379219aa3031d9260706589958bb234c37f</i><br /><br />Threat actor <b>description</b>: <i>TIMS Medical offers innovative medical imaging solutions for hospitals and healthcare providers.</i><br />Target victim <b>website</b>: <i>tims.com</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>lakelandchamber.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17498</link>
<guid>7ad874c1df47197ed606592e1a07c230</guid>
<pubDate>Thu, 19 Sep 2024 04:17:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>lakelandchamber.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6af1f1d4b83818565520584546f88979296e70377269b7d4d5c16621bb92da04</i><br /><br />Threat actor <b>description</b>: <i>The Lakeland Chamber of Commerce serves as the Catalyst for business success, Convener of leaders and influencers, and Champion for our thriving community.</i><br />Target victim <b>website</b>: <i>lakelandchamber.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>efile.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17500</link>
<guid>645d8981d8d3547c17119dda7d6c057a</guid>
<pubDate>Thu, 19 Sep 2024 04:11:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>efile.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8c2a381c8a357698892b077b2c5bcb4fbeef98f058416393be8eba199ba8fd3</i><br /><br />Threat actor <b>description</b>: <i>eFile.com offers free or low-cost tax preparation and e-filing for federal and state returns. Compare eFile.com with other services, get free tax support from Taxperts, and use tax calculators and tools.</i><br />Target victim <b>website</b>: <i>efile.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>paybito.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17501</link>
<guid>7ffb18ac57148c50370b1e15a0157af9</guid>
<pubDate>Thu, 19 Sep 2024 04:10:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>paybito.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>140d27e67cfe784c7e05aaf13647275cb1682c4c4b18b780baa623f2f94256cd</i><br /><br />Threat actor <b>description</b>: <i>Quick Launch Self Branded Crypto Exchange. Create an exchange theme from scratch or go headless PayBitoPro APIs. Who We Serve Our experienced teams provide comprehensive financial solutions, meticulously tailored to address the unique needs of busine...</i><br />Target victim <b>website</b>: <i>paybito.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Structural-Concepts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17503</link>
<guid>dee767f49e1cf1ddd63e3bbe57489542</guid>
<pubDate>Thu, 19 Sep 2024 04:02:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Structural-Concepts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>488850b6c1e8ea2656268115478f8201ad376849586a22b3d411eac7cdae7fa9</i><br /><br />Threat actor <b>description</b>: <i>Structural Concepts (founded in 1973)is a designer and manufacturer of temperature-controlled food & beverage display cases. Structural Concepts corporate office is located in 888 E Porter Rd, Muskegon, Michigan, 49441, United States and has 540 employees. The total amount of data leakage is 603.10 GB</i><br />Target victim <b>website</b>: <i>structuralconcepts.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Plaisted-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17490</link>
<guid>d222914df5cdfd8a9196059965eaa352</guid>
<pubDate>Wed, 18 Sep 2024 22:52:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Plaisted-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8f6ca89a08eb4e3e715f08718d1165e6240fd54155fd1f2cfd06d0f08351465a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.plaistedcompanies.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bertelkamp-Automation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17489</link>
<guid>06833b73c7b85d172f55b6f38a40b094</guid>
<pubDate>Wed, 18 Sep 2024 20:27:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Bertelkamp-Automation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a12b2408e0e84fbc2b3aa035a01a209685061c9bf6f99ad3ed1c34e19e2d0f31</i><br /><br />Threat actor <b>description</b>: <i>Bertelkamp Automation, Inc. (BAI) is a leading Industrial Automation Solutions provider in the Southeastern United States. For more than 40 years, we have provided our customers with solutions that have increased their efficiency and producti            ...</i><br />Target victim <b>website</b>: <i>www.bertelkamp.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Prentke-Romich-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17482</link>
<guid>7228352c63a595de9f77d32037c3e350</guid>
<pubDate>Wed, 18 Sep 2024 16:54:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>FOG</b> claims attack for <b>Prentke-Romich-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8f0dedefaff3cdf8801e3786a8e835ca838da7b409776227162d6580ee5bc67</i><br /><br />Threat actor <b>description</b>: <i>250 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>FOG</category>
</item>
<item xmlns:dc='ns:1'>
<title>Amerinational-Community-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17483</link>
<guid>b0b1d24f68e3d6a9f855e424c4f0c9b6</guid>
<pubDate>Wed, 18 Sep 2024 14:02:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Amerinational-Community-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d69042e2a62681a5c2220e3be8d2b3338b1576e0232f3216af903b47d85c9b52</i><br /><br />Threat actor <b>description</b>: <i>AmeriNat (founded in 1975) provides loan servicing, asset management, underwriting and other services to government agencies, nonprofits, financial institutions and private investors across the United States and Puerto Rico. Amerinational Community Services corporate office is located in 217 S Newton Ave, Albert Lea, Minnesota, 56007, United States and has 109 employees.</i><br />Target victim <b>website</b>: <i>amerinat.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Providence-Public-School-Department</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17484</link>
<guid>e6326390cc3cf594bbd691bc13b6f0ff</guid>
<pubDate>Wed, 18 Sep 2024 14:01:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Providence-Public-School-Department</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf9f327bc6b548a8e53e283d908533146ac5590e59772f5a599aaebbb9481fd2</i><br /><br />Threat actor <b>description</b>: <i>The Providence Public School Department is the administrative force behind the primary public school district of Providence, Rhode Island. It serves about 21,700 students in pre-K through 12th grade. It has 21 elementary schools, seven middle schools and nine high schools, along with two public charter schools. The total amount of data leakage is 201.40 GB </i><br />Target victim <b>website</b>: <i>providenceschools.org</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>ringpower.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17473</link>
<guid>a87c3e8f9b58723ac1c4f6ab69c0d0c9</guid>
<pubDate>Wed, 18 Sep 2024 08:53:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>ringpower.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f1397ff4b10346ccd4199e4d55125f6ce0f9928b3dc7c8a8aaf3da7710aeb55</i><br /><br />Threat actor <b>description</b>: <i>Ring Power Corporation, based in Florida, is a premier supplier of heavy equipment, power systems, and lift trucks. Established in 1962, the company offers a wide range of products and services, including new and used equipment sales, rentals, and parts and service support. They serve industries such as construction, agriculture, marine, and power generation, emphasizing customer satisfaction and innovation.</i><br />Target victim <b>website</b>: <i>ringpower.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.quenotedeporten.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17471</link>
<guid>ddc751074ed4db1ce8e65aec173d16e3</guid>
<pubDate>Tue, 17 Sep 2024 22:50:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.quenotedeporten.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b8c2a29499063e7bb097f9efc1545be9c2563123770cb5d374f158bf0784c99</i><br /><br />Threat actor <b>description</b>: <i>www.quenotedeporten.com is a company specializing in the delivery of personalized gift experiences. They offer a wide range of unique and memorable gifts, including adventure activities, gourmet experiences, and wellness packages. The company focuses on creating lasting memories through tailored experiences, ensuring that each gift is special and unforgettable.</i><br />Target victim <b>website</b>: <i>www.quenotedeporten.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.plumbersstock.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17451</link>
<guid>c83f9d8520b9f5777d146d9e0c4ceaaf</guid>
<pubDate>Tue, 17 Sep 2024 20:38:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.plumbersstock.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a17030af57ff36623afb718f2433ce519109b8c18833798dee6b0a6e95059a7f</i><br /><br />Threat actor <b>description</b>: <i>PlumbersStock is an online retailer specializing in plumbing, HVAC, and irrigation supplies. It offers a wide range of products including faucets, toilets, pipe fittings, and tools from leading brands. The company caters to both homeowners and professionals, providing quality products at competitive prices with a focus on customer service and fast delivery.</i><br />Target victim <b>website</b>: <i>www.plumbersstock.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>capecodacademy.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17453</link>
<guid>71014f3b2f3b8f52e2d6ee2304db7e95</guid>
<pubDate>Tue, 17 Sep 2024 18:38:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>capecodacademy.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>061cf6e7a8189ae6bbb2cb1b8174076c45e1f95e69b6d486fd9f9c93338afdb1</i><br /><br />Threat actor <b>description</b>: <i>Cape Cod Academy is a private, independent day school located in Osterville, Massachusetts. It serves students from kindergarten through 12th grade, offering a rigorous academic curriculum combined with a strong emphasis on character development and community engagement. The school prides itself on small class sizes, personalized attention, and a supportive learning environment designed to foster each student's potential.</i><br />Target victim <b>website</b>: <i>capecodacademy.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>natcoglobal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17470</link>
<guid>272a535143aa13813aa08719769281ac</guid>
<pubDate>Tue, 17 Sep 2024 17:00:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>natcoglobal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19f4680b13c234c35dcec6e5735244f60e455f4f45b03e4d5c8392d6df326b6f</i><br /><br />Threat actor <b>description</b>: <i><p>Business Services<br><br>“Founded in 1991, North American Textile Company, LLC (NATco) is a global manufacturer of labels, trims and hardware. NATco corporate headquarters is located in Los Angeles, California and owns and operates plants in several countries throughout the world including Italy, China, India and more.”<br><br>Website: <a href="https://www.natcoglobal.com/">https://www.natcoglobal.com/</a><br><br>Revenue : $38.5M<br><br>Address: 346 W Cerritos Ave, Glendale, California, 91204, United States<br><br>Phone Number: (818) 409-0019<br><br><mark class="marker-yellow"><strong>Download link #1:</strong></mark> &nbsp;<a href="https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/NATCO/full/">https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/NATCO/full/</a><br><br><mark class="marker-yellow"><strong>Mirror:</strong></mark> &nbsp;<a href="https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/NATCO/full/">https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/NATCO/full/</a><br><br><mark class="marker-yellow"><strong>DATA DESCRIPTIONS:</strong></mark> Employees personal and corporate data, customer information, corporate correspondence, database backups, etc.</p><p><img src="/uploads/GLOBAL_REVENUE_REPORT_2023_bfc22e34c4.png" alt="GLOBAL REVENUE REPORT 2023.png"><img src="/uploads/Operating_Agreement_of_Fitz_Roy_Holdings_LLC_87bc354eb4.png" alt="Operating Agreement of Fitz Roy Holdings, LLC.png"><img src="/uploads/FASHION_NOVA_VENDOR_AGREEMENT_v35_a5b03cb674.png" alt="FASHION NOVA VENDOR AGREEMENT v35.png"><img src="/uploads/Account_Balance_90030_000_00_Litigation_Settlement_20_Payout_GEN_GEN_1_Legal_f3663ee2ad.png" alt="Account Balance - 90030-000-00 Litigation Settlement%20 Payout (GEN GEN)__1-Legal.png"><img src="/uploads/2021_Sales_Budget_with_MARCH_Results_4219bb7169.png" alt="2021 Sales Budget with MARCH Results.png"></p></i><br />Target victim <b>website</b>: <i>natcoglobal.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17454</link>
<guid>302101902bd9140427edc0c41e139782</guid>
<pubDate>Tue, 17 Sep 2024 16:39:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>New-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>62c16e5c5de3067eb5cf453281facd17a6762cc3aa99fb95352df3c0ed7acece</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>www.newelectricaz.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sherr-Puttmann-Akins-Lamb-PC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17445</link>
<guid>bad1243bb55ded10b82e6e9b33321897</guid>
<pubDate>Tue, 17 Sep 2024 13:24:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Sherr-Puttmann-Akins-Lamb-PC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>07cdf5cc3dc383ace911ae4b05ee9abc455185f5acd5868560b00c4d6ba52b40</i><br /><br />Threat actor <b>description</b>: <i>Sherr Puttmann Akins Lamb is a full-service family law firm specializing in divorce, legal separation, child custody, juvenile law, and more.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>peerlessumbrella.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17448</link>
<guid>d644c7cbbb1064491c3b1334c99b25c8</guid>
<pubDate>Tue, 17 Sep 2024 12:45:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>peerlessumbrella.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>026b4e0fae55d734e387c27054208d01a8d8a8d0e14f5ba4b1462aa6373b1a1a</i><br /><br />Threat actor <b>description</b>: <i><p>Manufacturing<br><br>“Peerless Umbrella is a full service manufacturer of quality umbrellas. Operating with a Union Shop, this family owned business has been a manufacturer of traditional, as well as golf and fashion umbrellas for more than 70 years. Today Peerless is a leader in umbrella technology and manufacturing, as well as one of the largest importers in the country.”<br><br>Website: <a href="https://www.peerlessumbrella.com/">https://www.peerlessumbrella.com/</a><br><br>Revenue : $23.2M<br><br>Address: 427 Ferry St At, Newark, New Jersey, 07105, United States<br><br>Phone Number: (973) 578-4900<br><br><mark class="marker-yellow"><strong>Download link #1:</strong></mark> &nbsp;<a href="https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/PEERLESS/full/">https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/PEERLESS/full/</a><br><br><mark class="marker-yellow"><strong>Mirror:</strong></mark> &nbsp;<a href="https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/PEERLESS/full/">https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/PEERLESS/full/</a><br><br><mark class="marker-yellow"><strong>DATA DESCRIPTIONS:</strong></mark> Personal Identifiable Information, database backups, employees\executives personal and corporate data, customer data, contracts\projects\drawings, financial documents, corporate correspondence, etc.</p><p><img src="/uploads/Drivers_License_0673bc3936.png" alt="Drivers License.png"><img src="/uploads/Jan_2024_IS_4595c0f7a5.png" alt="Jan 2024 IS.png"><img src="/uploads/AIA_2024_f4c2e233b0.png" alt="AIA 2024.png"><img src="/uploads/Jan_2024_BS_5b9c99a6cf.png" alt="Jan 2024 BS.png"><img src="/uploads/2023_Union_Agreement_684706667e.png" alt="2023 Union Agreement.png"></p></i><br />Target victim <b>website</b>: <i>peerlessumbrella.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Port-of-SeattleSeattle-Tacoma-International-Airport-SEA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17444</link>
<guid>9fb640ea6abe0e849c8c1fd6eea97c22</guid>
<pubDate>Tue, 17 Sep 2024 10:51:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Port-of-SeattleSeattle-Tacoma-International-Airport-SEA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>80d08851c046e06a17aadc2e170b8f778c3d81d0055e8b41e130328d901a4166</i><br /><br />Threat actor <b>description</b>: <i>Port of Seattle/Seattle-Tacoma International Airport (SEA)</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Protective-Industrial-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17442</link>
<guid>11ab8d1653073d047c16ede5947fc64d</guid>
<pubDate>Tue, 17 Sep 2024 06:52:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Protective-Industrial-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e87708861b0d4210b7bd6d32369d8f2d4470d7f12eea4b6ed14f031e9ab66ac</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.pipusa.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Inktel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17441</link>
<guid>50ac4b2d6257c591a057a922533f77d5</guid>
<pubDate>Tue, 17 Sep 2024 04:47:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Inktel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aac59085a0be2e0ac0a2c428fd8e68cb0c0449334c27b0c125f76c7dfeea9dd2</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.inktel.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Baskervill</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17438</link>
<guid>52fe8f09c95a49a4c296c735c32c8678</guid>
<pubDate>Mon, 16 Sep 2024 22:41:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Baskervill</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>98d16bc285394dd19dda14803f55d704de2902d5491e35a46d28d06eb68ee301</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.baskervill.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.faithfc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17460</link>
<guid>887d5a5e5026349023b761a2dcfb4e86</guid>
<pubDate>Mon, 16 Sep 2024 18:41:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.faithfc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>565aaf421294a6286918f96d6bb522fdb02fc42d0d46670b934909716870bd84</i><br /><br />Threat actor <b>description</b>: <i>Faith Family Church is a community-focused organization dedicated to providing spiritual guidance, fostering fellowship, and promoting charitable activities. It offers worship services, religious education, and various programs for all age groups. The church aims to build a supportive community rooted in Christian values, encouraging personal growth, and active participation in faith-based initiatives.</i><br />Target victim <b>website</b>: <i>www.faithfc.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Robson-Planning-Group-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17433</link>
<guid>37af59b4a68791992c064eefe4a1c94d</guid>
<pubDate>Mon, 16 Sep 2024 16:24:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Robson-Planning-Group-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2589db6f01a0d2d95143556fcb59d37436a6d1b8c79f552e142b7acbbfdd2457</i><br /><br />Threat actor <b>description</b>: <i>Robson Planning Group Inc is a specialized financial advisory firm that offers comprehensive wealth management services. Their expertise includes retirement planning, investment strategies, tax planning, and estate planning. The company is dedicated to helping clients achieve financial security and long-term goals through personalized and strategic advice.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>EnviroNET-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17428</link>
<guid>7bbeb6ee3bfac6732d2df45227ae0e69</guid>
<pubDate>Mon, 16 Sep 2024 15:21:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>EnviroNET-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>32aadf293f7e2c4ad49527cb617d04412e5eba7a52941d0bee0e26078aaffb67</i><br /><br />Threat actor <b>description</b>: <i>EnviroNET Inc is a leading environmental consulting firm specializing in sustainable solutions for businesses and communities. With expertise in ecological assessments, regulatory compliance, and environmental impact analysis, the company supports clients in minimizing their ecological footprint. EnviroNET Inc is committed to innovation, integrity, and delivering customized, eco-friendly strategies.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cruz-Marine-cruz.local</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17429</link>
<guid>f91ee142269ec908c23e1cd87286e254</guid>
<pubDate>Mon, 16 Sep 2024 14:30:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Cruz-Marine-cruz.local</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9c510e3b134043beba3a4cd94097fc917838c227738a58a068ddd3b49cd02e9</i><br /><br />Threat actor <b>description</b>: <i>Cruz Marine transports employees, equipment, fuel and materials to remote sites ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Environmental-Code-Consultants-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17426</link>
<guid>93106f2b3d83f77dbb5a098e014fad40</guid>
<pubDate>Mon, 16 Sep 2024 13:29:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Environmental-Code-Consultants-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>66f37d728ff0894d4a9abf081135d2e3f58c14cb349eb441441a7ce52f6c3f33</i><br /><br />Threat actor <b>description</b>: <i>Environmental Code Consultants Inc is a specialized firm dedicated to providing expert guidance on environmental regulations and compliance. They offer services such as environmental impact assessments, sustainability planning, and regulatory compliance audits. Their team of experienced professionals helps businesses navigate complex environmental codes to ensure responsible and sustainable operations.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>MCNA-Dental-1-million-patients-records</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17427</link>
<guid>1823bc0e5e11ba2f4d521940e45d0be4</guid>
<pubDate>Mon, 16 Sep 2024 12:59:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>MCNA-Dental-1-million-patients-records</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34347c19e3de17d7cb8407bebd16cbc0059c4a7394a17005e9ea15db7ca3e96d</i><br /><br />Threat actor <b>description</b>: <i>Company has the last 24 hours to contact us using the instructions left.In case of silence, all data will be published More than 1 million personal EMR’s + different internal company documents https://www.mcna.net/ Example :5511310,NICOLE M GARCIA,2901 BAYARD ST,LAREDO, TX 78046,12/07/2005,(956) 949-0951,4174985,526285913,MATTHEW A STAAT,3768,MCNA,Eligible,2019-01-08 00:00:00,2018-11-20 00:00:00,2019-01-08 00:00:00,2016-07-26 00:00:00,2016-07-26 00:00:00,4. 1 Year +,NULL,2021-06-02,Active,648,$25.00,$564.00,$0.00,TEXAS CHIP,NICOLE,M,GARCIA,2901 BAYARD ST,,LAREDO,TX,78046 […]</i><br />Target victim <b>website</b>: <i>mcna.net</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>advantagecdc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17414</link>
<guid>d54a439ba19be7fe2b18622f6e53587e</guid>
<pubDate>Sun, 15 Sep 2024 20:45:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>advantagecdc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e14fe74235cb613800014cea36e31bf6f62953b612f84540703884c45f4a2120</i><br /><br />Threat actor <b>description</b>: <i>AdvantageCDC.org is a community development corporation dedicated to fostering economic growth and revitalization in underserved communities. They provide resources and support for small businesses, including access to capital, business consulting, and training programs. Their mission is to empower entrepreneurs, create jobs, and enhance the quality of life in the areas they serve.</i><br />Target victim <b>website</b>: <i>advantagecdc.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.atlcc.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17420</link>
<guid>80b912d8d81919969ccab0080ddd8e2f</guid>
<pubDate>Sun, 15 Sep 2024 19:16:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.atlcc.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8c97340a81ddaf5e01f116f43d4f738ea6c0b23bb4677ce93ad9cfe055d38af8</i><br /><br />Threat actor <b>description</b>: <i>ATLCC (Atlanta Consulting & Construction) is a professional firm specializing in comprehensive consulting and construction services. They offer expertise in project management, design, and execution for various sectors including commercial, residential, and industrial. Renowned for their commitment to quality, innovation, and client satisfaction, ATLCC ensures each project is delivered on time and within budget.</i><br />Target victim <b>website</b>: <i>www.atlcc.net</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>dowley.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17415</link>
<guid>79d51f4d7e4d54d54b55519c3b462d00</guid>
<pubDate>Sun, 15 Sep 2024 17:13:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>dowley.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89f63bdc1bdea60e2a596393751e4b6d68b88fddad437b6379e5faee66e4365e</i><br /><br />Threat actor <b>description</b>: <i>Security Experts! Experience, Expertise & Knowledge The Dowley relationship cycle is a well defined process for engaging clients and tailoring our services to meet their business demands OUR PROCESS Managed Detection And Response! Experience, Experti...</i><br />Target victim <b>website</b>: <i>dowley.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>fivestarproducts.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17417</link>
<guid>7bcab4942f4f7e074eb4f7b4ecdf4f61</guid>
<pubDate>Sun, 15 Sep 2024 17:07:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>fivestarproducts.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5af1f47990af50be2616710f06269c9963948cb2c147a46f5a0f468858d586d9</i><br /><br />Threat actor <b>description</b>: <i>Markets & Applications Our innovative product solutions and unparalleled technical and engineering support make Five Star Products an outstanding choice for project success in a variety of markets and applications. Chemical Processing O&G</i><br />Target victim <b>website</b>: <i>fivestarproducts.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>nfcaa.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17419</link>
<guid>08780eb9b58091a2d4b81a1af602b617</guid>
<pubDate>Sun, 15 Sep 2024 17:03:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>nfcaa.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>155731b7e2689c255577b9ab58979230f8930a74693917f2d85cfecb729219ce</i><br /><br />Threat actor <b>description</b>: <i>UTILITY ASSISTANCE. The Northeast Florida Community Action Agency, Inc. (NFCAA) is taking steps to maintain the health and safety of our customers, our employees, and our communities. All appointments and applications must be completed online or by m...</i><br />Target victim <b>website</b>: <i>nfcaa.org</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>EAGLE-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17410</link>
<guid>1f7650d12288f6e4a44073eb22ee2edb</guid>
<pubDate>Sun, 15 Sep 2024 15:26:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>EAGLE-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>35a29ab6f8cbaa18b60e56606d98bd3422db3a1465e9e3d393132936ec0e8651</i><br /><br />Threat actor <b>description</b>: <i>EAGLE School is an independent, kindergarten through eighth grade school dedicated to serving gifted and talented students.
We focus on providing a challenging academic curriculum along with supportive social-emotional guidance. All classes             ...</i><br />Target victim <b>website</b>: <i>www.eagleschool.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.rockymountaingastro.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17409</link>
<guid>9b816e24fbac7e0fcec9dedf31c14ced</guid>
<pubDate>Sun, 15 Sep 2024 12:53:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trinity</b> claims attack for <b>www.rockymountaingastro.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec9a6396a4e51affe11cc8fc03fecb5319ecdf61746b2032ac80a992b8bd02e4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>trinity</category>
</item>
<item xmlns:dc='ns:1'>
<title>OnePoint-Patient-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17402</link>
<guid>bbd529c3160b4c800103a27dd102a72a</guid>
<pubDate>Sun, 15 Sep 2024 00:02:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>OnePoint-Patient-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a00bb25c3c3b14f43f9eeec3f76b5d4f53660313671de7db89f710246e7959b</i><br /><br />Threat actor <b>description</b>: <i>One Point Patient Care (OPPC) founded in 1965 and headquartered in Tempe, Arizona, is a national, hospice-focused pharmacy providing delivery, mail-order and Pharmacy Benefit Management (PBM) all under one service umbrella.</i><br />Target victim <b>website</b>: <i>oppc.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>ORCHID-ORTHO.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17394</link>
<guid>f4f845d6fdeca6547c012e2b85347ae5</guid>
<pubDate>Sat, 14 Sep 2024 10:23:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ORCHID-ORTHO.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e03a744a85edcef7f6da7ad1af08158040fa878c0ab216f20e93a890c34748ce</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>ORCHID-ORTHO.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ecbawm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17393</link>
<guid>15a676c8852b5e796541c58b5846a1e6</guid>
<pubDate>Sat, 14 Sep 2024 08:53:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>ecbawm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0cfa4a9cbc0667c86281c396ed133aa14a50ab5b2b4538871ae7acef066304a8</i><br /><br />Threat actor <b>description</b>: <i>Emery Celli Brinckerhoff Abady Ward & Maazel LLP is a nationally-recognized litigation boutique that focuses on civil rights, commercial, criminal, and ethics matters.</i><br />Target victim <b>website</b>: <i>ecbawm.com</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>FD-Lawrence-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17392</link>
<guid>f85394ad7edb90639623e2af567b3963</guid>
<pubDate>Fri, 13 Sep 2024 22:35:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>FD-Lawrence-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>93b1dad1becea7f8e703f9843a3dc6a510d45d1ee8ad66c7b3cd50f0fc77d8d2</i><br /><br />Threat actor <b>description</b>: <i>The F.D. Lawrence Electric Company is committed to reducing the energy usage and power consumption of our customers whether residential, commercial</i><br />Target victim <b>website</b>: <i>www.fdlawrence.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>True-Family-Enterprises</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17391</link>
<guid>df543abd114ce563a23341c8a0707de6</guid>
<pubDate>Fri, 13 Sep 2024 21:11:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>True-Family-Enterprises</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>925d17a0272e503f068b97b5053aeee306046128e53690ae2775f91bd6ee178a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.truefamilyenterprises.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dimensional-Merchandising</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17390</link>
<guid>d4ce44f39a4a99bb1fe0f14e5330e6d4</guid>
<pubDate>Fri, 13 Sep 2024 21:08:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Dimensional-Merchandising</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b9f09ddc9c365b06db583c6d14fbad04f5613919fb191914630d75dd8581b708</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.dminj.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Creative-Playthings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17389</link>
<guid>36f9d490114303cd7debf20548fc6888</guid>
<pubDate>Fri, 13 Sep 2024 21:05:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Creative-Playthings</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9e3f2c6b3dbbf636227ba72ee6b96b2776d3681030c46de33fb5e6eaa8a08f3</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.creativeplaythings.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Law-Offices-of-Michael-J-Gurfinkel-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17386</link>
<guid>6c94aac00434f75e46fec31a10de2c0e</guid>
<pubDate>Fri, 13 Sep 2024 18:23:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Law-Offices-of-Michael-J-Gurfinkel-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2046b19fbaa4251808872cd974546bc5c3375cb56805e2150021fc420ea126ff</i><br /><br />Threat actor <b>description</b>: <i>The Law Offices of Michael J. Gurfinkel, Inc. is one of the most respected and successful immigration law firms in America. We take pride that many of our cases are considered “miracle cases” that were “emergency” in nature, or were considered “too difficult” or “impossible” by other attorneys.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hostetler-Buildings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17388</link>
<guid>2c78174142e326ca62fc0c16d828a2fe</guid>
<pubDate>Fri, 13 Sep 2024 16:35:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Hostetler-Buildings</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4cbd2070e5bf8979e94b76e8b440b7e2578b695695fe7680b285dc90bdeb6b06</i><br /><br />Threat actor <b>description</b>: <i>Hostetler Buildings has grown a lot since we started in 1966. And we continue to grow. But there’s several things that have never changed. The root of our success has always been commitment to people and quality. Our focus is people-driven. And our purpose is consistent: To inspire others to grow and build with purpose, and to build value-added solutions.</i><br />Target victim <b>website</b>: <i>hostetlergroup.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Associated-Building-Specialties</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17383</link>
<guid>6dce2d065c96e556331c1407a7491c7d</guid>
<pubDate>Fri, 13 Sep 2024 14:45:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Associated-Building-Specialties</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2084744d8f1c924c1e6b89b1f14f434fee562a1e2fa224fcc424f77842be46c7</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>www.abscolorado.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>VIcom-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17384</link>
<guid>e419ad025df62fbc3cc87331f5bf56cd</guid>
<pubDate>Fri, 13 Sep 2024 13:42:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>VIcom-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b4819d8ba2ee99feaffe95fe045b22107f77fc346ecf3ac209e225c01ef4f69</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>www.vicom-corp.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>HB-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17385</link>
<guid>fa99ccdbea597263a88f27075bd6eb49</guid>
<pubDate>Fri, 13 Sep 2024 13:38:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>HB-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>76f38235f84c1d0f695c576ff5fdb08d8247c62c9679f064abe8ceff2f42878a</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>www.hbconstruction.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arch-Con</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17382</link>
<guid>003bed21fddc817050c8fa11897fe660</guid>
<pubDate>Fri, 13 Sep 2024 12:58:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Arch-Con</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>95e41a37c85f1f65305731bd32e03c00eeca9ec8a9b3f7327f1e91a7ec1c5e3b</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>www.arch-con.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.southeasternretina.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17380</link>
<guid>e9cb54cbc877fe2cf2bc1293d2ec1254</guid>
<pubDate>Fri, 13 Sep 2024 10:47:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.southeasternretina.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18c30ce9e75409758fa1b321c9f1c72c0c706a177ca8bd89e5715d2461bf9db1</i><br /><br />Threat actor <b>description</b>: <i>Southeastern Retina Associates is a specialized medical practice focusing on the diagnosis and treatment of retinal and vitreous diseases. With a team of experienced ophthalmologists, the company offers advanced care for conditions such as macular degeneration, diabetic retinopathy, and retinal detachment. They provide state-of-the-art treatments and personalized care to improve and preserve patients' vision.</i><br />Target victim <b>website</b>: <i>www.southeasternretina.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ascend-Analytics-ascendanalytics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17379</link>
<guid>940af5b63a832bd68ebbc70ee0fe22fe</guid>
<pubDate>Fri, 13 Sep 2024 00:13:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Ascend-Analytics-ascendanalytics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>58fe2a624801fd304c488faba89eb6e64f6f3b56b906d110220b8e5d69bed98c</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2002, Ascend Analytics is an innovative software service company focu...</i><br />Target victim <b>website</b>: <i>ascendanalytics.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kingsmill-Resort</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17378</link>
<guid>77dbda525242a07339101a7c6ac73495</guid>
<pubDate>Thu, 12 Sep 2024 22:19:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Kingsmill-Resort</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b78114a9c81f2ec997520efaba050fa2981c06361b086f680e78c62b31a4674b</i><br /><br />Threat actor <b>description</b>: <i>Welcome to Kingsmill Resort! Beautifully located on the banks of America’s “founding river” and nestled into the quaint luxury of southern Virginia, Kingsmill is where your next great adventure begins. Experience the thrill of our three            ...</i><br />Target victim <b>website</b>: <i>www.kingsmill.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carpenter-McCadden-and-Lane-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17374</link>
<guid>ba1d96789cd23612473b9ddfc6d5fd22</guid>
<pubDate>Thu, 12 Sep 2024 18:23:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Carpenter-McCadden-and-Lane-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6370437f038ba7895ff251b1f8214a75259015da95f76b13812d02c62d209498</i><br /><br />Threat actor <b>description</b>: <i>Carpenter McCadden and Lane LLP is a distinguished law firm renowned for its expertise in corporate law, litigation, and intellectual property. With a team of seasoned attorneys, the firm is committed to delivering personalized legal solutions to businesses and individuals. Their dedication to client success and a reputation for excellence make them a trusted choice for comprehensive legal services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>brunswickhospitalcenter.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17381</link>
<guid>33681279c167c7fcd2997ed72cfb4c4a</guid>
<pubDate>Thu, 12 Sep 2024 18:10:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>brunswickhospitalcenter.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e3a8f91db67ca6b5b039e34a9d4a574a2256f7327bc8711ddbc019b03f048b9b</i><br /><br />Threat actor <b>description</b>: <i>We are located in Amityville, Long Island, New York and are fully accredited by The Joint Commission and  licensed by the New York State Office of Mental Health.
 
We offer a state of the art program that focuses on the treatment of acute mental...</i><br />Target victim <b>website</b>: <i>brunswickhospitalcenter.org</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>thornton-inc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17372</link>
<guid>214f57783cac173e183096a607a408be</guid>
<pubDate>Thu, 12 Sep 2024 13:00:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>thornton-inc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8daf117e4311f67111e3f8211988686bacd54509b0ab580af737286aea498cfc</i><br /><br />Threat actor <b>description</b>: <i>Thornton Inc. is a dynamic company specializing in innovative technology solutions and consulting services. They focus on delivering customized software development, IT infrastructure management, and digital transformation strategies to help businesses optimize their operations. Renowned for their client-centric approach, Thornton Inc. leverages cutting-edge technology to drive growth and efficiency for their clients.</i><br />Target victim <b>website</b>: <i>thornton-inc.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>mechdyne.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17369</link>
<guid>7c5feb07041100d3cf5e2e86613f8d87</guid>
<pubDate>Thu, 12 Sep 2024 08:54:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>mechdyne.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8af9942c424b7c4f64106bbf71f022e6b238f5580301eed0a19819e4f97fcb49</i><br /><br />Threat actor <b>description</b>: <i>Mechdyne Corporation specializes in advanced immersive and collaborative technology solutions. They offer a range of services including virtual reality, visualization systems, AV integration, and IT services. Their solutions cater to industries like education, healthcare, and defense, enhancing communication, training, and decision-making processes. Mechdyne is known for innovation and client-focused service.</i><br />Target victim <b>website</b>: <i>mechdyne.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Starr-Iva-Water--Sewer-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17370</link>
<guid>33db745ffcbd935024b94941e34a25a6</guid>
<pubDate>Thu, 12 Sep 2024 07:56:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Starr-Iva-Water--Sewer-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b369fc2cdb880abaedb6700bf251e39f45fafa4c0865d538860d23ff4cc1eaf1</i><br /><br />Threat actor <b>description</b>: <i>Starr-Iva Water & Sewer District - provides water supply services. Starr-Iva Water and Sewer District corporate office is located in 104 Roy Arnold Rd, Starr, South Carolina, 29684, United States and has 6 employees.</i><br />Target victim <b>website</b>: <i>siwater.net</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>allamericanpoly.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17363</link>
<guid>27324bfa32fc43f34ea23a2b279c4992</guid>
<pubDate>Wed, 11 Sep 2024 20:44:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>allamericanpoly.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7137cd5a05cc5698c45fdba276452371c513108759d883c208e61a6c907cf8de</i><br /><br />Threat actor <b>description</b>: <i>All American Poly is a company specializing in the production of polyethylene film and related products. They offer a range of items including custom and standard plastic bags, sheeting, tubing, and shrink films. Known for high-quality materials and customer-focused service, they cater to various industries such as food, medical, and industrial sectors, ensuring reliable and durable packaging solutions.</i><br />Target victim <b>website</b>: <i>allamericanpoly.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cathedral-Prep-villalan.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17360</link>
<guid>98538f596b34bab69a908c8f376983a1</guid>
<pubDate>Wed, 11 Sep 2024 13:09:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Cathedral-Prep-villalan.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eaddaf4c2158b833780a6796e4d82657e552cf2dab6b269167fe01ce01d2acf9</i><br /><br />Threat actor <b>description</b>: <i>Cathedral Prep is a Christ-Centered, Men's College Preparatory School of the Diocese of Erie. Founded upon faith, family and tradition.</i><br />Target victim <b>website</b>: <i>villalan.edu</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>S.-Walter-Packaging</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17361</link>
<guid>e0ddc27e24c6e49ace5a5dcef6c784eb</guid>
<pubDate>Wed, 11 Sep 2024 13:07:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>S.-Walter-Packaging</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>abdcbd3887b71ddec8102347592049bda91a25b4080ba56df1c94a6aef9cabff</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>swalter.com</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advanced-Physician-Management-Services-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17358</link>
<guid>7ffe81740cade70f9263a9975441c473</guid>
<pubDate>Wed, 11 Sep 2024 12:15:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Advanced-Physician-Management-Services-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29237ad5189302dfa30f7530fac8343ca9ba1629ea7ea69bf22d6b9763d771e7</i><br /><br />Threat actor <b>description</b>: <i>Advanced Physician Management Services LLC is a healthcare management company specializing in providing administrative and operational support to medical practices. They offer services such as billing, coding, compliance, human resources, and financial management. Their goal is to streamline operations, enhance efficiency, and allow physicians to focus on patient care while ensuring regulatory compliance and financial stability.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ladov-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17355</link>
<guid>b9bcc60258dde4ef7c2b85914046f4c0</guid>
<pubDate>Wed, 11 Sep 2024 05:13:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Ladov-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1342895ddb5ef8db448e93547429baecff1c2d67e5f565d24baccb44bbbb90f0</i><br /><br />Threat actor <b>description</b>: <i>Ladov Law Firm PC is a company that operates in the Law Firms & Legal Services industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Regent-Care-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17356</link>
<guid>747579165776fe1ba349237464ae0eed</guid>
<pubDate>Wed, 11 Sep 2024 01:02:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Regent-Care-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>71104627706c0a87d7623d33acbe71fe09a7a6efbda2bda10d7dd272b122b9bb</i><br /><br />Threat actor <b>description</b>: <i>Regent Care Center Of Oakwell Farms offers a variety of services designed to provide comprehensive rehabilitation and skilled nursing for their residents. The staff and physicians work together to create an individualized treatment plan to maximize the success and progress of each resident. The company's mission is to provide quality care and life in a warm, beautiful and luxurious setting for the residents and their families, a safe environment that offers personal and professional growth for their associates, and a prudent fiscal plan.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Elgin-Separation-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17346</link>
<guid>92cf20fec778b6ae4fca0c05c154e3a7</guid>
<pubDate>Tue, 10 Sep 2024 22:45:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Elgin-Separation-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>471bfea0bec153692aef547aa6a41caf10a2d92c0e94b1fbf31d32b6406ad1bd</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.elginseparationsolutions.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bel-Air-Bay-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17345</link>
<guid>307f9eb8397a08703db9f7f66fcaf8c3</guid>
<pubDate>Tue, 10 Sep 2024 20:46:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Bel-Air-Bay-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e5da8212662f6b34f86014eb311d71ea0dd346cb587c4bc85fff4f0bda30fa77</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.belairbayclub.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Evans-Distribution-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17353</link>
<guid>b69ac29d2300c14063391edd38df9910</guid>
<pubDate>Tue, 10 Sep 2024 20:31:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Evans-Distribution-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a870a023cbcb8841e80b83f94d24dc54a0ee66ac5ed831d45124ea67602f52f2</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.evansdist.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>PIGGLY-WIGGLY-ALABAMA-DISTRIBUTING</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17351</link>
<guid>2927189f575caa14640d46a82f7c30d3</guid>
<pubDate>Tue, 10 Sep 2024 20:25:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>PIGGLY-WIGGLY-ALABAMA-DISTRIBUTING</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f1d5e67d56dcc0431e48ef82430ca48e349102c4611b85abca3e5424aefa717</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.pwadc.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Joe-Swartz-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17350</link>
<guid>8f62fe2aabd402d562821460d7d4c72b</guid>
<pubDate>Tue, 10 Sep 2024 20:16:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Joe-Swartz-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dabe961ad786a69a704b9799298b7e2ea3ff8a42caae576baa559e30545cd5aa</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.swartzelectric.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Virginia-Dare-Extract-Co.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17349</link>
<guid>0a6b81775eca5ee27b72deef7972375a</guid>
<pubDate>Tue, 10 Sep 2024 20:13:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Virginia-Dare-Extract-Co.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>10f4e3d9d3ada4b6421fd964463a6e9bcaf01ec385fd12143aa6f1832f734b30</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.virginiadare.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southeast-Cooler</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17348</link>
<guid>37953cab902d1f698bfb59b54d5e6369</guid>
<pubDate>Tue, 10 Sep 2024 20:09:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Southeast-Cooler</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>363daf6eaad7833e8dac5e7ae0aed53ff5220df9fab1921863d19badf34d12b6</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.secooler.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vickers-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17340</link>
<guid>7295b8c846b35dfe7da45330e57d3f61</guid>
<pubDate>Tue, 10 Sep 2024 16:14:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Vickers-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56048a738fc2c60a3bb33cf46e63a0ed12f67330e5e4796b6ad92419a3cc80e0</i><br /><br />Threat actor <b>description</b>: <i>Established in 1970, Vickers has evolved into a world class Precision Machining company. 25Gb of data to be disclosed. SSNs, driver licenses and other employee data. Lots of NDAs, agreements, contracts. Accounting and financial files are also represented.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Controlled-Power</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17343</link>
<guid>474cb9e0d31ee15a396d30623feeea71</guid>
<pubDate>Tue, 10 Sep 2024 15:36:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Controlled-Power</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce54da51e649d16033145adb0bb912e2f628204d2915518f5fac19f18000a643</i><br /><br />Threat actor <b>description</b>: <i>Control & Power has been representing many of the leading manufacturers in the fluid power & process control industries.</i><br />Target victim <b>website</b>: <i>www.controlledpowerinc.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arc-Com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17344</link>
<guid>d1aa227de516e4617cc72ab9cf456380</guid>
<pubDate>Tue, 10 Sep 2024 15:34:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Arc-Com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>969a23bcf05f1addac1dd3883e5ce5f10bdae9215b8f6cfb582b44edd72a7f12</i><br /><br />Threat actor <b>description</b>: <i>Arc-Com is a leading designer, manufacturer and supplier of design-driven, high-performance textiles and wallcoverings.</i><br />Target victim <b>website</b>: <i>arc-com.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>E-Z-Pack-Holdings-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17337</link>
<guid>b6666c8880a656847a6b36e85cccfd71</guid>
<pubDate>Tue, 10 Sep 2024 09:33:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>E-Z-Pack-Holdings-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb99347c663404235e358bba95e26f0a56e29e323a8ff434cb5ea472ffee85a5</i><br /><br />Threat actor <b>description</b>: <i>As part of Commercial Specialty Truck Holdings (CSTH), E-Z Pack is leading refuse truck manufacturer committed to having products designed to be simple to operate and repair, and more connected to the needs of your operation. The company has a unique understanding and appreciation for the value and importance of safety which is why the safety of everyone is a core focus in the design of the products and in the daily manufacturing operations at E-Z Pack.   As a dynamic and agile company, they continue to invest in facilities, products, processes and people. The company continues to reconfigure its Cynthiana, KY manufacturing plant for lean production, bringing in experts to head up the efforts in optimizing material flow and to improve efficiency and product quality. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>americagraphics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17333</link>
<guid>c8c3924a3385b6c14b4420f557b60608</guid>
<pubDate>Tue, 10 Sep 2024 04:12:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>americagraphics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7db431be3d1cd40b5b6489570059e799e988433913665cd958c07dcc98772639</i><br /><br />Threat actor <b>description</b>: <i>Americagraphics.com is a company specializing in high-quality graphic design and printing services. They cater to a diverse clientele, offering customized solutions for branding, marketing materials, and promotional products. Known for their innovative approach and attention to detail, Americagraphics.com aims to deliver visually compelling and effective designs that help businesses stand out.</i><br />Target victim <b>website</b>: <i>americagraphics.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Pleasanton-California</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17408</link>
<guid>721cc4aaaf4e30504cb0ddcb4f756763</guid>
<pubDate>Tue, 10 Sep 2024 03:45:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ValenciaLeaks</b> claims attack for <b>City-of-Pleasanton-California</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b443729c3dd37b320d5c7b6b4f9f6f7bd4e1c6853823d82085cd8c9fa5f0a5a</i><br /><br />Threat actor <b>description</b>: <i>304GB Worth of data including PII (Some Credit Cards & IDs also), Network Passwords & more</i><br />Target victim <b>website</b>: <i>cityofpleasantonca.gov</i>]]></description>
<category>ValenciaLeaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pennsylvania-State-Education-Association</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17332</link>
<guid>2fbe1c703f6893c2bc5066fcbcaa2048</guid>
<pubDate>Mon, 09 Sep 2024 22:06:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Pennsylvania-State-Education-Association</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e202bf081162d2256afd2d7d7b77169fb3a059f1d65ef5f1c93a66c33ef93b8d</i><br /><br />Threat actor <b>description</b>: <i>Pennsylvania State Education Association PSEA is 178,000 members strong a community of education professionals who make a difference in the lives of Pennsylvania's students every day.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Battle-Lumber-Co.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17325</link>
<guid>b9f1a83c68c36088e57821bdb90f77f2</guid>
<pubDate>Mon, 09 Sep 2024 21:13:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Battle-Lumber-Co.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b595fa9d8354af64dd7f6d59f0c3cff5cb94f8187401678823c7514ac894a34f</i><br /><br />Threat actor <b>description</b>: <i>Battle Lumber Co., Inc is a lumber supply company that provides modern hardwood grade lumber & pallets.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>kahle-cpa</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17323</link>
<guid>bb0a313f554c3a2b6e9944368512bb9b</guid>
<pubDate>Mon, 09 Sep 2024 17:14:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>kahle-cpa</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d734b243376a44a0a7b7d5951f8d3084bd3557edb692ad2cd207417c94723249</i><br /><br />Threat actor <b>description</b>: <i>Kahle CPA PA is a company that operates in the Accounting Services industry. It employs 1to4 people and has 1Mto5M of revenue. We offer a broad range of services for business owners, executives, and independent professionals. We are affordabl            ...</i><br />Target victim <b>website</b>: <i> www.kahle-cpa.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Smart-Source-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17320</link>
<guid>e98f2cd4e9f56a133abed423adb51d83</guid>
<pubDate>Mon, 09 Sep 2024 13:13:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Smart-Source-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e0dd2a9b2ab6bfdd3565bb8bfd0c5a53ad4aa06c6a74d149b3819b5167271dd</i><br /><br />Threat actor <b>description</b>: <i>SmartSource is a leading provider of technology talent, multi-site deployments, and technical solutions. They provide both the people and processes needed for VARs and OEMs to grow and win with technology.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>atlanticice.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17321</link>
<guid>d4ae72ec5374a998c56865d04fb32da5</guid>
<pubDate>Mon, 09 Sep 2024 12:13:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>atlanticice.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38db17ab5eb4e703d7985b3b95ab1a3d596e88fb397d49f204cd56c21ba96c59</i><br /><br />Threat actor <b>description</b>: <i>Since 1940 we have only serviced commercial refrigeration and ice machines. We are the preferred choice of leading manufacturers for their warranty repairs in Philadelphia and the surrounding counties.</i><br />Target victim <b>website</b>: <i>atlanticice.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Phoenix-Air-Conditioning--Heating</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17319</link>
<guid>7a5cdf95716ea8fdfcfafa0f545139e0</guid>
<pubDate>Mon, 09 Sep 2024 10:12:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Phoenix-Air-Conditioning--Heating</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>01c39f28ae9e6a866f23c537543be5722ac0ff93fce0f74ed6b588d92696ea4a</i><br /><br />Threat actor <b>description</b>: <i>PHOENIX AIR CONDITIONING & HEATING
Since 1997 Mike Van Deren, owner and operator of Phoenix Air Conditioning & Heating, has been a leader in heating and air conditioning services in Orange County. His standards of ethics and excellence in th            ...</i><br />Target victim <b>website</b>: <i>www.phoenixairca.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Exitz-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17316</link>
<guid>6b219d75118d8793048bde740a3c9e60</guid>
<pubDate>Mon, 09 Sep 2024 09:15:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Exitz-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4db6951365e30a8dd240a7332d12190352fe8e0bd535ba7eb8025f319ea49cac</i><br /><br />Threat actor <b>description</b>: <i>Exitz Technologies is a company that operates in the Research & Development industry. It employs 10to19 people and has 1Mto5M of revenue.</i><br />Target victim <b>website</b>: <i>www.exitz.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>cardiovirginia.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17303</link>
<guid>68ff0c6ee845a28a756d3f8cf4e2a537</guid>
<pubDate>Sat, 07 Sep 2024 18:50:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>cardiovirginia.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa3abb3880da683e9bef182f0f4ded1896d479acac8effa47cf51a307789037f</i><br /><br />Threat actor <b>description</b>: <i>CardioVirginia is a healthcare provider specializing in comprehensive cardiovascular care. They offer a range of services including diagnostic testing, interventional cardiology, and preventive care. The practice is staffed by experienced cardiologists dedicated to personalized patient care, utilizing advanced medical technology to manage and treat heart-related conditions effectively.</i><br />Target victim <b>website</b>: <i>cardiovirginia.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Millsboro-Animal-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17298</link>
<guid>5ba560e450ca899ff7f25d00077c3fff</guid>
<pubDate>Sat, 07 Sep 2024 06:13:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Millsboro-Animal-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6445c120d1e6199e7cf2213af6c1d783c25ae847ed5e0fd7cb7b2cce008d8af</i><br /><br />Threat actor <b>description</b>: <i>Business Description
Healthcare Services is located in Delaware, United States. This organization primarily operates in the Animal Hospital Services, Pets and other Animal Specialties business / industry within the Agricultural Services sect            ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>America-Voice</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17297</link>
<guid>b20ab15a36e8643d52041a1cbce997e5</guid>
<pubDate>Fri, 06 Sep 2024 21:37:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>America-Voice</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>76294623d73f53cae5ea5ee6b977379d0b732511919d6c5ebe6fb61d051b1283</i><br /><br />Threat actor <b>description</b>: <i>America Voice provides prepaid telecommunications products. America Voice corporate office is located in 800 S Hope St Ste 120, Los Angeles, California, 90017, United States and has 24 employees. The total amount of data leakage is 134.6 GB</i><br />Target victim <b>website</b>: <i>americavoice.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>CK-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17293</link>
<guid>62ab12646d5ee17a595a43b59f2523d1</guid>
<pubDate>Fri, 06 Sep 2024 18:13:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>CK-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0d1755b127079ebcee1e2e8573e208a0c271e2d6699a45008e432bbc2301aec5</i><br /><br />Threat actor <b>description</b>: <i>CK Associates is an environmental consulting firm that is fully owned by its employees. CK was established in 1981 and became an employeeowned firm in 2004. CK’s offices are located in Baton Rouge, Lake Charles, Shreveport and Houston.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Keya-Accounting-and-Tax-Services-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17294</link>
<guid>9d223e2d11d76ac6197ba7f4018bf006</guid>
<pubDate>Fri, 06 Sep 2024 18:13:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Keya-Accounting-and-Tax-Services-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>709053b74bf18d4ef2f45185f7a2d8b167b50f0fbd9c476106afe6ec312e1746</i><br /><br />Threat actor <b>description</b>: <i>Keya Accounting Services LLC experienced team of accountants, bookkeepers, payroll specialists, marketing and IT professionals understanding of the business climate in the Washington.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arbitech-arb.local</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17291</link>
<guid>94263e205faec4311b1859acceeafe26</guid>
<pubDate>Fri, 06 Sep 2024 14:16:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Arbitech-arb.local</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2380efe5902289de8b84cd5476d87b8a7d2d1f0e7a31b3944beadc642683292e</i><br /><br />Threat actor <b>description</b>: <i>Arbitech, LLC, founded in August 2000, is the nation's leading independent IT di...</i><br />Target victim <b>website</b>: <i>arbitech.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>riomarineinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17288</link>
<guid>73fa61ad33d596ce3f642aa3a332e792</guid>
<pubDate>Fri, 06 Sep 2024 08:24:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>riomarineinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>10f527df9ae4bf5c24c1accdee24cf1d577d479c1f02770b5ffe36f9f329b385</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/RIOMARINEINC/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/RIOMARINEINC/PROOF/DATA DESCRIPTIONS: Personal Identifiable Information, employees\executives personal data, engineering data\drawings\projects, customer information, financial documents, contracts, corporate correspondence, database backups etc.</i><br />Target victim <b>website</b>: <i>riomarineinc.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Custom-Security-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17279</link>
<guid>87da00efc5e7f70a6361d0492957b9cc</guid>
<pubDate>Fri, 06 Sep 2024 01:41:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Custom-Security-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee9c13548a89f1c28e74cb2f83eac78c6b86d28f0c926d75804da0110f0aa9cf</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>www.customsecuritysystems.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>cps-k12.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17281</link>
<guid>9abe545d4c2bedb37146f4ae4507db3e</guid>
<pubDate>Thu, 05 Sep 2024 21:45:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>cps-k12.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5dd4b6b025e783d4c58ddab9efca6a02ef69782fa7292f99e9050620e4112bb</i><br /><br />Threat actor <b>description</b>: <i>Cincinnati Public Schools (CPS) is a comprehensive public school district serving the city of Cincinnati, Ohio. It encompasses various elementary, middle, and high schools, providing education to a diverse student body. CPS is dedicated to fostering academic excellence, equity, and innovation, offering specialized programs and extracurricular activities to meet the needs and interests of its students.</i><br />Target victim <b>website</b>: <i>cps-k12.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>tri-tech.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17272</link>
<guid>20b4c1393fa69e1f777eacd54ff50a81</guid>
<pubDate>Thu, 05 Sep 2024 20:47:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>tri-tech.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>09bfd49823fe38a16c09ca9b78a11e30bf3fdee15f742987503049571958fce5</i><br /><br />Threat actor <b>description</b>: <i>Tri-Tech is a company specializing in providing advanced technology solutions and services. They focus on delivering innovative IT and communication systems, offering expertise in areas such as network design, implementation, and support. Tri-Tech serves a diverse range of industries, ensuring tailored solutions to meet specific business needs, with an emphasis on quality, reliability, and customer satisfaction.</i><br />Target victim <b>website</b>: <i>tri-tech.us</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>PhD-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17276</link>
<guid>f3a493fb0b6dc6357b9d89d6bdc1f2af</guid>
<pubDate>Thu, 05 Sep 2024 20:42:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>PhD-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34e662ebad678fe06463cb7a22dfad891c9ca234db6ce38bfec86fdf155c4d88</i><br /><br />Threat actor <b>description</b>: <i>Established in 1962, PHD Services is a women-owned and operated facility services provider headquartered in Illinois. With a rich legacy spanning over six decades, we have grown from a local enterprise to a regional leader, serving clients across the US. We provide a comprehensive range of support services that includes professional cleaning, facility support, grounds maintenance, and supply chain solutions.</i><br />Target victim <b>website</b>: <i>phdservices.net</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>phdservices.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17278</link>
<guid>3fc766eeb8f90bc3d4e5b0ed68639eee</guid>
<pubDate>Thu, 05 Sep 2024 20:07:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>phdservices.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>deb9e7a88aa7576dc275baecc8e7f781c7efa1a773b15cfbbc7801ee8a992e92</i><br /><br />Threat actor <b>description</b>: <i>Phdservices.net is a professional academic consulting company specializing in providing comprehensive support for PhD candidates and researchers. Their services include dissertation writing assistance, statistical analysis, research design, editing, and proofreading. The company is dedicated to helping clients achieve academic success by offering personalized, high-quality guidance throughout the research and writing process.</i><br />Target victim <b>website</b>: <i>phdservices.net</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Baird-Mandalas-Brockstedt-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17271</link>
<guid>5cd8270fa6b6f7b7e7ee19ab22b8024a</guid>
<pubDate>Thu, 05 Sep 2024 17:22:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Baird-Mandalas-Brockstedt-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34a84decacf79b5eabea780bd8bae0e515bf42332ff2c906bfd266fd7023dff0</i><br /><br />Threat actor <b>description</b>: <i>Baird Mandalas Brockstedt LLC is a Delaware based law firm. We have obtrained 400gb of their files. Enormous number of personal clients data will be uploaded. Birth\death certificates, passports,SSNs, court hearings, evidences and so on.</i><br />Target victim <b>website</b>: <i>bmbde.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cellular-Plus</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17269</link>
<guid>2b0499a38c552014f2ff4a1df8abe8d2</guid>
<pubDate>Thu, 05 Sep 2024 12:14:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Cellular-Plus</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>62fc142d87b1034504face7194822530006e086576fc567b302ff6151a4ebf2e</i><br /><br />Threat actor <b>description</b>: <i>Cellular Plus is the fastest growing Verizon Wireless Authorized Retailers in the Northwest. Lots of personal employee data (270  ppl), accounting and financial data, some client files and os on.We will upload the data soon as they refused to cooperate.</i><br />Target victim <b>website</b>: <i>cellularplus.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arch-Street-Capital-Advisors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17265</link>
<guid>ab43c4e87d82d0c6b0f9b02654aaf23c</guid>
<pubDate>Thu, 05 Sep 2024 09:16:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Arch-Street-Capital-Advisors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8c9619e81253aa3b4571e3534d45c0c9f96f6b85367e77cf15a5cf0b8b1e5e9e</i><br /><br />Threat actor <b>description</b>: <i>Arch Street Capital Advisors is a full-service real estate investment and advisory firm. Our core objective is to advance the interests of our capital partners by providing comprehensive and customized guidance to define and achieve their inv            ...</i><br />Target victim <b>website</b>: <i>www.archstreetcapital.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Western-Supplies-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17264</link>
<guid>f8aee2c37235d0f679aa23371280367e</guid>
<pubDate>Thu, 05 Sep 2024 01:36:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Western-Supplies-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f6f13e3907f57976a4aa73749b5ed03f66b453b00cdef5b36e18797d3964333</i><br /><br />Threat actor <b>description</b>: <i>Western Supplies, Inc. is your experienced, nationwide Pipeline Supplier. Whether you need Right of Way or Testing Equipment, Rental or Supplies, call one of the most trusted names in the business.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crain-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17259</link>
<guid>72be476187889df5a41b67e8365203f5</guid>
<pubDate>Wed, 04 Sep 2024 22:45:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Crain-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fed92e6ff457f85cb7bbc34a70abcd284941caf74a4bfd4ebb131d7f937be5cc</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.craingroup.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bakersfield</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17258</link>
<guid>42dac78c17149caac83296b32af38f59</guid>
<pubDate>Wed, 04 Sep 2024 20:50:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Bakersfield</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>41c674a669ab46de6fbc187d96af27e725c4f08a107df0b59777cf60e406dcbd</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.bakersfield.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Farmers-Rice-Cooperative</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17263</link>
<guid>4c40792e5998965f300247b4b43a879b</guid>
<pubDate>Wed, 04 Sep 2024 20:24:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Farmers-Rice-Cooperative</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4bfcba3d1abaaa1d505e062c5a6f7851a98e7ba5413664c6127d5df7fe0e9902</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.farmersrice.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Parrish</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17262</link>
<guid>0b823d8b45ee3eaf26e538b6cff6f451</guid>
<pubDate>Wed, 04 Sep 2024 20:08:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Parrish</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a4df94b749ac17f29d7081674d93a242f1d10e608cf11e331f4fa0e2aa6b0b3c</i><br /><br />Threat actor <b>description</b>: <i>For 45 years, Parrish & Company has served Texas as a leading distributor of fine home products: appliances, cabinetry, fireplaces, garage doors</i><br />Target victim <b>website</b>: <i>parrishandcompany.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Seirus-Innovation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17261</link>
<guid>dfd079e3f84300e65dea6b55d0c8e158</guid>
<pubDate>Wed, 04 Sep 2024 20:05:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Seirus-Innovation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9dca75f91fe397c712dadac20bcbdc3e1406f11b96ec1dd2e94121298e5ea4ef</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.seirus.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.pcipa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17255</link>
<guid>1a2ba93313d0d654d3974d09654b4559</guid>
<pubDate>Wed, 04 Sep 2024 18:46:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.pcipa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6602c0e28b655743a4c46d41c270430d44a9ed631a9e33733b13aa985616326f</i><br /><br />Threat actor <b>description</b>: <i>PCIPA, or Professional Consultants Insurance Plan Administrators, offers tailored insurance solutions for professionals. Specializing in Errors & Omissions (E&O) and Professional Liability coverage, they cater to various industries, including technology, engineering, and healthcare. Their mission is to provide comprehensive risk management services, ensuring clients can focus on their core business activities.</i><br />Target victim <b>website</b>: <i>www.pcipa.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>OSDA-Contract-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17254</link>
<guid>7bee77d38f5089708e786b75b0b61748</guid>
<pubDate>Wed, 04 Sep 2024 14:00:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>OSDA-Contract-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56b04dac8964d5c8be70d4a03654eaddfbfa43a9a056df8a0efa8796b8a285b2</i><br /><br />Threat actor <b>description</b>: <i>OSDA's capability for rapid prototyping and new product introduction is one of our core competencies. OSDA has been providing this service for over 28 years, so you can depend on this experience to get your product to market in the shortest time possible.</i><br />Target victim <b>website</b>: <i>www.osda.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>plannedparenthood.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17251</link>
<guid>27e2f2ca9e925f75d5323afef48703e6</guid>
<pubDate>Wed, 04 Sep 2024 10:47:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>plannedparenthood.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7964bae368824ce7d92b46c288ff5af5fcd1920af4eca5b841917ec223f36809</i><br /><br />Threat actor <b>description</b>: <i>Planned Parenthood is a nonprofit organization that provides reproductive health care, sex education, and information to millions globally. It offers services such as contraception, STI testing and treatment, cancer screenings, and abortion services. Committed to supporting and advocating for reproductive rights, Planned Parenthood also engages in research and policy efforts to promote comprehensive health care access.</i><br />Target victim <b>website</b>: <i>plannedparenthood.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sunrise-Erectors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17249</link>
<guid>918d58be2384bacb0c9bfc0481364d1a</guid>
<pubDate>Wed, 04 Sep 2024 08:51:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Sunrise-Erectors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6cf74ac822eab8c83c0de009b8ee403b650d12c3ae160023a3729cedda9f1115</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>www.sunriseerectors.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>gardenhomesmanagement.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17247</link>
<guid>fd95de778a7546239dbe44d067c96b74</guid>
<pubDate>Wed, 04 Sep 2024 00:15:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>gardenhomesmanagement.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>069f5b6dcf46e81f44f43769805f37373c544bb1aacf815dd0d33abf5a408195</i><br /><br />Threat actor <b>description</b>: <i>Garden Homes Management is a real estate company specializing in the development, ownership, and management of residential properties. The company offers a variety of housing options, including single-family homes, apartments, and townhouses. Known for their quality construction and attentive property management, they aim to provide comfortable and well-maintained living spaces for their tenants.</i><br />Target victim <b>website</b>: <i>gardenhomesmanagement.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>balboabayresort.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17248</link>
<guid>4b7bb0379e2a232c12329c9a212801a9</guid>
<pubDate>Wed, 04 Sep 2024 00:05:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>balboabayresort.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b109bdd67984b40388bb5879b2d4e4c751d4fc9f18d0a5ccf41e48e8acf5efc</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/BBS/PROOF/Mirror:  https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/BBS/PROOF/DATA DESCRIPTIONS: Personal Identifiable Information, employees\executives personal data, customer information, financial data, contracts, corporate correspondence, etc.</i><br />Target victim <b>website</b>: <i>balboabayresort.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>flodraulic.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17242</link>
<guid>737a19a70d83c5c3ac2a3bb118a09b2f</guid>
<pubDate>Tue, 03 Sep 2024 20:38:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>flodraulic.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ffeeacbe0e93be5cd4cf7dd810fb0f2446dadabd26ad62bd804662b1a4808d9</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/FLODRAULIC/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/FLODRAULIC/PROOF/DATA DESCRIPTIONS: Employees personal and corporate data, customer information, contracts, projects, drawings, financial documents, corporate correspondence, etc.</i><br />Target victim <b>website</b>: <i>flodraulic.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>United-Methodist-Retirement-Homes-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17256</link>
<guid>f7ab113fb2bdb9d5674ef9ab826d7979</guid>
<pubDate>Tue, 03 Sep 2024 20:08:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>United-Methodist-Retirement-Homes-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4bfff3a2c3af0fc1805be43408cc4286e0b7f628082def0b18c1b89be16c328a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>W.-A.-Richardson-Builders-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17257</link>
<guid>fada3d8ed2d4a4ace2863798fece05ac</guid>
<pubDate>Tue, 03 Sep 2024 20:08:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>W.-A.-Richardson-Builders-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60d87236d3edc609e1cfa66129c080c00b6a1b10622001bb50dff9a69fa09aa7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>wilmingtoncc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17237</link>
<guid>fd9d41f212a75b8af57b43a97386c948</guid>
<pubDate>Tue, 03 Sep 2024 18:58:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>wilmingtoncc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>afef91bb6a8bc682581c343cab0a7ec13ea8ef10a043bdb0045bc2f011771af9</i><br /><br />Threat actor <b>description</b>: <i>"Wilmington Country Club, represented online as wilmingtoncc.org, is a prestigious private club located in Wilmington, Delaware. Established in 1901, it offers members a range of amenities including two championship golf courses, tennis courts, a fitness center, swimming pools, and fine dining options. The club is known for its rich history, elegant facilities, and a strong sense of community among its members."</i><br />Target victim <b>website</b>: <i>wilmingtoncc.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Turman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17230</link>
<guid>e6baae661f54db3aa1d9f76b2c893882</guid>
<pubDate>Tue, 03 Sep 2024 10:14:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Turman</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5927d968ad825b3c4cd321249cf5efaa00021766fe36107ab7ee813ed951f3f</i><br /><br />Threat actor <b>description</b>: <i>Turman Commercial Painters offers our customers the benefits of consistent high quality results and multiple offices nationwide, all under one owner. Founded in 1972, we’ve acquired unmatched industry expertise with a 100% job completion ra            ...</i><br />Target victim <b>website</b>: <i>www.turmaninc.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kingsport-Imaging-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17229</link>
<guid>32065a1a7dd7b2070f93b815e5e11b6d</guid>
<pubDate>Tue, 03 Sep 2024 06:31:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Kingsport-Imaging-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>51b486f13f3e897e2b97c936e87e52b49c82154f6754f9d05c1e8aeae4ea84eb</i><br /><br />Threat actor <b>description</b>: <i>Kingsport Imaging Systems, Inc. is an independently owned company marketing office equipment as an authorized dealer for Canon USA, Inc. Kingsport Imaging Systems corporate office is located in 200 E Market St, Kingsport, Tennessee, 37660, United States and has 18 employees.</i><br />Target victim <b>website</b>: <i>isionline.net</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Project-Hospitality</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17224</link>
<guid>d8e786d674ada58984bf0a2e32807381</guid>
<pubDate>Mon, 02 Sep 2024 18:50:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Project-Hospitality</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6d54ad056edda3976091643918631ceb988cfbb3cd1ab6325f848382a7830361</i><br /><br />Threat actor <b>description</b>: <i>Project Hospitality</i><br />Target victim <b>website</b>: <i>projecthospitality.org</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shomof-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17223</link>
<guid>e4dfee79421423c52617e85ec0a9f9a4</guid>
<pubDate>Mon, 02 Sep 2024 14:23:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Shomof-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9b1bc55d22d4ba734d45ea047f1aa37a907adf6c9981fbb8b3c870c5ae7a9efb</i><br /><br />Threat actor <b>description</b>: <i>Shomof Group is the developer to utilize the City’s Adaptive Reuse Ordinance, engaged in reconstruction of office buildings in the center of Los Angeles. Shomof Group real estate portfolio also applies to Los Angeles, Long Beach, Orange County, the San Fernando Valley, and Las Vegas with low-income housing specialization. Shomof Group corporate office is located in 9708 Gilespie St, Las Vegas, Nevada, 89183, United States and has 12 employees. The total amount of data leakage is 130.00 GB</i><br />Target victim <b>website</b>: <i>shomofgroup.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>San-Francisco-Sheriffs-Department-sjcso.local</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17220</link>
<guid>e376d5d818f7665946b0a88c7632e311</guid>
<pubDate>Mon, 02 Sep 2024 12:39:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>San-Francisco-Sheriffs-Department-sjcso.local</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d4347b50c06dd4bb64056cd0ba405dc8dc7a47c10649a8a4252b211739378927</i><br /><br />Threat actor <b>description</b>: <i>Dai controlli effettuati, questa rivendicazione potrebbe essere riferita ad altro target: <b>San Jacinto County Texas</b> (co.san-jacinto.tx.us).
<br /><br />
<b>Original scraping:</b><br />
The San Francisco Sheriff's Department serves the people of San Francisco by administering the county jails, providing security.</i><br />Target victim <b>website</b>: <i>sfsheriff.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.electriforce.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17218</link>
<guid>b449151eb61e7fdffc88095f40059ac3</guid>
<pubDate>Mon, 02 Sep 2024 10:47:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.electriforce.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>145d79e07a564f2b654dd26147dffbf478298529e213c16f2112498352a42156</i><br /><br />Threat actor <b>description</b>: <i>Electriforce is a dynamic company specializing in innovative electrical solutions and cutting-edge technology. They offer a wide range of products and services, including electric vehicle charging stations, renewable energy systems, and advanced power management solutions. Committed to sustainability and efficiency, Electriforce aims to revolutionize the way we harness and utilize electrical energy, providing reliable and eco-friendly options for both residential and commercial clients.</i><br />Target victim <b>website</b>: <i>www.electriforce.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southwest-Traders</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17213</link>
<guid>f0ba46d49fb8aaa73c357600ce574db8</guid>
<pubDate>Sat, 31 Aug 2024 20:20:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Southwest-Traders</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd80b9ea29b966ada0051d5fd2413796348618970bf2b2206015f049c87ee796</i><br /><br />Threat actor <b>description</b>: <i>Download link >></i><br />Target victim <b>website</b>: <i>www.southwesttraders.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nevada-Heart-Vascular-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17212</link>
<guid>a596c69468e85ae53014c825e9079543</guid>
<pubDate>Sat, 31 Aug 2024 20:17:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Nevada-Heart-Vascular-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42c5ae61ac9b370e2eaa0780bcfcb78f163087e8e8b926db0a80c526a9a126b4</i><br /><br />Threat actor <b>description</b>: <i>Download link >></i><br />Target victim <b>website</b>: <i>www.nevadaheart.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Donco-and-Sons-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17202</link>
<guid>37ed3938f2f5b399dfd0b62606f39d9b</guid>
<pubDate>Sat, 31 Aug 2024 20:16:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Donco-and-Sons-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8c207ccfe6784f370953a44e622cd198835440ac4c4e9a9cbbf26f5eb3ffd653</i><br /><br />Threat actor <b>description</b>: <i>Donco and Sons Inc. is a family-owned business specializing in high-quality, sustainable agricultural products. With a commitment to environmentally friendly practices, the company offers a range of goods including fresh produce, grains, and other farm-derived items. Known for its dedication to quality and customer service, Donco and Sons Inc. has built a reputation for reliability and community involvement.</i><br />Target victim <b>website</b>: <i>donco.com</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>MorningStar-Senior-Living</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17211</link>
<guid>cd6bc4ee9cef2af8e1c22cc80ca1f8c1</guid>
<pubDate>Sat, 31 Aug 2024 20:14:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>MorningStar-Senior-Living</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d54d14180b93fb04a06fddfc57b03ffcb4636e03ba77f47b75951bf10f40a979</i><br /><br />Threat actor <b>description</b>: <i>MorningStar Senior Living is a company dedicated to providing quality senior living options, including independent living, assisted living, and memory care. With a focus on creating vibrant and caring communities, MorningStar emphasizes a resident-centered approach that caters to the well-being, comfort, and enrichment of seniors. Their facilities often feature modern amenities, engaging activities, and professional staff.</i><br />Target victim <b>website</b>: <i>www.morningstarseniorliving.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Goodless-Dermatology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17210</link>
<guid>a5ccbf4f58f04a814f80a12e703d7c34</guid>
<pubDate>Sat, 31 Aug 2024 20:11:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Goodless-Dermatology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4922be780ae785750ba1bad80cad1000c6efc595bd92e947b7bdbece3c580e3d</i><br /><br />Threat actor <b>description</b>: <i>Download link >></i><br />Target victim <b>website</b>: <i>www.goodlessdermatology.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Effortless-Office</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17209</link>
<guid>42b58d52344b20312a876e0bfbe95abb</guid>
<pubDate>Sat, 31 Aug 2024 20:08:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Effortless-Office</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>110de64f7977e582c18fd3721ded78df7593cbcc4e571af597291b5335877949</i><br /><br />Threat actor <b>description</b>: <i>We want this post to resonate.</i><br />Target victim <b>website</b>: <i>effortlessoffice.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bogdan--Frasco-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17197</link>
<guid>9fc14d103064494b6a2be4dbd1dcdf32</guid>
<pubDate>Sat, 31 Aug 2024 13:09:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Bogdan--Frasco-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbaf69bf5f376035eb783e72f4d74d950602fab9295c2dcb656abfac23f26f73</i><br /><br />Threat actor <b>description</b>: <i>Welcome and thank you for visiting Bogdan & Frasco, LLP.  We offer a wide range of tax and accounting services focusing on small and medium-sized business clients and individual clients.  We pride ourselves on our reputation for high level of service, keen expertise and being responsive to our clients' inquiries and suggestions.  Please feel free to contact us with any questions or comments you may have. Our office is conveniently located in the heart of San Francisco's financial district, directly above the Montgomery Street BART station.  Bogdan & Frasco, LLP</i><br />Target victim <b>website</b>: <i>www.bfcpas.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>BLVD-Residential-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17198</link>
<guid>2e1e29f5fc4f906c2145acc6840b29ff</guid>
<pubDate>Sat, 31 Aug 2024 13:06:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>BLVD-Residential-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9b8c864e597f5de7035d53151422245f39e8046c78c5fd931d4e9f750745406f</i><br /><br />Threat actor <b>description</b>: <i>BLVD Residential is a full service, owner focused, property and asset management company.  The company was founded in 1965 and is based in Northern California.  Bob Talbott and Scott Mencaccy, BLVD’s CEO and President respectively, have over 60 years of collective experience in management operations on a nationwide basis.  Prior to joining BLVD, Talbott and Mencaccy managed national real estate property management companies with portfolios that exceeded 45,000 units and established themselves as leaders in the multifamily industry.  Talbott and Mencaccy have worked for several of the largest owners and operators of real estate in the country.  During their careers, they have accumulated significant experience managing multifamily housing within all facets of the industry including small and large properties and portfolios, institutional and privately held assets, affordable housing, new development lease ups and redevelopment.</i><br />Target victim <b>website</b>: <i>www.blvdresidential.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>John-W.-Brooker--Co.-CPAs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17199</link>
<guid>f7c0dc716cd86f8d162c366d370baf14</guid>
<pubDate>Sat, 31 Aug 2024 13:03:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>John-W.-Brooker--Co.-CPAs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c707a21e0b42824f38961a9b59db5b5727d23042612db2c432998872bdea2338</i><br /><br />Threat actor <b>description</b>: <i>Financial success is best achieved when the financial advisors know your business, your goals, and you personally.  Planning with a team is much more coordinated than planning by a list of contacts.     For 42 years, John W. Brooker & Co., CPAs has been providing integrated services to medical and dental professionals, as well as other service professionals.  We like to say we are a one-stop shopping for financial statements, tax planning, business consulting, financial planning, wealth management, and pension design and administration.  Our clients love the efficiency and personal attention that comes from having their advisors knowledgeable about their profession and financial goals.</i><br />Target victim <b>website</b>: <i>www.brooker-cpa.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>Khoo-and-Company-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17200</link>
<guid>6222d5fd70abd4fe144a1df81fc2ea98</guid>
<pubDate>Sat, 31 Aug 2024 13:00:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Khoo-and-Company-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1af469fa389a7a33b4d51517b508519575e826a5daa3e2c5d8083ae956e3b60a</i><br /><br />Threat actor <b>description</b>: <i>We are a small but qualified and experienced team of professionals that work very closely together to ensure a focused, efficient, and personal approach to delivering our services. Our team members are qualified and trained both internally and externally in domestic and international taxation planning and compliance. Each holds an accounting degree, a CPA certification or is a candidate, and some have obtained or are pursuing a Master’s degree in Taxation.  Our Principal Eng Kuan Khoo, CPA</i><br />Target victim <b>website</b>: <i>www.khoocpa.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-River-Electrical-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17196</link>
<guid>b40a13d4ebea2ec3499f265928cac1d8</guid>
<pubDate>Sat, 31 Aug 2024 11:31:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>New-River-Electrical-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>371ee3f3887b9e9275a1ef3562da8da14c79c7a7db5c0c58dc7b3aa0a11febdb</i><br /><br />Threat actor <b>description</b>: <i>... Tags: #New River Electrical Corporation #Virginia #United States</i><br />Target victim <b>website</b>: <i>newriverelectrical.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Recycler-Core-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17195</link>
<guid>00b4cca849ad2b96d2b193f453785a13</guid>
<pubDate>Sat, 31 Aug 2024 10:00:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>The-Recycler-Core-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>90599da84b549fc9f58f9a70503d6eacf6c1571b271e230641a42334d6679a52</i><br /><br />Threat actor <b>description</b>: <i>... Tags: #The Recycler Core Company #Kansas #United States</i><br />Target victim <b>website</b>: <i>rccauto.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tranter-tcn.local</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17193</link>
<guid>8a618b8f8f01a09230853dbe6f581c27</guid>
<pubDate>Sat, 31 Aug 2024 05:15:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Tranter-tcn.local</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48706457723396db80b7b2cf4f4bf962c2a3b8c0f7f33533fac03003a6c9b815</i><br /><br />Threat actor <b>description</b>: <i>Tranter is a global engineering and manufacturing group specializing in thermal ...</i><br />Target victim <b>website</b>: <i>tranter.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sports--Spine-Orthopaedics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17194</link>
<guid>2f42c6c0cbd43d2eeb657069071b2f9b</guid>
<pubDate>Sat, 31 Aug 2024 04:37:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Sports--Spine-Orthopaedics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42a78b7631dc0d756f05307589aa807c0b2dbeb8698582d356e8e04a38353c3d</i><br /><br />Threat actor <b>description</b>: <i>Sports & Spine Orthopaedics</i><br />Target victim <b>website</b>: <i>sportsandspineortho.com</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Phyton-Biotech</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17192</link>
<guid>aff272815fa63358420d88a9c6d37b91</guid>
<pubDate>Fri, 30 Aug 2024 22:37:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Phyton-Biotech</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f38ca155410d28a7450ff31712ea921392ba7dae7d2b152be70c9a6d5398a78</i><br /><br />Threat actor <b>description</b>: <i>Business Services</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>pfsbrands.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17181</link>
<guid>d034a7eda6e49ec2b22c5eee94b053c7</guid>
<pubDate>Fri, 30 Aug 2024 20:05:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>pfsbrands.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f7e4eb66ae139b6c9531e30affe4bba00fe4878f9b83026602e073676de374f</i><br /><br />Threat actor <b>description</b>: <i>PFSbrands ® is an employee-owned company that provides three successful hot food brands primarily to the c-store and supermarket industries</i><br />Target victim <b>website</b>: <i>pfsbrands.com</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eric-Rossi-CPA-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17165</link>
<guid>4de682d9e24cb3cccc7fa371dd842051</guid>
<pubDate>Fri, 30 Aug 2024 18:57:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Eric-Rossi-CPA-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c15c5abc3494304bde8d668ecba68ca8f58977882ca71cf4016e15621e814a88</i><br /><br />Threat actor <b>description</b>: <i>Eric Rossi CPA LLC is a full-service Accounting firm licensed in PA. ERCPA offers a broad range of services for business owners, executives, and independent professionals.</i><br />Target victim <b>website</b>: <i>ericrossicpa.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.fenceauthority.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17177</link>
<guid>7d78ce41a918d71886c6124f0013c92e</guid>
<pubDate>Fri, 30 Aug 2024 16:56:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.fenceauthority.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8534f5e5036bc3fa2848fbca92a44e0a407637d6e339122d6a7fe9df51a4f763</i><br /><br />Threat actor <b>description</b>: <i>The Fence Authority is a company specializing in providing a wide range of fencing solutions, including wood, vinyl, aluminum, and chain-link fences. They offer both residential and commercial services, including installation, DIY fencing products, and custom design options. Known for quality craftsmanship and customer service, the company aims to enhance property security and aesthetics.</i><br />Target victim <b>website</b>: <i>www.fenceauthority.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lane-Supply-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17158</link>
<guid>794a51bb65913debd98f73111705738a</guid>
<pubDate>Fri, 30 Aug 2024 16:50:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Lane-Supply-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0d613d8a6aa83d97953b3f96297477688aafdbb4262f27b5c4933d3b9e5cb13d</i><br /><br />Threat actor <b>description</b>: <i>Lane Supply, Inc. is a national manufacturer, supplier and installer of canopies and related components.</i><br />Target victim <b>website</b>: <i>lanesupplyinc.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Riverside-Resort-Hotel-and-Casino</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17157</link>
<guid>c9fa5a72863b86fe0c7dc5902e21fb17</guid>
<pubDate>Fri, 30 Aug 2024 16:15:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Riverside-Resort-Hotel-and-Casino</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c9c63124757051f34a2b90674bf4784275bbfbb7318bd52bc7f52dfa5bb7c620</i><br /><br />Threat actor <b>description</b>: <i>Riverside Resort Hotel and Casino, founded in 1966 and headquartered in Laughlin...</i><br />Target victim <b>website</b>: <i>riversideresort.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.swinburne.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17169</link>
<guid>d7cbbc7d02fca8a32ac5a3b5161ee19c</guid>
<pubDate>Fri, 30 Aug 2024 15:18:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.swinburne.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4af6932df7f26007ff935f7a212e0e1fe53083cff919e865e3a143827485e52</i><br /><br />Threat actor <b>description</b>: <i>Swinburne University of Technology, located in Australia, is a prestigious institution renowned for its strong emphasis on technology, innovation, and industry engagement. Offering a wide range of undergraduate, postgraduate, and vocational programs, Swinburne excels in research and provides students with practical, real-world experience to prepare them for successful careers.</i><br />Target victim <b>website</b>: <i>www.swinburne.edu</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wayne-Wright-LLP.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17171</link>
<guid>ffb04b3fde58882155c0f560b7e20bea</guid>
<pubDate>Fri, 30 Aug 2024 15:10:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Wayne-Wright-LLP.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>729be78f4f7dcd8be0e1a52275ddfab5d97672d3959fd2ba8b7d43b0c273f54a</i><br /><br />Threat actor <b>description</b>: <i>Wayne Wright Injury Lawyers is a legal services company based out of 1001 Comanche St, Corpus Christi, Texas, United States.</i><br />Target victim <b>website</b>: <i>waynewright.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stein-Fibers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17156</link>
<guid>047120fa7417b3d37a0573e8a24c9e43</guid>
<pubDate>Fri, 30 Aug 2024 14:47:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Stein-Fibers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bdd3a4963cdc9d4c6770d261f7f6dfdd0bbb74432c89f74c8086aaf87e23fbf4</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1976, Stein Fibers, Ltd. is a supplier and producer of polyester fiberfill and nonwoven fibers in North America.</i><br />Target victim <b>website</b>: <i>steinfibers.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>fanningfanning.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17163</link>
<guid>21d08aefdb2764142f6c510fd3982b43</guid>
<pubDate>Fri, 30 Aug 2024 14:20:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>fanningfanning.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aeef80c6cec4e4a99b57c2aecb723b524337f58616382f1236a08611af46beb7</i><br /><br />Threat actor <b>description</b>: <i>Engineering services for Mechanical, Electrical, Plumbing design and plant layout, HVAC, lighting, power, energy conservation and management, utilities</i><br />Target victim <b>website</b>: <i>fanningfanning.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Navitas-Semiconductor</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17155</link>
<guid>2572bd363583b4c28b31fcbb15df5837</guid>
<pubDate>Fri, 30 Aug 2024 13:02:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Navitas-Semiconductor</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7d5a104e00c300349723d81f1dafc0e3851b182b6cd01526c1992533aa893ce</i><br /><br />Threat actor <b>description</b>: <i>Country : Ireland - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>www.navitassemi.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>albanybank.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17146</link>
<guid>8982bdc05395c01f87199588e06ef71f</guid>
<pubDate>Fri, 30 Aug 2024 07:28:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>albanybank.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba54ae7cd81d49fd89441ee24369efb7a5167fae1c1c3d2e5805f6d38d05691e</i><br /><br />Threat actor <b>description</b>: <i>Personal Banking Business Internet Banking Promo Business Internet Banking Managing your business finances is easier than ever!</i><br />Target victim <b>website</b>: <i>albanybank.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>hphood.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17148</link>
<guid>a9a7ab1b714b04eff25ce5e783135902</guid>
<pubDate>Fri, 30 Aug 2024 07:28:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hphood.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>400da93dc967276c810c316e8c3aed9f23d69c198300b028f6a76939ac5fd68b</i><br /><br />Threat actor <b>description</b>: <i>Products: Milk, Ice Cream, Cottage Cheese, Sour Cream, Cream Eggnog, Recipes, Store Locator, Girl drinking Hood Milk, Girl drinking Hood milk.</i><br />Target victim <b>website</b>: <i>hphood.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hollywood-Burbank-Airport</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17142</link>
<guid>87effb6f33e6ac45a1e8b7a834578ac6</guid>
<pubDate>Thu, 29 Aug 2024 22:37:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Hollywood-Burbank-Airport</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a96d5539ea4cdee9cba8e527b69c502807d7abc185c558f85b19369c184c11b</i><br /><br />Threat actor <b>description</b>: <i>Hollywood Burbank Airport (BUR) is owned and operated by the Burbank-Glendale-Pasadena Airport Authority, a joint powers agency created in 1977</i><br />Target victim <b>website</b>: <i>www.hollywoodburbankairport.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Risser-Oil</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17138</link>
<guid>58845926c9bda650c3a9cb7ff6e64c91</guid>
<pubDate>Thu, 29 Aug 2024 21:20:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Risser-Oil</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>989c45618e7d12f1da271f30df2fd620875346a90bbd6091beae08165cf3afd4</i><br /><br />Threat actor <b>description</b>: <i>P. N. Risser, Jr. became a distributor of petroleum products in parts of Pennsylvania, Maryland and West Virginia in the 1930’s.  Mr. Risser and his family soon joined his parents as winter visitors in St. Petersburg each winter.   One wint            ...</i><br />Target victim <b>website</b>: <i>risseroil.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>glasstile.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17140</link>
<guid>283aa4a76808d58cfa74922e2fe228b7</guid>
<pubDate>Thu, 29 Aug 2024 19:45:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>glasstile.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06c8d8295ae92c462ca855b744abf0629640418b2d920bd82b3d257fec41083a</i><br /><br />Threat actor <b>description</b>: <i>Glasstile.com specializes in high-quality glass tile products for a variety of applications such as kitchen backsplashes, bathroom walls, and swimming pools. They offer a diverse range of colors, finishes, and designs to suit different aesthetic preferences. Known for their durability and elegance, these tiles can transform any space with a modern, sophisticated look.</i><br />Target victim <b>website</b>: <i>glasstile.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Corbally-Gartland-and-Rappleyea</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17139</link>
<guid>586406bbb76b6baac45c43a81ec2e35c</guid>
<pubDate>Thu, 29 Aug 2024 18:12:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Corbally-Gartland-and-Rappleyea</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>302e03dcaa2fc11a3e79e647af7f1450b7c6e1eb8bd62a90a6dd9ec27e5bfe17</i><br /><br />Threat actor <b>description</b>: <i>Corbally Gartland and Rappleyea Corbally, Gartland and Rappleyea, LLP is a full-service law firm based in Pleasant Valley and Millbrook, New York. We provide aggressive, ethical, cost-effective legal counsel and advocacy to people and businesses.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stiller-Aesthetics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17136</link>
<guid>9bbebcea7798629dd977598d42980e84</guid>
<pubDate>Thu, 29 Aug 2024 17:21:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Stiller-Aesthetics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2fc7cebc571eaa7ac7021983970afc8240b48f73722f280ee6d29f9049a1b637</i><br /><br />Threat actor <b>description</b>: <i>Stiller Aesthetics offers a serene atmosphere with total privacy to ensure that our patients feel comfortable and relaxed.Stiller Aesthetics has been a part of the Spokane community for the last 3 years. At Stiller Aesthetics, our goal is to             ...</i><br />Target victim <b>website</b>: <i>www.stilleraesthetics.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>malonetoyota.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17137</link>
<guid>314e9197a43a6d40cef6f1629e2c3721</guid>
<pubDate>Thu, 29 Aug 2024 13:36:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>malonetoyota.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb8c1f13ae78cf945c378128e6680b1e0f96703f9ec3376e253e54f1466bb5ca</i><br /><br />Threat actor <b>description</b>: <i>Malone Toyota is a car dealership specializing in the sale of new and pre-owned Toyota vehicles. The company offers a wide range of models, including sedans, SUVs, trucks, and hybrids. In addition to vehicle sales, Malone Toyota provides financing options, maintenance and repair services, and a parts department. The dealership is dedicated to customer satisfaction and aims to deliver a seamless car-buying and ownership experience.</i><br />Target victim <b>website</b>: <i>malonetoyota.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gortemoller-Engineering-gorteng.local</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17135</link>
<guid>ac863dac85e27c93e8fba1bc0ab49276</guid>
<pubDate>Thu, 29 Aug 2024 12:15:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Gortemoller-Engineering-gorteng.local</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ebf9d7aee083c0f31cc7217bbdad1998cfcecece1fdc95bf09dc8975d56cdf05</i><br /><br />Threat actor <b>description</b>: <i>Gortemoller Engineering, Inc. has been providing civil engineering and land deve...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bayou-DeSiard-Country-Club---Monroe-LA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17133</link>
<guid>eaaab05200f0645e4451f748dc85ef7a</guid>
<pubDate>Thu, 29 Aug 2024 03:15:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Bayou-DeSiard-Country-Club---Monroe-LA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c9088e6a8cc26844f69cad89d8d33141a9a6f1ff729a62c96a9ccfcded9ed59</i><br /><br />Threat actor <b>description</b>: <i>We are located along the beautiful Bayou DeSiard in Monroe, Louisiana. Bayou DeSiard Country Club has provided its members with the amenities expected of the most prestigious private country club In Northeast Louisiana since 1948.</i><br />Target victim <b>website</b>: <i>bayoudesiardcc.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>rainierarms.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17123</link>
<guid>56457b43d703d1633b36fec9a01ea51e</guid>
<pubDate>Thu, 29 Aug 2024 01:44:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>rainierarms.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d92b80943210c1fbc4cdc6db48c2e3d581be6ca7415adf4def6ee5ef5386094f</i><br /><br />Threat actor <b>description</b>: <i>Rainier Arms is a prominent retailer specializing in high-quality firearms, parts, and accessories. Catering to shooting enthusiasts, law enforcement, and military personnel, the company offers a wide range of products including rifles, pistols, optics, and tactical gear. Known for their exceptional customer service and expert knowledge, Rainier Arms is a trusted name in the firearms industry.</i><br />Target victim <b>website</b>: <i>rainierarms.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Epi-Breads</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17130</link>
<guid>619a4295019b49d146b57c00594e827b</guid>
<pubDate>Thu, 29 Aug 2024 01:40:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Epi-Breads</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2c046a1d003d71dff910c73732fd38bfd49b621e8061ed6cfbb1c48528dbd05</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.epibreads.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Software-Engineering-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17129</link>
<guid>ef7141e5a52641b0941128fcbbde8a27</guid>
<pubDate>Thu, 29 Aug 2024 01:37:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Software-Engineering-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>32b037539c4d70d3dadae2eb206003b76555010e7eec0d837e825543525a9f6f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.seadeo.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>GDB-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17128</link>
<guid>03e2e05daeebab05db85d5aa0a199255</guid>
<pubDate>Thu, 29 Aug 2024 01:34:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>GDB-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19ec9c0641403aca54a6ef073738d5bd4f6317b275644df80eeec639ab75376a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.gdbinternational.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>ABC-Parts-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17127</link>
<guid>369b35ac15709446de9ac5eac1ce9d9c</guid>
<pubDate>Thu, 29 Aug 2024 01:31:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>ABC-Parts-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4403a3a24b4fa8e473b722dc3706f7ea625136b0ce7da7d28d8e01b1cb558120</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.abcparts.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Universal-Pure</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17126</link>
<guid>788c01c6dd0e1aa7704002267d68ea90</guid>
<pubDate>Thu, 29 Aug 2024 01:29:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Universal-Pure</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f0b646e0006256312ff7567eb15d559b4796c3247614425b64b4270746ef13be</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.universalpure.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Omicron-Granite--Tile</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17125</link>
<guid>a4ad68f61b704a2073c3952bc5ceb1c8</guid>
<pubDate>Thu, 29 Aug 2024 01:26:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Omicron-Granite--Tile</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>328b7cfedb1b663e91f358f4d5e1085ca5dcd31c21e6bb56052a25cde9e4cdd8</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.omicrongranite.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>tjs.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17122</link>
<guid>631e5d78c846ec09125ebe7e7030b0ca</guid>
<pubDate>Wed, 28 Aug 2024 21:20:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>tjs.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd2caf54ea10d01b834164db845735fb52437a3fcd76d2cc5ae217f40d890004</i><br /><br />Threat actor <b>description</b>: <i>ZeroShrink  by TJS delivers an innovative and comprehensive RFID package combined with a robust cloud-based POS system tailored specifically for the diamond and jewelry industry. Our mission is to enhance your POS experience with a focus on security, ease of use, and customization.</i><br />Target victim <b>website</b>: <i>tjs.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Atwood--Cherny-P.C.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17118</link>
<guid>c8983c1f5369930e88b760c5fd493336</guid>
<pubDate>Wed, 28 Aug 2024 18:28:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Atwood--Cherny-P.C.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>31730188298442aafbd4fc08257f22099d5bf243bf186675ba480187c5298584</i><br /><br />Threat actor <b>description</b>: <i>Atwood & Cherny, P.C. has received national recognition as one of the leading family law firms in the country.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fish-Nelson--Holden</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17117</link>
<guid>9bc09ac880e071ceb1d63cdafdce6e84</guid>
<pubDate>Wed, 28 Aug 2024 18:27:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Fish-Nelson--Holden</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5658c384b158fba06ff15584d7a0742e7db3ed12c743cb1744e949342bc76d70</i><br /><br />Threat actor <b>description</b>: <i>Fish Nelson & Holden, LLC concentrates its practice in the area of insurance defense litigation. The firm defends premises liability, products liability, personal injury, property loss, workers compensation, employment law and other tort actions for insurance carriers and self insured employers.</i><br />Target victim <b>website</b>: <i>fishnelson.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>JM-Thompson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17111</link>
<guid>39ba1389e2930ff24e3101741c9009ea</guid>
<pubDate>Wed, 28 Aug 2024 16:15:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>JM-Thompson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6761bc431250771c0d4a7effded6b6738b2f6b09d76d8241965620bdf6090a20</i><br /><br />Threat actor <b>description</b>: <i>JMT is owned and operated by John, Dickie, and Marty Thompson, brothers who represent the third generation of a family business. JMT offers a full range of pre-construction, design-build, general contracting, and construction management serv            ...</i><br />Target victim <b>website</b>: <i>jmthompson.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Scott-Pharma-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17109</link>
<guid>39a1c9d01239a5ec30b5e7d8a4bbd627</guid>
<pubDate>Wed, 28 Aug 2024 14:49:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Scott-Pharma-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0099ad83af9c330a87de37ee0d5ae5a6128db1ba41f30a6e06400458722d9547</i><br /><br />Threat actor <b>description</b>: <i>Provider of integrated feed, bedding & enrichment program development services. The company's integrated feed, bedding & enrichment program development services provides animals with the best possible care and maximizes their health and well-being.</i><br />Target victim <b>website</b>: <i>scottpharma.net</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>freshairefranchise.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17113</link>
<guid>adeb5653cc2294473e88c23d6bfc4be3</guid>
<pubDate>Wed, 28 Aug 2024 14:45:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>darkvault</b> claims attack for <b>freshairefranchise.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d1259e3f9f3e8f58a6cb179cc386f6f0f4f482263e27ac53db0fed992a501a3f</i><br /><br />Threat actor <b>description</b>: <i>Fresh Aire has been fragrancing and deodorizing offices since 1995! Our deodorizers and fragrances are specially formulated to quietly and continuously evaporate into the air. These environmentally friendly fragrances contain odor neutralizers and odor counteractants. We have a variety of fragrances from strong to mild, and our owners and service technicians use both art and science to control the evaporation rate. This technique allows us to fragrance any area from the size of the typical office or lobby to a large or small restroom for about the cost of a lunch every four weeks!</i><br />Target victim <b>website</b>: <i>freshairefranchise.com</i>]]></description>
<category>darkvault</category>
</item>
<item xmlns:dc='ns:1'>
<title>mykukun.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17110</link>
<guid>170821fbe11a68684fba8a7ef705d2e9</guid>
<pubDate>Wed, 28 Aug 2024 12:46:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>mykukun.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bba9879dc98d2938f8f01c96f41db110729a112f72321398530f365359d276b4</i><br /><br />Threat actor <b>description</b>: <i>Kukun helps homeowners buy better and renovate smarter. It offers a suite of data-driven home investment insight products tailored for homeowners, investors, realtors, and professionals</i><br />Target victim <b>website</b>: <i>mykukun.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rinehart-Butler-Hodge-Moss--Bryant</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17101</link>
<guid>dfff88bd8e1ea034d76f39a71fb4ed4d</guid>
<pubDate>Wed, 28 Aug 2024 08:53:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Rinehart-Butler-Hodge-Moss--Bryant</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b7fe050b0795088b37d352ea3e2377eafccffa47115169837c0012fb2e1b4985</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>www.staffordlawyers.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>codacinc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17099</link>
<guid>ff6de5ac77370be900c32c9647f0365a</guid>
<pubDate>Tue, 27 Aug 2024 21:15:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>codacinc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38471cc13e66b6a9e7a6b341c5a2810899737370ab1ce5e31122178204ab40b1</i><br /><br />Threat actor <b>description</b>: <i>CODAC, a non-profit organization based in Cranston, Rhode Island, has provided treatment, recovery and prevention services to individuals and families within local communities for more than 50 years. With seven locations across the state, and            ...</i><br />Target victim <b>website</b>: <i>www.codacinc.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Academy-of-Model-Aeronautics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17094</link>
<guid>08ed87bd895f5562aacffd47d4c086eb</guid>
<pubDate>Tue, 27 Aug 2024 13:44:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Academy-of-Model-Aeronautics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5d3bf1da2e41350e1d8eeb9ef5050df5f96c2df5f77de8e65d18c86439223e5</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1936, the Academy of Model Aeronautics (AMA)</i><br />Target victim <b>website</b>: <i>modelaircraft.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mason-City-Recycling-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17089</link>
<guid>d7e81e78801865d4e4c1be615e762ba4</guid>
<pubDate>Tue, 27 Aug 2024 11:16:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Mason-City-Recycling-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8cdfe5a49a8ea99b80aa76c7629823c23244102b0a091cf0ebffac2c81ae8bdc</i><br /><br />Threat actor <b>description</b>: <i>Mason City Recycling Center has been manufacturing low dust Comfort Zone Cellulose since 1979.

Family owned and operated.

As our business grew, we relocated to our 50,000 square feet., 15 acre facility where we also operate our MRF (mat            ...</i><br />Target victim <b>website</b>: <i>www.mcrecycling.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crowe</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17085</link>
<guid>9a1d39510aeba78469e4c2c1fbceb8dd</guid>
<pubDate>Tue, 27 Aug 2024 10:45:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Crowe</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>201060a18181fe042e6d65bd94b1021f420001e7ccdf69953fa35f4a32cbd5f7</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>www.crowe.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>securityinstrument.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17090</link>
<guid>e5e57a5ec3e01cca309a344d26207649</guid>
<pubDate>Tue, 27 Aug 2024 10:10:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>securityinstrument.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9be6687647f962b77e1fd391614bd98e1cf37233cfa7b74aae1aa766b1b10ab4</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/SIWILM/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/SIWILM/PROOF/DATA DESCRIPTIONS: Corporate confidential data, Personal identifiable information, contracts, employees and executives personal files, financial documents, corporate correspondence, database exports\backups etc.</i><br />Target victim <b>website</b>: <i>securityinstrument.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Precom</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17082</link>
<guid>73d9af291fe22cb9f226bbd9a6df781b</guid>
<pubDate>Tue, 27 Aug 2024 01:39:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Precom</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc4078fbd74a989c49a7615092f148a2afffefe1d6b54023e149da5b51fe7a77</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.precom-inc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Microchip-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17081</link>
<guid>35386b93dbcec730f8740ce4b6885216</guid>
<pubDate>Mon, 26 Aug 2024 22:45:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Microchip-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>59fe0b8518fb3de461123fa5a8f873d8905cc691eec00938ed89119d7ce3796b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.microchip.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vans-Lumber-and-Custom-Builders</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17074</link>
<guid>4fe560444cca7edf1c75e4fa492ff7d2</guid>
<pubDate>Mon, 26 Aug 2024 18:15:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Vans-Lumber-and-Custom-Builders</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7e297bec12ae7813627f83a3a5d68d1f0ec4e61f5ef399819791207b224ad55d</i><br /><br />Threat actor <b>description</b>: <i>Vans Lumber and Custom Builders is a family-owned business specializing in high-quality lumber supply and custom home construction. With decades of experience, they offer personalized services, from architectural design to project completion. Known for their craftsmanship and attention to detail, Vans Lumber caters to both residential and commercial clients, ensuring durable and aesthetically pleasing results.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Optimize-EGS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17075</link>
<guid>6018b060f25866be75165c45a66ae3c6</guid>
<pubDate>Mon, 26 Aug 2024 18:15:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Optimize-EGS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3917c328373b9e0f075e05f1e8cd78b417717ee7483269925cfd0359646a084c</i><br /><br />Threat actor <b>description</b>: <i>Optimize EGS is a forward-thinking company specializing in Environmental, Social, and Governance (ESG) consulting. They offer tailored strategies to help organizations enhance sustainability, ensure regulatory compliance, and foster social responsibility. By integrating advanced analytics and industry expertise, Optimize EGS empowers businesses to achieve long-term, sustainable growth while meeting stakeholder expectations.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Complete-Payroll-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17076</link>
<guid>eadc317f2764a00bec1b729a56321cd3</guid>
<pubDate>Mon, 26 Aug 2024 18:15:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Complete-Payroll-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7ad2a64841a559438550d9163aa9d7f0e26fe4554054e23e5b160116b8b2001c</i><br /><br />Threat actor <b>description</b>: <i>Complete Payroll Solutions is a comprehensive human resource and payroll service provider. They offer payroll processing, benefits administration, HR management, compliance, and time and attendance solutions. Known for their personalized service and advanced technology, they cater to businesses of all sizes, ensuring streamlined operations and regulatory compliance.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.alabamaplate.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17073</link>
<guid>c1efb218329e5aba0896676f9f3b994f</guid>
<pubDate>Mon, 26 Aug 2024 16:33:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.alabamaplate.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3d5717b0038db15a6492d42241b757cc8d1c7ce5cdcf807052d090f2662e413</i><br /><br />Threat actor <b>description</b>: <i>www.alabamaplate.com is a company that specializes in personalized license plates and signage. They offer a wide range of custom designs for various applications, including vehicles, homes, and businesses. The company prides itself on high-quality materials and craftsmanship, ensuring durable and visually appealing products. Their services cater to both individual and commercial needs.</i><br />Target victim <b>website</b>: <i>www.alabamaplate.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.smarterp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17078</link>
<guid>9b3bb5b0a98eab0be3348611b699e3a7</guid>
<pubDate>Mon, 26 Aug 2024 16:30:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.smarterp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>806954f18a053e4cb2c3a32c934c7963dc2b91562dc88570d495df9de6d433d9</i><br /><br />Threat actor <b>description</b>: <i>SmartERP is a solutions provider specializing in enterprise resource planning (ERP) software. They offer a range of services, including consulting, implementation, and support, aimed at optimizing business processes and improving operational efficiency. Their expertise spans across various industries, helping organizations integrate and automate their workflows to achieve better performance and scalability.</i><br />Target victim <b>website</b>: <i>www.smarterp.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>htsusa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17079</link>
<guid>7e5c6adb4152e8d402e5dba26664fa32</guid>
<pubDate>Mon, 26 Aug 2024 16:27:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>htsusa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a07c9d576edbdcb6a68cfa869e424c97b774cfdd42b9ac853d280af44f4cbc16</i><br /><br />Threat actor <b>description</b>: <i>HTS USA, also known as High Tech Solutions, is a company specializing in providing advanced technological solutions and services. They focus on delivering innovative products in areas such as automation, software development, and IT consulting. HTS USA aims to enhance operational efficiency and productivity for businesses across various industries through cutting-edge technology and expert support.</i><br />Target victim <b>website</b>: <i>htsusa.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brookshire-Dental---Hospitals--Clinics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17063</link>
<guid>86ebc213e0f98319c2b45c900031c7c7</guid>
<pubDate>Mon, 26 Aug 2024 15:25:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Brookshire-Dental---Hospitals--Clinics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c03bba035acc5b90ebf9089919bc8c66e7d3eac95029b6950de02a6d488cd63c</i><br /><br />Threat actor <b>description</b>: <i>Dr. Frieda V. Brookshire has been providing dental care in Tustin for over 22 years and practices compassionate, gentle dentistry. She also employs cutting-edge dental technology to ensure precision and comfort while you are in her chair.</i><br />Target victim <b>website</b>: <i>www.brookshiredental.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>US-Marshals-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17060</link>
<guid>9f8f593af6b09a7d68c36ed5a2a56b3e</guid>
<pubDate>Mon, 26 Aug 2024 09:18:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>US-Marshals-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>84a40aa37507abdf01f69b9255d76ea011413b327a2ebe71ce2e687ab1cb7c0d</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>www.usmarshals.gov</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>NewsBank</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17058</link>
<guid>523f43693bfa6c607d2fe43b43ba96fd</guid>
<pubDate>Mon, 26 Aug 2024 08:53:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>NewsBank</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3597a06e878861264d284cd4387cd1cc31fa465409c252f00a5b807294b03b5</i><br /><br />Threat actor <b>description</b>: <i>NewsBank NewsBank, inc. has been a premiere provider of the world's largest repository of reliable information for more than 50 years.</i><br />Target victim <b>website</b>: <i>newsbank.com</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Affordable-Tools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17056</link>
<guid>2f834c6dc78805618e628fa9f02a39e4</guid>
<pubDate>Mon, 26 Aug 2024 01:32:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Affordable-Tools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>69b8342d6f0eb2d106a6d5bab86301e12709aa78688cb5614845b6595514604a</i><br /><br />Threat actor <b>description</b>: <i>Affordable Tools Our mission is to provide a positive buying experience offering low prices, fast shipping, and friendly customer service.</i><br />Target victim <b>website</b>: <i>affordabletool.com</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>autonomous.ai</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17055</link>
<guid>4e9d4f159d588700cf812f18d9920017</guid>
<pubDate>Mon, 26 Aug 2024 01:15:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>autonomous.ai</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>638615a7cc0d373be3b34591999b9e82b41c6b1b053f040b78f119cf1399ea9f</i><br /><br />Threat actor <b>description</b>: <i>Autonomous specializes in ergonomic office furniture and tools aimed at improving productivity and well-being. The company offers a range of products, including smart desks, ergonomic chairs, and accessories, designed for both individuals and organizations.</i><br />Target victim <b>website</b>: <i>autonomous.ai</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Penn-Veterinary-Supply-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17049</link>
<guid>f9c8cde98a8d6dfda2273e26fedaeda8</guid>
<pubDate>Sun, 25 Aug 2024 13:25:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Penn-Veterinary-Supply-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c892a5987718ba877d1865d531227a25d9883d3aa0fb21e3ac6d9753fe071a76</i><br /><br />Threat actor <b>description</b>: <i>Penn Veterinary Supply is a family-owned veterinary supply distributor. Penn Vet offers custom compounded medications through our partnership with Premium Compounding! *Available in Approved States Only.

Company has 48 hours to contact us             ...</i><br />Target victim <b>website</b>: <i>pennvet.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>nwcsb.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17047</link>
<guid>d118d975f3cdf403187a078f3a06f866</guid>
<pubDate>Sat, 24 Aug 2024 21:05:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>nwcsb.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7838e66ea93fd102b51076e66263b2c7b8cad5d67571973d89d7f0fd113d367</i><br /><br />Threat actor <b>description</b>: <i>Northwestern Community Services Board (nwcsb.com) is a mental health organization dedicated to providing comprehensive behavioral health, developmental disability, and substance use services. They serve individuals and families in the northwestern region, aiming to enhance the quality of life through accessible, person-centered care and community-based support programs.</i><br />Target victim <b>website</b>: <i>www.nwcsb.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eagle-Safety-Eyewear</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17045</link>
<guid>8295ef3608eee6550ef7ef27d4000177</guid>
<pubDate>Sat, 24 Aug 2024 17:06:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>Eagle-Safety-Eyewear</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c64fee83cfced9b7c4cd7baabbb8724d2d3f80c3e9b9bc18b7914de587a5708</i><br /><br />Threat actor <b>description</b>: <i>... Tags: #3801 Bishop Lane #Louisville #United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>HBGJEWISHCOMMUN</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17096</link>
<guid>a48e7b44459db0d45821d5bc6dc1c5ce</guid>
<pubDate>Sat, 24 Aug 2024 13:23:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>helldown</b> claims attack for <b>HBGJEWISHCOMMUN</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0dbea3d05a6f4aaac1a16f1963b4ba326019e107f6aa7440a01ae82d3b1061c3</i><br /><br />Threat actor <b>description</b>: <i>www.jewishharrisburg.org</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>helldown</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bay-Sales-cog.local</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17037</link>
<guid>5739286cebed3495484f106535d1932a</guid>
<pubDate>Sat, 24 Aug 2024 12:23:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Bay-Sales-cog.local</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4efc771426aad2ccba1b8390353a41db99ce421ac5f213f2e70d31dc7a37a191</i><br /><br />Threat actor <b>description</b>: <i>Welcome to the Bay Sales team! For over three decades, we've been dedicated to d...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>HL-Lawson--Sons</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17034</link>
<guid>85da0ea73f51b181e3ce81a57d62f5b8</guid>
<pubDate>Sat, 24 Aug 2024 01:12:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>HL-Lawson--Sons</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6082dd8112e40000dd1ae17d6eb726ece2c1d91f43634ed54be8a3a814692425</i><br /><br />Threat actor <b>description</b>: <i>H. L. Lawson & Son, Inc. provides transportation management solutions. In-house logistics for product movement across the country ensures your supply chain is well-managed and secure. Dealing with one solutions provider enables accurate, real time information flows and delivery status. Lawson Logistics, a subsidiary of H. L. Lawson & Son, Inc. operates 34 power units for freight moving out of our distribution centers. Lawson Logistics core business is to provide just-in-time, next-day delivery in the Northeast and Southeast. Our fleet is equipped with satellite tracking capability for up-to-the-minute reporting of delivery status. Our drivers are highly qualified and extensively trained in customer service so your customer has a satisfying delivery experience. Using our well-maintained equipment backed up by a nationwide network of service partners, we can ensure on-time delivery of your freight. If next-day service is not your concern, or if you have existing freight contracts with other carriers, our staff will work with them to ensure your satisfaction. H. L. Lawson & Son, Inc. is situated on interstate highway 81, and is just a short drive to Interstates 64 and 40. Our facilities in Roanoke, Va., are within a days drive of 60 percent of the nation's population.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chama-Gaucha</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17031</link>
<guid>9dfe163fd649f3b985fa8efd30a54391</guid>
<pubDate>Fri, 23 Aug 2024 19:55:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Chama-Gaucha</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a4fdcc98305d0e0f397b834c9570201c81bf7403b82e220733ffd526b5711d85</i><br /><br />Threat actor <b>description</b>: <i>Chama Gaucha quickly gained recognition for its commitment to culinary excellence and impeccable service. The restaurant’s name, “Chama Gaucha,” translates to “Gaucho’s Flame,” representing the fiery passion and expertise that goes into every dish. From the moment guests step through the doors, they are transported to a world of warmth, hospitality, and the unmistakable aroma of mouthwatering grilled meats.  Data will be released soon if the company doesn't contact us!</i><br />Target victim <b>website</b>: <i>www.chamagaucha.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>idahopacific.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17026</link>
<guid>12f6de45d4efe308cfeeca3f1d0bc3af</guid>
<pubDate>Fri, 23 Aug 2024 18:51:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>idahopacific.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>449e3e14eb1079a9258a3bd8400838e5e41061d993bc60d777070cd1ca28c5b2</i><br /><br />Threat actor <b>description</b>: <i>Idaho Pacific is a leading producer of dehydrated potato products for the foodservice, industrial and export channels</i><br />Target victim <b>website</b>: <i>idahopacific.com</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crimson-Interactive</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17021</link>
<guid>3418782f19ba5d9a4e992474eb65d250</guid>
<pubDate>Fri, 23 Aug 2024 10:47:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Crimson-Interactive</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e97422881b8da1cc5de463c490f874fd7e567239304898010bbaa33693c604d6</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>www.crimsoni.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.seaeng.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17022</link>
<guid>15322a5c9ba9bef26eb1388393e25a01</guid>
<pubDate>Fri, 23 Aug 2024 08:44:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dAn0n</b> claims attack for <b>www.seaeng.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b837fa71f89aac67ab9391d5e3e37e82339f499c485817248e3076662d8dc0ce</i><br /><br />Threat actor <b>description</b>: <i>tahly Engineering & Associates, Inc. was established in 1970. The firm is headquartered in Helena, Montana with a branch office in Bozeman, Montana. Employees provide service in the fields of transpor...</i><br />Target victim <b>website</b>: <i>www.seaeng.com</i>]]></description>
<category>dAn0n</category>
</item>
<item xmlns:dc='ns:1'>
<title>Saeilo</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17020</link>
<guid>408ea263486e7815e5e5cce5ee432353</guid>
<pubDate>Fri, 23 Aug 2024 06:49:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>metaencryptor</b> claims attack for <b>Saeilo</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>885abe7341e5dc5ed4166b283337d4d8ad8c69328c42b645b2b6be46a58bc3eb</i><br /><br />Threat actor <b>description</b>: <i>Saeilo is a diversified manufacturing company consisting of three operating divisions.
SMI is a national network specializing in contract precision metalworking and other manufacturing services.
Kahr Arms designs and manufactures quality firearms, primarily for personal protection and law enforcement back-up and off-duty carry.
Revenue $44 M</i><br />Target victim <b>website</b>: <i>saeilo.com</i>]]></description>
<category>metaencryptor</category>
</item>
<item xmlns:dc='ns:1'>
<title>schoolrush.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17018</link>
<guid>d3db718a011f94f39dd49b576d785b08</guid>
<pubDate>Thu, 22 Aug 2024 21:49:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>schoolrush.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>123816a8dfda53245c1dd5a2eaaab5a9bce37d538382a3f401ad685e0250feeb</i><br /><br />Threat actor <b>description</b>: <i>School Rush platform allows schools to publish personalized calendar of events to parents, send classroom pictures and activities to parents instantly, publish staff and student directories, and create notifications.</i><br />Target victim <b>website</b>: <i>schoolrush.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Life-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17017</link>
<guid>a3444e049a3a88560cba360c18001932</guid>
<pubDate>Thu, 22 Aug 2024 21:44:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>metaencryptor</b> claims attack for <b>Life-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>375ee02988fcbb1522c87363b548cf2b98bbed15a74cf829e8ebeef81a55ce69</i><br /><br />Threat actor <b>description</b>: <i>Life University is a private university Leading Chiropractic and Holistic Health University located in Marietta, Georgia, USA.</i><br />Target victim <b>website</b>: <i>life.edu</i>]]></description>
<category>metaencryptor</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.cincinnatipainphysicians.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17011</link>
<guid>25819c8fe224033cc89bafa6a16cdd04</guid>
<pubDate>Thu, 22 Aug 2024 17:11:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>helldown</b> claims attack for <b>www.cincinnatipainphysicians.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>27d62bd86af820d3e32e7a3953c9924cdd9e72c956ac91f09393e7ba44dc4fff</i><br /><br />Threat actor <b>description</b>: <i>www.cincinnatipainphysicians.com</i><br />Target victim <b>website</b>: <i>www.cincinnatipainphysicians.com</i>]]></description>
<category>helldown</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kronick-Moskovitz-Tiedemann--Girard</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17004</link>
<guid>15727725d8796a98b77975b777e43cb9</guid>
<pubDate>Thu, 22 Aug 2024 16:51:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Kronick-Moskovitz-Tiedemann--Girard</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8185f9cf0cac5c00d22fed99f27c022f4fe22ec7fe0cc528990a6fab5536e3cf</i><br /><br />Threat actor <b>description</b>: <i>Kronick Moskovitz Tiedemann & Girard</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>UFCW-Local-135</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17008</link>
<guid>cef347a99ab5be3642ec79a8e2c0bc87</guid>
<pubDate>Thu, 22 Aug 2024 16:09:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>UFCW-Local-135</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d791629667a4e9a28e560399da65cab2dbc34434b23c4dd75728e15076da7a93</i><br /><br />Threat actor <b>description</b>: <i>UFCW International Members of UFCW Local 135 have the backing of more than 1.3 million fellow members of the UFCW International Union across the United States and Canada. Together, we are an effective force for better wages, secure benefits and stronger rights at the workplace.  Data will be released soon if the company doesn't contact us!</i><br />Target victim <b>website</b>: <i>ufcw135.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>EBA-Ernest-Bland-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=17009</link>
<guid>8db1625bead0f643f7f7913edc2a8434</guid>
<pubDate>Thu, 22 Aug 2024 16:05:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>EBA-Ernest-Bland-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>972de8ef089e179ecd36a1e0ac3e4c131f25f1e9dc1bd03316d5a5a6966f1c10</i><br /><br />Threat actor <b>description</b>: <i>EBA Ernest Bland Associates, P.C. is a small business with experience in many areas of the design and construction field.  Data will be released soon if the company doesn't contact us!</i><br />Target victim <b>website</b>: <i>www.ebapc.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>Larc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16999</link>
<guid>1d4bf338b9f623355c3dfc9f20aa2b53</guid>
<pubDate>Thu, 22 Aug 2024 06:04:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Larc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db94640017e88004eba46abb1582d69e1f4bb65e356a6bd5b11d4ae2bd7b380b</i><br /><br />Threat actor <b>description</b>: <i>LARC operates a 16,000 square foot workshop that provides a setting to not only provide training of job skills but also to give the individual an opportunity to feel good about his or her achievement and earn a paycheck. LARC works with companies and subcontracts work such as sorting, collating, packaging, boxing and labeling among others.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stjamesplace.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16995</link>
<guid>5d21263560dafaaf303e72c3ea33208f</guid>
<pubDate>Thu, 22 Aug 2024 05:55:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Stjamesplace.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ad9e2ce3a2dc424fa3cee191291e33d4003b4fc80cb4e9bff4a348aae72e664</i><br /><br />Threat actor <b>description</b>: <i>Country: USA</i><br />Target victim <b>website</b>: <i>Stjamesplace.org</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Policy-Administration-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16990</link>
<guid>4e4869c12089468fa69ceca248253b17</guid>
<pubDate>Wed, 21 Aug 2024 22:47:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Policy-Administration-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>76cb6767abc7b259d31b9a1b6a4565abb745f4b68c44856417057bb522bd3329</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.pasolutions.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grid-Subject-Matter-Experts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16985</link>
<guid>b3ca85cd30bca7607c9520accaa4ffcf</guid>
<pubDate>Wed, 21 Aug 2024 20:53:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Grid-Subject-Matter-Experts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea354b572c1ef9d61bc402d34d7114a555bc5e7508b0db8033ceaefaf2fcb517</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.gridsme.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-SMS-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16993</link>
<guid>c5f31ecf4111f3bbfa2b36f851379d6e</guid>
<pubDate>Wed, 21 Aug 2024 20:52:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>The-SMS-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>505fadfc517b71977a5bbad81a41def948749d11577b28e2cca100d1cded7309</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.thesmsgroup.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>RCG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16991</link>
<guid>84c4f0b0bf96a0cd9082433e88811703</guid>
<pubDate>Wed, 21 Aug 2024 20:40:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>RCG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>409ddd2f3abed8229bfb6ef4984067a4101a3001e272742adbcb0a9fd521ad4d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.rcg-llc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Armour-Coatings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16982</link>
<guid>6f663611ec21e8f820b91da1abf9ad1f</guid>
<pubDate>Wed, 21 Aug 2024 18:52:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Armour-Coatings</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba361d0d0cc3e5be60360d8039bc4c90b4ceccdb280e4d73fd108bd1b4f536ae</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.armourcoatings.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jinny-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16975</link>
<guid>3dd6cfec510eae9cb9951c5099c97701</guid>
<pubDate>Wed, 21 Aug 2024 16:23:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Jinny-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>66b75e20207e2c76152ca9419e4d2e362c62c80578622b05524a850ac5a89293</i><br /><br />Threat actor <b>description</b>: <i>Jinny Corporation is the largest multi-cultural and ethnic beauty supply distributor in the world. Over 400Gb of files will be upl oad to our blog. Detailed personal information about employees, c onfidential files, finance, accounting, lots of NDAs and so much  other information for research. We will make the files available  soon. </i><br />Target victim <b>website</b>: <i>jinny.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>BARRYAVEPLATING</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16984</link>
<guid>d8baddc195497f70ed815daebf4aaac6</guid>
<pubDate>Wed, 21 Aug 2024 16:07:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>helldown</b> claims attack for <b>BARRYAVEPLATING</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>650fd2cd62154cde356db924baec6c074a6ac66db2a274fa7fe1d7b25afecfcf</i><br /><br />Threat actor <b>description</b>: <i>BARRYAVEPLATING</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>helldown</category>
</item>
<item xmlns:dc='ns:1'>
<title>capitalfund1.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16980</link>
<guid>c058d246d9705cc0524d7b25e1e36a6a</guid>
<pubDate>Wed, 21 Aug 2024 15:29:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>capitalfund1.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>95531dbc16d6c64f8cc0e7dcaf86acc7f08804aa6b793d65fdbfb2acabd13470</i><br /><br />Threat actor <b>description</b>: <i>CapitalFund1 is a private money lender specializing in providing quick and flexible financing solutions for real estate investors. They offer various loan products such as fix-and-flip, rental property, and new construction loans. Their streamlined approval process and asset-based lending approach make it easier for clients to secure funding without the bureaucratic hurdles typical of traditional banks.</i><br />Target victim <b>website</b>: <i>capitalfund1.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>spvmhc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16974</link>
<guid>d2674b94792c7f0afc26b56eabc95b30</guid>
<pubDate>Wed, 21 Aug 2024 14:49:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>spvmhc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c41688cb99b11ddf89814d0afb1ba6dc3b5fbc6b362c192943ab87ddb4147dab</i><br /><br />Threat actor <b>description</b>: <i>Scioto Paint Valley Mental Health Center offer a variety of Residential and Outpatient counseling treatment centers in these counties: Ross, Fayette, Highland, Pike, and Pickaway.</i><br />Target victim <b>website</b>: <i>spvmhc.org</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>kidkraft.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16976</link>
<guid>30c58a19dde41f4ecbe4fa148968a31f</guid>
<pubDate>Wed, 21 Aug 2024 13:56:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>kidkraft.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25d5ca1c6c8ff6a7fc2662b02132062a58110e05e861c160e312cac8d8c0edae</i><br /><br />Threat actor <b>description</b>: <i>We aim to inspire imaginative play for children everywhere.
 For over 50 years, ...</i><br />Target victim <b>website</b>: <i>kidkraft.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Burns-Industrial-Equipment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16971</link>
<guid>d9beb34eaa1dba01040150173e461bbb</guid>
<pubDate>Wed, 21 Aug 2024 11:22:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Burns-Industrial-Equipment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fb9525dc844fbc53f24d1f8070e6036815521c4e0deee10bcd06ce70e028b896</i><br /><br />Threat actor <b>description</b>: <i>Burns Industrial Equipment is a leading provider of material handling solutions, offering a wide range of forklifts, industrial vehicles, and warehouse equipment. They specialize in sales, rentals, parts, and service for various brands. With a strong focus on customer satisfaction and tailored solutions, Burns Industrial Equipment supports businesses in optimizing their material handling operations.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Olympus-Financial</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16970</link>
<guid>816308509e3f57309be4d4b2da8d299e</guid>
<pubDate>Wed, 21 Aug 2024 10:53:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Olympus-Financial</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>180ea8abf0acb1096fc73807809a3a14a35963d68596aed4e719ffd9f806911c</i><br /><br />Threat actor <b>description</b>: <i>Olympus Financial Olympus Financial is here to provide a smoother, faster, and more efficient mortgage journey.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>inlighten.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16966</link>
<guid>bb2825b78d37fef9ecabb1b91a8a6b88</guid>
<pubDate>Tue, 20 Aug 2024 22:46:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>inlighten.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>318a249c61d98a1b2bfdca8e53e8b24de769de76493075dbb80e12bf4eb8c363</i><br /><br />Threat actor <b>description</b>: <i>Inlighten.net is a company specializing in digital signage solutions. They provide custom content creation, interactive displays, and network management tools to enhance customer engagement and communication. Their services cater to various industries, including retail, financial services, and healthcare, offering scalable and innovative visual communication systems to meet diverse client needs.</i><br />Target victim <b>website</b>: <i>inlighten.net</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>blowerdempsay.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16965</link>
<guid>4d1d732a3fd7efdacb4b26a0ca945eba</guid>
<pubDate>Tue, 20 Aug 2024 20:56:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>blowerdempsay.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>83e888cb9d83e657cb9da1ca80447b5b4100e79e131b26b635304ea9074038ff</i><br /><br />Threat actor <b>description</b>: <i>Blower Dempsay is a professional services firm specializing in business consulting, strategy development, and operational improvement. They offer tailored solutions to help organizations optimize performance, enhance efficiency, and drive growth. Their expertise spans various industries, providing insights and strategic guidance to achieve sustainable success.</i><br />Target victim <b>website</b>: <i>blowerdempsay.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>North-Georgia-Brick</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16962</link>
<guid>bdee0997d3fb6be8515a432051fe4e5c</guid>
<pubDate>Tue, 20 Aug 2024 12:27:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>North-Georgia-Brick</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da7e8e3e279de2e50b5c2467eaccd0989dc4ae98195f456f9111d64caccaf59f</i><br /><br />Threat actor <b>description</b>: <i>North Georgia Brick offers a diverse selection of bricks, pavers, and stone veneer for residential and commercial projects. 10Gb o f data will be released soon. Employee documents, contracts and a greements, detailed accounting and finance information. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Percento-Technologies-Internationa</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16955</link>
<guid>5b8ac1bf8013b0204a2c0e1988aafe75</guid>
<pubDate>Tue, 20 Aug 2024 06:05:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Percento-Technologies-Internationa</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7ed7c3796e3fbedf40977725749fb320ae1096fab8c6db4b215cda7dd82a8cb5</i><br /><br />Threat actor <b>description</b>: <i>Percento Technologies International ( founded in 1999) is an IT services company. Percento Technologies International corporate office is located in 580 Westlake Park Blvd Ste 110, Houston, Texas, 77079, United States and has 20 employees.</i><br />Target victim <b>website</b>: <i>percento.us</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>osg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16952</link>
<guid>55e0e14567b396c814a22eee053d34cc</guid>
<pubDate>Mon, 19 Aug 2024 22:10:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>osg.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>967991f5fc6cf7fb78d7ae79028154f01a7bd76a3627f7d9161b65a75f7a353c</i><br /><br />Threat actor <b>description</b>: <i>Overseas Shipholding Group (OSG) is a leading provider of energy transportation services, delivering crude oil, petroleum products, and renewable fuels globally. Founded in 1948, OSG operates a fleet of 21 vessels registered in the U.S</i><br />Target victim <b>website</b>: <i>osg.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Waynesboro-Nurseries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16948</link>
<guid>2ce936697d47f1f420dc6eb29b546e1c</guid>
<pubDate>Mon, 19 Aug 2024 18:56:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Waynesboro-Nurseries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>64c5e68fbacd2dde13b29fec29220cd776fc333252cd7f81003eacd8e21ce04e</i><br /><br />Threat actor <b>description</b>: <i>Waynesboro Nurseries Waynesboro Nurseries is a major wholesale supplier for the Eastern United States with customers from Maine to Georgia.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Transit-Authority-of-Northern-Kentucky-TANK</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16946</link>
<guid>1f2013e3dcfa352ca993cc25cc334c10</guid>
<pubDate>Mon, 19 Aug 2024 17:28:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-Transit-Authority-of-Northern-Kentucky-TANK</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b8328818db38965df72529734413eaf6e6cd15430ac9bebdb49a9e08a4edaef</i><br /><br />Threat actor <b>description</b>: <i>The Transit Authority of Northern Kentucky (TANK) is an agency of the Northern Kentucky community, serving Boone, Campbell, and Ke nton counties and downtown Cincinnati. Files of the organization  will be available on our blog soon. Personal information of emplo yees, confidential agreements, contracts, information of incident s a bit of customers data. </i><br />Target victim <b>website</b>: <i>tankbus.org</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Certified-Transmission</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16943</link>
<guid>79e410fb9488b208773459fa9249205f</guid>
<pubDate>Mon, 19 Aug 2024 11:28:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Certified-Transmission</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63b4790dceb6cf19c7deb4e1e606822c36f3d05385b0adcca54ba267b53207d7</i><br /><br />Threat actor <b>description</b>: <i>Certified Transmission is a company specializing in the remanufacturing and repair of automotive transmissions. Founded in 1979, it operates multiple locations across the United States, providing high-quality rebuilt transmissions and comprehensive repair services. Known for their commitment to excellence and customer satisfaction, Certified Transmission serves both individual vehicle owners and automotive professionals.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bandier</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16945</link>
<guid>eab2156d0c600ceb7e814018273aec86</guid>
<pubDate>Mon, 19 Aug 2024 10:38:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Bandier</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4fd5cbb4525cfbe06be125408f29d9e61d9db87a268cdc87f1aaf4c21ad125cb</i><br /><br />Threat actor <b>description</b>: <i>Bandier is a company that operates in the Business Services industry. It employs 50to99 people and has 1Mto5M of revenue.</i><br />Target victim <b>website</b>: <i>wearesbi.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>ccsdschools.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16944</link>
<guid>ef469da55386b89993b2b644f5ba5140</guid>
<pubDate>Mon, 19 Aug 2024 09:17:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>ccsdschools.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>469e46cc791fb9549477bdde031928fd33873d2da2109d83e817c561d71f0470</i><br /><br />Threat actor <b>description</b>: <i>Charleston County School District (CCSD) is a public school district in Charleston, South Carolina, dedicated to providing quality education to students from pre-kindergarten through 12th grade. It serves a diverse student population and focuses on academic excellence, innovative programs, and community involvement. The district aims to prepare students for future success through comprehensive educational opportunities.</i><br />Target victim <b>website</b>: <i>ccsdschools.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mohawk-Valley-Cardiology-PC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16938</link>
<guid>7e53526fc58a32e5452294826783a54b</guid>
<pubDate>Sun, 18 Aug 2024 18:49:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Mohawk-Valley-Cardiology-PC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>959223cdb9c5f88b7c8edc552b67e167d7efa93835580c48fa242f4a02cb1c2f</i><br /><br />Threat actor <b>description</b>: <i>Mohawk Valley Cardiology Clinic provides its patients with the highest level of cardiac care.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>PBC-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16931</link>
<guid>2d261a6e0cf7a273f9d1ddbb31799a9c</guid>
<pubDate>Sun, 18 Aug 2024 16:47:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>PBC-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63dba426927c6ca5ecb9e84eec2903c090e49b7a7072f9d256344b37a8434212</i><br /><br />Threat actor <b>description</b>: <i>PBC performs several thousand design and construction jobs per year, working with major general contractors and on the most prestigious projects.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Yang-Enterprises</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16932</link>
<guid>f9cc05c31c9cdbd88efcad6d4619ace4</guid>
<pubDate>Sun, 18 Aug 2024 15:18:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Yang-Enterprises</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b87eb05376eefdde188bf9618ea675e21dcaad82acf23143fc99977ec761558</i><br /><br />Threat actor <b>description</b>: <i>Yang Enterprises is a high-technology woman-owned, small disadvantaged company built on a strong culture of ethics.</i><br />Target victim <b>website</b>: <i>yangenterprises.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carver-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16933</link>
<guid>afac0bdcb0139e69de4ce27f1c6d352b</guid>
<pubDate>Sun, 18 Aug 2024 15:16:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Carver-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>05a1ffb983da95e87c406f16bcb41195aea1072ea457268fdf935a1831277c86</i><br /><br />Threat actor <b>description</b>: <i>Freight & Logistics Services                                       </i><br />Target victim <b>website</b>: <i>carvercompanies.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>aerworldwide.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16927</link>
<guid>be4188c0d0d914d4f54684b7b79fc726</guid>
<pubDate>Sat, 17 Aug 2024 20:58:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>aerworldwide.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b3a8f5ea5237c519e619f8a4e9bf63a4101730661fd71d3605c7c1069d8456d9</i><br /><br />Threat actor <b>description</b>: <i>AER believes in transformation. We are Transformative Tech – What does this mean? Transformative Tech is the evolution of underused IT Equipment and End of Life products back into the vital electronics supply chain ecosystem. 300 Gb Data</i><br />Target victim <b>website</b>: <i>aerworldwide.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.gmchc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16923</link>
<guid>512844c25cd1c9af079ba08f868eb637</guid>
<pubDate>Sat, 17 Aug 2024 19:14:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.gmchc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e602e5e42bc988251de6db690751862914233121b53dc2349cd83d3fec0e29d</i><br /><br />Threat actor <b>description</b>: <i>The Greater Milford Community Health Center (www.gmchc.org) is a healthcare organization dedicated to providing comprehensive medical services to the Milford community and surrounding areas. They offer a wide range of services including primary care, pediatric care, women's health, and behavioral health services. Their mission is to ensure accessible, high-quality healthcare for all community members, regardless of financial status.</i><br />Target victim <b>website</b>: <i>www.gmchc.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.wmwmeyer.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16912</link>
<guid>81e68999106d6798eca552cbb9337751</guid>
<pubDate>Sat, 17 Aug 2024 12:54:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.wmwmeyer.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f51e460d713e6c04a83e12b2943b883bcb3aa0cfbb0deeafd6033843d78d303</i><br /><br />Threat actor <b>description</b>: <i>WM W. Meyer & Sons, Inc. is a company specializing in high-quality industrial equipment and solutions. They offer a range of products including blowers, vacuum pumps, and dust collectors, catering to various industries such as agriculture, manufacturing, and processing. With a focus on innovation and customer satisfaction, WM W. Meyer & Sons provides reliable and efficient equipment designed to meet diverse operational needs.</i><br />Target victim <b>website</b>: <i>www.wmwmeyer.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.vinakom.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16910</link>
<guid>9f2101dd2222c9e8a3ec8d116da3b40a</guid>
<pubDate>Fri, 16 Aug 2024 21:03:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.vinakom.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1a73a84c11daf7a70d2dfc1634aa3970fafcd0ca618d3b2762722556ab1c3bb</i><br /><br />Threat actor <b>description</b>: <i>Vinakom Communications is a telecommunications company offering a range of services including high-speed internet, voice, and data solutions. They cater to both residential and business customers, focusing on reliable and efficient connectivity. Known for their customer-centric approach, Vinakom aims to provide innovative and cost-effective communication solutions tailored to meet diverse needs.</i><br />Target victim <b>website</b>: <i>www.vinakom.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.patelco.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16907</link>
<guid>47cc8fbdaeacd8c1d9fe325b11e0287e</guid>
<pubDate>Fri, 16 Aug 2024 15:25:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.patelco.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ead38e04119e4513b05323ca52e28e545affeb10ace8ef84aaccacbe3680b5b8</i><br /><br />Threat actor <b>description</b>: <i>Patelco Credit Union, accessible via www.patelco.org, is a not-for-profit financial institution offering a wide range of banking services including savings and checking accounts, loans, credit cards, and investment options. Founded in 1936, it focuses on improving the financial well-being of its members, providing personalized service, competitive rates, and financial education resources.</i><br />Target victim <b>website</b>: <i>www.patelco.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>promises2kids.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16904</link>
<guid>b92d0fcbc8d2624a2ea66907feb8d8de</guid>
<pubDate>Fri, 16 Aug 2024 12:29:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>promises2kids.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6dcb3a6348c113f665f3371a60231b667b3f88c49e3986b0f113fd7165cc4212</i><br /><br />Threat actor <b>description</b>: <i>Promises2Kids annually provides over 3,000 current and former foster youth in San Diego County with the tools, opportunities, and guidance they need to address the circumstances that brought them into foster care, overcome the difficulties of            ...</i><br />Target victim <b>website</b>: <i>www.promises2kids.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ljglaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16897</link>
<guid>e91358846c5b47cfd46866b21d9f7da3</guid>
<pubDate>Fri, 16 Aug 2024 06:48:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>ljglaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a8b21ff7ee9f5ca17e22091adafc8437c7452c96dbcb1bc963956a379414b2a</i><br /><br />Threat actor <b>description</b>: <i>LJG Law, or ljglaw.com, is a legal firm specializing in various areas of law, including personal injury, employment law, and civil litigation. The firm is committed to providing personalized legal services and advocating for the rights and interests of its clients. It focuses on delivering effective legal solutions through experienced attorneys dedicated to achieving favorable outcomes.</i><br />Target victim <b>website</b>: <i>ljglaw.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.aaconsultinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16896</link>
<guid>1f5bb9b79cb995f65aa9f6d649c5f49f</guid>
<pubDate>Fri, 16 Aug 2024 04:46:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.aaconsultinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7cea6b69c949aba5c21c7e88feda87c35b249a0f59f8c03aa4bdea1d8027336d</i><br /><br />Threat actor <b>description</b>: <i>AA Consult Inc. is a consulting firm specializing in providing innovative business solutions and strategic advisory services. They focus on helping organizations enhance their performance through expert guidance in areas such as management, operations, and technology. The company is committed to delivering tailored strategies that drive growth, efficiency, and competitive advantage for their clients.</i><br />Target victim <b>website</b>: <i>www.aaconsultinc.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sterling-Rope</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16895</link>
<guid>21eb2cde1194b85163cbd079f5962edf</guid>
<pubDate>Fri, 16 Aug 2024 03:04:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Sterling-Rope</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ccce1167744c83809dd68c8963819b3f704511d8c46f6d597d4bf365c8a2d365</i><br /><br />Threat actor <b>description</b>: <i>Sterling Rope Founded in 1992, Sterling Rope Company has established itself as a leader in designing, developing and manufacturing high-performance ropes and life-safety products.     More</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.atwoodcherny.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16891</link>
<guid>eb1daa7f2b5068f7127382b1eae924b7</guid>
<pubDate>Thu, 15 Aug 2024 21:32:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.atwoodcherny.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>879bccf98036dbd7be8a432b21113fd880a37e7337357933b8db0c141a32ebd7</i><br /><br />Threat actor <b>description</b>: <i>Atwood & Cherny is a reputable law firm based in Boston, specializing in family law and divorce litigation. The firm is known for its personalized approach, offering services in areas such as asset division, child custody, and prenuptial agreements. With a team of experienced attorneys, Atwood & Cherny is dedicated to providing compassionate and effective legal solutions to its clients.</i><br />Target victim <b>website</b>: <i>www.atwoodcherny.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mill-Creek-Lumber</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16889</link>
<guid>c31b43829c7b4afe91ff4c0797247a76</guid>
<pubDate>Thu, 15 Aug 2024 21:30:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Mill-Creek-Lumber</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b89b1f363bb2d8c315c8c8e971011524af8f7c5b0efdf0b4209d94741344a15</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.millcreeklumber.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Seaway-Manufacturing-Corp.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16894</link>
<guid>3551e8036c7244b6222b029f97a1d5b4</guid>
<pubDate>Thu, 15 Aug 2024 21:27:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Seaway-Manufacturing-Corp.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ec7a1484a2eaf4fcc3a0a981c48455af02aa5ad7f410ba492e15824207d2699</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zydus-Pharmaceuticals</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16888</link>
<guid>a59c0ab76aec5a243f0c50fa6a5f36a7</guid>
<pubDate>Thu, 15 Aug 2024 21:26:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Zydus-Pharmaceuticals</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6424c61c7d8742c7125c2b92700c8ae79a211f7023a634594ca9c9e0cc44293</i><br /><br />Threat actor <b>description</b>: <i>Zydus Pharmaceuticals is a prominent global healthcare company based in India. It specializes in the development, manufacturing, and marketing of a broad range of pharmaceuticals, including generic drugs, active pharmaceutical ingredients (APIs), and biosimilars. With a strong commitment to innovation, quality, and affordability, Zydus aims to improve patient health and access to essential medicines worldwide.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Patterson-Health-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16884</link>
<guid>96ddc5dc8fec52547e2b998e85bd2628</guid>
<pubDate>Thu, 15 Aug 2024 16:26:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Patterson-Health-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0fb19addd04091f4f807bc0efddc932150e1b3787099341be40692edcb63fc20</i><br /><br />Threat actor <b>description</b>: <i>Completed in 2019, Patterson Health Center combined two critical access hospitals in Anthony and Harper, Kansas. The new centrally located critical access hospital has 16 inpatient beds, a large emergency department with two trauma bays to su            ...</i><br />Target victim <b>website</b>: <i>pattersonhc.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Liberty-Resources</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16880</link>
<guid>3a6cd33291178d268ef37b305c3f8c0e</guid>
<pubDate>Thu, 15 Aug 2024 12:59:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Liberty-Resources</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc6135065f54ea7ac4476849b48560e13d3f20a440dc33f301f6fd9cd27b89c0</i><br /><br />Threat actor <b>description</b>: <i>Liberty Resources Liberty Resources, Inc., headquartered in Syracuse, New York, is one of Central New Yorks most diversified and trusted human service agencies.</i><br />Target victim <b>website</b>: <i>libertyresources.org</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Innoquest</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16881</link>
<guid>1c52486ff0b2a44fbfefeb15d21f53ae</guid>
<pubDate>Thu, 15 Aug 2024 12:18:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Innoquest</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1421a1ab995c822ad8109e4f4de6be675e48ad65e5923c17f40a27921e0b61c8</i><br /><br />Threat actor <b>description</b>: <i>Since 1993 Innoquest president and licensed engineer Bill Hughes has designed ov...</i><br />Target victim <b>website</b>: <i>innoquestinc.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>YI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16878</link>
<guid>dfe0c74a3f265edd7b90e43990e70b00</guid>
<pubDate>Wed, 14 Aug 2024 21:08:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>flocker</b> claims attack for <b>YI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b80d8b76d51b7bd211120813e6e83423a41bcb791355b55b6af8ec79691361f6</i><br /><br />Threat actor <b>description</b>: <i>We have Access Y*********I.edu servers, a well-known University. In just 7 days, we will leak all data we have taken. […]</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>flocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Washington-Times</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16874</link>
<guid>8a5bfb060ee1f97ecba56d60c049b52d</guid>
<pubDate>Wed, 14 Aug 2024 14:04:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>The-Washington-Times</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>128b280594f251d8039de36981db8673ba232190a195e3ad2df73fc703559149</i><br /><br />Threat actor <b>description</b>: <i>The Washington Times The Washington Times is an American conservative daily newspaper published in Washington, D.C. It covers general interest topics with an emphasis on national politics.</i><br />Target victim <b>website</b>: <i>washingtontimes.com</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Texas-Centers-for-Infectious-Disease-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16868</link>
<guid>d5eb74205aad313dd6361a1089c4e424</guid>
<pubDate>Wed, 14 Aug 2024 13:01:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Texas-Centers-for-Infectious-Disease-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e5a47ae1203e1b61f67a51de18fe02cd04e9e4bb782e6ede24281da285d99d3</i><br /><br />Threat actor <b>description</b>: <i>TCIDA is a private infectious disease group serving the entire DFW metroplex - Dallas and Fort Worth - with brand new buildings in both cities, infusion centers in both cities, and its own pharmacy.</i><br />Target victim <b>website</b>: <i>texascentersid.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Thompson-Davis--Co</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16870</link>
<guid>6a58d9ef674a31d1d5205a2e5429f603</guid>
<pubDate>Wed, 14 Aug 2024 11:11:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Thompson-Davis--Co</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>428e0e377d78a068b05a8c1e85c70f45e9513fac2cfb59f9d248b5b0d64df851</i><br /><br />Threat actor <b>description</b>: <i>Thompson Davis & Co. is an independent private asset manager providing individuals, businesses, foundations and retirement plans with disciplined and uniquely focused growth and value-driven investment management.</i><br />Target victim <b>website</b>: <i>thompsondavis.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>mmtransport.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16865</link>
<guid>414187419105b06734cd36adead79115</guid>
<pubDate>Wed, 14 Aug 2024 10:05:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dAn0n</b> claims attack for <b>mmtransport.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>58317989057018d05bd5ded59c6c2f8faa5a3b33f00d16179c2119e9fc08efc4</i><br /><br />Threat actor <b>description</b>: <i>M&M Transport Services, Inc. was founded in 1990 by Mark R. Warsofsky and has steadily grown into a nationwide, dedicated transportation provider f or some of the biggest retail, manufacturing, distri...</i><br />Target victim <b>website</b>: <i>mmtransport.com</i>]]></description>
<category>dAn0n</category>
</item>
<item xmlns:dc='ns:1'>
<title>Riley-Pope--Laney</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16866</link>
<guid>180a2a0cd826ab55eefc878446dbf891</guid>
<pubDate>Wed, 14 Aug 2024 10:02:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Riley-Pope--Laney</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>100c7473129b1b17e5494458442045901f0668ceedf8592b142b0a7d0e60101c</i><br /><br />Threat actor <b>description</b>: <i>Riley Pope & Laney was founded in 2001 by Ted Riley, Lowndes Pope and Roy Laney. Since its founding, our firm has continually grown and we now have offices in South Carolina, North Carolina and Georgia providing legal counsel in the areas of banking and financial services, real estate transactions and litigation, business and defense litigation, commercial transactions, technology, and all manners of intellectual property to include patent, trademark, copyright and trade secret law. We practice in all state and federal courts in North and South Carolina and Georgia, the United States Fourth Circuit Court of Appeals, the United States Patent and Trademark Office, and the United States Supreme Court.  Our practical approach enables us to effectively and efficiently resolve your issues. With a unique understanding of state government processes and complex public policy initiatives, our firm is ideally suited to provide strategic counsel and legislative representation for clients before the South Carolina General Assembly, Governor’s Office, state agencies and local governments.</i><br />Target victim <b>website</b>: <i>rplfirm.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>Air-International-Thermal-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16855</link>
<guid>e7da6f05f908822fcb5796464baf196b</guid>
<pubDate>Tue, 13 Aug 2024 22:41:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Air-International-Thermal-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b2ef240ab301868a8ffd5b88b93ec4a08d3d1924f2b5422cc9c5136955ee0a1</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ai-thermal.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Adina-Design</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16851</link>
<guid>b803f0a4e6b8514f2dab43eaca581b05</guid>
<pubDate>Tue, 13 Aug 2024 20:52:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Adina-Design</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a16caef40e627cf8cb5e4061c65acb98189a055960df88754eddb5cbe3ae61c5</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.adinareyter.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Parker-Development-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16859</link>
<guid>9300f7b7b99d92c0acf83ea618010e16</guid>
<pubDate>Tue, 13 Aug 2024 20:32:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Parker-Development-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5dae6602d02d268f93a4876dd18eeebda5ca51d4c6b2e0b83d1b3b42b4195394</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.parkerdevco.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>CinemaTech</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16858</link>
<guid>fa12ab68091d74718e2b3fabfcb8e2b1</guid>
<pubDate>Tue, 13 Aug 2024 20:25:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>CinemaTech</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42f0a9321c8c6b2b4d5f190ed3a05a468812a26a6c7aa4fb3b58fcf757addd91</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.mycinematech.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gaston-Fence</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16850</link>
<guid>efee1278c6172f7361d1900617faede2</guid>
<pubDate>Tue, 13 Aug 2024 19:23:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Gaston-Fence</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ea27a948a573e6b7d7bbc62615ade2d8bc7872e7243cebadce290abf2034857</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Contract-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16844</link>
<guid>916c389b30d9307cfa88f78e037eed17</guid>
<pubDate>Tue, 13 Aug 2024 18:26:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>American-Contract-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56bbedcfefaab0fd0a29c7662397a361d3d9e0a41dd6a5723e99719d9945d570</i><br /><br />Threat actor <b>description</b>: <i>American Contract Systems (ACS) is a healthcare company specializing in providing sterile and non-sterile medical products and services. They offer custom surgical kits, medical device sterilization, and supply chain solutions to hospitals, clinics, and healthcare providers. ACS focuses on enhancing efficiency, reducing costs, and ensuring high-quality standards in medical product delivery and sterilization services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Element-Food-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16845</link>
<guid>0da0df5d34d8b9e9d12500dc7d343b5f</guid>
<pubDate>Tue, 13 Aug 2024 18:26:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Element-Food-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca4ff36c63b943f681add540665cb718e6940f60f88c48904832c5b1366941bf</i><br /><br />Threat actor <b>description</b>: <i>Element Food Solutions is a company specializing in the development and production of high-quality, innovative food ingredients and solutions. They focus on creating value-added products for the food industry, including customized ingredient blends, functional food components, and nutritional solutions. With a commitment to quality and innovation, Element Food Solutions serves a diverse range of clients in the food and beverage sector</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aerotech-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16846</link>
<guid>2bed57b5e7da7db0be5cd65a00bf6405</guid>
<pubDate>Tue, 13 Aug 2024 18:26:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Aerotech-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>471fc4e9c479c94a0dfdf31b4167b4cf918d096d8d46f333fe21302c9d114e7d</i><br /><br />Threat actor <b>description</b>: <i>Aerotech Solutions is a technology-driven company specializing in aerospace engineering and advanced manufacturing. They provide innovative solutions for the design, development, and production of aerospace components and systems. With a focus on precision engineering, Aerotech Solutions serves clients across the aviation and defense sectors, offering customized services that enhance performance, safety, and efficiency in aerospace technology</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>E-Z-UP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16847</link>
<guid>a5e4edb22210b2b92b75baac5ed3c40a</guid>
<pubDate>Tue, 13 Aug 2024 18:26:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>E-Z-UP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e58d77b2bad1bdfba2f41db01f219b7f4ad4a512837c4d73239a07acbfb88282</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-White-Center-Community-Development-Association</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16843</link>
<guid>c0b9031eabb6c34699a6427622186cdc</guid>
<pubDate>Tue, 13 Aug 2024 16:49:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>The-White-Center-Community-Development-Association</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bba4dcd4cc90262b1156afdd245f9cd722ed55c3c3dba89d490a568b527a04a2</i><br /><br />Threat actor <b>description</b>: <i>The White Center Community Development Association The White Center CDA is a vibrant, evolving community organization guided by the White Center Neighborhood Action Plan and engaged in various core programs and partnership initiatives to benefit the White Center community.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Banner-and-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16842</link>
<guid>352aadcdb01b30bdbd6c5f13d27ed9b5</guid>
<pubDate>Tue, 13 Aug 2024 13:03:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trinity</b> claims attack for <b>Banner-and-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81ba02cada8fc8f8c616433a549e9fd5937f078d9c754acf177e4daaa325b93e</i><br /><br />Threat actor <b>description</b>: <i>full data base(1,5 TB) - Revenue: $7.6 Million - Publication date: 2024-09-20</i><br />Target victim <b>website</b>: <i>www.banneracc.com</i>]]></description>
<category>trinity</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southwest-Family-Medicine-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16839</link>
<guid>7068f5c7fb43d165180107a27beb6020</guid>
<pubDate>Tue, 13 Aug 2024 13:03:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Southwest-Family-Medicine-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>855a1fb000d71495c988fab34eb9f76cc9bc92bcaf2149df9dbf1f3c8bd24a12</i><br /><br />Threat actor <b>description</b>: <i>Southwest Family Medicine Associates proudly offers a true one-stop shop medical home. The team at SFMA practices cutting-edge medicine that focuses on disease prevention and wellness. Our revolutionary Early Detect Program combines an annual wellness exam with early detection testing.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>MyFreightWorld</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16836</link>
<guid>cff815dabb3555cf1df47388baa32b84</guid>
<pubDate>Tue, 13 Aug 2024 07:35:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>helldown</b> claims attack for <b>MyFreightWorld</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8c4ebf9bb90893e13f0ebc768837342863e73dc8abfc8bfa285774ef9d273aec</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>myfreightworld.com</i>]]></description>
<category>helldown</category>
</item>
<item xmlns:dc='ns:1'>
<title>cbmm.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16835</link>
<guid>40ace1babb133e1ea17f09932dd2e508</guid>
<pubDate>Tue, 13 Aug 2024 07:34:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>helldown</b> claims attack for <b>cbmm.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>adfdcda24ea0158197a8e87effe6af21582896e0ef5b929a1f596abaaa38d610</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>cbmm.org</i>]]></description>
<category>helldown</category>
</item>
<item xmlns:dc='ns:1'>
<title>bedford.k12.oh.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16825</link>
<guid>1e5ae5c4ebcc2cadb8a09909f3731c35</guid>
<pubDate>Mon, 12 Aug 2024 20:49:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>bedford.k12.oh.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>50f45127e5224bb9f480a5a5263c946ec6935d6c4d3256f338beac6803b24042</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>bedford.k12.oh.us</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Warwick-Hotels-and-Resorts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16826</link>
<guid>f1248ade4381b326436757a0b5266088</guid>
<pubDate>Mon, 12 Aug 2024 19:01:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Warwick-Hotels-and-Resorts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b850ef5ba13fbce1a587a68bcbc7b1f9f5696574ab959de50d0c76e1e616c330</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1980, Warwick Hotels and Resorts is a collection of upscale hotels th...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>nicholsfleet.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16823</link>
<guid>afd53be629a8800e6447030f2e0961f7</guid>
<pubDate>Mon, 12 Aug 2024 14:01:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>nicholsfleet.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>50e3d152005469924044e939472188157825ef3d0995d52f8ba89e5218eef2b9</i><br /><br />Threat actor <b>description</b>: <i>Nichols Fleet Equipment has been building the best service trucks in the industry. About 2 TB of private information. Drawings and developments. Banking information and more</i><br />Target victim <b>website</b>: <i>nicholsfleet.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brookshire-Dental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16819</link>
<guid>c0b3cb0842f9f8148f618c587b48d5ba</guid>
<pubDate>Mon, 12 Aug 2024 06:22:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Brookshire-Dental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4aae3e32c1f9f96ee38aa212955e29767a4d1559bd6514ba442d3ef0ffe70466</i><br /><br />Threat actor <b>description</b>: <i>Brookshire Dental, PA is located in Hurst, Texas. This organization primarily operates in the Dentists' Office business / industry within the Health Services sector. This organization has been operating for approximately 21 years. Brookshire             ...</i><br />Target victim <b>website</b>: <i>www.brookshiredental.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>naturalcuriosities.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16817</link>
<guid>5eea6fd7b02448c35fd405cfe823d128</guid>
<pubDate>Sun, 11 Aug 2024 20:50:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>naturalcuriosities.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7034911f34cb5565565e8dc36050465901fd48a199e0e3c244330a3dd47bd28</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>naturalcuriosities.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>TelPro</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16816</link>
<guid>2adee3823fe0b1c49ce2b4124cdcecda</guid>
<pubDate>Sun, 11 Aug 2024 18:56:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>TelPro</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7cd5bd6962b95329c272278f6e860ed7e31561de10856aca57833f4e29ae8de</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.telpro1.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jeffersoncountyclerk.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16814</link>
<guid>cefa4e5ffdb1f7c3a39e51f105a83109</guid>
<pubDate>Sun, 11 Aug 2024 14:48:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>Jeffersoncountyclerk.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5faef55bc58386c06942f84b62c290a5380a4717e72e5862d07b40b769023d38</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>Jeffersoncountyclerk.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Amco-Metal-Industrial-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16812</link>
<guid>1560fe0e80c19847a91c22e69d5036f1</guid>
<pubDate>Sun, 11 Aug 2024 13:15:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Amco-Metal-Industrial-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c6ad37eafcb6685b036dffe4240e9c0128e9df88b99e018d45d01ec98b31f87</i><br /><br />Threat actor <b>description</b>: <i>Amco Metal Industrial Corp is located in La Puente, California. This organization primarily operates in the Pig Iron business / industry within the Wholesale Trade - Durable Goods sector. This organization has been operating for approximately            ...</i><br />Target victim <b>website</b>: <i>amcocorporation.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Moser-Wealth-Advisors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16811</link>
<guid>9dbc59f98f5e213ac6967df00e1e1e06</guid>
<pubDate>Sun, 11 Aug 2024 10:44:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Moser-Wealth-Advisors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>13159e432a02fe4f23e19ce8b0bdb93413bae43b76960c3d43174900c49ffdec</i><br /><br />Threat actor <b>description</b>: <i>Moser Wealth Advisors Based in Bellevue, Washington, Moser Wealth Advisors is a regionally owned and operated wealth management firm that combines a Certified Public Accounting firm  and Registered Investment Advisor to deliver comprehensive financial planning solutions that incorporate sophisticated tax and investment advice to high net worth individuals, families and business owners.</i><br />Target victim <b>website</b>: <i>mosercpas.com</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>robertshvac.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16796</link>
<guid>a979ca72826d945a5ac992029145141c</guid>
<pubDate>Sun, 11 Aug 2024 08:48:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>robertshvac.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1c007058f710cd6d9c20f3bcf530d0ece36019b321617d64a0eb349553fb65a</i><br /><br />Threat actor <b>description</b>: <i>robertshvac.com 240Gb uncompressed data</i><br />Target victim <b>website</b>: <i>robertshvac.com</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>dmmerch.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16797</link>
<guid>703aea31975f2fa45fdb3e4a8e378ad1</guid>
<pubDate>Sun, 11 Aug 2024 07:58:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>dmmerch.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e92996669da15023888590014730e6f7c00c95dc738c6646c28972c0eed2dbb</i><br /><br />Threat actor <b>description</b>: <i>DM Merchandising is the best online wholesale marketplace for business owners looking for clothing & products that will sell. See how we can help today.</i><br />Target victim <b>website</b>: <i>dmmerch.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>legacycpas.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16799</link>
<guid>9a2241c2015fb98771d97a9828db1d73</guid>
<pubDate>Sun, 11 Aug 2024 07:56:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>legacycpas.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7ac162eee624d23b005646d1e4a311ab5c57dfbdfd2cb6d36a72458d8429f54</i><br /><br />Threat actor <b>description</b>: <i>Balancing Commitment & Experience. Legacy Professionals LLP is a unique niche-focused certified public accounting firm that balances a strong commitment to client success with decades of experience in serving employee benefit plans, labor organizatio...</i><br />Target victim <b>website</b>: <i>legacycpas.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>allweatheraa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16800</link>
<guid>0eeb5caaa2b554a8f2d508db44adb6dc</guid>
<pubDate>Sun, 11 Aug 2024 07:55:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>allweatheraa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>35861c4f3125d4c7a01a5900133466716962f725a409d3528f00813302d8d035</i><br /><br />Threat actor <b>description</b>: <i>All Weather Architectural Aluminum offers extensive options of custom windows and doors to fit even the most creative of projects. We look forward to working with you. AWAA Doors & Windows - Explore our award-winning contemporary designs including sl...</i><br />Target victim <b>website</b>: <i>allweatheraa.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>fremontschools.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16803</link>
<guid>6eda0403281df4b9a24d37790828effb</guid>
<pubDate>Sun, 11 Aug 2024 07:52:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>fremontschools.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>efac912a0564e452acf867e27ef509552986291f4c12b822d6bfdfe06bdd7649</i><br /><br />Threat actor <b>description</b>: <i>Fremont Ross High School is a public high school in Fremont, Ohio, United States. It is the only high school in the Fremont City School District, and one of two high schools in Fremont, the other being Saint Joseph Central Catholic High School. The s...</i><br />Target victim <b>website</b>: <i>fremontschools.net</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>divaris.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16806</link>
<guid>d6da0257d11fb247f4a607bae48f69d1</guid>
<pubDate>Sun, 11 Aug 2024 07:47:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>divaris.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>478a09c00500ec6c039daea5fd75391df9a4b397e17461c6b0457df432e1e632</i><br /><br />Threat actor <b>description</b>: <i>From Our Experts. Three Concepts Worth Considering. Pandemic Retail Strategies. Locations. Tenant Portal. Award Winning. Forward Thinking. Results Driven. Divaris is Moving Commercial Real Estate Forward.</i><br />Target victim <b>website</b>: <i>divaris.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>sullivansteelservice.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16807</link>
<guid>8694959cf2d53e57681d8fdc472468d6</guid>
<pubDate>Sun, 11 Aug 2024 07:44:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>sullivansteelservice.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3dc5f961f47ac383f1ac148162646233b71327c20fb23d657bd44b5a3891d8e</i><br /><br />Threat actor <b>description</b>: <i>Our central location allows quick shipping and receiving along with quick access to our shipping ports for our steel deliveries. 85 Route 31 North. Pennington, NJ 08534. fax: 1-609-530-1140. • Contact Sullivan Today •. • Request Quote •. Newsletter....</i><br />Target victim <b>website</b>: <i>sullivansteelservice.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>johnllowery.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16808</link>
<guid>2d2959e82e89b669b329c2926d32839f</guid>
<pubDate>Sun, 11 Aug 2024 07:40:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>johnllowery.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c3d309168cf3de2b3b20be73e493a12bb81fdc504845d2121094a97911190b5</i><br /><br />Threat actor <b>description</b>: <i>John L. Lowery & Associates, Inc. was organized in 1964 to provide versatile and comprehensive engineering and technical services for the petrochemical industry. We have grown and now employ all levels of professional and technical personnel such as...</i><br />Target victim <b>website</b>: <i>johnllowery.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>qespavements.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16809</link>
<guid>e98aebc54e5513e88b2014574d209255</guid>
<pubDate>Sun, 11 Aug 2024 07:26:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>qespavements.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>62fd39a0f718874651907be3ed8454fed3140d981b5773a26e070f515dc29463</i><br /><br />Threat actor <b>description</b>: <i>QES takes pride in expressing each value in our name: Quality Engineering Solutions. We provide solutions to challenges in the pavement and transportation field using the latest proven engineering technology, with a strong emphasis on the quality and...</i><br />Target victim <b>website</b>: <i>qespavements.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>emanic.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16810</link>
<guid>49f2772fac96f92458c85ad52a644b1e</guid>
<pubDate>Sun, 11 Aug 2024 07:22:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>emanic.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ecd751613509bc798cde29438e2b6035593ae8acdce4f8afb955d859314211ce</i><br /><br />Threat actor <b>description</b>: <i>Electronic Maintenance Associates, Inc. (dba EMA) provides products, services, training, and more related to Medium Voltage Variable Frequency Drives. Celebrating our 33rd year, over 98% of our customers say they are "very satisfied" with EMA; that's...</i><br />Target victim <b>website</b>: <i>emanic.net</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cydcor</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16791</link>
<guid>e9d3e114b1cf19de5ae8d014512350c2</guid>
<pubDate>Sat, 10 Aug 2024 09:37:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Cydcor</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ad76da17c95148f719e5d74e23990158d43e5c8c295435cdd74534dc26b52a6</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1994, Cydcor specializes in information technology services and outsourced sales solutions. The company is headquartered in Agoura Hills...</i><br />Target victim <b>website</b>: <i>cydcor.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Majestic-Metals</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16784</link>
<guid>506e185dccf97ea9082b991ab2556d9d</guid>
<pubDate>Fri, 09 Aug 2024 18:55:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Majestic-Metals</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48ea8d4c4ea8725d4ea0236abcd1f839086dd93b91c7a6dba85bb404d088d61e</i><br /><br />Threat actor <b>description</b>: <i>Majestic Metals is a precision sheet metal fabrication services provider.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Anniversary-Holding-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16787</link>
<guid>1e53b79716f96e36c06132ddb9cd53d9</guid>
<pubDate>Fri, 09 Aug 2024 17:44:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Anniversary-Holding-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fddc810782e5418ab3cd85768419f63a33817c8fd16e704d3332bd8ac78ccedf</i><br /><br />Threat actor <b>description</b>: <i>Holding Companies & Conglomerates.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>GCA-Global-Cargo-Alliance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16786</link>
<guid>4bc336b15417584fcec3e7dcc531d836</guid>
<pubDate>Fri, 09 Aug 2024 17:43:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>GCA-Global-Cargo-Alliance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>917e4d4fbe9620f69771eedebd91682482f5f984271402543cd4fccef9c1ac20</i><br /><br />Threat actor <b>description</b>: <i>GCA Global Cargo Alliance, a leading freight forwarder in the logistics market established in 1994, is a customer-dedicated company that delivers premium service at very competitive prices.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Concut-ddm.local</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16785</link>
<guid>5f1db7a13730fea2764ea1c0a3de2939</guid>
<pubDate>Fri, 09 Aug 2024 17:03:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Concut-ddm.local</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad0120ed7a136db33b04de160e1b8dc575b7841478edb95262b88596b13c14f8</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1946, DDM CONCUT (f.k.a. Dixie Diamond Manufacturing and Concut) has ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-TSI-Holdings-NYSC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16781</link>
<guid>18dabb99ce171ea5a317521425d5c206</guid>
<pubDate>Fri, 09 Aug 2024 14:15:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>New-TSI-Holdings-NYSC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6905dbe957c96bfe4fa11119036d4262cf4b84e85a44ee663436953d1dda2582</i><br /><br />Threat actor <b>description</b>: <i>New York Sports Clubs and our family of brands was initially founded in 1973 in New York City, and is a chain of large, full-service, commercial</i><br />Target victim <b>website</b>: <i> www.newyorksportsclubs.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>dhcgrp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16779</link>
<guid>2caba685d55ef0854e19c297cf95df35</guid>
<pubDate>Fri, 09 Aug 2024 13:00:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>dhcgrp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5d6e61606c1cff6e13963e6ff3a8a75a5778c17dcca61ed8b1c937dbf7243079</i><br /><br />Threat actor <b>description</b>: <i>Dynasty Healthcare Management is a healthcare services company operating skilled nursing communities that specialize in a wide range of services including physical, occupational and speech therapy, as well as specialized care for diabetes, stroke and Alzheimer’s among many other medical conditions.</i><br />Target victim <b>website</b>: <i>dhcgrp.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Boombah-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16782</link>
<guid>faa1f47d99384715608f21292313ab25</guid>
<pubDate>Fri, 09 Aug 2024 12:00:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Boombah-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f198bf76ec3447b01e3eccaa6dc2a3599e6d15262d15581d2a334879a71cfda1</i><br /><br />Threat actor <b>description</b>: <i>Boombah was founded in 2003 by owner and founder, Rick Tollefson. Boombah Inc. is now one of the fastest growing sporting goods companies in the nation.  Boombah Dominicana located in Santiago, Dominican Republic is a state of the art manufacturing facility opened in 2016.  Our goal is simple to “Be what no one else is and give what no one else will”. We try hard to live up to that vision every single day. We want to provide cutting edge, high quality products at an affordable price, so that our customers can afford the rest of life. </i><br />Target victim <b>website</b>: <i>https://www.boombah.com/</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.dunnsolutions.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16780</link>
<guid>8adbd6c3f2280e2aeac1b525830ce976</guid>
<pubDate>Fri, 09 Aug 2024 11:00:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dAn0n</b> claims attack for <b>www.dunnsolutions.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9966546190c5223de318a617034fcb68b2754c94d4aa9e789d6a9d3fac0f0918</i><br /><br />Threat actor <b>description</b>: <i>Dunn Solutions Group is a digital commerce and business transformation consultancy that helps its clients achieve speed by automation. Acquisitions & Subsidiaries: Kaar Technologies.The total size of ...</i><br />Target victim <b>website</b>: <i>www.dunnsolutions.com</i>]]></description>
<category>dAn0n</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sumter-County-Sheriff</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16778</link>
<guid>1170017b40d1ba28394ebc44158dae8a</guid>
<pubDate>Fri, 09 Aug 2024 10:52:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Sumter-County-Sheriff</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1841bd138c8a09501dd4430d10e0052a21508aae190a26345545d4f1a7bc43d5</i><br /><br />Threat actor <b>description</b>: <i>Sumter County Sheriff The Sumter County Sheriff's Office is founded on the principles of integrity, respect, honesty, and caring for others.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>rationalenterprise.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16773</link>
<guid>1f689175473dcc4f921a76933e45bbb5</guid>
<pubDate>Thu, 08 Aug 2024 20:02:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>rationalenterprise.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>418f39d9615115c70ec96ff5f3c453c0daae26f6b78df9b2ec8a7303c47c18d3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>modernceramics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16769</link>
<guid>48229fd6aa4328151e40bda429d8e182</guid>
<pubDate>Thu, 08 Aug 2024 18:03:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>modernceramics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f0b951a44371c1fb044ad7d95a004da8d9c2268db9f4a70a63200b3bd83e5018</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>mihlfeld.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16763</link>
<guid>b8c06480a3e0c575506bbd1e7e5cf02d</guid>
<pubDate>Thu, 08 Aug 2024 08:02:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>mihlfeld.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>728ac15121d06682466845fe8081f17ad7aead7dc3e0f0e1502daf417963de4e</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/MIHLFELD/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/MIHLFELD/PROOF/DATA DESCRIPTIONS: Employees personal and corporate data, Personal Identifiable Information, financial documents, customer information, contracts, corporate and personal correspondence, etc.</i><br />Target victim <b>website</b>: <i>mihlfeld.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Horizon-View-Medical-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16756</link>
<guid>a5460fe6c23289fddcfe66efe033ae08</guid>
<pubDate>Thu, 08 Aug 2024 01:41:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Horizon-View-Medical-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f3db03e3eec3cd75d6f376acd412329129e6b34876a560ba8221f9d67b6c31e5</i><br /><br />Threat actor <b>description</b>: <i>Company has the last 24 hours to contact us using the instructions left.In case of silence, all data will be published https://horizonviewmed.com(702) 641-85006170 N Durango Dr Ste 220 Las Vegas, NV 89149</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bayhealth-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16751</link>
<guid>a91f5b7694960ec78204af05f421a699</guid>
<pubDate>Wed, 07 Aug 2024 18:52:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Bayhealth-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f5987e8319e76d06432175f6bcc004d786020b557c4942a797aa56829a0c0efe</i><br /><br />Threat actor <b>description</b>: <i>Bayhealth Hospital Bayhealth is a technologically advanced not-for-profit healthcare system with nearly 4,000 employees and a medical staff of more than 450 physicians and 200 advanced practice clinicians.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Miller-Boskus-Lack-Architects-ad.mbl-arch.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16748</link>
<guid>484e01517b1395d6f8cce27fcc459cbf</guid>
<pubDate>Wed, 07 Aug 2024 14:35:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Miller-Boskus-Lack-Architects-ad.mbl-arch.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7574ea655e49a69c2749b71f88fa387a6d75e10d5307e53877fd31cbdab173e</i><br /><br />Threat actor <b>description</b>: <i>Miller Boskus Lack Architects PA is a company that operates in the Architecture,...</i><br />Target victim <b>website</b>: <i>mbl-arch.com</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Anderson-Oil--Gas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16744</link>
<guid>21b9a07cb47f707a02489fd5e3b882bd</guid>
<pubDate>Wed, 07 Aug 2024 10:48:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Anderson-Oil--Gas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cda2c18dce03e3e940fb26e84e05742a68b9385fe95a58f07e1ff78f065c30ec</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://andersonoilandgas.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>HUD-User</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16743</link>
<guid>21eca1b8f66e8247daca8dd2fecd844c</guid>
<pubDate>Wed, 07 Aug 2024 07:16:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>HUD-User</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e53e2d00f2f23c23de47da2f14c927b809d97aafdcac16ccb035ac6692afd736</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>huduser.gov</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>KLA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16742</link>
<guid>3c26e81100f278a7b622b2b1f30d8bae</guid>
<pubDate>Wed, 07 Aug 2024 06:15:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>KLA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b7565153ae27cedf791e907e8ad76df994cb0c506e7adfb77f7d66c5d4fdaae5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>FatBoy-Cellular</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16741</link>
<guid>50b302ba631ec0a326431ea788874774</guid>
<pubDate>Wed, 07 Aug 2024 05:15:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>FatBoy-Cellular</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>945467f2d6db86b26ddd7ca774e5600fd3e270906b1ddfdfa004b8abb1f05838</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>fatboyc.com</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Johnson-Laschober--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16736</link>
<guid>5a2a44703e98c359e5e7bf6db01b3a15</guid>
<pubDate>Tue, 06 Aug 2024 23:19:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Johnson-Laschober--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>55f721ab18613d5fca1908afee46bdcb69349534eb656d4349827dce4fa5c8f1</i><br /><br />Threat actor <b>description</b>: <i>Johnson, Laschober & Associates, P.C. (JLA) is a professional architecture, engi...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Reef-PCG-pcg.local</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16739</link>
<guid>0fc163f5d52156860e72d1993e30ed6a</guid>
<pubDate>Tue, 06 Aug 2024 23:18:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>Reef-PCG-pcg.local</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b3de4af8103deaa162739a2161e271413f4f37ee8b18dcb5fe5d36ccb681c4f9</i><br /><br />Threat actor <b>description</b>: <i>Reef Capital Partners and its subsidiaries specialize in creating and managing v...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alternate-Energy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16730</link>
<guid>6d80fca29ede446759da7bf81c4a1b1e</guid>
<pubDate>Tue, 06 Aug 2024 20:50:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Alternate-Energy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c95d676334e69ece9d98fa110fa1e71d9babbaee114fed4179ee9918cf32f4a9</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.alternateenergyhawaii.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>True-Blue-Environmental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16734</link>
<guid>4664965ba7a274dfbd20c33b5d05f253</guid>
<pubDate>Tue, 06 Aug 2024 20:48:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>True-Blue-Environmental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>28658a4f63108c82fed1e5b7cd9b8cd6c0a08a44da6b1941a385dfb272784af9</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.trueblueenvironmental.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>KinetX</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16733</link>
<guid>851612d3c194dc64724360831ff04bf8</guid>
<pubDate>Tue, 06 Aug 2024 20:47:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>KinetX</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d8a676d7c30041d10c12382732a2e798a41ec19a9a704b09e038b4492d5b54ea</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.kinetx.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Omni-Family-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16731</link>
<guid>76c1922dbf7e6b9d65c1c0d06e8f9118</guid>
<pubDate>Tue, 06 Aug 2024 19:21:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Omni-Family-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e406d9dd4c29cfb5dc69c787e56bf53e57ba78d5fb50d29f4f6b5fd084545c5</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>https://www.omnifamilyhealth.org</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ziba-Design</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16727</link>
<guid>6876925aadb300b04d29c8cb3427d8da</guid>
<pubDate>Tue, 06 Aug 2024 16:22:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Ziba-Design</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87100cf2c2d8c08f7e256916c2fd9dc02d8a830c5303594e829c30aa41d38a7b</i><br /><br />Threat actor <b>description</b>: <i>22 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Silipos</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16719</link>
<guid>735618b34fba373bd967813620ba0417</guid>
<pubDate>Mon, 05 Aug 2024 19:43:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Silipos</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b26ccd96300213690d8ddeef60784517190f8eac406cccd1ddc2d45cb647aee3</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1989, Silipos is the global leader in gel technology across a wide range of industries including orthopedics, prosthetics, and skin care. Silipos is currently expanding with a broad range of lines from athletics to equestrian care.  We manufacture over 300 products in Niagara Falls, N.Y. which are sold to over 7,000 customers in 90 countries worldwide.  Our Niagara Falls production facility houses gel research and development, as well as base gel manufacturing and finished products conversion.  Silipos is a leader in innovative gel manufacturing with unmatched product quality and healing properties.  Silipos is committed to continually improving peoples’ lives with new and innovative gel solutions.  Within the healthcare industry, Silipos is the most trusted source for medical gel solutions among healthcare professionals. We have built our reputation on innovation, quality, and outstanding customer service.  If companies do not contact us, the data will be published!</i><br />Target victim <b>website</b>: <i>https://silipos.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>kierlcpa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16715</link>
<guid>0199289fa8c8a6c025c5df1c04485588</guid>
<pubDate>Mon, 05 Aug 2024 17:52:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>kierlcpa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0d3e8a5344b6487c6e9f021464001b584a56ee8f501bd2cf577a6d18cd76ce5</i><br /><br />Threat actor <b>description</b>: <i>Get In Touch. At T. Philip Kierl Jr. & Associates, CPA's, we've been serving the accounting needs of Oklahoma City, OK and the surrounding areas for years. If you need help managing any aspect of your home or business's finances, we want to hear from...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Square-One-Coating-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16716</link>
<guid>f749025817f607fff3160d1e5244a9f6</guid>
<pubDate>Mon, 05 Aug 2024 17:37:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Square-One-Coating-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f28bf8cf2d03b38348b51bf861729b2cefb916a3e4d7dcbeed960d5ac18e561</i><br /><br />Threat actor <b>description</b>: <i>Downloaded all your company's customer information and part of your financial data.  If companies do not contact us, the data will be published!</i><br />Target victim <b>website</b>: <i>https://www.squareonecoatingsystems.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>HP-Distribution</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16711</link>
<guid>2da909b30de3798807581c1c14e0161c</guid>
<pubDate>Mon, 05 Aug 2024 09:47:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>HP-Distribution</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d89c25bdc4df86f8a52013a0d5f4996876075c02372c2f81fd389a4f65a877a5</i><br /><br />Threat actor <b>description</b>: <i> HP Distribution is a family owned and family operated asset based trucking company in Kansas City, KS. In 2000 the Cunningham's decided to start a gift box steak company. This give box steak company evolved into a Poultry production facility. Due to the volume of product moving in and out of the facility, transportation department was added in 2003. Today it employs over a 100 people and operates 75 trucks and 100 refrigerated trailers. HP Distribution understands the importance on time delivery and good communication. Tracking devises installed on all of our equipment helps provide instantaneous updates on all shipments. At HP "We are small enough to care, but large enough to cover" any and all of your Transportation needs. In house brokerage that works with a tight network of approved Carriers helps fill capacity where we don't have trucks. Having a 100,000 sq ft cold storage and cross dock facility gives HP an edge to handle any shippers demands. HP is a proud partner Smart way and strives to be as friendly as possible to our environment.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Maryville-Academy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16708</link>
<guid>bf34e4c28fa03210f476777d37953134</guid>
<pubDate>Mon, 05 Aug 2024 06:54:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Maryville-Academy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f8262f64eaed4ce590d81f4b3c5a1866425738b7cfd045d8d3571719120643d6</i><br /><br />Threat actor <b>description</b>: <i>Maryville Academy Maryville is a child care organization rooted in Catholic social teaching and dedicated to the preservation of the dignity of children at every age.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ranney-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16703</link>
<guid>a1018bd684f0c6a62f01999a180e764b</guid>
<pubDate>Sun, 04 Aug 2024 14:43:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Ranney-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>359149f1ba6c86f3dc44158e179f34b0ea9f090e9cf826efc9f59ba38f960202</i><br /><br />Threat actor <b>description</b>: <i>Ranney School Ranney School is unique in our area. We are the only Age 3 through Grade 12 independent, co-ed, secular college preparatory school in Monmouth County, NJ.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>nursing.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16698</link>
<guid>47aea24ee4f77d9109518129a3d9c222</guid>
<pubDate>Sat, 03 Aug 2024 18:52:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomexx</b> claims attack for <b>nursing.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22b43dc6921bb2047fd36dae27787394d56e39d09987350e7548bd199cb0373a</i><br /><br />Threat actor <b>description</b>: <i>NURSING.com is an all-in-one online platform designed to help nursing students succeed in their studies and pass the NCLEX® exam with confidence. It provides a variety of resources, including video lessons, practice questions, cheat sheets, and custom study plans tailored to individual learning needs. The platform is particularly beneficial for visual learners, students with ADHD, dyslexia, and those who experience anxiety. Database dump, 568221 users.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomexx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bettis-Asphalt</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16697</link>
<guid>d0bfcb426cd8154f5350db5a73e29b4d</guid>
<pubDate>Sat, 03 Aug 2024 10:30:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Bettis-Asphalt</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f5b9679889d3034c3da2d8aec667cc7931d77f25fe01132bc64b7049c689ac6</i><br /><br />Threat actor <b>description</b>: <i>Bettis Asphalt & Construction, Inc. was formed in 1979 as a family-owned hot mix asphalt paving and maintenance operation.</i><br />Target victim <b>website</b>: <i>bettisasphalt.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>LRN</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16695</link>
<guid>07be74f1a1b5e0a89a5f78ce1725a7eb</guid>
<pubDate>Sat, 03 Aug 2024 08:47:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>LRN</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>641b9a6b125dfa83e302c2df7e2bb1dbbf9202ec3cd46c4b5da7cd4bbe3211d4</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.lrn.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>aikenhousing.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16694</link>
<guid>8aa71aee354f4cae862cabcf498ae1f6</guid>
<pubDate>Sat, 03 Aug 2024 04:02:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>aikenhousing.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab18d988c419f00078474b3b105e0f3ca49fdd9e24f4ebad0189e61ecc38f8ce</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://aikenhousing.org/</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>David-E-Shambach-Architect</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16692</link>
<guid>ef05e93f3eb69985c3dcc58b11aac369</guid>
<pubDate>Fri, 02 Aug 2024 23:37:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>David-E-Shambach-Architect</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b78d21ab05050c7ed9bfa1f5e8e4f43088d33ac6c0e99ae850c475578451796a</i><br /><br />Threat actor <b>description</b>: <i>David E. Shambach, Architect, Inc. [DESA] is a well-respected architecture firm in Tucson, Arizona. Established in 1993 and incorporated in 1994, DESA has continued to expand and develop our abilities in architecture, planning, interior design, project management / administration, sustainability, estimating, and construction. This broad depth of talent, knowledge, and experience enables DESA to successfully create, develop, and manage projects from initial client consultation through design and construction, culminating in functional, sustainable, and dignified buildings and spaces.</i><br />Target victim <b>website</b>: <i>www.shambach.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hayes-Beer-Distributing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16693</link>
<guid>2e970f99fa7f2805d8be0cc8a73f770f</guid>
<pubDate>Fri, 02 Aug 2024 23:37:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Hayes-Beer-Distributing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ecfb450be33791d1e4588985346d840055609a744ff1442f72a90035d4d942e</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1956, Hayes Beer Distributing is one of the leading distributors of a large variety of beers in Chicago. It offers more than 100 brands of beer, including Blue Moon, Bohemia, Buckler, Carta Blanca, Corona Light, Fosters Bitter, Hacker-Pschorr and Miller Lite. The company also provides beer from brands, such as Pacifico, Red Dog, Verdi, Tsingtao, Tecate, Steel Reserve and Molson Canadian.</i><br />Target victim <b>website</b>: <i>hayesbeer.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>CPA-Tax-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16690</link>
<guid>82d6d16e08359f7efcaabde5c946c10e</guid>
<pubDate>Fri, 02 Aug 2024 21:23:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>CPA-Tax-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>274631a5f0b785ea539a393b63fa83e4a9927b5091f84a7516a92d200c183ed5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>cpatsllc.com</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>retaildatallc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16684</link>
<guid>c0daa585594b41bea3aeaf7af2a12e29</guid>
<pubDate>Fri, 02 Aug 2024 16:51:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>retaildatallc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b66dec493f76baa97b22e30c14898d3964598b70e05f9331cb60d364b0bdfa02</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Keystone-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16685</link>
<guid>f37baa052ef9fff7d5671e655907c6f2</guid>
<pubDate>Fri, 02 Aug 2024 15:41:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>Keystone-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d46d5c68946c8615291ab47f013bdbad9de4ebb848450e0b9cc12a256b0c022a</i><br /><br />Threat actor <b>description</b>: <i>Keystone is a family business with over 65 years of proven manufacturing and composite material fabrication experience in the oilfield industry.Since 1950 Keystone Engineering Company has maintained a proven reputation for reliable products in the oilfield industry. Product experience includes the manufacture and production of formation measurement instrument assemblies for wireline, MWD, and LWD; and the manufacture and production of high-temperature, 400° F (204° C), composite bridge plugs. -drawings-financial documents-personal information of employees-quickbook backups http://keystoneeng.com/</i><br />Target victim <b>website</b>: <i>http://keystoneeng.com/</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kemlon-Products--Development-Co-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16687</link>
<guid>12e369da0630f39bda204840c316a6ed</guid>
<pubDate>Fri, 02 Aug 2024 15:41:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>Kemlon-Products--Development-Co-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>237e78ba8c134a07fe079cf6d05657cd62ade3452b06e5aeed1106af2b558b07</i><br /><br />Threat actor <b>description</b>: <i>Kemlon is a well-established multidiscipline manufacturing company founded in 1950 and specializing in manufacturing high quality electrical connectors, sensors, probes and related components for hostile environments.Kemlon employs 14 graduate engineers with the average experience level exceeding 21 years at Kemlon. With this level of experience, we approach problems from a standpoint of engineered leadership. Our technical expertise allows our customers to rely on Kemlon for turnkey solutions to complex problems that arise in their assemblies.Revenue: $23.3 Million-drawings-financial documents-personal information of employees https://kemlon.com/</i><br />Target victim <b>website</b>: <i>https://kemlon.com/</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Valley-Bulk</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16676</link>
<guid>a5ee6457150a2d96a0015872541956c3</guid>
<pubDate>Fri, 02 Aug 2024 04:14:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Valley-Bulk</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ac9ff0a657331ba1999f9fc9ccd92531035f8fe1878d35b3f0c4ace1d31e551</i><br /><br />Threat actor <b>description</b>: <i>Valley Bulk was founded in August of 1995 by the Golson family. At that time, our small company started with two trucks in the bottom dump industry hauling clay to various landfills in Los Angeles and Ventura counties. As time went on, we grew and transitioned into hauling dry bulk products. We now have over 75 trucks, and more than 100 employees, that work together to transport many different products including cement powder, fly ash, gypsum, silica sand, iron ore, cinders, aggregates, palletized goods, and some non- hazardous liquids. We utilize pneumatics, bottom dumps, end dumps, transfers, and curtain side flatbed trailers.​  If a company does not contact us, we will publish the data.</i><br />Target victim <b>website</b>: <i>https://www.valleybulkinc.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>effinghamschools.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16673</link>
<guid>1b58db3880e247fb67c3b8b57d6d1912</guid>
<pubDate>Thu, 01 Aug 2024 22:51:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>effinghamschools.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c310563e2f715cc2c55db23cb31f16c6a601deac6f9bd2c4e36f0ce9f1cf9dba</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Camp-Susque</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16668</link>
<guid>143f1e6c0c94814481445e0352cd626c</guid>
<pubDate>Thu, 01 Aug 2024 20:34:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Camp-Susque</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2082257440a7bb059c631699a95f389302e923db2627a210fa4ade09459bef47</i><br /><br />Threat actor <b>description</b>: <i>Camp Susque ( founded in 1947 ) is nestled in the  mountains of north-central Pennsylvania - provides to include wilderness trips, family camps, winter camps, homeschool classes, field trips, and retreats and rentals. Camp Susque corporate office is located in 47 Susque Camp Rd, Trout Run, Pennsylvania, 17771, United States and has 16 employees. The total amount of data leakage is 48.9 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>acsi.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16670</link>
<guid>5b18e1a3e2092783aea4b1aa4a894d8a</guid>
<pubDate>Thu, 01 Aug 2024 20:28:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>acsi.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>383fae8aeebf584f5343fcbd99a151ca104ce423962ff57ae20233a3b687ec03</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.acsi.org/</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>premier-equities</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16665</link>
<guid>c881617af0ae19b38dd0546548cd53ad</guid>
<pubDate>Thu, 01 Aug 2024 19:26:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>premier-equities</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>917807a7bad3a81a60339963ffef36cd6930eb9b3ae503930db19a6ee482379c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>EBL-PARTNERS-constructioninteriors-Florida</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16653</link>
<guid>1e5d71d3eda9d819ce132431c0b928db</guid>
<pubDate>Wed, 31 Jul 2024 18:18:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>EBL-PARTNERS-constructioninteriors-Florida</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56c438ef21cd6501075d487da79c11da3400f98e5b38dfaa77d308f54ced0db1</i><br /><br />Threat actor <b>description</b>: <i>Real Estate, developing and management. Florida.Financial Doc, Audit, Accounting Reports, BackUp, Project, Vendor Info, Customer Data Base https://eblpartners.com</i><br />Target victim <b>website</b>: <i>eblpartners.com</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>EFRON-LAW-FIRM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16652</link>
<guid>8d9538d163f6009cec27b8e61cbdd981</guid>
<pubDate>Wed, 31 Jul 2024 18:17:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>EFRON-LAW-FIRM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>66282930bcad1b30bb3d36db23f80ec5688fb08b9a9b4a0ffbdc00d8945cc831</i><br /><br />Threat actor <b>description</b>: <i>LAW FIRM Client Data, Financial Data, Personal Customer ID, Audit, Court Case etc... https://www.efronlawfirm.com</i><br />Target victim <b>website</b>: <i>https://www.efronlawfirm.com</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>wgma.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16654</link>
<guid>f277a0bf09ceeb7f90508c05044d3714</guid>
<pubDate>Wed, 31 Jul 2024 18:16:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>wgma.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d83f258d3f6096999b15c3e4b8b3febe31692bbb988d122476c800d2d90d9a65</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>biggreenegg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16655</link>
<guid>791427014ac440583f48f02159b233e6</guid>
<pubDate>Wed, 31 Jul 2024 18:15:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>biggreenegg.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>82a190ffab7507485ec18e783bc2c619753efe1f22f642a0086cee1a8d61de74</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>nydj.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16656</link>
<guid>dc7b367cfb9b38b3558bd127ad5c6696</guid>
<pubDate>Wed, 31 Jul 2024 18:14:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>nydj.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2e69737d8a6227b101c3f7dbe88398cc7797b2a4ad0c8782de69a927e8937778</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.pharm-int.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16657</link>
<guid>881e945c3b5ccf17103ecca2b675585f</guid>
<pubDate>Wed, 31 Jul 2024 18:13:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.pharm-int.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e6bf546955ca9961fb459dccbb2f776526e11b3f300e179907402e0af4e6a96</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Florence-Cement-Company-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16647</link>
<guid>b338e58b59a9ca0892d2f528f6ae2ae4</guid>
<pubDate>Wed, 31 Jul 2024 16:50:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Florence-Cement-Company-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97a9c4c3601384e28bb3dc1c39ce6e82c27aefab00105ee06a5450c7487ce6bb</i><br /><br />Threat actor <b>description</b>: <i>Florence Cement Company, Inc. is very committed to providing continued service and quality to its clients well into the next millennium. Since 1966 we have focused on constructing and reconditioning concrete and asphalt roads in newly developed subdivisions, metropolitan and rural arterial roads, and local street rehabilitation projects.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Find-Great-People</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16646</link>
<guid>99e9ed2e0253ae5f4b421592cf6ca2de</guid>
<pubDate>Wed, 31 Jul 2024 16:13:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Find-Great-People</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8d0857d8859cd3f7f0a260d59f6e606a5dfae07ccf30be763b54871035969db3</i><br /><br />Threat actor <b>description</b>: <i>Find Great People is a talent acquisition and human resources con sulting firm. Confidentiality agreements, confidential clients da ta, employment documents filled with full set of personal  inform ation and other interesting files. Everything is about 32Gb. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Durham-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16649</link>
<guid>bd896f3dbc16b0042625fbf0a8ab8b3a</guid>
<pubDate>Wed, 31 Jul 2024 16:09:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Durham-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a73f72100d812fcf439feff740331f79cb1c8822a7be3f80d6afe66c8f502845</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>https://www.durhammfg.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kleven-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16648</link>
<guid>8b43e1b8dd88fb9f6c99eb66f448a04c</guid>
<pubDate>Wed, 31 Jul 2024 16:08:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Kleven-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f3abb1912f1f4925c88bd2dc450ca307f837a53bd63199032cac6156c101e739</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.klevenconstruction.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.srmedicalcenter.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16635</link>
<guid>32cfe1632e63ffeea8bd9f57d652cc34</guid>
<pubDate>Wed, 31 Jul 2024 12:13:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>www.srmedicalcenter.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed75d66542d9117d490771b0f9eda41c915a97294e2ef898255dd78c211210fb</i><br /><br />Threat actor <b>description</b>: <i>The company Schneider Regional Medical Center was attacked by us, all infrastructure of the network was blocked. There were stolen the data, among which confidential information, private contracts, agreements, financial documentation, e-mail             ...</i><br />Target victim <b>website</b>: <i>http://www.srmedicalcenter.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>sandytownshippolice.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16638</link>
<guid>b3432faaca931632a24fc96b3d1c71ef</guid>
<pubDate>Wed, 31 Jul 2024 12:08:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>sandytownshippolice.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f372f7364d26c20aac1ed08501c56a4c2e4c25c1ffc73c6132a8f66bdcc560c8</i><br /><br />Threat actor <b>description</b>: <i>Sandy Township Police is proud to partner with and serve our distinct neighborhoods of Oklahoma, West Sandy, West Liberty, Kiwanis Park, Adrian, Iselin Heights, Singing Hills, Clear Run, Indian Hills, Sabula, and Treasure Lake. The Sandy Township Pol...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>frilot.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16640</link>
<guid>d1aae872c07c10af8bc9918fdb28c28c</guid>
<pubDate>Wed, 31 Jul 2024 12:07:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>frilot.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>edf7520d891bdaf7e67a0e66f75ab5e2b5326f9f87e22649121eee71ee6ba36c</i><br /><br />Threat actor <b>description</b>: <i>Frilot LLC. Frilot LLC is a law firm located in New Orleans, Louisiana and offers full service representation in all areas of litigation on a local, regional and national basis. We act as business advisors and strategic partners for a wide range of p...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>eastern-sales.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16644</link>
<guid>30b791a885974b40f58ca90a28ec695d</guid>
<pubDate>Wed, 31 Jul 2024 12:05:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>eastern-sales.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca2c0d05071049090ad1bb04b0482501db6aad6555fb672d6382941e1c93dea8</i><br /><br />Threat actor <b>description</b>: <i>East Hardware opened its doors in 1967, servicing the general public and heavy mining industry with quality products and excellent service. In 1999, Eastern Sales began its operations with the same level of commitment, serving the industrial markets...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Columbus-Ohio</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16634</link>
<guid>bd6c2fd1ded9513bc167f856167cf5dc</guid>
<pubDate>Wed, 31 Jul 2024 10:42:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>City-of-Columbus-Ohio</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a577df9b31f853f3ad3fd6feafbc42273d7f12d2a96f416ac3a28547314a360f</i><br /><br />Threat actor <b>description</b>: <i>City of Columbus, Ohio</i><br />Target victim <b>website</b>: <i>columbus.gov</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>National-Beverage</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16679</link>
<guid>05ed40159ccfbe2f7830d1c8701c5a54</guid>
<pubDate>Wed, 31 Jul 2024 10:13:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>National-Beverage</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a3850bf4ab905d5d8c036ff738986659d2490d7abd4e76259f480101e92af9e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>St.-Thomas-Aquinas-High-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16636</link>
<guid>f295553be4c2f4e76f6d15d3dc22e9dd</guid>
<pubDate>Wed, 31 Jul 2024 10:12:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>St.-Thomas-Aquinas-High-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f8e17bf5a08db37f88a828dc5fe57c537ce1b29c0ad48a7f35113e6caf603d62</i><br /><br />Threat actor <b>description</b>: <i>St. Thomas Aquinas High School (founded in 1936) is a private, Roman Catholic, college-preparatory high school in Fort Lauderdale, Florida. The school currently enrolls 2,420 students on its 25-acre (100,000 m2) campus. Saint Thomas Aquinas High School corporate office is located in 2801 SW 12th St, Fort Lauderdale, Florida, 33312, United States and has 257 employees. The total amount of data leakage is 103.8 GB</i><br />Target victim <b>website</b>: <i>aquinas-sta.org</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lake-Washington-Institute-of-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16631</link>
<guid>8e225b8af6194ce00a5867fc85840757</guid>
<pubDate>Wed, 31 Jul 2024 04:44:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Lake-Washington-Institute-of-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9bbd090af93ddb042065ef7293a9f33cd6f2aadde5dd8ed963bffd034a0c6942</i><br /><br />Threat actor <b>description</b>: <i>For more than 70 years, LWTech has prepared students to go into the workforce, ready to succeed in their careers.As the only public institute of technology in the state of Washington, LWTech offers 11 applied bachelor’s degrees, 41 associate degrees, and 83 professional certificates in 41 areas of study, including STEM-focused programs in Science, Technology, Engineering and Math. </i><br />Target victim <b>website</b>: <i>https://www.lwtech.edu/</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>leonardssyrups.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16621</link>
<guid>1a5ee1ff6e413deb105e03f4bc5be351</guid>
<pubDate>Tue, 30 Jul 2024 19:36:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>leonardssyrups.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a9c2401c4d7a4e159a9c57ab6cd366d6ae5a001cb2791ae4b4f3310fe8e951f</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/LEONARDDOMAIN/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/LEONARDDOMAIN/PROOF/DATA DESCRIPTIONS: Employees personal and corporate data, Personal Identifiable Information, accounting, financial documents, customer data, contracts, corporate correspondence, database exports etc.</i><br />Target victim <b>website</b>: <i>leonardssyrups.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>westernwyomingbeverages.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16622</link>
<guid>dae43844e99e2120bb9f2e00b05d7ca3</guid>
<pubDate>Tue, 30 Jul 2024 19:35:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>westernwyomingbeverages.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a5e6aa5de70948b11c32316a4947dbedbc614d2f1b96c59aeadb1067ad4f9e3</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/WWBEV/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/WWBEV/PROOF/DATA DESCRIPTIONS: Database exports, Employee personal files, personal Identifiable Information, financial data, customer data, contracts, corporate correspondence, etc.</i><br />Target victim <b>website</b>: <i>westernwyomingbeverages.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>denkaiamerica.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16624</link>
<guid>784ff39684c7a23cfa09e77719256e20</guid>
<pubDate>Tue, 30 Jul 2024 19:34:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>denkaiamerica.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da76cfe835263ef32e85d129434eac70dba76d934221e73cc98c757712c74c43</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/DAI/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/DAI/PROOF/DATA DESCRIPTIONS: Personal identifiable information, corporate confidential data, customers data, contracts, employees and executives personal files, financial documents\statements, corporate correspondence, etc.</i><br />Target victim <b>website</b>: <i>denkaiamerica.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>welevelup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16618</link>
<guid>2a3500f75bcde2b99b4999f34133a1d2</guid>
<pubDate>Tue, 30 Jul 2024 15:13:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>welevelup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>11dd05752b373294e9955b1b44bd97832b131834c94c8e1df3493a16d7bfda7e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.chsd117.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16615</link>
<guid>c63858b17de9d0649b59be0c57201b9d</guid>
<pubDate>Tue, 30 Jul 2024 13:42:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>www.chsd117.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1dd37cabb2b1bfebd3730f24a95bc7c35dd382f4256b42fb944b0e727cdf7a1e</i><br /><br />Threat actor <b>description</b>: <i>Community High School District 117, being a community of learners with a vision of excellence, is committed to providing an educational experience that encourages all learners to develop to their fullest potential, to engage in lifelong learning, and to be responsible members of society.</i><br />Target victim <b>website</b>: <i>http://www.chsd117.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>SAGE-Publishing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16612</link>
<guid>86fd6c86e53687c67e50bd29a08b133e</guid>
<pubDate>Tue, 30 Jul 2024 11:13:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>SAGE-Publishing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>511f2fae267a316f44ec5fb078599351a791a1c8094d16373490198873584ee3</i><br /><br />Threat actor <b>description</b>: <i>SAGE Publishing is an independent, academic, and professional pub lisher of high-quality content. We are going to upload their inte rnal high-quality content to our blog. Financial data, agreements and so on. Everything we took from them will be available within a few days. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Gill-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16602</link>
<guid>409ad2875df93d6f6365224f613070c1</guid>
<pubDate>Mon, 29 Jul 2024 18:50:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>The-Gill-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>44a08fcfff693be6df7e9cacdbec288bfa19038b97192cdb1e275cf16ac39aea</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.thegillcorp.com/</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Priefert</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16600</link>
<guid>118d579a49f315ad23ee0ef10f564bdc</guid>
<pubDate>Mon, 29 Jul 2024 14:46:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Priefert</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a050b563571b288389f4eaed43062cfb8ef90ec0964588dc920d80b256e9a76</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.priefert.com/</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>True-Blue-Environmental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16596</link>
<guid>0422e8355e7a19bcd12e88813692f0e0</guid>
<pubDate>Mon, 29 Jul 2024 05:54:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lynx</b> claims attack for <b>True-Blue-Environmental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4505fb97372b56364292ec55e0ab77611945615b13eb4b9a3316e24fe5283e66</i><br /><br />Threat actor <b>description</b>: <i>True Blue Environmental Services is a full-service environmental and constructio...</i><br />Target victim <b>website</b>: <i>https://www.trueblueenvironmental.com/</i>]]></description>
<category>lynx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ascent-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16594</link>
<guid>f5b1211c3952ce30f829cd3c757a1a7f</guid>
<pubDate>Sun, 28 Jul 2024 18:10:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>raworld</b> claims attack for <b>Ascent-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>507bd4b3f78c535ab074a66cffad0363ad2bdb3c3dfaf64005e74e4d2000af9f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>raworld</category>
</item>
<item xmlns:dc='ns:1'>
<title>zoppo.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16593</link>
<guid>f195a5545321221316855b446880a0b3</guid>
<pubDate>Sun, 28 Jul 2024 08:44:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>zoppo.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>133bdae5318eb4b201c7bc696a86381c4f84015da715a40d48e55dee4d1baa87</i><br /><br />Threat actor <b>description</b>: <i>zoppo.com 233Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>hanoverhill.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16591</link>
<guid>9f4b356ab8dd0857dea8eed6cfc241de</guid>
<pubDate>Sat, 27 Jul 2024 18:15:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>hanoverhill.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>748790e5d822b3db2a4c9f1e73bc687b76f069df73a436fd90d4daadbf32c3d1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://hanoverhill.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-Jersey-City-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16590</link>
<guid>6f3e9169e4fcfbe4a52606c013348650</guid>
<pubDate>Sat, 27 Jul 2024 16:41:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>New-Jersey-City-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>86c8912e1040edb8018992d6f310236ac631c99a184af80e00867735d8ac0d6d</i><br /><br />Threat actor <b>description</b>: <i>New Jersey City University</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Computer-Networking-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16588</link>
<guid>7a71bed212ae4dc677694b682cad7aee</guid>
<pubDate>Sat, 27 Jul 2024 10:43:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Computer-Networking-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c5a80e48082a4b97cf55326278ea455f43df9ade45d5d3248cd7b14b68ca26a</i><br /><br />Threat actor <b>description</b>: <i>Computer Networking Solutions Computer Networking Solutions, dba LightSpeed DataLinks (LDL) is a small business located in Columbus, Georgia. LDL has been in business since 1998 and is an active Cisco reseller.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kalaswire.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16651</link>
<guid>a6585f71fb9fd3d7782eace9cce70e07</guid>
<pubDate>Sat, 27 Jul 2024 08:40:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Kalaswire.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e81e53e5ffe3e091a6f0b9e8db284f0df22630072777453c8004a81460616418</i><br /><br />Threat actor <b>description</b>: <i>Country: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Community-Care-Alliance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16586</link>
<guid>4da6c4d07033d355453ce49273d591c6</guid>
<pubDate>Fri, 26 Jul 2024 22:16:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Community-Care-Alliance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>978543daa32f8d628fd65c22e5b6d55d193d8071cc7731bb3787ad5871fae659</i><br /><br />Threat actor <b>description</b>: <i>Community Care Alliance Community Care Alliance is a unified human service agency integrating resources, supports and programs to strengthen families.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.neurologicalinstitute.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16583</link>
<guid>1c00efe49a21ecbce0768a32f42854d3</guid>
<pubDate>Fri, 26 Jul 2024 22:15:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.neurologicalinstitute.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a424618fe05603eb6af448597329db62e1e6b15f2d9dd7e6f4c8a186dc6f3d1a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.whittakersystem.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16584</link>
<guid>81145517f4fafde4ade30b01762b7b0b</guid>
<pubDate>Fri, 26 Jul 2024 22:14:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.whittakersystem.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>847187e77fa35e29676f3e9c788f35ff0019f6c4333a6ae8c4f25a58f086265e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>pioneerworldwide.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16581</link>
<guid>183539e54667dddc02d46f94bc0d43c5</guid>
<pubDate>Fri, 26 Jul 2024 15:17:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>pioneerworldwide.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b838d32abf832fea12c67937e9ba3558a99a5198ca1fa618b0ecb706fe39c233</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1917, Pioneer Balloon Company is the world's premier manufacturer of latex balloons, with a diversified range of products that includes Microfoil® balloons and Bubble Balloons. Additionally, Pioneer offers innovative product solutions to customers in the advertising, entertaining, decorating, and social expressions markets. Headquartered in Wichita, KS, USA, Pioneer has facilities in the United States, Canada, England, Australia, Mexico, and Brazil. - 1.65 TB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>summervillepolice.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16580</link>
<guid>ec6ecdc8e04d45830fd347dd0622d829</guid>
<pubDate>Fri, 26 Jul 2024 14:42:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>summervillepolice.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9bc0e15f435d11aee0708f8dd7b1d18179a2ceb171285ca57cbe0973d0d57ec5</i><br /><br />Threat actor <b>description</b>: <i>The Summerville Police Department is committed to building relationships with community members while providing the highest level of service in shooting black children.  - 1.71 TB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>blankstyle.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16577</link>
<guid>825a241b47ed8e9e7a24b4c84f99fdd2</guid>
<pubDate>Fri, 26 Jul 2024 14:40:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>darkvault</b> claims attack for <b>blankstyle.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4157dcc3f9a2aeaa34d6fa4137bdf34b946a3fbf66650a764662d6cff0744e0d</i><br /><br />Threat actor <b>description</b>: <i>Blankstyle and its founders have a collective history in the wholesale distribution and manufacturing world of thirty plus years. We are constantly evolving our offering and our service to meet the needs of our customers. Headquartered in Southern ca with roots in the local surf and skate industry we have expanded nationwide and now boast an expansive distribution network strategically located throughout the United States with the goal of providing fast easy access to an excessively large selection of blank t-shirts and other apparel.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>darkvault</category>
</item>
<item xmlns:dc='ns:1'>
<title>Augusta-Orthopedic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16579</link>
<guid>1210c03fd21f9347c7e39edc2740fd4e</guid>
<pubDate>Fri, 26 Jul 2024 14:39:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Augusta-Orthopedic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bfa29465142a6371a45aa3e8047d1507a2b60ef02b98663dc2539fb548bf107c</i><br /><br />Threat actor <b>description</b>: <i>Augusta-Aiken Orthopedic Specialists is a comprehensive medical and surgical practice devoted to the care of musculoskeletal problems.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Karvo-Companies-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16578</link>
<guid>0c38ecb0aeee229a1d80bccce69afcaf</guid>
<pubDate>Fri, 26 Jul 2024 14:38:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Karvo-Companies-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8edf39cc042f937d765fc1d9f458e19c28cc53d16d5e444ea5e68956e6ce683</i><br /><br />Threat actor <b>description</b>: <i>Karvo Companies, Inc. is a dynamic, growth oriented general contractor specializing in heavy highway construction.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Villarreal-and-Begum-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16575</link>
<guid>05b0f710bc289f9c061e6d052ee60de7</guid>
<pubDate>Fri, 26 Jul 2024 10:01:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Villarreal-and-Begum-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8f96bcba3b6b878e921f6b87ce8568e3a184a4ac6917cefc82ffb8c08d6fe86f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Global-Industry-Analysts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16562</link>
<guid>0b774deb49c7b25bd808ba1079ccf236</guid>
<pubDate>Fri, 26 Jul 2024 06:21:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Global-Industry-Analysts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d2eb01c10231b7f53c01ea46df13178790ee4a0a2ad4810c9442cb791a343227</i><br /><br />Threat actor <b>description</b>: <i>669</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Miami-Gardens-Florida</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16564</link>
<guid>cf4fc664e650d7434b53c92030928a84</guid>
<pubDate>Fri, 26 Jul 2024 06:21:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Miami-Gardens-Florida</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a993470cd9a495a6b2ddabc5977b26c80afcf83fa77336cfa08f4eba098d13ce</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Andersen-Tax</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16566</link>
<guid>aeb66737d37cac958fe772e12c5c16dd</guid>
<pubDate>Fri, 26 Jul 2024 06:21:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Andersen-Tax</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f124681b651c59f769cd34415bcaeb96541c57b1bf9532315fd860ae2dab3df1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Physical-Medicine-Rehabilitation-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16567</link>
<guid>06b44f22bf01b4bad31391ffe00009c4</guid>
<pubDate>Fri, 26 Jul 2024 06:21:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>The-Physical-Medicine-Rehabilitation-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8514668a25a11c8528f2ba1edadb6dcd93c7564a42dc5b2e5b9872623ba60dde</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Speed-Advisory</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16561</link>
<guid>c4319612f21942de0337c7da0997a4d1</guid>
<pubDate>Fri, 26 Jul 2024 01:32:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Speed-Advisory</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0550488a79c5c739838d80fc7fb53fea8b2c4a0ef3d774da86769ce856faa8fd</i><br /><br />Threat actor <b>description</b>: <i>Company has the last 24 hours to contact us using the instructions left.In case of silence, all data will be publishedTotal amount of stolen data : 150 GB https://www.speedadvisors.com/https://hubercpas.comhttps://dspeedcpa.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>mrhme.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16558</link>
<guid>79e6455ae8831ef88ed8ae05359dce4c</guid>
<pubDate>Thu, 25 Jul 2024 21:44:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>mrhme.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e6f6bac3e64958ea3856acf521384385d01475e79a6ba014902cfe98f7961ee</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Computer-Merchant</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16560</link>
<guid>6cc1e8dc080b62a0f0b7077a05af681e</guid>
<pubDate>Thu, 25 Jul 2024 21:44:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>The-Computer-Merchant</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e5ccb903f5450672700e69b287854545a26caa8675727af77cdbff89b4b321d3</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.itstaffing.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Williams-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16559</link>
<guid>dc0fc2d90d6102ba02d0206857eaac51</guid>
<pubDate>Thu, 25 Jul 2024 21:43:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Williams-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d3182b40091c3db4dcae1c51ef01dce71da88229220429fa2073bbbbc430895</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.williamsconst.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gateway-Extrusions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16544</link>
<guid>aafca7a855d7126422ccb0eb889babb4</guid>
<pubDate>Thu, 25 Jul 2024 20:49:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Gateway-Extrusions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>206d1190fc83c3f363e71ce590235eb6946d095d0710f56075f47b2d28c5326d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.gwextrusions.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>panitchlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16550</link>
<guid>043c2a4b43e04178cc4d160094980b01</guid>
<pubDate>Thu, 25 Jul 2024 19:20:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>panitchlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ab82b9cd57acc0d1515412f582e3a55f1e37ff6ba16ca21e4bb67f3c2b580d3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>cminsulation.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16551</link>
<guid>18f3106583e7ef8385617e24447cfdba</guid>
<pubDate>Thu, 25 Jul 2024 19:19:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>cminsulation.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a90087d5a1862ff8e18709df701f346e17e94e9b37fd8e5719af687a15e291a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Golden-Business-Machines</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16556</link>
<guid>cdd2216bce00598e1d27af72cd761323</guid>
<pubDate>Thu, 25 Jul 2024 19:18:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Golden-Business-Machines</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a83ed17ec89e48eba2d047b28ef94c329c5083d4a1e3e4aa82a6154fe3d823c2</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.goldenbusiness.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Odyssey-Fitness-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16555</link>
<guid>38263fe4cbb83c788f84dfca014e5502</guid>
<pubDate>Thu, 25 Jul 2024 19:17:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Odyssey-Fitness-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>64e8b74abc93f526b6ca64c4b071fb9d134e968ad7e10c7fcf1fa371862938c2</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.odysseyfitnesscenter.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>OfficeOps</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16554</link>
<guid>9d9a7c23c3fef5fcdccf9ed4631a33b1</guid>
<pubDate>Thu, 25 Jul 2024 19:16:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>OfficeOps</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe3061736a1aae697fc67144515379190c0eee66b35e6b73ab91a1d322328d87</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.officeops.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>BK-Aerospace</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16553</link>
<guid>603dac4761b4799bdecee0dc43b5f2e9</guid>
<pubDate>Thu, 25 Jul 2024 19:14:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>BK-Aerospace</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9144437067ba217301aa2a89452fe92920dde411b3ba28e12e281a63fa966c9a</i><br /><br />Threat actor <b>description</b>: <i>> What do you think about the classified documents, orders and much more by BOEING?
> What about the Hellfire Dummy Seeker blueprints? 

Offer a full range of complementary services to our customers for design, test, manufacture and assembly of complex hardware.</i><br />Target victim <b>website</b>: <i>b-kmfg.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>DK-Group-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16546</link>
<guid>80d92b3b368729c937e7a329f19a5eb7</guid>
<pubDate>Thu, 25 Jul 2024 19:13:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>DK-Group-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52348f0e56116d0a9023d0d347f5c451aa642ce08c497a6722121ebe68d0a623</i><br /><br />Threat actor <b>description</b>: <i>D&K Group, Inc. is a leading US manufacturer of quality print finishing solutions. All D&K products are made in the USA including thermal extrusion and pressure sensitive (cold) laminating films and adhesives, wide format and desktop laminators, automated one or two sided high-speed laminating systems, and much more.  If a company does not contact us, we will publish the data.</i><br />Target victim <b>website</b>: <i>https://www.dkgroup.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>Voss-Belting--Specialty</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16547</link>
<guid>af64b05ee108fa0c8e4a93c17cd0f963</guid>
<pubDate>Thu, 25 Jul 2024 19:12:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Voss-Belting--Specialty</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96a6bfb323630d683520f97de21139e59b2aeb4f34fbda1401ccb8e7bfaf1eec</i><br /><br />Threat actor <b>description</b>: <i>Voss Belting and Specialty Company is a specialty belt house providing quality solutions for flat conveyor belts, timing belts, and high temperature fabric since 1934. Voss Belting has taken a bold approach to meet the ever-increasing demands today’s technological advancements require. Through continuous research and development, Voss Belting & Specialty Company has emerged as a leader in the expansion of belting design and fabrication. Centrally located in Lincolnwood (Chicago), Illinois, Voss is eager to service your belting needs.  If a company does not contact us, we will publish the data.</i><br />Target victim <b>website</b>: <i>https://www.vossbelt.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>NARSTCO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16549</link>
<guid>5fb0c358e97c5b0b3b3c7d090209e6ee</guid>
<pubDate>Thu, 25 Jul 2024 19:11:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>NARSTCO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81207eac246db8f3278503fa868dd568e710d788b0b75904d69c54778490e777</i><br /><br />Threat actor <b>description</b>: <i>NARSTCO is North America's leading manufacturer and supplier of Steel Railroad Ties and Turnouts. NARSTCO Steel Ties are made in the USA from recycled steel.  NARSTCO works with Class 1 railways, transit authorities, short line railways, regional railways, and numerous industrial facilities.   If a company does not contact us, we will publish the data.</i><br />Target victim <b>website</b>: <i>https://www.narstco.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gendron--Gendron</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16541</link>
<guid>e5eded351df7f56b0b6f305774bb82a2</guid>
<pubDate>Thu, 25 Jul 2024 18:50:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Gendron--Gendron</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de88011005e7e438da9b69c7f31af69c845e275500ff41bb5065dca825b6fe13</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.gendroncorp.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Odessa-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16545</link>
<guid>ce726365003baf9e77b0db4a988e5e45</guid>
<pubDate>Thu, 25 Jul 2024 17:41:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Odessa-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46323e98b4b1d556ce294d78f34a54d6a8e2ee413743e5e84c7a6481bd67d42a</i><br /><br />Threat actor <b>description</b>: <i>18 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Environmental-DesignInternational</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16540</link>
<guid>e4cd3a630ddf5462537c9bfb9e8ab0ec</guid>
<pubDate>Thu, 25 Jul 2024 16:12:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Environmental-DesignInternational</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fba1689ff66392e59d01d310b6b6c760902b2625082169f58b53a510d2871461</i><br /><br />Threat actor <b>description</b>: <i>Environmental Design International inc. (EDI) is an MBE/WBE/DBE/W OSB certified professional engineering firm headquartered in Chic ago. NDAs and confidential agreements, employees personal documen ts, detailed financial data. Everything is over 60GB. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Empereon-Constar</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16533</link>
<guid>2e68f33efdc50e9cc7cd41196277d825</guid>
<pubDate>Thu, 25 Jul 2024 13:11:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Empereon-Constar</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0d1d76050675a689d11aa15a923fad49d7e90f0ccc2aaba07dd93542068011d3</i><br /><br />Threat actor <b>description</b>: <i>Empereon Constar is a leading business process outsourcing compan y providing end-to-end front and back office solutions. About 800 GB of data will be available for downloading. We hold many SQLs w ith clients data, employee files, detailed financial data. The da ta is more than interesting. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Norther-n-Bedford-County-School-District-nbcsc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16535</link>
<guid>60ec3eff9d5505195d32364a32670d36</guid>
<pubDate>Thu, 25 Jul 2024 12:16:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Norther-n-Bedford-County-School-District-nbcsc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>955a36ee536572794142eaae8899a0140d6fd2eed0d251ffff3497b83dfb01f7</i><br /><br />Threat actor <b>description</b>: <i>The Northern Bedford County School District is a public school district serving parts of Bedford County, Pennsylvania. The boroughs of Hopewell and Woodbury and the townships of Bloomfield, Hopewell, Woodbury, and South Woodbury are located within district boundaries. It encompasses approximately 112 square miles. According to 2000 federal census data, it serves a resident population of 6,556</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Physical--Occupational-Therapy-Examiners-ofTexas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16537</link>
<guid>376f71fb1586a12bdfb6285f6286a3be</guid>
<pubDate>Thu, 25 Jul 2024 12:16:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Physical--Occupational-Therapy-Examiners-ofTexas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>406713f1c3331e42570c87c2636c4d586047e4d6ce47ff6d6392d57a764ffec1</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://ptot.texas.gov</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>crimsonwinegroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16531</link>
<guid>aac8f7d518e4300ab8031d6709164f1d</guid>
<pubDate>Thu, 25 Jul 2024 07:19:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>crimsonwinegroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6471577f6e68b13c2f06cf05f4a9976819bfd030e3600e2e0d9f363bef029f80</i><br /><br />Threat actor <b>description</b>: <i>crimsonwinegroup.com.com 1.6Tb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pojoaque</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16527</link>
<guid>f8327022557b5b3edc49bc7a6b2d4fab</guid>
<pubDate>Thu, 25 Jul 2024 00:40:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Pojoaque</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5ddddd3e2ab3c6b1fc9bb473e5d19ac4df87b7ef8514ebd374f7bda60f387c85</i><br /><br />Threat actor <b>description</b>: <i>Despite repeated warnings, Pojoaque management has decided to ignore us, showing that they do not care about the data of their employees and partners. They have been repeatedly warned of the consequences of publishing the data. Remember, these are the people who don't care about anything but their own wallets.</i><br />Target victim <b>website</b>: <i>http://www.pojoaque.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>TheLutheranFoundation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16525</link>
<guid>85451bcd52e72bcd342be6c34f4ac0d8</guid>
<pubDate>Wed, 24 Jul 2024 22:48:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>raworld</b> claims attack for <b>TheLutheranFoundation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57465476fa3cf726477115b1793b1a16299908da5602fde25df866abe9647bef</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>raworld</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bunkhouse-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16522</link>
<guid>e04c14a66e1b274695546dc89e1c20ec</guid>
<pubDate>Wed, 24 Jul 2024 21:12:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Bunkhouse-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5cf3925d6de68e1556c98b8ef1ac2dbd6acfccff7a5ebc6fd2a2de07912ca427</i><br /><br />Threat actor <b>description</b>: <i>Bunkhouse Group is a company that operates in the Lodging & Resorts industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Playa-Vista-Job-Opportunities-and-Business-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16521</link>
<guid>ace668d845c284b9352de506cb046628</guid>
<pubDate>Wed, 24 Jul 2024 21:11:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Playa-Vista-Job-Opportunities-and-Business-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>774be301f1c286fc7e1abf18994e0759220fe7931fc7c14c8ccc0677a3786256</i><br /><br />Threat actor <b>description</b>: <i>PVJOBS is a nonprofit 501(c)3 public benefit corporation whose mission is to provide career-track employment opportunities for at-risk youth, adults and veterans in construction and related industries.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>SOLOMONUS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16511</link>
<guid>e58a9052057eab54f8b49e8c553d1837</guid>
<pubDate>Wed, 24 Jul 2024 19:42:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SOLOMONUS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45a01cd3d1161811609142433667541f9d877d1027fb01bd49192c671d2c5e5b</i><br /><br />Threat actor <b>description</b>: <i>_URL_</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Owens-Valley-Career-Development-Center--</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16512</link>
<guid>41621ff11046c80c435fa90489a3a20d</guid>
<pubDate>Wed, 24 Jul 2024 19:42:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Owens-Valley-Career-Development-Center--</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3007f40a6ebdf98b1e33c9611fb1b98230dc2d477883d458a8b37985245bde9</i><br /><br />Threat actor <b>description</b>: <i>Owens Valley Career Development Center  (founded in 1976) is a dedicated American Indian organization operating under a consortium of Sovereign Nations. Nowadays, OVCDC is a multifaceted business reaching into all aspects of social services and educational services, as well as economic development markets, providing Native American communities with a mechanism for bettering quality of life. Owens Valley Career Development Center corporate office is located in 2574 Diaz Ln, Bishop, California, 93514, United States and has 195 employees. The total amount of data leakage is 300.2 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>SKC-West</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16509</link>
<guid>36920c7628b5bc6824378f3411bbfa34</guid>
<pubDate>Wed, 24 Jul 2024 18:11:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>SKC-West</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3f0a41408f02253a500c3f529080348d08343c82add73513478543b9cfe09aa</i><br /><br />Threat actor <b>description</b>: <i>SKC-West is the premier supplier for all Industrial Hygiene, Envi ronmental and Safety equipment on the West Coast. Employee data,  lots of agreements, confidential files, financial data. Everythin g will be available for downloading soon. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Betances-Health-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16508</link>
<guid>bfb345dafd561613fc28430f37c43143</guid>
<pubDate>Wed, 24 Jul 2024 15:14:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Betances-Health-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da0592fae0db0f4ce85bc576c3b06fe3defc87c5173e800b49398b93340f39ba</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://betances.org</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Acryl</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16505</link>
<guid>448c25ee61b2572eef9076c03b7b8c67</guid>
<pubDate>Wed, 24 Jul 2024 14:13:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>American-Acryl</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d149cd2bb5473494764d3cf6318580af7bda6773f552d7f82bb920886e09d83d</i><br /><br />Threat actor <b>description</b>: <i>American Acryl L.P. is a joint venture owned by Nippon Shokubai A merica Industries, Inc. (“NAII”) and Arkema Inc.  American Acryl  manufactures acrylic acid at its Bayport, Texas facility for the  benefit of its owners. They don't need their data so we are going to share the files with you. Customers information, financial fi les, personal employee information, detailed financial data and s o on. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>forestparkga.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16504</link>
<guid>4e00844f94e3625dd7a00030e2cfe697</guid>
<pubDate>Wed, 24 Jul 2024 11:15:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>forestparkga.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb3298e42d5f4321f59470b1f7ec1e00ea2b81a52d7d2af13a221be95fe268ca</i><br /><br />Threat actor <b>description</b>: <i>City & PD</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dimbleby-Funeral-Homes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16502</link>
<guid>0db39a5f8ad698959d12547e395e2933</guid>
<pubDate>Wed, 24 Jul 2024 11:12:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Dimbleby-Funeral-Homes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b0b828efcf85bd0b122a4cec0cca3e51ec9bd52b132beab5e1172733237f6051</i><br /><br />Threat actor <b>description</b>: <i>Since 1931, the Dimbleby Funeral Homes have been caring for families during the most difficult time of their lives. Our commitment to excellence and our passion for providing exceptional service to the families we are privileged to serve is unsurpassed in our area. Our team of caring professionals will assist your family in creating a meaningful, personalized and memorable ceremony to honor your loved one.</i><br />Target victim <b>website</b>: <i>www.dimblebyfuneralhomes.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>John-Gallin--Son</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16497</link>
<guid>7c765811108db08130e713187a51d44f</guid>
<pubDate>Wed, 24 Jul 2024 09:45:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>John-Gallin--Son</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53aa2fda9400ebaf789161fcac91586581e631d0438f48a0443013a6d38081ed</i><br /><br />Threat actor <b>description</b>: <i>Our firm was founded in 1886 by John Gallin, an Irish immigrant. The firm continues to be run by the Gallin family, now in its fourth generation of management.
We work on projects located throughout the New York City metro area. Additionally, we have special expertise working with the unique demands of Manhattan high-rise buildings.
Our clients comprise a cross-section of area businesses, including finance, retail, insurance, real estate, and law. We also have a great deal of experience working with non-profits and schools.</i><br />Target victim <b>website</b>: <i>gallin.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>RhinoCorps</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16495</link>
<guid>e4baa6e2182735b091d8ebe8534bb6cf</guid>
<pubDate>Wed, 24 Jul 2024 01:39:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>RhinoCorps</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8027b38992b95d0a59bf51b996823741328d9ff6f68e1250959149011b260450</i><br /><br />Threat actor <b>description</b>: <i>Despite warnings, Rhinocorps management did not see fit to take care of its partners and employees. Without even looking into it, Rhinocorps said they don't care about the future of the data, so all projects, contracts with non-disclosure clauses, and personal data will be made public within 48 hours.</i><br />Target victim <b>website</b>: <i>http://rhinocorps.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Congoleum</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16493</link>
<guid>945bcf80a53881dafde56a1aef8f627e</guid>
<pubDate>Tue, 23 Jul 2024 20:45:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Congoleum</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>27618b622aada23064649ab377c13b0c5124b1bcb579e960dc366cef9b6fb620</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.congoleum.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Waupaca-Middle-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16491</link>
<guid>e7f75a0eb5d2448a933a050d60ff2bcc</guid>
<pubDate>Tue, 23 Jul 2024 16:43:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Waupaca-Middle-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>322075b46895ba2b07b74a426ac24d7a2cddf1609e8e47cbb12bda715289d548</i><br /><br />Threat actor <b>description</b>: <i>0</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>siParadigm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16487</link>
<guid>470340e5b081f2e3653ec93a36ba5784</guid>
<pubDate>Tue, 23 Jul 2024 15:11:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>siParadigm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97f0db92d7132e1eabf681e91290da12ba6d31f125772467d23010e75cda0af1</i><br /><br />Threat actor <b>description</b>: <i>siParadigm has built a legacy in laboratory testing solutions bas ed on scientific excellence, innovation, and world-class service. 141 GB of data will be uploaded. Full pack of personal data: pas sports, NDAs, confidential agreements, medical reports, driver li censes, birth certificates, social security numbers and other per sonal and docs, financial info, clients and so on.  </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Win-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16483</link>
<guid>57667a6e4e411d6af13da9b91b4a0d17</guid>
<pubDate>Tue, 23 Jul 2024 13:12:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Win-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>236e420b9fe54554757869309f1a000f60d1202a6ac22f8e237d42d7e04fd42b</i><br /><br />Threat actor <b>description</b>: <i>Win systems is a provider of casino solutions for the global gami ng industry. Lots of passport, DNIs (identification cards), credi t cards and other personal documents of employees. Information of clients and casinos, financials, other internal business data. 1 0GB of extremely interesting data. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>thesourcinggroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16484</link>
<guid>4fffd1f69e0a85009ab78ae46b08ec5a</guid>
<pubDate>Tue, 23 Jul 2024 11:51:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dAn0n</b> claims attack for <b>thesourcinggroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>35f88b8e8373ba074b1311d649b5c720ba2bb49b194dc78de17f9b4cd0d8b2ee</i><br /><br />Threat actor <b>description</b>: <i>The Sourcing Group (TSG) is a leading business process outsourcing service (BPO) provider recognized for commitment to customer satisfaction.
Acquisitions & Subsidiaries: ImageX, Ray Hough, Carpe Die...</i><br />Target victim <b>website</b>: <i>thesourcinggroup.com</i>]]></description>
<category>dAn0n</category>
</item>
<item xmlns:dc='ns:1'>
<title>Association-Management-StrategiesAAMC.local</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16481</link>
<guid>a6424579bdf800415424996ec6d18dac</guid>
<pubDate>Tue, 23 Jul 2024 09:39:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Association-Management-StrategiesAAMC.local</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>98250be642567b12b6105d1cc543e4ab5dfa743181e3511ab1b24cfe94c3695b</i><br /><br />Threat actor <b>description</b>: <i> Association Management Strategies is a full-service association management company providing management expertise and administrative services to in dustry associations, coalitions, professional societies, trade shows and other special events. AMS tailors its services to meet the goals, needs and budget of each of its clients. The result is a true business partnership that is built for success.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>CIMP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16479</link>
<guid>25397b4aa0a8d579b7f41bb0a4d5e1e3</guid>
<pubDate>Tue, 23 Jul 2024 06:55:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>CIMP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b3c15eee647eae0ced5fd6a5274e0b171c40a7394ec421c643c15f9d8fe40be2</i><br /><br />Threat actor <b>description</b>: <i>Welcome to Consultants in Pain Medicine, PA. CPM is lead by a multi-disciplinary team of highly trained physicians. We strive to provide the latest in pain treatment options – offering superior clinical care, up-to-date techniques and the latest technology. Pain affects every aspect of the patient. Our preferred and most beneficial treatment is a multi-disciplinary approach. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wichita-State-University-Campus-of-Applied-Sciences-and-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16475</link>
<guid>bae3576d0ae6b390b2ec7be9f5c5d7fa</guid>
<pubDate>Mon, 22 Jul 2024 16:36:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Wichita-State-University-Campus-of-Applied-Sciences-and-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33a08fc5557c66d6d2c45f67fb411061f8ee34393e6159316199b729e976fa4e</i><br /><br />Threat actor <b>description</b>: <i>10 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Acadian-Ambulance-US</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16473</link>
<guid>bb6961095e9a6dc1aac2af24ea88fc52</guid>
<pubDate>Mon, 22 Jul 2024 14:41:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>daixin</b> claims attack for <b>Acadian-Ambulance-US</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>73307db5bbbe7b247f19940c0489e1398ab1de49f52675a98190da2886799c09</i><br /><br />Threat actor <b>description</b>: <i>Acadian Ambulance is an employee-owner private ambulance service that covers most of the state of Louisiana, a large portion of Texas, two counties in Tennessee, and one county in Mississippi.</i><br />Target victim <b>website</b>: <i>https://acadianambulance.com</i>]]></description>
<category>daixin</category>
</item>
<item xmlns:dc='ns:1'>
<title>memc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16471</link>
<guid>a0ced38c8090e9d3706d20d370abbbe4</guid>
<pubDate>Mon, 22 Jul 2024 12:11:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>memc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b5cf1fda98cb7c4da0dc8f8d1b9d77867ec52febf0d247b926ecf7b77b00d3fb</i><br /><br />Threat actor <b>description</b>: <i>MEMC is a global leader in producing advanced semiconductor materials for the electronics industry with leading-edge design and manufacturing.SITE: www.memc.com ALL DATA SIZE: ≈1tb 1. Corporate data, Financial data… 2. NDA, Confidential data 3. Human Resources, Hire data 4. R&D, Engineering data 5. Personal employees documents and info 6. Clients data & etc…</i><br />Target victim <b>website</b>: <i>www.memc.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Guaranteed-Supply-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16470</link>
<guid>0c89807ba823331f1ad1f93fd7859f92</guid>
<pubDate>Mon, 22 Jul 2024 10:44:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Guaranteed-Supply-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dee3d55184ac9bdb4d34e13216298d4d7c19342ea7650a2a79fa00b9da59d053</i><br /><br />Threat actor <b>description</b>: <i>Since 1964, Guaranteed Supply Company has grown to 15 locations. Along the way, we have expanded to feature product lines focused on Concrete Materials, Thermal and Moisture Protection, EIFS/Stucco Products and more. As well as building the largest, independently owned, custom rebar fabrication company in the Carolinas - JMS Rebar. Throughout this journey, Guaranteed Supply Company has kept the same attention to personal care and quality materials that started it all. </i><br />Target victim <b>website</b>: <i>www.guaranteedsupply.com</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>RiverSoft</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16469</link>
<guid>4009fb33c2755760cae230de1c769246</guid>
<pubDate>Mon, 22 Jul 2024 06:52:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>RiverSoft</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7633fa2406fd5260867612cf131055dc4db46e89f8632a6dc73b8793980d20ac</i><br /><br />Threat actor <b>description</b>: <i>RiverSoft is the product of a design process that spans more than 20 years. It is designed to work for large agencies with thousands of patients, in multiple locations, with varied and ever-changing payer requirements (Medicare, Medicare Advantage, Medicaid, commercial insurances, HMO’s, and self-pays). The software has been optimized to work for large populations of employees and patients. All information relevant to the job at hand is shown together, all at once, to save the user’s time.  RiverSoft offers something that no other home care software company offers: Industrial strength software that is customized through configuration and software changes to meet the UNIQUE demands of LARGER home care agencies.</i><br />Target victim <b>website</b>: <i>www.riversoft.net</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cole-Technologies-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16468</link>
<guid>fd2db7e5eb5931090ef7f9b55eaa2759</guid>
<pubDate>Sun, 21 Jul 2024 19:22:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>Cole-Technologies-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dba64e8b60550e6682907503d534d171378737c2a7c580148f4528083025a321</i><br /><br />Threat actor <b>description</b>: <i>Cole Technologies Group is a multidisciplinary firm specializing in engineering, environmental consulting, and technical services. They offer a range of solutions including civil, structural, and environmental engineering, as well as project management and regulatory compliance. The company is known for its innovative approaches and commitment to sustainability, serving various sectors such as industrial, commercial, and governmental clients.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mars-2-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16466</link>
<guid>32493fbdd3d4dc341142bec853c4700f</guid>
<pubDate>Sun, 21 Jul 2024 19:20:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>Mars-2-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7d5929d401589bbfc7073d40e587233fd1b8d2bfec519fec5682ad3b546e953</i><br /><br />Threat actor <b>description</b>: <i>Mars 2 LLC is a dynamic company that specializes in innovative solutions across various industries. Known for its cutting-edge technology and forward-thinking approaches, the company is dedicated to driving progress and efficiency. With a strong emphasis on customer satisfaction and sustainability, Mars 2 LLC continually strives to set new standards in excellence and operational effectiveness.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>Queens-County-Public-Administrator</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16458</link>
<guid>e2b26aaede09d0d92976621c95297975</guid>
<pubDate>Sat, 20 Jul 2024 20:50:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Queens-County-Public-Administrator</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bebd6a6a57051011705b62108a8d8bf77c23caedc29f13bc04f85c893b16ffa7</i><br /><br />Threat actor <b>description</b>: <i>Queens County Public Administrator There is a Public Administrator in every county in the City of New York.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>HH-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16452</link>
<guid>e7f9dc40dc939802b9d479fe0a008a55</guid>
<pubDate>Sat, 20 Jul 2024 06:58:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>HH-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0bdcb92af98e9496366c3f95bc91d0b8e2889370b344a965e820f7824b4e6c7d</i><br /><br />Threat actor <b>description</b>: <i>The H&H Group is  full-service printing and sign shop. The H&H Group corporate office is located in 854 N Prince St, Lancaster, Pennsylvania, 17603, United States and has 40 employees. The total amount of data leakage is 395.8 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jariet-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16453</link>
<guid>e1ffc9eb1d4c1712a43cfa12a517ae5c</guid>
<pubDate>Sat, 20 Jul 2024 06:58:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Jariet-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bcb98a36135d292ca4af25906d4c09489e1a3a5e17ba8cb711a2ab3c91cd2f00</i><br /><br />Threat actor <b>description</b>: <i>Jariet Technologies, Inc. is a fabless semiconductor company specializing in high-speed data converter technology. Jariet Technologies corporate office is located in 103 W Torrance Blvd, Redondo Beach, California, 90277, United States and has 64 employees.The total amount of data leakage is 325.5 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arcmed-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16446</link>
<guid>78db6952ea0b5735358dc979d3c26030</guid>
<pubDate>Fri, 19 Jul 2024 16:49:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Arcmed-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ae429eaa4a61695fba0d3e68dc940dffbdc9ea89f12418c3752b42e021867f7</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.arcmedgroup.com/</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Leech-Lake-Gaming</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16447</link>
<guid>26f8d3e96979057b2627fd1408023128</guid>
<pubDate>Fri, 19 Jul 2024 14:03:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Leech-Lake-Gaming</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>54e71be2f499a3ace7feea743f1e94bd71804225ed0d6bbe7536ead321dd5301</i><br /><br />Threat actor <b>description</b>: <i>Leech Lake Gaming is located on the Leech Lake Reservation in Minnesota. They currently operate three casinos throughout the great state of Minnesota - Northern Lights Casino, Palace Casino, and White Oak Casinno.  If the company does not contact us, the data will be published!</i><br />Target victim <b>website</b>: <i>https://leechlakegaming.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>Law-Offices-of-the-Public-Defender---New-Mexico</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16442</link>
<guid>cd3b6e78242b4c8faa986194ba2bfc58</guid>
<pubDate>Fri, 19 Jul 2024 04:47:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Law-Offices-of-the-Public-Defender---New-Mexico</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a3abc9d78bb8f6fd3e34f6f206f344cc83d5ce4b7d97138fb05709bfffe4fec</i><br /><br />Threat actor <b>description</b>: <i>Law Offices of the Public Defender - New Mexico As the state's largest law firm, we represent low-income people facing criminal charges in New Mexico.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Northeast-Rehabilitation-Hospital-Network</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16441</link>
<guid>8fc00922bc09442f10ff8a8be0973604</guid>
<pubDate>Thu, 18 Jul 2024 22:07:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Northeast-Rehabilitation-Hospital-Network</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f94e1bd51105b4763581f9bfa8f002b855309082cef28b5a28b182ba8688821b</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.northeastrehab.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Seamon-Whiteside</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16440</link>
<guid>7337bc5b4a00fa2ee237cf50a57b288d</guid>
<pubDate>Thu, 18 Jul 2024 22:07:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Seamon-Whiteside</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>85889bc49d6052d8aedfdc38c56e4a513a9bbfa969d7de63857752f2492ec063</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://seamonwhiteside.com/</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>fbrlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16424</link>
<guid>a4786eb72c071a0368d390f555c42933</guid>
<pubDate>Thu, 18 Jul 2024 20:11:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>fbrlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6adf223fadb7a9a5d318040efe6b8db526204777a55645a9fe77c7b73319a936</i><br /><br />Threat actor <b>description</b>: <i>First part is ALL QuickBook databases after 48 hours.  Fusco, Brandenstein & Rada, P.C.  Your Experienced Workers’ Compensation and Social Security Disability Attorneys  Are you unable to work or has your income been impacted by an injury at wo...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>troyareasd.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16425</link>
<guid>49d7d1860f0dc2bfcb95ea0fe787c98b</guid>
<pubDate>Thu, 18 Jul 2024 20:11:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>troyareasd.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>86e48e54aaa7c921abe4926c7cbf2f3702352b68a69c5f32c862289b299525ff</i><br /><br />Threat actor <b>description</b>: <i>The Troy Area School District is a school district of the third class organized under state law in Bradford County, PA. It contains the boroughs of Alba, Burlington, Sylvania and Troy, and the townships of Armenia, Burlington, Columbia, Granville, So...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>claycountyin.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16428</link>
<guid>50959eee56aa5f4695971b375b69354f</guid>
<pubDate>Thu, 18 Jul 2024 20:11:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>claycountyin.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4922421965a4da353acf8dd443f10cf0f8ddaeaca802889f677586507275f5bb</i><br /><br />Threat actor <b>description</b>: <i>Clay County is a county located in the northeastern part of the U.S. state of Florida along the west bank of the St. Johns River. As of 2020, the population was 218,245 and in 2023, that number increased to 232,439, making it the third largest county...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>joliet86.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16432</link>
<guid>812bfa6d29aa3c52e84258e9c2ab3d59</guid>
<pubDate>Thu, 18 Jul 2024 20:11:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>joliet86.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25bef8fbb930149a6ba54c1bbe2db331823aeceece150d8cd69f6635b62d2be3</i><br /><br />Threat actor <b>description</b>: <i>Joliet Public Schools District 86 provides a high-quality, inclusive, and equitable  education for students to grow, lead, and thrive by empowering staff, collaborating with  families, and embracing our diverse community.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>glsco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16435</link>
<guid>d8558e66a75a8acd68d4dc8530460309</guid>
<pubDate>Thu, 18 Jul 2024 19:55:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>glsco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>83c0579a7e1f7969f4e51872f1fffe5bd5c9ad77f3630d7944ee91f850e43610</i><br /><br />Threat actor <b>description</b>: <i>We here at Great Lakes Supply eat, breathe, and sleep PTACs. We know them all,  sell them all and stock them all. We proudly serve the hospitality, health care, assisted  living, educational and multi-family housing industries, and enjoy having an...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>all-mode.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16420</link>
<guid>ef03f9befce99cb2f42f3569760b8e78</guid>
<pubDate>Thu, 18 Jul 2024 18:49:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>donutleaks</b> claims attack for <b>all-mode.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6de6b9ec94606865e1fbc544841bcde70b22d7765984140e0a75ebd23a7cf31</i><br /><br />Threat actor <b>description</b>: <i>A Legacy Of Excellence Founded in 1972 All-Mode Communications inc. has always been dedicated to giving our customers a world class experience whether it is running, testing and certifying new cable infrastructure; installing a new phone system; or helping with a move to a cloud hosted phone service. From the…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>donutleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.newcastlewa.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16419</link>
<guid>9a8799e6ac57db61203d74b98d78e2ee</guid>
<pubDate>Thu, 18 Jul 2024 16:52:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.newcastlewa.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5a51d7ef9d5b5233bc88e7653e435b3b59597721caca4f6efd6049c795ea3dc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>texas-tech-university</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16415</link>
<guid>737014b6a940e365341bafb671377514</guid>
<pubDate>Thu, 18 Jul 2024 12:03:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>texas-tech-university</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>975633a75db05f4e51fc4c60b3d00c9d0cdd9febec77db69a9f72a550acfca21</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>encore</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16416</link>
<guid>78758e1a20a92614551dd56294223adf</guid>
<pubDate>Thu, 18 Jul 2024 12:03:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>encore</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b2a291da936d5c2345730581017d06963a4f499e20ca92fd311c31f15bf0ecc6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Modernauto</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16410</link>
<guid>3be4d3f098a8da78f521afe939a92f1c</guid>
<pubDate>Wed, 17 Jul 2024 22:42:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Modernauto</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c61fd0aab89140797ba21aeb46b74f51ca084f0f32a42b7ab9d94ebf167490d9</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1933, Modern Automotive is a family owned and operated network of dealerships located throughout South Carolina. The Network has grown to include Modern Nissan, Modern Toyota, Modern Infiniti in Winston-Salem, Modern Infiniti in Greensboro, Modern Nissan of Concord, Modern Nissan of Lake Norman, Modern Hyundai of Concord, Modern Toyota of Boone and most recently Modern Subaru of Boone.</i><br />Target victim <b>website</b>: <i>https://www.modernauto.com</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gandara-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16411</link>
<guid>3f402b66cf03140a43be0724821a5270</guid>
<pubDate>Wed, 17 Jul 2024 21:10:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Gandara-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a241337e2a54c86754853061d9f9ad35557eeac46eb789f9cfd2411a66babab5</i><br /><br />Threat actor <b>description</b>: <i>Gandara Center Gandara Center was founded in Springfield in 1977 to advocate and provide for equal and culturally competent services in behavioral health for the Hispanic community.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hayden-Power-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16408</link>
<guid>7c738d9871e7093863bb5786cd8168e8</guid>
<pubDate>Wed, 17 Jul 2024 20:45:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Hayden-Power-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0701503ae92424b0871a07630dd4902bfb23ffd312b262ca7e18a6575b23cb29</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.haydenpower.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>norton.k12.ma.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16403</link>
<guid>e5085f260c2bc7e50f153bd3d3a463d9</guid>
<pubDate>Wed, 17 Jul 2024 20:11:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>norton.k12.ma.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e8a25447dff83019851435a208e2365b7272ad5b7411c63d69b034e48312695</i><br /><br />Threat actor <b>description</b>: <i>Norton High School is a company that employs 250to499 people and has 25Mto50M of revenue. The company is headquartered in Norton, Massachusetts.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>plantmachineworks.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16405</link>
<guid>2390243c9f76219138eed6daa4beee0f</guid>
<pubDate>Wed, 17 Jul 2024 20:11:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>plantmachineworks.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e4411aba82e45b97785408761ea1ab91478bf503188466cec9d45bfc5ddf791</i><br /><br />Threat actor <b>description</b>: <i>Plant Machine Works is a 62,000-square-foot, full-service machine shop with turn-key machining and fabrication capabilities and large-scale machining for oversized components that many shops can’t handle.  Our experienced repair shop specializes in...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>piedmonthoist.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16406</link>
<guid>3b5f4f19719aa9a67efe63169ce94037</guid>
<pubDate>Wed, 17 Jul 2024 20:11:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>piedmonthoist.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4183e2902ec4dcf25a632901593c2853e985a20099028fa9f3d13f03224a51e6</i><br /><br />Threat actor <b>description</b>: <i>Starting from scratch in 1993 with not much more than several good supplier relationships,  Piedmont Hoist & Crane has grown from a small service firm doing inspections and repairs to an organization  of over 30 employees with 200 years of combined...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>gptchb.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16407</link>
<guid>5e09ce33a20f1c276ffcc43627f6e891</guid>
<pubDate>Wed, 17 Jul 2024 20:11:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>gptchb.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa5b735c557928eb6cc86a27f005e1230a154876678c683af27e7d9905c82aad</i><br /><br />Threat actor <b>description</b>: <i>Established in 1986, the Great Plains Tribal Leaders' Health Board (GPTLHB) is an organization representing the 18 tribal communities in the four-state region of South Dakota, North Dakota, Nebraska, and Iowa.   Through public health practices and...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>MIPS-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16409</link>
<guid>88ba8576df493c2273b9328861b8792c</guid>
<pubDate>Wed, 17 Jul 2024 19:07:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>MIPS-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>962e643f5f66cfad53bc06f09c71c5247931dee930650052a1bd83cde5fc2ba6</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.mips.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>isometrix.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16389</link>
<guid>c64c1dc40ade60a3aba8332e10260c93</guid>
<pubDate>Wed, 17 Jul 2024 09:37:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>isometrix.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0051c861dad3ede57120477578ca21340ad166609a4bf7e43824215984509bcb</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/ISOMETRIX/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/ISOMETRIX/PROOF/DATA DESCRIPTIONS: Personal identifiable information, employees and executives personal files, financial data, customer information, contracts\NDA, corporate correspondence, software development data etc.</i><br />Target victim <b>website</b>: <i>isometrix.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>A.L.P.-Lighting-Components</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16381</link>
<guid>25d36360c95ddcdd9687dd95f09ab64c</guid>
<pubDate>Wed, 17 Jul 2024 05:36:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>A.L.P.-Lighting-Components</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>43474bf458910b7143d320bda00236f99f81bdb724cd1adc38130589dd3d14c1</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1972 A.L.P. is an international company that does the design, manufacturing, and distribution of lighting components and components for other technical industries. The company is headquartered in Niles, Illinois.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Law-Office-of-Omar-O.-Vargas-P.C.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16380</link>
<guid>b15974e83b24e8c06f6fa77f97430d89</guid>
<pubDate>Wed, 17 Jul 2024 03:02:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>The-Law-Office-of-Omar-O.-Vargas-P.C.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>473d39836ae55eb80eae659b8dbc064830949ba45f8e020e61fc3d4ab51cac97</i><br /><br />Threat actor <b>description</b>: <i>Company must contact us using the instructions in next 3 days. Total amount of stolen data: 450 GB https://www.quenotedeporten.com</i><br />Target victim <b>website</b>: <i>quenotedeporten.com</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Asbury-Theological-Seminary</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16375</link>
<guid>95175b10d65e3d1b610e6d10fe3c1861</guid>
<pubDate>Tue, 16 Jul 2024 22:04:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Asbury-Theological-Seminary</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>328c6db94f0bbacc8a3527c3d14f433d372bc2500cd88feeabc27b740c2abf10</i><br /><br />Threat actor <b>description</b>: <i>10 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alvin-Independent-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16371</link>
<guid>3cf56c93d83be246a1e28f0abb588345</guid>
<pubDate>Tue, 16 Jul 2024 21:43:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>Alvin-Independent-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>504e7b9d9d88041d8f551a1dcfe58e7eca06ec324986f68e50ce82dbe0ea42a8</i><br /><br />Threat actor <b>description</b>: <i>60GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>West-Allis-West-Milwaukee-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16372</link>
<guid>6318d3c5f897f3bce7542a3e9236bdb6</guid>
<pubDate>Tue, 16 Jul 2024 21:42:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>fog</b> claims attack for <b>West-Allis-West-Milwaukee-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be9c3b0f673e01bad6598ac2c2f4285f6571d610d854c9de7e17c7ed859924a9</i><br /><br />Threat actor <b>description</b>: <i>9,5 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fog</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.benchinternational.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16353</link>
<guid>4312d4430cb91cd3b1ec1f5553649a27</guid>
<pubDate>Tue, 16 Jul 2024 14:45:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.benchinternational.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f3b36ebddd9eccbc043e69ec011cbe6686829c8c5d72e9f234ba2fd6fa17fe47</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.cameronhodges.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16354</link>
<guid>75ac87b5cb3f269665b151d6f263b2b3</guid>
<pubDate>Tue, 16 Jul 2024 14:44:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.cameronhodges.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>793dbf78d833a471197bc1c1321a99cfa50d4a130a2275de604ac04623b936ef</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Braums-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16356</link>
<guid>79a5f1b63234a7ebe1dc171a7119b2c4</guid>
<pubDate>Tue, 16 Jul 2024 14:41:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Braums-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>51de75eaf31fb0640c85dcdeb20ec79585f6ff3113eb2c1e569600eb2b84df04</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.braums.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lantronix-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16357</link>
<guid>2291df39da0494fd8dac1661e76dd846</guid>
<pubDate>Tue, 16 Jul 2024 14:40:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Lantronix-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8f0a645db2c7f8a4a805ab7da283854e4f6eec8125683a3a1db584686f4b7600</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.lantronix.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>SBRPCA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16352</link>
<guid>8bcf12d1a11564975f1e62b898ef0a0d</guid>
<pubDate>Tue, 16 Jul 2024 14:39:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>SBRPCA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>51bb7abb4d927b450b8a34b69e8ed7fc46074fb2d560640abf672bc7d44443ff</i><br /><br />Threat actor <b>description</b>: <i>South Bay Regional Public Communications Authority (SBRPCA), hosted by the City of Hawthorne, provides dispatching services of multiple police and fi re departments in southern California, including El Segundo, Hermosa Beach, Gardena, and Manhattan Beach. Business Challenge.</i><br />Target victim <b>website</b>: <i>www.rcc911.org</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Amino-Transport</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16337</link>
<guid>3dceb3fff10818e1f598d6bfc0234948</guid>
<pubDate>Mon, 15 Jul 2024 19:41:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Amino-Transport</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bdd23b0fc6e27a7335e3fcc727514079996cc61bce6492b5207f586a8912cf29</i><br /><br />Threat actor <b>description</b>: <i>Amino has been in business since 1999 and is a growing Third-Part y Logistics (3PL) Company with 3 Texas locations and employees na tionwide. 20GB of data will be available soon. We will upload the ir files containing lots of financial files, customer invoices, b ank details, checks and so on. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>integraservices</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16341</link>
<guid>4d12403288274bb1c1cfc6a8f9e0f857</guid>
<pubDate>Mon, 15 Jul 2024 17:40:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>mallox</b> claims attack for <b>integraservices</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>657893aa6a75c2e5092a2bc4b6c919fb2e494bf788eb4c2dc88cafe08816e49f</i><br /><br />Threat actor <b>description</b>: <i>Description not available</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>mallox</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gramercy-Surgery-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16327</link>
<guid>10a79e1ab55a9fce0d160a9353b00021</guid>
<pubDate>Mon, 15 Jul 2024 16:48:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Gramercy-Surgery-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c83e42c5c86571978723430c94f100d9720810ba1bbc07172723270b9a544380</i><br /><br />Threat actor <b>description</b>: <i>Company has the last 24 hours to return to the chatTotal amount of stolen data : 465 GBhttps://gramercysurgery.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Goede-DeBoest--Cross-PLLC.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16340</link>
<guid>dfddbc8b408814a212486f2a94b8cabf</guid>
<pubDate>Mon, 15 Jul 2024 16:13:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Goede-DeBoest--Cross-PLLC.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>867176820423b34e3cdc84d21d0f86ad2d637a681313d816ac95a71720dda6bd</i><br /><br />Threat actor <b>description</b>: <i>Goede, DeBoest & Cross, PLLC. Since its founding, the firm has grown to a mid-size law firm where the partners have a genuine camaraderie and a dynamic and young vibe amongst its staff. There is a team mentality, a family atmosphere and a shared desire to help clients.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>usdermpartners.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16339</link>
<guid>6d16b39c4bdd5c238d55ea70055b4846</guid>
<pubDate>Mon, 15 Jul 2024 16:07:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>usdermpartners.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30e6d789d4e6066d865eb3eead9dba27b296da072a0d7a9464cc0c6d420fc149</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>ComNet-Communications</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16329</link>
<guid>b0f9c6e8c9f6fb1525ceef6ae22b8893</guid>
<pubDate>Mon, 15 Jul 2024 14:11:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>ComNet-Communications</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff2d681ec00b36e62f52ab59e0722dd3fab6ce316a7358bfffde0430d4e7b5e8</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.comnetcomm.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>RZO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16328</link>
<guid>fec52d41a265530aedd9cb7794e32ed9</guid>
<pubDate>Mon, 15 Jul 2024 14:09:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>RZO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>92536d7b3a665e3492f5bb942017a52b95ca474faf971f5a2dff9400ca9e3aff</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>https://www.rzo.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>thompsoncreek.comwa</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16333</link>
<guid>624599f957d8f8f9a7d42bffa8206575</guid>
<pubDate>Mon, 15 Jul 2024 14:06:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>thompsoncreek.comwa</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f9d3eed41c4a3cdff13a3897c032e8295705d704d85e95c30dff8ca323e419e</i><br /><br />Threat actor <b>description</b>: <i>Thompson Creek® Window Company is the Mid-Atlantic region’s premier home improvement replacement products company. We have been customizing and manufacturing replacement windows, doors, gutters, siding and roofing in the Mid-Atlantic region since 1980.SITE: www.thompsoncreek.com Address : 4200 Parliament Place Suite 600 Lanham, MD 20706 USAALL DATA SIZE: ≈750gb 1. Corporate data 2. Financial data, Accounting… 3. Human Resources, Hire data… 4. Payroll, personal Tax forms, Agreements… 5. Personal docs employees, clients… & etc…</i><br />Target victim <b>website</b>: <i>thompsoncreek.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>northernsafety.comwa</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16332</link>
<guid>1de16907c72cefcb01975c3e61185ced</guid>
<pubDate>Mon, 15 Jul 2024 14:06:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>northernsafety.comwa</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c68e685a121d43955ec95e01bb7af932b82e05aa053ad6790c0f23009e9987fc</i><br /><br />Threat actor <b>description</b>: <i>Northern Safety Co., Inc. operates as a personal safety equipment distributor company. The Company offers disposable respirators, earplugs, first aid kits, gloves, hard hats, safety glasses, safety supplies, traffic work boots, and fall harnesses. Northern Safety serves customers in the United States.SITE: www.northernsafety.com Address : 761 S. Danny Thomas Blvd. Memphis, TN 38126 USAALL DATA SIZE: ≈750gb 1. Corporate data 2. Finance data 3. HR 4. Users, Employees personal, confidential data & etc…</i><br />Target victim <b>website</b>: <i>northernsafety.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>greenlightbiosciences.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16325</link>
<guid>7e70e439d09bb8f8b43068ec4c6c6e4c</guid>
<pubDate>Mon, 15 Jul 2024 12:57:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>greenlightbiosciences.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>187c673585fbafe0d77246527c9a5a4e8a35a53f6510f2d074c92c883764df41</i><br /><br />Threat actor <b>description</b>: <i>greenlightbiosciences.com 726Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hewlett-Packard-Enterprise</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16363</link>
<guid>fde0516fdc5aadb0b68d6c184067e7c9</guid>
<pubDate>Sun, 14 Jul 2024 21:19:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Hewlett-Packard-Enterprise</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9810d8534861b4018da924723e6f709c0846bb0ad778c23501a39d92b201e47c</i><br /><br />Threat actor <b>description</b>: <i>199$</i><br />Target victim <b>website</b>: <i>hpe.com</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>BCS-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16364</link>
<guid>a104b341c748a4acdf73629458440c0c</guid>
<pubDate>Sun, 14 Jul 2024 21:19:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>BCS-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2bb1e0d06c6c24b294e77dd98990772493b61a8de35dd0138db09721ce439f3b</i><br /><br />Threat actor <b>description</b>: <i>2000$</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Guhring</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16365</link>
<guid>e07dc6c359423eb2c69ad41231f34e5e</guid>
<pubDate>Sun, 14 Jul 2024 21:19:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Guhring</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5789bdcf6e22c93e3d4ab01643c5ece6bc3898b61f9883ab18763aac5939c1d</i><br /><br />Threat actor <b>description</b>: <i>10000$</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Golan-Christie-Taglia</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16367</link>
<guid>ff4d70de478038c72282b7e4af1d4260</guid>
<pubDate>Sun, 14 Jul 2024 21:19:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Golan-Christie-Taglia</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ea622b4f61a5bd57dc87d3981222b1dc8841a009050c0037101e0a956454e4d</i><br /><br />Threat actor <b>description</b>: <i>500$</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>First-Commonwealth-Federal-Credit-Union</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16368</link>
<guid>ec5c931cc3eb9fcc8a46b364c0f69e51</guid>
<pubDate>Sun, 14 Jul 2024 21:19:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>First-Commonwealth-Federal-Credit-Union</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c520aab264db48efe403a1d65de1e7f1e7c53c1189aa6d998b04e7fe8e91f8b6</i><br /><br />Threat actor <b>description</b>: <i>100000$</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Apex-Global--Big-leak-outlooks---2tb.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16359</link>
<guid>b19684264b21249ebb88234399473bbc</guid>
<pubDate>Sun, 14 Jul 2024 19:57:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>Apex-Global--Big-leak-outlooks---2tb.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7cea66e6ba97355780d618a3414e4387d93503eaa5f689428885e6ea005bd6f8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sherbrooke-Metals</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16358</link>
<guid>ed9c7f78f5a87c20e38b5a9bfb368e70</guid>
<pubDate>Sun, 14 Jul 2024 19:54:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>Sherbrooke-Metals</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7822e250e9ac9232c40d4d0a2c8723af2a82e0f5b4fc3d32f16d13ff06c2f0ca</i><br /><br />Threat actor <b>description</b>: <i>Sherbrooke Metals is a leading company specializing in the procurement, processing, and distribution of high-quality metal products. With a strong focus on customer service and innovation, they cater to various industries including construction, automotive, and manufacturing. Their extensive inventory includes steel, aluminum, and specialty alloys, ensuring tailored solutions for diverse industrial needs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>BrownWinick</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16316</link>
<guid>2e6106f57b3dbfdb6d57e017209c7c87</guid>
<pubDate>Sun, 14 Jul 2024 10:49:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>BrownWinick</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8accea7e2c7a95840309cf1853ef98debed09f2ce344a6846068fa9a1e3bd2ef</i><br /><br />Threat actor <b>description</b>: <i>BrownWinick 1951, a tax-law specialty firm opened its doors in downtown Des Moines, Iowa. Its modest size hid lofty ambitions: to help its clients build on a strong foundation, and to put businesses from Iowa, the Midwest and around the country on a powerful footing for growth and competitive success.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Texas-Alcohol-and-Drug-Testing-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16315</link>
<guid>1e93615b9c793e4fce2f6c8ebde83e61</guid>
<pubDate>Sun, 14 Jul 2024 08:48:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Texas-Alcohol-and-Drug-Testing-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f736f96acbce7df54fbbec34ef657ef861c47d21e2b21674d40a9f7cbc81784c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>gbhs.org-0712-Publication-51gb</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16301</link>
<guid>8576d5a526fe75112fee46cc3a77e927</guid>
<pubDate>Sat, 13 Jul 2024 11:32:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>gbhs.org-0712-Publication-51gb</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9619ffea41b5d1fdc02705516887ffeec4befaa02b6e5aef99c1833ffc4d95f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://gbhs.org/</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Coffee-Bean--Tea-Leaf</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16299</link>
<guid>8914ffd4d04a8aabc106672929f0a16b</guid>
<pubDate>Sat, 13 Jul 2024 08:37:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>The-Coffee-Bean--Tea-Leaf</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3bed6a9e7558da8e410707dcbc7e92496d08f7fde7d431e40cc443953b824565</i><br /><br />Threat actor <b>description</b>: <i>The Coffee Bean & Tea Leaf, founded in 1963 and headquartered in Salt Lake City, Utah, is a coffee chain of specialty coffee and tea stores.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>State-of-Alabama---Alabama-Department-Of-Education</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16300</link>
<guid>6c880a6dcc8d00284516ecd4d8c35e18</guid>
<pubDate>Sat, 13 Jul 2024 08:37:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>State-of-Alabama---Alabama-Department-Of-Education</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>02de095f83c0a68347a6773d06abde8ec9dca45ea0d3dc1280af9da89b3993d3</i><br /><br />Threat actor <b>description</b>: <i>The Alabama State Department of Education (ALSDE) is the state education agency of Alabama. It is headquartered at 50 North Ripley Street in Montgomery. The department was formed by the Alabama Legislature in 1854. The department serves over 740,000 students in 136 school systems.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Preferred-IT-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16294</link>
<guid>bb1d545891bbbebcf457ed1cad5394f8</guid>
<pubDate>Fri, 12 Jul 2024 22:47:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Preferred-IT-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8cf4f046c4301e6eb2866796012161de3169ae6ba567278c7a0b368e97c5810</i><br /><br />Threat actor <b>description</b>: <i>Business Services. Complete IT services and support.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Seattle-Public-Library</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16360</link>
<guid>053b47ac39ef2ea08d354ee54baadabb</guid>
<pubDate>Fri, 12 Jul 2024 21:08:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-Seattle-Public-Library</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9b2227122b6ced0f83a6d016071fefffbb0b1b672625d5e132570ad4afad96a3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>spl.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wagner-Meinert</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16291</link>
<guid>0f5c0a62b7d3d568f84c2784fc989420</guid>
<pubDate>Fri, 12 Jul 2024 19:12:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomexx</b> claims attack for <b>Wagner-Meinert</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f254b48b89606ad636af59dfcbafdf0140fcae6e7f1a9c241a8aaaac3f939a53</i><br /><br />Threat actor <b>description</b>: <i>Wagner-Meinert is a company that specializes in industrial refrigeration, food process systems, and mechanical contracting. They provide services such as design, installation, maintenance, and compliance support for industrial and commercial refrigeration systems. Their expertise often spans areas including ammonia refrigeration systems, food processing equipment, HVAC systems, and related industrial solutions. Leaked data size: 685.3GB.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomexx</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.riteaid.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16290</link>
<guid>e552144ef9e338f9b3223162af4fb973</guid>
<pubDate>Fri, 12 Jul 2024 14:33:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.riteaid.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>65b0bb5d0377fa5896e57c0f1de7d89b02864d6e41670e7fbb403766afb34f77</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Golf</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16324</link>
<guid>1c7ad4cee2edafdb6d16b155d2421b77</guid>
<pubDate>Fri, 12 Jul 2024 07:40:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>American-Golf</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c4ec52af4aceeeff93b619c5b9f5d2e3d6547c5c2d4ed80be877e6d9ba07b58c</i><br /><br />Threat actor <b>description</b>: <i>American Golf is one of the operators in the golf industry today. Owner, lessee, and manager of golf courses and country clubs for over 50 years. American Golf corporate office is located in 909 N Pacific Coast Hwy, El Segundo, California, 90245, United States and has 379 employees. The total amount of data leakage is 154.9 GB</i><br />Target victim <b>website</b>: <i>https://www.americangolf.com/</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hyperice</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16282</link>
<guid>a99868f5bfb00a881295083099e55a2d</guid>
<pubDate>Thu, 11 Jul 2024 22:47:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Hyperice</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>168ba2362c70dc042f13c1bbeae66b3703a13e29271fa55020bf0b5989d20841</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.hyperice.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>diligentusa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16283</link>
<guid>0eb178c5581f651876fadae5a8980899</guid>
<pubDate>Thu, 11 Jul 2024 22:37:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>diligentusa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e3eb6981f7afaee885eff831d10cd874e2406a78dd0765888d5638fadd25564</i><br /><br />Threat actor <b>description</b>: <i>Diligent Delivery Systems provides transportation services for businesses within varying industries. Major clients include WorldPac and PharMerica. The company is currently facing tight liquidity and debt default due 23 million cash uses within the past 18 months. Management has been tasked with refinancing existing debt, sourcing a new investor, or selling the business.  - Total leak size: 600+ GB

For any clients and buyers who have interest in working with Diligent or investing/buying this company, we have invaluable data for you. 

All documents and the entire collection of emails since January 1 2024 for:

- Larry Browne (CEO)
- Darl Petty (CFO)
- Carlos Navarro (COO)
- Alan Geraldi (Legal Counsel)

Additionally, we have database backups, documents belonging to clients (protected by NDA),  and more. 

If you had doubts about the financial situation of this company, no need to doubt. We will be releasing the entire collection shortly. The company will try to deny that they have these financial difficulties and that they are trying to sell the company, but these emails and documents tell different story. 

Some contacts for you: 

Larry Browne lbrowne@diligentusa.com larrybrowne@gmail.com (713) 906-4385 (281) 854-1300 713-906-9253 713-906-4385 President
Darl Petty dpetty@diligentusa.com 713-906-6167 281-854-1313 CFO
Carlos Navarro cnavarro@diligentusa.com 713.205.8861 (713)275-2555 713-377-2799 COO
Alan Geraldi ageraldi@diligentusa.com (281)948-2604 (832)300-3595 General Counsel (Legal)
Lisa Musick lmusick@diligentusa.com (713)906-7317 (281)854-1301 Executive Assistant
Scott Bruder sbruder@diligentusa.com (713)906-0070 (281)854-1317 VP of National Sales Automative
Dawn Vesey dvesey@diligentusa.com 615.719.0481 HR Director
Tim Barrett tbarrett@diligentusa.com 615-362-6799 629-335-3399 Director of Information Technologies
Ed Saddler esaddler@diligentusa.com (346)988-7464 Information Technology Level 2 Support
Ron Lewis rlewis@diligentusa.com (281)728-3174 (281)854-1355 IT Support Manager
Jakob Akin jakin@diligentusa.com 6292438907 6292438907 Systems Administrator
</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>Image-Microsystems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16281</link>
<guid>3a1051d7bc1590ef30337746a52506b9</guid>
<pubDate>Thu, 11 Jul 2024 19:35:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Image-Microsystems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>73a3503b9da8e0a7266bbfedf49df52e25287243b0e400385f51c3e25608b97e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://dealscoop.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.lynchaluminum.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16279</link>
<guid>ae66a054611a12a673d91a170194b681</guid>
<pubDate>Thu, 11 Jul 2024 18:04:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.lynchaluminum.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3ee7b929d9b371dc3d1e50d996087e87057567ac075557283f1f8ccfdd844ca</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sigma</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16276</link>
<guid>1ab4eabb60df171d0d442f0c7fb875a0</guid>
<pubDate>Thu, 11 Jul 2024 17:11:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Sigma</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>877142f8724b345ffa8cbd467be75477b3b69414c14a918fc83326bffd27e844</i><br /><br />Threat actor <b>description</b>: <i>SIGMA is a California based, leading manufacturer of luxury & bes poke custom faucets, shower systems & accessories. Projects infor mation, some employee data, payments details. Everything will be  uploaded soon. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.bfcsolutions.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16274</link>
<guid>1feee423953de9328419f5ad5d608425</guid>
<pubDate>Thu, 11 Jul 2024 13:35:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.bfcsolutions.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9cb4bbd1d0422cd770d04f8e59148ec9909c9604801cf806de225e666d3ea86b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>concorddirect.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16323</link>
<guid>a5adddf5f3e375d4fc7d970b6bce4893</guid>
<pubDate>Thu, 11 Jul 2024 07:29:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>concorddirect.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>82dcebf9355a8dfd607f7451d1f495fe7b112ef896ed1322ae7b2a81bd3c8b78</i><br /><br />Threat actor <b>description</b>: <i>FILES UPDATED!!!  Your organization is a unique mix of moving parts, and increasing your ROI, optimizing your channels, and growing your audience requires careful coordination. We’re direct response experts who have been creating successful program...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Texas-Electric-Cooperatives</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16271</link>
<guid>d6891861d4400fdc4dcc97a7fcae60d6</guid>
<pubDate>Thu, 11 Jul 2024 00:06:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Texas-Electric-Cooperatives</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f0d3c5b97df67070023b43581418ac46c42a59da4324d5ea40aca68f6450be9c</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.texas-ec.org</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-21st-Century-Energy-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16272</link>
<guid>5e04a15b7c5a842cfed6457d8490bfdc</guid>
<pubDate>Thu, 11 Jul 2024 00:05:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>The-21st-Century-Energy-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb3a97e75eac293ec8a917ff0d3e090471fd54c6567458c38c65fefd6759ca2a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.21stcenturyenergygroup.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Cedar-Falls</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16270</link>
<guid>023b39a74b7b4acd060dedc0431c3dbc</guid>
<pubDate>Wed, 10 Jul 2024 19:35:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>City-of-Cedar-Falls</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e83aa4f8ced01e3d5b0b68a77e6a1be667352454c4b02afc0e98ee3fb9902bff</i><br /><br />Threat actor <b>description</b>: <i>Unfortunately, the management of cedarfalls.com shows no commitment to ensuring the data security of its employees, customers, and partners. Cedarfalls has 72 hours to resolve this situation; otherwise, the data will be put up for public auction.</i><br />Target victim <b>website</b>: <i>http://cedarfalls.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Beowulfchain</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16266</link>
<guid>1d35446bf1a709c48f740928326cb4a7</guid>
<pubDate>Wed, 10 Jul 2024 13:54:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>vanirgroup</b> claims attack for <b>Beowulfchain</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cdd0b29c04401e6c3cb0c2813a525bd7542a2f3f1cb3c249c5175cc83cb0e63c</i><br /><br />Threat actor <b>description</b>: <i>Beowulfchain is the decentralized communication and data network enabling businesses to communicate without barriers. They were exfiltrated and locked by Vanir on the 7th of July 2024</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>vanirgroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Unitedpropertiescorp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16297</link>
<guid>292065eda399bc70b6714a2f4915e413</guid>
<pubDate>Wed, 10 Jul 2024 07:09:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Unitedpropertiescorp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a8b66be73af01c5c2c8f73092290a25e5f7ca24fdd26a221e5b22dfdfb3b751</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>Unitedpropertiescorp.com</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>REPLIGEN</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16258</link>
<guid>7473b9f4150cf2af50154b8d4bc81ea3</guid>
<pubDate>Tue, 09 Jul 2024 03:05:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>REPLIGEN</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>587b5d132def8daa99ad34d8817ba235be79e49ff0141ebfdad8d93740f9c6f4</i><br /><br />Threat actor <b>description</b>: <i>Repligen is a bioprocessing-focused life sciences company bringing expertise and innovation to our customers since 1981. We are inspiring advances in bioprocessing through the development and commercialization of high-value products and flexible solutions that address critical steps in the production of biologic drugs. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Excelsior-Orthopaedics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16254</link>
<guid>7464d29c8432f9d1590f037f0972dd0b</guid>
<pubDate>Mon, 08 Jul 2024 18:54:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Excelsior-Orthopaedics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7570cfee0740317827392a6ab84645d459d704f95fecf3727c945bb46a430e1</i><br /><br />Threat actor <b>description</b>: <i>Hospitals & Physicians Clinics</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>Allied-Industrial-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16252</link>
<guid>8bba75078c2b2935e5b058f3e0d0f093</guid>
<pubDate>Mon, 08 Jul 2024 18:11:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Allied-Industrial-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>caeaca7e20b59a45a643ec556b8b08b997ce09f3569676a564362a3295fbe797</i><br /><br />Threat actor <b>description</b>: <i>Allied Industrial Group is committed to providing world class pro ducts with service and support through the use of product knowled ge, product availability and application expertise to our ever ex panding customer base. 15GB of data will be provided. Confidentia l agreements, NDAs, employees personal files, customers informati on and other business data. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Guhring-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16250</link>
<guid>e0bdb3466b9bade468e8d8a8704e1e23</guid>
<pubDate>Mon, 08 Jul 2024 12:11:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Guhring-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ebb7871bd36550eae6cee75c349f2eedcd59d4b68c77df0ea53cd241469b890</i><br /><br />Threat actor <b>description</b>: <i>Guhring is a world-class manufacturer of round shank cutting tools for the metalworking industry; also a provider of top-quality coating, reconditioning and tool management services.  More than a century of expertise in cutting tool manufacturing, combined with powerful R&D resources, place Guhring at the forefront of technical innovations in cutting tools.  Globally there are 26 production plants and 36 service centers, along with hundreds of knowledgeable technical support experts, providing Guhring products and services to the industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Olympus-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16245</link>
<guid>4fa478df5573b6597248fd32f3200107</guid>
<pubDate>Sun, 07 Jul 2024 11:42:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Olympus-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c96520d1b3c65e790876cb1fef16a365ff63b2a05a327163d24f15e8c46b8803</i><br /><br />Threat actor <b>description</b>: <i>Olympus Group (founded 1893) - provides services in the field custom printing and sewing industry, specializing in large format digital and dye-sublimation printing. Olympus Group corporate office is located in 9000 W Heather Ave, Milwaukee, Wisconsin, 53224, United States and has 254 employees. The total amount of data leakage is 436.9 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>a-g.com-71024---data-publication-38gb-150K</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16242</link>
<guid>8db966959676f75bd2ba06c4a2ea266a</guid>
<pubDate>Sat, 06 Jul 2024 08:57:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>a-g.com-71024---data-publication-38gb-150K</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e57ce2851656679860b8e652d8242e798e709cd25477e4ef2a021efca248774f</i><br /><br />Threat actor <b>description</b>: <i>You have 4 days to contact us; otherwise the data will be released.</i><br />Target victim <b>website</b>: <i>https://www.a-g.com/</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>baiminstitute.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16241</link>
<guid>c3eeb87920e101814f85b28d030738ab</guid>
<pubDate>Sat, 06 Jul 2024 07:35:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>baiminstitute.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c7a4101900786a2da626b081d0bb5f8f56d6061dd60da83d1b111a4661c5063</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Wacks-Law-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16240</link>
<guid>c6829ca27f302086136c94bcf195f51b</guid>
<pubDate>Sat, 06 Jul 2024 01:12:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-Wacks-Law-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>41b72657795ce0fc76d55dbf1e3c12f2b9671b30f95adadfdbfd3e2f06335d55</i><br /><br />Threat actor <b>description</b>: <i>The Wacks Law Group is a New Jersey-based law firm of dedicated attorneys who address clients’ issues with a deeply personal yet professional commitment. Our law firm serves clients throughout New Jersey and New York. Our extensive knowledg            ...</i><br />Target victim <b>website</b>: <i>http://www,wackslaw.net</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Center-for-Human-Capital-Innovation-centerforhci.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16239</link>
<guid>881ad08b23bec80777fe4bce8bee4e0a</guid>
<pubDate>Fri, 05 Jul 2024 19:30:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Center-for-Human-Capital-Innovation-centerforhci.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>114b17656c212cb15bc8de95daaafd3bfa13a98262a14ebf532fe481549acdb3</i><br /><br />Threat actor <b>description</b>: <i>The Center for Human Capital Innovation (CHCI) advises government organizations on "best practices" and "next practices" in strategic human capital management. Our overall mission is to improve the effectiveness and efficiency of federal government operations through systematic improvements in Human Capital Management practices. CHCI serves as a trusted advisor, think-tank, thought leader, educator, analyst and coach dedicated to advancing the science of talent management for organizations in the government sector. The aim of CHCI is to improve the Return on People throughout government. Our mission is to provide government leaders with valuable assessment tools, deployment advice, sound Human Capital Management analyses, as well as innovative insight related to integrated talent strategy, acquisition, development, engagement, management and evaluation. Years of research and collaboration has equipped CHCI with an extensive database of substantiated methods and ideas from a field of the brightest thought leaders in talent management. Those insights, coupled with our deep and comprehensive understanding of strategic human capital management, result in measurable, real-world strategies that help client organizations attract and retain high-performing people, build a diverse and inclusive workplace, and leverage individual and team performance throughout the enterprise.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>waupacacounty-wi.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16238</link>
<guid>51983dde7c26cc63f4c0bdbc9903e636</guid>
<pubDate>Fri, 05 Jul 2024 18:04:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>waupacacounty-wi.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>052ef960d05136bfb7cfc68444d77c424480e349acdac6896e7db0e38444ec9d</i><br /><br />Threat actor <b>description</b>: <i>Waupaca County is a county in the U.S. state of Wisconsin. As of the 2010 census, the population was 52,410. The county seat is Waupaca. The county was created in 1851 and organized in 1853. It is named after the Waupaca River, a Menominee language name meaning 'white sand bottom', 'pale water', or 'tomorrow river'.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>homelandvinyl.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16233</link>
<guid>86f2ff8ac45f3e0c795c4c7960b66e5d</guid>
<pubDate>Fri, 05 Jul 2024 13:46:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>homelandvinyl.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd69ce09f96f628ebfa532f51a8235b13e178ecd6ae050c5f9c12bacb49cc545</i><br /><br />Threat actor <b>description</b>: <i>Homeland manufactures a diverse portfolio of vinyl profiles, including its proprietary decking and railing systems</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Legend-Properties-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16221</link>
<guid>02fcf87d7e0a9c73d5cb511f8bae4ba4</guid>
<pubDate>Thu, 04 Jul 2024 22:56:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Legend-Properties-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8906d80e9b6dc10e8f6a324a76ef30301276e05c0ff2f45739f9542a4e3be84b</i><br /><br />Threat actor <b>description</b>: <i>Legend Properties was formed in 1990. Today we are a market share leader in commercial real estate brokerage in the Philadelphia Metropolitan area.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Elyria-Foundry</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16227</link>
<guid>a5f27f155a3f983ffb4eee7de7c984e3</guid>
<pubDate>Thu, 04 Jul 2024 22:34:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Elyria-Foundry</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cba03147116aae052a98281a2e0b6a2ae87bbe71b09fc35b753c8a0533d2c4a6</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.elyriafoundry.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Texas-Recycling</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16228</link>
<guid>0f0ca97dacf1e61f790dc8e6e138dd42</guid>
<pubDate>Thu, 04 Jul 2024 22:34:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Texas-Recycling</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5cd4c17828694fa29a948356d7729e0bc629385c523c70bccb6f3c89a8947f34</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.texasrecycling.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>INDAs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16222</link>
<guid>dfc30173c2d819d8706f018f2ef5d63e</guid>
<pubDate>Thu, 04 Jul 2024 21:14:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>INDAs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb974857046258b70daf63a2a387200d4ed0fbeb6612531f89f36b56b708e971</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.inda.org</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Innerspec-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16223</link>
<guid>7e9cb89a4d6f2837d06b6108b744c1fb</guid>
<pubDate>Thu, 04 Jul 2024 21:13:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Innerspec-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30ff2206d499cbc038c9a2931cb9e8276033db69b611a9499e39d6fade8c787c</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.innerspec.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Prairie-Athletic-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16224</link>
<guid>1e7f37d1ed5240be3ab2eca6d5a0c442</guid>
<pubDate>Thu, 04 Jul 2024 21:13:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Prairie-Athletic-Club</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48fa5e1169f752cdcfe80e74ac63d600f9b1b99ec9436ce12afc3b7f9b45a571</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.prairieathletic.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fareri-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16225</link>
<guid>f9d8c6f4d86d8f4ae626834601492846</guid>
<pubDate>Thu, 04 Jul 2024 21:12:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Fareri-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97f9d292516e580b928dc066ac63e97c0240f4c9a5cb3dbf610462a632747b13</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.fareriassociates.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Island-Transportation-Corp.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16226</link>
<guid>9c773fbdb174e0964bd32bafde850f87</guid>
<pubDate>Thu, 04 Jul 2024 21:08:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Island-Transportation-Corp.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>648627f77b339a5eff3ac61a47c83d7603dad785f8da6d6c26a3c55b8498ef6a</i><br /><br />Threat actor <b>description</b>: <i>Island Transportation Corp is one of the largest bulk carriers in the United States servicing the petroleum industry for over 50 years. Company serves a majority of the leading oil companies in the northeast, hauling billions of gallons of product to their facilities each year.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Transit-Mutual-Insurance-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16220</link>
<guid>b4de0635a83a2ae18e4298768351c7d7</guid>
<pubDate>Thu, 04 Jul 2024 20:58:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Transit-Mutual-Insurance-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5febd08e0b586ae1fe43047f115a213fe10f4753eb326abffe7753e6f00f125</i><br /><br />Threat actor <b>description</b>: <i>Transit Mutual Insurance Corporation of Wisconsin is a not-for-profit mutual insurance corporation. Located in Appleton, Wisconsin, company insures public transit vehicles owned by municipalities located throughout Wisconsin.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>hcri.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16217</link>
<guid>e83ca0372ed87246d0de7aaba7ca05cc</guid>
<pubDate>Thu, 04 Jul 2024 14:41:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>hcri.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>425662fee6064fab049f5a2003e6260303a1f586bc05d80540aea8c19581be08</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Abileneisd.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16218</link>
<guid>e2e322ec94862e9e45b4fc2951fed25d</guid>
<pubDate>Thu, 04 Jul 2024 14:21:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Abileneisd.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42eaaec1140a6d88f2599bee99856a840a1da44e8b366c671d1b5a6558113d5a</i><br /><br />Threat actor <b>description</b>: <i>Country: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Creative-Realities</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16214</link>
<guid>6b5bf4d4122957763ce3b07201e4003e</guid>
<pubDate>Thu, 04 Jul 2024 07:00:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Creative-Realities</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>786c4d235f9937f761e2109725dff7a3353c7f0654a7047e81f0a1b903057c8b</i><br /><br />Threat actor <b>description</b>: <i>Creative Realities, Inc. respects your privacy and is committed to protecting it through compliance with this privacy policy (“Privacy Policy”).This Privacy Policy applies to information collected from this Site; email, text, and other electronic communication between you and CRI.</i><br />Target victim <b>website</b>: <i>www.cri.com</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>ramservices.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16202</link>
<guid>3dc023ccc7e0bd23ce2d4427756fd03c</guid>
<pubDate>Wed, 03 Jul 2024 13:48:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>underground</b> claims attack for <b>ramservices.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5cf29ded7fceb492beb63085eb3699fcedd21bcf42c38590dd95a6857602591a</i><br /><br />Threat actor <b>description</b>: <i>Revenue:$162M - Country :USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>underground</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.swcs-inc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16200</link>
<guid>5e1f128ae6bd71960aa75fdd584b9db5</guid>
<pubDate>Wed, 03 Jul 2024 12:09:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.swcs-inc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e9cdcd591c992d61a7839d866930a2ea4e52e101051804faeee2d93c9c5762ab</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>RCBC.edu-Data-Breach-over-30000-University-Applications-Exposed</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16206</link>
<guid>7fbaf25be54e87742b79740e316cd96b</guid>
<pubDate>Wed, 03 Jul 2024 09:13:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pryx</b> claims attack for <b>RCBC.edu-Data-Breach-over-30000-University-Applications-Exposed</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9202dfe0a63f20642a022b76aa91b491268b1fe6bbce555306cc40aad478923</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>pryx</category>
</item>
<item xmlns:dc='ns:1'>
<title>valleylandtitleco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16196</link>
<guid>a9c154c4658d7fc48fd2be3ef34d9109</guid>
<pubDate>Wed, 03 Jul 2024 09:01:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>donutleaks</b> claims attack for <b>valleylandtitleco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc606f2c6c1a4d55c447335d874b6b491a7e9039ca26ec1a1dccc72789478bee</i><br /><br />Threat actor <b>description</b>: <i>I-❤️-TEXAS... there could be your advertisement here, but I posted the (official) statements of this company for the month. You can easily make sure that they are a bit of a pussy. It happens in a day that they "close" 10 times larger sums...  I always thought that Texas…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>donutleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>merrymanhouse.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16193</link>
<guid>f6e673b2ec10fe5019309e1a056a15c2</guid>
<pubDate>Tue, 02 Jul 2024 21:26:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>merrymanhouse.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>199105695a203eefd7cecd64227e18b92e741c6f8484892bbb65405d17c26b5e</i><br /><br />Threat actor <b>description</b>: <i>Merryman House Domestic Crisis Center is committed to improving the lives of those affected  by domestic violence: women, men, and children. We are the state-designated and only certified domestic  violence program in the Purchase Area Development...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>fairfieldmemorial.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16194</link>
<guid>11b631b33a9e4b22174517856d57e2b1</guid>
<pubDate>Tue, 02 Jul 2024 21:26:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>fairfieldmemorial.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f326f7f2d7d213b571a99f625f8786ce76714c4ff882959df1ecbf6474fc00b5</i><br /><br />Threat actor <b>description</b>: <i>Fairfield Memorial Hospital is a fully accredited, not-for-profit critical  access hospital. The hospital has 25 acute-care beds and a workforce of over 400 employees.  The medical staff at Fairfield Memorial Hospital is comprised of over 90 creden...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.daesangamerica.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16195</link>
<guid>3824f84640affa08dc499d238ebbdd73</guid>
<pubDate>Tue, 02 Jul 2024 21:19:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.daesangamerica.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>668a25c49fc617067096c185af86b66ec611899eec10dc1f22a3638104fd16ed</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>P1-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16186</link>
<guid>894d4b4665b798cc65d67cd6a32706aa</guid>
<pubDate>Tue, 02 Jul 2024 17:12:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>P1-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>975297214527614aa50d0c44254e320e15db3b2a29eb6d81eace65035ff9a5eb</i><br /><br />Threat actor <b>description</b>: <i>P1 Technologies company provides public cloud services. Blizzard  Entertainment, American Honda Motor, Canon, CBS, Disney, DreamWor ks, Intel, MACOM, Netflix, Rockstar, Sony, SpaceX, Warner Brother s and many others world famous companies have been clients of thi s cloud provider. We will upload the data soon and you will see d etails of their cooperation. Additionally you will find there may financial files with payment details and similar data. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Conexus-Medstaff</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16187</link>
<guid>3bcda54aa2a73ba8162fd2739d5e4ecb</guid>
<pubDate>Tue, 02 Jul 2024 17:12:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Conexus-Medstaff</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>32c6dbaa1a813e34815f899ed9e15e9de689b753be33670983fd16d5e4c2f63a</i><br /><br />Threat actor <b>description</b>: <i>Conexus MedStaff is a leading global recruitment agency that empl oys international nurses in the U.S. 20GB of data will be leaked  soon. Great amount of personal data like passports, SSNs, birth c ertificates and some other files can be found in the archive. Fin ancial, HR files, agreements are also represented. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Strauss-Brands-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16178</link>
<guid>561cfa0049e0c76748ead20ce9e837c5</guid>
<pubDate>Tue, 02 Jul 2024 11:55:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Strauss-Brands-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7dbee228413d402a54ba9aa83b12655421f298dd267f6ad4631b1eb44292852a</i><br /><br />Threat actor <b>description</b>: <i>Strauss Brands  (founded in 1937) supplies distributors, restaurants, retailers, and hotels with premium quality, ethically rais ed specialty meats. Products include american grass-fed beef, american lamb, and raised veal. The total amount of data leakage is 264.4 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>WheelerShip</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16180</link>
<guid>e1924e8eb73074038bbea5e2a0bffa40</guid>
<pubDate>Tue, 02 Jul 2024 10:57:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>WheelerShip</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f243fe0d17d9c90020efe28965398eff5a99d4f76aa76cad0e49e209aff212a</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>https://wheelership.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grand-Rapids-Gravel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16181</link>
<guid>943dbce47b9c6e4b765c675eceb16d78</guid>
<pubDate>Tue, 02 Jul 2024 09:15:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Grand-Rapids-Gravel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>635dcbc9ffb81c22ca50e784d9b2520a475e784a0b2b0d16226d18af2ff4cb43</i><br /><br />Threat actor <b>description</b>: <i>GRAND RAPIDS GRAVEL COMPANY, Kalkman Redi-Mix and Port City Redi-Mix have been delivering quality products since 1920.</i><br />Target victim <b>website</b>: <i>grgravel.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Franciscan-Friars-of-the-Atonement</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16182</link>
<guid>2194506fc6ef7a2048f03a0f4ee7c641</guid>
<pubDate>Tue, 02 Jul 2024 09:15:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Franciscan-Friars-of-the-Atonement</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>80063c922fa8b6ed2848b39d1598ce2d27d1cbdcc5b8333dc58a300b4f7a82a5</i><br /><br />Threat actor <b>description</b>: <i>Franciscan Friars of the Atonement                                                                                                                    </i><br />Target victim <b>website</b>: <i>atonementfriars.org</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vermont-Panurgy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16185</link>
<guid>1933736057242698a51c04e3a09f1e5f</guid>
<pubDate>Tue, 02 Jul 2024 09:15:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Vermont-Panurgy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87d333d58a7eaf5992395e8370e7001adfc64ee40c2100784c360a37c0260e1c</i><br /><br />Threat actor <b>description</b>: <i>For over 30 years, we have also been providing outstanding IT and training services for state agencies.</i><br />Target victim <b>website</b>: <i>panurgyvt.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>floridahealth.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16176</link>
<guid>54f9dcaffeb95f402aa2ac051b02c24b</guid>
<pubDate>Tue, 02 Jul 2024 06:18:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>floridahealth.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e8b4172ab0022f3b94be85867d780c51fd09e486b23b4ec4ae79ad229975ad1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>SYNERGY-PEANUT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16170</link>
<guid>a1cae678af59c92bbf86e04d9949aad7</guid>
<pubDate>Mon, 01 Jul 2024 19:12:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>SYNERGY-PEANUT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b69e8c22d46cca9f8d15bf285341f9f8cd7718289dad0cb2f807536ab76544f4</i><br /><br />Threat actor <b>description</b>: <i>SYNERGY PEANUT, LLC primarily operates in the Nonresidential Buil ding Operators industry within the Real Estate sector. More than  40Gb to be uploaded soon. Employee personal information, financia ls, agreements, customer information and so on. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bartlett--Weigle-Co.-LPA.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16164</link>
<guid>767a40871fcc018629b26f3a9ff39e19</guid>
<pubDate>Mon, 01 Jul 2024 08:58:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Bartlett--Weigle-Co.-LPA.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2086eb5a0f3158e9de89abdb3628039e107d2ad154bba8269c832a94f66ec1b4</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://bartlettlaw.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wayne-Memorial-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16161</link>
<guid>85dc7996f092d5ad5a652fac6079bd57</guid>
<pubDate>Sun, 30 Jun 2024 17:10:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Wayne-Memorial-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad827231197763edb58fe90218376f8a542d5a0f6d88d9610bd9d2b34e447bd4</i><br /><br />Threat actor <b>description</b>: <i>Wayne Memorial Hospital is a non-profit, community-controlled hospital based in Honesdale, Pennsylvania serving Wayne, Pike and Sullivan Counties.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>a4hs-dom.local</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16159</link>
<guid>116f7fad0fcd533f862692fddb0f0d3a</guid>
<pubDate>Sun, 30 Jun 2024 08:40:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>a4hs-dom.local</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a7935d3042ce45c186f804cd67939522ef0494f1d30ed3381ac13cdda40ffd7</i><br /><br />Threat actor <b>description</b>: <i>Our physician-owned multi-specialty medical group has been serving Pocahontas, Arkansas for over 30 years.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>DRM-Resources</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16154</link>
<guid>19a87049ef104ba10d1a7aa3d70ad59a</guid>
<pubDate>Sat, 29 Jun 2024 21:02:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>DRM-Resources</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e0f70ed4a489ca78bde5744301cc2fd44fe9ae7af5dddd4a8ec3ab0abd73abc6</i><br /><br />Threat actor <b>description</b>: <i>DRM Resources DRM Resources exists to create synergistic teams that unify diverse skill sets to envision new concepts and execute on them.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Freightliner-of-Grand-Rapids-amp-Kalamazoo</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16150</link>
<guid>63ab39b143493b832ee4e0a5746306ce</guid>
<pubDate>Sat, 29 Jun 2024 17:06:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>arcusmedia</b> claims attack for <b>Freightliner-of-Grand-Rapids-amp-Kalamazoo</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24cbc4c9e0fc6318be4aed35a072ecac2aa0318fa41e6ddacca8bc762539b908</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>arcusmedia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Puyallup-Tribe-ptoi.local</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16147</link>
<guid>ed4c1b66c7147f042c4cd33dbede174c</guid>
<pubDate>Sat, 29 Jun 2024 08:10:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Puyallup-Tribe-ptoi.local</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c9a2f5ae9a180a5d5a4a62db42daa2669594d94cc8fa45f5f8dfcaaddabf5408</i><br /><br />Threat actor <b>description</b>: <i>The Puyallup Tribal Council is the elected governing body of the Puyallup Tribe of Indians. The council consists of Chairman David Z. Bean, Vice Ch airman Bill Sterud, Sylvia Miller, Annette Bryan, Tim Reynon, James Rideout and Georgianna Bean.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-Of-Coon-Rapids</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16148</link>
<guid>f4ef8355f2db482222fe8d3a030e2279</guid>
<pubDate>Sat, 29 Jun 2024 08:09:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>City-Of-Coon-Rapids</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d2cd02fd45c18e06643fd6267d400b25cd92bb72937a4b97259de1dd58e21864</i><br /><br />Threat actor <b>description</b>: <i>Coon Rapids, Minnesota is a fabulous community located just 15 miles north of Minneapolis! Our city offers a variety of opportunities for recreatio n and shopping...as well as great housing options and wonderful opportunities for business! The City of Coon Rapids is unique local government agency, serving 62,435 citizens. Coon Rapids...Community strength...for generations. The City operates under a Council/Manager form of government. In this form, the Council establishes and directs city policy, and appoints a City Manager who is responsible for implementing those policies and carrying out the business of the Council. The City Council is comprised of a Mayor and six Council members. Five of the six members represent the city's five wards, with one member elected at-large. All council members are elected on a non-partisan basis.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Power-Lube-Industrial</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16140</link>
<guid>e165a2677bb8cfa3ed9b1d0a4a8938e4</guid>
<pubDate>Fri, 28 Jun 2024 17:14:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Power-Lube-Industrial</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c8762e03e4aa4300750c36dbe896f4e62afe7dbb91f271a9df5f354e60d1318</i><br /><br />Threat actor <b>description</b>: <i>Power Lube Industrial is a leading Tier-1 supplier of industrial  lubrication equipment solutions and a pioneer in the automatic lu brication business. All files we got from them will be available  here soon. Numerous financial data, bank details, transactions, p rojects, customer information, agreements, NDAs and other interna l stuff. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>ASI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16142</link>
<guid>868d5b697b168fd2f49f9c38787021da</guid>
<pubDate>Fri, 28 Jun 2024 17:04:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>ASI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ca8526f4013bfa4f720bc2892a0378c1cde22281297975e509387c2068222ba</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1987, ASI is a leader in the distribution of IT products and also offers custom integration on notebooks, desktops, servers, and NAS systems.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>promarkbrands.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16130</link>
<guid>02923027376e61c10053d9ab9d1c24a5</guid>
<pubDate>Thu, 27 Jun 2024 16:02:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dAn0n</b> claims attack for <b>promarkbrands.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3dcd9e3540a9326d9cc9301713c2d10d542727fc941ca80f0f3e6daeb1d4108f</i><br /><br />Threat actor <b>description</b>: <i>Leading manufacturer and distributor of a complete line of pro and semi-pro photo, video and audio equipment and accessories based in the Chicago S Uburbs in a modern 100,000 sq ft facility, promarks ...</i><br />Target victim <b>website</b>: <i>promarkbrands.com</i>]]></description>
<category>dAn0n</category>
</item>
<item xmlns:dc='ns:1'>
<title>landmarklife.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16122</link>
<guid>0102678d1922799cf9122b3f103975f1</guid>
<pubDate>Thu, 27 Jun 2024 14:55:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>landmarklife.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ae4c21f7bc04cd9e955e98972748cb7546782277dbf0c857941f3e16f6c2634</i><br /><br />Threat actor <b>description</b>: <i>landmarklife.com 2.4Tb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>conferenceusa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16120</link>
<guid>8810db09a185af4c2c17e706b5ff9470</guid>
<pubDate>Thu, 27 Jun 2024 13:11:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>conferenceusa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8d04f75ace8356764a91f9d6d3c9d22ec173b67c59e979368c70a4c2b5d5e7e4</i><br /><br />Threat actor <b>description</b>: <i>conferenceusa.com 1Tb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>Longviewbridge.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16114</link>
<guid>157e7c339794a3641f69bc0d49cbb969</guid>
<pubDate>Thu, 27 Jun 2024 09:00:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Longviewbridge.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea75ee658b07cd838cebea11281b0b47beeba66ab0e9d5a947c63eaa8b34aff5</i><br /><br />Threat actor <b>description</b>: <i>Country: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gallos-Metal-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16113</link>
<guid>aa93c21840e0e38da07d5ce3ea994b4e</guid>
<pubDate>Wed, 26 Jun 2024 18:13:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Gallos-Metal-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fcdaa871fd350fb0d627dd6ffa21c47afa63d26042129042d0b168d133cbbff8</i><br /><br />Threat actor <b>description</b>: <i>Gallos Metal Solutions Inc specializes in continuous mesh belt at mosphere heat treating. Employees personal files, NDAs, agreement s, financial data and other internal business files. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>US-Dermatology-Partners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16107</link>
<guid>bff886bf82b0832959345270ad54024f</guid>
<pubDate>Tue, 25 Jun 2024 22:01:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>US-Dermatology-Partners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c6db6c1693050beeec59edc2d23c864b37b8bdc4036e548efc36c67ef3b53cf5</i><br /><br />Threat actor <b>description</b>: <i>As a physician-owned dermatology practice in the country, U.S. Dermatology Partners patients not only have access to general medical, surgical, and cosmetic skin treatment through its coordinated care network.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Better-Business-Bureau</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16108</link>
<guid>a4b571e3226f43fe7d658ce1c92c4b40</guid>
<pubDate>Tue, 25 Jun 2024 22:00:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Better-Business-Bureau</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>836ec155c53fe59b947b5fa130f3b564d7dc5ef5fe637df720ee5af16625c4a1</i><br /><br />Threat actor <b>description</b>: <i>Better Business Bureau aim is to foster relationships between businesses and consumers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Utility-Datacenter</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16105</link>
<guid>1c1608a9365a88dc7e6a214c8b89e3f8</guid>
<pubDate>Tue, 25 Jun 2024 21:15:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Utility-Datacenter</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e94a09c2cb5f30a8da7d78b69ddbfaaef50dc3737c09b763322292de53105f9f</i><br /><br />Threat actor <b>description</b>: <i>Utility Datacenter is a technology integrator focused on helping  organizations and administrators through innovation and virtualiz ation. We will upload data of this datacenter here soon. You will  find lots of project files, client information, employee person al files etc. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Beckett-Thermal-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16103</link>
<guid>8f5c01673292dca6425ee6f028fc2ffa</guid>
<pubDate>Tue, 25 Jun 2024 18:18:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Beckett-Thermal-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33585e188fa162e0051369e2f7708b71a6c1eb732d07a8051be1b129ccbd4b1b</i><br /><br />Threat actor <b>description</b>: <i>Beckett Thermal Solutions is a global pioneer of combustion techn ologies. 11 Gb of data. Lots of projects files, employees names,  addresses, emails and other HR information. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Planar</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16101</link>
<guid>117007d714adf33db6d2653d903ebf2d</guid>
<pubDate>Tue, 25 Jun 2024 13:20:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Planar</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9d5072f9ad375fd7bc801f86e85734d97633740d0835739bf6a8a528e4feb3ca</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1983, Planar develops, manufactures, and markets electronic display products. The company produces liquid crystal display and other flat panel displays, and video projectors. The products are used in healthcare, call centers, point-of-sale, and other purposes. The company is headquartered in Hillsboro, Oregon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>rbbschools.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16098</link>
<guid>a65cdaa87ef58fd864ee42ce5fd25dff</guid>
<pubDate>Tue, 25 Jun 2024 10:43:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>rbbschools.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5145adc4c306670cbe356729d222179d75f61bb8561571c5f494923cc1bd12c2</i><br /><br />Threat actor <b>description</b>: <i>Edgewood Schools is a company that operates in the Education industry. It employs 51-100 people and has $1M-$5M of revenue.</i><br />Target victim <b>website</b>: <i>https://rbbschools.net/</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>keybenefit.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16088</link>
<guid>c058b3ed935f6561ad6c22bbf8d57463</guid>
<pubDate>Tue, 25 Jun 2024 09:15:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>keybenefit.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4af14e5603aafcae8fd648eba403e22e04376689c2b5e9e23c91530f3cc55eac</i><br /><br />Threat actor <b>description</b>: <i>Key Benefit Administrators, Inc. offers financial services. The Company provides employment benefit services that manages pension, retirement, health, and welfare funds. Key Benefit Administrators serves customers in the United States.SITE: www.keybenefit.com Address : 8330 Allison Pointe Trail Indianapolis, IN 46250, USAALL DATA SIZE: ≈2.5tb 1. Clients 2. Executive 3. HR 4. Audit 5. Home, users, employees data 6. Accounting & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>scrubsandbeyond.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16089</link>
<guid>ffc240fc1e1b0a7046828ca0e7877d9f</guid>
<pubDate>Tue, 25 Jun 2024 09:15:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>scrubsandbeyond.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0d3f5bb4a1f1dff990cdc61d6ffd238825ba13dcd4616b750dd35ecc26bfd737</i><br /><br />Threat actor <b>description</b>: <i>Scrubs & Beyond was founded in 2000 with the thinking that the healthcare retail experience could be completely transformed. The result was a retail experience that elevated medical professional essentials beyond the practical — and added a much-needed sense of humanity that was otherwise missing in the industry.SITE: www.scrubsandbeyond.com Address : 12969 Manchester Rd Saint Louis MO, 63131-1805 United StatesALL DATA SIZE: ≈600gb 1. Human Resources data 2. Users folders, Employees confidential data 3. Personal documents 4. Departments data: Accounting, Management… & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>ibewlocal1.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16090</link>
<guid>3ac88c103b945977e9085785158dac19</guid>
<pubDate>Tue, 25 Jun 2024 08:28:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>ibewlocal1.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>40eea08d7a5967ef99460186ebc0493f079051d5db6400803bb6a9f78be49d5e</i><br /><br />Threat actor <b>description</b>: <i>Frank Jacobs, Business Manager</i><br />Target victim <b>website</b>: <i>http://ibewlocal1.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>theeyeclinicsurgicenter.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16093</link>
<guid>a43bf030e75e0614616467f596075f14</guid>
<pubDate>Tue, 25 Jun 2024 08:27:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>theeyeclinicsurgicenter.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e2dd4d366ad33a577f3e6bf7bb010f2bb1227c84f8ba02bf34cc10af89158c1</i><br /><br />Threat actor <b>description</b>: <i>The Eye Clinic Surgicenter provides treatments for clear lens exchange, corneal cross-linking, contact lenses, corneal, dry eye, glaucoma, implanted contact lens, LASIK, optical, low vision, and retinal.</i><br />Target victim <b>website</b>: <i>https://theeyeclinicsurgicenter.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>arangobillboard.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16095</link>
<guid>b0f13a12e828374f22b1be5980afae58</guid>
<pubDate>Tue, 25 Jun 2024 08:25:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>arangobillboard.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>902019a86ab24d6ecf2c22c589751ba5cb419836ed3ec869952b708df2477caa</i><br /><br />Threat actor <b>description</b>: <i>Arango Billboard & Construction Co LLC is a company that operates in the Construction industry. It employs 21-50 people and has $5M-$10M of revenue.</i><br />Target victim <b>website</b>: <i>https://arangobillboard.com/</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>tpocc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16096</link>
<guid>f44f1b2dab84a36490fbd262cefdba89</guid>
<pubDate>Tue, 25 Jun 2024 08:21:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>tpocc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5ff49c5bbceb3f3a21dc0d767fbd484940a55fc7ee12e24dae0c4f3c41aa0013</i><br /><br />Threat actor <b>description</b>: <i>tpocc.org 570Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>middletown-township.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16085</link>
<guid>fb5ac34d9ac3cc3883230cb5b2b417bb</guid>
<pubDate>Tue, 25 Jun 2024 02:29:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>middletown-township.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5afa262a1273dfe20fb9d40170a4b691670b3a3c91663933b71709a6b3aa45a3</i><br /><br />Threat actor <b>description</b>: <i>Middletown Township 600 gb data from police and townhall</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.harrisranchbeef.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16079</link>
<guid>cfc7c6a21387750bd3f2b14f8242d548</guid>
<pubDate>Mon, 24 Jun 2024 22:24:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.harrisranchbeef.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06d61fb6e62c494b838108df5fad6525835ee682b8f6b6c85b034a725963f3a6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Revolution-Resources</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16072</link>
<guid>4d2356339f13e4b3d5aec55ba88a6019</guid>
<pubDate>Mon, 24 Jun 2024 01:37:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Revolution-Resources</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b085a1999492701342066de4147eb4a8fa03be59e8d6feeb4a2ae21f27774d8f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://revolutionresources.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>TPI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16061</link>
<guid>a13f8dcef4c4ab510e0c0795af71f77b</guid>
<pubDate>Sun, 23 Jun 2024 21:18:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>TPI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a053c76e9ebdc6ba4e9b87207e0261983f2228c2fcc3b0eb9328e556704640ae</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.tpicorp.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Harvey-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16062</link>
<guid>20dd77ae36c563532b294221536dab9f</guid>
<pubDate>Sun, 23 Jun 2024 21:17:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Harvey-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c37214c9ff7062ee2a36656c7a5eaec0f47db4353eccebef5d6f5f8d7b4667d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.harveyconst.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Belle-Tire</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16063</link>
<guid>bbeca2458adc54f3a17a309729c167fa</guid>
<pubDate>Sun, 23 Jun 2024 21:17:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Belle-Tire</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>168068e4a5a0342234b61df8b31d3707b2c8abe86097452a248711fd8dd21811</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.belletire.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hedrick-Brothers-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16064</link>
<guid>0df9db3088320cff4c7b2e2ec39d1610</guid>
<pubDate>Sun, 23 Jun 2024 21:16:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Hedrick-Brothers-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e196e46c1f200204af931d9e41ae530b53f0ac265753b0cd64030f8c869e0d8d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.hedrickbrothers.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bunger-Steel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16066</link>
<guid>44389d58f0d1d8bf3eb63fd6e3849702</guid>
<pubDate>Sun, 23 Jun 2024 21:15:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Bunger-Steel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>266c71cf8e90412d4c7ea444cd9e6b656e470aecf1f710016421b724234f2228</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.bungersteel.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>RRCA-Accounts-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16067</link>
<guid>40e244ce06f98f84c452989ca388b8a2</guid>
<pubDate>Sun, 23 Jun 2024 21:15:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>RRCA-Accounts-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3241305bc42e42618064627065b36a49de2c561e24ea231351785f07523275d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.rrcaaccounts.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>ProMotion-Holdings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16068</link>
<guid>1b19b065aa1cbff9f24d818246adb139</guid>
<pubDate>Sun, 23 Jun 2024 21:14:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>ProMotion-Holdings</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bad6334b20a13ef46d714057d789d56b538fc10a2bbbe82d8b953a56b20c4913</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.promotionholdings.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Custom-Concrete</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16069</link>
<guid>870271b323edc885b0478b67113fdbb1</guid>
<pubDate>Sun, 23 Jun 2024 21:14:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Custom-Concrete</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1c7a27c5d236f414d5628085c507b0334c2c28bf7382fdb36ae17720334725b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.customconcrete.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>federalreserve.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16070</link>
<guid>b2008aceaafd9e391fa285c4147095fd</guid>
<pubDate>Sun, 23 Jun 2024 21:12:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>federalreserve.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c38ef7f9b2d27602e44d3b96bb866c5db40a9bac2f27ec1d05910862299dc3b9</i><br /><br />Threat actor <b>description</b>: <i>Federal banking is the term for the way the Federal Reserve of the United States distributes its money. The Reserve operates twelve banking districts around the country which oversee money distribution within their respective districts. The twelve ci...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>fbttransport.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16059</link>
<guid>6daff3d43615b65709577a08c6adab4e</guid>
<pubDate>Sun, 23 Jun 2024 19:41:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>fbttransport.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e4488322f68bccb995ca94429e0441550b3cf35690fdff0165ab2b1e8c7e1794</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/OFFICE/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/OFFICE/PROOF/DATA DESCRIPTIONS: Personal identifiable information, financial documents, corporate confidential files, employees and executives personal files, corporate correspondence, etc.</i><br />Target victim <b>website</b>: <i>fbttransport.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>daystar.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16060</link>
<guid>29fe9fa1194f3e4c69f9a5477839526e</guid>
<pubDate>Sun, 23 Jun 2024 19:40:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>daystar.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ea6ffbb7289b8496a7b8d4d4a6e0e12495496e2c91cabad37861c424b590382</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/DAYSTARTV/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/DAYSTARTV/PROOF/DATA DESCRIPTIONS: Personal identifiable information, corporate confidential documents, financial data, personnel information, employees personal files, legal documents, corporate correspondence, etc.</i><br />Target victim <b>website</b>: <i>daystar.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zerto-Security</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16052</link>
<guid>ccda428c489a0d3bf7a1b8c432b535cf</guid>
<pubDate>Sun, 23 Jun 2024 10:10:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>handala</b> claims attack for <b>Zerto-Security</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>abf873e1d2215ddc39d7c444d25181ecac0417c336094d17373d7b5d906d8044</i><br /><br />Threat actor <b>description</b>: <i>Handala Hacked Zerto ( One of the largest Zionist cyber security companies in the world ) Zerto, a Hewlett Packard Enterprise company, empowers customers to run an always-on business by simplifying the protection, recovery, and mobility of on-premises and cloud applications. Zerto’s cloud data management and protection platform eliminates the risks and complexity of modernization…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>handala</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Newburgh</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16043</link>
<guid>98c1991adee78a8f7fd9b0cd2e7b3416</guid>
<pubDate>Sat, 22 Jun 2024 23:14:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>City-of-Newburgh</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b0845c9e9c14dd5de5b3f40ceeac62f443e61dde49b5d48e08d2716d0cc65e4d</i><br /><br />Threat actor <b>description</b>: <i>City of Newburgh</i><br />Target victim <b>website</b>: <i>https://cityofnewburgh-ny.gov/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>CBIZ-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16041</link>
<guid>3e49d4ec10aad7c623659c37e011665a</guid>
<pubDate>Sat, 22 Jun 2024 20:51:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>CBIZ-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3fa26e37b1acf407aea1943be337236a423c9e7c2e82244557a1486e72c22b55</i><br /><br />Threat actor <b>description</b>: <i>SALE</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Greenheck-Fan</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16042</link>
<guid>fdc3507c5193fe2896b618f1d154360b</guid>
<pubDate>Sat, 22 Jun 2024 20:51:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Greenheck-Fan</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>51a86e83784ad3fc38d82199911ee3a7793e7ca8829b4496bedb269a4c85a21b</i><br /><br />Threat actor <b>description</b>: <i>SALE</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>BLADE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16035</link>
<guid>d6368eb1ada0146fbabee40e79f3b4e4</guid>
<pubDate>Sat, 22 Jun 2024 11:18:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>BLADE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>58895f867606a995a088de88c0b85766623ec6c7c3ed5cb9c314567e3b73b849</i><br /><br />Threat actor <b>description</b>: <i>BLADE Urban Air MobilityBLADE is a technology-powered, global urban air mobility platform committed to reducing travel friction by enabling cost-effective air transportation alternatives to some of the most congested ground routes in the U.S. and abroad.No company flies more people in and out of city centers than BLADE. See BLADE's helicopter and jet charter routes.With BLADE, you can book by-the-seat on scheduled flights between Manhattan and JFK or Newark airports, between Vancouver and Victoria in Canada and between Nice and Monaco in Europe. Alternatively, you can charter or crowdsource a flight anywhere in the world. From the moment you book, you’ll experience a level of precision, culture of accommodation and on-the-ground experience that is unmatched. Whether you’re traveling by helicopter, seaplane or jet, BLADE is the most time-efficient, cost-effective and inspiring way to mitigate urban travel pain points that have increasingly become a significant part of our daily lives. https://www.blade.com/</i><br />Target victim <b>website</b>: <i>https://www.blade.com/</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Maryhaven-MHCLINICAL.LOCAL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16034</link>
<guid>0064f599ed0adb5870a5b3ffe438e485</guid>
<pubDate>Sat, 22 Jun 2024 00:03:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Maryhaven-MHCLINICAL.LOCAL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>268af7686063a3734315aac7477396e975c20a2b24fd61eb6a9982a800c320d3</i><br /><br />Threat actor <b>description</b>: <i>An active partner in the Franklin County & Central Ohio community for more than six decades, we have served over 227,000 people to date. Maryhaven provides a comprehensive continuum of services from sub-acute hospital detoxification; to adult residential, intensive outpatient, and aftercare; to family treatment; to extended care for women; to residential and outpatient services for teens; to a residential OVI Program (MESA); to outpatient safety programs for adults and adolescents.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Longview-Oral--Maxillofacial-Surgery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16031</link>
<guid>611f6a32dae4fdfd16a9bf955536b34f</guid>
<pubDate>Fri, 21 Jun 2024 18:11:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Longview-Oral--Maxillofacial-Surgery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>93eb414c0f950f31f509f5bc515e9897f3dbff0994fea03b25dff8021e408a44</i><br /><br />Threat actor <b>description</b>: <i>Longview Oral & Maxillofacial Surgery is a company that operates in the Hospital & Health Care industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wise-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16019</link>
<guid>d346c2bc24a74cc35bc7c84444da4925</guid>
<pubDate>Fri, 21 Jun 2024 09:13:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Wise-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c2ca87de1a0435b15532915f58cd0721b25424b387e170396812bdbaf27dc9bf</i><br /><br />Threat actor <b>description</b>: <i>For nearly three decades, Wise Construction has distinguished itself through exceptional service to clients in the healthcare, education, biotechno logy and corporate sectors throughout the Greater Boston area. Leading names in each of these             ...</i><br />Target victim <b>website</b>: <i>http://https://wiseconstruction.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Exhaustpro-shops</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16012</link>
<guid>82cbf6c40bb43fb0df95defe85f4e938</guid>
<pubDate>Thu, 20 Jun 2024 14:59:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>arcusmedia</b> claims attack for <b>Exhaustpro-shops</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a576d73cd699f43ecf4992eff2e33e73e1330858b1eba0d811a47ee9bec3130b</i><br /><br />Threat actor <b>description</b>: <i>This female owner and her partners...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>arcusmedia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sacred-Heart-Community-Service-shcstheheart.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16013</link>
<guid>7842858ddde53cb0a24dc8c9fea4f92b</guid>
<pubDate>Thu, 20 Jun 2024 13:53:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Sacred-Heart-Community-Service-shcstheheart.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec65f980046fbd567b495252a5612bf15772b5bb1c7e463d74338a3c0cb509e1</i><br /><br />Threat actor <b>description</b>: <i>The Sacred Heart Community Service , Is providing essential services to individuals and families in need remains one of Sacred Hearts core strategies. The organization has also evolved into a respected and innovative provider of programs that assists families with achieving lifelong economic self-sufficiency and a grassroots organizing network that addresses the root causes and consequences of poverty. The company was founded in 1964 and is based in South First St. San Jose, California.</i><br />Target victim <b>website</b>: <i>shcstheheart.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gorrie-Regan</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16014</link>
<guid>b7196f5fd0fce35ccadc7001fd067588</guid>
<pubDate>Thu, 20 Jun 2024 13:52:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Gorrie-Regan</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96799c46686094b4925b70de8104dd1343235550be352f26eb21eb3fea76ff8c</i><br /><br />Threat actor <b>description</b>: <i>For over 50 years Gorrie-Regan has demonstrated a level of service that is unmatched to the industries we serve. Our founders established Gorrie-Regan as "a service company that sells products. Not only have we never wavered from this guiding principle, but it is stronger today than it was then. Our Time and Attendance Labor Management systems are backed by the best product implementation and support team in the Time and Attendance industry with thousands of installations. Gorrie-Regan systems fit into your existing computer environment and utilize your Microsoft network architecture along with browser, Ethernet, and security capabilities to their fullest.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tri-City-College-Prep-High-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16027</link>
<guid>589614f4059c694cd0fd49e71249d610</guid>
<pubDate>Thu, 20 Jun 2024 11:34:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Tri-City-College-Prep-High-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e46c75edbe63b8aff84edb6d74ce81e6371b426460cc91bdb2cffe1431fdb0dc</i><br /><br />Threat actor <b>description</b>: <i>Tri-City College Prep High School ( established	1999 ) - is a grade 9-12 High School in Prescott, Arizona. The school focuses on academics to prepare their students for college life. Tri-City College Prep High School is located in 5522 Side Rd, Prescott, Arizona, 86301, United States and has 24 employees. The total amount of data leakage is 1,2 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fitzgerald-DePietro--Wojnas-CPAs-P.C.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16028</link>
<guid>bd0380ed35fb223e9916033fc3baf7da</guid>
<pubDate>Thu, 20 Jun 2024 11:34:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Fitzgerald-DePietro--Wojnas-CPAs-P.C.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>70d1addd3500752e06cb00d034d1e92ff95b2233d3d98038d2bbbd1dffc132c3</i><br /><br />Threat actor <b>description</b>: <i>Fitzgerald, DePietro & Wojnas CPAs, P.C. is a full service tax, accounting and business consulting firm located in Utica, New York. Fitzgerald, Depietro & Wojnas, Cpa's corporate office is located in 291 Genesee St Ste 3, Utica, New York, 13501, United States and has 19 employees. The total amount of data leakage is 92,5 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>GED-Lawyers-amp-..</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16010</link>
<guid>67a20639726a041ddbbd0f78e010f78b</guid>
<pubDate>Thu, 20 Jun 2024 11:02:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>arcusmedia</b> claims attack for <b>GED-Lawyers-amp-..</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>44c78674d171085337a84904cc5d3bedb1bff49803ddebc140d921ec334f5e82</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>arcusmedia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Basement-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16002</link>
<guid>637489250d6a28176d466c0aa567e65b</guid>
<pubDate>Thu, 20 Jun 2024 06:29:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cicada3301</b> claims attack for <b>Basement-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ec91c8b3d234bc7a3329d283a0b6daf94abc28bcd6ed843d1cda56f1556062b</i><br /><br />Threat actor <b>description</b>: <i>Basement Systems Inc., based in Seymour, Connecticut, is a network of basement waterproofing and crawl space repair contractors spanning across the United States and Canada.  Downloads: http://cicadacnft7gcgnveb7wjm6pjpjcjcsugogmlrat7u7pcel3iwb7bhyd.onion/basementsystems-recruiting  http://cicadacnft7gcgnveb7wjm6pjpjcjcsugogmlrat7u7pcel3iwb7bhyd.onion/basementsystems-shared  http://cicadacnft7gcgnveb7wjm6pjpjcjcsugogmlrat7u7pcel3iwb7bhyd.onion/basementsystems-users</i><br />Target victim <b>website</b>: <i>https://basementsystems.com</i>]]></description>
<category>cicada3301</category>
</item>
<item xmlns:dc='ns:1'>
<title>Behavioral-Health-Response-bhr.local</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15998</link>
<guid>f861a1acaebb1618a4db3a6983ee2cd3</guid>
<pubDate>Wed, 19 Jun 2024 21:22:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Behavioral-Health-Response-bhr.local</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>74e55b7fb4226c397c234b637b2d8d5516a889c261a9af2b954a54bb7e8772e1</i><br /><br />Threat actor <b>description</b>: <i>BHR provides confidential telephone counseling to people in mental health crises as well as mobile outreach services, community referral services and critical incident stress management (CISM). BHRs crisis hotline and mobile outreach services are provided free of charge to the public by paid professional staff who have masters degrees in their respective behavioral science disciplines. Established in 1994, Behavioral Health Response is a private nonprofit corporation, the hub for an Access Crisis Intervention (ACI) system, that provides 24-hour access to mental health services to residents of the city of St. Louis, Missouri and the counties of St. Louis, St. Charles, Franklin, Jefferson, Lincoln, Warren, Iron, St. Francois and Washington. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>suminoe.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15995</link>
<guid>97fd09fc2eb8eefa24c6b551f68ff559</guid>
<pubDate>Wed, 19 Jun 2024 16:45:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>suminoe.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf6fa5643401faa431a2620c7ef7fe25828139c82625ca08d7d200e99444258e</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/STA/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/STA/PROOF/DATA DESCRIPTIONS: Personal identification documents, corporate data, drawings, financial documents, supplier\customer information, employee personal data, corporate and personal correspondence, etc. </i><br />Target victim <b>website</b>: <i>suminoe.us</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>DERBY-SCHOOL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15989</link>
<guid>9070fb51f2c1dbd76e12b4229d24deaa</guid>
<pubDate>Wed, 19 Jun 2024 11:42:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>DERBY-SCHOOL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9eeac1912ab665d996eaeb247acc25024890b16ead1ae425c660883227562787</i><br /><br />Threat actor <b>description</b>: <i>Welcome to the Upper Darby School District, home of the Royals!  Located just outside of Philadelphia, we are one of the largest township school districts in the United States, educating over 12,000 students every day, who represent over 60 countries and 70 languages!  From celebrations to graduations, there's always something exciting happening in one of our fourteen schools, as we strive to provide opportunity, create unity, and showcase our excellence here at the Upper Darby School District!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>First-Baptist-Medical-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15988</link>
<guid>9e4f7d7b2e283f464766cb66dbd50a8e</guid>
<pubDate>Wed, 19 Jun 2024 10:58:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>moneymessage</b> claims attack for <b>First-Baptist-Medical-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff01fa6ba371e5f90077346e07bda1ab379bdd8ac45c5d46c034de53ff0fcbaf</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>moneymessage</category>
</item>
<item xmlns:dc='ns:1'>
<title>Circle-K-Atlanta</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15987</link>
<guid>6a710cdccdb02b3301d71d83ed3d15b3</guid>
<pubDate>Tue, 18 Jun 2024 23:43:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Circle-K-Atlanta</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>265c3805b6019d00f0f89e05f95124472b5daaba2ef18db234bccb2531b9463f</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://circlekatl.com/</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>reawire.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15983</link>
<guid>c80743f12de3498a6cf0d7d10e732233</guid>
<pubDate>Tue, 18 Jun 2024 11:42:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>reawire.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>74815e6aa04f98ae0a576e73378ed09c84f4b026d1c191ea8edb477ac2d69b2f</i><br /><br />Threat actor <b>description</b>: <i>Download link #1: https://***************.onion/REAWIRE/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/REAWIRE/PROOF/DATA DESCRIPTIONS: Personal identifiable information, employees personal files, corporate agreements, projects, financial documents, personnel data, corporate correspondence, etc.</i><br />Target victim <b>website</b>: <i>reawire.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>OCEANAIR</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15974</link>
<guid>eba7fcab4a6903ad17ca2e5aa70d6f6c</guid>
<pubDate>Mon, 17 Jun 2024 21:22:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>OCEANAIR</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac20805181119e73623b7e47d88ec2bc06614438d4206fac9bc6ad7e1a647486</i><br /><br />Threat actor <b>description</b>: <i>Boston-based OCEANAIR, Inc. has been a leader in international logistics management services and supply chain solutions since 1983.  We help companies manage and grow their supply chain operations by offering a complete range of tailored, innovative, and value-added solutions.  OCEANAIR’s services include Freight Forwarding, Customs Brokerage, Import and Export Compliance, and Domestic Trucking.  Our extensive global network of partners delivers cost effective multi-lane and multi-modal transportation management.  OCEANAIR has offices located in  Boston, MA; Portland, ME; Denver, CO; and Providence, RI.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Kansas-City-Kansas-Police-Department</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15975</link>
<guid>d2883cc21428e523fff0e72f8c0fc7b6</guid>
<pubDate>Mon, 17 Jun 2024 21:19:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>The-Kansas-City-Kansas-Police-Department</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a1b8bf19cde1569873f48c31bd7a099f1b40e8abe62c2523398f184fb871139</i><br /><br />Threat actor <b>description</b>: <i>Kansas police said they will not pay a ransom after voluntarily agreeing to have their case files made public. Trust your police.</i><br />Target victim <b>website</b>: <i>http://www.kckpd.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>northcottage.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15967</link>
<guid>97855ff80c2ef0cc2f1b586e78fb287b</guid>
<pubDate>Mon, 17 Jun 2024 18:12:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>northcottage.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a6a8b5b37138dc31845987bdf0d24e5e700d9f9ad0f6bc8167bc6b4bfb99f72</i><br /><br />Threat actor <b>description</b>: <i>The mission of the North Cottage Program, Inc. is to provide quality comprehensive residential substance addiction treatment to any addicted personwho desires recovery and meets the objective standards for admission and participation in the e            ...</i><br />Target victim <b>website</b>: <i>http://www.northcottage.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>St-Vincent-de-Paul-Catholic-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15968</link>
<guid>fdc2397ee9d0dbbcfdc0ba1c0fe3442b</guid>
<pubDate>Mon, 17 Jun 2024 18:12:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>St-Vincent-de-Paul-Catholic-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ef047864a114f40331e821135882f81c439374f2f0c7721ad7426677d37e6113</i><br /><br />Threat actor <b>description</b>: <i>St Vincent de Paul Catholic School is a company that operates in the Education industry. It employs 21-50 people and has $1M-$5M of revenue. The co mpany is headquartered in Peoria, Illinois</i><br />Target victim <b>website</b>: <i>http://www.svdpvikings.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>TETRA-Technologies-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15962</link>
<guid>7dc18693b9385d133160f80154c8976d</guid>
<pubDate>Mon, 17 Jun 2024 17:13:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>TETRA-Technologies-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c529c111353832c382c9df09eaae8384cb15f413c971ec753b3819a7b9fd0172</i><br /><br />Threat actor <b>description</b>: <i>TETRA Technologies, Inc., operates as a diversified oil and gas s ervices company. It operates through four divisions: Fluids, Prod uction Testing, Compression, and Offshore. We are going to share  very interesting 40GB of data. Numerous personal documents like p assports, birth certs, DLs... Confidential agreements, NDAs and e verything like that are widely represented. We will upload the fi les this week. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>A-Line-Staffing-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15969</link>
<guid>a0057a00b18bd48ac8c56bce68e483d7</guid>
<pubDate>Mon, 17 Jun 2024 16:24:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>underground</b> claims attack for <b>A-Line-Staffing-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>936f100194d065656c61f640cf10a0d61f06b51b9f3bb2402fd4fb7b791eadde</i><br /><br />Threat actor <b>description</b>: <i>Revenue:$96.1M - Country :USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>underground</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sensory-Spectrum</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15972</link>
<guid>e71b01a76dd61177e2dbfa7345b8e6de</guid>
<pubDate>Mon, 17 Jun 2024 16:16:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Sensory-Spectrum</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3876f675aea9daace83e4c0e2fae118f7beeb554f723f4ba2e1de60bdaa9aef0</i><br /><br />Threat actor <b>description</b>: <i>Sensory Spectrum, a globally recognized management consulting firm, specializes in understanding the sensory-consumer experience for industry, academia and government.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>pkaufmann.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15957</link>
<guid>4d3a2c830a6d81fe70e1a0691218121a</guid>
<pubDate>Mon, 17 Jun 2024 16:13:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>pkaufmann.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38cb845f2529e826f8670c2e76a8b40de5f37c3d3277c075bb0a108c89ed81cc</i><br /><br />Threat actor <b>description</b>: <i>P/Kaufmann Fabrics is the premier home furnishings textile converter, having supplied our customers with expertly-crafted designs for over sixty five years. We offer a wide range of stocked products including decorative prints, plains, textures, embroideries, jacquards, velvets, sheers, and performance fabrics.SITE: www.pkaufmann.com Address : 3 Park Avenue New York, NY 10016 USA Tel.# 877.292.8375ALL DATA SIZE: ≈850gb 1. Accounting 2. HR, Users 3. Scans, Confidential… & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.domainatcleveland.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15964</link>
<guid>2e74a7ac5ae99bce3c891f74bcbfd0ee</guid>
<pubDate>Mon, 17 Jun 2024 14:49:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>www.domainatcleveland.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>31ae7b5ad64ec167b2c289d1f5f613324f6cf187343073725ffdfc1ffc95fd8e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Next-Step-Healthcare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15954</link>
<guid>26dd3e3520fb7e479ba6e8f53f150d10</guid>
<pubDate>Mon, 17 Jun 2024 14:13:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Next-Step-Healthcare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7ef5c18044ed0a4f02e1d2a2e845a0208c5ea2c3e396e16ac80c2227336175d8</i><br /><br />Threat actor <b>description</b>: <i>Next Step Healthcare provides nursing and rehab facilities in Massachusetts, New Hampshire and Maine for families and individuals who need short orlong-term options in the face of a variety of health challenges. You don't have much time left            ...</i><br />Target victim <b>website</b>: <i>http:// www.nextstephc.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>fifcousa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15959</link>
<guid>f542f98100aab2e01bcf4f253f88c107</guid>
<pubDate>Mon, 17 Jun 2024 13:13:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dAn0n</b> claims attack for <b>fifcousa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e3f4bcd99971baa11dd335d74ca75756c9598eba070a491487c7d2f3d52cd19</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2009, FIFCO USA, owns and operates breweries and retail locations in New York, Vermont, Oregon, and Washington. Their headquarters is inRochester, New York.
Subsidiaries and affiliates: La...</i><br />Target victim <b>website</b>: <i>fifcousa.com</i>]]></description>
<category>dAn0n</category>
</item>
<item xmlns:dc='ns:1'>
<title>mgfsourcing.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15953</link>
<guid>84d2a013f34a449185e0a8b510929235</guid>
<pubDate>Mon, 17 Jun 2024 13:13:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>mgfsourcing.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0730e8648454185e5c720ae0cad71a731998034e7d879ef955ec4764c835ea2e</i><br /><br />Threat actor <b>description</b>: <i>MGF Sourcing is an independent US-led global sourcing company founded in 1970. We focus on US-based specialty apparel retailers and, with our strong track record in apparel sourcing and best-in-class technical capabilities, have developed a long-standing reputation as a reliable and trustworthy partner. We offer end-to-end services from design, product development, sourcing, quality assurance, and trade compliance to global logistics. We’ve developed a unique way of working that helps us deliver quality merchandise for our customers on time, at cost, and in compliance. Our values form the foundation of our approach to business and have led us to become a company with over $1 billion USD in annual sales. Headquartered in Columbus, Ohio, the company also maintains offices in Bangladesh, China, Hong Kong, Indonesia, India, Korea, Sri Lanka, and Vietnam. With more than 550 associates in 9 countries, our global team collaborates across categories and borders, supporting innovation and increasing flexibility for our customers.SITE: www.mgfsourcing.com Address : 4200 Regent Street; Suite 205 Columbus, OH 43219 United StatesALL DATA SIZE: ≈500gb+ 1. Corporate data: Finance, HR,… 2. Users personal data & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Production-Machine--Enterprises</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15950</link>
<guid>1aa7690e43a5471b7344591df7afb611</guid>
<pubDate>Sun, 16 Jun 2024 16:01:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Production-Machine--Enterprises</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79e9e05bc223e3aa3660636a063ce711411d6d7b52623e950076d5a149c508dc</i><br /><br />Threat actor <b>description</b>: <i>Production Machine & Enterprises Since 1978, Production Machine & Enterprises (PM&E) has specialized in the CNC machining of parts from non-ferrous castings to bar stock.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kiemle-Hankins</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15949</link>
<guid>afab9e1401c7c4b559e2723add38e05a</guid>
<pubDate>Sat, 15 Jun 2024 20:23:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Kiemle-Hankins</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f6657db5f9f317dc1fc565536e2f590f9dd83d1aa8545c3c94b357ed27c564a</i><br /><br />Threat actor <b>description</b>: <i>Kiemle-Hankins Kiemle-Hankins and Birclar have been leaders in industrial maintenance for over 80 years, and together, we are one of the most trusted companies in the industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>MRI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15947</link>
<guid>bc02850ceec640422e0cd11a6a4b827e</guid>
<pubDate>Sat, 15 Jun 2024 16:47:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>MRI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96ae90ce832d985aa5d9d0116d579b3d00d12af3cb6d65fba4d298a8211bbd97</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://mri-inc.net/</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Oahu-Transit-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15945</link>
<guid>b750c583c4740415f8c803198ad9a318</guid>
<pubDate>Sat, 15 Jun 2024 14:47:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Oahu-Transit-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7dc094056ec1408ad1601cd31f9d08b7df93d7e752cf182b3d33cfee788a381a</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1991, The Oahu Transit Services Group (OTS) owns and operates a fleet of buses for Honolulu, Hawaii, referred to collectively as TheBus.They recently began a new commuter ferry service, called The Boat.

Another major leak, about 800,000 records that include personal data of customers, you can get acquainted with the columns of the database, 

[RecNum]
[RefNo]
[Reason]
[IDType]
[IDNumber]
[PassType]
[Fee]
[FName]
[LName]
[Addr1]
[Addr2]
[City]
[State]
[ZipCode]
[Phone]
[SSN]
[Sex]
[DOB]
[Resident_Status]
[ExpDate]
[NewExpDate]
[ADAFlag]
[PCAFlag]
[Desc1]
[Desc2]
[Dept]
[Comments]
[Duration]
[Months]
[Login]
[EXCLUDE]
[LOCATION]
[IDTYPE_CODE]
[REASON_CODE]
[ModDate]
[ModBy]
[SAFLAG]
[BUSEXPDATE]
[IDTYPE_CODE2]
[DISABILITY_STATUS]
[NEWBUSEXPDATE]

we give this company 7 days to get in touch, otherwise their customers will suffer due to their negligence. </i><br />Target victim <b>website</b>: <i>thebus.org</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sun-City-Pediatrics-PA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15940</link>
<guid>53fdb13a424de26ee95ff49e5eee95b9</guid>
<pubDate>Sat, 15 Jun 2024 09:01:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>Sun-City-Pediatrics-PA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>03b9fc8e3750b91ac02b18b30af2605ba15321bae10ce6ec486f35f346d9591a</i><br /><br />Threat actor <b>description</b>: <i>Sun City Children's Clinic provides a high quality comprehensive approach in treating its patients and educating their parents. Revenue: <5MContents:- Patient Data (e-mail addresses, residential addresses, telephone numbers)- Patient Photo - Patient Medical Histories- Stuff Personal Data (including salary and position data)- Financial Reports- Databases- Other Valuable and Confidential Documentation https://leetrevinodental.com/</i><br />Target victim <b>website</b>: <i>https://leetrevinodental.com/</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>InVogue-Women-Healthcare-PLLC-USATX</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15941</link>
<guid>5717711e6607ece2b6b847da2133f700</guid>
<pubDate>Sat, 15 Jun 2024 08:55:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>InVogue-Women-Healthcare-PLLC-USATX</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1dc65e10637c3ea720e0576c07ee4fa02fa252953df5583310b6efaded1ce6fb</i><br /><br />Threat actor <b>description</b>: <i>In addition to specializing in obstetrics and gynecology, InVogue Women Healthcare offers primary care services for a variety of health issues including obesity, thyroid disease, hypertension and common ailments such as colds and flu. Contents:- Patient Data (e-mail addresses, residential addresses, telephone numbers)- Patient Photo (including intimate photos)- Patient Medical Histories- Stuff Personal Data (including salary and position data)- Financial Reports- Databases- *@invoguemd.com Outlook pst's- Other Value Documentation https://invoguerejuvenation.com/</i><br />Target victim <b>website</b>: <i>https://invoguerejuvenation.com/</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lee-Trevino-Dental-USATX</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15942</link>
<guid>68230fb510baa246a67bf901c7f895ea</guid>
<pubDate>Sat, 15 Jun 2024 08:54:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>Lee-Trevino-Dental-USATX</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>adfa5fc9b891461e94e92c108f6a4aec3f727dcf793563e1fff5a8206168713e</i><br /><br />Threat actor <b>description</b>: <i>Dental clinic Lee Trevino Dental, opened in 1977 and positions itself as a "Family Dentistry Clinic", that offer the latest in general and cosmetic procedures. Revenue:  <5M.Contents:- Patient Data (e-mail addresses, residential addresses, telephone numbers)- Patient Photo - Patient Medical Histories- Stuff Personal Data (including salary and position data)- Financial Reports- Databases- Other Valuable and Confidential Documentation https://leetrevinodental.com/</i><br />Target victim <b>website</b>: <i>https://leetrevinodental.com/</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Peregrine-Petroleum</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15944</link>
<guid>cf464bd17a01821f7d045dddfc49ccf7</guid>
<pubDate>Sat, 15 Jun 2024 01:22:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Peregrine-Petroleum</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>affde9ea36529c8cb089c7b81c5bc407b7fc679dea687be87873755211a1f99d</i><br /><br />Threat actor <b>description</b>: <i>(178gb + private SQL_DB 24gb)</i><br />Target victim <b>website</b>: <i>http://www.peregrinegp.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>svmasonry.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15937</link>
<guid>36c8d2b3e0a29251e74fab7bfe5931ab</guid>
<pubDate>Fri, 14 Jun 2024 22:14:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>svmasonry.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b410c99e3adeeb5f285e931b47f2f0f2bcbe97e8ed70c55e51f634c3f26fa8ed</i><br /><br />Threat actor <b>description</b>: <i>Sun Valley Construction is a company that operates in the Construction industry. It employs 51-100 people and has $5M-$10M of revenue. The companyis headquartered in Phoenix, Arizona.</i><br />Target victim <b>website</b>: <i>http://www.svmasonry.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>EnviroApplications</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15934</link>
<guid>192d80a88b27b3e4115e1a45a782fe1b</guid>
<pubDate>Fri, 14 Jun 2024 19:14:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>EnviroApplications</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87f29288930c6db5d63628b859b5fdeddfdbd609d0cf317c97ed65316cd268ec</i><br /><br />Threat actor <b>description</b>: <i>We have all confidential documents. Including finances, accounts, personnel details, projects, clients, suppliers, etc. EnviroApplications, Inc. is an employee-owned environmental and engineering consulting firm serving Southern California, A            ...</i><br />Target victim <b>website</b>: <i>http://https://enviroapplications.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>MBE-CPA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15938</link>
<guid>4b0a618db23379c7c77f818cf569050d</guid>
<pubDate>Fri, 14 Jun 2024 18:30:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>metaencryptor</b> claims attack for <b>MBE-CPA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18c77d1b3d09ed4583eb49589220f2ded65f3f883c7a7fe31c17e47777b723b9</i><br /><br />Threat actor <b>description</b>: <i>MBE CPA is accounting service and business services company, provide financial solutions for individual and business.
Revenue: $25 M</i><br />Target victim <b>website</b>: <i>https://mbe.cpa</i>]]></description>
<category>metaencryptor</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-Balance-Commodities</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15933</link>
<guid>6be0fc6d398b58e837e9ed93a6342a46</guid>
<pubDate>Fri, 14 Jun 2024 17:14:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>New-Balance-Commodities</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e0cdd88a03ce2ab41dd9b708efac58a011338cf6f9b4771bcbeb3f12a9311dd2</i><br /><br />Threat actor <b>description</b>: <i>New Balance Commodities provides grain processing and cattle feed ing services by mediating the void of communication, logistics, a nd information between the two industries. Lot's of agreements, r eports, financial information, bank transactions, vendors informa tion and so on. 24GB in total will be available soon. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dordt-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15926</link>
<guid>84b2d2db48ff54a74fb6e067f5d18e4e</guid>
<pubDate>Thu, 13 Jun 2024 17:38:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Dordt-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>73052e2b1675c072182545d46d3b14477dc26d4c6bf895229f043964d553af8d</i><br /><br />Threat actor <b>description</b>: <i>Dordt College is a private, Christian, and liberal arts college. It offers education from a reformed Christian perspective.</i><br />Target victim <b>website</b>: <i>dordt.edu</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cukierski-038-Associates-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15922</link>
<guid>94bc2d7bde46c9df3a2647a6c78144c0</guid>
<pubDate>Thu, 13 Jun 2024 17:18:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Cukierski-038-Associates-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7ee8e4da81e0a3d3d63fe26b897b3b709e40627b9319fd16b867a5c7603a41a3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>2K-Dental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15920</link>
<guid>67e8858b4feea9df93a2bafb9232e081</guid>
<pubDate>Thu, 13 Jun 2024 15:08:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>2K-Dental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>308459f30b63ed4756cadce8f1d79fd95422693843012c80ee34ce01079dc8a5</i><br /><br />Threat actor <b>description</b>: <i>Company has the last 48 hours to contact us using the instructions left.In case of silence, all data will be published and clients notified https://www.2kdental.com/</i><br />Target victim <b>website</b>: <i>2kdental.com</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bock--Associates-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15919</link>
<guid>0ebcdb06cf4d039f0d08b356c26bc466</guid>
<pubDate>Thu, 13 Jun 2024 10:14:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Bock--Associates-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9b3f006f647d90660f9e0ab00674e617d095ff1bed846e603148b38031325b64</i><br /><br />Threat actor <b>description</b>: <i>Bock & Associates LLP is a company that operates in the Accounting industry.</i><br />Target victim <b>website</b>: <i>https://www.bockcpa.com/</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Celluphone</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15912</link>
<guid>06b87c9e02de2d5cf9dda1d3a42e089e</guid>
<pubDate>Thu, 13 Jun 2024 05:54:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Celluphone</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a33b0b3cf6ab23b79a2c78a62e29d650636d1ccf31aa2ebfcf0c2dac0aea124</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.celluphone.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Me-Too-Shoes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15913</link>
<guid>4d6a0e7e466e151b0a886d2f027183c1</guid>
<pubDate>Thu, 13 Jun 2024 05:53:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Me-Too-Shoes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87c03f5722a554ed937c4acb5552a127601d05a184f4bec30ee92ecbf5497425</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.metooshoes.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-Builders</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15918</link>
<guid>cc43cae8b2c9735749cb067be62f9311</guid>
<pubDate>Thu, 13 Jun 2024 05:50:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>City-Builders</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>39a5516c63909410160f3bd1b804f1cf8adf623de68c07fffeebd9010caf7562</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.citybuilders.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Western-Mechanical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15891</link>
<guid>206316442fb9a23e1665ccd7a4f151d2</guid>
<pubDate>Wed, 12 Jun 2024 18:45:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Western-Mechanical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>75f9b7e0ff611a9a8eb0e61481aece197f00b14e599957a43b06d51a3532f8bc</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.westmech-hvac.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trisun-Land-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15892</link>
<guid>8fb276fc273796ca929b7fc45c2bc661</guid>
<pubDate>Wed, 12 Jun 2024 18:45:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Trisun-Land-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b45e7f02142929049c2cf9512ec362c9ec07240c6f41d51dd9aa34db30076e1e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.trisunlandservices.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>GEMCO-Constructors-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15893</link>
<guid>e0a30be9b1b30f4d56a2f1e1e760e536</guid>
<pubDate>Wed, 12 Jun 2024 18:36:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>GEMCO-Constructors-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e8a2cc02a60488588c8a50cc7dceeb229b95f00585fbfb504d058d4bf56b1da</i><br /><br />Threat actor <b>description</b>: <i>GEMCO Constructors is a mechanical, electrical and plumbing design company. GEMCO Constructors corporate office is located in 6525 Guion Rd, Indianapolis, Indiana, 46268, United States and has 187 employees. The total amount of data leakage is 1.0 TB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Diverse-Technology-Industrial</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15896</link>
<guid>4c58556a4800c5f18316dcfbe00480bd</guid>
<pubDate>Wed, 12 Jun 2024 18:34:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Diverse-Technology-Industrial</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4b5ee0100d4e64a4357d8f0a0551c4e2e8da08ce4047e9f2751fbf40a40d368</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.dtindustrialflooring.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Air-Cleaning-Specialists</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15897</link>
<guid>30c9e61c56a0a84b7fd7176f0323d0b6</guid>
<pubDate>Wed, 12 Jun 2024 18:33:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Air-Cleaning-Specialists</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d6b1346522e81ecb94266fdbf3379e7fcd7f74c5c12de09e4346ce65280080af</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.aircleaningspecialists.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Corbin-Turf--Ornamental-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15898</link>
<guid>816865fa670ed97d787c0c977edaf01a</guid>
<pubDate>Wed, 12 Jun 2024 18:33:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Corbin-Turf--Ornamental-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>671000bbd162a4ee996319f0d687c8bacbdf1f79920513a76b79033865421228</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.corbinturf.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kinter</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15899</link>
<guid>7071a9c8703726d78b0a3089ce26457b</guid>
<pubDate>Wed, 12 Jun 2024 18:32:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Kinter</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>80306b3e6e3ccb1070373299a619c15c3278bca8f8d85823e94160202eb43349</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.kinter.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Goodman-Reichwald-Dodge</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15900</link>
<guid>0d056cb65729981066d83ad9ea7e7325</guid>
<pubDate>Wed, 12 Jun 2024 18:31:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Goodman-Reichwald-Dodge</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>07a395522094bd3de26030d65cd496bb455c4fbbe1a8ea757cfbaf0db075aa22</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.freightbillauditor.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brainworks-Software</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15902</link>
<guid>c60a617f9800bf968672bda753787d99</guid>
<pubDate>Wed, 12 Jun 2024 18:30:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Brainworks-Software</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0d6cf7924033e5b91653739471136a76a1159cd846ce82fef164cc5403d10752</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.brainworks.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eagle-Materials</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15903</link>
<guid>911b10b73d26005b82c8d2b5256f2403</guid>
<pubDate>Wed, 12 Jun 2024 18:30:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Eagle-Materials</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f582ef63e9ca606e46c5743f15e785fec859fbd13863152ae32ac2c5ec29cbf</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.eaglematerials.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Great-Lakes-International-Trading</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15904</link>
<guid>5982407c8b651cdf1ecdc48937c14cbe</guid>
<pubDate>Wed, 12 Jun 2024 18:29:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Great-Lakes-International-Trading</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f544b67b70e5c36ab80813e000c6bc994a07a1564ec63f1d9e23646555dafb85</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.glit.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Smartweb</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15905</link>
<guid>ac9409d10ea7b978d52b9e977ef787cc</guid>
<pubDate>Wed, 12 Jun 2024 18:29:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Smartweb</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>62833964a4890a1821e20a42d439581834633e54fcce0a0ec6c48e0296983e27</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.smartweb.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Peterbilt-of-Atlanta</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15906</link>
<guid>475820c2296dc914143683e9edbce43b</guid>
<pubDate>Wed, 12 Jun 2024 18:28:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Peterbilt-of-Atlanta</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc48349618ccf77e5e6815930ceb00c3b667a19fcee9fd30940297871f475d2a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.peteatlanta.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chroma-Color</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15907</link>
<guid>0e20535de00c6a84cca2ff2da9a6a402</guid>
<pubDate>Wed, 12 Jun 2024 18:28:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Chroma-Color</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8c74c6f189df124a6255d14cf7582fd0911c3c4ecc6525ef2f3717adeba9c41c</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.chromacolors.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shinnick--Ryan</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15908</link>
<guid>20b3c39862ca1f0e8a12a96218615351</guid>
<pubDate>Wed, 12 Jun 2024 18:27:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Shinnick--Ryan</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87dbe709c1b3a08c300eb915642ac0f6998da534e3d55117c37b76ca8371ce99</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.srfirms.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>hydefuel.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15885</link>
<guid>1c150c70579a81b2b641b4a98de07cf6</guid>
<pubDate>Wed, 12 Jun 2024 17:12:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>hydefuel.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>097155e5d6297bc3be3f7d0adba2f4b1af8d0bc0ec40c4a53008261877c6cd6f</i><br /><br />Threat actor <b>description</b>: <i>At Hyde Fuel, we offer competitive salaries, great benefits and a pleasant working environment. We are always looking for the "best and brightest"service technicians, customer service representatives and administrative staff members to join o            ...</i><br />Target victim <b>website</b>: <i>http://www.hydefuel.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>manncorp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15883</link>
<guid>649c73a98a5b1f897c05b5f18593354d</guid>
<pubDate>Wed, 12 Jun 2024 14:58:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>manncorp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab63af39584c99e4e979a07785adb2126bf8062c899be5d42da8097eae223e70</i><br /><br />Threat actor <b>description</b>: <i>Manncorp offers equipment, service, and financing solutions for PCB assembly. Learn how they can help you with worry-free selection, protection, setup, support, training, and diagnostics.  Finance, all Quickbook data, HR, KeePass with all passwords...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>sgvfr.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15884</link>
<guid>a6bf0f2a7ae9328478049b705b15261b</guid>
<pubDate>Wed, 12 Jun 2024 13:46:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trinity</b> claims attack for <b>sgvfr.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d32e12a81b08e26e9ac51f40ca5356d55717ea357d2bfdf11c38a9d974c6cd02</i><br /><br />Threat actor <b>description</b>: <i>sgvfr.com - Revenue: 5kk - Publication date: 2024-06-30</i><br />Target victim <b>website</b>: <i>sgvfr.com</i>]]></description>
<category>trinity</category>
</item>
<item xmlns:dc='ns:1'>
<title>smicusa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15877</link>
<guid>58936a175470c7915a764a2e98ebacf3</guid>
<pubDate>Wed, 12 Jun 2024 07:08:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>smicusa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e10da0e0c75fbf6ac5de21b27520614eb7ee6527b69f05cfd172e0ac7202479</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Special-Health-Resources</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15875</link>
<guid>07088553c7d6c0440eaa1567febda186</guid>
<pubDate>Wed, 12 Jun 2024 06:45:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Special-Health-Resources</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0da1509e464063f968959b44a4a4015b3bde47d19ee5f96c771be1a582d4a6e1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.specialhealth.org/</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>NJORALSURGERY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15872</link>
<guid>8928157317a66f146e4f2d5617537336</guid>
<pubDate>Wed, 12 Jun 2024 04:00:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NJORALSURGERY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2e9ef302ed528ed98a4073e4e315b43b17c25a9645f7d83a382633690965c83c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>WinFashion-ERP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15871</link>
<guid>a295a55e7c3b2af6f363711442900b96</guid>
<pubDate>Wed, 12 Jun 2024 01:52:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>arcusmedia</b> claims attack for <b>WinFashion-ERP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0123e059c3a9d4d4abb3e49b1a6d943e167a87758fe8f2bfffe28187dcc6935b</i><br /><br />Threat actor <b>description</b>: <i>WinFashion is an international company supplying...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>arcusmedia</category>
</item>
<item xmlns:dc='ns:1'>
<title>CentralSecurities.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15864</link>
<guid>0cad5adfb5b36b908b4bfe0e47371e3b</guid>
<pubDate>Tue, 11 Jun 2024 05:28:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>underground</b> claims attack for <b>CentralSecurities.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c03ae59cc94a8bad82ad4107a305ea78d1003edcc47b7beb95569514152915b</i><br /><br />Threat actor <b>description</b>: <i>Revenue:$230M - Country :USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>underground</category>
</item>
<item xmlns:dc='ns:1'>
<title>a-agroup</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15861</link>
<guid>9c9621326ed9355530395015643f8af5</guid>
<pubDate>Tue, 11 Jun 2024 01:16:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>a-agroup</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>13d668024378e27d23183f9bfef584f528d28facb20c9257bfbdef69df660302</i><br /><br />Threat actor <b>description</b>: <i>A&A Group is a company that operates in the Construction industry. It employs 21-50 people and has $10M-$25M of revenue. The company is headquartered in Fairfield, New Jersey</i><br />Target victim <b>website</b>: <i>http://www.a-agroup.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Harper-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15859</link>
<guid>b069f422014bef78e113594795f58b71</guid>
<pubDate>Mon, 10 Jun 2024 20:19:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Harper-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f1a9b0973414a3fe60608b011baf2ede8a3e4e833cc1caacbfe2222b69d070e</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.harperindustries.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>jmthompson.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15849</link>
<guid>b150a8c54f717b966fee06d0b7e49f6f</guid>
<pubDate>Mon, 10 Jun 2024 13:47:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>jmthompson.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b648cdfa3b79a0b4ae9eef0e472456048d6d655b621753a00e19a261ee748a0d</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/JMT/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/JMT/PROOF/DATA DESCRIPTIONS: Personal identification documents, employee personal files, confidential corporate data, projects, drawings, financial documents, supplier\customer information,  corporate and personal correspondence, etc.</i><br />Target victim <b>website</b>: <i>jmthompson.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>SolidCAM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15846</link>
<guid>e8630344970962450dbedfcd4cc6d718</guid>
<pubDate>Mon, 10 Jun 2024 11:37:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>handala</b> claims attack for <b>SolidCAM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9af734f3b381121d4d7c6299af4cf2203ad1141404a3c4671c15e25294fee8d5</i><br /><br />Threat actor <b>description</b>: <i>Hello to SolidCAM ! Handala Hacked SolidCAM (https://www.solidcam.com/). SolidCAM is an on-premise computer-aided manufacturing (CAM) program that handles and governs CNC milling procedures. It permits users to merge with other CAM and computer-aided design (CAD) interfaces and offers diverse tools to streamline milling and turning operations. This software was released for the first time by…</i><br />Target victim <b>website</b>: <i>www.solidcam.com</i>]]></description>
<category>handala</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rockford-Public-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15844</link>
<guid>aaddcd13798c7609e4c6479d1a4f67c9</guid>
<pubDate>Mon, 10 Jun 2024 02:05:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Rockford-Public-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3c0d157958b1044ded3a9698ad64ae89f5307ca3bd8811713341c3941361ae6</i><br /><br />Threat actor <b>description</b>: <i>In the course of successful work with this company, we have more than 1.5 TB of data in our hands. Data on students, passports of employees and students. Data on all incidents in recent years. All financial documents, all mail correspondence. And much, much more. In case of refusal to agree, all information will be published.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>CONTROLNET</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15845</link>
<guid>9a912f218d27a625d946ed56081d9123</guid>
<pubDate>Mon, 10 Jun 2024 02:04:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>CONTROLNET</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63896ac517b0496bfb440823ca6dcadb433e48f69a94b3fa7ebfd0cd96267f64</i><br /><br />Threat actor <b>description</b>: <i>Where Smart Buildings Are Built ControlNET has earned the reputation as one of the most proficient system integrators in the region. With exceptional and responsive customer service, we create building management systems to analyze deficiencies, find solutions, and save energy.   Our goal is to increase comfort and security while optimizing operational costs.  This company has taken very poor care of the data entrusted to them by its customers. In the course of a successful attack, we stole a huge amount of data. We also attacked the clients of this company ROCKFORD SCHOOL. Which we have access to thanks to CONTROL NET.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Barrett-Eye-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15841</link>
<guid>e6496f5f04bc759fa7a33e69f604ef17</guid>
<pubDate>Sat, 08 Jun 2024 15:41:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Barrett-Eye-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9901e46fdc9a6ce6feb28e82c430dc3adb4e127d950b08d14e1a159298d7da65</i><br /><br />Threat actor <b>description</b>: <i>At Barrett Eye Care we pride ourselves on being a full service, comprehensive, ophthalmology clinic. We are equipped to handle the full spectrum ofeye problems ranging from complex medical eye diseases to routine eye exams. We provide multiple services and procedures which can help our patients to see better and enjoy a higher quality of life.</i><br />Target victim <b>website</b>: <i>barretteyecare.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Parrish-McCall-Constructors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15842</link>
<guid>2080dd731c0a27c6944f58acae270b81</guid>
<pubDate>Sat, 08 Jun 2024 15:41:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Parrish-McCall-Constructors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ace6a51c2b257c28af0d8c71f8bad7a518c51b13698ed3ffed8eb678a5a1c23</i><br /><br />Threat actor <b>description</b>: <i>Parrish-McCall Constructors is a full-service commercial construction company based in Gainesville, Florida that provides services in General Contracting, Design-Build, and Construction Management. We specialize in K-12 education, healthcare, higher education, government, and commercial construction for both public and private clients. Formed in 1968 as M.M. Parrish Construction Company, Parrish-McCall continues to be a relationship based construction firm whose primary goal is to build lasting relationships with clients by delivering quality and value through an open, transparent process. </i><br />Target victim <b>website</b>: <i>parrish-mccall.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>California-Rice-Exchange</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15840</link>
<guid>43826cebaa67497d66b6bb8850d6a91a</guid>
<pubDate>Sat, 08 Jun 2024 13:52:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>California-Rice-Exchange</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>689d7fbff4669e989d5f4820fd0456f8b528ba43b769d2d2854beb79928af7ee</i><br /><br />Threat actor <b>description</b>: <i>California Rice Exchange California Rice is The Environmental Crop. Nearly 230 wildlife species rely on Sacramento rice fields for food and a restimg place.</i><br />Target victim <b>website</b>: <i>https://calrice.org/</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Allied-Toyota-Lift</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15839</link>
<guid>b824157cf4e5f6a6450a66b7849aba66</guid>
<pubDate>Sat, 08 Jun 2024 13:14:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Allied-Toyota-Lift</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5bbd6d8112d63a4dbcf15b797c401a0e592306a6074ba5e3ed09429931d6205a</i><br /><br />Threat actor <b>description</b>: <i>Downloaded all confidential data. Including suppliers, customers, finances, incidents, employee personal data, etc. Allied Toyota Lift is a provider of industrial vehicle rentals such as forklifts, industrial cleaning equipment, and utility             ...</i><br />Target victim <b>website</b>: <i>https://tmhmidsouth.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jones</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15837</link>
<guid>e44956a0a9118d2bfe39f3483f57db37</guid>
<pubDate>Sat, 08 Jun 2024 02:01:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Jones</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>495cf1c929b728e370239efa3fc82826be6fdbce11726a1781124720de8c62d2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Elite-Limousine-Plus-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15835</link>
<guid>5a9f13810fd82cdd408ccd48a00dfea5</guid>
<pubDate>Fri, 07 Jun 2024 19:38:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Elite-Limousine-Plus-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57f980e6a3e9edcec2b8c2aa42b9c19a1bc5ea3657d62f2d197e2fa87fa12a0c</i><br /><br />Threat actor <b>description</b>: <i>Elite Limousine Plus, Leading luxury blackcar and ground transportation provider for corporate and business community since 1986.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>ccmaui.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15834</link>
<guid>fad68b730c6c465f6a6630b0ed0199cb</guid>
<pubDate>Fri, 07 Jun 2024 16:01:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ccmaui.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>82cb8e27e31decafc83b78aecbbfc3ee1ff0f8f75e180afed56273fe1c9b393a</i><br /><br />Threat actor <b>description</b>: <i>The Community Clinic of Maui is a nonprofit healthcare organization that serves the community of Maui as Mālama I Ke Ola Health Center. We are a proud member of the national Community Health Center movement which was birthed by the civil rights movem...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>talalayglobal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15832</link>
<guid>97e9882d23181feae2e14566db2e63aa</guid>
<pubDate>Fri, 07 Jun 2024 15:13:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>talalayglobal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba1521789f00661b7b41e3e428c00a6cd07082dfe217a5ca94b090f20da173c8</i><br /><br />Threat actor <b>description</b>: <i>Talalay Global is the number 1 manufacturer of Talalaly latex worldwide. Founded in 1975, we are a trusted partner with decades of reliable experience. The company was built on a simple commitment: to make the world’s best Talalay products and provide ultimate comfort.SITE: www.talalayglobal.com Address : Phoenix, AZ. 44th Street 2910 N., Suite 100 Phoenix, AZ 85018 USAALL DATA SIZE: ≈300gb 1. Department data: Company data, HR, Payroll, Accounting and etc… 2. Users data: Confidential data, personal, employees documents and etc… 3. Public data And much more…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Reinhold-Sign-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15831</link>
<guid>79f93d49fc21735186d6e59d6880abd1</guid>
<pubDate>Fri, 07 Jun 2024 14:14:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Reinhold-Sign-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b76c09bc9e027b695b783ecb1e81ba8c1832dbe5c3782f42a1591944e49b9ceb</i><br /><br />Threat actor <b>description</b>: <i>Reinhold Sign Service is Green Bay’s go-to for vehicle graphics a nd commercial sign manufacturing, installation, and repair. The f iles will be uploaded soon. Financial and accounting data, drawin gs, some info of clients and so on. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Axip-Energy-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15829</link>
<guid>df3d2375daa4391c1b3f8dfdc2fbca04</guid>
<pubDate>Fri, 07 Jun 2024 07:37:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Axip-Energy-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d2029d2554f899a7af5ce41b3001461a4b00b0bbc2825b511f50371bf5a577ba</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>https://www.axip.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>RAVEN-Mechanical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15824</link>
<guid>594ca739e3609243a6b6a3dd8d871114</guid>
<pubDate>Thu, 06 Jun 2024 20:57:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>RAVEN-Mechanical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>10217c320565ea57092e43448e39258839291d2e104100b48a47ade593291000</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.ravenmechanical.com/</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>dmedelivers.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15825</link>
<guid>543817ed62fa34e371bb229d4f7b603f</guid>
<pubDate>Thu, 06 Jun 2024 20:52:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>dmedelivers.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>406487275f1f810621a5069863b6948e6592832507eaad7d60b84ba35fff7103</i><br /><br />Threat actor <b>description</b>: <i>Marketing, Printing, Logistics - 1 TB+ databases, source code, client files</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>fpr-us.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15823</link>
<guid>8c67c2ac63f3a3c9517e2e4c8c72798f</guid>
<pubDate>Thu, 06 Jun 2024 18:15:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>fpr-us.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff20506a6f8da056bd8a1dec965d1fc7784c6b36bba1ad5773379b05237f1861</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/FPS/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/FPS/PROOF/DATA DESCRIPTIONS: Employees and executives personal data, contracts, reports, customer data, personal identification information, etc. </i><br />Target victim <b>website</b>: <i>fpr-us.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>robson.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15803</link>
<guid>a92e64312f17a6e510bfbfeffcb125eb</guid>
<pubDate>Thu, 06 Jun 2024 15:17:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>robson.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7cb1b2b632f44d5cd3befa635023092cba1b16b1e1a7c3a9306e897f35f588e6</i><br /><br />Threat actor <b>description</b>: <i>The Robson Companies, are a group of family-owned companies headquartered in Arizona that develop and build luxury active adult resort communities for those aged 55 and over. Their primary business is creating master-planned retirement communities that combine world-class amenities like golf courses, recreation centers, and social clubs with high-end homes designed for active retirees.SITE: www.robson.com Address : 9532 E Riggs Rd, Sun Lakes, Arizona, 85248, USAALL DATA SIZE: ≈600gb 1. Company data (HR, Accounting, Payroll…) 2. Employees personal documents & folders (tax forms, passports scan, DL, ID, SS…) 3. Clients data… & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>elutia.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15804</link>
<guid>66abd1e4544beed37b65e72639d88850</guid>
<pubDate>Thu, 06 Jun 2024 15:17:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>elutia.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>825d3a4b2e431c1a57684f179f39fb80a5a1e4594d34a1e7b6ee6d09d3da48ab</i><br /><br />Threat actor <b>description</b>: <i>At Elutia we’re pioneering the future of patient care. Our proprietary drug-eluting biomaterial platforms stand at the forefront of medical innovation. We are dedicated to addressing the pressing challenges that can arise from medical device implant failures. By combatting post-surgical complications that impact patient outcomes and escalate medical costs, we’re ensuring patients not only recover, but thrive without compromise.SITE: www.elutia.com Address : 12510 Prosperity Drive, Suite 370 Silver Spring, MD 20904 USA Tel#: 240-247-1170ALL DATA SIZE: ≈550gb+ 1. Employee Personnel Files… 2. Corporate data: Finance, Payroll, HR… 3. Tax forms, passports, personal, confidential docs, scans… 4. R&D docs & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>ssiworld.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15805</link>
<guid>252e98b185707e595a7c40e615c0da8c</guid>
<pubDate>Thu, 06 Jun 2024 15:17:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>ssiworld.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d565606e8b53b04e39441cb9801c553da5110f64475b01f5f6b596edadc3a206</i><br /><br />Threat actor <b>description</b>: <i>SSI Shredding Systems, Inc., is a renowned designer and manufacturer of industrial shredders and size reduction systems. The company, located in Wilsonville, Oregon, operates from a 100,000 square foot manufacturing site and specializes in producing low-speed, high-torque industrial shredders for various applications such as solid waste recycling, scrap shredding, and hazardous waste cleanup. SSI’s shredders are utilized in industries like municipal, government, incineration sites, medical waste, and more, demonstrating their versatility and effectiveness in processing materials like solid waste, tires, scrap metals, plastics, demolitions debris, and electronic scrap. Notably, SSI’s M160 shredder is recognized as one of the most powerful shredders globally and is employed in significant facilities like the world’s largest incineration facility in Singapore and for processing organic hazardous waste in Norway. The company prides itself on innovation, custom-tailored solutions, and a culture focused on continually pushing the boundaries of size reduction technology.SITE: www.ssiworld.com Address : 9760 Southwest Freeman Drive Wilsonville, OR 97070 United StatesALL DATA SIZE: ≈300gb 1. HR data 2. Personal users data 3. Department & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>TBMCG.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15820</link>
<guid>55d46c8717ed1cb7ac23556df1745b4b</guid>
<pubDate>Thu, 06 Jun 2024 14:09:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>TBMCG.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>961a89d66707b5b0f85702bbe5d3346f923c628fddf84599c024a1cf1124c839</i><br /><br />Threat actor <b>description</b>: <i>... Tags: #TBM #Consulting Group #United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.vet.k-state.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15821</link>
<guid>295daed98c6e4ad88a7d527b5a8d62ee</guid>
<pubDate>Thu, 06 Jun 2024 14:08:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>www.vet.k-state.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aae028af3dcdb40687825e162e8dc272be5e88397f239ca6c07aab846cbda22d</i><br /><br />Threat actor <b>description</b>: <i>... Tags: #VETERINARY HEALTH CENTER #Mosier Hall #Manhattan</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.uccretrievals.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15822</link>
<guid>17170f265eb26e878850c9177f1d5780</guid>
<pubDate>Thu, 06 Jun 2024 14:08:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>www.uccretrievals.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c06d077a1eeab356eeaf792f702e0f6d1d3a18f6868164f3f4325516f722efdf</i><br /><br />Threat actor <b>description</b>: <i>... Tags: #Family Owned and Operated #Highly Trained, Knowledgeable #Sklar Technology Partners</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>HTE-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15808</link>
<guid>429b5c14c4ecc85de7981da4090eb68f</guid>
<pubDate>Thu, 06 Jun 2024 13:57:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>HTE-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f76ba8257c495d2b7d431586e9dc9a5d9f68e5026d6a88a010a8232080014bcb</i><br /><br />Threat actor <b>description</b>: <i>... Tags: #MANUFACTURING PRODUCTIVITY #Factory Automation and Industrial Productivity #United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>goughhomes.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15809</link>
<guid>818e9df1d570bd50ac5f162712fef623</guid>
<pubDate>Thu, 06 Jun 2024 13:56:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>goughhomes.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3445054b3f4a97869fadcf21033357690a5105b9f6b652f17bddd36b644f76cb</i><br /><br />Threat actor <b>description</b>: <i>... Tags: #GOUGH HOMES #GOUGH CONSTRUCTION #United States</i><br />Target victim <b>website</b>: <i>goughhomes.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>Baker-Triangle</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15810</link>
<guid>2075c1dd62a44cb74df76e63f4d7e331</guid>
<pubDate>Thu, 06 Jun 2024 13:56:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>Baker-Triangle</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>03b9784a4efdd133e1a8748d9cf9d20b90c432cccb05b5e98c9de187a9ee5ae3</i><br /><br />Threat actor <b>description</b>: <i>... Tags: #Baker Triangle #Construction #United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>cityofpensacola.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15812</link>
<guid>fcee1c9ad92de3cb8a6ed6d0622cb4ad</guid>
<pubDate>Thu, 06 Jun 2024 13:55:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>cityofpensacola.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>85eff66c214bb686c920d59b3b87a7b8a9a721eb95e0f745a4de60c678768a1c</i><br /><br />Threat actor <b>description</b>: <i>... Tags: #cyberattack #municipalities #Florida</i><br />Target victim <b>website</b>: <i>cityofpensacola.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>thunderbirdcc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15813</link>
<guid>931bbcc1be76e466aea6eb35b6717730</guid>
<pubDate>Thu, 06 Jun 2024 13:54:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>thunderbirdcc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5eff5989d702623542e893f2679b527a2eb6ae14ddef6f74ec752ff5a54037b3</i><br /><br />Threat actor <b>description</b>: <i>... Tags: #Thunderbird Country Club #Country Club #Rancho Mirage</i><br />Target victim <b>website</b>: <i>thunderbirdcc.org</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>panzersolutions.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15815</link>
<guid>96204ac6fec932a7ead15ce6b279cbba</guid>
<pubDate>Thu, 06 Jun 2024 13:52:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>panzersolutions.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f332e9de30e1b7377644619181a09aaa5204ad9b857635af7c3027c5b7234c4</i><br /><br />Threat actor <b>description</b>: <i>... Tags: #Panzer Solutions #IT Project #Business Analyst</i><br />Target victim <b>website</b>: <i>panzersolutions.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>celplan.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15818</link>
<guid>ceddef5c988cddc49f8c0c2f4f8852af</guid>
<pubDate>Thu, 06 Jun 2024 13:50:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>celplan.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29ed241f1e86c013df4bb36fcc81af8b428c12e9d9893b228c353aef0e653bc6</i><br /><br />Threat actor <b>description</b>: <i>... Tags: #CelPlan #Technologies #Reston, Virginia, USA</i><br />Target victim <b>website</b>: <i>celplan.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>adamshomes.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15819</link>
<guid>ae45b0d5e8c171dbfdd200ddaf45a34d</guid>
<pubDate>Thu, 06 Jun 2024 13:50:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>eldorado</b> claims attack for <b>adamshomes.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a79655b4da51f43fb6e184aec4351d55b9dc31c8dce7e2a9a06715623aacb1df</i><br /><br />Threat actor <b>description</b>: <i>... Tags: #Adams Homes #Realtor #Florida</i><br />Target victim <b>website</b>: <i>adamshomes.com</i>]]></description>
<category>eldorado</category>
</item>
<item xmlns:dc='ns:1'>
<title>Health-People</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15793</link>
<guid>d847a02302eb92375f59a4833a95f10a</guid>
<pubDate>Thu, 06 Jun 2024 07:42:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Health-People</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e77cddfcd6e966aebbe90f1c0baca20ca26065088032ae3cf28871b7023ad42</i><br /><br />Threat actor <b>description</b>: <i>Health People (established in 1990) is a peer education, prevention and support organization in the South Bronx whose mission is to train and empower residents of communities overwhelmed by chronic disease and AIDS. Health People corporate office is located in 552 Southern Blvd Fl 2, Bronx, New York, 10455, United States and has 48 employees. The total amount of data leakage is 13.1 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>IPPBX-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15794</link>
<guid>fc133194812b3983d793d362c4fe97e7</guid>
<pubDate>Thu, 06 Jun 2024 07:42:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>IPPBX-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45aba4e10b5251b99cd9036121a0f3c51ed7d10a9e24476b803bc29e9bb7c86d</i><br /><br />Threat actor <b>description</b>: <i>IPPBX - the company is a developer of program solutions, cloud platforms, virtualization systems and so on, offering its services to small and medium -sized businesses. Ippbx corporate office is located in 3500 S Dupont Hwy, Dover, Delaware, 19901, United States and has 57 employees. The total amount of data leakage is 903.5 MB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Market-Pioneer-International-Corp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15795</link>
<guid>4f34f3639443af3a6e83e4c0cf68431b</guid>
<pubDate>Thu, 06 Jun 2024 07:41:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Market-Pioneer-International-Corp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57bbf28babde786a8e9bebf98154173cbbf287e5c4f65cf5f374e243ce7d4e62</i><br /><br />Threat actor <b>description</b>: <i>Market Pioneer International Corp. was established in 1988  is  international freight forwarders in global logistics marketplace, сarrying out the processing and coordination of logistics of international cargoes.Market Pioneer International corporate office is located in 17915 149th Rd, Jamaica, New York, 11434, United States and has 64 employees. The total amount of data leakage is 42.2 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mercy-Drive-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15796</link>
<guid>bff23d5f94aadc6543a53c6634d4050a</guid>
<pubDate>Thu, 06 Jun 2024 07:41:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Mercy-Drive-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38b9c70aaa4f0dfe16c2d2bd0408b9e1239ee1b8d2bb1fda38e1a0f8baabb8e7</i><br /><br />Threat actor <b>description</b>: <i>Mercy Drive Inc.'s - provides services to support people with developmental disabilities and intelligence of different age categories. Mercy Drive corporate office is located in 11710 Hillside Ave, Jamaica, New York, 11418, United States and has 203 employees. The total amount of data leakage is 161.1 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Radiosurgery-New-York-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15797</link>
<guid>f6a81f703854985705a0cc479d221282</guid>
<pubDate>Thu, 06 Jun 2024 07:40:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Radiosurgery-New-York-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>362b8ac3f69b5bae2307fad538eafc0a289e7534158050439649ec7c71419c4e</i><br /><br />Threat actor <b>description</b>: <i>Radiosurgery New York - are one of the leading centers for radiation and radiosurgery worldwide. Radiosurgery New York corporate office is located in 1384 Broadway at 38 Th St, New York City, New York, 10018, United States and has 7 employees. The total amount of data leakage is 64.7 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Inside-Broadway</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15798</link>
<guid>2e6d941e3bc2dbd3f122040f056b6718</guid>
<pubDate>Thu, 06 Jun 2024 07:40:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Inside-Broadway</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47571be809dccfe60201ea99aaad31c500591793f845c3eac826f580e66656cb</i><br /><br />Threat actor <b>description</b>: <i>Inside Broadway - children's theater organization founded in 1982 by Michael Presser.   Inside Broadway corporate office is located in 630 9th Ave Ste 802, New York City, New York, 10036, United States and has 17 employees. The total amount of data leakage is 1.3 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Oracle-Advisory-Services-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15799</link>
<guid>ada9e980b20ac07f6a938ef15106c224</guid>
<pubDate>Thu, 06 Jun 2024 07:40:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Oracle-Advisory-Services-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5416a6ba1d7ee88ec54f9b279c26bde15625f5550b63de8b6b63a314ca7067c6</i><br /><br />Threat actor <b>description</b>: <i>Oracle Advisory Services provides financial and management services to hedge funds, private equity firms, & high net-worth individuals. Oracle Advisory Services corporate office is located in 45 W 34th St Ste 911-912, New York City, New York, 10001, United States. The total amount of data leakage is 13.2 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Womens-Sports-Foundation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15800</link>
<guid>fce40f257a6c2f9bcbd0b1f562a8e276</guid>
<pubDate>Thu, 06 Jun 2024 07:39:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Womens-Sports-Foundation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>959a0eb48f1609b2a8531dafb3b0eef3231182c70f240155dfda403d57047b0a</i><br /><br />Threat actor <b>description</b>: <i>The Women's Sports Foundation  (founded in 1974) - the fund provides support to girls and women in sports, implementing and conducting research and various programs.Women's Sports Foundation corporate office is located in 247 W 30th St Fl 5, New York City, New York, 10001, United States and has 105 employees.The total amount of data leakage is 36.5 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>craigsteven.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15788</link>
<guid>1d0155b49e8121154701476d893aa0a7</guid>
<pubDate>Wed, 05 Jun 2024 19:16:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>craigsteven.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c0bf0d452006028c4ba57b930d727766fcd8f51033b4714c60813d1506cfe5b</i><br /><br />Threat actor <b>description</b>: <i>Craig/Steven Development Corporation has earned a solid reputation in the development of shopping centers, office buildings, mixed-use developments, industrial and multi-family residential projects.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Davis--Young</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15791</link>
<guid>4bf2689c42aae35e6924a432e435e0b1</guid>
<pubDate>Wed, 05 Jun 2024 19:15:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Davis--Young</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f99435f5f95b081bdc91909ffa35fe651ae313068245e8d56fc90904f6398c46</i><br /><br />Threat actor <b>description</b>: <i>Davis & Young is a respected full service civil litigation law firm based in San Jose, CA. Based in San Jose, California, Davis & Young has over 80years of combined experience in litigation and mediation. Our attorneys are recognized by the legal community for resolving disputes successfully while maintaining high professional standards. The firm's client-centered approach ensures that your case is handled with diligence and responsiveness at all stages. Davis & Young handles a broad range of legal matters, from employment disputes and public entity defense to catastrophic personal injury and wrongful death. Learn More about our practice areas.</i><br />Target victim <b>website</b>: <i>davisyounglaw.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Voorhees-Family-Office-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15721</link>
<guid>b7125fc1d0793129c383e8c4b0dadc83</guid>
<pubDate>Tue, 04 Jun 2024 21:34:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Voorhees-Family-Office-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>20f22157aa3bed91f2137cb21a0d163bc682be4be287e314dcffcbbc1b1b83ed</i><br /><br />Threat actor <b>description</b>: <i>Company has the last 24 hours to contact us using the instructions left.In case of silence, all data will be publishedTotal amount of stolen data : 600 GBhttps://www.vfos.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Above-All-Store-Fronts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15718</link>
<guid>679635e8efe21e055ae3693f6145f298</guid>
<pubDate>Mon, 03 Jun 2024 20:15:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Above-All-Store-Fronts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>798d6e74e0d6ab0bbfe4a4f420abd0ad134a2120211a78a118b9d6d88d39aaa0</i><br /><br />Threat actor <b>description</b>: <i>We have about 1,7TB of confidential company data. Since 1993, Above All Store Fronts has provided the greater New York area with top-tier architectural glazing and cladding services. The relationships we continue developing with architects, c            ...</i><br />Target victim <b>website</b>: <i>https://aboveallstorefronts.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>PFAM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15719</link>
<guid>024ad13483b2864fdaf570682863934e</guid>
<pubDate>Mon, 03 Jun 2024 20:15:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>PFAM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d04bda45cba4de2fc4db7ffa6705ed83a42b5b036af36cdd1c776768399c2aa</i><br /><br />Threat actor <b>description</b>: <i>Company dedicated to producing the highest quality product, at the best price.</i><br />Target victim <b>website</b>: <i>http://precisionflange.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>cfymca.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15699</link>
<guid>bd78d16ede6ce1fbdfc2a648c943af72</guid>
<pubDate>Mon, 03 Jun 2024 19:10:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>cfymca.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>964158ef70c2102468fcc6e1debc78734d7a28fd665a3c2b28eaf122af613af8</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1885, the YMCA of Central Florida is a non-profit youth development. The Y provides kids, adults, families, and communities with support, programs, and classes such as aquatics and fitness. The YMCA of Central Florida is based in Orlando,...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Anderson-Mikos-Architects</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15695</link>
<guid>767d3dd25ed652d33fa7743c0c2400fa</guid>
<pubDate>Mon, 03 Jun 2024 13:16:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Anderson-Mikos-Architects</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42dc2b50ab494d56130becc14a9085b69e0b54b28b8ee1af44e6275c46d4cc32</i><br /><br />Threat actor <b>description</b>: <i>Anderson Mikos Architects has created a name for themselves in th e architecture healthcare industry since being established in 198 5. We have 15GB of their data for uploading. HR files with person al and medical information of employees, financial data, accounti ng, projects and so on. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Frontier-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15694</link>
<guid>99407a87a33e79517280e0fdacdaa713</guid>
<pubDate>Sat, 01 Jun 2024 18:41:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>Frontier-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b985cc4f4eae3373e80c2cdfd279491f53df11c0fa60a898b722e565b3bdaa2d</i><br /><br />Threat actor <b>description</b>: <i>Visits: 9 Data Size: 5GB Published: False</i><br />Target victim <b>website</b>: <i>Frontier.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>powertestdyno.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15689</link>
<guid>d8001036d6702e430b8e092484444ee1</guid>
<pubDate>Sat, 01 Jun 2024 17:03:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>powertestdyno.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>93c7f20605e7caa8bd41ded7cbff5a381ce779ebcf0ff01546e7466f9cdb329a</i><br /><br />Threat actor <b>description</b>: <i>Power Test. Test & Measurement Equipment, Manufacturing. Revenue $32.6 Million 5 Terabytes of private information. 4500000 files. Passports, bank statements, credit cards, blueprints, personal information of clients and employees and much more.</i><br />Target victim <b>website</b>: <i>powertestdyno.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>St.-Helena</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15679</link>
<guid>c9b9f44e513842d70a8cf2bcfb548d80</guid>
<pubDate>Fri, 31 May 2024 18:14:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>St.-Helena</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>abf96ce168a2fd5ca506fa1da6fd8b0cdbc57b4b48d4d688037a3c40b8cb03e2</i><br /><br />Threat actor <b>description</b>: <i>St. Helena (Incorporated March 24, 1876) - is a city in Napa County, California, United States. Located in the North Bay region of the San Francisco Bay Area, the population was 5,438 at the 2020 census. The total amount of data leakage is 120.33 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-Hampshire-PublicRadio</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15678</link>
<guid>fc5e676f4e53d22979ffb2172a4cff7f</guid>
<pubDate>Fri, 31 May 2024 18:13:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>New-Hampshire-PublicRadio</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>55b98d86a070f6d8da3cae17b3509b85852f839e10aa1cfa86f1ad588922b2ef</i><br /><br />Threat actor <b>description</b>: <i>Since 1981, New Hampshire Public Radio has shaped the media lands cape in the Granite State and beyond. The files of the organizati on will be in public soon. You could see and download them here o n our blog. Financial and accounting data, grants and much other  information. Everything is about 35GB. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>TriLiteral</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15677</link>
<guid>8e488a9d7efff8b0825b4f7e581fea4e</guid>
<pubDate>Fri, 31 May 2024 17:16:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>TriLiteral</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>70c89d01b245a66e0f0c3a3ca02f65ead989c1669628ecc6fc01441f9db98c3e</i><br /><br />Threat actor <b>description</b>: <i>TriLiteral LLC (TLT) is a private company and full-service third  party logistics provider specializing in the distribution of book s for University Presses and Academic Publishers. 24GB of data wi ll be available soon. Detailed accounting data, client info and o ther business files. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>keytronic.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15676</link>
<guid>25102b27fa432b4bba8b713ed83fc68e</guid>
<pubDate>Fri, 31 May 2024 14:14:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>keytronic.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f70e34041ba179074520c1ac73ebbc8754ae7ad987c93911d20f9340ee4bb78e</i><br /><br />Threat actor <b>description</b>: <i>Keytronic has been manufacturing products overseas for over 25 years, first as an OEM, now as an manufacturing provider. You benefit from our global facilities while still working with a US based company. Our customers are some of the world’s leading OEM’s.SITE: www.keytronic.com Address : N. 4424 Sullivan Road Spokane Valley, WA 99216 USAALL DATA SIZE: ≈530gb 1. HR, Finance, Engineering… 2. Corporate data 3. Home Users Data & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sems-and-Specials-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15684</link>
<guid>1c596d6658b237e7a2aec3b1ed11dab3</guid>
<pubDate>Fri, 31 May 2024 08:59:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Sems-and-Specials-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3be124b15ec5011b14c9c95ee4bc47be9e411a2fbd80104e681c86cff4f2538f</i><br /><br />Threat actor <b>description</b>: <i>Sems and Specials (founded in 1990) - manufacturer of various screws, types of washers, head styles, drive styles, materials, as well as other various fastening and connecting elements. Sems and Specials corporate office is located in 6483 Falcon Rd, Rockford, Illinois, 61109, United States. The total amount of data leakage is 122.13 GB</i><br />Target victim <b>website</b>: <i>https://www.semsandspecials.com/</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>strikeusa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15675</link>
<guid>f04c1064af05871d6be1e2d058dc0109</guid>
<pubDate>Fri, 31 May 2024 07:04:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>strikeusa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9075dc8cc757a9b78e43805f20388fd269caa2988a025b94af590fec4521ea66</i><br /><br />Threat actor <b>description</b>: <i>Civil Engineering Construction  Strike is a leading pipeline and facilities solutions provider, delivering integrated EPC, maintenance</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Faultless-Brands</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15669</link>
<guid>0feaf58e2a12936c84c2510541b6e75a</guid>
<pubDate>Thu, 30 May 2024 18:13:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Faultless-Brands</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4816cdee55e1203fa8f2bdc62e8a01f4897e954152aee4b15e0907cca08df730</i><br /><br />Threat actor <b>description</b>: <i>Faultless Brands is a manufacturing business, producing laundry,  household cleaning products, air care, and lawn and garden produc ts. A lot of HR files with employees personal data, customers inf ormation, accounting files, confidential agreements, medical info rmation and so on.  </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Excel-Security-Corp.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15671</link>
<guid>325a7fee200da9811d3d36371b6b6ca9</guid>
<pubDate>Thu, 30 May 2024 18:13:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Excel-Security-Corp.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>72c186f8c3c3e7cddb0c6717f5cc85678aaf361a37edb08b5326e0e9651801f3</i><br /><br />Threat actor <b>description</b>: <i>Excel Security Corp. is an internationally respected provider of  security services. How did it happen that they themselves were le ft without security? Everything for customers? Anyways, 150GB of  data will be accessible here soon. Personal files of employees, S SNs, drivers licenses, phone numbers, emails, financial data, cus tomers information, NDAs, confidential agreements and so much oth er stuff. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wichita-County-Mounted-Patrol</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15687</link>
<guid>2d7710310f322c7eb9f02786439149d1</guid>
<pubDate>Thu, 30 May 2024 14:43:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Wichita-County-Mounted-Patrol</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>99ed05497c1b06689495433fa4b6323ed9ba89f730f6a9034197ee130ef1ee2c</i><br /><br />Threat actor <b>description</b>: <i>In 1957 a group of 15 men, under the leadership of Dr. Ted Alexander, organized the Wichita County Sheriff’s Patrol. 10 years later the Sheriff’s Patrol changed its name to the Wichita County Mounted Patrol. Wichita County Mounted Patrol corporate office is located in 2504 Fm-369, Wichita Falls, Texas, 76310, United States. The total amount of data leakage is 1.53 TB and includes lots of interesting critical data.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brownell-Boat-Stands--Equipment-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15688</link>
<guid>68e4593563e1b425a7717504bca103d6</guid>
<pubDate>Thu, 30 May 2024 14:43:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Brownell-Boat-Stands--Equipment-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b7baa554c91af9c506cecb1e8441aaa9fda2bd2878ca319e08d56eedeeaacf13</i><br /><br />Threat actor <b>description</b>: <i>Brownell Boat Stands & Equipment Company ((founded 1954)- manufactures safest boat stands and equipment on the market. Brownell Boat Stands corporate office is located in 5 Boat Rock Rd, Mattapoisett, Massachusetts, 02739, United States. The total amount of data leakage is 17.00 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Elmhurst-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15663</link>
<guid>0c2c53e1f9d33713f16353b09a8bfbe6</guid>
<pubDate>Thu, 30 May 2024 00:32:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Elmhurst-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30d64374a46287c7c5b236bd765c0015d594d6698af65e66eec5ec7d13bd7e96</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.elmhurstgroup.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>WALSER-AUTOMOTIVE-GROUP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15664</link>
<guid>e36078a8311f5fb8c4d43f2853552d04</guid>
<pubDate>Thu, 30 May 2024 00:32:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>WALSER-AUTOMOTIVE-GROUP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ca9c5f3570caf1c692f8ac676280dfc816f19062546f0586390b72c92abf321</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.walser.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>FPL-Food</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15665</link>
<guid>f828f1f06bbc62fe4540cdcc823d401f</guid>
<pubDate>Thu, 30 May 2024 00:31:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>FPL-Food</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3fe3df6706a750e2a9fc3e603723531ba37c2268a52a7f4185c039aa1a8e7a2</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.fplfood.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Litigation-Lawyers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15662</link>
<guid>8eafcde359d51e3e5386f19516e4ea65</guid>
<pubDate>Wed, 29 May 2024 23:03:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Litigation-Lawyers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5fb982a68ecf928481fa578090ee5857b337e78ddcc4a71d802f6a43e03fc4f6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Credit-Central</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15661</link>
<guid>91944c70665558453d631f18938970c3</guid>
<pubDate>Wed, 29 May 2024 22:31:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Credit-Central</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7ff8207b40ea8a792f78f95e16178b841344a8d4c8938f64f43c2fb3e35fafb</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.creditcentralllc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Co-Chartered-Accountants</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15660</link>
<guid>306ce8aa58eadd5a9a87e0f348907b59</guid>
<pubDate>Wed, 29 May 2024 21:09:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Co-Chartered-Accountants</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>987f0c498505b405e1a2819d9ae7e176232cb8e1b2322d96f6601e8ee004aa8d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Western-Dovetail</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15658</link>
<guid>7c2af8b8038c80b68190402368afd913</guid>
<pubDate>Wed, 29 May 2024 17:43:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Western-Dovetail</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6d574fd882a8ef1864177678d11484b9fbb0368090aca166c6c244291289f370</i><br /><br />Threat actor <b>description</b>: <i>Western Dovetail is committed to maintaining tradition in the mod ern industry. Architects, designers and craftsmen recognize dovet ail drawers as the hallmark of excellence in casework. A few GB o f their data will be available here. Employee info (address, emai l, phone, relatives contacts...), tax and payment info, a bit of  medical information. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>I.L.A.-Local-1964</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15656</link>
<guid>8a6026f2e24c76678c283322a527f58f</guid>
<pubDate>Wed, 29 May 2024 14:51:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>I.L.A.-Local-1964</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>95f56a2f09a24c6da41ca984b4b0b0cbd36097478f7d3187f090263a604a6ded</i><br /><br />Threat actor <b>description</b>: <i>Local 1964, International Longshoremen’s Association, Industrial & Miscellaneous Workers,  represents workers in various industries  and professions, running the gamut from Ocean Shipping, Trucking & Warehousing Logistics, to Nurses Aides, Dialysis Technicians, Building Maintenance workers, Grocery Store and Laundry Workers.

Chartered in 1970 the people of Local 1964 I.L.A. have fought hard to negotiate higher wages, good Health Benefits, Pensions, Vacations and Sick leave for its Union members for over 50 years.

We have insisted that Employers maintain and deliver decent working conditions and schedules. Additionally, Local 1964 I.L.A. has gone to every length to protect its members and provide job security to every worker covered by a Collective Bargaining Agreement.

Local 1964 is one of the largest International Longshoremen’s Local Unions with Union Membership in States stretching from the East Coast to California and multiple other States throughout the country from the Great Lakes to the Gulf of Mexico.

Local 1964 I.L.A. belongs to The South Atlantic and Gulf Coast District, Atlantic Coast District and the Great Lakes District of the I.L.A.

It is with your participation in mind that we have created this website. We hope that this tool helps you regarding frequently asked questions about your Union membership, organizing  and benefits.

The strength of any Union is its Members and the degree to which those Members participate.  Local 1964 has always encouraged its members  to participate in Union affairs.</i><br />Target victim <b>website</b>: <i>local1964.org</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aircod.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15654</link>
<guid>3cdca99e6ae50386ba9f3806191b832b</guid>
<pubDate>Tue, 28 May 2024 22:53:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>redransomware</b> claims attack for <b>Aircod.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9976f8df22b717d048335f707896559d4d752910b84c7dca53c57d8d8d30c7af</i><br /><br />Threat actor <b>description</b>: <i>Cloud-based Digitalization Platform</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>redransomware</category>
</item>
<item xmlns:dc='ns:1'>
<title>Avelina</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15638</link>
<guid>f9ab9a0f7c56435e35dc4dadf0eb6945</guid>
<pubDate>Tue, 28 May 2024 17:17:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Avelina</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8c1f8865fef99305db909212b9f7e4a307cc7335695b44dca145729db510af2a</i><br /><br />Threat actor <b>description</b>: <i>Avelina supplies product packaged to retailers and the food servi ce industry, in addition to providing raw materials to the main c ompanies in the food industry. 30Gb of data will be released. You will find there much client and competitor information, financia l docs with pieces of personal data. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>OTR</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15636</link>
<guid>773e3c5180b1c11c54105deb682a6e21</guid>
<pubDate>Tue, 28 May 2024 15:15:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>OTR</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>772d59ca52eda84cf35482ee75c1f7fb20331c156077c32ad29f66efdb23313f</i><br /><br />Threat actor <b>description</b>: <i>When you select OTR, Inc. as your transfer agent, you've done mor e than acquire a service provider - you've gained a partner, one  who works diligently to help you succeed in loosing your data. WE will upload their files soon. Lots of business files like financ ials, contracts and agreements can be found in the archives. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Kelly-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15623</link>
<guid>84fc285ce49b9e96fefd21d68ab729c4</guid>
<pubDate>Mon, 27 May 2024 11:28:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>The-Kelly-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>690717452be1666158e4f4b12bb118ffe0d64a65cdecac92d6a22cd2b20f0a67</i><br /><br />Threat actor <b>description</b>: <i>The Kelly Group works as a general contractor in a multi-state area and has metal fabrication facilities in Illinois, Indiana, Louisiana and Arkansas.https://www.thekelly-group.com/</i><br />Target victim <b>website</b>: <i>https://www.thekelly-group.com/</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hytera-US-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15628</link>
<guid>afef6111d7e66b8fe9be8a7fe2ee0069</guid>
<pubDate>Mon, 27 May 2024 11:22:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>Hytera-US-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7084cdb0aad3a4b5e1ad3c88ddf2030a32591f4dae819bb4c652a05a0a8daba</i><br /><br />Threat actor <b>description</b>: <i>Hytera US Inc is an industry leader in research and development, state-of-the-art manufacturing, and bringing next-generation radio technology to the market. We regard ourselves as a solution provider whose core area of expertise is providing cost-effective radio systems of the highest reliability, durability, and quality.Hytera US Inc has an experienced staff of dedicated radio professionals that have been implementing innovative radio communication solutions in the US for more than 15 years and are established specialists in DMR, Push-to-Talk over Cellular, and related communications technologies.The database contains SQL, SAP, financial documents. https://www.hytera.us/</i><br />Target victim <b>website</b>: <i>https://www.hytera.us/</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>alliedtelesis.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15620</link>
<guid>4456cdcdb5224d37e0219099d42e0639</guid>
<pubDate>Mon, 27 May 2024 08:31:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>alliedtelesis.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b0ab53de3bbe4d97b085850f4d80bc3fbd1261d66315e0199a1438f609476a08</i><br /><br />Threat actor <b>description</b>: <i>The company deals with network solutions and security. There is a lot of confidential data, projects both old and new, starting around 2005,  confidential letters of correspondence,  passports of citizens of more than 10 countries in America and t...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Datanet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15619</link>
<guid>9563122a75eef032c2a1681289515325</guid>
<pubDate>Mon, 27 May 2024 06:12:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Datanet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4890365bf2a2a94ed950528e3fa776f8d8454f5a97d8824ad632569b01b5faa2</i><br /><br />Threat actor <b>description</b>: <i>Loved by lease administrators throughout the land, DataNet brings top-tier contract portfolio management to mid-size organizations in several verticals, specializing in Telecom and Commercial Real Estate. Intuitive and friendly user-interface            ...</i><br />Target victim <b>website</b>: <i>https//www.datanet.com/</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>National-Publisher-Services-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15603</link>
<guid>b39f604b83278f4b3dfa16efc9670fbf</guid>
<pubDate>Sun, 26 May 2024 01:12:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>National-Publisher-Services-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>633561db8a7ab5258584f567b591ab89cda7aacf69bb5d0bd89467077e5d1ffc</i><br /><br />Threat actor <b>description</b>: <i>NPS Media Group provides a broad range of print and digital solutions to help media companies succeed in an ever more complex and challenging marketplace.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Payne--Jones</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15604</link>
<guid>5c6a2ff5001c13fb4b0425a45e5b8e11</guid>
<pubDate>Sun, 26 May 2024 01:11:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Payne--Jones</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9acc3de13620d59af7cf4d788a25eeb13a94b7d255ff3e5d47eaa4d5017172bb</i><br /><br />Threat actor <b>description</b>: <i>Payne & Jones is providing a full range of business and legal services to our clients literally for generations.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wind-Composite-Services-Group-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15605</link>
<guid>a47cc7b881ce40bc6ba3e71d5d47fbf1</guid>
<pubDate>Sun, 26 May 2024 01:10:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Wind-Composite-Services-Group-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f17bc05bc45882c96255c5941bd3b4e170891a4805edd8a75a37d0e50a51ec70</i><br /><br />Threat actor <b>description</b>: <i>WindCom is an industry innovator focused on providing solutions to customer's wind blade needs. High levels of technical competence paired with flexible repair options offer customers year-round, reliable service.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>longviewoms.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15600</link>
<guid>196268d973fe71025e5e9a9b6ef4c6f1</guid>
<pubDate>Sat, 25 May 2024 12:41:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>longviewoms.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>66d87ce388a7fcdc15d7a1b95236a57ec9db3459d6fdd2a092d118fae7dfc201</i><br /><br />Threat actor <b>description</b>: <i>Our mission is to help patients live healthier lives. We provide a caring, compassionate environment where your comfort and health is of primary importance.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Access-Sports-Medicine--Orthopaedics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15601</link>
<guid>fae9389a7378751dfbd769fc5786f319</guid>
<pubDate>Sat, 25 May 2024 12:39:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Access-Sports-Medicine--Orthopaedics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63c8e82eb0e45765f74f9fbcf2761f15f9cf752359c0a411952455d7c05420dc</i><br /><br />Threat actor <b>description</b>: <i>Access Sports Medicine & Orthopaedics is the Seacoast of New Hampshire's leader in the innovative treatment and management of orthopaedic care andservices. Whether you're a top-ranked athlete with a knee injury, an employee with carpal tunnel syndrome or have suffered from back pain for 10 years, our team of expert physicians and physical therapists is ready to help you get back in the game.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crandall-ISD-CISD.crandallisd.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15589</link>
<guid>0c03ce4cbbae680f46362dd24207e254</guid>
<pubDate>Sat, 25 May 2024 09:29:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Crandall-ISD-CISD.crandallisd.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e11d448bed1a991d3164aaada073acde13b89dd60073c1990aa2d7ff6780d034</i><br /><br />Threat actor <b>description</b>: <i>Crandall Independent School District is a 4-A school district fully accredited by the Texas Education Agency. CISD serves students in Pre-Kindergarten through 12th grade and is located in Crandall, Texas in the southwest portion of Kaufman County.</i><br />Target victim <b>website</b>: <i>crandallisd.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>SF-Concrete-Contractors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15591</link>
<guid>23ccc3a27687bb9c79f1ebc0eeb15bbd</guid>
<pubDate>Sat, 25 May 2024 09:22:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dAn0n</b> claims attack for <b>SF-Concrete-Contractors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>665f65740ff4026bfac225fd7b1247f7bcdfd70b8695bb725feb03191d67f62c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dAn0n</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vannguard-Utility-Partners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15587</link>
<guid>14507f1b913f233205be54a6b71db5bb</guid>
<pubDate>Fri, 24 May 2024 19:43:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Vannguard-Utility-Partners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>43de97922209768c76571c002de5cc2831188f3d51daf5fc36f388e1619af311</i><br /><br />Threat actor <b>description</b>: <i>Vannguard provides locating and meter reading services to utiliti es in the Midwest. About 30Gb of data will be available soon. Lot s of employment documents with personal information, confidential agreements, customers and projects information and much other st uff. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>EMPIRECOMFORT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15581</link>
<guid>ab3dfe49a68e59f742ce0ac8dc72cf63</guid>
<pubDate>Fri, 24 May 2024 14:46:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>EMPIRECOMFORT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>742c350166e0d11e3c2988539f63ed92324274411e9e0cd0896878bcd16100c7</i><br /><br />Threat actor <b>description</b>: <i>Home - Empire Comfort Systems</i><br />Target victim <b>website</b>: <i>https://www.EMPIRECOMFORT.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Audubon-Nature-Institute-auduboninstitute.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15583</link>
<guid>f0a67f9b4fc7410c72ed8395c03f7f7a</guid>
<pubDate>Fri, 24 May 2024 14:36:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Audubon-Nature-Institute-auduboninstitute.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6a226d1cd1c5bbe98ca2463b29e8f5869c8389c22f1fba114e9737a8e7bc9ed</i><br /><br />Threat actor <b>description</b>: <i>Audubon Nature Institute operates a family of museums, parks and research facilities dedicated to celebrating the wonders of nature. Through innovative live animal exhibits, education programs, and scientific discovery, Audubon makes a meaningful contribution to preserving wildlife for the future. Audubon Nature Institute flagships include Audubon Park, Audubon Zoo, Audubon Aquarium of the Americas, Entergy Giant Screen Theater, Audubon Butterfly Garden and Insectarium, Audubon Louisiana Nature Center, Freeport-McMoRan Audubon Species Survival Center, Woldenberg Riverfront Park and Audubon Wilderness Park.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>colfax.k12.wi.us---150.000</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15579</link>
<guid>12423e210ece56bfeb607e01ee9210fb</guid>
<pubDate>Fri, 24 May 2024 03:59:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>colfax.k12.wi.us---150.000</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2ee610bbec9d615342eef849773c966fe87930fcda95ad7bb65fc82b57e41c5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://www.colfax.k12.wi.us</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>hiawathahomes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15588</link>
<guid>f718f9badf83a6aae477d76d101d0c61</guid>
<pubDate>Fri, 24 May 2024 01:30:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>hiawathahomes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1c12cd0ad8935d0bcf78499c3b9c8732ba4fc648318e7346c962357ccbf16e6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://www.hiawathahomes.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>valleylandtitleco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15577</link>
<guid>530ebdeb0491c0459e00298fcdb3a2bd</guid>
<pubDate>Fri, 24 May 2024 00:08:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>valleylandtitleco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8dc88a12f28698cb4701fa155f02e1d4779b04b0bdbb6c7324676758acffbee2</i><br /><br />Threat actor <b>description</b>: <i>Once you have invested in a home, you may want additional information on how to keep it looking beautiful all year long. Valley Land Title Co. makes it easy for you to successfully complete any home improvement project by providing you with important...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nutec-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15575</link>
<guid>e3195d1988d8a72e21431743e703b106</guid>
<pubDate>Thu, 23 May 2024 16:23:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Nutec-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7fb0113eda53aff707ed98179aad1c7e949feb102571fc30e104f021134a969</i><br /><br />Threat actor <b>description</b>: <i>NUTEC is a producer of high-temperature insulation fibers. It provides blankets, fiber, papers, modules, boards, vacuum-formed shapes, and wet products. The company caters to petrochemical, ceramic, power generation sectors, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>United-Urology-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15574</link>
<guid>75814c64e85b3353a7a71fcf0d3c4a2f</guid>
<pubDate>Thu, 23 May 2024 11:14:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>United-Urology-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f06164399f6745dbc77356d21f22b4dbfc2a83d662b1bae2af64009f143c5a5b</i><br /><br />Threat actor <b>description</b>: <i>United Urology Group’s affiliate practices around the country provide a comprehensive array of services to treat a wide range of urologic conditions in men, women, and in some cases, children. An integrated approach to care means patients have access to specially-trained and highly experienced urologic specialists, a support team of healthcare professionals, advanced diagnostics and treatments, leading-edge surgical techniques, state-of-the-art outpatient surgery centers, as well as clinical trials.</i><br />Target victim <b>website</b>: <i>www.unitedurology.com</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>ICC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15571</link>
<guid>9f7c4bb3946f029b56eebff3203cc5d5</guid>
<pubDate>Wed, 22 May 2024 21:15:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>ICC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6a34f94299fa40d1ea68d28cd9802d99a6f643d5fa5de016dd735d2db1f3a3b</i><br /><br />Threat actor <b>description</b>: <i>ICC ICC is a structured cabling solutions manufacturer of copper & fiber optic connectivity products for commercial & residential applications    More</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>J--N-Stone</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15568</link>
<guid>898dd2ab046b0799b69b6e57dd227554</guid>
<pubDate>Wed, 22 May 2024 17:31:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>J--N-Stone</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1bbef69c9754788a7cad1336045903df1f7bdbb0258d9700e4ba6ad424bf557</i><br /><br />Threat actor <b>description</b>: <i>J & N Stone, Inc. entered the manufactured stone and artificial stone industry in 1973 and has been manufacturing stone and artificial stone products ever since. Headquartered out of Indiana.</i><br />Target victim <b>website</b>: <i>www.jnstone.com</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Newman-Ferrara</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15560</link>
<guid>7232a90ea7d391905f9ee07bcc7c5967</guid>
<pubDate>Wed, 22 May 2024 17:14:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Newman-Ferrara</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee8499ede8039cbbe12daa4a7568c90e6cad71a93f664d53362c758045ffb95d</i><br /><br />Threat actor <b>description</b>: <i>Newman Ferrara maintains a multifaceted practice based in New Yor k City with attorneys specializing in complex commercial and mult i-party litigation, securities fraud and shareholder litigation,  consumer protection, civil rights, and real estate. More than 45G B of data will be publicly available soon. Court processes, heari ngs and personal data of clients of course. Lots of interesting f iles. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Richland-City-Hall</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15567</link>
<guid>9afeba42972a726b6b6d46ed9d506e99</guid>
<pubDate>Wed, 22 May 2024 16:25:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Richland-City-Hall</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>edbb71d6593125e057d8a34d34dbd6587537d7d84eceef1e317f6189dd6e3740</i><br /><br />Threat actor <b>description</b>: <i>The Richland Library continues to offer temporary digital library cards and will soon provide enhanced access to Ancestry.com. There are also future plans for drive-up or curbside capabilities.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Midwest-Covenant-Home</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15561</link>
<guid>28dc0ef2b70634d0a45511fff4f68db7</guid>
<pubDate>Wed, 22 May 2024 15:00:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Midwest-Covenant-Home</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ffbef0ab8741e0cde3876c03f2638d9b4d341384aa25cddf26a636cb96eb048</i><br /><br />Threat actor <b>description</b>: <i>Midwest Covenant Home, Inc., located in Stromsburg, Nebraska, offers a senior living campus which encompasses independent living apartments, assisted living units and a skilled nursing facility. Our organization values our elders and promotes the quality of their lives through the gracious environment surrounding the grounds. Adopting the Eden philosophy, Midwest Covenant Home upholds abolishing the three plagues of the elderly, loneliness, helplessness and boredom. Each resident's spiritual life is enhanced by our involvement with the local clergy to meet the individual resident's spiritual needs. We are active members of the Nebraska Health Care Association. Midwest Covenant Home is a registered Eden Alternative facility. One recent family member commented, "You have a very caring staff here."</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ryder-Scott-Co.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15557</link>
<guid>eff64d4a1d9d050a711731797b4fb17a</guid>
<pubDate>Wed, 22 May 2024 02:26:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Ryder-Scott-Co.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb645c74e766b40f688a0cc4879974ea2c5111e55c32e48723f596b7f841a052</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ryderscott.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tri-state-General-Contractors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15558</link>
<guid>acf1bc432008d31f4a55bceb3a810758</guid>
<pubDate>Wed, 22 May 2024 02:25:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Tri-state-General-Contractors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c34aff8569a85927d2fd7538fb7466004ff4c6c0621bd39e11a1208107231cfc</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.tri-stategc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aspire-Tax</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15547</link>
<guid>f08c64512c2ce6b9642b58563e9c029b</guid>
<pubDate>Wed, 22 May 2024 00:58:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Aspire-Tax</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4619454718ff416919fa4f959ab4886b7bfe5d2d2340849daac2b11c7d6a5b13</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.aspiretax.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Louis-G-Freeman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15548</link>
<guid>ff15242553d87dd31723dcd88a087382</guid>
<pubDate>Wed, 22 May 2024 00:57:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>The-Louis-G-Freeman</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e3149d5cd0c758b38c297cb93250d2606b2d18541510500cac2b9179cfab4e9d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.freemancompany.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Experis-Technology-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15549</link>
<guid>02ddce85370273e5cc226cf6effc0fd8</guid>
<pubDate>Wed, 22 May 2024 00:57:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Experis-Technology-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b0b3997466fc3df57a71c58ae186c8b4dd99702c0a53a519fb5e83503a0057e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.experistg.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Anchorage-Daily-News</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15550</link>
<guid>a97484e07cad027a9fb828764c1dcf6a</guid>
<pubDate>Wed, 22 May 2024 00:56:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Anchorage-Daily-News</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b2e919f04020f62856cc66c28ddca1034534c9e68bcf0a83f5f110540b9eeda</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.adn.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>RDI-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15551</link>
<guid>09094f96926cff36073b2fec98e21fb7</guid>
<pubDate>Wed, 22 May 2024 00:55:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>RDI-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a1e9b45baf463a9628f104035e594b67a0108c0579b1a71ce2684d7b33aac96</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.rdiglobalhospitality.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ardenbrook</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15552</link>
<guid>47ca4412458f04d91f92dab70d722fd5</guid>
<pubDate>Wed, 22 May 2024 00:55:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Ardenbrook</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b38d1a08411990b035961a94832903a46261fee5cdc26639eac7c094f487a29</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ardenbrook.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Visa-Lighting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15553</link>
<guid>3cbfb2330b21840b385a45c958602663</guid>
<pubDate>Wed, 22 May 2024 00:54:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Visa-Lighting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ebd5fda61e66d26271dd617f49740a2b84fd96c69c7b7e76757f1bc074b9b7d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.visalighting.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Semicore-Equipment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15554</link>
<guid>fef56cae0dfbabedeadb64bf881ab64f</guid>
<pubDate>Wed, 22 May 2024 00:53:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Semicore-Equipment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac70dd0f9f43dc82f5410662c8693f33ba3ad3ef6e3967dc163a5cf763fccd40</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.semicore.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Levin-Porter-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15555</link>
<guid>b87c11a11e92b4ed8b516ebe9236b68a</guid>
<pubDate>Wed, 22 May 2024 00:53:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Levin-Porter-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bdb818b6fe8b160399dc7b132d494d7558c2355865a7738bdcd42174552bad32</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.levin-porter.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Critchfield--Johnston</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15556</link>
<guid>64600a36d09f49609c7d141e575597b4</guid>
<pubDate>Wed, 22 May 2024 00:39:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Critchfield--Johnston</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>02a8bcea45e2bbc9134f5e887954a069d83e28f387f1d227db89f8e99a0596c7</i><br /><br />Threat actor <b>description</b>: <i>Critchfield, Critchfield & Johnston, Ltd. is a company specializes in law services. It offers services in the areas of corporate & business, employment of labor, litigation, oil & gas, real estate, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>shamrocktradingcorp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15545</link>
<guid>c7dec8e09376bf8e859d022ac42037b6</guid>
<pubDate>Tue, 21 May 2024 22:15:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>shamrocktradingcorp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>136380572c35f3007fd88e0ea0da955d4fc5d4c3d3bb1ead6ee284796fb6925a</i><br /><br />Threat actor <b>description</b>: <i>Shamrock Trading Corporation is the parent company for a family of brands in transportation services, finance and technology. The company offers transportation logistics, discount programs, and international trade financing. - </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>schmittyandsons.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15544</link>
<guid>a1255c9dbdcd635143d172dee1b8c0fe</guid>
<pubDate>Tue, 21 May 2024 21:22:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>schmittyandsons.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f599f475b6ec8a599a99ba7ed24634ce91929da471cfbe59c0ac1f8cbfb2c5f</i><br /><br />Threat actor <b>description</b>: <i>Schmitty & Sons is headquartered in Lakeville, MN, our hometown since 1941. Schmitty & Sons began back in 1941 when Wilfrid Schmitt “Schmitty” began driving for the Orchard Lake Co-Op, a local transit company. In 1952, Schmitty purchased his bus and...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>ThrottleUp-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15542</link>
<guid>fa36dd3f38345315bf701aa416576213</guid>
<pubDate>Tue, 21 May 2024 19:46:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>ThrottleUp-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d694d50f864afd9113828c99cb31fe24ae2c6f29cf822c68a543be014a4c5bb9</i><br /><br />Threat actor <b>description</b>: <i>Visits: 24 Data Size: 65GB Published: False</i><br />Target victim <b>website</b>: <i>throttleup.io</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brittany-Horne-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15539</link>
<guid>9fc36fa768a74fa93d3ee7bf57b1392c</guid>
<pubDate>Tue, 21 May 2024 11:14:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>Brittany-Horne-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d68aa97ecfe493c70600d96e15e3829fa065aeeabd02adc47b27bbe364a11de5</i><br /><br />Threat actor <b>description</b>: <i>Visits: 72 Data Size: 2GB Published: False</i><br />Target victim <b>website</b>: <i>brittanyhorne.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>William-S.-Hein--Co.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15538</link>
<guid>2a3c550cc7e86e943696ee0529620811</guid>
<pubDate>Tue, 21 May 2024 09:48:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>William-S.-Hein--Co.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>760376c11a5652d12392a01a4a37d3b3586ed62a8ab60185b384826f54af3a14</i><br /><br />Threat actor <b>description</b>: <i>William S. Hein & Co., Inc. is a leading, family-run publishing company that has been serving the worldwide library community since the 1920s. Originally a renowned publisher of legal publications, the company has since expanded its services into academic, public, government, and corporate libraries, becoming a highly respected multidisciplinary publisher in multiple sectors.  In the course of a successful cyber attack on this company, we have a large amount of confidential information at our disposal. More than 500GB. All financial documents, mail correspondence, agreements and contracts that are not subject to disclosure, personal data of employees. All this and much more will be published in case we do not come to an agreement.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aztec-Services-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15534</link>
<guid>23676d53987033371f526c5c6eb56150</guid>
<pubDate>Tue, 21 May 2024 06:08:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Aztec-Services-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>98d61c9d723e21f6d203dba32dd0462dce297c8527d8573a040287366d40d2dc</i><br /><br />Threat actor <b>description</b>: <i>Aztec Services Group, Inc - the scope of the company is environmental remediation and demolition services.  Aztec Services Group, Inc corporate office is located in 3814 William P Dooley Bypass, Cincinnati, OH 45223, USA. The total amount of data leakage is 398.38 GB</i><br />Target victim <b>website</b>: <i>https://aztecservices.com/</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>atlasoil.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15529</link>
<guid>ad22e184c6cdfb585ad39195d1905acd</guid>
<pubDate>Tue, 21 May 2024 01:14:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>atlasoil.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0bbf2fcdcce12a3599d8834ce976492b07839e8bd7459a3d903c890301569051</i><br /><br />Threat actor <b>description</b>: <i>Headquartered in Houston, TX, Atlas Oil is the inaugural Simon Group Holdings company. Since our founding in 1985, Atlas has grown through technological and operational innovation, all while maintaining our unwavering commitment to customer success. Atlas offers single-source solutions for fuel, transportation and logistics and is one of the largest fuel distributors in the country, delivering over 1 billion gallons of fuel annually to customers in 49 states.SITE: www.atlasoil.com Address : 2050 W Sam Houston Pkwy S Houston, TX 77042 USA Tel.# (800) 878-2000ALL DATA SIZE: ≈730gb 1. Corporate data: Accounts, HR, Finance, Executive… 2. Departments data 3. Users, Employees data & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>trugreen.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15530</link>
<guid>2fe10492280508c5573e9de4397fa178</guid>
<pubDate>Tue, 21 May 2024 01:14:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>trugreen.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6eeaed4e405bb6ed2c64ebbf7ffc61b48d63950cc93d9ca55424fdcae37dc192</i><br /><br />Threat actor <b>description</b>: <i>TruGreen is a full-service lawn care provider focused on delivering high-quality, tailored solutions to both residential and commercial customers.SITE: www.trugreen.com Address : 1790 Kirby Parkway Forum II Suite 300 Memphis, TN 38138 USAALL DATA SIZE: ≈850gb 1. Corporate data 2. Personal users data 3. Payroll, financial & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>levian.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15525</link>
<guid>20c217bfdcfb3cd86113244ac8a461fc</guid>
<pubDate>Mon, 20 May 2024 23:14:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>levian.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5d26c68add7d3e5b83a70e40a21f955e658daf16db73cb16721dea548912f8c4</i><br /><br />Threat actor <b>description</b>: <i>Le Vian is a family-owned jewelry company with a long history, dating from the 15th century. As purveyors of fine jewelry, Le Vian had gained such a reputation that in 1746, Nadir Shah, one Persia’s most powerful rulers, chose them to safeguard the collection of jewels he had amassed — including the famous Kooh-i- Noor diamond. A rich history, across centuries.SITE: www.levian.com Address : 235 Great Neck Road Great Neck, NY 11021 USA ALL DATA SIZE: ~800gb 1. Accounting 2. Financial data 3. Corporate data 4. Personal documents & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Clinical-Solutionsacslabtest.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15532</link>
<guid>1ef619e8db0fbdda6140ec29412b3ba0</guid>
<pubDate>Mon, 20 May 2024 22:28:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>American-Clinical-Solutionsacslabtest.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>03b0151cb5ffb4334545ffe4d0633614db6915b77f1c7ccb17f66bdf0b4dc788</i><br /><br />Threat actor <b>description</b>: <i>Visits: 83 Data Size: 700 GB Published: False</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>ORIUX-Experts-in-Mobility-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15533</link>
<guid>5b4e201ba2043c100c2a63f677074aca</guid>
<pubDate>Mon, 20 May 2024 22:26:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>ORIUX-Experts-in-Mobility-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ec7d29745ba50cf290ac2af10566a2f8677b9f3cd524af78682eb1920c53139</i><br /><br />Threat actor <b>description</b>: <i>Visits: 71 Data Size: 300Gb Published: False</i><br />Target victim <b>website</b>: <i>www.oriux.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>MAH-Machine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15524</link>
<guid>d12e9ce9949f610ac6075ea1edbade93</guid>
<pubDate>Mon, 20 May 2024 19:54:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>MAH-Machine</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1d182e0c6729f6ffb9bd5675aa7a59b3191ba6fb0b23c0d9d1bc39d92b47a84</i><br /><br />Threat actor <b>description</b>: <i>MAH Machine Co., Inc., founded by Martin and Anna Hozjan in 1976, is headquartered in Cicero, Illinois. The Company goal is to ship products on-time and to supply the highest quality for a reasonable price.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>GE-Aerospace</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15521</link>
<guid>bf33a114d51a047b433ddfcd6542e2a6</guid>
<pubDate>Mon, 20 May 2024 15:10:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>GE-Aerospace</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>02fea5524d8d67ccf71cddbdae4a9fdbe51e23260320a898c0d8bfc95f016815</i><br /><br />Threat actor <b>description</b>: <i>SALE</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crooker</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15518</link>
<guid>271df68653f0b3c70d446bdcbc6a2715</guid>
<pubDate>Mon, 20 May 2024 14:56:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Crooker</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f84cd3306f1ec926c7c21b0273192cf6e0d5bc1c247a62a8e52e74b9aec064a8</i><br /><br />Threat actor <b>description</b>: <i>Crooker Construction, LLC is a heavy construction and paving business that was established in 1935.crooker.com</i><br />Target victim <b>website</b>: <i>crooker.com</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>California-Highway-Patrol-SVEL237.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15516</link>
<guid>2684b514e749e42650f0e80d4c5402d9</guid>
<pubDate>Mon, 20 May 2024 10:54:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>California-Highway-Patrol-SVEL237.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f9d65a08996633f997fa194649f9905d88a31570ee13ffa0395757391700ee7</i><br /><br />Threat actor <b>description</b>: <i>The California Association of Highway Patrolmen is, at its heart, a labor union that advocates on behalf of uniformed California Highway Patrol off icers in matters related to pay, benefits and working conditions. But ultimately, we are so much more. Dedicated to serving all our members - including active officers at all ranks, retired CHP officers and survivors - the CAHP constantly strives to ensure we are a trusted leader in membership advocacy. As such, we maintain a host of benefit programs built exclusively for our members and their families, including self-insured health, dental and long-term disability plans, plus sponsored life and AD&D insurance plans. In addition, we provide services to our membership including legal services in employment disciplinary matters, an exemplary legislative advocacy program and a retirement planning assistance program. And, finally, we publish a membership newsletter (the APB) and a website dedicated to focusing on issues important to our membership. The CAHP, which was founded in 1920, holds a philosophy that is deeply rooted in collaborative-based initiatives. Currently, we are working with the California Highway Patrol on a public trust initiative that is aimed at ensuring the CHP's historically high level of trust from the public is never taken for granted and, where possible, is improved upon. As such, the CAHP and the CHP aspire to be an example for all law enforcement officers and their employers who strive to provide the public the highest level of service. We encourage you to explore our website and learn more about the California Association of Highway Patrolmen. Portions of the website are accessible only to CAHP members.</i><br />Target victim <b>website</b>: <i>svel237.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>qualityplumbingassociates.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15509</link>
<guid>73bff38358eef9fa431af325f5eaf8e0</guid>
<pubDate>Mon, 20 May 2024 09:59:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>qualityplumbingassociates.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f1b46ef95e3107be6a427d5108b89f95c06a349aabf84cf4d3861ba27e2799b</i><br /><br />Threat actor <b>description</b>: <i>Quality Plumbing Associates, Inc. is committed to providing our clients and customers with the best possible value, quality and workmanship available in the industry. We will strive to be pioneers and leaders in the plumbing field by continually educ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Regional-Obstetrical-Consultants</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15510</link>
<guid>1471a8e08c604e589e04339b320deeb8</guid>
<pubDate>Mon, 20 May 2024 09:58:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Regional-Obstetrical-Consultants</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2dc280d13e29679201a00a9c76821710399c5acb195c44d67585f56ea59cf5d0</i><br /><br />Threat actor <b>description</b>: <i>Regional Obstetrical Consultants (ROC) is a group of high-risk obstetricians and other healthcare professionals who provide state-of-the-art care for women with risk factors that may affect their pregnancy. ROC's experienced team includes maternal-fetal specialists (perinatologists), sonographers, nurses, genetic counselors and diabetic educators. ROC has offices in Chattanooga, Cleveland and Cookeville, Tennessee, and Dalton Georgia. In addition, ROC operates telemedicine clinics in Winchester, Tullahoma, and McMinnville, TN., Murphy, NC and Blairsville, GA with new clinics soon to be open in Pikeville, TN, Blueridge, GA and other parts of the region. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Specialty-Market-Managers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15512</link>
<guid>58c6ee5f6908cd661c407e3847bc2d6f</guid>
<pubDate>Mon, 20 May 2024 09:56:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Specialty-Market-Managers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77a4d28a7ca4fbac6daf38d5476db06d129e0732de5477e4e618dfd1d47891a2</i><br /><br />Threat actor <b>description</b>: <i>We have over 20+ years experience providing specialty insurance products and over 75% of our staff has worked on both the agency and company sides of the business. The one thing we take the most pride in is our service. Our goal is to create a collaborative relationship with our brokers, which is why our underwriters and support staff are some of the most accessible in the industry. Our flexibility and freedom from the normal bureaucracy of an insurance company have allowed us to create some of the most comprehensive coverage options in the industry. We have over 20+ years of experience in placing insurance coverage for a diverse range of classes. Inspired by the lack of options in the traditional Domestic Insurance Market, our founders, Jeremiah P. O'Donovan and Marsha Smith, created Specialty market Managers. Whether as a Program Manager, Captive Participant or a wholesale broker Specialty Market Managers has access to the insurance products your customers need.</i><br />Target victim <b>website</b>: <i>specialtymarketmanagers.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sterling-Transportation-Services-sts.local</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15513</link>
<guid>70c96c4ef725a5fd488815d60a1ec206</guid>
<pubDate>Mon, 20 May 2024 09:56:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Sterling-Transportation-Services-sts.local</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>397d703eed9c5c0b60b2c3d963744dd05e1fed398a1b1ca74e1c1a772bc5493a</i><br /><br />Threat actor <b>description</b>: <i>Sterling Transportation Services (STS) is a family-owned business in Blair, NE. STS is a carrier of specialized products, focusing largely on local and regional hauls for bulk agricultural goods on walking floor trailers, grain hoppers, aggregate hoppers, end dumps and other trailers pulled by late model Volvo tractors. Our commitment to safety extends beyond just hiring safe drivers. We have developed a culture where employees are encouraged to take the extra precautionary steps. Our company requires all employees to be in compliance with all motor carrier and safety regulations. We implement additional policies to help keep our employees safe. Our regional terminals are staffed with trained mechanics to keep drivers on the road with well-maintained equipment.</i><br />Target victim <b>website</b>: <i>https://www.sterlingtransportation.com/</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>schuettemetals.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15515</link>
<guid>b68fa653f3e1836366b72596194b9545</guid>
<pubDate>Mon, 20 May 2024 09:51:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>schuettemetals.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>950479b7fd040b84ef66202fa2e134e6fd2b9dc3d912841f60bcd17850b4e6f2</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/SMI/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/SMI/PROOF/DATA DESCRIPTIONS: Financial documents, supplier agreements, contracts, NDAs, Personal identifying information, Engineering data, employee personal files, database exports, etc. </i><br />Target victim <b>website</b>: <i>schuettemetals.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>allied-mechanical-services-inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15508</link>
<guid>58661be7f4d35e5308031c7e97141735</guid>
<pubDate>Mon, 20 May 2024 02:12:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>allied-mechanical-services-inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b024299c00a0dde868e3fc42371a8473c47b675a5910bc083c1879aa7769c8bb</i><br /><br />Threat actor <b>description</b>: <i>Allied Mechanical Services  One of Michigan's largest and most experienced full-service mechanical contracting firms. SUCCESS STORIES We serve a wide range of industries and offer design build/assist services, 24/7 service, and pre-fabrication. Our safety record is second-to-none.   CULTURE We're focused on providing the best quality products to our customers and fellow contractors. We're equally as dedicated to supporting each of our employees and their families. Allied Mechanical Services is a family business at it's core</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Patriot-Machine-Updated-data-leak.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15507</link>
<guid>d63f5287fe86926d97cbc1ae95fc9e20</guid>
<pubDate>Sun, 19 May 2024 06:31:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>donutleaks</b> claims attack for <b>Patriot-Machine-Updated-data-leak.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b6c6724a99e99dec623ac7c8f5c45fca8c1ab012da4a2efb5d60a1aa612faf3</i><br /><br />Threat actor <b>description</b>: <i>Today we consider make public any related data about Patriot Machine operations and business. The defense contractors which cant defense his docs. Updated version of that will be on our file server. Stay tuned. Guys was so skill-able and professional what mr.Mask and his SpaceX working with them. Its…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>donutleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>equinoxinc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15505</link>
<guid>d92871c9c3bdac4f3a6fb4458ca07c9a</guid>
<pubDate>Sat, 18 May 2024 18:32:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>equinoxinc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cddc4d877da8d55d0941ac4829ec7a6acad5fcdbbe3e693ed20759fdb8a11679</i><br /><br />Threat actor <b>description</b>: <i>Equinox is a dynamic human services organization with deep roots in New York's Capital Region. 49 gigabytes of data were stolen, including: financial documents, bank documents, patients' personal data, financial agreements</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>catiglass.com-100.000</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15499</link>
<guid>232a03118725240918c5a4a0ab33e9b3</guid>
<pubDate>Sat, 18 May 2024 12:35:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>catiglass.com-100.000</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34b17522bef68b4d383eadede2b4b774e7c75bbfb3e0ae680044ced89b520eef</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://catiglass.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bluebonnet-Nutrition</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15500</link>
<guid>df46e19efffe9c4cd3e8808359aa8c8a</guid>
<pubDate>Sat, 18 May 2024 12:34:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Bluebonnet-Nutrition</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63a17520f13e0dc534bec4c014492bcfc7a920b4b914349fe0671c1db0770344</i><br /><br />Threat actor <b>description</b>: <i>As a leader in the manufacturing of premium dietary supplements with a state-of-the-art, kosher-certified, GMP-registered facility, Bluebonnet Nutrition has developed more advanced, farm-to-table products with sustainable, USDA Organic/non-GMO branded ingredients based on today’s science & research than ever before – many are gluten-free and suitable for vegans and/or vegetarians.</i><br />Target victim <b>website</b>: <i>https://bluebonnetnutrition.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Center-for-Digestive-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15501</link>
<guid>649ecbcdbf3571a2a3197e021287efa1</guid>
<pubDate>Sat, 18 May 2024 12:32:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Center-for-Digestive-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e21dfc4a33bed7142a482343a34ad8b83731102179b37cea4a1676532dd8d85</i><br /><br />Threat actor <b>description</b>: <i>The Center for Digestive Health focuses on disorders related to the digestive system including both short-term conditions and chronic, lifelong diseases. These conditions may involve the liver, stomach, colon, small intestine, gallbladder or pancreas.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>drmsusa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15494</link>
<guid>cc6a6632b380f3f6a1c54b1222cd96c2</guid>
<pubDate>Sat, 18 May 2024 09:58:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>drmsusa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8f96fb104692644ded4a7f3a5737798cb0ed696cee3f4a8423ccc681baf989d0</i><br /><br />Threat actor <b>description</b>: <i>"Our Priority  We believe that everyone deserves the right to work and play without regards to intimidation of security or data breaches. DRMS trains our professional staff in the latest techno tactics designed to defeat the predatory villains. We do this so that as our customer, you won’t have to. Join us to see how we can protect your data, servers, computer devices in addition to custom software applications allowing you to work and play with confidence." As for us they don't care about their customers privacy at all. They preferred to put their clients business and safety under the threat. Their CEO Benjamin Gurrola  had a possibility to get a deal but didn't use it. Soon all sensitive data we'll be published.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>County-Connection</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15496</link>
<guid>62781274c42619851e9eddb19e2c8441</guid>
<pubDate>Sat, 18 May 2024 09:24:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>County-Connection</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d166780470da36ad60944aa3034e131826f1fa5581c6e8e107802310a1b8f06</i><br /><br />Threat actor <b>description</b>: <i>County Connection was formed in 1980 as a Joint Powers Agency under the legal name The Central Contra Costa Transit Authority. Today County Connection provides fixed-route and paratransit bus service throughout the communities of Concord, Pleasant Hill, Martinez, Walnut Creek, Clayton, Lafayette, Orinda, Moraga, Danville, San Ramon. County Connection corporate office is located in 2477 Arnold Industrial Way, Concord, California, 94520, United States. The total amount of data leakage is 100 GB</i><br />Target victim <b>website</b>: <i>countyconnection.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Elm-Grove</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15497</link>
<guid>412aaa3bb658ddaea5d5d60f6e0d6a41</guid>
<pubDate>Sat, 18 May 2024 09:24:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Elm-Grove</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7bb446f4ddc211cd9ab81e51eae6df393792eda1f8bd495e059c6223c3e05304</i><br /><br />Threat actor <b>description</b>: <i>Elm Grove is a village in Waukesha County, Wisconsin, United States. The population was 6,524 at the 2020 census. Elm Grove was named as America's best suburb by Business Insider in October 2014. Elm Grove government is headed by a village president and overseen by a board of trustees, the seven members of which are elected to two-year terms. The total amount of data leakage is 150.6 GB</i><br />Target victim <b>website</b>: <i>https://elmgrovewi.org/</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pittsburghs-Trusted-Orthopaedic-Surgeons</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15492</link>
<guid>3b0e25997ec9fc2ff41914cd1d416b08</guid>
<pubDate>Fri, 17 May 2024 23:45:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>donutleaks</b> claims attack for <b>Pittsburghs-Trusted-Orthopaedic-Surgeons</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d64c7c924de3876e0eb9b94b47ca87c4895327a368ae09f984d92b4f366b14a2</i><br /><br />Threat actor <b>description</b>: <i>Hello everyone! We got some not very smart people who was compromise and do not want to protect their clients data. Today here medical company from Pittsburgh(USA):"Pittsburgh’s Trusted Orthopaedic Surgeons" [must be not so trusted as you thought, but okay] Web site: https://www.gpoa.com/ "Pittsburgh’…</i><br />Target victim <b>website</b>: <i>https://www.gpoa.com</i>]]></description>
<category>donutleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.belcherpharma.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15489</link>
<guid>b9f9c5fc82fdcd944d7041adcc98ff36</guid>
<pubDate>Fri, 17 May 2024 18:44:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>underground</b> claims attack for <b>www.belcherpharma.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b6f96549af6226d15643a7dee3e1c4e7a03266a1d3a653779ed8072f1f5bd00</i><br /><br />Threat actor <b>description</b>: <i>Revenue:$25.7M - Country :USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>underground</category>
</item>
<item xmlns:dc='ns:1'>
<title>Houston-Waste-Solutions-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15486</link>
<guid>7a4d21f40402d068ec5369232b395901</guid>
<pubDate>Fri, 17 May 2024 14:36:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>Houston-Waste-Solutions-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d29eb5804a870f82e8e9199b9c878577ea5bf1eb2b69d2536044a85e537a5375</i><br /><br />Threat actor <b>description</b>: <i>Visits: 0 Data Size: 120.7 Gb Published: False</i><br />Target victim <b>website</b>: <i>www.houstonwastesolutions.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vision-Mechanical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15488</link>
<guid>a19599d637c08bdc0e3bfbc20aaf20ea</guid>
<pubDate>Fri, 17 May 2024 14:25:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Vision-Mechanical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3427eefeb077f503181ef87b97ece6e29c19cc996064f33fc3f826e4d5f81638</i><br /><br />Threat actor <b>description</b>: <i>Vision Mechanical is providing you with all you need in mechanical aspects including plumbing, piping, HVAC, fabrication, and service</i><br />Target victim <b>website</b>: <i>http://www.visionmech.net</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>PRIMARYSYS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15481</link>
<guid>abe1f87b60e4b5d2798c7bad84b1905e</guid>
<pubDate>Fri, 17 May 2024 07:23:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PRIMARYSYS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57b61964490b6f2c9f974383181577cea57d6afb336080e08c593cdc360cde58</i><br /><br />Threat actor <b>description</b>: <i>Home - My Site</i><br />Target victim <b>website</b>: <i>https://www.PRIMARYSYS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Formosa-Plastics-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15477</link>
<guid>28c1e04ceae885ace553dd756e8e54bb</guid>
<pubDate>Fri, 17 May 2024 04:32:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Formosa-Plastics-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c6d9fd8a8ee5946a35e1a06206c64140807f0fe0fb4089bdfb88ec6dd40368e</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.fpcusa.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dean-Lumber--Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15478</link>
<guid>e65070cd27a1a6e979bd685b9114bf10</guid>
<pubDate>Fri, 17 May 2024 04:29:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Dean-Lumber--Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f210902cc39dd6ff519aecd63b527a8b3d86f1a4eda556629f007327d6cfa413</i><br /><br />Threat actor <b>description</b>: <i>Located in the heart of Southern Maryland, Dean Lumber offers an almost endless supply of your home building or remodeling needs. Whether it is garage doors or ...</i><br />Target victim <b>website</b>: <i>dean-lumber.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>WindCom</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15479</link>
<guid>4861650dafeb90c197212d5c90e60a7b</guid>
<pubDate>Fri, 17 May 2024 04:29:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>WindCom</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89ee55f1bfffa14b7a2ab665e33e3bcda808654c27c5e21ba497212d21e2afcf</i><br /><br />Threat actor <b>description</b>: <i>WindCom is an industry innovator focused on providing solutions to customer's wind blade needs. High levels of technical competence paired with flexible repair ...</i><br />Target victim <b>website</b>: <i>windcomservices.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>pricemodern.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15474</link>
<guid>9f7a84b2111e0f72879943df86f3742c</guid>
<pubDate>Thu, 16 May 2024 20:46:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>pricemodern.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3fbb12edfaa7c9abef24c05ae889affe4515a047366822f35f22faada05236c2</i><br /><br />Threat actor <b>description</b>: <i>Price Modern transforms the way people think, collaborate and perform by creating modern office designs for smarter, happier and more productive work environments. Price Modern was founded in 1904 and is headquartered out of Baltimore, Maryland.  11...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>valleyjoist.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15473</link>
<guid>9000b339dc4ad6cc6675a4289adfe9a8</guid>
<pubDate>Thu, 16 May 2024 18:42:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>valleyjoist.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>068c51699334a16285deeca3c3e192dad2e69e7b8853b4b7db0ec8f0051f57b9</i><br /><br />Threat actor <b>description</b>: <i>Valley Joist + Deck is a company that designs, engineers, and manufactures steel joist and deck product systems for commercial and industrial projects. It has over 60 years of experience, a family culture, and a commitment to safety and quality.  T...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>fulcrum.pro</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15471</link>
<guid>2aeb1a8f8475cef63900be5d0780e872</guid>
<pubDate>Thu, 16 May 2024 16:45:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>fulcrum.pro</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1eeb6767da7d62db8912ce1a89dace5441ca98f65594c90f8cddf5e684a070db</i><br /><br />Threat actor <b>description</b>: <i>Download link #1: https://***************.onion/FULCRUMGROUP/PROOFMirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/FULCRUMGROUP/PROOFDATA DESCRIPTIONS: Employees\executives personal data, corporate correspondence, agreements, private and corporate financial documents, personal identifying information, etc.</i><br />Target victim <b>website</b>: <i>fulcrum.pro</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Insurance-Agency-Marketing-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15468</link>
<guid>d98fe21bb3a1bb115bf375740074b55a</guid>
<pubDate>Thu, 16 May 2024 14:43:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>moneymessage</b> claims attack for <b>Insurance-Agency-Marketing-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5fbb1a97b891be0fa045199126303f615f8e70864b86d5c90c9ed1cd436af22e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>moneymessage</category>
</item>
<item xmlns:dc='ns:1'>
<title>Colonial-Surety-Company-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15470</link>
<guid>e5732492e9d1ef72fee339a293b2f9e8</guid>
<pubDate>Thu, 16 May 2024 14:12:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Colonial-Surety-Company-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8231107ddefc2005977792157bdec6a6dbde061016f70b24451be805edbae66</i><br /><br />Threat actor <b>description</b>: <i>Colonial Surety Company (founded in 1930) is a direct seller and writer of surety bonds, fidelity bonds and insurance products for a wide range of professionals and industries. Colonial Surety Company  corporate office is located in 123 Tice Blvd Ste 250, Woodcliff Lake, New Jersey, 07677, United States and has 89 employees. The total amount of data leakage is 143.9 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>kauffmanschool.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15465</link>
<guid>7c3b08f1b6142bceb956851f1a45442b</guid>
<pubDate>Thu, 16 May 2024 10:33:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>kauffmanschool.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a71433b989e96f44c19459fbb393a472cf1d36dfb1150cae06e7ac2fb155fdd2</i><br /><br />Threat actor <b>description</b>: <i>The Ewing Marion Kauffman School is a free public charter school open to all students living in the Kansas City Public School District. The school is a three-school campus (two middle schools and a high school) of mission-driven college preparatory s...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>ema-eda.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15466</link>
<guid>5b4634374f3d21e6903ba5ff2b771fa4</guid>
<pubDate>Thu, 16 May 2024 10:32:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ema-eda.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c622b9fa49d5a523810b57513321870b164c395534a6b307e3d479d50aa5b41</i><br /><br />Threat actor <b>description</b>: <i>445gb</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>twpunionschools.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15467</link>
<guid>204e8ec7bc7abc1ff3934d44157fd691</guid>
<pubDate>Thu, 16 May 2024 10:30:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>twpunionschools.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1d0cc5293404f0381339d3147b2fbf4e9078bc83ab06bb546e509d9157776fb</i><br /><br />Threat actor <b>description</b>: <i>Located in northern-central Union County, Union has a resident population of approximately 56,000. The township is bordered by  the Union County municipalities of Elizabeth, Hillside, Kenilworth, Roselle Park, and Springfield, and the Essex County c...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>East-Shore-Sound</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15464</link>
<guid>163eed792d21898baa691e38199babb8</guid>
<pubDate>Thu, 16 May 2024 06:34:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>East-Shore-Sound</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bcc144e54a241f558d54d1cdd53e0f9b29148c6eb6af192496fad693c58d7d1f</i><br /><br />Threat actor <b>description</b>: <i>Visits: 79 Data Size: 50GB Published: False</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>thermalsolutionsllc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15459</link>
<guid>9a7e4d07ef8a46f82d97b848585ac16f</guid>
<pubDate>Thu, 16 May 2024 04:42:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>thermalsolutionsllc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b0444ec93b787391880d18af9caddc94659b28172de92b8ec83975805eef828f</i><br /><br />Threat actor <b>description</b>: <i>Thermal Solutions LLC is also a proud family-owned and operated HVAC-R business. Our heating and AC repairs include new equipment installations if needed. We help by walking you through all of the issues faced with your equipment and give you...</i><br />Target victim <b>website</b>: <i>thermalsolutionsllc.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>Consulting-Radiologists</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15457</link>
<guid>72d5065b689d9e7bd75c71a62f1d5d55</guid>
<pubDate>Wed, 15 May 2024 22:41:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Consulting-Radiologists</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d7a626d7639aae938164236f748b24c1ee2f7ed3a76b693bbb81a26a3a199781</i><br /><br />Threat actor <b>description</b>: <i>Consulting Radiologists LTD is an independent radiology group based out of Minneapolis, providing a complete range of radiology services to the healthcare community, including outpatient imaging services. After 89 years of existence, CRL cont            ...</i><br />Target victim <b>website</b>: <i>https://www.consultingradiologists.com/</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>epsd.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15448</link>
<guid>349f259c872c43d1ea241ba414c5b70b</guid>
<pubDate>Wed, 15 May 2024 16:52:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>epsd.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a32f0e71fcd7b3f0d7fec9161299d6189c9cfaace6c583890923bbe69fd33ec8</i><br /><br />Threat actor <b>description</b>: <i>The Englewood Public School District is a comprehensive community public school district that serves students in pre-kindergarten through twelfth grade from Englewood, in Bergen County, in the U.S. state of New Jersey. The district's offices are in t...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>district70.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15449</link>
<guid>3a6dbc006a825f31dc1c530797798e43</guid>
<pubDate>Wed, 15 May 2024 16:50:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>district70.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47216fc125778a8a3795daa21865f589d01b9d8edfd583331717e299ddf8d6a2</i><br /><br />Threat actor <b>description</b>: <i>Pueblo County School District 70 is located in beautiful Pueblo, Colorado, where the Fountain and Arkansas Rivers converge and the eastern foothills of the Rocky Mountains meet the Great Plains. Established in 1950 through the consolidation of 35 sma...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>keuka.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15450</link>
<guid>90e2217cd253377081205243ac24b03a</guid>
<pubDate>Wed, 15 May 2024 16:49:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>keuka.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79fd79958d25209eadc3f60e699e42f9ae53877943bb965244d9b301f2a6e8f8</i><br /><br />Threat actor <b>description</b>: <i>Keuka College is a private, undergraduate, and graduate, residential college that offers bachelor's and master's degree programs on campus and through its Evening and Online Education Program across much of Central and Western New York state, as well...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>allcare-med.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15451</link>
<guid>231f5238a3d80a5d32391b04cd46243a</guid>
<pubDate>Wed, 15 May 2024 16:47:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>allcare-med.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>867022a1e2e2373dd3f5a3a102d75505db712c9ff3ba11709cf4c59da8bc0452</i><br /><br />Threat actor <b>description</b>: <i>With a commitment to excellence, AMMI employs the staff,  knowledge, and technology to provide seamless solutions that equate to increased effectiveness and returns for our clients</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Surrey-Place-Healthcare--Rehabilitation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15445</link>
<guid>9759e4afabf043458dd9f1988644ed6b</guid>
<pubDate>Wed, 15 May 2024 12:49:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Surrey-Place-Healthcare--Rehabilitation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>92205b542a474a7511988e6f1c21d59aac66c3526cb5e9a44fed8722d29558a5</i><br /><br />Threat actor <b>description</b>: <i>Surrey Place Healthcare & Rehabilitation Surrey Place Healthcare & Rehabilitation is a 74-bed Skilled Nursing facility in Bradenton, Florida.    More</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>daubertchemical.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15446</link>
<guid>ea6df5245ddb26d2985ac95c87fad84a</guid>
<pubDate>Wed, 15 May 2024 12:43:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>daubertchemical.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aaec66ecd4269c9d0fbae3de818a9929494243b6b4640735363d665b2f9be332</i><br /><br />Threat actor <b>description</b>: <i>Since 1935, Daubert Chemical Company has focused on being the industry's "silent partner" as a provider and supplier of rust preventive coatings, industrial greases, sound deadening coatings, laminating adhesives, as well as a variety of corrosion in...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Neodesha</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15434</link>
<guid>aaf9290b7570c56dd784f192425658d4</guid>
<pubDate>Wed, 15 May 2024 02:44:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>City-of-Neodesha</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3cc81997a7dc3770e320ef16a456d30b3bf56957bbcc96ea3f7f50c68042ce5d</i><br /><br />Threat actor <b>description</b>: <i>Visits: 192 Data Size: 35G Published: False</i><br />Target victim <b>website</b>: <i>neodesha.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wealth-Depot-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15436</link>
<guid>0fe8cb44a57dd5e75e5d3910086c45eb</guid>
<pubDate>Wed, 15 May 2024 02:36:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Wealth-Depot-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>820a4f7ec9daf35459636115a4f07928fb7a3881b590a8a4a6beac9153e44f72</i><br /><br />Threat actor <b>description</b>: <i>Company has the last 24 hours to contact us using the instructions left.In case of silence, all data will be publishedTotal amount of stolen data : 450 GBhttps://wealthdepot.com/</i><br />Target victim <b>website</b>: <i>https://wealthdepot.com/</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>morrisgroupint.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15431</link>
<guid>79705d796c8685b3324f363a757e4f58</guid>
<pubDate>Tue, 14 May 2024 22:43:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>morrisgroupint.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc9db490d55a251468dca75c5e02739a4e464e1117b9787e891f7f7f974ab0c6</i><br /><br />Threat actor <b>description</b>: <i>Morris Group International includes 28 divisions and partnerships and 27 locations worldwide. From stainless steel toilets, engineered plumbing and drainage products, and vacuum plumbing systems to drinking fountains and electric water heaters, our p...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>pierfoundry.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15432</link>
<guid>94f491d64db64528e89b11ed64734e8c</guid>
<pubDate>Tue, 14 May 2024 22:37:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>pierfoundry.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>158cf02e1f91dc8f1db5688e602b5d32b027fe9a009bbc529037df31993c5521</i><br /><br />Threat actor <b>description</b>: <i>Pier Foundry</i><br />Target victim <b>website</b>: <i>http://pierfoundry.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rocky-Mountain-Sales-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15428</link>
<guid>5d4d48d0359e45e4fdf997818d6407fd</guid>
<pubDate>Tue, 14 May 2024 17:08:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>Rocky-Mountain-Sales-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>70ed114b309410ba9c76dc9619f98e6b72086f955bd7dd3af04337fa380e4b43</i><br /><br />Threat actor <b>description</b>: <i>Visits: 58 Data Size: 400 GB Published: False</i><br />Target victim <b>website</b>: <i>www.rockymountainsales.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Accurate-Lock-and-Hardware</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15419</link>
<guid>64ee1a382d8e7aa1e05b1601aeba124a</guid>
<pubDate>Tue, 14 May 2024 04:31:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Accurate-Lock-and-Hardware</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e79773d2d5e17dd9583f359ce482ac04a77d81d626c4d02798c79eb0790ba02</i><br /><br />Threat actor <b>description</b>: <i>Offer stunning custom door hardware for clients seeking unique door hardware for their custom residences, resorts, hotels, shops, restaurants, churches and comm...</i><br />Target victim <b>website</b>: <i>accuratelockandhardware.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aero-Tec-Laboratories</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15416</link>
<guid>5658eb3bf03461888d599d8a2799e7a0</guid>
<pubDate>Mon, 13 May 2024 22:33:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Aero-Tec-Laboratories</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd2ae6cc7964717d31bf03f80ea165c5f2d56a8da41dd92374a66ffca5ea35ca</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.atlinc.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>oseranhahn.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15407</link>
<guid>a3e14106dcb15870b3819617e636ed7d</guid>
<pubDate>Mon, 13 May 2024 16:46:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>oseranhahn.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f479b7737fed4992ed75606bb73893a2713f12eac7b80b24ce2754555819fda</i><br /><br />Threat actor <b>description</b>: <i>Company data will be available via a link at the bottom of the page.  Oseran Hahn P.S. is a legal firm that offers a variety of services in the field of law.  The company's practice areas include Business and Corporate Law, Litigation, and Condo L...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>jmjcorporation.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15408</link>
<guid>ea1f3996186b76fe1d40f12034b4742a</guid>
<pubDate>Mon, 13 May 2024 16:44:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>jmjcorporation.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>39268b540edc9a2e506c80052c4551febda8e57fdff05c7126f50dc5fa6bd0c5</i><br /><br />Threat actor <b>description</b>: <i>From JMJ’s beginning over 30 years ago, we have grown from a one-room start-up to a multi-million-dollar enterprise. We owe this achievement to a business model revolving around customer satisfaction. We specialize in creating innovative spaces to...</i><br />Target victim <b>website</b>: <i>www.jmjcorporation.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>hesperiausd.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15411</link>
<guid>895569567e039ffe413d33a8648c7021</guid>
<pubDate>Mon, 13 May 2024 16:37:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hesperiausd.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>617c6bbbdc7bd8fd5e839192cbf2630257bf28dfb0f408a424c627b28f373d87</i><br /><br />Threat actor <b>description</b>: <i>Hesperia Unified School District was formed in 1987. Hesperia Unified School District serves the City of Hesperia and adjacent areas in the High Desert of San Bernardino County and covers 140 square miles.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-Boston-Dental-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15397</link>
<guid>8e452e79cd525671ce2fb6997b73aaf9</guid>
<pubDate>Mon, 13 May 2024 12:30:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>New-Boston-Dental-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d92b2695397194dacae55216dfd2c3b7508ed2d96ad901696cfb59f79f69b85c</i><br /><br />Threat actor <b>description</b>: <i>With nearly 40 years of providing the best general and cosmetic dentistry in New Hampshire, New Boston Dental Care, PLLC welcomes you and your family to our modern, innovative, and dedicated dental health practicehttps://www.newbostondentalcare.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cushman-Contracting-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15399</link>
<guid>00f842ec2fc7bc8a6968c511f44dba04</guid>
<pubDate>Mon, 13 May 2024 12:28:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Cushman-Contracting-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9a038a1bea3d82793791b4eb84e4c5458cf5780c9a51e8520863b177201d8eb</i><br /><br />Threat actor <b>description</b>: <i>Cushman Contracting Corporation is a General Engineering Contractor. cushmancontracting.com</i><br />Target victim <b>website</b>: <i>cushmancontracting.com</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Seamans-Mechanical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15393</link>
<guid>0db1abb0147975f10b47eba2f817e01d</guid>
<pubDate>Mon, 13 May 2024 02:15:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Seamans-Mechanical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f3465f9cfb3e8e943ece4bf30567d5a7194e8dd000b926c9f4a9d04ff4fba1f</i><br /><br />Threat actor <b>description</b>: <i>Commercial/Industrial Mechanical, Electrical, Plumbing & Refrigeration Expertise Since 1961, Seaman’s Mechanical has been committed to offering service that exceeds our customer’s expectations. Our Right the First Time results of over 99% delivers on our promise. When a Seaman’s truck comes to your place of business, you know exactly what to expect - Quality Service. Whether we’re designing and installing new heating, air conditioning, refrigeration, plumbing, or electrical equipment or maintaining and repairing existing systems, our goal is customer satisfaction.</i><br />Target victim <b>website</b>: <i>www.seamansac.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>McSweeney--Langevin</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15392</link>
<guid>03931ca4c77a6f980d21609d4846dd31</guid>
<pubDate>Sun, 12 May 2024 22:34:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>McSweeney--Langevin</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>15206cc110c01c6ca06bfa2bf374c892634b879e631250d2ce20865646b49d9e</i><br /><br />Threat actor <b>description</b>: <i>McSweeney / Langevin is a national law firm.  Our lawyers and staff have helped injured individuals seek justice against major insurance companies and corporations.  Our team has recovered millions of dollars for thousands of injured clie            ...</i><br />Target victim <b>website</b>: <i>westrikeback.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>NITEK-International-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15390</link>
<guid>33169e6c57113f6de6b49fb5d8d32838</guid>
<pubDate>Sun, 12 May 2024 18:06:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>NITEK-International-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1a9c78a5a21c851b996d31cc47c308e3d6d39fb6a46a017f97d5a5a0e00951c</i><br /><br />Threat actor <b>description</b>: <i>NITEK International LLC (founded 1991), a manufacturer of data transmission products, specialized in the research and development of products for the data transmission and security equipment market.NITEK International LLC corporate office is located in729 1st Ave N Birmingham, AL 35203 U.S.A. The total amount of data leakage is 22.13 GB</i><br />Target victim <b>website</b>: <i>nitek.net</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>National-Metalwares-L.P</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15391</link>
<guid>0b8becede7a3559aa2deeff99c51d9c6</guid>
<pubDate>Sun, 12 May 2024 18:06:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>National-Metalwares-L.P</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b85bb59b2bcb91a2110d95eee2eb52bbee8e16a7404b21c183ed05b8ab675f42</i><br /><br />Threat actor <b>description</b>: <i>National Metalwares, L.P. (founded 1946), is a customer driven, high volume manufacturer, fabricator and finisher of welded steel tubing and tubular components. National Metalwares corporate office is located in 900 N Russell Ave, Aurora, Illinois, 60506, United States and has 40 employees. The total amount of data leakage is 48.19 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jackson-County</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15387</link>
<guid>2ef6b53bebd1a794aa0fe7749ed72393</guid>
<pubDate>Sat, 11 May 2024 18:34:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Jackson-County</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>904e3f65a0be557b9e8a0a5782b6b67738595b453bf6ede18b99d66c180d71be</i><br /><br />Threat actor <b>description</b>: <i>Jackson County is one of 114 counties in Missouri. It includes most of Kansas City, Missouri, and 17 other cities and towns. The County population is about 654,000 people living within 607 square miles.</i><br />Target victim <b>website</b>: <i>http://www.jacksongov.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>21stcenturyvitamins.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15385</link>
<guid>f4cc4b9bf4dc2237cb88718132e9fb7c</guid>
<pubDate>Fri, 10 May 2024 22:28:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>21stcenturyvitamins.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b1142e12727c88b3718601d2b12d770f2db3f0f73a34a5d11cbc5816d5bdfe6</i><br /><br />Threat actor <b>description</b>: <i>https://mega.nz/folder/E3kmAZyT#KkvAaGlF3g0Pud4cwhxZpgWe have a lot more from 21st Century Vitamins. Contact us for a deal or we publish after week.21st Century, one of the largest international manufacturers of dietary supplements</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Montgomery-County-Board-of-Developmental-Disabilities-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15384</link>
<guid>bad4539e46846423a187311f3bf56464</guid>
<pubDate>Fri, 10 May 2024 20:30:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Montgomery-County-Board-of-Developmental-Disabilities-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c50e3cd4ff4fc91745e5a78301e405ea70f0807d77db73526b521f060b91b95c</i><br /><br />Threat actor <b>description</b>: <i>The Montgomery County Board of Developmental Disabilities Services (MCBDDS) is the local government agency that coordinates services and funding for services for children and adults in Montgomery County who have a diagnosis of an intellectual or developmental disability. Established by state law in the 1960s, MCBDDS is one of 88 County Boards of Developmental Disabilities that operate in Ohio. It also offers a variety of direct services for individuals with developmental disabilites that are locally funded through the Montgomery County Human Services Levy, including:</i><br />Target victim <b>website</b>: <i>http://www.mcbdds.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>LiveHelpNow</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15380</link>
<guid>673b0a8f69f725746a7855824c7da178</guid>
<pubDate>Fri, 10 May 2024 18:36:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>LiveHelpNow</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>40a1ea8365d62fa8106a6f3f25a52668628b711436eff06bbc29c11a1888c252</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.livehelpnow.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>NK-Parts-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15381</link>
<guid>e92c58a6493efcb1f0e995c58a60b620</guid>
<pubDate>Fri, 10 May 2024 18:35:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>NK-Parts-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>21a78d0971667744dda86d1768df95ff99e43fff5db34f001364713faebe83f7</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.nkparts.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Badger-Tag--Label</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15382</link>
<guid>b33ab78dc0e9072a05258918507b3e6f</guid>
<pubDate>Fri, 10 May 2024 18:34:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Badger-Tag--Label</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1b79925d18477c4deee90ffe808b7ceca37eb4cfb23fdc4d08c2a29914faef0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.badgertag.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Haumiller-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15383</link>
<guid>bc6249acce910185a80f3152bd16adde</guid>
<pubDate>Fri, 10 May 2024 18:34:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Haumiller-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e42873a7dbbc0f5193383933763000d0022c2cbd0368ea34eec380d81b716bc9</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.haumiller.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Reading-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15375</link>
<guid>73926ad475a40a4cb676b8d4516cd767</guid>
<pubDate>Fri, 10 May 2024 15:01:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Reading-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>74641e9cc841161995ebe6230c1152e5fb733cef594eda0306365b90f389cfa6</i><br /><br />Threat actor <b>description</b>: <i>Reading Electric is a leading supplier of electro-mechanical equipment, services, and problem solver for Industrial and Commercialcustomers. 82Gb of data will be available for downloading. You will find employees personal documents, confidential agreements, contracts inside and financial data inside.</i><br />Target victim <b>website</b>: <i>https://www.readingelectric.com/</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pella</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15377</link>
<guid>216965b6c0c343a0866b3634853d5569</guid>
<pubDate>Fri, 10 May 2024 14:19:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Pella</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c77509b5dd03967ec82b3dc002451e96d50ee2bf5ba381de179ff476c2b1d74</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>https://pellastl.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>colonialsd.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15373</link>
<guid>7e77e4a1b051ec0a510b48eaec2f3a3c</guid>
<pubDate>Fri, 10 May 2024 08:27:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>colonialsd.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>50369fe64b7a8fde9f75a8b06fa5e0691094ddd57bfefdab75bbed713895bed0</i><br /><br />Threat actor <b>description</b>: <i>https://mega.nz/folder/l60i2aLR#1pTmoxhVwJrSvVhJ1V3F5g We are publishing sample partial (~50GB) from the data of Colonial School District. We have more 500GB available to sell. Contact us for a deal before 26th May with offers. If we do not receiv...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>wisconsinindustrialcoatings.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15366</link>
<guid>fc73483cfec371c61e8f755f0ed49da4</guid>
<pubDate>Thu, 09 May 2024 22:43:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>wisconsinindustrialcoatings.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd66b80b5bc0db5e5a63505706dcce532970370507bcdf6ce6f10960c31a54c3</i><br /><br />Threat actor <b>description</b>: <i>Turn to the experienced professionals at Wisconsin Industrial Coatings for superior quality industrial coating and sandblasting services. Our facility includes 105,000 square feet of shop space and 12 overhead cranes with a maximum capacity of 50,000...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>iaconnecticut.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15370</link>
<guid>6eae17727b4e77cfd9d81da1f7176317</guid>
<pubDate>Thu, 09 May 2024 22:37:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>iaconnecticut.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7aab9337e4b93eff7ea8b2339dcc9f9b038a77441f50d24cf54788a6970d94a</i><br /><br />Threat actor <b>description</b>: <i>Welcome to the Insurance Association of Connecticut. For over 50 years, the Insurance Association of Connecticut (IAC) has been the voice of insurers doing business in Connecticut. We represent the interests of insurers both large and small, foreign...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>ufresources.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15354</link>
<guid>e1740c5223422374b7fb1888478aabb9</guid>
<pubDate>Thu, 09 May 2024 16:43:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ufresources.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ae34f6c02e6dbf6454949c16ed378f1249d057fa064a908471e5540ecb1bca95</i><br /><br />Threat actor <b>description</b>: <i>UF Resources Corporation is a privately held holding company based in University Park, Florida, offering administration, information technology and other support services. We make extensive use of technology to leverage our resources to provide effic...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>ccofva.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15361</link>
<guid>7259202cea475e0e98aa076037cc3f15</guid>
<pubDate>Thu, 09 May 2024 16:37:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ccofva.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c219587ad09bc20380c5fae1ae217f8cb8bd745f9349d0e9c9418807585bca1</i><br /><br />Threat actor <b>description</b>: <i>Based in Richmond, Virginia, we function like a family, with each related company working together. Our experienced management team provides you with in-depth knowledge and can develop customized solutions for your particular needs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Edlong</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15322</link>
<guid>fe184ec3276a986afa6e10163a63a942</guid>
<pubDate>Thu, 09 May 2024 13:50:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Edlong</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ff6d469eb3e743e783dedf990116a44523cff1f01527e5ba8cc2dbf960de0de</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1914, Edlong is a company that provides services in custom flavor development, applications and culinary support, regulatory compliance,and supply chain performance. It produces and supplies dairy flavors and ingredients to its cli            ...</i><br />Target victim <b>website</b>: <i>https://edlong.com/</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>kioti.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15334</link>
<guid>6000db4c19f0ab158c1b1bf5b06ce151</guid>
<pubDate>Thu, 09 May 2024 13:26:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>kioti.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac1c5d66ae07f799963a5d99f2b63187e2c814eb79ea65c7180832ace37a4991</i><br /><br />Threat actor <b>description</b>: <i>Since the first KIOTI tractor was introduced in the U.S. in 1986, KIOTI has aligned itself among the nation’s leading tractor brands. KIOTI remains steadfastly committed to the advancement and growth of tractor technology, value and service. And in t...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>taylorcrane.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15335</link>
<guid>1c2b4dfff603f33d7efc32a0e28dcfca</guid>
<pubDate>Thu, 09 May 2024 13:24:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>taylorcrane.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>887c4e160bf993b35e1784874456c00527d484f4c1c41f7d5bdd66bd8fb513ba</i><br /><br />Threat actor <b>description</b>: <i>Taylor Crane & Rigging, Inc. is committed to providing our clients with the very best in service, equipment and personnel. With this commitment, we will satisfy our clients’ needs in a safe, competitive, and responsive manner.DOWNLOAD LINK: http://...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>auburnpikapp.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15340</link>
<guid>e82bd52ff22173a2db7c8bb56647830c</guid>
<pubDate>Thu, 09 May 2024 13:16:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>auburnpikapp.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe84c2552b2988c78bca522ca211ae7476d1fb43d168a3afd74c3b7434cd6fdc</i><br /><br />Threat actor <b>description</b>: <i>Our chapter at Auburn University implements the standards and executes the challenges set forth by the PI KAPPA PHI fraternity in order to develop exceptionally educated and modern leaders.DOWNLOAD LINK: http://lockbit33chewwx25efq6dgkhkw4u7nefudq4...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>rfca.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15345</link>
<guid>8ec7ff1ac324a4bed44cc51d362e5b94</guid>
<pubDate>Thu, 09 May 2024 13:10:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>rfca.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3b2d1d298ee7a01d2fac26cd2cffd76fad9c206761ce37332f4bc5bcae6fe8e5</i><br /><br />Threat actor <b>description</b>: <i>Since Robinson, Farmer, Cox (RFC) was founded in 1953, the employees and members of RFC have taken great pride in maintaining our commitment of service to our clients. RFC began as a governmental audit and consulting practice in Charlottesville, Virg...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>truehomesusa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15350</link>
<guid>0a409f659e62be4aa3778846ed01deea</guid>
<pubDate>Thu, 09 May 2024 13:03:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>truehomesusa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ea7043196a9bf6b168c1ef370695538055ea4317c2d02df17cc59dd1ba4080a</i><br /><br />Threat actor <b>description</b>: <i>True Homes is a semi-custom home builder in North and South Carolina, offering a variety of floorplans, communities and personalization options. Find your new True Home today and explore their blog, awards and broker partnerships.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>heartlandhealthcenter.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15306</link>
<guid>3fc703661503434d7524267dfdd3e668</guid>
<pubDate>Thu, 09 May 2024 12:57:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>heartlandhealthcenter.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f69cf90f682a21c19b9645514068a93c3b6ebc08ffe9922a04f2a2b2b697bef</i><br /><br />Threat actor <b>description</b>: <i>Heartland Health Center is your home for healthcare. Our providers practice using an integrated approach. This means that staff work as a team to address all aspects of your health.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>evw.k12.mn.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15309</link>
<guid>4e6934f77e86b8c41a52f986de47181f</guid>
<pubDate>Thu, 09 May 2024 12:52:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>evw.k12.mn.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5538e6b8b1ecfdbd6b79b857f365f8d98fcc2a4bb94d64b6cd5e82646e1c3327</i><br /><br />Threat actor <b>description</b>: <i>The EVW School District prides itself in having schools that have earned a positive reputation for high standards and rigor in academics, arts, and athletics.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>essinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15317</link>
<guid>be5acb71f959598767dd12c4732e537d</guid>
<pubDate>Thu, 09 May 2024 12:42:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>essinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a61443ca422578224d956cdd183a0fbdee3124fde54f05ebfe4330e1dc008dfe</i><br /><br />Threat actor <b>description</b>: <i>At ESS Inc., our mission is to bring to market the cleanest, lowest-cost long-duration energy storage solutions. We are the catalyst for a clean energy future.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>asafoot.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15320</link>
<guid>f9bd58e0ae7969a7c78e417fcbfeff51</guid>
<pubDate>Thu, 09 May 2024 12:36:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>asafoot.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc393b4d69b7e20a7a0f4cb76410629d16366f7bad26399cd97dd350b08b328f</i><br /><br />Threat actor <b>description</b>: <i>Our team at A Step Ahead Foot & Ankle Center is dedicated to offering you excellence in first step foot care. Our facilities have been designed to provide you with the utmost in comfort and convenience.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>frankmiller.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15321</link>
<guid>d50819673fa91c9989e1fe612b2b33ad</guid>
<pubDate>Thu, 09 May 2024 12:33:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>frankmiller.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>afe0ac2ee5ae232dbe1eddc5593dc7228999127a61963a5344df3a88ee9f7853</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://frankmiller.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>peninsulacrane.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15302</link>
<guid>a7e00935bd22418f319b10051ed4349e</guid>
<pubDate>Thu, 09 May 2024 10:30:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>peninsulacrane.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f0d6655f0638774facdf895ddfe0030e2b5a82175a2bfb10aba9e996c5fd0bb</i><br /><br />Threat actor <b>description</b>: <i>Peninsula Crane and Rigging serving entire Northern California and Nevada Area for over 39 years.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pinnacle-Orthopaedics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15290</link>
<guid>1fb5e72be96a57b7a3b995ee40c3e242</guid>
<pubDate>Thu, 09 May 2024 08:29:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Pinnacle-Orthopaedics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>94f9688dc026b9d8ec916c718be7f271ac4be9d7f8346d0c2e94324883ad9da1</i><br /><br />Threat actor <b>description</b>: <i>Georgia-based Pinnacle Orthopaedics and Sports Medicine Specialists provides orthopaedic services, physical therapy and magnetic imaging (MRI) to patients across six offices in Cobb, Cherokee and Paulding counties. Pinnacle Orthopaedics utilizes the most up-to-date technologies and surgical techniques to offer patients the highest quality orthopaedic care. Their 20 specialists cover the entire spectrum of musculoskeletal care both operative and non-operative including hand, foot and ankle, trauma and fractures, joint replacements and reconstruction, limb lengthening and deformity repair, spine, pain management and sports medicine </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Softura</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15286</link>
<guid>865e434f7f48e0e93f69cbb938b06809</guid>
<pubDate>Thu, 09 May 2024 02:39:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Softura</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fcf67c0204e69587e8971f3c79fb0a0829de376590608804a2a84f092b7e8f54</i><br /><br />Threat actor <b>description</b>: <i>Who We Are  25+ years delivering projects using Onshore and Offshore Software Engineering Teams  ISO 27001 and CMMI Level 3 Certified, ensuring quality delivery  Scale teams up and down as needed  Gain access to world class talent  Leverage hard to find skills  We have more than 120 GB of data from this company at our disposal. In the event that we do not reach an agreement, the entire date will be published. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zuber-Gardner-CPAs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15287</link>
<guid>d9a8c56824cfbe66f28f85edbbe83e09</guid>
<pubDate>Thu, 09 May 2024 02:34:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Zuber-Gardner-CPAs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>07d8e267c2fac5a1cf6a886ca18a4177d65facc6bf23f336bbc1f55d2e6d72c2</i><br /><br />Threat actor <b>description</b>: <i>Company has the last 24 hours to contact us using the instructions left.In case of silence, all data will be publishedTotal amount of stolen data : 350 GBhttps://www.zubergardner.com</i><br />Target victim <b>website</b>: <i>https://www.zubergardner.com</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>rexmoore.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15282</link>
<guid>35068fbf1ec706142e1f75fa23ee1995</guid>
<pubDate>Wed, 08 May 2024 22:35:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>rexmoore.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f8da170f763db27e21704ffeedf1c1097282f155ed03a87b5b0af6434f62cea</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1922 and headquartered in Sacramento, California, Rex Moore is a family-owned and managed company, providing electrical and integrated systems engineering, manufacturing, construction and maintenance. The company performs both design/build and bid work for most electrical and low voltage projects. - DATA will be available soon. SQL Databases + big amount of Documents.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>Northeast-Orthopedics-and-Sports-Medicine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15283</link>
<guid>a80ff02f8227904e65413f89ee1719e6</guid>
<pubDate>Wed, 08 May 2024 22:33:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dAn0n</b> claims attack for <b>Northeast-Orthopedics-and-Sports-Medicine</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ca499abdbddf4ddeb3dacea80bf91a699fa3a15d1737c934c34feb31f287f9f</i><br /><br />Threat actor <b>description</b>: <i>Northeast Orthopedics and Sports Medicine is a company that operates in the Hospital & Health Care industry. The total size of stolen information is 1.56TB.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dAn0n</category>
</item>
<item xmlns:dc='ns:1'>
<title>Glenwood-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15284</link>
<guid>66a1942cfad91ff0ee99daf86e674d55</guid>
<pubDate>Wed, 08 May 2024 22:32:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dAn0n</b> claims attack for <b>Glenwood-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe6564c43db5ac2f9acaa787fc54f6a379cfafe79ff19619f77fd26354d9994e</i><br /><br />Threat actor <b>description</b>: <i>Glenwood Management is a property management company, providing luxury apartments throughout New York. The total size of stolen information is 1.78TB.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dAn0n</category>
</item>
<item xmlns:dc='ns:1'>
<title>College-Park-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15285</link>
<guid>b4930ad58efbbde24d596a387e89adf9</guid>
<pubDate>Wed, 08 May 2024 22:32:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dAn0n</b> claims attack for <b>College-Park-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a8f9cb42b0485fde9fda436a0ca983c595739e1ba1639eb73837509ff1de561</i><br /><br />Threat actor <b>description</b>: <i>College Park Industries is a is a prosthetics manufacturing company. It design and manufacture a full line of anatomically correct, customizable prosthetic foot systems, upper limb solutions, endoskel</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dAn0n</category>
</item>
<item xmlns:dc='ns:1'>
<title>Holstein-Association-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15281</link>
<guid>e770aa80a2e8d114e79e888e4670634b</guid>
<pubDate>Wed, 08 May 2024 18:22:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Holstein-Association-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60320ad59032a4defd6c005e0e78cbe566f42226edd72da2c3dff83bf57ce86f</i><br /><br />Threat actor <b>description</b>: <i>We have downloaded all the company's confidential data. Including all research, incidents, genetic experiments, personal data of employees, clients, partners, finances and much more interesting things.  Holstein Association USA, Inc., provi            ...</i><br />Target victim <b>website</b>: <i>Company url</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Electric-Mirror-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15276</link>
<guid>e0a4794fc273e7d59334e5f4fba95f3b</guid>
<pubDate>Wed, 08 May 2024 14:56:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Electric-Mirror-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>59ccb5597bdca1e5a6f546f78ea039eb198b8d8a5ea6a7fd1db4860c440b93d7</i><br /><br />Threat actor <b>description</b>: <i>Electric Mirror is in more hotels than all of our competitors combined, making us the leader in Lighted Mirrors and Mirror TV technology. Since we first introduced Lighted Mirrors and Mirror TVs to...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Richelieu-Foods</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15277</link>
<guid>971bbe989ad132e834b0ccb3f32e92ee</guid>
<pubDate>Wed, 08 May 2024 14:54:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Richelieu-Foods</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>494e5a109c8be905ff36f79545900fe0f76082eb1364a72479120595761d752d</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://richelieufoods.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dragon-Tax-and-Management-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15279</link>
<guid>083ae7ea9e5e3ba6e3aab3a8b20bfeb8</guid>
<pubDate>Wed, 08 May 2024 14:46:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Dragon-Tax-and-Management-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46528b257e8eaf60771a114a0e0d6f7ebe743faaf4fcc9da79293d385f799fc4</i><br /><br />Threat actor <b>description</b>: <i>Dragon Tax are Accountants and Enrolled Agents that provide accounting and bookkeeping services for many of our self-employed and business clients. Services include but are not limited to payroll, recording of transactions, reconciliation, managerial accounting, cost analysis, fraud prevention, tax form preparation and creation of financial statements.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mewborn--DeSelms</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15271</link>
<guid>2a174f994bb16b9b11e6ea5c00a671c5</guid>
<pubDate>Wed, 08 May 2024 09:26:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Mewborn--DeSelms</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ffc587283b1e1719b52adaef11fdca0db1e8108eb92522870e007434e5444ede</i><br /><br />Threat actor <b>description</b>: <i>Since 1997, Mewborn & DeSelms, Attorneys at Law, has provided a broad range of legal services to businesses, families and individuals</i><br />Target victim <b>website</b>: <i>http://mewbornlaw.biz</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Merritt-Properties-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15272</link>
<guid>0fcbc3c0cf262c771001930af2406bbc</guid>
<pubDate>Wed, 08 May 2024 09:25:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Merritt-Properties-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1c4887002be1afc75220fe9be1a05cb69c98a2d0af0a28f3cc784950c4ada67</i><br /><br />Threat actor <b>description</b>: <i>Merritt Properties, LLC develops and manages commercial properties in Maryland. It offers land entitlement and rezoning, site development. Merritt Properties corporate office is located in 2066 Lord Baltimore Dr, Windsor Mill, Maryland, 21244, United States and has 268 employees. The total amount of data leakage is 70.67 GB</i><br />Target victim <b>website</b>: <i>https://www.merrittproperties.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Autobell-Car-Wash-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15273</link>
<guid>2e64b43ae33b6a9c6718e03b11f7f24c</guid>
<pubDate>Wed, 08 May 2024 09:24:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Autobell-Car-Wash-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa503ed88a8e20a049ad0df464416d1cd02ae35d2b11ca6909f4b8269739d094</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1969, Autobell Car Wash, Inc. is a conveyorized car wash company that offers interior and exterior wash options.Autobell Car Wash corporate office is located in 1521 E 3rd St, Charlotte, North Carolina, 28204, United States and has 584 employees.The total amount of data leakage is 183.3 GB</i><br />Target victim <b>website</b>: <i>https://www.autobell.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>consultingradiologists.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15266</link>
<guid>2f4e2fe0d640b5eca5eaa6de05759928</guid>
<pubDate>Wed, 08 May 2024 02:05:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>consultingradiologists.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>86ab11e29b9756d5b7b4f32dc41ec6f4b6a00fa48ec8e3cd075ad796fb6f23c6</i><br /><br />Threat actor <b>description</b>: <i>Consulting Radiologists LTD is an independent radiology group based out of Minneapolis, providing a complete range of radiology services to the healthcare community, including outpatient imaging services. After 89 years of existence, CRL continues to...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>williamsrdm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15264</link>
<guid>ce738adf821b780cfcde4100e633e51a</guid>
<pubDate>Tue, 07 May 2024 22:29:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>williamsrdm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>edcae260182694a7594bac3a8aba51ccd06254e3580ee06e2bb2359ea1c11f61</i><br /><br />Threat actor <b>description</b>: <i>Williams RDM is a Fort Worth-based research, development, and manufacturing company.All data will be open and available for downloading in 7 days!!!(14.05.24)</i><br />Target victim <b>website</b>: <i>williamsrdm.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>wichita.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15258</link>
<guid>10d4b366f410a1275f7b684f07a28456</guid>
<pubDate>Tue, 07 May 2024 20:33:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>wichita.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b0fb5d3d29a65039c2ae59c92b4880f5b471ec3d12abb683c5b5e4f6d32aa87</i><br /><br />Threat actor <b>description</b>: <i>Wichita is the most populous city in the U.S. state of Kansas and the county seat of Sedgwick County. As of the 2020 census, the population of the city was 397,532. The Wichita metro area had a population of 647,610 in 2020. It is located in south-ce...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Buckeye-buckeyeaz.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15259</link>
<guid>e3d389ef8c92b280760c6ebd647c2cee</guid>
<pubDate>Tue, 07 May 2024 20:32:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>City-of-Buckeye-buckeyeaz.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af52cc97e5cea92a71dfd6a59fa738b20bd8795a2d5d580a1aea7057910b1ed6</i><br /><br />Threat actor <b>description</b>: <i>Midwest Covenant Home, Inc., located in Stromsburg, Nebraska, offers a senior living campus which encompasses independent living apartments, assisted living units and a skilled nursing facility. Our organization values our elders and promotes the quality of their lives through the gracious environment surrounding the grounds. Adopting the Eden philosophy, Midwest Covenant Home upholds abolishing the three plagues of the elderly, loneliness, helplessness and boredom. Each resident's spiritual life is enhanced by our involvement with the local clergy to meet the individual resident's spiritual needs. We are active members of the Nebraska Health Care Association. Midwest Covenant Home is a registered Eden Alternative facility. One recent family member commented, "You have a very caring staff here."</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hibser-Yamauchi-Architects</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15260</link>
<guid>4e4f8804bf781c81ea45e97aecb24427</guid>
<pubDate>Tue, 07 May 2024 20:30:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Hibser-Yamauchi-Architects</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e760fe62695fcce546818890bd24fcd5d5e1edfce5db85e9a34127aea176357e</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.hy-arch.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Noritsu-America-Corp.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15261</link>
<guid>1d72d067ad71fc47c245e249dc16cb7f</guid>
<pubDate>Tue, 07 May 2024 20:29:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Noritsu-America-Corp.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e660e6b3d60cc8f430ec807d7255f0d98514e2537f8e30e5a45f21d19dc7192</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.noritsu.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jetson-Specialty-Marketing-Services-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15254</link>
<guid>375016b30480b736b590ff57616afc52</guid>
<pubDate>Tue, 07 May 2024 19:50:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>metaencryptor</b> claims attack for <b>Jetson-Specialty-Marketing-Services-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1da9a8b04876b0fd698278da24d0e0b0dd94027a212cc138a12fcff5126becfd</i><br /><br />Threat actor <b>description</b>: <i>JSM is a full-service direct marketing communications company steadfast in assisting clients acquire new customers and build profitable, long-term relationships with those customers. From Analytics and Database Management to Direct Mail, Critical Communications, Digital Variable Print Production to Postal Optimization, Piece-level Tracking and Response Processing, JSM has a suite of solutions to assist in growing client's business.</i><br />Target victim <b>website</b>: <i>https://jetsonmarketing.com</i>]]></description>
<category>metaencryptor</category>
</item>
<item xmlns:dc='ns:1'>
<title>woldae.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15251</link>
<guid>fb506ffc6e2e1c236f9b26dcb5dcc862</guid>
<pubDate>Tue, 07 May 2024 18:26:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>woldae.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f331b5566e25951c370ac5b41d49a11116920a0b6f18e8ad58a27a7e564f817a</i><br /><br />Threat actor <b>description</b>: <i>woldae.com 9.7Tb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>Information-Integration-Experts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15248</link>
<guid>7d8d39116004c0df3b4a9e2e421dd2a2</guid>
<pubDate>Tue, 07 May 2024 13:12:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dAn0n</b> claims attack for <b>Information-Integration-Experts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b3f8835d658833638d2fe0ad3b2a1e58da20b62a2244ace1fb9f4f35e4aa269</i><br /><br />Threat actor <b>description</b>: <i>Information Integration Experts, LLC (iiExperts aka IIX) has been developing software since the early 1970s. 
Headquartered in Arlington, Texas, IIXbegan operations in 1980, and has been serving the</i><br />Target victim <b>website</b>: <i>www.iiexperts.com</i>]]></description>
<category>dAn0n</category>
</item>
<item xmlns:dc='ns:1'>
<title>One-Toyota-of-Oakland-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15249</link>
<guid>eef76d754e75d784e8f960be345e8d23</guid>
<pubDate>Tue, 07 May 2024 13:09:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>One-Toyota-of-Oakland-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe26e7d209edbae229e99ba3d20138e930a06565fdb1cb1778025c5bdbe4bcaf</i><br /><br />Threat actor <b>description</b>: <i>One Toyota of Oakland sells new and used Toyota vehicles. One Toyota of Oakland corporate office is located in 8181 Oakport St, Oakland, California, 94621, United States and has 81 employees. The total amount of data leakage is 45.8 GB and include their financial records and customer information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>ctc-corp.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15235</link>
<guid>8d80b953e6dab669d98c905f7527fedd</guid>
<pubDate>Tue, 07 May 2024 10:56:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ctc-corp.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>01db98cf3b8928eff6a71778883dd33488bc61165dac43c76192845cf7ff3f48</i><br /><br />Threat actor <b>description</b>: <i>For over 115 years, we have built and maintained partnerships with our customers by providing solutions that are essential to their business. With our versatile offering of rental service, laundry and dry cleaning service and janitorial products, we...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>uslinen.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15236</link>
<guid>0cf5d42e34cfeb8ae58bf0b5eca73375</guid>
<pubDate>Tue, 07 May 2024 10:54:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>uslinen.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>305c3af6550ec25837b7a92825eaa1100e9584346b3b3a62dcbdb63e7c8bd804</i><br /><br />Threat actor <b>description</b>: <i>We are a family-owned, professionally managed provider of uniforms, mats, and towels that values a positive customer experience. Honesty, integrity, and respect are the driving forces behind our services. We believe in accountability, reliability, an...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>thede-culpepper.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15238</link>
<guid>e339e9f77caa07d6be8acfa2fceb178a</guid>
<pubDate>Tue, 07 May 2024 10:49:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>thede-culpepper.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fac5b1fdedd5ba5babed141bff95ca94964819930911448414fb1b42ab7ade97</i><br /><br />Threat actor <b>description</b>: <i>The lawyers of Thede Culpepper LLP have many years of experience in the areas of estate and trust planning and administration, business, tax.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>kimmelcleaners.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15239</link>
<guid>02c9aaa85c90be06dc2e1a1effe79e73</guid>
<pubDate>Tue, 07 May 2024 10:47:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>kimmelcleaners.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6eda173479533394930b26e3b34d0a567816178a14919448c988c79e1184a922</i><br /><br />Threat actor <b>description</b>: <i>100gb</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>emainc.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15240</link>
<guid>0c1afc055393604da9a0074c7a02d80e</guid>
<pubDate>Tue, 07 May 2024 10:45:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>emainc.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63179f74d9d2a7b36cd6cbaec2e725a021143719513036dde2c635fa653da849</i><br /><br />Threat actor <b>description</b>: <i>280gb</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>southernspecialtysupply.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15241</link>
<guid>a3149b45cbd3bf9980f7db0fca8a3094</guid>
<pubDate>Tue, 07 May 2024 10:44:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>southernspecialtysupply.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b35e6fe8ed42dd844f33d6ca2412df66fe282f5cf398878b7482546b0c3d6192</i><br /><br />Threat actor <b>description</b>: <i>With over 30 years of experience our dedicated sales team is here to help you with all of your supply needs for the oil and gas industry. Providing quality products and service, our team is here to provide knowledge and support for offshore, onshore,...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>churchill-linen.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15243</link>
<guid>2e310f292c162dece16e5936ffde36e8</guid>
<pubDate>Tue, 07 May 2024 10:40:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>churchill-linen.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b06a105aecf918a9aff8de0517996b55ee988e3f0777530e415677a6cff9f55b</i><br /><br />Threat actor <b>description</b>: <i>Churchill Linen Service has much to offer than just an extensive selection of product colors and sizes. We utilize state of the art technology to ensure accurate invoicing and inventory management. We offer valued added programs designed to show our...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>rollingfields.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15244</link>
<guid>4c1062cc42d7e3c64306cbee964db44f</guid>
<pubDate>Tue, 07 May 2024 10:38:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>rollingfields.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0d6e77719641bb19e107283cda5e644839009ca78c20c9ccd8e7d3d30da67325</i><br /><br />Threat actor <b>description</b>: <i>Since 1968, Rolling Fields has brought quality care and meaningful, vibrant senior living to Crawford County.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>JFK-Financial-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15233</link>
<guid>87a7f631aba283357925824464be7f74</guid>
<pubDate>Tue, 07 May 2024 07:34:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>JFK-Financial-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ea68c65a07bcce1e74da4138fd47d5ddeda021db70a0e1c52231f676c2c9036</i><br /><br />Threat actor <b>description</b>: <i>JFK Financial Inc. is a national mortgage lender offering a wide variety of loan programs, services, powerful online tools, and all with unparalleled customer service. For almost 20 years, JFK has...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Central-Florida-Equipment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15222</link>
<guid>7d4a769562e3528950e2d1aebdfb0550</guid>
<pubDate>Tue, 07 May 2024 02:12:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Central-Florida-Equipment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89fa058caefcc366bce4accdb06d360d04080d17fc8810afceea116df0479e09</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.centralcivil.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>High-Performance-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15223</link>
<guid>853125f5451f07f8b8ed6d166f96e0c3</guid>
<pubDate>Tue, 07 May 2024 02:12:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>High-Performance-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>110c3526c607d1c2ef59bd19e3edcfd3b8dbc02c804d8b2471c64ae23e93a4f3</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.hpsllc.us</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mauritzon</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15224</link>
<guid>ebae5f81d1c4563ae8f8d07b9290324f</guid>
<pubDate>Tue, 07 May 2024 02:11:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Mauritzon</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>655d9666af7b2b5a4fc1670c1656c4fb7ec573175f2c0e5098e891eed22f745f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.mauritzon.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Somerville</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15225</link>
<guid>7c72900e0b6e4108fdf991b696776f6c</guid>
<pubDate>Tue, 07 May 2024 02:11:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Somerville</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6518586ca40d060111af0285f7aef5464ee996c0d7e0e450e716495a33240ae</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.somervilleinc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Donco-Air</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15226</link>
<guid>d31deb89a583277bf4f76c6dcef151e3</guid>
<pubDate>Tue, 07 May 2024 02:10:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Donco-Air</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca731e1a33b340eb513d4225798791cac4245edb812bf153cd7d0ad29cfab583</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.raymon-hvac.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Affordable-Payroll--Bookkeeping-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15227</link>
<guid>16db016ed3a5b8d7c596928306161ada</guid>
<pubDate>Tue, 07 May 2024 02:10:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Affordable-Payroll--Bookkeeping-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a87e8ac7930fedead87c336f407d9777c023a118e473d381801e71cf54120f9</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.apb-services.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Utica-Mack</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15228</link>
<guid>428365de6e004c615fe51282a0b8d9db</guid>
<pubDate>Tue, 07 May 2024 02:09:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Utica-Mack</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aef5d428ab2bd3d1f720d61c02b41c577ebf477d0a332600735e46439cefecef</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.uticamack.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>KC-Scout</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15229</link>
<guid>bbdba257f96ea1bfa6e0aa829c59984c</guid>
<pubDate>Tue, 07 May 2024 02:09:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>KC-Scout</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>239639627c2d5c52f77b5f2b9967afa0dbbd9c8963405f2489d2bd0ed76cb9dc</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.kcscout.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sentry-Data-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15230</link>
<guid>17d079a0102e73dbd8c7cd98b6716b5b</guid>
<pubDate>Tue, 07 May 2024 02:08:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Sentry-Data-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a887fd0cc69b0879b332319be17be5572a70f5c7c0bf6b48d3d2132a050595bf</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.sentrydatamgt.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Young-Consulting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15221</link>
<guid>57b33ae6c0bf00c454900bea31d88893</guid>
<pubDate>Tue, 07 May 2024 01:59:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Young-Consulting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e11e21c2abb4e0d5a204a62be0cd30164a6e7ceee5d0387620b4bbcda840c3a5</i><br /><br />Threat actor <b>description</b>: <i>Young Consulting is the market leader in providing software solutions to the employer stop loss marketplace.</i><br />Target victim <b>website</b>: <i>http://youngconsulting.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Weinstein-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15215</link>
<guid>1efecd1fe0d67b4fb82c400a180be64b</guid>
<pubDate>Mon, 06 May 2024 20:29:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-Weinstein-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6897fdfceb945827de07b35187017ba0ded3f63ee793dec40bb1aa1ceb045f92</i><br /><br />Threat actor <b>description</b>: <i>At The Weinstein Firm LLC, we operate on what is called a contingency fee basis. This means that you, as our client, pay no upfront fees and owe usnothing until we secure a favorable verdict or settlement on your behalf. To put it another way            ...</i><br />Target victim <b>website</b>: <i>Company url</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nikolaus--Hohenadel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15216</link>
<guid>7afe9aa70ec82fd1c9909b7cacb885ca</guid>
<pubDate>Mon, 06 May 2024 20:21:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Nikolaus--Hohenadel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8cdc3a5e1bafb2929d0fd825277bdd328608c5e96f748fe50ae4593e1e970bce</i><br /><br />Threat actor <b>description</b>: <i>Nikolaus & Hohenadel, LLP is a Lancaster County law firm serving individuals, businesses and families throughout south central Pennsylvania.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>M2E-Consulting-Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15192</link>
<guid>182340c28a4350468fce307ff1bab29e</guid>
<pubDate>Mon, 06 May 2024 19:39:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>M2E-Consulting-Engineers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>13791297cf01a833ca26fa728e82188c2b479e14e8e0ad83aad630681a002ecd</i><br /><br />Threat actor <b>description</b>: <i>M2E Consulting Engineers is a multi-disciplinary firm providing engineering services toits partners across major markets and locations. Lots of confidential data, personal documents, client information, projects. We'll make the files available for you soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>oraclinical.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15209</link>
<guid>60dfd04289ecf518443e02289a0cd633</guid>
<pubDate>Mon, 06 May 2024 17:08:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>oraclinical.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db564e35d59d77690f8a710e5b4c02f713f54fec141eb32c47b61cc0ee9b7d9f</i><br /><br />Threat actor <b>description</b>: <i>With 85+ approvals to date, whatever your challenge, we're here to ensure success. Discover how we make work better for our workforce. We provide the vision and experience to help guide your Ophthalmic product from preclinical stages through commerci...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>cpashin.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15211</link>
<guid>36ac2b589744fa94bfe694b604971bf0</guid>
<pubDate>Mon, 06 May 2024 17:04:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>cpashin.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>85d85beeff91023ca8361a4221b108c850f954d3b9c53ac495cc9471ace1f6b8</i><br /><br />Threat actor <b>description</b>: <i>David Shin & Co., CPA. For your valuable life. Menu. Home; Contact Us; Blog; 블로그; NPO Talk; App Download</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>qstartlabs.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15195</link>
<guid>59b109c700b500daa9ef3a6769bc8c6f</guid>
<pubDate>Mon, 06 May 2024 16:56:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>qstartlabs.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6730d671972c5dd8351c41b0368085c6079eb330f322c38c51bf68b5af334271</i><br /><br />Threat actor <b>description</b>: <i>Software. Development. For. Startups. Begin your startup journey with QStart Labs—your dedicated tech team for web, mobile, and AI application development. Better than that we also blend cutting-edge technology with strategic insight, propelling your...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>carespring.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15197</link>
<guid>cdeb62ca10f63c94f575fa8f7f7a2b1f</guid>
<pubDate>Mon, 06 May 2024 16:55:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>carespring.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ebf9ea7f2d4ed2ef8096b1f619904566ed6545ee065820fec5eed9dc9339ea7</i><br /><br />Threat actor <b>description</b>: <i>At Carespring, we are committed to providing top-quality health care management services to our patients. Whether you need skilled nursing, independent living, assisted living, memory care facilities, or rehabilitative services, we have the expertise...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>sonoco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15204</link>
<guid>80ef6a7e213de4ec82a410e1ee31b422</guid>
<pubDate>Mon, 06 May 2024 16:45:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>sonoco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c589ab69e8a3e731ead2153c9402b8713488cb5e295cb5e2dc20970668728c20</i><br /><br />Threat actor <b>description</b>: <i>Sonoco Products Company is an American provider of diversified consumer packaging, industrial products, protective packaging, and packaging supply chain services and the world's largest producer of composite cans, tubes, and cores.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rafael-Violy-Architects</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15206</link>
<guid>99927ed3f11c0f361bd4c0c7d61d246f</guid>
<pubDate>Mon, 06 May 2024 16:37:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Rafael-Violy-Architects</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d3e4727ad4aa8a8a1dc556ffc0d980dceecfc3db67237a08da3d4b7355eb9fa</i><br /><br />Threat actor <b>description</b>: <i>Rafael Viñoly Architects, founded in 1983 and based in New York City — with offices in London, Manchester, Abu Dhabi, Buenos Aires, Chicago, and Palo Alto — is an internationally renowned architectural firm with projects spanning six continents. Over the past thirty-three years, the practice’s key trademark is its ability to reinvent institutional typologies and integrate the public realm into civic buildings.</i><br />Target victim <b>website</b>: <i>http://vinoly.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>TRC-Talent-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15207</link>
<guid>b5e93461a6b1f9f5f6542740442d2233</guid>
<pubDate>Mon, 06 May 2024 16:37:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>TRC-Talent-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7e546331a4d3ddeab43fe48ddf3a04df5c2798241ea7e35d88a67ffbc139a7c</i><br /><br />Threat actor <b>description</b>: <i>TRC Talent Solutions is a full-service talent solutions provider with over 40 years of industry experience. Established in 1980, TRC is one of the largest privately held staffing firms in the country. Like his father, President and CEO Brian Robinson, remains focused on the idea that the marketplace continues to need a staffing agency built on principles and values, and is committed to providing the highest level of service in the industry.</i><br />Target victim <b>website</b>: <i>https://trctalent.com/</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>htcinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15183</link>
<guid>cd14d7eac0e4638dca6ef495702dd013</guid>
<pubDate>Mon, 06 May 2024 13:38:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>htcinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>921d2d36e1b7693c4cd26b6c09c4c9e9b29c7e1dc86acb6000531836e4903669</i><br /><br />Threat actor <b>description</b>: <i>Talk To Our Experts. Full Name*. Company*. Work Email ID*. Phone No*. How can we help you? All fields marked with * are mandatory. HTC Global Services provides IT and Business Process Services and Solutions that help businesses make digital change ha...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>geotechenv.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15185</link>
<guid>e38c9a9b9ca7607ce912ab7fe7106f3d</guid>
<pubDate>Mon, 06 May 2024 13:35:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>geotechenv.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb2f9297d929205fb75dc22a56ea73eee63029e8eb708b7b238f6d139e47cd64</i><br /><br />Threat actor <b>description</b>: <i>Our global presence ensures that we stay ahead of the curve in this ever-evolving field. You can stay up-to-date on where we are by connecting with us online or subscribing to our mailing list. Geotech History. Contact Sales. Upcoming Dates. Contact...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>ishoppes.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15186</link>
<guid>5b3b3e573becfa5d7fac4916f8bc0fed</guid>
<pubDate>Mon, 06 May 2024 13:34:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ishoppes.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff1ee42a546c23d0619f51063c1243ce1846b5071b57cc5c64645d1f28f4910a</i><br /><br />Threat actor <b>description</b>: <i>Join our iShoppes list and we'll send you your special offer* and first-class access to the latest arrivals, travel exclusives and special promotions. GET MY 10% OFFER. no, thanks *Offer will arrive via email approximately 24 hours from submission. V...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>getcloudapp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15188</link>
<guid>8a20d7c7b4ca634d08739cf614e6063c</guid>
<pubDate>Mon, 06 May 2024 13:32:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>getcloudapp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>74da61dc987bb393ac9fb9f82ccc4902cafb88c11f7154423ab944e7478332c7</i><br /><br />Threat actor <b>description</b>: <i>CloudApp is a cross-platform screen capture and screen recording desktop client that supports online storage and sharing. CloudApp full and partial screen recordings export to.mp4 format. Full or partial screen image captures export to either JPG or...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Boyden</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15176</link>
<guid>3d76cc27d29c076b2c374df9ac79d6a8</guid>
<pubDate>Mon, 06 May 2024 09:36:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Boyden</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77eac3631ffe90999c95ec0956bbdd0bf98b9b453b202c616e7efb0a7f458e3a</i><br /><br />Threat actor <b>description</b>: <i>Boyden (founded	1946) - a consulting firm engaged, among other things, in the search for managers for various areas of business, interim management, and so on. Boyden corporate office is located in 520 White Plains Rd Ste 500, Tarrytown, New York, 10591, United States and has 984 employees. The total amount of data leakage is 79.3 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>W.F.-Whelan</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15177</link>
<guid>46c5976b94ffe3389fe63bed55f9cc8f</guid>
<pubDate>Mon, 06 May 2024 09:35:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>W.F.-Whelan</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c6022b17ee3d99aa74cb50b731f02dde237287fca8e8f9f9de8c1aa38fa045d</i><br /><br />Threat actor <b>description</b>: <i>W.F. Whelan Company (founded 1974) is a full service logistics company. WF Whelan corporate office is located in 41425 Joy Rd, Canton, Michigan, 48187, United States and has 101 employees. The total amount of data leakage is 175.67 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Seneca-Nation-Health-System</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15171</link>
<guid>126548d403b6c39820e63fed2cd54db3</guid>
<pubDate>Sun, 05 May 2024 22:41:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Seneca-Nation-Health-System</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1ac1daa92e7eedcb7c40d977b9082b82e15cc3ad1b5532aaefb542aa05c499c</i><br /><br />Threat actor <b>description</b>: <i>The Seneca Nation Health System (SNHS) is recognized as a non-profit public health organization and maintains a federal contract with the Indian Health services (IHS) under public health law 93-368 Title 1. The SNHS was established in 1976 as a tribal program and has continuously provided ambulatory health care in the Allegany and Cattaraugus Territories. The health care facilities offer programs developed under the public health model. These facilities are the Lionel R. John Health Center (LRJHC), the Cattaraugus Indian Reservation Health Center (CIRHC) and Community Health and Wellness Center. Health services are offered to those persons within the Purchased/Referred Care Services Delivery Area who are defined as eligible under federal and tribal guidelines. These services areas include the counties of Allegany, Cattaraugus, Chautauqua, Niagara (excluding the Tonawanda and Tuscarora Territories) and Erie in New York and Warren County in Pennsylvania. Our programs provide a full range of primary and preventive care for acute and chronic illness and injuries. In addition, we have service agreements with several local hospitals, professional groups and agencies for inpatient treatment and specialty care to round out our health programs. The Lionel R. John Health Center has been recognized by the National Committee for Quality Assurance (NCQA) as a Level 3 Patient Centered Medical Home. And NCQA has also recognized the Diabetes Program at LRJHC.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>COMPEXLEGAL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15168</link>
<guid>a25067c6d17ee06552ad5e147ae25c49</guid>
<pubDate>Sat, 04 May 2024 18:49:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>COMPEXLEGAL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2473c841adaf443e07fb892fbc697a27816ccd61a6aeff1151370d6b9e2df00c</i><br /><br />Threat actor <b>description</b>: <i>The #1 Medical Record Retrieval Service - Compex Legal Services</i><br />Target victim <b>website</b>: <i>https://www.COMPEXLEGAL.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>cmactrans.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15154</link>
<guid>991c0955da231335e4864d3389698fd5</guid>
<pubDate>Sat, 04 May 2024 14:44:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>cmactrans.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8de8b3c943cb4d3c13406297c6353402f203f44a48e56b1f51b77f1a5cb1e8b6</i><br /><br />Threat actor <b>description</b>: <i>CMAC Transportation is a family-owned, veteran-owned transportation, logistics, and warehousing provider located in Brownstown, MI.SITE: www.cmactrans.com Address : 20450 Sibley Road. Brownstown, MI 48193 USAALL DATA SIZE: ~200gb+ 1. HR 2. Finance 3. Personal 4. Personnel Files & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>ids-michigan.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15155</link>
<guid>f5532381792b4aafeb9e52a68bf568de</guid>
<pubDate>Sat, 04 May 2024 14:44:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>ids-michigan.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>afc1c7e7166d0190bd32a790e01da931bb045f2ff7701b39fb1cedc313cde54f</i><br /><br />Threat actor <b>description</b>: <i>IDS fully integrated firm specializing in architecture, engineering, interiors, technology, energy & sustainability.SITE: www.ids-michigan.com Address : 1441 W Long Lake Rd, Suite 200, Troy, MI 48098 USAALL DATA SIZE: ~550gb+ 1. Projects 2. CAD and drawings 3. Users, Corporate data & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>olsonsteel.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15158</link>
<guid>b555da9b21a5a45577bb2bfb58bcfea0</guid>
<pubDate>Sat, 04 May 2024 14:43:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>olsonsteel.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33ec70ef6d4425f2572b42ee6a059c22de7aa2db3f00d51c31fb2e85d5a2a37a</i><br /><br />Threat actor <b>description</b>: <i>Olson & Co. Steel is a premier steel contractor that provides steel fabrication, erection, and specialty construction services. The company was formed in 2002 from the consolidation of Bostrom Bergen Metal Products and Meddco Metals, and has a long history of serving the construction industry since 1960. Olson & Co. Steel has completed various specialty projects, including the Potrero Power Station A Building, Santa Clara Valley Medical Center Art Feature, Massy House, Hangar 3 Timber Repair Scaffold and Shoring Tower, Orbital Art Feature, Stanford Central Campus Process Steam System, U.C Davis Brewery, Saint Peter & Paul Church, Stanley Mosk Library & Courts, San Jose Southside Police Station, Geneva Car Enclosure (Butler), California Dairies Plant 7, California Dairies Visalia Plant, Keyes Ethanol Plant, and Pixley Ethanol. The company is a market leader in bringing technology to its detailing, fabrication, and erection processes, and strives for innovation and continuous improvement.SITE: www.olsonsteel.com Address : 1941 Davis Street, San Leandro, CA, 94577 USAALL DATA SIZE: ≈900gb 1. Company data: HR, Accounting and etc… 2. Employees, users data + personal documents 3. Projects and CAD, Confidetial documents and drawings And much more…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Accounting-Professionals-LLC.-Price-Breazeale--Chastang</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15165</link>
<guid>90ecce8d5dad4396f681182cb470872c</guid>
<pubDate>Sat, 04 May 2024 14:06:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Accounting-Professionals-LLC.-Price-Breazeale--Chastang</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a75a7ae7e56c6a979f8b31f9decd7c903f960bbe512bd7c0c2d4fc4444ddf54</i><br /><br />Threat actor <b>description</b>: <i>Company has the last 24 hours to contact us using the instructions left.In case of silence, all data will be publishedIncluding documents from over 2 thousands of your clientsTotal amount of stolen data : 574 GB https://accountingprofessionals.org/https://pbc-pa.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mainline-Health-Systems-MHS.local</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15153</link>
<guid>916024297cb288a61bbb9d285371b369</guid>
<pubDate>Sat, 04 May 2024 08:07:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Mainline-Health-Systems-MHS.local</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ace776ee61d52cb0c5f47a45e44c7507db09e707bed26ef9f465cbbfbdbf4a78</i><br /><br />Threat actor <b>description</b>: <i>Mainline Health Systems, Inc. mission is to provide high quality clinical services to all the people of Southeast Arkansas regardless of their ability to pay. Mainline was founded in 1978 by a group of agricultural leaders who were concerned about healthcare in their community. Mainline has grown from one clinic with one physician to a system of 6 medical clinics, 3 dental clinics and 10 school based health clinics with multiple providers located throughout Southeast Arkansas.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dr-Charles-A-Evans</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15147</link>
<guid>62519b8f83ec10cacb56d46342ace8f1</guid>
<pubDate>Fri, 03 May 2024 16:26:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Dr-Charles-A-Evans</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1dcf64793b1e1568ce19fe806f74e0ef0436e9c5ee14c40ff79d92569fe1cc79</i><br /><br />Threat actor <b>description</b>: <i>Dr. Charles Evans, MD. We are focusing on preventative medicine, healthy lifestyle, and healthy living. Nutrition, exercise, and weight loss are part of this overall goal. All data will be open and available for downloading in 2 days!!!(05.05            ...</i><br />Target victim <b>website</b>: <i>Company url</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>SBC-Global</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15140</link>
<guid>ee3bf295b9cf5a7ad4297868b069c91f</guid>
<pubDate>Fri, 03 May 2024 09:00:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>flocker</b> claims attack for <b>SBC-Global</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9bd6ae5c7a8441a9261f68189dbda3b7adbd1f87b10e8253a5fe1ed304e2a08f</i><br /><br />Threat actor <b>description</b>: <i>To the board of SBC Global, We have gained unauthorized access to your system and have procured highly confidential data,</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>flocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rutgers-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15141</link>
<guid>124243dcc405103dcf9419f38c89f078</guid>
<pubDate>Fri, 03 May 2024 08:58:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>flocker</b> claims attack for <b>Rutgers-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dab13ba9a347bed7e7f6ee9340611aab861e9a9a4b7ba4669e1aaddfdf2f446a</i><br /><br />Threat actor <b>description</b>: <i>We have infiltrated the Rutgers.edu servers, a well-known educational institution. In just 7 days, we will unveil their hidden truths</i><br />Target victim <b>website</b>: <i>https://www.rutgers.edu/</i>]]></description>
<category>flocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>MCS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15133</link>
<guid>a47ad724599e11d59272b02d08d0dbd7</guid>
<pubDate>Fri, 03 May 2024 02:20:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>MCS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cdfdea45f0892ba8da83b4f8bf951ea0f2bc48c8945b283cc3aad3de9ca217dc</i><br /><br />Threat actor <b>description</b>: <i>The mission of the Mitchell County Chamber of Commerce is to support business and promote community. The Chamber is made up of hundreds of businesses, industries and individual members whose goal is to promote Mitchell County, the surrounding            ...</i><br />Target victim <b>website</b>: <i>Company url</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stainless-Foundry--Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15125</link>
<guid>29babcee1a2bd1625d8fa36f14c254e0</guid>
<pubDate>Fri, 03 May 2024 01:50:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Stainless-Foundry--Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48b3a4ecbf14231e45f218b2e69bf70d4b523001d54a7db98fae7dc3d14e20a0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.stainlessfoundry.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ayoub--associates-CPA-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15122</link>
<guid>6e0a4f925e3788a47317b77fa13ec531</guid>
<pubDate>Thu, 02 May 2024 20:28:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Ayoub--associates-CPA-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad0081ff544f2359e6e498822c28d67b37f88605d0159430a2a021b17f1e4ff0</i><br /><br />Threat actor <b>description</b>: <i>Company has the last 24 hours to contact us using the instructions left. In case of silence, all data will be publishedIncluding documents from over 2 thousands of your clientsTotal amount of stolen data : 465 GB ayoub-associates.com</i><br />Target victim <b>website</b>: <i>https://ayoub-associates.com/</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>watergate</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15109</link>
<guid>ed9cfb0d25f138d1514d4e093f8acf4b</guid>
<pubDate>Thu, 02 May 2024 14:09:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>watergate</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f2a0c06562c875246348ecd98998a5b416d4177a89d03012ceda8b2c2f2e58bb</i><br /><br />Threat actor <b>description</b>: <i>All data will be open and available for downloading in 2 days!!!(03.05.24)</i><br />Target victim <b>website</b>: <i>www.thewatergatehotel.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lewis-Brothers-Bakeries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15111</link>
<guid>50d7f99947b472cc889d58845b9d23e2</guid>
<pubDate>Thu, 02 May 2024 14:07:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Lewis-Brothers-Bakeries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60261283ba0999fa2ecd666c7a44bcb13270b5ab147af33c477c17245e636d7d</i><br /><br />Threat actor <b>description</b>: <i>Lewis Brothers Bakeries - a company that operates a chain of bakeries in 17 states. Lewis Brothers Bakeries corporate office is located in 1220 W Michigan St, Evansville, Indiana, 47710, United States and has 396 employees. The total amount of data leakage 115.92 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>S.A.-Piazza--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15112</link>
<guid>ac909707722279dced6b3d6d2d646fa4</guid>
<pubDate>Thu, 02 May 2024 14:06:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>S.A.-Piazza--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>454e0247b4533ddadbb128908a7e47e82e09681f494194c3fca8e55a6feac648</i><br /><br />Threat actor <b>description</b>: <i>S.A. Piazza & Associates (founded 1967) - major pizza manufacturer and seller. S.A. Piazza & Associates corporate office is located in 15815 SE Piazza Ave, Clackamas, Oregon, 97015, United States and has 53 employees.  The total amount of data leakage is 18.63 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>MyoVision</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15113</link>
<guid>15fd459bc66aa8401543d8f4d1d80d97</guid>
<pubDate>Thu, 02 May 2024 14:06:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>MyoVision</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a2fc7b465a3586a1a2621351d579fbc5bfb01c4f3d43b88e3bbcfa51f2a0239</i><br /><br />Threat actor <b>description</b>: <i>MyoVision (founded 1989) - developer and manufacturer of medical equipment for the study of the body. Many of the company's developments are used by NASA. MyoVision corporate office is located in 13545 Erickson Pl NE Ste 200, Seattle, Washington, 98125, United States. The total amount of data leakage is 18.61 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Woodfords-Family-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15114</link>
<guid>45d0bb417c9fab94dae50e5974f30ec7</guid>
<pubDate>Thu, 02 May 2024 14:06:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Woodfords-Family-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>944d4a2e227e269a85115adfe12f0f57f1ba6349155ddb650b700df128c49c10</i><br /><br />Threat actor <b>description</b>: <i>Woodfords Family Services was founded in 1967 and its main activity is the support and integration of people with disabilities. Woodfords Family Services corporate office is located in 15 Saunders Way Ste 900, Westbrook, Maine, 04092, United States and has 435 employees. The total amount of data leakage is 198.5 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Calumet-Civil-Contractors-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15115</link>
<guid>09ff53617a5f5038297df773580f61a6</guid>
<pubDate>Thu, 02 May 2024 13:54:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Calumet-Civil-Contractors-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc6799b35fb581d2584fd55edb93537aad60dec7c1d27bcd69d0a8a72cc85a15</i><br /><br />Threat actor <b>description</b>: <i>Calumet Civil Contractors performs all phases of site development and road construction, primarily in the Indianapolis area.calumetcivil.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>SHAMASS.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15117</link>
<guid>13da2193bcd455bb894871aec1815047</guid>
<pubDate>Wed, 01 May 2024 23:30:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusalocker</b> claims attack for <b>SHAMASS.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e24652465bfbbcff7055e8442e486a39b9f8f76a16ac6e7e27d560fcfcdd300</i><br /><br />Threat actor <b>description</b>: <i>Descriptionemployee information – agreement – customer email(.xls)-.msg outlook files Price-$50000 (sale in one hand there are options for making a profit from these files will be included in the deal)</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusalocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Azteca-Tax-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15094</link>
<guid>b55d83ccddafa95f0dddb6e63d593cc9</guid>
<pubDate>Wed, 01 May 2024 16:22:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Azteca-Tax-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4581cf2a39ed6382324a620f650bee93aa88d3cc637425d0740348ac7182e289</i><br /><br />Threat actor <b>description</b>: <i>Azteca Tax Systems are focused on providing one of a kind tech and tax preparation support.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clinica-de-Salud-del-Valle-de-Salinas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15095</link>
<guid>b165bafed6172152a6eff6fa40b09353</guid>
<pubDate>Wed, 01 May 2024 16:21:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Clinica-de-Salud-del-Valle-de-Salinas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>613b6b57c94682d14922857bf8c750910094fb310dd80f20af4430cb195eaed6</i><br /><br />Threat actor <b>description</b>: <i>Clinica De Salud Del Valle De Salinas operates a network of community health centers in the Salinas Valley in Monterey County, California.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Studio-Libeskind</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15082</link>
<guid>12cfbd88070f29ee643ba6a9d614f79b</guid>
<pubDate>Wed, 01 May 2024 14:51:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Studio-Libeskind</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>696c4ac89c79e155a4cfd4da1b8f5c69555c3aaf06acf78bcbfdfb0b5b9d2ac4</i><br /><br />Threat actor <b>description</b>: <i>Studio Libeskind is a world-renowned architecture studio composedof architects and designers that believe architecture is a practice of optimism. 18Gb of files of this organization will be available for everyone in the world. A lot of joint projects information, accounting files, passports, contracts, agreements and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Y.-Hata--Co.-Ltd.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15090</link>
<guid>0f2cdab3b6cd72058596bab972897f61</guid>
<pubDate>Wed, 01 May 2024 14:07:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>underground</b> claims attack for <b>Y.-Hata--Co.-Ltd.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e87d3d459c910b6cae0334f1b311e09bc2831138a02a15d42acd73b5ff7ca516</i><br /><br />Threat actor <b>description</b>: <i>Revenue:$268M - Country :USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>underground</category>
</item>
<item xmlns:dc='ns:1'>
<title>Skender-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15091</link>
<guid>21f08cc6cfc56fdbeade7c9d8bd78aa1</guid>
<pubDate>Wed, 01 May 2024 14:06:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>underground</b> claims attack for <b>Skender-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5ac383ef6bfb98f24eed6d08d1982ca6664f5d3b1a797dee527c4c84f95c54f6</i><br /><br />Threat actor <b>description</b>: <i>Revenue:$318.3 Million - Country :USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>underground</category>
</item>
<item xmlns:dc='ns:1'>
<title>Creative-Business-Interiors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15092</link>
<guid>fa522ede9e820bba27b3656fa5209cdf</guid>
<pubDate>Wed, 01 May 2024 14:05:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>underground</b> claims attack for <b>Creative-Business-Interiors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1e42d3647aa55c50a8d29866fe0ce4263dd4c8001d90931847612f1e7656e79</i><br /><br />Threat actor <b>description</b>: <i>Revenue:$27M - Country :USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>underground</category>
</item>
<item xmlns:dc='ns:1'>
<title>hookerfurniture.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15069</link>
<guid>45e1ef0afb76fef33345fcac011c18bb</guid>
<pubDate>Wed, 01 May 2024 10:32:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hookerfurniture.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a32796c855ec0f5f529e4c05d6f385b87c94b2d3ff8af97c425b0ed1f698b1b</i><br /><br />Threat actor <b>description</b>: <i>A billion revenue furniture corporation with over dozen brands BUT do not care for the data of their customers and own company.Founded by the Hooker family in 1924, Hooker Furnishings is a diverse, international company with locations across the...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>alimmigration.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15070</link>
<guid>a0832439acb9c7270f615a7f18d408af</guid>
<pubDate>Wed, 01 May 2024 10:31:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>alimmigration.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea9e9d55485eebd19871675fb9c72b22e600d18e71dfb3659e4edcdb98427733</i><br /><br />Threat actor <b>description</b>: <i>Registered Migration services with office located in Florida.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>anatomage.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15071</link>
<guid>81616e9ab54cc3e36260f80593a4cc33</guid>
<pubDate>Wed, 01 May 2024 10:31:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>anatomage.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ef90f020c1c9678fb27baba7cb89540d320d5786536d0256862388de13e2a8d</i><br /><br />Threat actor <b>description</b>: <i>Anatomage enables an ecosystem of the next-generation 3D anatomy software and hardware, delivering innovations for multidisciplinary applications.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>bluegrasstechnologies.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15072</link>
<guid>0a90e4944afb2476c3021501c165a937</guid>
<pubDate>Wed, 01 May 2024 10:30:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>bluegrasstechnologies.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a704e874456e39c5aeab96d12b7b6fdb387248b9dc7c5999ad2c7dd410bd60ec</i><br /><br />Threat actor <b>description</b>: <i>BLUEGRASS TECHNOLOGIES INC.Environmental Consulting and Abatement Contractor for Asbestos, Mold and Lead</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>PINNACLEENGR.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15073</link>
<guid>a122a3441dd463a8360ca951ef45f98a</guid>
<pubDate>Wed, 01 May 2024 10:27:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PINNACLEENGR.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>387ba5f75aed975d174f03b92ac1c1e71195b26ea404fb7f4c4815bb16b0c653</i><br /><br />Threat actor <b>description</b>: <i>Pinnacle Engineering - Your Partner in Offshore Success</i><br />Target victim <b>website</b>: <i>https://www.PINNACLEENGR.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MCKINLEYPACKAGING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15074</link>
<guid>7a35f9cd32d949f8a278dca777827318</guid>
<pubDate>Wed, 01 May 2024 10:26:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MCKINLEYPACKAGING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f9270c22653d124f25a91bee3726b8ee561496d00b414a373001e76b56eb568</i><br /><br />Threat actor <b>description</b>: <i>McKinley Packaging</i><br />Target victim <b>website</b>: <i>https://www.MCKINLEYPACKAGING.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PILOTPEN.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15075</link>
<guid>a0fdfd68b89c356f5bc4f6aaf9e16cc0</guid>
<pubDate>Wed, 01 May 2024 10:26:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PILOTPEN.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06bf9036f3d5233842bd97104aced49d0cc0743327596890b1a76073d3cdd31d</i><br /><br />Threat actor <b>description</b>: <i>Welcome To Pilot Pen Global Landing Page</i><br />Target victim <b>website</b>: <i>https://www.PILOTPEN.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>colonial.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15076</link>
<guid>c1cca9b367623e090aa3ea860644ecd4</guid>
<pubDate>Wed, 01 May 2024 10:22:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>colonial.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a966c9771c77e66d2b934903ce7159d5ffc129e5bed8ce8f1366f9714b2abf8d</i><br /><br />Threat actor <b>description</b>: <i>The Colonial School District draws approximately 5,400 students from the Borough of Conshohocken, and the Townships of Plymouth and Whitemarsh in Montgomery County, Pennsylvania, just northwest of Philadelphia.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>cordish.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15077</link>
<guid>0a15350bdbbdd4b3bede03a525997ca4</guid>
<pubDate>Wed, 01 May 2024 10:21:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>cordish.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7125a11d0dc07e0c802cb265c5bcc6c9a1d44e3dc35765f07e4d5b4ddb8c5140</i><br /><br />Threat actor <b>description</b>: <i>The Cordish Companies' origins date back to 1910 and encompass four generations of privately-held, family ownership. During the past ten decades, The Cordish Companies has grown into a global leader with ten major lines of business: Commercial Real E...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>concorr.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15078</link>
<guid>d76d3d7839b4b0bd049054eea0f45938</guid>
<pubDate>Wed, 01 May 2024 10:20:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>concorr.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8531626aa32381db274797cf7b91d885a863d4449a072befebe8a656395d5ae2</i><br /><br />Threat actor <b>description</b>: <i>CONCORR, Inc. was established in 1990 to develop technologies and provide solutions for mitigating corrosion of reinforcement, both conventional and stressed, in reinforced concrete structures. It specializes in diagnostic evaluation, developing...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>yupousa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15079</link>
<guid>cadc05a1cd428a9f7e66915eb109f4f9</guid>
<pubDate>Wed, 01 May 2024 10:18:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>yupousa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4501afb2efbcb8ce0fb00a0d139c04f46a491fe5d5ef364f5ba1a7946b96dc0e</i><br /><br />Threat actor <b>description</b>: <i>YUPO is the recyclable, waterproof, tree-free Synthetic Paper with attributes and properties that make it the perfect solution for a variety of marketing, design, packaging and labeling needs.YUPO Synthetic Papers are extruded from polypropylene...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>peaseinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15080</link>
<guid>4b5739d494ab72c2a54540e67fc1c856</guid>
<pubDate>Wed, 01 May 2024 10:16:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>peaseinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa4ec2db6eda1b67b6e42ff7385198a830633b2203778713a9640b4d596b6d54</i><br /><br />Threat actor <b>description</b>: <i>Based out of Lakewood, Washington, Pease Construction has been delivering construction services to public and private clients for over 35 years. Our success relies on having a team of innovative and hardworking individuals with extensive knowledge of...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>MORTON-WILLIAMS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15081</link>
<guid>324d6370574676dc632b66048978e51b</guid>
<pubDate>Wed, 01 May 2024 00:11:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>MORTON-WILLIAMS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8866eee083c473ac76fb3ba129a90e92232438670809b5efb15bc18187c8213a</i><br /><br />Threat actor <b>description</b>: <i>150 GBhttps://gofile.io/d/mW8T5Uhttps://gofile.io/d/W1oksY https://www.mortonwilliams.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>GCH-Hotel-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15059</link>
<guid>fb49c7f398e2f14cadda7fd635df6bb0</guid>
<pubDate>Tue, 30 Apr 2024 19:53:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>GCH-Hotel-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d6ae5829721a528676ec6e179d0130d775bd6992711540946deb72faa47dfe11</i><br /><br />Threat actor <b>description</b>: <i>The GCH Hotel Group is one of the leading hotel management companies in Germany. 45GB of data to be uploaded. Personal docs of clients, NDAs, numerous financial documents.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Profile-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15068</link>
<guid>e3d2b39d8bc215f6540218d20280232a</guid>
<pubDate>Tue, 30 Apr 2024 18:58:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Profile-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8d9799add3d072601fbe1984c3905f946554b743b824765a897e280f8198a0c1</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.profileproducts.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>sbsofbak.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15062</link>
<guid>d5215023c7e116864efd4f4965fe6b91</guid>
<pubDate>Tue, 30 Apr 2024 17:19:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>sbsofbak.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>151924834fc5c8da3656a7bce801d2233d64175beca932173ff260dc3a80ec8e</i><br /><br />Threat actor <b>description</b>: <i>About SBS of Bakersfield, Inc. SBS of Bakersfield specializes in document-basedtechnology solutions. SBS of Bakersfield helps companies improve documentworkflow, compliance, and copier/printer budgeting needs through creative solutions.SBS of B...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>ottlite.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15056</link>
<guid>4195cac6ce8d484d041594a3faa2e13d</guid>
<pubDate>Tue, 30 Apr 2024 09:03:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ottlite.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a61de56137531a49e44f6f2e3da889732bc302de1df44c13e55e2fc36a2f4b5f</i><br /><br />Threat actor <b>description</b>: <i>OttLite was founded in 1989 by Dr. John Nash Ott to bring the power of natural daylight indoors through his one-of-a-kind natural daylight bulb</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>bdcm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15055</link>
<guid>9b71706cb7d7b32ad744c88113c7e83a</guid>
<pubDate>Tue, 30 Apr 2024 08:39:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>bdcm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b05e1836de94ffb694aa7bcfb24e34ec943b8c445ff60b5435ab0a3511a5b87</i><br /><br />Threat actor <b>description</b>: <i>Black Diamond Capital Management, a privately held alternative asset management firm specializing in high yield credit, stressed and distressed credit, restructurings and event-driven situations. The company offers portfolio management, financial planning, and advisory services to individuals, institutions, trusts, private funds, charitable organizations, and investment companies.SITE: www.bdcm.com Address : - UNITED STATES 2187 Atlantic Street 9th Floor Stamford, CT 06902 - UNITED KINGDOM 16 Berkeley Street London, England W1J 8DZ - U.S. VIRGIN ISLANDS 5330 Yacht Haven Grande Suite 100, Box 35 St. Thomas, USVI 00802ALL DATA SIZE: ~900gb+ 1. Company data 2. Employees data 3. Personal, confidential documents 4. Customer data & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Line-Up-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15041</link>
<guid>549d841c3704e2b6a273a258dd0b6f17</guid>
<pubDate>Mon, 29 Apr 2024 10:59:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>The-Line-Up-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af60a07c6a10f02cf60f6b34af766abae5182cbcab261e4bbdb5402e1c3d663a</i><br /><br />Threat actor <b>description</b>: <i>The Line Up creates custom dance costumes, cheer uniforms, and skating dresses. Shop made-to-order styles online or create your own custom apparel. thelineup.com</i><br />Target victim <b>website</b>: <i>www.thelineup.com</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>CORTEX-Chiropractic--Clinical-Neuroscience</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15043</link>
<guid>20e169b48c8f869887e2bbe1c5c3ea65</guid>
<pubDate>Mon, 29 Apr 2024 06:47:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>CORTEX-Chiropractic--Clinical-Neuroscience</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3724875b7be7c72db9290b767fa1cf5c342fe471ef4314306ccc2451253faec1</i><br /><br />Threat actor <b>description</b>: <i>The care available at our practice is based on chiropractic functional neurology, a discipline that builds on basic neuroscience using specific non-invasive biomechanical and other interventions to help improve neurological functions. These interventions can include visual, physical, orthopedic, auditory, and neurologic stimulation, as well as chiropractic adjustments and nutritional and dietary recommendations. All of which are aimed to enhance and promote optimal neurologic and physical function for each individual patient.Our team of highly trained professionals uses the latest healing technologies to restore you to pain-free health, quickly and easily. We thoroughly evaluate and treat all of the contributing root factors related to your issue. This includes, but is not limited to, your work and home stressors, overall body condition, nutrition, genetic and postural habits, emotional connections and patterns that are held in your muscles https://cortex360.com/</i><br />Target victim <b>website</b>: <i>https://cortex360.com/</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Surewerx-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15047</link>
<guid>f8b18593cdbb1ce289330560a44e33aa</guid>
<pubDate>Mon, 29 Apr 2024 06:37:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>spacebears</b> claims attack for <b>Surewerx-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56c6617bb9535b58750da9143816e9b15edf12f56465ac78af0a2940aad1097c</i><br /><br />Threat actor <b>description</b>: <i>At SureWerx, our mission is to manufacture the most innovative and rigorously tested products for our customers’ safety and productivity. Our end-to-end product portfolio includes 16 leading brands with a full offering of PPE, safety, and tool and equipment solutions.</i><br />Target victim <b>website</b>: <i>https://www.usa.surewerx.com/</i>]]></description>
<category>spacebears</category>
</item>
<item xmlns:dc='ns:1'>
<title>Human-Technology-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15025</link>
<guid>f9470a9c5982e834a183a0b97322afdf</guid>
<pubDate>Sat, 27 Apr 2024 19:06:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Human-Technology-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f96b80dfa5719fdd049f1dbdd0610713a266d6b5292aec56437b53c99e23ee93</i><br /><br />Threat actor <b>description</b>: <i>Innovative prosthetics and orthotics combined with clinical expertise and unparalleled patient care – at Human Technology, we are committed to your well-being, your unique needs, and your desire to...</i><br />Target victim <b>website</b>: <i>humtech.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Yale-Mortgage</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15024</link>
<guid>1c09cec8e3fb5f6dd4fd22a5c644d3e5</guid>
<pubDate>Sat, 27 Apr 2024 15:05:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Yale-Mortgage</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>738083eee8c8eb92e7ef13439ec4ada84d07de38347d6f813ccf0e7fd2f06263</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.yalemortgage.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Toolmarts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15023</link>
<guid>09ee0d0176bfd7a94b7cb9a926ab74cc</guid>
<pubDate>Sat, 27 Apr 2024 13:18:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Toolmarts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e18c09ccf0c55e897898f4933bd3f1765be8ba14b6a7db606efeffa99640f7d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.toolmarts.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Precision-Fluid-Controls</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15022</link>
<guid>86b83f4a0ef92968bc1d225a5a7802bb</guid>
<pubDate>Sat, 27 Apr 2024 11:08:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Precision-Fluid-Controls</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ee9d3bda1280d2b8f092bee37abc943e8a04b49f0c87ffb1c7f5b6085f149f0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.precisionfluidcontrols.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Anders-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15031</link>
<guid>6bfe6de4ebb6ce650cdcf4322e63dee4</guid>
<pubDate>Sat, 27 Apr 2024 10:35:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Anders-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ce125c0316edaae400bbb74de2e0bdcf609b3b45d001e3150e080e07812d1e3</i><br /><br />Threat actor <b>description</b>: <i>Anders Group (founded 2010) - is engaged in recruiting specialists for medical institutions throughout the country. Anders Group corporate office is located in 105 Decker Ct Ste 600, Irving, Texas, 75062, United States and has 185 employees. The total amount of data leakage is 214.48 GB</i><br />Target victim <b>website</b>: <i>https://www.andersgroup.org</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Original-Herkimer-Cheese</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15021</link>
<guid>5da32258db5588b74d8791b61f8ef271</guid>
<pubDate>Sat, 27 Apr 2024 09:06:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Original-Herkimer-Cheese</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>78310dd9e3cf2c81ebdc9e9a3a6b5838aeda1aad86317ec53886cca4e9795dda</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.originalherkimercheese.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-Hudson-Facades</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15020</link>
<guid>311230754ff997ed3171d2ff455b71ba</guid>
<pubDate>Sat, 27 Apr 2024 07:10:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>New-Hudson-Facades</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>21c379a3a7825baf4cf0e8c514252931e5acda8b8de2aa36aec6b7240b9108bd</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.newhudsonfacades.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>sesenergy.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15019</link>
<guid>9841401331f8c5563c4b060ff5370e72</guid>
<pubDate>Sat, 27 Apr 2024 05:04:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>sesenergy.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2e57695905b575a96f8778f71f06ec8cf8456855b3325c295c3c7e472c1f8b47</i><br /><br />Threat actor <b>description</b>: <i>As one of New England's original energy management companies, Secure Energy has been a trusted vendor partner, aggregator, and authorized broker for leading national suppliers since the infancy of the energy management industry. Let our team with 175...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Legislative-Bill-Drafting-Commission</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15017</link>
<guid>db923d713a51808b16056e2469deb034</guid>
<pubDate>Fri, 26 Apr 2024 23:01:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Legislative-Bill-Drafting-Commission</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>68efb19203c845ecb52a5f081bd2abd045e7d0299acb6a5ee4b4b453873cfd72</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.lbdc.state.ny.us</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Axip-Energy-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15016</link>
<guid>7f808f3226c4a95302489cfc3778fde0</guid>
<pubDate>Fri, 26 Apr 2024 21:01:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Axip-Energy-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>429c900ff419397a73d7ca7d10e20944c438a10236ffc1eeda47b5ffa7a2106d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.axip.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>thelawrencegroup.comprivat</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15013</link>
<guid>d8d3a2d972d6cb50e983baa5673ea92a</guid>
<pubDate>Fri, 26 Apr 2024 18:36:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>thelawrencegroup.comprivat</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d3d7c67db4006ed3795f4884b3f4e66c31d3a72b656e4f626e8f8838c46f172</i><br /><br />Threat actor <b>description</b>: <i>Lawrence Group is a building design, development, and project delivery firm headquartered in St. Louis. Recently named a “Hospitality Giant” by Interior Design Magazine, Lawrence Group offers architecture, interior design, a retail furniture showroom. In 1983, three University of Kansas design school graduates – Steve Smith, David Ohlemeyer and Paul Doerner – started Lawrence Group with the vision of becoming a design and construction super firm. They named the firm Lawrence Group after Lawrence, Kansas, the home of their alma mater. They envisioned the firm becoming generational in its pursuit of realizing clients’ dreams. Today, the core principle of realizing dreams is a cornerstone of the firm and an inspiration for succeeding generations.SITE: www.thelawrencegroup.com Address : 319 N 4th St Ste 1000, St. Louis, Missouri, 63102, United StatesALL DATA SIZE: 505gb 1. Personal documents 2. Users folders 3. Driver License and passports 4. Projects and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rocky-Mountain-Sales</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15014</link>
<guid>2bf620c22ba6bffd71c0709ba9654212</guid>
<pubDate>Fri, 26 Apr 2024 17:06:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Rocky-Mountain-Sales</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6cf3e661dc4d15f94ba9c2a6529bc40d8cf5ed9b8dc180db362c39ac49797204</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>https://www.rockymountainsales.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Erler--Kalinowski</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15035</link>
<guid>d16c19f1f2ab8361fda1f625ce3ff26a</guid>
<pubDate>Fri, 26 Apr 2024 10:10:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dAn0n</b> claims attack for <b>Erler--Kalinowski</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e3ea95c808051b9a6e71cc158769871bf31d184918db8521ba1ba44c84905958</i><br /><br />Threat actor <b>description</b>: <i>The total size of stolen information is 1TB. This leak contains corporate information of the company: Financial, legal, information on employees and partners. Information on clients was also received:</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dAn0n</category>
</item>
<item xmlns:dc='ns:1'>
<title>Precision-Time-Systems-www.precisiontimesystems.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15004</link>
<guid>780bc6caf343bb06a4372c0821012624</guid>
<pubDate>Fri, 26 Apr 2024 04:52:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>Precision-Time-Systems-www.precisiontimesystems.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c17b4e094ab35f2024b4d8ec30ff0c4fa247c06de3a7f8d3d7a34dfb7b49690e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pedsurology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14980</link>
<guid>4e12250d354ea681500f34a5660aa870</guid>
<pubDate>Thu, 25 Apr 2024 15:45:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dAn0n</b> claims attack for <b>Pedsurology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad08a9bce3a1e4d8179fdeb509dfc6c6675aa79330ceb5ba15365bbc4adb4f45</i><br /><br />Threat actor <b>description</b>: <i>The total size of stolen information is 950 GB.
This leak contains customer data, corporate information, databases, employees, medical information about customers.</i><br />Target victim <b>website</b>: <i>https://www.pedsurology.com/</i>]]></description>
<category>dAn0n</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Blake-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14981</link>
<guid>ae0720d7397bb4aaa61461dd73601276</guid>
<pubDate>Thu, 25 Apr 2024 15:43:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dAn0n</b> claims attack for <b>The-Blake-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3bfb79024fac02f64177fb0aca76fa91dc2fd821316fb488411da585db70d24</i><br /><br />Threat actor <b>description</b>: <i>The total size of stolen information is 740 GB. This leak contains corporate information of the company: Financial, legal, information on employees and partners. Information on clients was also receiv</i><br />Target victim <b>website</b>: <i>www.theblakefirm.com</i>]]></description>
<category>dAn0n</category>
</item>
<item xmlns:dc='ns:1'>
<title>United-Equitable-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14982</link>
<guid>466e695c8ce7c0b5cd5c4109d01ad589</guid>
<pubDate>Thu, 25 Apr 2024 15:42:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dAn0n</b> claims attack for <b>United-Equitable-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d6785bda075c43aed1eaf9ae29e1c63c68fa875fac5a56d86132172d1849ebc1</i><br /><br />Threat actor <b>description</b>: <i>The total size of stolen information is 300GB. This leak contains customer data, corporate information, databases, employee data, and customer insurance.</i><br />Target victim <b>website</b>: <i>www.ueg1.com</i>]]></description>
<category>dAn0n</category>
</item>
<item xmlns:dc='ns:1'>
<title>Allen-Blasting-and-Coating</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14983</link>
<guid>ce6f311f2548c0e40fbd9beaaa288d32</guid>
<pubDate>Thu, 25 Apr 2024 15:42:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dAn0n</b> claims attack for <b>Allen-Blasting-and-Coating</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b1439f16d33fcf1dfaca2186fe0051847cbddb6dc79b4bf9e79cae438e9b3f6</i><br /><br />Threat actor <b>description</b>: <i>The total size of stolen information is 1TB. This leak contains corporate information of the company: Financial, legal, information on employees and partners. Information on clients was also received:</i><br />Target victim <b>website</b>: <i>allenblastingandcoating.com</i>]]></description>
<category>dAn0n</category>
</item>
<item xmlns:dc='ns:1'>
<title>RSH-legal</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14986</link>
<guid>a2bb46e362d70a83673a822206f5062e</guid>
<pubDate>Thu, 25 Apr 2024 15:39:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dAn0n</b> claims attack for <b>RSH-legal</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>75bb2ebf41814387d8bd2ea20ba38de9d4449445daa1e1fc30d3e214e8b12c32</i><br /><br />Threat actor <b>description</b>: <i>The total size of stolen information is 6 TB. This leak contains corporate information of the company: Financial, legal, information on employees and partners. Information on clients: Personal data of</i><br />Target victim <b>website</b>: <i>www.fightingforfairness.com</i>]]></description>
<category>dAn0n</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.trifecta.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=15006</link>
<guid>4a7ad6a4dfd49733209e941c61ee6524</guid>
<pubDate>Thu, 25 Apr 2024 10:57:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>www.trifecta.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2655b665494aa9bab903a0e13df84f4be40cc3d5281d8e16957b9d1a786c07ad</i><br /><br />Threat actor <b>description</b>: <i>Information: Trifecta is a trusted advisor for some of the most widely recognized and successful companies in the world. Brands choose Trifecta bas...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>Beloinlaw</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14989</link>
<guid>0b49b88c68f7ecbdb73f50496c084a1e</guid>
<pubDate>Thu, 25 Apr 2024 02:09:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Beloinlaw</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf6fd2f44224905cea106df5eba9471bd20fbb31d4a5a0ed65cdbb74cdb69eb5</i><br /><br />Threat actor <b>description</b>: <i>After practicing business litigation for 14 years, Fred Beloin opened his own law firm on May 1, 1997 and began to grow. Thanks to its good clients and good work, the firm has grown. The Firm looks forward to many more years of service to the            ...</i><br />Target victim <b>website</b>: <i>http://beloinlaw.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Peter-Condakes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14990</link>
<guid>1b59164354d7e455f27f211aee57171f</guid>
<pubDate>Thu, 25 Apr 2024 02:01:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Peter-Condakes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc23f1caf50e25bd4542b87369fcc9aa5ddced9b53f6296969d261388ec87ad9</i><br /><br />Threat actor <b>description</b>: <i>Since 1900, the Peter Condakes Company has been one of the best recognized names in the produce industry.</i><br />Target victim <b>website</b>: <i>http://petercondakes.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Central-Power-Systems-and-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14977</link>
<guid>e8f6cc210aa183f415d82724a6b434ab</guid>
<pubDate>Wed, 24 Apr 2024 23:01:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Central-Power-Systems-and-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18f0e5969b0de0a9a5cd502bae641448b1613bfca27092661242b811a5bb7f56</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.cpower.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Council-of-Fashion-Designers-of-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14993</link>
<guid>9d83ecaab703bbfd06d5df223179d175</guid>
<pubDate>Wed, 24 Apr 2024 13:46:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>The-Council-of-Fashion-Designers-of-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc7c2e213e46424790492fac2782d2399d9534a6ced29e6913094d4604f51686</i><br /><br />Threat actor <b>description</b>: <i>The Council of Fashion Designers of America, Inc, (CFDA) is a not-for-profit trade association founded in 1962 that leads industry-wide initiatives and whose membership consists of more than 400 of America’s foremost womenswear, menswear, jewelry, and accessory designers. The Council of Fashion Designers of America corporate office is located in 1350 Avenue of the Americas Fl 2, New York City, New York, 10019, United States and has 120 employees. The total amount of data leakage is 423.3 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpsgoftac.com----firsttx.com--First-Texas-Alliance-Corp---FTAC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14973</link>
<guid>5ca1b0a18c411c3ebfc35c9dad7da921</guid>
<pubDate>Wed, 24 Apr 2024 10:34:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>mydata</b> claims attack for <b>httpsgoftac.com----firsttx.com--First-Texas-Alliance-Corp---FTAC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>523d141fcdc04a7c5419b80a6d5c52f754a16353b66e1d01bb736eba6ac4cf2b</i><br /><br />Threat actor <b>description</b>: <i>https://goftac.com/    firsttx.com  First Texas Alliance Corp   (FTAC)Providing advisory services to business owners, professionals, and high-net-worth individuals. zackh@firsttx.com   Zack HooperChuck Marler  Financial Planning Client   cmarler@ssgsta.comstole data:doc/xls/t...Read more ⇒</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>mydata</category>
</item>
<item xmlns:dc='ns:1'>
<title>CORIENT-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14996</link>
<guid>cc535d6609c5a9ed0fec0f30ba78b7fd</guid>
<pubDate>Wed, 24 Apr 2024 10:23:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>CORIENT-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8d637653a119aeb6b6f8bea3c9b6fd5ffe9ccff65c74bfc10e155bfe25ab2913</i><br /><br />Threat actor <b>description</b>: <i>Visits: 74 Data Size: 30GB Published: False</i><br />Target victim <b>website</b>: <i>rhbco.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>CYNC-SOLUTIONS---The-unexpected-target.Updated</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14972</link>
<guid>7d5a3c270200daf0475c1f217910f982</guid>
<pubDate>Wed, 24 Apr 2024 03:13:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>CYNC-SOLUTIONS---The-unexpected-target.Updated</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>652859f8a3ecca1e67ffba0fe18d95cd586fc15f4c2c0473cc5432466e8705cd</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hirsh-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14971</link>
<guid>54c024de9e64af8a959229d3d49b4198</guid>
<pubDate>Wed, 24 Apr 2024 01:40:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Hirsh-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b218d9b0a381df378aad569172a6e38827907258739b9440948eb1c4c8319b8</i><br /><br />Threat actor <b>description</b>: <i>Hirsh Industries has operated continuously since 1924, when it began as the W.P. Johnson Company which specialized in metal fabrication.  In 1989 the company changed its name to SteelWorks and continued to grow as the leader in filing products. In 1999 the company took on the name Hirsh Industries as the primary product lines expanded to include commercial grade filing and  shelving items, along with a broader assortment of small and home office file cabinets.</i><br />Target victim <b>website</b>: <i>https://www.hirshindustries.com/</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>defi-SOLUTIONS.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14967</link>
<guid>1ee8c137bb71a4bec258c2faf3cd31a7</guid>
<pubDate>Tue, 23 Apr 2024 14:56:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>defi-SOLUTIONS.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>234d3b7c38697ccc3b50d94eb0476230be24e0ec7fb27dd234eebd03de2d2fab</i><br /><br />Threat actor <b>description</b>: <i>defi SOLUTIONS is a company that develops SaaS based loan origination software solutions. It also provides a platform that enables transferring and receiving loan documents and a web-based auto loan portfolio marketplace. The company serves consumer finance companies, banks, credit unions, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>rangam.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14941</link>
<guid>2419822e9c0e9b994a1cc4b66f6c7eab</guid>
<pubDate>Tue, 23 Apr 2024 07:05:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>rangam.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5669f9517fa80d535a540865004a1ac05099db6519540b9eb4409675bb982353</i><br /><br />Threat actor <b>description</b>: <i>rangam.com 1.1Tb uncompressed data</i><br />Target victim <b>website</b>: <i>rangam.com</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Tech-Interactive</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14937</link>
<guid>129d98d6e137d64ffafd9406ea6c450d</guid>
<pubDate>Mon, 22 Apr 2024 22:59:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>The-Tech-Interactive</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c26d67b9e544a056326e024412747c36bc022f4e9aa8234121b18a056fa6e04</i><br /><br />Threat actor <b>description</b>: <i>The Tech Interactive is a science and technology museum that features hands-on activities, experimental labs, and design challenge experiences forvisitors. The museum was founded in 1983 and is located in San Jose, California.thetech.org</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Optometric-Physicians-of-Middle-Tennessee</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14935</link>
<guid>5e2020a9be8dde3fd1fdd77c4d3b9762</guid>
<pubDate>Mon, 22 Apr 2024 17:11:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Optometric-Physicians-of-Middle-Tennessee</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c9c44eafddeea17f5aa2975035ca91c7faffb66b56aa3a5f7648777fce969ea</i><br /><br />Threat actor <b>description</b>: <i>OPMT Vision Centers offers comprehensive eye care services, including vision therapy, low vision rehabilitation, and dry eye treatment.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>HARMAN---CYNC-SOLUTIONS-client</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14946</link>
<guid>15bc005c266883ec57a2fae120a349b3</guid>
<pubDate>Mon, 22 Apr 2024 16:41:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>HARMAN---CYNC-SOLUTIONS-client</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>adace6f887df27b84b3729388033557024933c9fa21384211905efc4d7be8b45</i><br /><br />Threat actor <b>description</b>: <i>Visits: 93 Data Size: 82Gb Published: False</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>coastalcargogroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14950</link>
<guid>ce2b18dcdc9e4f0e0f166ee3f5b7d8ca</guid>
<pubDate>Mon, 22 Apr 2024 16:32:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>coastalcargogroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f3656e5b0ea23692691953aa6343339eafd21e1c00363ca8ff2f640fcf4efb5a</i><br /><br />Threat actor <b>description</b>: <i>Download link #1Coastal Cargo Company, LLC is privately-owned and operated company located in New Orleans, Louisiana. With almost a century’s worth of experience in the transportation industry, we provide portside services as terminal operators and stevedores, specializing in the handling of metals, plywood, alloys, ro-ro, project cargo, bulk and break-bulk cargo.Our services extend to warehouse operations and management, along with trans-loading bulk cargo onto rail. Utilizing our highly experienced workforce, what sets Coastal Cargo apart isn’t just the unmatched breadth and depth of services to our clients, it is the quality work we provide every day.Website: https://www.coastalcargogroup.com/Revenue : $36.6MAddress: 3500 Terminal Drive New Orleans, LA, 70115, USAPhone Number: 504-587-1100Download link #1: https://***************.onion/JKGROUP/fullMirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/JKGROUP/full</i><br />Target victim <b>website</b>: <i>coastalcargogroup.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Texas-Retina-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14934</link>
<guid>3041b624a29b78cd03e5dda98f917661</guid>
<pubDate>Mon, 22 Apr 2024 15:03:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Texas-Retina-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9d69c979970ad5ee37defce6cbb6d2d3e72621030695d9ce4e6463a94e7dd550</i><br /><br />Threat actor <b>description</b>: <i>Texas Retina Associates, with 13 offices throughout the state and 17 physicians, is Texas' largest retina clinic group.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Damico--Pettinicchi-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14956</link>
<guid>e77db99f963f25326605bcf75f3eb130</guid>
<pubDate>Mon, 22 Apr 2024 12:22:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Damico--Pettinicchi-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f2220e56dcdffda80edbf1097505cb9cd4010788ecd3f37e0606aec561f6f5e</i><br /><br />Threat actor <b>description</b>: <i>The law firm of D'Amico, Griffin and Pettinicchi, LLC, is located in Watertown, Connecticut, and helps people in personal injury, medical malpractice, nursing home abuse, and family law.</i><br />Target victim <b>website</b>: <i>https://damicopettinicchi.com/</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ted-Brown-Music</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14962</link>
<guid>e74c628e8a9447441934d999bfc2474d</guid>
<pubDate>Sun, 21 Apr 2024 20:32:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Ted-Brown-Music</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c147d43f19b20ef3868b2272180017c5bce221107dce16bc053e073b0b11c7be</i><br /><br />Threat actor <b>description</b>: <i>Ted Brown Music is a family-owned full-service music store established in 1931. Ted Brown Music corporate office is located in 6228 Tacoma Mall Blvd, Tacoma, Washington, 98409, United States and has 95 employees. The total amount of data leakage is 29.4 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>mulfordconstruction.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14963</link>
<guid>607f706d7e242fd9044d5639d900591a</guid>
<pubDate>Sun, 21 Apr 2024 16:41:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>embargo</b> claims attack for <b>mulfordconstruction.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2d953416d9514e5907aeab3ff13769bb65f9638c0d9effbddedaacaa798fab69</i><br /><br />Threat actor <b>description</b>: <i>Heavy Civil Contracting, Earthwork and Utilities - 2 TB data will be disclosed soon</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>embargo</category>
</item>
<item xmlns:dc='ns:1'>
<title>taylorlaw.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14964</link>
<guid>8c741dbd9a7fa61e5da7d2d2b54d7b51</guid>
<pubDate>Sun, 21 Apr 2024 16:05:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>taylorlaw.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>94ab07ca4717c53d12abd7699f9d5bedfadacef4439cc2017313f46c9bb70e50</i><br /><br />Threat actor <b>description</b>: <i>Taylor Law Offices, P.C. was established in 1980 as a general practice law firm and is located in Effingham, Illinois. We have seven attorneys with more than ninety years experience providing legal services to individuals and business clients through...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>NORTHEAST-OHIO-NEIGHBORHOOD-HEALTH-SERVICES-NEON-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14407</link>
<guid>76379ed89eafe43c8f6bd64fd09e3852</guid>
<pubDate>Sat, 20 Apr 2024 18:23:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>NORTHEAST-OHIO-NEIGHBORHOOD-HEALTH-SERVICES-NEON-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c2a821735b587dcc8ee2df6dfd55880d3747e808baa0a81c144c475a0b6387f4</i><br /><br />Threat actor <b>description</b>: <i>NORTHEAST OHIO NEIGHBORHOOD HEALTH SERVICES (NEON, founded 1967) is a Federally Qualified Health Center (FQHC) network of community health centers dedicated to improving access to health care. Neon Health Services corporate office is located in 8300 Hough Ave Ste 308, Cleveland, Ohio, 44103, United States and has 138 employees. The total amount of data leakage is 50.96 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Continuing-Healthcare-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14406</link>
<guid>793aaa24e931c05d077f434e33485574</guid>
<pubDate>Sat, 20 Apr 2024 13:13:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Continuing-Healthcare-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25618c3861aee61d4a90fbbcb45bb3db5587428084ab3931e8251347226cfb8f</i><br /><br />Threat actor <b>description</b>: <i>The mission of Continuing Healthcare Solutions is to provide our residents with exceptional care and treat them with the highest levels of dignity and respect. This demands a commitment to building...</i><br />Target victim <b>website</b>: <i>continuinghc.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lutheran-Social-Services-of-Indiana</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14405</link>
<guid>630d790d0716246ca1aa250a6f86f755</guid>
<pubDate>Sat, 20 Apr 2024 09:03:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Lutheran-Social-Services-of-Indiana</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45de0d6fbdf17c1a57ea10196efeb7f7d6ddf8eebab135db386dd96dfeabf442</i><br /><br />Threat actor <b>description</b>: <i>As an organization accredited by the Council on Accreditation, Lutheran Social Services of Indiana adheres to the highest standard of best practices while providing quality services to those we...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>tascoplumbing.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14401</link>
<guid>e6d55909288334ee7ca5c2405235661c</guid>
<pubDate>Fri, 19 Apr 2024 20:56:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>tascoplumbing.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>86885c6fab8fc8475f0c7dd65816515697268fdb2c5107bf4cdae4496054acdb</i><br /><br />Threat actor <b>description</b>: <i>TASCO Plumbing & Mechanical Corp is a company that operates in the Construction industry. It employs 51-100 people and has $10M-$25M of revenue. The company is headquartered in Hialeah, Florida.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>azdel.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14367</link>
<guid>8072f405471d085d0f9fec9e49f6790c</guid>
<pubDate>Fri, 19 Apr 2024 12:27:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>azdel.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a205724b9050a3cf581fc7ce44463f67e3d557d67e8e6efaca22f2399bfdf5a8</i><br /><br />Threat actor <b>description</b>: <i>Hanwha continues to grow by quickly anticipating and responding to rapidly changing business environments with a balanced business portfolio that includes aerospace, energy & materials, finance and retail & services. As of 2022, we are the seventh largest business enterprise in South Korea and a Fortune Global 500 company. Our affiliates are becoming global leaders in their arenas by strengthening core competitiveness and securing future growth engines based on sound financial structures. For more than 70 years, Hanwha has led economic growth and helped change the world with ceaseless innovation. Now, we are building on our achievements in business areas including aerospace, energy & materials, finance and retail & services. Going forward, we will continue to embrace bold challenges that offer people more prosperous lives, more secure communities and a more sustainable future for the planet.SITE: www.azdel.com Address : Technology Center and Executive Offices 2000 Enterprise Drive Forest, VA 24551 USAALL DATA SIZE: ~ 1 Tb 1. Company data 2. Contracts and agreements 3. Projects, Drawings (.dwg) & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Targus.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14400</link>
<guid>f827b5406c7aa5b4fe10062ae06a137b</guid>
<pubDate>Fri, 19 Apr 2024 11:27:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>redransomware</b> claims attack for <b>Targus.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c868e1c56dcdf9ec4a18e4561a053ce881969c97ce3959ddaf8e72afccddb036</i><br /><br />Threat actor <b>description</b>: <i>Computer Equipment & Peripherals</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>redransomware</category>
</item>
<item xmlns:dc='ns:1'>
<title>call4health.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14366</link>
<guid>c310d9645160ce5cc084d231d24d20e5</guid>
<pubDate>Fri, 19 Apr 2024 08:57:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>call4health.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45d67c6eaaa93d2bf224572585c66ea15fd92fce38ac324767e841f4c5a5da61</i><br /><br />Threat actor <b>description</b>: <i>Our medical answering service solution was the first program offered by Call 4 Health. With over 20 years of experience, we understand the importance of a well-designed answering service solution and can customize it to match your needs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hey-cisco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14922</link>
<guid>3895c46ab7fd528108dc9da3d3745f88</guid>
<pubDate>Fri, 19 Apr 2024 08:12:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>gookie</b> claims attack for <b>Hey-cisco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d0bbc8c561a32930fdd73cf42d91c8548da9981036bc3ab8629ddfce74b1a6f</i><br /><br />Threat actor <b>description</b>: <i>You lied to us and play for time to kick us out.

We will meet you soon, again. Next time you'll have no chance.

cisco.com\Administrator:500:aad3b435b51404eeaad3b435b51404ee:4e0de2e548880cd48c588f1391fa6386:::
cisco.com\carriep:12342831:aad3b435b5140...</i><br />Target victim <b>website</b>: <i>cisco.com</i>]]></description>
<category>gookie</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mid-South-Health-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14365</link>
<guid>bcbf5e0ae48ef7e5439863381d1a69bf</guid>
<pubDate>Fri, 19 Apr 2024 07:54:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Mid-South-Health-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60b943921e80188e7529384e72751e6e0a11a289370e3f9689e6f36593992a39</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://arisahealth.org/</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pennsylvania-Convention-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14363</link>
<guid>785cf0a5def4977e0210f07e0f925fa1</guid>
<pubDate>Fri, 19 Apr 2024 05:54:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Pennsylvania-Convention-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d115ef98362f266bbefaf62528e1d5db74501487cd4978b448cff53ab45fd4c6</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.paconvention.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>P--</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14362</link>
<guid>e5815151957be36ad2085b7a1a02c5cc</guid>
<pubDate>Fri, 19 Apr 2024 04:53:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>P--</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eadaafe5eba9c0c7938491517529b71e72ce1763466b92b476fcc8e2c3f53021</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.p??????????????.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Engineered-Automation-of-Maine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14361</link>
<guid>0e2cb039638d9ab503d33105ed343d7e</guid>
<pubDate>Fri, 19 Apr 2024 03:53:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Engineered-Automation-of-Maine</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>20db474ed0fc1a36744c16ecf50880c67ce196655710ff4fc099424b5348b9c0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.eaminc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>JE-Owens</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14358</link>
<guid>5dc624e80d9ab94e3229ec29f675c19d</guid>
<pubDate>Thu, 18 Apr 2024 23:59:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>JE-Owens</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dda5b98cd174e8ad60db70231cc6683a5e78fbc362db7ee04012f09892531c2b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.jeowens.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>JE-Owens-and-Company-PA.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14355</link>
<guid>61d584107d2d965b4bc26d8c9958b518</guid>
<pubDate>Thu, 18 Apr 2024 18:56:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>JE-Owens-and-Company-PA.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91c0f17fad926a322390b78506dc40dcab256cee9755e074da8ce42363785566</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Western-Saw-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14353</link>
<guid>54d0ad877584296abb129e2e4f60ee67</guid>
<pubDate>Thu, 18 Apr 2024 16:59:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Western-Saw-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9df24e39767732442673eefdf64cfee80761995dbc98ddda2b2a410e60ea4e49</i><br /><br />Threat actor <b>description</b>: <i>Western Saw Inc. proudly designing and manufacturing Diamond Cores, Carbide Plate, Diamond Core Bit Tubes, and Custom Laser Cutting Services for over 80 years in the USA. We are a Diamond Core leader in quality and customer service.</i><br />Target victim <b>website</b>: <i>http://westernsaw.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>sagaciousresearch.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14351</link>
<guid>ccd44234c58cba8173f8ae706a0fce24</guid>
<pubDate>Thu, 18 Apr 2024 13:58:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>sagaciousresearch.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25d4a3dc0477b197eed68b48fe347cffab98d275a6e86dbe8dcd230ff7ac302d</i><br /><br />Threat actor <b>description</b>: <i>Sagacious IP is one of the largest IP solutions providers globally, helping organizations monetize, defend, and expand their IP portfolios. Sagacious IP has been helping participants in the IP ecosystem through innovative solutions and services since...</i><br />Target victim <b>website</b>: <i>sagaciousresearch.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>ablinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14350</link>
<guid>effbafd134873f47f49c740581fb1854</guid>
<pubDate>Thu, 18 Apr 2024 13:06:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ablinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8335a5a940ac75e57cbbc3a9f5ff6d0d33b92028787f906149d2214046f335b4</i><br /><br />Threat actor <b>description</b>: <i>ABL, Inc. is a CDMO and CRO providing GMP manufacturing and immunology solutions for gene therapies, oncolytics, vaccines and other immunotherapeutics. We specialize in immuno-oncology, infectious diseases, neurological diseases and chronic diseases....</i><br />Target victim <b>website</b>: <i>ablinc.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>doyon.com--doyondrilling.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14345</link>
<guid>96fe1255e032940e2739e06072855b95</guid>
<pubDate>Thu, 18 Apr 2024 00:32:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>doyon.com--doyondrilling.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6e49b164bc44d1d1d2011735370189ec6c652bc7f832d5a06b55fa313bb9268</i><br /><br />Threat actor <b>description</b>: <i>Doyon, Limited, the regional Alaska Native corporation for Interior Alaska, is a for-profit corporation with more than 20,500 shareholders. Headquartered in Fairbanks, Alaska, Doyon employs over 800 individuals in Alaska and across the nation. Doyon operates a diverse family of companies in the areas of oil field services, government contracting utilities, construction, information technology, natural resources development, tourism, and real estate.SITE: www.doyon.com Address : 1 Doyon Place, Suite 300 Fairbanks, Alaska 99701-2941Doyon Drilling Inc. (DDI) operates on the North Slope of Alaska with nine of the most unique oil and gas land drilling rigs specially designed to drill oil wells in extreme conditions. In 1982 as a joint venture between Doyon, Limited, an Alaska Native regional corporation, and Nugget Alaska, Inc.SITE: www.doyondrilling.com Address : Doyon Drilling, Inc. Address. 11500 Sukdu Way Ste 200. Anchorage, Alaska 99515ALL DATA SIZE: ~700gb+ 1. Corporate data(Accountings, HR and etc.) 2. Employees personal infos 3. Scans, Confidential, users & etc…</i><br />Target victim <b>website</b>: <i>doyondrilling.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Delano-Joint-Union-High-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14340</link>
<guid>d99fa3a9dd5df426e62b19597322920a</guid>
<pubDate>Wed, 17 Apr 2024 17:51:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Delano-Joint-Union-High-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>115caf97a7940b4205f0334e56deb5b17654d035419bea1c0dbcb6d4564eeb2c</i><br /><br />Threat actor <b>description</b>: <i>The Delano Joint Union High School District is a District of rich tradition, high expectations, and a century of outstanding achievement.  Delano High School began in 1911 with fourteen students and...</i><br />Target victim <b>website</b>: <i>https://www.djuhsd.org/</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Serfilco-RP-Adams-Baron-Blakeslee-Pacer-Service-Filtration-of-Canada-Polymar.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14341</link>
<guid>787e8665307884350308429f4fc60451</guid>
<pubDate>Wed, 17 Apr 2024 17:49:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Serfilco-RP-Adams-Baron-Blakeslee-Pacer-Service-Filtration-of-Canada-Polymar.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9bba31296605181d3ddcade8506da92f4c1e3cb10df7dad90cb02486deeee25f</i><br /><br />Threat actor <b>description</b>: <i>Recently we've obtained data of a group of industrial manufacturers and here they are: Serfilco, RP Adams, Baron Blakeslee, Pacer,Service Filtration of Canada, Polymar. Accounting and financial data, agreements, contracts, employees and partners personal dataand other business internal data.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>craigwire.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14337</link>
<guid>a4546d484e137a6c92e317daae0e7131</guid>
<pubDate>Wed, 17 Apr 2024 14:58:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>craigwire.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7c84296f223431a6c14b3dab0b5cbf1af0ec2f6c6358e74e6da6e8d5e6333c8</i><br /><br />Threat actor <b>description</b>: <i>Craig Wire ProductsCraig Wire Products was founded on December 7, 2007. The company was founded with the express purpose of providing the electrical industry with a reliable and consistent source of emergency and short run magnet wire.Craig W...</i><br />Target victim <b>website</b>: <i>https://craigwire.com/</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>tristatetruckandequip.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14338</link>
<guid>e875a3ad4f52e44482240713d709930e</guid>
<pubDate>Wed, 17 Apr 2024 14:56:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>tristatetruckandequip.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7111f323ce0743f9825947cb254b8cf573e9c3b18202a38441246c96fc64542</i><br /><br />Threat actor <b>description</b>: <i>Very private data was stolen.Tri-State Truck & EquipmentTri-State Truck and Equipment, Inc. has aligned itself with a small but premium group of manufacturers in order to better serve its customer base with quality products, competitive servi...</i><br />Target victim <b>website</b>: <i>tristatetruckandequip.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lee-University-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14334</link>
<guid>b083c8db8880429bba105c048a7ea1b6</guid>
<pubDate>Wed, 17 Apr 2024 14:37:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Lee-University-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19f406d38489b4d7caae738a8020968bceed11b1eac710692c65d3571c0459cf</i><br /><br />Threat actor <b>description</b>: <i>Lee University is a private, comprehensive university that was founded in 1918 in Cleveland, Tennessee. The number of students enrolled is more than 4,000 people. Lee University corporate office is located in 1120 N Ocoee St, Cleveland, Tennessee, 37311, United States and has 1,223 employees. The total amount of data leakage is 387.49 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>TrueNet-Communications-Corp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14335</link>
<guid>4c4f120e57ea9448ccb7a07c48df40ff</guid>
<pubDate>Wed, 17 Apr 2024 14:34:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ciphbit</b> claims attack for <b>TrueNet-Communications-Corp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f29360d72b39aea252961423ede3b05e300d0fe23179cb8c21514c64d80fe7db</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://truenetcommunications.com</i>]]></description>
<category>ciphbit</category>
</item>
<item xmlns:dc='ns:1'>
<title>drmarbys.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14336</link>
<guid>319e33a217f7368ff7ceef7731ccf024</guid>
<pubDate>Wed, 17 Apr 2024 14:33:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>drmarbys.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>11bc53e0fd6cce750bca6244c35a013c4f2677bc59ee64f41a26f9e961e57fc5</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/DRM/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/DRM/PROOF/DATA DESCRIPTIONS: Accounting\payroll documents, Personal Identifying information, HR documents, contracts, corporate correspondence, employees and executive managers personal folders, etc. </i><br />Target victim <b>website</b>: <i>drmarbys.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pioneer-Oil-Company-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14326</link>
<guid>18d3284f148b6cb726b412b7059223ff</guid>
<pubDate>Tue, 16 Apr 2024 22:59:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Pioneer-Oil-Company-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ceb386532b17087a46a983cd881f1f2113bc51633329c85f652d52f4694bcb8</i><br /><br />Threat actor <b>description</b>: <i>Today, Pioneer Oil Company, Inc. operates in Illinois, Indiana, Kentucky and Kansas. Pioneer Oil Company, Inc., is respected by both the industry and the government regulatory agencies as one of the leading independent operators in the Illinois Basin..</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wright-Brothers-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14320</link>
<guid>33edf41c0becd0d57c35c4e27276617b</guid>
<pubDate>Tue, 16 Apr 2024 17:48:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Wright-Brothers-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>770addd60cc7e0e7dff75a0eae933745204dff37c576bc5be9443e450662f91e</i><br /><br />Threat actor <b>description</b>: <i>Wright Brothers Construction services include grading, site development, highway and bridge construction, landfill construction, asphalt production and paving, aggregate processing, commercial concrete services, and industrial maintenance services. As this company doesn't care about the data we've taken from them, we will share it with those who do. 12GB of data will be uploaded here. A lot of financial data, accounting, insurance, employees files.</i><br />Target victim <b>website</b>: <i>wbcci.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lotz-Trucking</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14316</link>
<guid>cd2018beeece5fb0a71a96308e567bde</guid>
<pubDate>Tue, 16 Apr 2024 15:43:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Lotz-Trucking</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ea8bcdcc2452bd1b89bc9e2d9d331427cb61efd92cf20e56a860a6f792300bf</i><br /><br />Threat actor <b>description</b>: <i>Lotz Trucking specializes in the bulk business and offer a wide range of services with flatbeds, vans, hopper bottom and dump trailers. We are going to make available their files of ~15GB size. Lotz of confidential agreements, NDAs, employees personal information.</i><br />Target victim <b>website</b>: <i>lotztrucking.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>hbmolding.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14315</link>
<guid>1aaa7438a59157a0f21ad30dda4d4088</guid>
<pubDate>Tue, 16 Apr 2024 15:04:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hbmolding.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f0ff22ecec249bb7e9a3a6a7cde928f18687be56c1c68e7b32b2d158ed2a776</i><br /><br />Threat actor <b>description</b>: <i>HB Molding was founded in 1998 and originally located in the south side of Louisville. Due to our ability to quickly react to customer demands and opportunities we have grown to a 35-injection molding press operation housed in 63,000 sq.ft. of pr...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-St.-Cloud-Florida</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14314</link>
<guid>8a6cb96eabdd2be1fe1e8bf4043d385f</guid>
<pubDate>Tue, 16 Apr 2024 13:55:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>City-of-St.-Cloud-Florida</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6bfa5b4c5c6c7f1b456a08f0d162e80a70639bebaab76faf068e19cf4c6eaa04</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.stcloudfl.gov</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Thermodyn-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14311</link>
<guid>bfe6c14c945256de12a6add92c83b4d9</guid>
<pubDate>Tue, 16 Apr 2024 09:52:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Thermodyn-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9312c1790ce2d6991b6edcb7051beedc621e4dad90b1cf749fd7ad2be833d3a2</i><br /><br />Threat actor <b>description</b>: <i>Thermodyn Corporation (founded 1979) is a coated fabrics and expansion joint manufacturing. Thermodyn specializes in Viton Fluoroelastomer based technologies for gasket fabrication, expansion joints, Fluorodyn caulk & adhesives, and various elastomeric coated substrates. Thermodyn corporate office is located in 3550 Silica Rd, Sylvania, Ohio, 43560, United States and has 22 employees. The total amount of data leakage is 16.70 GB</i><br />Target victim <b>website</b>: <i>https://thermodyn.com/</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>UnivationTechnologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14304</link>
<guid>9c9744d143d2abbe041317b7b76f8e85</guid>
<pubDate>Tue, 16 Apr 2024 03:29:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>raworld</b> claims attack for <b>UnivationTechnologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>106bb1dff2cc82464a806caf1c0898a236989cfaaebeac64525ea2ebd5494a0e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.univation.com/</i>]]></description>
<category>raworld</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cembell-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14303</link>
<guid>ff12b08dbcd163de643a3f597b14c6e4</guid>
<pubDate>Tue, 16 Apr 2024 01:22:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Cembell-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f5182789f8f4d03801f7b2a04c161cedf536f80465657b65d1b3eae3d7bb2c1</i><br /><br />Threat actor <b>description</b>: <i>For over 40 years, Cembell Industries has been fabricating & repairing high quality pressure vessels and heat exchangers for the petrochemical and refining industries. Cembell is a family owned business that was established in 1980 to service            ...</i><br />Target victim <b>website</b>: <i>Company url</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Heritage-Cooperative</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14302</link>
<guid>65be44ae7088566069cc3bef454174a7</guid>
<pubDate>Mon, 15 Apr 2024 23:21:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Heritage-Cooperative</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a823ac78522572c0404f899386909b7b6571ab80fb93aef0f59dc117de91f32a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.heritagecooperative.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Druckman-Law-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14298</link>
<guid>56de534cf589f6d0ca09630db803ba00</guid>
<pubDate>Mon, 15 Apr 2024 21:24:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Druckman-Law-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>428ea1cd5d3ba019111e00dd17817dfcf4072f461584e699d8ef7f030ebe85cc</i><br /><br />Threat actor <b>description</b>: <i>Druckman Law Group PLLC is a law firm in Westbury, New York, that provides real estate transactions and litigation. We provide our services to the state of New York, representing lenders and mortgage...</i><br />Target victim <b>website</b>: <i>https://dlgnylaw.com/</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pulaski-academy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14299</link>
<guid>59c3a5e4aab2b411b56805200085e4c2</guid>
<pubDate>Mon, 15 Apr 2024 21:24:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Pulaski-academy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e4518c5264bc16d956d2a7203b3f4554505ad734d6051f4cc66da4ee9729d4ea</i><br /><br />Threat actor <b>description</b>: <i>Pulaski Academy offers a unique and distinctive college preparatory educational experience. Whether you are just beginning to research the options for your child's education, are looking for a new...</i><br />Target victim <b>website</b>: <i>https://www.pulaskiacademy.org/</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fullington-Trailways</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14301</link>
<guid>901e70da072bc616caa6337421abe4ae</guid>
<pubDate>Mon, 15 Apr 2024 21:22:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Fullington-Trailways</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cfdd48e8053743028f5a4c2ab49d6b5598a6f7e8cba09db24a4f0b1765c3976c</i><br /><br />Threat actor <b>description</b>: <i>Fullington Auto Bus Co. Inc. provides transportation services. It offers intercity scheduled line run services from central Pennsylvania to destinations in Pittsburgh, Harrisburg, and Wilkes-Barre, Pennsylvania; and Buffalo, New York. The company also provides round trip transportation, limousines, VIP cruises, and school bus contracting services, as well as gift cards. Fullington Auto Bus Co. Inc. was founded in 1908 and is based in Clearfield, Pennsylvania. As of September, 2009, Fullington Auto Bus Co. Inc. operates as a subsidiary of RATP Développement.</i><br />Target victim <b>website</b>: <i>fullingtontours.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>bigtoe.yoga</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14296</link>
<guid>dc5631bb775757e5ae1e430034ad1a21</guid>
<pubDate>Mon, 15 Apr 2024 19:20:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>darkvault</b> claims attack for <b>bigtoe.yoga</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4230213a9828734ad9f0b2f1fe48ee70e37f4c59ad76c82a01381f41b2e1fba0</i><br /><br />Threat actor <b>description</b>: <i>Book an in-home Massage or Private Yoga appointment with a provider in seconds! Bigtoe is the easiest way to book mobile massage appointments with a 5-start massage therapist.</i><br />Target victim <b>website</b>: <i>bigtoe.yoga</i>]]></description>
<category>darkvault</category>
</item>
<item xmlns:dc='ns:1'>
<title>regulatormarine.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14297</link>
<guid>32f57c0fa63af22a58598d1e0583ece9</guid>
<pubDate>Mon, 15 Apr 2024 19:18:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>regulatormarine.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a84cafc847e60a17f7024b3a651a13ac12f77c5a5fb569a2dfc6e8c6f4b236f1</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/BOATS/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/BOATS/PROOF/DATA DESCRIPTIONS: Thousands of engineering documents and drawings, administrative docs, corporate correspondence, employees and executive managers personal data, Personal Identifying information, database backups\exports, etc </i><br />Target victim <b>website</b>: <i>regulatormarine.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Deacon-Jones</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14283</link>
<guid>8db66f2fc805310b86589bd1aeaa2cd7</guid>
<pubDate>Mon, 15 Apr 2024 13:28:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Deacon-Jones</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25c2677a0e7a4ea5ee16de8c32910c1f1777a49d945508a8ebff538f4ecfea36</i><br /><br />Threat actor <b>description</b>: <i>Our financing team is filled with knowledgeable professionals experienced in processing auto loans and leases. Each time one of our loyal customersis ready to begin their financing journey at Deacon Jones, they can count on finding a loan or lease option that works with their lifestyle and needs. Looking to put the car of your dreams in your driveway, on your terms? Fill out your finance application at Deacon Jones today!</i><br />Target victim <b>website</b>: <i>www.speakindeacon.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Biggs-Cardosa-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14284</link>
<guid>0573589c2b18bae3fa72e2082e7fb2ae</guid>
<pubDate>Mon, 15 Apr 2024 13:27:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Biggs-Cardosa-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9cd6384a8ab5d01c4a674111e92b9896d710f440b2c33451546f239516425f6e</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1986, Biggs Cardosa Associates is a California structural engineering firm that provides design</i><br />Target victim <b>website</b>: <i>http://www.biggscardosa.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Post-and-Courier</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14285</link>
<guid>65a2e5f265ac3d8ee8e39ff5d2bb3f96</guid>
<pubDate>Mon, 15 Apr 2024 13:27:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>The-Post-and-Courier</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>001e6a90324676bc65fa884d9fb02c9cb476aed41305b91fe669b01e1bd5a71c</i><br /><br />Threat actor <b>description</b>: <i>The Post and Courier is the main daily newspaper in Charleston, South Carolina. It traces its ancestry to three newspapers, the Charleston Courier, founded in 1803, the Charleston Daily News, founded 1865, and The Evening Post, founded 1894. Through the Courier, it brands itself as the oldest daily newspaper in the South and one of the oldest continuously operating newspapers in the United States. It is the flagship newspaper of Evening Post Industries, which in turn is owned by the Manigault family of Charleston, descendants of Peter Manigault and Mr. Pierre Manigault himself as a president for a group of companies.</i><br />Target victim <b>website</b>: <i>https://www.postandcourier.com/</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Best-Reward-Federal-Credit-Union</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14286</link>
<guid>5a87c42972dfb55ff9cdb144a3ba5cc3</guid>
<pubDate>Mon, 15 Apr 2024 13:26:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Best-Reward-Federal-Credit-Union</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e4c369e1b6c87e9adedeeea8c650a9058ce711a16d7143bf74f63eb5e70d773</i><br /><br />Threat actor <b>description</b>: <i>Best Reward Federal Credit Union offers low-rate loans, deposit accounts, VISA cards and mobile services. Lots of financial documents, personal information including thousands of members names, SSNs, addresses, emails, phones. We are going to share everything soon.</i><br />Target victim <b>website</b>: <i>www.bestrewardfcu.coop</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>R.B.-Woodcraft-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14288</link>
<guid>c9bd2d5f2fb6cea41198dc6a2f817331</guid>
<pubDate>Mon, 15 Apr 2024 13:24:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>R.B.-Woodcraft-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8944c33e914f01c2034cfced0d620a57ccf8da411d41926b0e9bb44c69dcac58</i><br /><br />Threat actor <b>description</b>: <i>R.B. Woodcraft is a National Leader in Architectural Woodwork capable of identifying, producing and installing the full scope of your millwork package.rbwoodcraft.com</i><br />Target victim <b>website</b>: <i>www.rbwoodcraft.com</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>ASMFC-Atlantic-States-Marine-Fisheries-Commission</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14291</link>
<guid>95a5a82212ea714ba2923f1bb3f1ffa1</guid>
<pubDate>Mon, 15 Apr 2024 13:22:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>ASMFC-Atlantic-States-Marine-Fisheries-Commission</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6d83381bd4caff0d4b31bab2add78ae87d98bf1cc83fd447e5ba00e7d7e803ba</i><br /><br />Threat actor <b>description</b>: <i>The Commission is committed to ensuring the sustainability of Atlantic Coast fishery resources. Healthy and vibrant resources mean more jobs and more opportunities for those who live along the coast.asmfc.org</i><br />Target victim <b>website</b>: <i>https://www.asmfc.org/</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Souza-Agency-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14292</link>
<guid>8d060abe1e38ab179742bd3af495f407</guid>
<pubDate>Mon, 15 Apr 2024 13:21:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>The-Souza-Agency-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c56b669e37f533245ee005098c07eb19588d2a3b6c0d98b0facdf21e688b0db9</i><br /><br />Threat actor <b>description</b>: <i>Annapolis Maryland strategic spirit advertising, marketing, social media, websitessouza.com</i><br />Target victim <b>website</b>: <i>https://www.souza.com/</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Council-for-Relationships</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14294</link>
<guid>5165bb7092845d883f5d8fd52d1f32b5</guid>
<pubDate>Mon, 15 Apr 2024 13:20:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Council-for-Relationships</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4aac446ea70e9f3c59c692635470768b9d71282b876d7a103d8810709a62f06c</i><br /><br />Threat actor <b>description</b>: <i>At Council for Relationships, they help people from all walks of life improve their important relationships by providing exemplary therapy, educating and training clinicians in the family systems approach, and advancing the behavioral health field through research.councilforrelationships.org</i><br />Target victim <b>website</b>: <i>https://councilforrelationships.org/</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sev.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14277</link>
<guid>ccf4769973f7658ac976a063527c4292</guid>
<pubDate>Sun, 14 Apr 2024 16:28:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Sev.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5600d56efae06175990b3682fc97f719a815efb5c3fbfa0a30b24f3fd744f08a</i><br /><br />Threat actor <b>description</b>: <i>Country: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jack-Doheny-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14276</link>
<guid>6770b3cd18521ccaea7cac4b42b2ee5f</guid>
<pubDate>Sun, 14 Apr 2024 14:52:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Jack-Doheny-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b69c9a8e8b338c311fa8eb30da1632dbaf68dbf68137833ae5757c82551b6d91</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.dohenycompany.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Traverse-City-Area-Public-Schools-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14275</link>
<guid>8ab9121c7dcd00525d3f8de4200173bd</guid>
<pubDate>Sun, 14 Apr 2024 13:08:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Traverse-City-Area-Public-Schools-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad7ffe2506553a9f927207fa04000136ac19ac62e953a4e66495433c41508c29</i><br /><br />Threat actor <b>description</b>: <i>Traverse City Area Public Schools is a public school district based in Traverse City, Michigan, United States. This district includes 10 elementary schools, 2 middle schools, 2 high schools, 1 alternative high school, and 1 Montessori school. The district serves 8,908 students. Traverse City Area Public Schools school district office is located in 412 Webster St Rm C, Traverse City, Michigan, 49686, United States and has 932 employees.  The total amount of data leakage is 1.2 TB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Omni-Hotels--Resorts--US</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14274</link>
<guid>84ccfcce45fdda705091a9de5392462e</guid>
<pubDate>Sun, 14 Apr 2024 11:59:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>daixin</b> claims attack for <b>Omni-Hotels--Resorts--US</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>481bb2fc6fc1206939289c90803d45c10951d291bc5af333bfc4a8b72c7f087c</i><br /><br />Threat actor <b>description</b>: <i>Omni Hotels & Resorts is an American privately held, international luxury hotel company based in Dallas, Texas. The company was founded in 1958 as Dunfey Hotels, and operates 50 properties in the United States, Canada, and formerly had a property in Mexico, totaling over 20,010 rooms and employing more than 23,000 people.</i><br />Target victim <b>website</b>: <i> https://www.omnihotels.com/</i>]]></description>
<category>daixin</category>
</item>
<item xmlns:dc='ns:1'>
<title>countryvillahealth.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14273</link>
<guid>f531dc20fde20b7adf3a73f52b71d0af</guid>
<pubDate>Sat, 13 Apr 2024 18:56:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>countryvillahealth.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>93ce3b27e640608c739c634f605a9b9f19dc3f85011a1277c064a32ae2a07326</i><br /><br />Threat actor <b>description</b>: <i>https://mega.nz/folder/Nmc3ULQa#qAl9nX0jzgnd1ixbGNggcACountry Villa Service Corp., which does business as Country Villa Health Service, owns and operates about 50 skilled nursing and assisted living centers across California, with about half loca...</i><br />Target victim <b>website</b>: <i>countryvillahealth.com</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>disb.dc.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14272</link>
<guid>8d2dbf39ab407d4f97c3bd5d37d32868</guid>
<pubDate>Sat, 13 Apr 2024 17:00:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>disb.dc.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6e69be277575540e904c83b2c6edd07bf268d687de3011f80b21e6cd427c9864</i><br /><br />Threat actor <b>description</b>: <i>From regulation and consumer protection to financial education and small business financing, DISB is committed to ensuring that DC is a fair, inclusive, and opportunity-filled city in which to live and do business. “We are much more than a regulatory...</i><br />Target victim <b>website</b>: <i>disb.dc.gov</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Solano-County-Library-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14263</link>
<guid>6759d0996526ddc8e27aa550f0b806b1</guid>
<pubDate>Sat, 13 Apr 2024 10:43:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Solano-County-Library-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2d70afeeab8319accbaa7ca87b6f6ccd025e41b187af3f8fe1e6dab4769f66e</i><br /><br />Threat actor <b>description</b>: <i>The Solano County Library is a public library system serving the cities of Dixon, Fairfield, Rio Vista, Suisun City, Vacaville and Vallejo, California. The Solano County Library was established in 1914 by the county's board of supervisors. Solano County Library corporate office is located in 601 Pintail Dr 763, Suisun City, California, 94585, United States and has 67 employees. The total amount of data leakage is 85.02 GB</i><br />Target victim <b>website</b>: <i>https://solanolibrary.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Novus-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14265</link>
<guid>8392cfa1ba851b4bf97301d6416725ac</guid>
<pubDate>Sat, 13 Apr 2024 10:43:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Novus-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c4b34aa5ab3012311f52d1b0703dc233fc85a7142109f210acc949812e5bbf26</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1991, Novus International creates animal nutrition solutions for livestock, poultry, and aquaculture. Novus International corporate office is located in 20 Research Park Dr, Saint Charles, Missouri, 63304, United States and has 871 employees. The total amount of data leakage is 151.3 GB</i><br />Target victim <b>website</b>: <i>https://www.novusint.com/</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>NanoLumens</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14269</link>
<guid>72f9b9ad8325628f232d12c539b217f2</guid>
<pubDate>Sat, 13 Apr 2024 10:35:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>NanoLumens</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>904c5d660679ff632448aba07c19cd2d11175193afc6601ce83ecc5d7882c778</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.nanolumens.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Integrated-Control</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14270</link>
<guid>60d22149eee1175d3675575416f123b1</guid>
<pubDate>Sat, 13 Apr 2024 10:34:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Integrated-Control</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c021bd2a4d71a97babb0a74b37870474d71a39762a4bed60dddced4918aa1f25</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.integratedcontrol.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Frederick-Wildman-and-Sons</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14271</link>
<guid>c0cc6fa1297977ac619657ec2eb3adac</guid>
<pubDate>Sat, 13 Apr 2024 10:33:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Frederick-Wildman-and-Sons</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d96b35931413a0c8d5b3d595a13b23b2373e10e99324aff4e847d29f054cd9ff</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>https://www.frederickwildman.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Notions-Marketing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14254</link>
<guid>c31e46a74fb556fd7b53f8f6b186d5e9</guid>
<pubDate>Fri, 12 Apr 2024 19:43:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Notions-Marketing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e180d255a88353fb0d5e03a44abd123abbe197e6d5369ad1d4390f0682c76f2</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>https://www.notionsmarketing.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jordanos-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14255</link>
<guid>5d2a9a33a8074f6dd91c0dfb22d62341</guid>
<pubDate>Fri, 12 Apr 2024 19:42:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Jordanos-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c35c05382cc3a138b6e032f01db625493ef93a7bc5fe36e7f25b7f8a2a68c478</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.jordanos.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bojangles-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14256</link>
<guid>6d751d6eda13ad8c6b07ec45305a06a8</guid>
<pubDate>Fri, 12 Apr 2024 19:41:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Bojangles-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f056beedbde948968b30471081c5b237ead2f46a13aa165a9ad162af3dbe978d</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.bojangles.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Feldstein--Stewart</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14258</link>
<guid>c379a1046f90b893557efbd459480ae5</guid>
<pubDate>Fri, 12 Apr 2024 19:38:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Feldstein--Stewart</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>94f320418d8db6989c67b47a1c7e5b91480e94498b21bc9a1757acbbe109348f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.feldsteinandstewart.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Agate-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14253</link>
<guid>81d36e0c6ae485f2a087864badfdc202</guid>
<pubDate>Fri, 12 Apr 2024 19:03:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Agate-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d819ede21802408b12c294445755ce35b3e5e026d91cff44ef292da338fc6211</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.agateconstruction.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Robeson-County-Sheriffs-Office-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14252</link>
<guid>dce30dee7d6980c287d5c2992de9b752</guid>
<pubDate>Fri, 12 Apr 2024 13:42:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>Robeson-County-Sheriffs-Office-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0620d7ac2e7ab2db68d120571d1d447509f7d2f0b79684315a7c0b385bcf0976</i><br /><br />Threat actor <b>description</b>: <i>Visits: 66 Data Size: 1.1 TB Published: False</i><br />Target victim <b>website</b>: <i>www.robesoncoso.org</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>MCP-GROUP-Commercial-Contractor-Topeka</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14251</link>
<guid>a4315d65e05d0a6ce8724fae0d6380bf</guid>
<pubDate>Fri, 12 Apr 2024 11:59:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>MCP-GROUP-Commercial-Contractor-Topeka</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e5c9ffe10b3edc949869887d68a2d7c0e0d9cce1ce5ab44465a5ada663e0820b</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1972 and headquartered in Topeka, Kansas, McPHERSON CONTRACTORS.</i><br />Target victim <b>website</b>: <i>https://themcpgroup.com/</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hernando-County</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14250</link>
<guid>fb465909b8627e4912b4a32d1030164c</guid>
<pubDate>Fri, 12 Apr 2024 05:01:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Hernando-County</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af1f57aab30ad7dcc5a80a1526fb7212ff8f0485d5ac053c493055e911e5369b</i><br /><br />Threat actor <b>description</b>: <i>Hernando County</i><br />Target victim <b>website</b>: <i>https://www.hernandocounty.us/</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>MoldTech</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14239</link>
<guid>b899ce5418c4ff13144e96c1af4d6306</guid>
<pubDate>Thu, 11 Apr 2024 20:34:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>MoldTech</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a911efee4ea65f6b80512c2c61e0870dd1a1ba91f7fbb5bf9feface8c6577615</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.moldtechrubber.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-England-Wooden-Ware</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14241</link>
<guid>7551e734ecfa518db7c1e6175abe5bfb</guid>
<pubDate>Thu, 11 Apr 2024 20:32:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>New-England-Wooden-Ware</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a400c4d5c9b8ac64ad8369e1572231d62e7304c28a629588aecd60077b3e73e6</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.newwpkg.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>LS-Networks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14238</link>
<guid>29b2cd4a11745fefecc14912d2f95dd8</guid>
<pubDate>Thu, 11 Apr 2024 19:55:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>LS-Networks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36ae13d4d5ebbbb7f2b048825a9151da9fdefdfe2ce70860d8d5da6d88f0fe12</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.lsnetworks.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Community-Alliance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14236</link>
<guid>194309a52da9de185b531cfc697cfca8</guid>
<pubDate>Thu, 11 Apr 2024 19:37:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Community-Alliance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>82205da2ac089055c6a5773edb3882f3bfae6489e8c734e267c73301126cbbd8</i><br /><br />Threat actor <b>description</b>: <i>About Community Alliance:- Community Alliance offers a full continuum of behavioral health services including psychiatric care, counseling, psycho-social rehabilitation services (for those with...</i><br />Target victim <b>website</b>: <i>https://community-alliance.org/</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Henningson--Snoxell-Ltd.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14237</link>
<guid>90949b6cfd26574a426edea70f6f3485</guid>
<pubDate>Thu, 11 Apr 2024 19:36:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Henningson--Snoxell-Ltd.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>950adf9a80391ea973f6f635abae26628c1c17e7077783bf1cb8b8046d1d681b</i><br /><br />Threat actor <b>description</b>: <i>Located in Maple Grove, Minnesota, Henningson & Snoxell has served businesses and individuals throughout the Minneapolis-St. Paul Metro area and beyond since 1981. Our suburban law firm combines...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>hawkremote.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14234</link>
<guid>e8dc153260a59d4f236cfd7439d5dfd3</guid>
<pubDate>Thu, 11 Apr 2024 19:16:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>darkvault</b> claims attack for <b>hawkremote.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8dabf4e044868c0eb59448b823d39ab0b45f612070b945f0027160751737d5a2</i><br /><br />Threat actor <b>description</b>: <i>Hawk SCADA has been installing SCADA systems in multiple industries since 1994. Our products are preferred by our customers, in part because we offer multiple modes of monitoring delivered on a secure multi-user platform.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>darkvault</category>
</item>
<item xmlns:dc='ns:1'>
<title>hirebus.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14235</link>
<guid>8425bc94a44e3d1bb3c8c026b2702c00</guid>
<pubDate>Thu, 11 Apr 2024 19:15:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>darkvault</b> claims attack for <b>hirebus.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79dff65c8079ee050650de84047d52bc7b0f7f9e02895401b0188dfb1f8cae30</i><br /><br />Threat actor <b>description</b>: <i>With HireBus, you can accurately identify the success potential of candidates fast and effectively develop your employees once hired. Using a scientifically-validated behavioral assessment powered by Behavioral Essentials and industry-specific profiling, we help you quickly assess a candidate’s fit for common roles in the home-services industry, and give you tools to understand and keep your employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>darkvault</category>
</item>
<item xmlns:dc='ns:1'>
<title>ezeldsolutions.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14225</link>
<guid>8a701b176cc140888936dad15c5d046a</guid>
<pubDate>Thu, 11 Apr 2024 19:14:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>darkvault</b> claims attack for <b>ezeldsolutions.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1b74606c5266cbdf9f5bbd847d401452fc817941497eabef8f4c7f7c39ba240</i><br /><br />Threat actor <b>description</b>: <i>In late 2017, we established EZ ELD Solutions. The initial mission of our company was to be provide the Indian Community across the country, with a reliable, simple, and driver-friend solution that complied with the ELD Mandate. We as a company had high expectations for our product, and we were overwhelmed with response received from the trucking industry.  Although we are a relatively new company, we have no shortage of ambition or enthusiasm. At our core we are a trucking company, but our recent introduction to the tech sector, has allowed us to identify several other sectors within the industry that are in need of dire improvement. We have begun developing new products that we believe will keep us at the forefront of a rapidly changing world.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>darkvault</category>
</item>
<item xmlns:dc='ns:1'>
<title>zanebenefits.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14226</link>
<guid>17e0ce48c87a8885fe8b82c21cb17ecf</guid>
<pubDate>Thu, 11 Apr 2024 19:14:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>darkvault</b> claims attack for <b>zanebenefits.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9d629a617b1f84c1384a310aa4c6b6bb869b46d0be759d2852d862faae01673</i><br /><br />Threat actor <b>description</b>: <i>Zane Benefits is a legacy HR and employee benefits platform empowering employees to buy individual health plans funded by their employer.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>darkvault</category>
</item>
<item xmlns:dc='ns:1'>
<title>taskhound.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14227</link>
<guid>a23f9327866d3bafd064964c9f0fcb6f</guid>
<pubDate>Thu, 11 Apr 2024 19:13:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>darkvault</b> claims attack for <b>taskhound.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60557d31657f044bbef76da04001227b9d87b59b8a822fa97693ecd458308bd6</i><br /><br />Threat actor <b>description</b>: <i>TaskHound is an all-inclusive, easy-to-use time tracking solution for any size business, with Unlimited Everything, for one fixed price.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>darkvault</category>
</item>
<item xmlns:dc='ns:1'>
<title>Missouri-Electric-Cooperatives</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14232</link>
<guid>0ee7e71061cf860ccf3b29c6823c7971</guid>
<pubDate>Thu, 11 Apr 2024 19:08:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Missouri-Electric-Cooperatives</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a227d65f63190e33b52ac4e047cdd2b1a920520528032432043683a3b7de85d</i><br /><br />Threat actor <b>description</b>: <i>Missouri Electric Cooperatives is a statewide association established to protect, support and serve the interests and business practices of our 47 member electric co-ops and to help ensure the 2 million co-op members in rural Missouri receive reliable and affordable electricity. Files of the organization will soon be available for downloading. Information of employees (phone, addresses, photos, etc), business partners, accounting data and so on.</i><br />Target victim <b>website</b>: <i>https://amec.org</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Access-Intelligence</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14224</link>
<guid>8cad09283d1d6c5fb08daec8a576a72d</guid>
<pubDate>Thu, 11 Apr 2024 19:01:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Access-Intelligence</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04b589e8d40b4bf6fe0efe0af0f12da5bf2cd398133f593c4dabba4357570d56</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.accessintel.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Oki-Golf</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14218</link>
<guid>b326a08bb69d28ec5947c8438f12dd66</guid>
<pubDate>Thu, 11 Apr 2024 01:53:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Oki-Golf</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dfaf65966fb378f53ab62bc29630594007ba7100054f75751eb10b59d93ffc20</i><br /><br />Threat actor <b>description</b>: <i>Oki Golf Oki Golf is a collection of 11 Seattle area golf courses, including The Golf Club at Newcastle, providing championship golf course layouts and outstanding course conditions to players of all skill levels.</i><br />Target victim <b>website</b>: <i>https://okigolf.com/</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Inszone-Insurance-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14216</link>
<guid>631fe0c7519b232b0a0f6b965af015a9</guid>
<pubDate>Wed, 10 Apr 2024 21:11:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Inszone-Insurance-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0d2edbcef0a286940db1dc0dbb4326bfdcb022537dd7d61322892df5142ced6c</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.inszoneinsurance.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Robertson-Cheatham-Farmers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14213</link>
<guid>5a20abd7831fa1ebd199086e4a69a49a</guid>
<pubDate>Wed, 10 Apr 2024 13:34:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Robertson-Cheatham-Farmers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d274bf685e113b2c022f638895632dcee0deb8a85904c831ab6596172c81534d</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://yourfarmerscoop.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>theharriscenter.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14210</link>
<guid>2df41f38afef75d8c599483001daf2e1</guid>
<pubDate>Tue, 09 Apr 2024 19:11:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>theharriscenter.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c31e731317b465ee94aac7d18c912e0280ce187eac17b37ea912b1dd2c79ffd9</i><br /><br />Threat actor <b>description</b>: <i>Country: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>wencor.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14211</link>
<guid>f416d0fbce436dde50730df3a12bba3b</guid>
<pubDate>Tue, 09 Apr 2024 19:11:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>wencor.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd3766ee1f4d01f355b1416db0f6f1353ac2ab85b3231e38509a90b74c7727d8</i><br /><br />Threat actor <b>description</b>: <i>Country: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>processsolutions.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14208</link>
<guid>2e945b99f24f789d68d85ee332131c93</guid>
<pubDate>Tue, 09 Apr 2024 18:36:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>processsolutions.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f87780558840b18c510522e6baaf056ac8ab88fa950e5966eabda227117979ab</i><br /><br />Threat actor <b>description</b>: <i>PROCESS SOLUTIONS Control System Design & Integration Since 1987, manufacturers across industries have trusted Process Solutions to deliver custom-engineered control systems that solve their unique production challenges. Our engineering team has hundreds of combined years of experience designing high-quality systems that simplify operations and improve performance. From small pushbutton stations, to large controls cabinets and facility wide monitoring systems, we can provide a purpose-built solution to meet your requirements and help you achieve your objectives.SITE: www.processsolutions.com Address : 17212 51st Ave NE, Suite 112 Arlington, WA 98223 USAALL DATA SIZE: ~1tb 1. Projects data, CAD 2. Corporate data 3. Users, Personal data & etc…</i><br />Target victim <b>website</b>: <i>https://processsolutions.com/</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>numotion.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14207</link>
<guid>279dc09a13b9dc662c574a804d650d95</guid>
<pubDate>Tue, 09 Apr 2024 18:36:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>numotion.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5be92855f3307e94b955d5ddeb2c148cf63da80ea273b22c64bb07207829676c</i><br /><br />Threat actor <b>description</b>: <i>Numotion is the nation’s largest and leading provider of products and services to help individuals with mobility limitations maximize their health, personal independence, and actively participate in everyday life. Through our collection of brands, we provide those living with disabilities greater independence. Numotion, the company works with clinicians and health plans to serve people living with disabilities with prescription-based products including individually configured Complex Rehab Technology (CRT), catheters, and other assistive technologies.SITE: www.numotion.com Address : 155 Franklin Rd, Ste. 300. Brentwood, TN 37027, USAALL DATA SIZE: ~2.0tb 1. Human Resources 2. Users Shared Data 3. Payroll and financial data 4. Personal Users Folders 5. Legal data 6. Confidential documents & etc…</i><br />Target victim <b>website</b>: <i>numotion.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>siemensmfg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14206</link>
<guid>a45613e8740e38fe7d019d79fbf8712b</guid>
<pubDate>Tue, 09 Apr 2024 18:36:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>siemensmfg.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ecc7515ab518d08af82c22588999c7ee21b8f4db6f222508f1d6d6e119eeecf1</i><br /><br />Threat actor <b>description</b>: <i>At Siemens, we are dedicated to creating value for our customers and have an old-fashioned commitment to upholding our reputation for quality and service. We achieve this through efficient electronic assembly, advanced technical skills, innovative solutions, and customer-centric service. Our versatile facilities help insure that your project is handled efficiently and cost-effectively, and we have the technology to become a valued partner in your business. With our longstanding workforce – 10 years average hourly employee experience, and 20 years average management employee experience – we have the right people to deliver for you.SITE: www.siemensmfg.com Address : Siemens Mfg. Co., Inc. Freeburg Plant 410 W. Washington St. Freeburg, Illinois 62243New Athens Plant 500 N Johnson Street New Athens, IL 62264-1157ALL DATA SIZE: ~800gb+ 1. Common data 2. NewG 3. HMO & etc…</i><br />Target victim <b>website</b>: <i>siemensmfg.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>sermo.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14204</link>
<guid>c8720c9e82b818798e7b391fd62adf33</guid>
<pubDate>Tue, 09 Apr 2024 18:36:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>sermo.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fdb478eee09c49b5912cfea5a863ee33cbbe17e593fff254ebaf20cd911aa251</i><br /><br />Threat actor <b>description</b>: <i>Sermo Engaging with more than 1.3 million HCPs across 150 countries, we offer a unique physician-first online community that allows clinicians to communicate about issues that are important to them and their patients. Doctors can access our global community and the many benefits here.SITE: www.sermo.com Address : 200 Park Ave S, New York City, New York, 10003 United States Tel# (212) 358-0800ALL DATA SIZE: ~700gb 1. Personal data 2. Departments data 3. Finance 4. Projects, patient data infos & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>schlesingerlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14203</link>
<guid>b0eec27361a2a03d4480b560df531df7</guid>
<pubDate>Tue, 09 Apr 2024 18:36:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>schlesingerlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b75b4346e4f8d44e8b14ed66980b2ceeca73e0a675aa1c7d809952993b725e0f</i><br /><br />Threat actor <b>description</b>: <i>At Schlesinger Law Offices, P.A., our Fort Lauderdale personal injury attorneys understand just how difficult dealing with a serious injury can be. With more than 70 years of collective experience, our firm has the experience you need to navigate any legal hurdle that comes your way, and we will help you fight to secure the compensation you need to cover any medical bills or damages you incurred.SITE: www.schlesingerlaw.com Address : 1212 Southeast Third Avenue Fort Lauderdale, FL 33316 USAALL DATA SIZE: ~2.2tb+ 1. Library 2. Scans 3. Users personal data & etc…</i><br />Target victim <b>website</b>: <i>schlesingerlaw.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>robar.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14202</link>
<guid>5a834ec7e9dc45a5fae01dc7497e534f</guid>
<pubDate>Tue, 09 Apr 2024 18:36:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>robar.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>920fd77b86746f384811448608a9a197606b91566a9d0c22429da7d8bb933184</i><br /><br />Threat actor <b>description</b>: <i>Robar Enterprises, Inc.– the holding company that brings you Endura Steel, Smith Ironworks, Hi-Grade Materials, and AsCon Recycling – a division of Hi-Grade Materials. In business for over half a century, we are the leading supplier of construction materials throughout Southern California, Southern Nevada, and Western Arizona.SITE: www.robar.com Address : Hesperia, 17671 Bear Valley Rd, United StatesALL DATA SIZE: ~480gb 1. Departments 2. Financial data 3. Payroll Departments 4. Human Resources departments & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>atlascontainer.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14201</link>
<guid>58fe2003170159fd68519b7f9840fdb2</guid>
<pubDate>Tue, 09 Apr 2024 18:36:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>atlascontainer.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>291d08ece550de2df24883f2e1fe17ee9df5f6414db59c1528fa2530eb189a90</i><br /><br />Threat actor <b>description</b>: <i>Atlas Container Corporation is a manufacturer of high-quality packaging and display products, as well as non-corrugated items to help meet your packaging needs. Atlas can provide everything you need from stock shipping boxes to high end graphic point of purchase displays. We deliver with our own trucks and run our own manufacturing equipment, so you are buying directly from the source. From conception to finished product, Atlas can service all your needs.SITE: www.atlascontainer.com Address : 8140 Telegraph Rd. Severn MD 21144 USAALL DATA SIZE: ~200gb 1. Users folders 2. Finance data 3. Human Resources 4. 401k 5. Accounting & etc…</i><br />Target victim <b>website</b>: <i>www.atlascontainer.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>patersoncooke.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14200</link>
<guid>72fa288df9f22f7167dff80cf89fd4e5</guid>
<pubDate>Tue, 09 Apr 2024 18:36:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>patersoncooke.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a2b8756439dffcec10931fbdc84da54600fbd5bc52e43ced2f2ac948e0d60dcc</i><br /><br />Threat actor <b>description</b>: <i>Paterson & Cooke was founded as an engineering consultancy in 1991 by Angus Paterson and Robert Cooke specialising in slurry pipeline and mine backfilling consulting services to the South African mining industry. Through extensive early work with major South African mining companies, they gained invaluable knowledge and experience designing innovative and effective solutions for the challenges presented when backfilling some of the country’s deepest gold mines. More than three decades later, the founding vision of providing the most sought-after specialist consulting engineering services to the mining industry holds true, and our expertise has grown to include slurry pipeline systems, tailings and mine waste technology, mine backfill, offshore engineering, and mineral processing. Our reputation as global leaders in this industry is directly attributed to the work of our diverse team of world class engineers and specialists operating out of offices in Australia, Canada, Chile, South Africa, Spain, Sweden, the United Kingdom, and USA. Six of these offices have comprehensive laboratory testing facilities.SITE: www.patersoncooke.com Address : 221 Corporate Circle, Suite D, Golden, CO 80401-5637, USAALL DATA SIZE: ~450gb+ 1. Corporate data 2. Drawings 3. Users personal data 4. Home users folders and docs & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>arch-con.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14199</link>
<guid>66e8d052ec2230c66bd11ee6b5a0e3c8</guid>
<pubDate>Tue, 09 Apr 2024 18:35:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>arch-con.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1047acb7cf88668b4c0b221a54ad777f557104de33ee6277b735cb2fac92ac63</i><br /><br />Threat actor <b>description</b>: <i>Arch-Con® Corporation is a national commercial general contractor founded in 2000 with offices in Houston, Dallas, Austin, and Denver. Arch-Con’s award-winning team simplifies the construction process using the latest cost-efficient technologies to stay on the cutting edge of the industry.SITE: www.arch-con.com Address : 190 T C Jester Blvd. Suite 200, Houston, Texas 77030, USALL DATA SIZE: ~2.0tb 1. Accounting 2. Administration 3. Departments data 4. Users personal data & etc…</i><br />Target victim <b>website</b>: <i>www.arch-con.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>columbiapipe.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14197</link>
<guid>63ea3fef646010a7255aec506626ea32</guid>
<pubDate>Tue, 09 Apr 2024 15:19:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>columbiapipe.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8cbad9cb98dbaeb7b3894ce5f500454e6f1e6ba9df8dac34b7f9138464c1e64</i><br /><br />Threat actor <b>description</b>: <i>Since 1935, Columbia Pipe & Supply Co. has consistently delivered a wide range of high quality products and SERVICE plus SOLUTIONS. Since we are an independent company, our sales teams have the flexibility to focus their expertise on our customers’ unique needs without the bureaucratic limitations of a large corporation. With more than $50 million inventory, including over 130,000 individual SKUs, stocked in close to one million square feet of warehouse, Columbia Pipe is able to connect our global supply of product with our local markets. We have 16 mutually-supporting locations in Illinois, Indiana, Michigan, Wisconsin and Minnesota, so wherever you are—we are close-by.SITE: www.columbiapipe.com Address : 1120 West Pershing Road Chicago, IL 60609 Phone: 800-368-2709 Fax: 773-927-8415ALL DATA SIZE: ~450gb 1. Payroll 2. Finance 3. Accounts, Budgets 4. Human Resources 5. User Home Directories & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>MULTI-FILL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14181</link>
<guid>55f04ea8d0761b7aff9d21f23ebcbfef</guid>
<pubDate>Tue, 09 Apr 2024 12:16:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>MULTI-FILL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>32070c0c9a10197e3d979676ed1873361c3f0df9201ddc507d03aaa277c69de5</i><br /><br />Threat actor <b>description</b>: <i>MULTI-FILL is recognized worldwide as a leading provider of high-quality food filling systems for hard-to-fill products.</i><br />Target victim <b>website</b>: <i>http://multi-fill.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Central-Carolina-Insurance-Agency-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14182</link>
<guid>093c72c52ca8a8488fa54146997aa39d</guid>
<pubDate>Tue, 09 Apr 2024 12:15:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Central-Carolina-Insurance-Agency-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f5a426e5ded712b0ed091473eb5a5c5e775bb41b769ff5fa43b3e1673a9f940</i><br /><br />Threat actor <b>description</b>: <i>Central Carolina Insurance Agency is an independent insurance firm that began operations in Rowan County in 1931, and the organization grew in the 1980’s with an expansion into Mooresville. In 2017 we added R3; Risk, Reduction Resources to our firm to diversify Central Carolina’s tenure and clout in the insurance industry and to promote a more holistic approach to risk management.</i><br />Target victim <b>website</b>: <i>centralcarolinainsurance.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Panacea-Healthcare-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14179</link>
<guid>2677c94cc946bd788a3828099d6bcd49</guid>
<pubDate>Tue, 09 Apr 2024 12:15:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Panacea-Healthcare-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3bbb6e16829fd5eaf34ed523f17f7d162f54c7c48cea9d4290de5ee4fb072c71</i><br /><br />Threat actor <b>description</b>: <i>Panacea Healthcare Services is a provider of revenue cycle management and business solutions.</i><br />Target victim <b>website</b>: <i>panaceahcs.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Baca-County-Feedyard-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14172</link>
<guid>9f3d342d38e036a9137ef3e270d9d79c</guid>
<pubDate>Tue, 09 Apr 2024 10:51:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>Baca-County-Feedyard-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b87fc5d7eb7749cbeddfeb3e47116a4ce5268ea1eeb6fb771a98584dd48e9d62</i><br /><br />Threat actor <b>description</b>: <i>Visits: 2 Data Size: 220GB Published: False</i><br />Target victim <b>website</b>: <i>www.bacacountyco.gov</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brewer--Company-of-WV</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14173</link>
<guid>8ab84c57bf234ea2e3bf8330b47c2db1</guid>
<pubDate>Tue, 09 Apr 2024 10:47:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Brewer--Company-of-WV</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a636adf17a1b2b36f8bf57dcdcd897f3228302d1e94c49a58d7dcd13b4512784</i><br /><br />Threat actor <b>description</b>: <i>Commercial Construction</i><br />Target victim <b>website</b>: <i>http://www.brewerfire.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Olea-Kiosks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14174</link>
<guid>29a83a8a9641bb860a679d7e5ba52d26</guid>
<pubDate>Tue, 09 Apr 2024 10:47:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Olea-Kiosks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3c96685830eabd753fcf5bc9872e48f0cf847eaeb7833a8f0e81a4df03ba52c</i><br /><br />Threat actor <b>description</b>: <i>Olea Kiosks, Inc. is a self-service kiosk solution provider for the attractions and entertainment, healthcare and hospitality industries.</i><br />Target victim <b>website</b>: <i>http://olea.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hudson-Supplies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14175</link>
<guid>a3dfec8b6a89762b454f0b5e660c2e78</guid>
<pubDate>Tue, 09 Apr 2024 10:46:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Hudson-Supplies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f604353d6d17ad85aff1040727e616d762275f8053e64538ef158765f254c4b</i><br /><br />Threat actor <b>description</b>: <i>Worldwide manufacturer and supplier of high quality plastic fasteners, metal hardware, hook & loop and webbing (cotton, polypro, nylon & polyester) and strong magnets.</i><br />Target victim <b>website</b>: <i>http://www.hudson4supplies.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>John-R.-Wood-Properties-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14166</link>
<guid>8b89afaf8e00e0a46ea4d76ac473b1a2</guid>
<pubDate>Mon, 08 Apr 2024 19:17:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>John-R.-Wood-Properties-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5e52630fb7f0cb3207b0e509fc8910f46f988a5d96a6d0969f74225bb249ef8</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1958, John R. Wood Properties is a global real estate company headquartered in Naples, FL. John R. Wood Properties corporate office is located in 9130 Corsea Del Fontana Way, Naples, Florida, 34109, United States and has 1,242 employees. The total amount of data leakage is 1.07 TB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>PGF-Technology-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14163</link>
<guid>d8ec7fefbec9864f0453074a21fc2067</guid>
<pubDate>Mon, 08 Apr 2024 16:53:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>PGF-Technology-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fb04f3795b36b1d1e522dd5b32793771d1462e5799774e440cb1311723eacd93</i><br /><br />Threat actor <b>description</b>: <i>PGF Technology Group is a contract manufacturer for printed circuit boards, cables and wire harness assemblies. We share their files soon as the company doesn't care about the data. Employees SSNs, financial data, lots of NDAs, projects information much more.</i><br />Target victim <b>website</b>: <i>www.pgftech.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>REV-Drill-Sales--Rentals</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14164</link>
<guid>9cb4d40fce0492278209290ee3e4ae31</guid>
<pubDate>Mon, 08 Apr 2024 16:53:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>REV-Drill-Sales--Rentals</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>613327d98260c7d0b2226ffb51fe39e6071397b3496e2107cb16121ea77c083c</i><br /><br />Threat actor <b>description</b>: <i>REV Drill Sales & Rentals provides economical drilling solutions and supports clients from start to finish in Frederick, MD. HR, financial docs, agreements, employee information and so on. We'll upload everything soon.</i><br />Target victim <b>website</b>: <i>revdrill.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Paducah-Dermatology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14153</link>
<guid>7515989d1c2f94c0cf8c5e4aefd3d12b</guid>
<pubDate>Mon, 08 Apr 2024 08:39:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Paducah-Dermatology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aaa91b81384d2032cdb87f28bf780dc172a66cf5ecfcdf6d404233cc211da323</i><br /><br />Threat actor <b>description</b>: <i>Paducah Dermatology is a hospital & health care company. Paducah Dermatology corporate office is located in 3101 Parisa Dr Ste 402, Paducah, Kentucky, 42003, United States and has 19 employees. The total amount of data leakage is 15.04 GB</i><br />Target victim <b>website</b>: <i>https://www.paducahderm.com/</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Domestic-Violence-Project-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14154</link>
<guid>c4d2b56920cedd39cf578dcbc2ba960a</guid>
<pubDate>Mon, 08 Apr 2024 08:38:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Domestic-Violence-Project-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7a82d2c90903ead315c538061c80b7feb19497a67c7973e6ed1ed13168749f6</i><br /><br />Threat actor <b>description</b>: <i>Domestic Violence Project, Inc. helps victims of domestic violence become survivors by providing emergency, clinical, and supportive services; and promotes increased public awareness of domestic violence issues. Domestic Violence Project corporate office is located in PO Box 9459, Canton, Ohio, 44711, United States and has 15 employees. The total amount of data leakage is 31.2</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rairdon-Automotive-Group-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14155</link>
<guid>cf5cf27e4a8ed0ea16a917c2eb79eff5</guid>
<pubDate>Mon, 08 Apr 2024 08:38:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Rairdon-Automotive-Group-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d705607c76bd78c4f55ca10c23c25934c00be0d5bf1f24c5f6ac86cd5a8e8029</i><br /><br />Threat actor <b>description</b>: <i>Rairdon Automotive Group is a locally owned automotive group with 12 dealerships in the Pacific Northwest Honda of Sumner, Honda of Burien, Nissan of Auburn, Subaru of Auburn, Dodge Chrysler Jeep of Marysville/Monroe/Bellingham/Kirkland, Maserati of Kirkland, Alfa Romeo of Kirkland, Volkswagen of Everett, and FIAT of Kirkland. Rairdon Automotive Group corporate office is located in 16302 Auto Ln, Sumner, Washington, 98390, United States and has 152 employees. The total amount of data leakage is 98.5 GB</i><br />Target victim <b>website</b>: <i>rairdon.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Integration-International-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14156</link>
<guid>21bfef81b08fa7988c78190cc68c241c</guid>
<pubDate>Mon, 08 Apr 2024 08:38:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Integration-International-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b85d269e13a820e35903794603ce17d2cad0031bfe3a0ae39f19e8c1cc9c093</i><br /><br />Threat actor <b>description</b>: <i>Integration International is a digital transformation solutions organization, services range from IT consulting, IT infrastructure, and workforce solutions to application services and AI consulting. Integration International Inc corporate office is located in 1081 Parsippany Blvd, Parsippany, New Jersey, 07054, United States and has 178 employees. The total amount of data leakage is 133.40 GB. Sql databases and software source codes are included in the data leak.</i><br />Target victim <b>website</b>: <i>http://www.i3intl.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tarrant-Appraisal-District-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14157</link>
<guid>00bd13095d06c20b11a2993ca419d16b</guid>
<pubDate>Mon, 08 Apr 2024 08:38:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Tarrant-Appraisal-District-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c66f37cd0f0a554a5183e1772bdcd9596f3905daf54e19a2426e650e8daa98ff</i><br /><br />Threat actor <b>description</b>: <i>Tarrant Appraisal District (TAD) is a political subdivision of the State of Texas created effective January 1, 1980. The provisions of the Texas Property Tax Code govern the legal, statutory, and administrative requirements of the appraisal district. Tarrant Appraisal District corporate office is located in 2500 Handley Ederville Rd, Fort Worth, Texas, 76118, United States and has 237 employees. The total amount of data leakage is 217.79 GB</i><br />Target victim <b>website</b>: <i>https://www.tad.org/</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mahoney-Foundry-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14151</link>
<guid>ee2689a415fc2b28bb05fb5e195ebf04</guid>
<pubDate>Mon, 08 Apr 2024 07:35:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Mahoney-Foundry-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6bba1cb26ed03849ffe01e54f814559505b0b16ff185c7d7cd73c2db96874100</i><br /><br />Threat actor <b>description</b>: <i>Mahoney Foundries, Inc., is an aluminum casting supplier specializing in quality machining and non ferrous casting. We offer copper, bronze, and aluminum sand casting with offices in Indiana and Vermont.mahoneyfoundries.com</i><br />Target victim <b>website</b>: <i>www.aluminumsandcastingsfoundry.com</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Z-Development-Services-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14152</link>
<guid>7ec9ec4937546363b2e1e1b1f1789e86</guid>
<pubDate>Mon, 08 Apr 2024 07:32:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Z-Development-Services-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aed93378499a166814c21f72ef45ee0f9dd12f959e671d1ce044fab76827bc21</i><br /><br />Threat actor <b>description</b>: <i>Z Development Services, LLC is located in Orlando, Florida, and offers civil engineering design as well as a full range of project management services to meet all of your development needs.zdevelopmentservices.com</i><br />Target victim <b>website</b>: <i>www.zdevelopmentservices.com</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>DUNN-PITTMAN-SKINNER-and-CUSHMAN-PLLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14149</link>
<guid>150353f887435acbf6ef0a57e4a3dbca</guid>
<pubDate>Mon, 08 Apr 2024 05:55:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>DUNN-PITTMAN-SKINNER-and-CUSHMAN-PLLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46809f1386f454981002ac7c0cc2e8e71e0a9bdaf36bbc9fd086d79a3ab6d5ef</i><br /><br />Threat actor <b>description</b>: <i>These five attorneys and the entire staff of Dunn Pittman work to continue the tradition of providing quality legal services to the individuals and businesses of eastern North Carolina dunnpittman.com</i><br />Target victim <b>website</b>: <i>www.dunnpittman.com</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Change-HealthCare---OPTUM-Group---United-HealthCare-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14148</link>
<guid>3d2c3ec9b0b199a105b514368ca8a8db</guid>
<pubDate>Mon, 08 Apr 2024 03:54:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>Change-HealthCare---OPTUM-Group---United-HealthCare-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81a63816e666bad7ed2eea7377b7f72dcc4017bf8dd697ada0cb2fac2654a82d</i><br /><br />Threat actor <b>description</b>: <i>Visits: 38 Data Size: 4TB Published: False</i><br />Target victim <b>website</b>: <i>https://www.unitedhealthgroup.com/</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ellsworth-Cooperative-Creamery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14145</link>
<guid>43f8e3f11348d68dd4dc3faa9b4b50ba</guid>
<pubDate>Sun, 07 Apr 2024 17:52:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Ellsworth-Cooperative-Creamery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de3aa277990f45a65eb05561974fe88b9e841387cf62db4676ce94601a5dbedb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://www.ellsworthcheese.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>HCI-Systems-Inc.-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14137</link>
<guid>70898ec5aaf2bbf0002bc17e54806936</guid>
<pubDate>Sat, 06 Apr 2024 21:00:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>HCI-Systems-Inc.-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>14dcdffb90e6d98699a4c266f368921d8158604e1a967e3926b3d1dee389d129</i><br /><br />Threat actor <b>description</b>: <i>Visits: 20 Data Size: 500Gb Published: False</i><br />Target victim <b>website</b>: <i>www.hcisystems.net</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>On-Q-Financial-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14134</link>
<guid>93f9300df9dc1885893e1f5377735509</guid>
<pubDate>Sat, 06 Apr 2024 09:54:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>On-Q-Financial-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2db0fac76d0d1277e9311b455941c2d9de68639b740ac5ea2ca179ea05ac8042</i><br /><br />Threat actor <b>description</b>: <i>On Q Financial is a Mortgage Company specializing in new home financing and existing home refinancing.</i><br />Target victim <b>website</b>: <i>https://onqfinancial.com/</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Better-Accounting-Solutions-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14132</link>
<guid>539a4ba7e9fbd80f14780f0d49c15786</guid>
<pubDate>Sat, 06 Apr 2024 05:54:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>Better-Accounting-Solutions-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2bbd2a18c4a5d668f2934be6ef89e291fae174c5e5ba1e8732fb43bcbb11bf7e</i><br /><br />Threat actor <b>description</b>: <i>Visits: 62 Data Size: 200 GB Published: False</i><br />Target victim <b>website</b>: <i>www.betteraccountingsolutions.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>truehomes.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14129</link>
<guid>a7d4c5e52848263151f75565644e7367</guid>
<pubDate>Fri, 05 Apr 2024 18:57:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>truehomes.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d0790adb90f81037d61b259c9fe178122d210cc6bb1bc028d2735696091d623</i><br /><br />Threat actor <b>description</b>: <i>Click the link in our bio to leave us a review⭐️ 📲 Ready to start the journey towards your dream home? Visit www.TrueHomes.com or give us a call at (704)-448-6458 today! 🏠 🎬The Karver at North District #2024Kickoff #TrueHomes #TrueHomesUSA #MoreL...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Commerce-Dental-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14121</link>
<guid>17a24df73c2fc374fd2abf75a8ab04f3</guid>
<pubDate>Fri, 05 Apr 2024 04:22:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ciphbit</b> claims attack for <b>Commerce-Dental-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d22ec0500854405374c6929d714c08c87d31d431712e2885c213d8703112b62f</i><br /><br />Threat actor <b>description</b>: <i>At Commerce Dental Group, we have extensive experience in all aspects of modern dentistry. We offer Comprehensive Dental Care, including everything from the Preventive Education & Routine Hygiene that help to reduce dental problems to expert Cosmetic & Restorative solutions for the dental issues our patients face. Commerce Dental Group is a team of caring, experienced dental professionals who use only the most advanced technologies, materials & procedures & whose primary focus is on comfortable, health-centered dentistry. At our community-focused practice, your comfort & satisfaction come first. We look forward to meeting you soon & developing a relationship with you to build the bridge toward long-term trust & successful dental care. Commerce Dental Group invites you to see why our patients can’t stop smiling. Our dedication to the community goes beyond just caring for teeth. We view ourselves as part of a vital network of practitioners who look after the health & well-being of our friends & neighbors in Commerce & the surrounding communities. Commerce Dental Group is locally owned & part of a tradition of exceptional dentistry.</i><br />Target victim <b>website</b>: <i>http://commercedentistry.com</i>]]></description>
<category>ciphbit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sit</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14118</link>
<guid>0e49c032c28f9e60a181630f281eda5a</guid>
<pubDate>Thu, 04 Apr 2024 22:25:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Sit</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34dcdb29dd59483278e90c27b5c1b6b32c6e57f2bd705780c5ee826134788b6f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.sitnsleep.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Guys-Floor-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14119</link>
<guid>02f5df8adf0db026d38425594e68a007</guid>
<pubDate>Thu, 04 Apr 2024 22:25:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Guys-Floor-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60a92bdf592db25c52b36bff6ca2b4d173251e4193dcadd60ef2a954009798c2</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.guysfloor.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Everbrite</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14117</link>
<guid>04b0fdd6e57a35a2aaa0374e159a7f9f</guid>
<pubDate>Thu, 04 Apr 2024 20:54:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Everbrite</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f45718c6f4b52173ce0391965e392e2bace84a376a410d307087abf90794b583</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.everbrite.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sutton-Dental-Arts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14114</link>
<guid>cbe68589759f566354b16b634b2ac6b8</guid>
<pubDate>Thu, 04 Apr 2024 17:00:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Sutton-Dental-Arts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd6fc507cb89c96e75365ffb4d0bbf95a166d2057d5bfcbff215e4e0834f8e82</i><br /><br />Threat actor <b>description</b>: <i>Sutton Dental Arts - a dental clinic providing a full range of dental services. Sutton Dental Arts corporate office is located in 1729 W Harvard Ave Ste 5, Roseburg, Oregon, 97471, United States and has 3 employees. The total amount of data leakage is 20.2 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Inspection-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14115</link>
<guid>ee364229b2791d1ef9355708eff0ba34</guid>
<pubDate>Thu, 04 Apr 2024 16:56:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Inspection-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b40e015397fd5ab07fecc997983d275549692a5636f26b3b4b9218031d55f2f5</i><br /><br />Threat actor <b>description</b>: <i>Inspection Services, Inc. (ISI) is a minority woman-owned business delivering industry-leading special inspection and materials testing services throughout California. Detailed employee personal information (docs scans and forms), agreements, trainings results, dispatch letters and tons of business papers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>mcalvain.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14109</link>
<guid>5847c1b5bad36912f13024fbe20d606e</guid>
<pubDate>Thu, 04 Apr 2024 13:28:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>mcalvain.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c32a479d92416337133bc7161c7c121a9fbd1d80fe9588dd1966f11e4b7a7e3</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/MCO/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/MCO/PROOF/DATA DESCRIPTIONS: Сonfidential personal identification data, private information, financial data, construction projects, agreements, drawings, corporate correspondence, accounting, operational data, top managers and key employees' personal folders and much more. </i><br />Target victim <b>website</b>: <i>mcalvain.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wacks-Law-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14106</link>
<guid>8b2af218c67338fe19c095227bd73969</guid>
<pubDate>Wed, 03 Apr 2024 19:32:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Wacks-Law-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8935324fcf418f93645e10f1cf4552b41bf9ef51c45732aa5677f5c6924c7fa8</i><br /><br />Threat actor <b>description</b>: <i>The Wacks Law Group is a New Jersey-based law firm of dedicated attorneys who address clients’ issues with a deeply personal yet professional commitment. Our law firm serves clients throughout New Jersey and New York. Our extensive knowledg            ...</i><br />Target victim <b>website</b>: <i>Company url</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>BeneCare-Dental-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14100</link>
<guid>1e2327accf8e3b40ac236b51c966f94a</guid>
<pubDate>Wed, 03 Apr 2024 19:29:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>BeneCare-Dental-Insurance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>372a30dc0df3c99118f0a2d310b99a3b31de7628c8325b628654a76c6369cbc2</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.benecare.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Interface</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14101</link>
<guid>56d8b82bcfbf4e2637ba17d56b96516a</guid>
<pubDate>Wed, 03 Apr 2024 19:28:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Interface</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>64bd93113b3e62e8836aff97129ac879c622d4b3d714d6f3f35946d1fa9c39b5</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>https://www.interface.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>DataBank</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14102</link>
<guid>c5eb4987bf9d44097f3ed42e0697a546</guid>
<pubDate>Wed, 03 Apr 2024 19:28:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>DataBank</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>385420f1c0a10c98dbac130c527ee267f8e3ab38d7be3f359c9561c3b60fb03e</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>https://www.databank.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Beaver-Run-Resort</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14103</link>
<guid>73434c1432fa81daf8b4ee87589c509c</guid>
<pubDate>Wed, 03 Apr 2024 19:26:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Beaver-Run-Resort</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>461c6bc4be840177bbd4bb030b142729d7fa3d815423b92c41eb9252c6fe89f7</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.beaverrun.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Citi-Trends</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14098</link>
<guid>131632cb7eeb986974e1be59af67e8fe</guid>
<pubDate>Wed, 03 Apr 2024 19:24:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Citi-Trends</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c209eeb3719837b611b477c4d0022dc433d49eb0e604a5948ff988721b5850e</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>https://www.cititrends.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>West-Idaho-Orthopedics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14096</link>
<guid>7b16a52cf3727c22984590c4f4c36039</guid>
<pubDate>Wed, 03 Apr 2024 17:55:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>West-Idaho-Orthopedics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ae41945a48103347fd3ebaae2dd6cc0f88480b1ad21649da379a98ca999e9ca4</i><br /><br />Threat actor <b>description</b>: <i>At West Idaho Orthopedics & Sports Medicine we’re committed to providing the best possible care for residents of Treasure Valley. Our dedicated experts work tirelessly to stay abreast of the latest...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Norman-Urology-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14095</link>
<guid>1f3f1ae7d482ddc4b5a930cfd8d104a6</guid>
<pubDate>Wed, 03 Apr 2024 16:59:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Norman-Urology-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7c349c93559f42fb7d2dfe325408feb7206eb187e0ed50f54e42032beaca0b7</i><br /><br />Threat actor <b>description</b>: <i>The physicians and staff at Norman Urology Associates are dedicated to serving the urological needs of Norman and the surrounding communities. We provide state of the art diagnosis and treatment and...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Phillip-Townsend-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14094</link>
<guid>39abd1c6e1d6aa57455adf5eda4325a8</guid>
<pubDate>Wed, 03 Apr 2024 16:24:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Phillip-Townsend-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>15bd1cd940096d3407e5b6f44f75c37b21dd5947b80585a1f02ff927d80d8fc9</i><br /><br />Threat actor <b>description</b>: <i>Phillip Townsend Associates is the leader in global benchmarking solutions, headquartered in Houston, Texas.</i><br />Target victim <b>website</b>: <i>http://ptai.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>-San-Pasqual-Band-of-Mission-Indians</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14090</link>
<guid>7884205c412107bdfe1dd6d1356c1d56</guid>
<pubDate>Wed, 03 Apr 2024 13:05:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>-San-Pasqual-Band-of-Mission-Indians</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>207c460f6a75e500910125d2b3269d64ac0f8eba8fe03f48bd7a3750f03aa7e2</i><br /><br />Threat actor <b>description</b>: <i>The San Pasqual Band of Mission Indians is a federally recognized tribe of the Kumeyaay Indian Nation. They are based in Valley Center, California. San Pasqual Band of Mission Indians  office is located in 16400 Kumeyaay Way, Valley Center, California, 92082, United States and has 101 employees. The total amount of data leakage is 134.4 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>East-Baton-Rouge-Sheriffs-Office</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14091</link>
<guid>dd32c0fc8172acd5312c1089a5aa4d33</guid>
<pubDate>Wed, 03 Apr 2024 13:05:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>East-Baton-Rouge-Sheriffs-Office</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a403a119d12adad59e8c849dbdc7d426d7008e04499efc1eaa21d48cb28c88d8</i><br /><br />Threat actor <b>description</b>: <i>East Baton Rouge Sheriff's Office - led by Sheriff Sid Gautreaux, this Office is responsible for enforcing the laws of Louisiana within East Baton Rouge Parish,as well as maintaining the East Baton Rouge Parish Prison. East Baton Rouge Sheriff's Office corporate office is located in 100 Saint Ferdinand St Rm 203, Baton Rouge, Louisiana, 70802, United States and has 510 employees. The total amount of data leakage is 92.2 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>regencyfurniture.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14079</link>
<guid>e64caaff8e5c0399ab73c9fe1e37bd79</guid>
<pubDate>Tue, 02 Apr 2024 23:58:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>regencyfurniture.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>72fcbb6a8f02c637b253fd198c220f20b3de29a37b0ea0cad7835df260a31d5e</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/REGENCYFURNITUR/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/REGENCYFURNITUR/PROOF/DATA DESCRIPTIONS: Personal Identifying information, financial statements, corporate correspondence, contracts, employee and customer information, executive managers personal data, database backups, etc. </i><br />Target victim <b>website</b>: <i>regencyfurniture.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Precision-Pulley-ampamp-Idler</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14071</link>
<guid>cccb7ec704e828b99068ec1b9cf1fc03</guid>
<pubDate>Tue, 02 Apr 2024 16:23:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Precision-Pulley-ampamp-Idler</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f272d8e79976096215775b5e67be7f0f93837592caf5e34cdbf1e4aee1ce66dc</i><br /><br />Threat actor <b>description</b>: <i>Precision Pulley and Idler Company, headquartered in Pella, Iowa, provides idlers, pulleys, take-up frames, and bearings for cement, grain</i><br />Target victim <b>website</b>: <i>http://www.ppi-global.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gaia-Herbs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14067</link>
<guid>f4cfab7920e9cb176ab3b4e324d85f63</guid>
<pubDate>Tue, 02 Apr 2024 14:49:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Gaia-Herbs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cf1541fd7a014158e15dce051fb8f4f5865a9efb0aefb66d44af9786bf0fa2a6</i><br /><br />Threat actor <b>description</b>: <i>Gaia Herbs manufacture certified organic grower and nationally-branded herbal extracts based medicinals.</i><br />Target victim <b>website</b>: <i>http://gaiaherbs.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sterling-Plumbing-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14060</link>
<guid>0fd48905c01efe57e06cef04e3d71038</guid>
<pubDate>Tue, 02 Apr 2024 02:56:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>raworld</b> claims attack for <b>Sterling-Plumbing-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>716ac8b0507316c871de112d6f4c33646177fdf2c2aa24f4222b3bd159169039</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.sterlingplumbinginc.com/</i>]]></description>
<category>raworld</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wyoming-Machinery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14059</link>
<guid>3b87a374bf05212831dde204637f56cb</guid>
<pubDate>Tue, 02 Apr 2024 01:25:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Wyoming-Machinery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f39d34a7d488f30f695cae56c7e3503644aa410f5a1e5e798cfb4890650a7641</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.wyomingcat.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Roberson--Sons-Insurance-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14058</link>
<guid>91836ea292e688863d5165ae32aef8ff</guid>
<pubDate>Mon, 01 Apr 2024 23:57:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Roberson--Sons-Insurance-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b37e528bf40a37ffe2b65967178c2ce145ef790e137d473013da2248c248f616</i><br /><br />Threat actor <b>description</b>: <i>Roberson Insurance downloaded over 2000 customers (including SSN, DL number, DOB), their vehicle data(vehicle VIN numbers, addresses, mail, phone numbers, TaxID, etc.), documents, DL copies, contracts, insurance payments, financials, etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Partridge-Venture-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14057</link>
<guid>f9becb4fc983a43a91e182c79cc5e99c</guid>
<pubDate>Mon, 01 Apr 2024 19:22:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Partridge-Venture-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5d5e19b26f8fae7701356fbc8bd2e8e4b43f437637bf6f4e4ab237df1ee50604</i><br /><br />Threat actor <b>description</b>: <i>PVE, LLC was founded in 2008 from one of the strongest small engineering firms in Western Pennsylvania, Partridge Venture Engineering.</i><br />Target victim <b>website</b>: <i>http://www.pve-llc.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>aerodynamicinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14052</link>
<guid>818e9b09babdd65d130adad9a4ca9274</guid>
<pubDate>Mon, 01 Apr 2024 13:24:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>aerodynamicinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>614ae83a3e6d78218fa7bf642f5cae74bcd5e75b5a33fc58fda78f928bc92746</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/AERO/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/AERO/PROOF/DATA DESCRIPTIONS: Engineering documents and drawings, confidential data and correspondence with various customers such as Boeing, SpaceX, Airbus etc., corporate correspondence, database backups\exports, employee personal documents and much more. </i><br />Target victim <b>website</b>: <i>aerodynamicinc.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>besttrans.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14053</link>
<guid>249b96bd669d584de425cc8761d2ca9f</guid>
<pubDate>Mon, 01 Apr 2024 13:23:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>besttrans.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ad88f88d3aeb090e6884cf272ebc231142a7d0a57fbd7f5f080dcd2ab85f2fe</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/BESTTRANS/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/BESTTRANS/PROOF/DATA DESCRIPTIONS: Employees and executives personal folders, financial statements, payroll data, customer agreements, etc. </i><br />Target victim <b>website</b>: <i>besttrans.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Blueline-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14048</link>
<guid>445448cfb89afd8e924daec8a53ddd16</guid>
<pubDate>Mon, 01 Apr 2024 05:51:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Blueline-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eed7380179fc03fef3597e0d714d2a273fa92727aedd356e4bde6095cd740cd4</i><br /><br />Threat actor <b>description</b>: <i>Blueline Associates was founded in 2005 as not only a general contracting company, but as a solution source for clients. Kenneth Larson, founder and owner, saw the areas for improvement in the...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sisu-Healthcare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14049</link>
<guid>8ef93f7f477aa4674324b551ee68529f</guid>
<pubDate>Mon, 01 Apr 2024 05:50:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Sisu-Healthcare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ebef7f29c6ef898a0a0aa63f9d7c945070a5019e33b71c0a68898bf028e9ae10</i><br /><br />Threat actor <b>description</b>: <i>Sisu Healthcare Solutions is a privately held infusion therapy company that is dedicated to providing excellent clinical service to our patients, physicians and managed care customers...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Xenwerx-Initiatives-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14047</link>
<guid>0c14d9e1250da76981b5fac734227f0a</guid>
<pubDate>Mon, 01 Apr 2024 04:57:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Xenwerx-Initiatives-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8f4c03226b44cf09ea681ea3cb9e7c11403be670c93870b043659a15df08123c</i><br /><br />Threat actor <b>description</b>: <i>Xenwerx Initiatives, LLC provides a full suite of services and products to help our customer’s be successful with their virtualization initiatives.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>lavelle.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14045</link>
<guid>39e9d130e6936441d85e8b7e28860823</guid>
<pubDate>Sun, 31 Mar 2024 07:50:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>lavelle.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a558719d57a78f8e1dcb5a297370612a41f863a9cf9e0835f3e0c582f302703f</i><br /><br />Threat actor <b>description</b>: <i>For over 100 years, Lavelle has taken a leading role as a United States rubber and plastics manufacturer.665 Mchenry St Burlington, Wisconsin 53105, United StatesEmployees: 201 - 500revenue: $500M Kathryn TurkeVice President, Sales (OEM...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pavilion-Construction-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14042</link>
<guid>45efa623f6111a5e410641c6b86c85ea</guid>
<pubDate>Sat, 30 Mar 2024 14:50:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Pavilion-Construction-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f2acfe4d4769b616a09787230e3f8fbb6b783ef998e47beb4ceff64a9f920970</i><br /><br />Threat actor <b>description</b>: <i>Operator of a sustainable and affordable housing construction company. The entity offers feasibility and cost studies, pre-construction, design-build and assist, risk and safety management, and sustainability services. The company is licensed in 11 western states and prioritizes communication, safety, and ethical standards.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Williams-County-Abstract-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14041</link>
<guid>c4a39d2dae0a618f4ff46d348b9eedb7</guid>
<pubDate>Sat, 30 Mar 2024 08:36:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Williams-County-Abstract-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac4c80d4cf5b65368f369f6370cc3254e7ee07f9aeebbaf6ad12ed2c14aa73ca</i><br /><br />Threat actor <b>description</b>: <i>Williams County Abstract Company (founded 1907)  provides services to help you buy or sell residential and commercial property, and also real estate closing, escrow and settlement services and title insurance. Williams County Abstract corporate office is located in 123 E Broadway, Williston, North Dakota, 58801, United States and has 13 employees. The total amount of data leakage is 51.11 GB.</i><br />Target victim <b>website</b>: <i>williamsabstract.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Control-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14036</link>
<guid>a767b1393860de7db35a9954b1aa2f9d</guid>
<pubDate>Fri, 29 Mar 2024 18:00:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Control-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c71578b2d70993ab6b8a25e8560d785d5b9db6d5978526eb90d97e143b6fa699</i><br /><br />Threat actor <b>description</b>: <i>Control Technology Inc designs and manufactures advanced control,communications, and input & output products for industrial process automation. Numerous agreements, licenses and other internal business info. We'll share the files approximately next week.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>rameywine.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14032</link>
<guid>2950b6afd1a54045c0659ae2368893c8</guid>
<pubDate>Fri, 29 Mar 2024 09:02:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>rameywine.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6e60384840c2c7c2195f010ec2a00fcc96258e255aeed0c96769d8bead4d59a1</i><br /><br />Threat actor <b>description</b>: <i>rameywine.com 61Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>PSEC-Church</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14030</link>
<guid>dd33a21f7b5d1e39ae66b67be7a6d253</guid>
<pubDate>Fri, 29 Mar 2024 08:51:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>PSEC-Church</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd92a905836c81d5c53eb630f42ed97ee2142ce2b2a3785b7d3d688995a70c60</i><br /><br />Threat actor <b>description</b>: <i>The United Church of Christ is made up of 38 regional conferences, each with its own distinct identity. Pennsylvania Southeast Conference covers a diverse area: Philadelphia and its suburbs are in...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tech-Quip-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14031</link>
<guid>b16d68771e66bcf6386df99368154934</guid>
<pubDate>Fri, 29 Mar 2024 08:50:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Tech-Quip-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ed1fca7c86a318175574e64c09d5935d24b8e2097e94cfa62d218a9de7477f8</i><br /><br />Threat actor <b>description</b>: <i>Established in 1973, Tech-Quip has grown to become one of the largest manufacturer’s representatives for instrumentation and analytical products in the Gulf Coast. Headquartered in Houston, TX...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lodan-Electronics-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14029</link>
<guid>38dc1cfbbc29336d6e9dc76e9475d4e6</guid>
<pubDate>Fri, 29 Mar 2024 07:58:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Lodan-Electronics-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>561a5d0dcbc939eba6e4bfc598cba98ee053ea7ae3579bb4fcaec2ed10ff9292</i><br /><br />Threat actor <b>description</b>: <i>LoDan Electronics, Inc. was established in 1967, and has served as an industry leader, designing, manufacturing, and delivering cost effective, custom-engineered interconnect solutions. These...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sfi-wfc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14017</link>
<guid>f62a14520d684eec4080c6bd4c643b24</guid>
<pubDate>Thu, 28 Mar 2024 21:23:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>redransomware</b> claims attack for <b>Sfi-wfc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db78eb00f8dc7b89763cf8c95842d688f57c4e5b2d01a4d0183e3d46c445511f</i><br /><br />Threat actor <b>description</b>: <i>sfi-wfc.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>redransomware</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bendallmednick</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14018</link>
<guid>ebc82ddcaa790d66bba665311ead3045</guid>
<pubDate>Thu, 28 Mar 2024 21:23:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>redransomware</b> claims attack for <b>Bendallmednick</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1efc2683f1fa4e2f8182098347069676e9d0527fa82b2fd03278dee6286af34c</i><br /><br />Threat actor <b>description</b>: <i>Bendall Mednick</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>redransomware</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aluminumtrailer.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14020</link>
<guid>d4a4ccddfa91dcb33b30f0b1e210c9eb</guid>
<pubDate>Thu, 28 Mar 2024 21:23:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>redransomware</b> claims attack for <b>Aluminumtrailer.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2cbf2c9d587135440961d0fdc77fcd3d52e20240174a2055211b1813d6b46fb7</i><br /><br />Threat actor <b>description</b>: <i>(atctrailers.com)Our trailers are constructed with a fully integrated, welded aluminum frame that is built to last for generations. There is no wood to rot and no steel to rust ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>redransomware</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southcoindustries.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14021</link>
<guid>e1f5448f160187bcb4c4acaacfb3456c</guid>
<pubDate>Thu, 28 Mar 2024 21:23:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>redransomware</b> claims attack for <b>Southcoindustries.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2434c971e5f674d8527884a4990a25fbfeab5fbe01bc8ec962c43d5bd020ffdd</i><br /><br />Threat actor <b>description</b>: <i>Forestry Truck Body manufacturer. Custom Steel Fabricator Custom and Specialty products.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>redransomware</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kogok.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14022</link>
<guid>87c527cac12268901c64a3f56902fe6b</guid>
<pubDate>Thu, 28 Mar 2024 21:23:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>redransomware</b> claims attack for <b>Kogok.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>adf03d466defb2738b044e5d311934e04c1a02c3014dd5f59bde97e0ad6a0616</i><br /><br />Threat actor <b>description</b>: <i>Kogok Corporation is an industry leader in performance and customer satisfaction by continually understanding and addressing the needs of our ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>redransomware</category>
</item>
<item xmlns:dc='ns:1'>
<title>Baystate.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14023</link>
<guid>6a37887d2b55c87ad45dabf3ceb968b0</guid>
<pubDate>Thu, 28 Mar 2024 21:23:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>redransomware</b> claims attack for <b>Baystate.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>35dc5330275a0b2cb3f3ae791184f506da6c5079a7133abc707db25b8d1d73ce</i><br /><br />Threat actor <b>description</b>: <i>Bay State College is a private, career-focused college with campuses in Boston's Back Bay, Taunton, MA and Online</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>redransomware</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tecnolite.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14024</link>
<guid>723bd01f65708dcab0548d00d78b0741</guid>
<pubDate>Thu, 28 Mar 2024 21:23:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>redransomware</b> claims attack for <b>Tecnolite.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dcb9547e3b3409f8cb7d4fbf74410a9837df34d67b3f8d73769d5a5688c15afd</i><br /><br />Threat actor <b>description</b>: <i>We are the biggest venetian blinds wood slat manufacturer in Europe, strong of a total vertically integrated production that starts with the tree and finishes.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>redransomware</category>
</item>
<item xmlns:dc='ns:1'>
<title>Saglobal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14026</link>
<guid>f3f22264dbacb7ea850f2108d0b8bdf3</guid>
<pubDate>Thu, 28 Mar 2024 21:22:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>redransomware</b> claims attack for <b>Saglobal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da6fa3623200ed3e95a7e53124ccd3d76fef817cd19142ec3d0d686db1872bdb</i><br /><br />Threat actor <b>description</b>: <i>sa.global is the leading Microsoft global implementation partner for project-based cloud ERP solutions that leverage the Microsoft Cloud</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>redransomware</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lakes-Precision</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14015</link>
<guid>fb7b1850ba96e427e01404c3ed805cc2</guid>
<pubDate>Thu, 28 Mar 2024 17:46:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Lakes-Precision</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60f5163527a63e33a102bccf70e14c3e17afa519319081dbf95179aa13f92521</i><br /><br />Threat actor <b>description</b>: <i>Lakes Precision provides a wide variety of value added services and programs to assist our customers. Lot's of financial data, NDAs, employee information. We'll provide access to their data soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Santa-Cruz-Seaside</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14013</link>
<guid>0781c82b50d158791bfe033e631af1f0</guid>
<pubDate>Thu, 28 Mar 2024 16:20:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Santa-Cruz-Seaside</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b65641283118b0741896da247e92bea15d5cae2ac772460f695d655d42505031</i><br /><br />Threat actor <b>description</b>: <i>The company operates the Santa Cruz Boardwalk amusement park in California, which has been touted the "Coney Island of the West". We will share their files soon. Many financial documents, HR, various reports and other business data.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Neurobehavioral-Medicine-Consultants</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14012</link>
<guid>a22ede5d703532f281f393a5459571fd</guid>
<pubDate>Thu, 28 Mar 2024 14:49:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Neurobehavioral-Medicine-Consultants</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f17fd6a0a7591045e69c610d8df0a50da3dbc4c11e05c3c309b7c10481fa56c</i><br /><br />Threat actor <b>description</b>: <i>Neurobehavioral Medicine Consultants is a leading depression center in Bellaire, OH providing NeuroStar Transcranial Magnetic Stimulation TMS Therapy.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Florida-Memorial-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14011</link>
<guid>cef762ecebfd6ff463ce4fb05f095d92</guid>
<pubDate>Thu, 28 Mar 2024 11:48:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Florida-Memorial-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a0ec50541d1cad4ff3f69f5bad9b666ece47bbbc5395c3cd0174ba3da5a86da6</i><br /><br />Threat actor <b>description</b>: <i>The Florida Memorial University of today is ascending to excellence and stands in a position of great promise. Now a world-class institution, FMU offers undergraduate and graduate programs in high...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Reeves-Wiedeman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14010</link>
<guid>076fe937e59c252325e2a760ae2e4d37</guid>
<pubDate>Thu, 28 Mar 2024 08:59:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Reeves-Wiedeman</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3fe6f22fe4323edb870fc22da947c76cd735036e0b8a9b9c3da7c33ceb0b753b</i><br /><br />Threat actor <b>description</b>: <i>We are a fourth generation family business that was originally established in 1887. We have twenty two convenient locations that stock a broad anddeep inventory of plumbing products for the professional installer, for residential and commercial applications.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Exela-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14009</link>
<guid>27bf6226213cf288dfbf62ffc02bad4f</guid>
<pubDate>Thu, 28 Mar 2024 08:49:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Exela-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5432dcd4d26873fff843a954b701261644465f50accb3539f7b509e6bfeaa32d</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>https://www.exelatech.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Otolaryngology-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14007</link>
<guid>11084aaf0a5fc9561425a254a219f6f6</guid>
<pubDate>Wed, 27 Mar 2024 23:49:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Otolaryngology-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6070080de243b39ac903c25262a7ac95eec0ccd2dcccb484cda970ab1ec192e1</i><br /><br />Threat actor <b>description</b>: <i>Otolaryngology Associates, LLC is one of the largest private practice Ear, Nose, and Throat groups in the United States, with 13 convenient locations throughout Indiana in Indianapolis, Greencastle...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>anovahealth.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14006</link>
<guid>76a271c64a315732aa56eeb7277a63d4</guid>
<pubDate>Wed, 27 Mar 2024 22:22:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>anovahealth.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>50165200a6dd09e6d70a5dbd1f7fa321a721b3ede5fe9aeedc88e49a7813a6b1</i><br /><br />Threat actor <b>description</b>: <i>Anova Health is a company that offers a complete system of innovative health care technologies for the patient-centered integrative practitioner. It provides products, education, coaching and support for functional, biological, regenerative and energ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>dgse.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14004</link>
<guid>10ada88209bc465aa0ebd61bc248733e</guid>
<pubDate>Wed, 27 Mar 2024 21:18:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>dgse.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c04d8e0491720eefe2cd6728b05f3ebfb14cff74938120a79a3fb174d1dab63e</i><br /><br />Threat actor <b>description</b>: <i>For more than four decades, Dallas Gold & Silver Exchange (DGSE) has been the premier address in North Texas for buying and selling precious metals, as well as an exceptional retailer for diamonds, fine jewelry and luxury watches.SITE: www.dgse.com Address : 13022 Preston Rd. Dallas, TX 75240 USAALL DATA SIZE: ~350gb 1. Personal users confidential documents 2. Company data 3. Accounting & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pavilion-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14001</link>
<guid>c47a3ba2c793b5b9e21260f903c37d4d</guid>
<pubDate>Wed, 27 Mar 2024 19:30:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Pavilion-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>381809b5443bba87a8008254194a7c01bb82e496aadfc37bae77851e7423dc45</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.pavilionconstruction.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Boingo-Graphics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=14000</link>
<guid>5898493fbdf4a44a24084021b2215f85</guid>
<pubDate>Wed, 27 Mar 2024 19:30:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Boingo-Graphics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fb22db827501d92df1352d6fb23346f6f3a3af5c05a57117804e717244d03a28</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.boingographics.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>bulwarkpestcontrol.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13999</link>
<guid>1ad93267910df9c994eae8e51f527c7b</guid>
<pubDate>Wed, 27 Mar 2024 19:28:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>bulwarkpestcontrol.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ba6646b8de72f6f5e9b0ee227a30c1fdd8102835d3669aa0d54c36cc4671382</i><br /><br />Threat actor <b>description</b>: <i>At Bulwark Exterminating, customers mean the world to us. As a family-owned business, we’re committed to keeping your household bug-free and happy with innovative, personalized pest control solutions. We make it a point to listen to your concerns and learn about your property, so we can provide the very best service possible. Unlike some corporate brands, we train our technicians to exceed expectations with every interaction. We believe that going the extra mile is the best way to do business because that’s what we would want for our families too. Are creepy crawlies making you lose sleep? The Bulwark Barrier keeps them at bay night and day.SITE: www.bulwarkpestcontrol.com Address : PO BOX 151 Queen Creek AZ 85142ALL DATA SIZE: ~ 155gb 1. Company data 2. Contracts and agreements & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>lagunitas.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13998</link>
<guid>63e6bc520edcbaa95446b5690d989f30</guid>
<pubDate>Wed, 27 Mar 2024 19:28:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>lagunitas.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2779b0fc410249ed7c3f8ea9d2f30b2342d6d79d6a3faeaea65db0d03aedae3b</i><br /><br />Threat actor <b>description</b>: <i>The Lagunitas Brewing Company began on a kitchen stove in Northern California in 1993 and has been crafting hop-forward beers ever since. Welcoming the open-minded with open taps and simple truths: Beer Speaks (for itself), Life Is Uncertain (don’t sip), and It’s Good To Have Friends. To quote our BrewMonster, “Lagunitas is made up of all kinds and creeds; punk rockers, misfits, ivy leaguers, weirdos, Waldos, Sparkle Ponies, Musicians, and everything in between … Just a pack of stray dogs that found—despite our vast and wild differences—that the love and respect for the freedom to be different is what brought us together and made it all work.” Whether we’re supporting local communities by turning beer into money for the cause, or simply fueling stories and songs with IPA and other creations—we always have a spot for you at our bar. Come as you are. And bring your dog, too. Here’s how it all really happened, or at least how we remember it. Heck… we don’t remember a lot, so this is at least how we thought it might have gone or something…SITE: www.lagunitas.com Address : 1280 N. McDowell Boulevard Petaluma, Calif. 94954 USAALL DATA SIZE: ~700gb 1. All data company 2. Users personal data & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>carolinafoodsinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13997</link>
<guid>efe7beaa44d6e14c30432d43b2522ba2</guid>
<pubDate>Wed, 27 Mar 2024 19:28:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>carolinafoodsinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b5e7df42e3797525dbbafc3ef3319cb32a39ccc7d0f34dfbac7f33dfe648c19</i><br /><br />Threat actor <b>description</b>: <i>CAROLINA FOODS INC., creator of one of America’s first honey buns and the Duchess brand, is a sweet goods bakery located in Charlotte, North Carolina. For decades, our customers have enjoyed our honey buns, donuts, pastries and pies. Our products bring families together for breakfast, snacks, and on holidays and special occasions. At Carolina Foods, we make all of our products using the finest ingredients, blended in house to ensure that we have superior taste and quality. Once you taste our treats you will come back wanting more. Product quality is our number one priority, and we go to great lengths to ensure that our products are recognized as the “best in class” in their respective categories. Every day we strive to create a product that is loved by many. Quality, taste, and value bring our customers back for more. Honey buns are one of our many specialties, and while there are many brands on the market today, we challenge you to find one that tastes better than ours. Once you bite into a delicious, melt in your mouth Duchess honey bun, you will never buy another brand.SITE: www.carolinafoodsinc.com Address : 1807 SOUTH TRYON STREET CHARLOTTE, NC 28203 USAALL DATA SIZE: ~450gb 1. All data company 2. Users personal data 3. Accounting & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>amerlux.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13995</link>
<guid>b6b48639e4627ac7813f3501da8e4465</guid>
<pubDate>Wed, 27 Mar 2024 19:28:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>amerlux.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91203277f10036f9da8350171e1a03133ab9f559612a0c7dbadb100eb7620d19</i><br /><br />Threat actor <b>description</b>: <i>Amerlux, a wholly-owned subsidiary of Delta Electronics, has been a catalyst for change in the lighting industry since 1984—simply by listening to the marketplace. We don’t keep up with industry trends. We set them. We believe lighting is as much about “feeling” as it is about “seeing.” Our solutions deliver the five elements that exceed today’s expectations: rich color, next-level comfort, total control, easy configurability and “capture” to provide added security. We believe in building long-term relations with all our stakeholders, including architects, lighting designers, facility managers and contractors. We understand your goals and problems, then rise to the challenge by offering an array of the most magnificent, top-end lighting solutions in the world—backed by iron-clad guarantees, breathtaking savings and unparalleled service—at a cost-effective price. Our award-winning portfolio includes innovative interior and exterior lighting products that deliver striking aesthetics, unmatched rendering and superior performance through advanced engineering and connectivity.SITE: www.amerlux.com Address : 178 Bauer Drive Oakland, NJ 07436 USAALL DATA SIZE: ~790gb 1. Company data 2. Drawings & Engeneering 3. Users personal folders and docs & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>organizedliving.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13994</link>
<guid>32f791428812696ee7ce8f161ecd490c</guid>
<pubDate>Wed, 27 Mar 2024 19:28:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>organizedliving.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>54af81b775c3d83b1e55cb9c4e08e6b63575112e8979faa6b6a9089fcb0d9c7d</i><br /><br />Threat actor <b>description</b>: <i>Organized Living is the industry-leader of high-quality home storage and organization products. With our full breadth of product lines, we make storage for every area of the home easy. The Organized Living legacy focuses on leveraging technology and innovation to address trends in the building industry.SITE: www.organizedliving.com Address : Organized Living 3100 East Kemper Road Cincinnati, OH 45241 USAALL DATA SIZE: ~620gb 1. Company data 2. Accounting 3. HR 4. Users 5. Engineering & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>mjcelco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13993</link>
<guid>dba0ff02313bd467ce9d52df8d6c80e6</guid>
<pubDate>Wed, 27 Mar 2024 19:28:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>mjcelco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>581effa3bae18c481469b61926fff523e0173f801ef2aeb9d94e70a8f819c59d</i><br /><br />Threat actor <b>description</b>: <i>MJ Celco proudly employs 225 talented employees and has 255,000 total square feet of manufacturing space across our locations. To be the best metal stamping and fabricating company, delivering unmatched quality, fair prices, and excellent customer service.SITE: www.mjcelco.com Address : 3900 Wesley Terrace Schiller Park, IL 60176 USA Tel# 847-671-1900ALL DATA SIZE: ~1.2tb 1. Projects, Engineering, Drawings 2. Financial data 3. employees personal folders & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>kmbdg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13992</link>
<guid>d13dda85502e18dac4bca8c4c429b86c</guid>
<pubDate>Wed, 27 Mar 2024 19:28:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>kmbdg.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>85406c4a760f507101bfd90f2844a1060bc1b3068718e6af61651f9e793e0d95</i><br /><br />Threat actor <b>description</b>: <i>KMB is a full service engineering solutions provider licensed in the US and Europe developing comprehensive solutions for our clients.SITE: www.kmbdg.com Address : 1800 State Rte 34 Ste 209 Belmar, NJ, 07719 USAALL DATA SIZE: ~1.5tb 1. Projects (current and old) 2. Accounting 3. Users (employees personal folders and documents) & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>pctinternational.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13991</link>
<guid>7207cc49aa823ca90c015aacf4e9c161</guid>
<pubDate>Wed, 27 Mar 2024 19:28:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>pctinternational.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60c92aeea207d73508a6a0d0ff8a971e547099a36ef4e1cd21d46ce8be7828f5</i><br /><br />Threat actor <b>description</b>: <i>PCT International Inc. is a privately owned company serving a segment of the global telecommunications infrastructure. The Company manufactures coaxial cable and connectors with its proprietary technology for homes and businesses. PCT International serves customers worldwide.SITE: www.pctinternational.com Address : PCT International, Inc. at Arizona State Research Park 7855 S. River Parkway, Suite 222. Tempe, AZ 85284. USA. Tel# 480.813.0925ALL DATA SIZE: ~ 700gb 1. Users data (personal employees documents +) 2. HR 3. Finance data 4. Personal and departments data, confidential data & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>theshootingwarehouse.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13990</link>
<guid>042886829869470b75f63dddfd7e9d9d</guid>
<pubDate>Wed, 27 Mar 2024 19:28:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>theshootingwarehouse.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>27723c297a6834fb76d7a05afc62adf22e5e7e5455dceabb8649572612fa335a</i><br /><br />Threat actor <b>description</b>: <i>Sports South is a family company and these values permeate its culture to all its employees and its customers. Hard work, education, and hands-on involvement, along with the assured well-being and livelihood of hundreds of employees, reinforce the company’s dedication to its origin. As the country’s oldest and largest distributor of firearms, ammunition, and accessories, Sports South maintains its leadership position through the relentless pursuit of new ideas and new thinking to drive long-term success and growth. With the nation’s largest concentration of shooting sports inventory from all the leading manufacturers under one roof, Sports South can deliver unmatched distribution services to its customers.SITE: www.theshootingwarehouse.com Address : Sports South, LLC 101 Robert G. Harris Dr Shreveport, LA 71115 USAALL DATA SIZE: ~800gb 1. Department data 2. Human Resources 3. Accounting, payroll 4. Personal data & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>pstrans.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13987</link>
<guid>eb5053f7d2403c84a849b040014903ac</guid>
<pubDate>Wed, 27 Mar 2024 18:26:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>pstrans.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e003f1a132f89511a1aed0fe698811dd8b6497e45fc4b125f8c1b3a84184f3d</i><br /><br />Threat actor <b>description</b>: <i>P&S Transportation is one of the country’s fastest-growing providers of flatbed truckload transportation and logistics, primarily serving customers in the building materials, oil and natural gas, and steel industries.SITE: www.pstrans.com Address : 1810 Avenue C Ensley, AL 35218 USAALL DATA SIZE: ~1.5tb 1. Personal employees data 2. Corporate data 3. Finance and accounting 4. HR and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>fpdcompany.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13986</link>
<guid>20872559d95722c9d6a71d973c1a00b5</guid>
<pubDate>Wed, 27 Mar 2024 18:26:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>fpdcompany.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>93180c9d8c5b302e03cef5bacfa75b7f6af8722d231870bd6195821c3adda588</i><br /><br />Threat actor <b>description</b>: <i>FPD Company As a renowned global supplier, we cater to the aerospace and medical sectors, employing a synergy of manufacturing techniques to deliver unparalleled quality and superior products. Our titanium offerings encompass closed die forgings, precision machined components, and meticulously crafted assemblies.SITE: www.fpdcompany.com Address : 124 Hidden Valley Road McMurray, PA 15317 United StatesALL DATA SIZE: ~1.5tb 1. Accounting 2. Users and engusers personal folders 3. Engineering 4. Finance and Legal & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>northamericansigns.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13985</link>
<guid>798cfc169a66eb10aa814f8a45d5ef42</guid>
<pubDate>Wed, 27 Mar 2024 18:26:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>northamericansigns.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>69ebf02e8e91706b2ef89c012d69c44f8a3f073756db2cfa878019f5643f1dee</i><br /><br />Threat actor <b>description</b>: <i>North American Signs A commercial signage industry leader, North American Signs is a full-service provider from design and project management to manufacturing and service.SITE: www.northamericansigns.com Address : 3601 West Lathrop South Bend, IN 46628 USAALL DATA SIZE: ~250gb 1. Office data 2. Accounting 3. Design 4. CAD 5. Users folders and files & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>otrwheel.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13984</link>
<guid>bf15fc6473a38b79c0a233e9c6581775</guid>
<pubDate>Wed, 27 Mar 2024 18:26:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>otrwheel.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f95c619d4a040797e3c0e421042c1cc79b34076fb59bc58421429729f67012aa</i><br /><br />Threat actor <b>description</b>: <i>OTR’s product portfolio includes tires, wheels, assemblies, tracks, tubes, ballast and more. Our tire lineup comprises over 1,700 models and 300+ distinctive treads, with bias and radial pneumatic (directional and non-directional); semi-pneumatic; solid (directional and non-directional); non-marking; and airless. The portfolio also includes over 1,000 wheels, with single- and multi-piece versions in steel and aluminum, as well as cast disc units. In total, there are over 100,000 standard items, many of which can be customized for unique applications.SITE: www.otrwheel.com Address : 195 Chatillon Rd NE Ste 4, Rome, Georgia, United StatesALL DATA SIZE: ~700gb 1. Human Resources 2. Engineering 3. Finance 4. Customers 5. Confidential personal documents employees & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mermet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13989</link>
<guid>ca6037b5974c5b0dac440bcdfb299bce</guid>
<pubDate>Wed, 27 Mar 2024 17:50:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Mermet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>515f46be421c9d6a8c355a92372effc8915d4ddc827b20ebee20d1d3cfc80ab2</i><br /><br />Threat actor <b>description</b>: <i>Mermet has been dedicated to producing quality fabrics that meet and exceed customer's expectations. About 30GB of data will be available soon. You will find there confidential HR files with personal information and other interesting on the company.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>JM-Thompson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13982</link>
<guid>6ea1301c76a2752155f93ff51443ad01</guid>
<pubDate>Wed, 27 Mar 2024 14:57:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>JM-Thompson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19fe5b1392a8a719f933035d3aff99cc90f38ca4e03ee927dd163508b63a4df5</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.jmthompson.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Weld-Plus</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13983</link>
<guid>6e188dc874a5c7bee808852f9020c0c9</guid>
<pubDate>Wed, 27 Mar 2024 14:56:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Weld-Plus</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9b025378d1ccf459b14f63f1da2cb5585efd1e782b5dba7db4edc29de30837b5</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.weldplus.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>qosina.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13980</link>
<guid>10b3a190826923700349cc96979e8b48</guid>
<pubDate>Wed, 27 Mar 2024 14:53:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>qosina.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fbae0dae5e191e85eb3ad94061659f211ba5d05cb197ad851e744fdf0e2bc411</i><br /><br />Threat actor <b>description</b>: <i>Download link #2Medical device manufacturer. “Qosina is a leading global provider of over 5,000 OEM single-use components, serving the medical and biopharmaceutical industries. Our unwavering commitment revolves around ensuring an exceptional customer journey. We provide complimentary component samples, minimum order quantities, just-in-time delivery, mold modifications, and new product design and development.”Website: https://www.qosina.com/Revenue : $37.9MAddress: 2002q Orville Dr N, Ronkonkoma, New York, 11779, United StatesPhone Number: (631) 242-3000Download link #1:  https://***************.onion/QOSINA/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/QOSINA/PROOF/Download link #1:  https://***************.onion/QOSINA/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/QOSINA/PROOF/DATA DESCRIPTIONS: Financial documents, employee and executive managers personal data, engineering documents and drawings, QA data, customer information, contracts, etc. </i><br />Target victim <b>website</b>: <i>qosina.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>West-Monroe</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13972</link>
<guid>c4d856156b2c629314b9edd13523fe8e</guid>
<pubDate>Wed, 27 Mar 2024 13:24:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>West-Monroe</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4c0b8066c3b0af08c80c7afddab4ea53fabc5c7c52e5ce9dbcf0b030da991d15</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.westmonroe.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Frawner</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13973</link>
<guid>5a0948634378d18b07e1615c0f953076</guid>
<pubDate>Wed, 27 Mar 2024 13:24:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Frawner</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1e6669d2fad49f8136ee5007b8a78e8fd154d8bbe18256711a9f22b80634b03</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.frawnercorp.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alber-Law-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13974</link>
<guid>cdf039a172c2935f315a7d4cec997c35</guid>
<pubDate>Wed, 27 Mar 2024 13:23:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Alber-Law-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79f2b48b874b49c8473a454b47db2d8b0e3a5cd743cf146483070c44401697c0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.alberlaw.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hartz</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13975</link>
<guid>978f34620323a49beac44c046cb2117a</guid>
<pubDate>Wed, 27 Mar 2024 13:22:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Hartz</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f11a4ca4191f2b7b4af6d848c3ad42076cbaca6adc77def05a7a863632bac0ba</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.hartz.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Quality-Enclosures</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13976</link>
<guid>0e19a8bac63f97a513063dcb9a64442b</guid>
<pubDate>Wed, 27 Mar 2024 13:22:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Quality-Enclosures</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>99e1c13b014aa17873d5588c8898ff0efe6d82d43721b0237f154c2209dbb529</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.qualityenclosures.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lawrence-Semiconductor-Research-Laboratory</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13977</link>
<guid>e7fed988dd5f2a44bb605bffd0f6c19d</guid>
<pubDate>Wed, 27 Mar 2024 13:21:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Lawrence-Semiconductor-Research-Laboratory</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e59f7bb1d29c4df16995aab5c1112c171341a9a7090c815c5d95c93dde2f2e34</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.lsrl.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lambda-Energy-Resources</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13978</link>
<guid>129e4760599f99cd2841b7a19d03e07e</guid>
<pubDate>Wed, 27 Mar 2024 13:21:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Lambda-Energy-Resources</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc6e34f6e0d1b2c3d54d278343143391fff1ae529e89b5f260c1fe8836f22946</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.lambdaenergyllc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>lifelinedatacenters.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13971</link>
<guid>95e2b3bc377ab32c26e010300ce0081b</guid>
<pubDate>Wed, 27 Mar 2024 11:55:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>lifelinedatacenters.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>17d7b7ab01a3125d124df79851033d7f042e3b3126fee8a9eb79d38b34df500d</i><br /><br />Threat actor <b>description</b>: <i>We hit the Lifeline Federal Hosting and downloaded some juicy data. We will not publish it but because they pretend nothing happened, we are sharing their DC full hash list.C0201DC02$:1103:aad3b435b51404eeaad3b435b51404ee:db12f43738af90e3e152e1be...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>dkpvlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13970</link>
<guid>4641f63dd756285f550c6361c9da2e31</guid>
<pubDate>Wed, 27 Mar 2024 11:54:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>dkpvlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b5d19f9df06056315f4813564302cdcb08535afdadc052750d7f5bc47e855ba</i><br /><br />Threat actor <b>description</b>: <i>Deeley King Pang & Van Etten, LLP was founded in 1985 by William Deeley and Dennis W. King on two key principles.The attorneys and staff at Deeley King Pang & Van Etten, LLP are committed to providing effective legal solutions for our clients. We...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>lindquistinsurance.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13969</link>
<guid>3c63021df32e126a8dcf115d07e23f59</guid>
<pubDate>Wed, 27 Mar 2024 11:53:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>lindquistinsurance.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c39756da67585be4a1b9317f220942d9b3450a01d2065e8b7984b1a6b6c7d92a</i><br /><br />Threat actor <b>description</b>: <i>lindquistinsurance.com 12Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>pcscivilinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13967</link>
<guid>043ea4eb48d314b91e95fb5052d3d8f0</guid>
<pubDate>Wed, 27 Mar 2024 09:46:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>pcscivilinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f4e66bea0c045811235cc9ea5d6cf9617ce99752dda7eac888c52ae206afd122</i><br /><br />Threat actor <b>description</b>: <i>PCS Civil, Inc. is a leader in Heavy Civil Construction services in Florida. Originally known as Pepper Contracting, PCS was incorporated on December 21, 1993 with the mission to set the bar higher for all roadway, utility, and concrete companies in...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>contenderboats.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13965</link>
<guid>bafd1b75c5f0ceb81050a853c9faa911</guid>
<pubDate>Wed, 27 Mar 2024 08:54:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>contenderboats.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>85236006906bbe3ec1f7ccdf77442d0c2dd2c1e3bb26f04e614a30e91397a7af</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/CONTENDERBOATS/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/CONTENDERBOATS/PROOF/DATA DESCRIPTIONS: Financial documents, Personal identification information. engineering documents and drawings, corporate correspondence, user personal folders, etc. </i><br />Target victim <b>website</b>: <i>contenderboats.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>UNDP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13962</link>
<guid>f84f4800d13741a98ddf9bc46e58355c</guid>
<pubDate>Wed, 27 Mar 2024 08:50:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>UNDP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>39412e85b6703d6058a0164a1ea5727bb8bd5b7386b8a5801b9a58dbaa160d33</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1966, the UNDP is an organization that assists with sustainable development, democratic governance, and disaster resilience.undp.org</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lieberman-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13952</link>
<guid>4a3cffe005397d4cffdee044f1c8d30e</guid>
<pubDate>Tue, 26 Mar 2024 17:53:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Lieberman-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b489172489ffb3bb811c66b882d4963a10ce370da66c80e3c2fbf40a9d813eb4</i><br /><br />Threat actor <b>description</b>: <i>Lieberman LLP is a boutique business valuation and forensic services firm providing litigation support services to clients in New York City and throughout the United States.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Koi-Design</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13950</link>
<guid>fa45e04412386eaef9d603bc349b5065</guid>
<pubDate>Tue, 26 Mar 2024 16:18:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Koi-Design</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97469f7387304690e0943fa3315b2550747f29f940e55b7e293e3ccd25b5208f</i><br /><br />Threat actor <b>description</b>: <i>Koi Design LLC is a clothing company. The company's line of business includes the wholesale distribution of women's, children's, and infants' clothing and accessories. We are going to share with you 30Gb of their databases of business files, payments information, agreements, projects and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tanis-Brush</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13951</link>
<guid>d56fac4fc074379769b86e77e00422dc</guid>
<pubDate>Tue, 26 Mar 2024 16:18:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Tanis-Brush</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6dc8166e2a9ab366aad3a7238707e715a55c3b0360ba68dc9e60fbecadc7167b</i><br /><br />Threat actor <b>description</b>: <i>Regal Manufacturing was established in 1934. Quality brushes and brooms with personalized service for our customers is the foundation upon which Regal Manufacturing Company was built, and that quality and service continues today. You will be able to see how itworks from the inside when we upload their files here. Business docs, NDAs, agreemnts, some forms with personal information can be found there.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crimsgroup</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13936</link>
<guid>ecf906a99fb0d66f7aea10c5504b88cb</guid>
<pubDate>Tue, 26 Mar 2024 11:49:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Crimsgroup</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee9de4bbc4507e8a4edfd4eae73172199c9a423b8b0c12b396d099530b271367</i><br /><br />Threat actor <b>description</b>: <i>Company has the last 24 hours to contact us using the instructions left. In case of silence, all data will be published here</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Woodsboro-ISD</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13934</link>
<guid>8ccf849734993abe369360d16d262328</guid>
<pubDate>Tue, 26 Mar 2024 04:13:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>Woodsboro-ISD</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29cdde574c373d3a4e0a0ebaf8912449c73edc5cebb8ea0ce3959b81f61c9b6a</i><br /><br />Threat actor <b>description</b>: <i>Visits: 5 Data Size: 45GB Published: False</i><br />Target victim <b>website</b>: <i>www.wisd.net</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>wblight.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13932</link>
<guid>f29e862f7307c4eb635b0bb98fdbaf60</guid>
<pubDate>Mon, 25 Mar 2024 23:05:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>wblight.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e9a3cca9b8c0e2da355e2054f8a9d26c5cb956a1008f370cf81f7e89f53e913e</i><br /><br />Threat actor <b>description</b>: <i>With over 110 years under our belt, Wiedenbach Brown is one of the most established names in the lighting business. But we're also one of the most forward-thinking brands in the game. Our innovative Procurement Agent model makes us uniquely qualified...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>CLARK-Material-Handling-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13931</link>
<guid>77a4df1abe7183c4302bce4fd120e216</guid>
<pubDate>Mon, 25 Mar 2024 20:48:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>CLARK-Material-Handling-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a221bd478d0edec496bd30fb6458efe987e2b385bbb04273af5db5032110203</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.clarkmhc.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Greenline-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13928</link>
<guid>2eac42424d12436bdd6a5b8a88480cc3</guid>
<pubDate>Mon, 25 Mar 2024 17:51:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Greenline-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>625b865721b71166a29935abcab8de909ddd18c6792ccc71906a30e8fc5cd924</i><br /><br />Threat actor <b>description</b>: <i>Industrial Machinery & Equipment.</i><br />Target victim <b>website</b>: <i>www.greenlineva.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Teton-Orthopaedics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13929</link>
<guid>ff3d65f00548c4e0c189bb01825f832e</guid>
<pubDate>Mon, 25 Mar 2024 17:50:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Teton-Orthopaedics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6560488598a6f58888c4c628f593784bca50f18a2bfab08130a5dcc9a894e19</i><br /><br />Threat actor <b>description</b>: <i>For over 30 years, Teton Orthopaedics has provided exceptional orthopaedic care to the residents of Wyoming and beyond. </i><br />Target victim <b>website</b>: <i>tetonortho.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Burnham-Wood-Charter-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13923</link>
<guid>7d5047f570e6c05c4040f08aa0b1e3a5</guid>
<pubDate>Mon, 25 Mar 2024 16:19:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Burnham-Wood-Charter-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52d7ef26ac8ba633cae43fa421854de2746838c705eef1123a1e1cd10e678123</i><br /><br />Threat actor <b>description</b>: <i>Burnham Wood Charter Schools provides a variety of sports at the elementary, middle, and high school levels.</i><br />Target victim <b>website</b>: <i>http://burnhamwood.org/</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Affiliated-Dermatologists-and-Dermatologic-Surgeons</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13922</link>
<guid>c052e590b0d2cc3863f42d501d7d4856</guid>
<pubDate>Mon, 25 Mar 2024 14:53:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Affiliated-Dermatologists-and-Dermatologic-Surgeons</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a11617f964ab09d33cebe1676096820f250a074c4e7add14cca11f66914d1727</i><br /><br />Threat actor <b>description</b>: <i>Company offer dermatology care and botox to patients in the Morristown area.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>kh.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13921</link>
<guid>0cbff6dd75df1f43e3abae409ed8a9fd</guid>
<pubDate>Mon, 25 Mar 2024 11:47:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>kh.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53a6e4683ff0295fdd70cf23c30b79950aa9989378f92352f13c9e409d9ca8ba</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1966, Kootenai Health is a hospital that provides patient care services for people in Idaho, Montana, and Eastern Washington. They are based in Coeur d'Alene, Idaho. ...</i><br />Target victim <b>website</b>: <i>kh.org</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>Law-Offices-of-John-V.-Orrick-P.L.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13919</link>
<guid>c53e912b5f1f9f356348061f065828fa</guid>
<pubDate>Mon, 25 Mar 2024 01:29:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Law-Offices-of-John-V.-Orrick-P.L.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18a2a8b67dd8783ecb7bad2de24ea91c73e77de586e166dac763a2dfca644283</i><br /><br />Threat actor <b>description</b>: <i>he Law Offices of John V. Orrick, P.L. represents clients throughout the Tampa
Bay Area and Florida.  Unlike many large personal injury firms, our firm provides
prompt, individual service to all of...</i><br />Target victim <b>website</b>: <i>https://www.orrickinjurylaw.com/</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pantana-CPA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13920</link>
<guid>714cb7478d98b1cb51d1f5f515f060c7</guid>
<pubDate>Mon, 25 Mar 2024 01:29:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Pantana-CPA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7506c8310eb0b94e9da96f7cdfd70f45b5f94f767e29e35131926c135e9e3b66</i><br /><br />Threat actor <b>description</b>: <i>We take pride in offering exceptional financial services tailored to meet your specific needs. With a team of highly skilled and experienced professionals, we are committed to delivering accurate...</i><br />Target victim <b>website</b>: <i>https://pantanacpa.com/</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>ACS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13917</link>
<guid>03b0db8c971432a5e8d163897176a7cc</guid>
<pubDate>Sun, 24 Mar 2024 14:04:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>ACS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da87c635bb8a58d74822c6680216652b18c702c201ee7f71f8a31740f43ee06b</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : no - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Title-Management-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13912</link>
<guid>69f00c668860dd2a02c612891ddc762d</guid>
<pubDate>Sat, 23 Mar 2024 22:21:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>raworld</b> claims attack for <b>Title-Management-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>951eb4022c348f5b3bd6b0e6b6dcf76549f9d9d9b5a9cd7323bb3a58d95424fc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>raworld</category>
</item>
<item xmlns:dc='ns:1'>
<title>Impac-Mortgage-Holdings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13910</link>
<guid>e60eb4c0fcedab496bcf7fb6d240dd42</guid>
<pubDate>Sat, 23 Mar 2024 19:45:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Impac-Mortgage-Holdings</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>80cf71b75b50e65d3cdeb1541fd0c46fe9f70cb8a632ca3342bf669c016ef546</i><br /><br />Threat actor <b>description</b>: <i>Impac Mortgage Holdings, founded in 1995 and located in Irvine, California, provides mortgage lending, warehouse lending solutions. Impac Mortgage Holdings corporate office is located in 19500 Jamboree Rd, Irvine, California, 92612, United States and has 672 employees. The amount of data leakage is 592,2 GB.</i><br />Target victim <b>website</b>: <i>https://www.impaccompanies.com/</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chambers-Construction-Co.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13906</link>
<guid>19df34e5a4cbdb9c7a41acd3fbd71222</guid>
<pubDate>Fri, 22 Mar 2024 13:52:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Chambers-Construction-Co.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>564cc46bd05d5e17a657e8218266094a77c158498cdaf7558dc392a3107588ba</i><br /><br />Threat actor <b>description</b>: <i>Chambers Construction is a construction company specializing in commercial, residential, healthcare, public, and industrial projects. The company is headquartered in Eugene, Oregon and was founded in 1955.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>newagesys.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13904</link>
<guid>55a8ecfc025a6e4340701d18354d8235</guid>
<pubDate>Fri, 22 Mar 2024 13:26:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>newagesys.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc37748d56d5f08ec729ace97c190a2b775d37ba336d3718bc5bb466fa8e7275</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/NEWAGESYS/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/NEWAGESYS/PROOF/DATA DESCRIPTIONS: Accounting\payroll\tax documents, HR data, Personal Identifying information, background reports, corporate correspondence\mailbox backups, employees personal folders, etc. </i><br />Target victim <b>website</b>: <i>newagesys.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>excellifecoaching.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13896</link>
<guid>9ffafdbde2567d33a37c9a2edb70052e</guid>
<pubDate>Thu, 21 Mar 2024 18:30:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>excellifecoaching.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ac0b4f238b4938de19740e2fb018c362dc3e70118ce73eaa87064ccaca620cd</i><br /><br />Threat actor <b>description</b>: <i>We have extracted the whole database. WP plugins data, theme, WooCommerce data etc.                        We have also logged out administrators for security reason and changed password.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Henry-County-Illinois</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13887</link>
<guid>78e005de0c4a9c8ec257bd34181a9923</guid>
<pubDate>Thu, 21 Mar 2024 16:23:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Henry-County-Illinois</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f45734b4100b08e8ae0073b26d30ff247e8796bfeebac0333cea17c7c5022ff1</i><br /><br />Threat actor <b>description</b>: <i>Henry County, Illinois is located in Northwestern Illinois, just 16 miles from the Mississippi River dividing Illinois and Iowa. Henry County's population in 2000 was 51,020, with the county covering 823.21 square miles. Henry County, Illinois office is located in 307 W Center St Rm 198, Cambridge, Illinois, 61238, United States and has 185 employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Suburban-Surgical-Care-Specialists</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13850</link>
<guid>d3f010d6bc392b904f63ce5792891b71</guid>
<pubDate>Wed, 20 Mar 2024 23:48:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Suburban-Surgical-Care-Specialists</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0abadc8b279aad35d80efdeaccb902307a772494137850507ea2cfb940316981</i><br /><br />Threat actor <b>description</b>: <i>Suburban Surgical Care Specialists - a medical center specializing in all types of surgical intervention. Suburban Surgical Care Specialists corporate office is located in 4885 Hoffman Blvd Ste 400, Hoffman Estates, Illinois, 60192, United States and has 45 employees.</i><br />Target victim <b>website</b>: <i>https://www.suburbansurgicalcare.com/</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>MarineMax</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13849</link>
<guid>9a5859b8f76280c97c0c185a19d17014</guid>
<pubDate>Wed, 20 Mar 2024 22:53:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>MarineMax</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a21106e732eda9ec8e447e8eba8bcc33941f76bbb2bb0eb700c04d204c99d94</i><br /><br />Threat actor <b>description</b>: <i>MarineMax</i><br />Target victim <b>website</b>: <i>https://www.marinemax.com/</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>igf-inc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13848</link>
<guid>f1e1fd9e97f59379ed79bdf258d55042</guid>
<pubDate>Wed, 20 Mar 2024 17:25:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>igf-inc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>080361039f3293600427577ff54cee9b12a380c77ae033204e029ed805c83ba3</i><br /><br />Threat actor <b>description</b>: <i>IGF services a variety of food industry businesses throughout the Mid-Atlantic, Southeast, and Midwest United States via all-temperature trucks. Our customers include restaurants, gourmet markets, clubs, caterers, bakeries, breweries, wineries, and hotels. With low order minimums, late order cut offs, and knowledgeable service, IGF makes customers its top priority. Established in 1987, International Gourmet Foods leads in wholesale distribution of gourmet specialty food products, providing high quality, innovative items from around the world. In addition, IGF carries a vast selection of expertly sourced commodity items with excellent value. IGF was founded by Maurizio DiBenigno in 1987. A life-long passion for quality products, fine tasting foods, and a wealth of experience in the food service industry inspired the principles on which Maurizio has built this company. His commitment to the needs and desires of his clients and his determination to source products of quality and value built the reputation of IGF as one of the premier gourmet food import and distribution companies in the industry. From its conception, IGF was and still is a family-owned and operated business founded on solid values and guiding principles that we continue to grow and develop. In December of 2019, Christine DiBenigno became president of IGF after 19 years of experience in the company. She and Maurizio continue to expand the company vision of not only quality food and excellent service, but also growing and enriching a diverse employee base. On March 29, 2021, IGF broke ground on a new state-of-the-art facility in Woodbridge, Virginia. This new central headquarters is scheduled to open in 2022.SITE: www.igf-inc.com Address : 7520 Fullerton Rd. Springfield, VA, 22153 Unated StatesALL DATA SIZE: ~155gb 1. Personal employees documents 2. HR 3. Financial Tax Payroll data and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>logistasolutions.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13847</link>
<guid>b2f1384b8feb04d2de9a85124dc64613</guid>
<pubDate>Wed, 20 Mar 2024 17:25:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>logistasolutions.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8fa02733b0382ff5539a54f42937f198ea58865e6453b48e8a591668496ba53</i><br /><br />Threat actor <b>description</b>: <i>Logista Solutions From our founding in 1983, Logista has grown to be a nationally recognized leader in a broad range of technology management solutions. Today, Logista Solutions is one of the largest technology support providers in the United States. We are trusted by Fortune 1000 corporations and vertical market leaders to provide innovative and structured IT support solutions and systems integration.SITE: www.logistasolutions.com Address : 5911 Greenwood Pkwy, Bessemer, Alabama, 35022, United StatesALL DATA SIZE: ~455gb 1. Department Data 2. Users Data 3. Personal employees information 4. Personal documents and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>oceaneering.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13846</link>
<guid>9c25dc28b94e5226f1983330dc421cec</guid>
<pubDate>Wed, 20 Mar 2024 17:25:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>oceaneering.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f4d493ee9ee81a545020b443454fcafaa5f822de1dcd303f4e8447e3039dddf6</i><br /><br />Threat actor <b>description</b>: <i>Oceaneering provide engineered services and products primarily to the offshore energy industry. Today, we also use applied technology expertise to serve the defense, entertainment, material handling, aerospace, science, and renewable energy industries.SITE: www.oceaneering.com Address : Oceaneering International, Inc. 5875 N. Sam Houston Pkwy. W. Suite 400. Houston, Texas, 77086 USAALL DATA SIZE: ~300gb 1. Company data files, financial data 2. Drawings & Engeneering 3. Users personal folders and docs 4. Confidential agrements, dwg files & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kolbe-Striping</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13845</link>
<guid>4c0303ffb193bd5e66078909a15268aa</guid>
<pubDate>Wed, 20 Mar 2024 08:47:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Kolbe-Striping</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a206a88e1c5063f6b4bb914b8cd3530027396969c739825afb778a9d2d8e434</i><br /><br />Threat actor <b>description</b>: <i>Kolbe Striping Kolbe Striping offers both durable and lasting pavement marking as well as temporary markings designed to suit your needs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Springfield-Sign</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13842</link>
<guid>ebd58b8a3f1d72f4206201da62fb1204</guid>
<pubDate>Wed, 20 Mar 2024 07:16:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Springfield-Sign</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c4cc506b81f36a62b8182d13be433e12312c5d61a62d658466cfd96a2c984513</i><br /><br />Threat actor <b>description</b>: <i>Springfield Sign is a full-service signage company that designs, manufactures, installs and maintains professional custom signage.https://www.springfieldsign.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Accipiter-Capital-Management-LLC-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13831</link>
<guid>aba2b11d01c3742d77a4391276731579</guid>
<pubDate>Tue, 19 Mar 2024 21:14:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Accipiter-Capital-Management-LLC-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2cbec2ce29739b3fe378a62257a9d061c2c22c769d128716a088d10db1f686a4</i><br /><br />Threat actor <b>description</b>: <i>Accipiter Capital Management, LLC is a large advisory firm based in Palm Beach Gardens. It manages $119.36 million of regulatory assets for 1 client accounts. It has been registered with the SEC as an adviser since 2012 and has operated in the jurisdictions of Florida, New Jersey, and New York.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Urban-Strategies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13832</link>
<guid>2d8fe42de2f833581faa077f788329fa</guid>
<pubDate>Tue, 19 Mar 2024 21:14:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Urban-Strategies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>05ac0b73a1d60e0abe493ca785b65f6f0bd7dc5a7007cc539b52fbc8d1d1334f</i><br /><br />Threat actor <b>description</b>: <i>Urban Strategies is a social enterprise that delivers transformational outcomes in hard to reach communities. Urban Strategies corporate office is located in 1918 W Van Buren St Bldg G, Phoenix, Arizona, 85009, United States and has 55 employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jasper-Dubois-County-Public-Library</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13833</link>
<guid>08b94fd98ee63a60c5d191649dcfe29a</guid>
<pubDate>Tue, 19 Mar 2024 19:30:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Jasper-Dubois-County-Public-Library</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>760b340c85b353a46138f2717cc538709edf421af376eb61a106dc5437e45627</i><br /><br />Threat actor <b>description</b>: <i>Jasper-Dubois County Public Library.</i><br />Target victim <b>website</b>: <i>www.jdcpl.us</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Therapeutic-Health-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13787</link>
<guid>c81ef80ecde3d941d129c74e91d91d0b</guid>
<pubDate>Tue, 19 Mar 2024 17:43:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Therapeutic-Health-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>576e84e16a82f17283ffab77448975cf490a40b804b75fd1d41da4e8b55e3b1b</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.ths-wa.org</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Delta-Pipeline</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13789</link>
<guid>55c11616b1aeb14d5166f02b07e17eb7</guid>
<pubDate>Tue, 19 Mar 2024 14:47:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Delta-Pipeline</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>59d0c3dfd57d3c64fc7dce93d935ca1776ebc83efbd874070b01986358b58a4b</i><br /><br />Threat actor <b>description</b>: <i>Delta Pipeline is an industry leader in underground pipeline construction. Established in 1991, Delta Pipeline is a 100% employee owned company (ESOP) with a huge emphasis on employee growth.</i><br />Target victim <b>website</b>: <i>deltapipeline.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mayer-Antonellis-Jachowicz--Haranas-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13835</link>
<guid>51e2038e383ecfc953bf1ab5a0747c63</guid>
<pubDate>Tue, 19 Mar 2024 13:19:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Mayer-Antonellis-Jachowicz--Haranas-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d06a7d8902ca651c1d999a9cf0418bdfa7106642f8257b915aeeedb4b8658c8b</i><br /><br />Threat actor <b>description</b>: <i>The Massachusetts law firm of Mayer & Haranas, LLP represents businesses, individuals, banking institutions and others in a wide variety of legal matters. The law firm's experienced lawyers specialize in Massachusetts business law, divorce, employment law and real estate law.</i><br />Target victim <b>website</b>: <i>www.hkwg.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>PB-Capital-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13836</link>
<guid>bbc4cd33ff8bc2cfdff66557dbd84a85</guid>
<pubDate>Tue, 19 Mar 2024 13:18:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>PB-Capital-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7108e3e37ef620f48e9f0fd857a4615d3a4c197e7ce3a9a31b95250fc64de488</i><br /><br />Threat actor <b>description</b>: <i>P&B Capital Group provides respectful, compliant, and reliable debt collection services for creditors.</i><br />Target victim <b>website</b>: <i>pandbcapitalgroup.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dr.-Leeman-ENT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13782</link>
<guid>5655cf23be4dda7082c8bb3a8d8f8016</guid>
<pubDate>Tue, 19 Mar 2024 02:47:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Dr.-Leeman-ENT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ca1362d2be87d30e02c165c81a797ac3ae86dde1d83c67f96d6ec10e5d0b45a</i><br /><br />Threat actor <b>description</b>: <i>At Dr. Leeman ENT, we offer outstanding care in ENT procedures to cosmetic surgery. We focus on state-of-the-art and modern techniques to give you the best results possible. Dr. Leeman has served the Austin area since 2000 and has always strived to treat every patient with respect and care.</i><br />Target victim <b>website</b>: <i>drleeman.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Butler-Lavanceau--Sober</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13837</link>
<guid>c55c6eea07345c455a100597687a61d2</guid>
<pubDate>Mon, 18 Mar 2024 21:18:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Butler-Lavanceau--Sober</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c2b9e8785b3ac237276d9f50f5494b0b9cb27a821d1b8d323cb9baead043a41f</i><br /><br />Threat actor <b>description</b>: <i>Butler, Lavanceau & Sober, LLC is a certified public accounting firm centrally located in Columbia, Maryland. Our seasoned accountants have over 200 years of combined expertise and are ready to meet your individual and business accounting, tax, and consulting needs.</i><br />Target victim <b>website</b>: <i>www.blscpafirm.com</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sun-Holdings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13779</link>
<guid>5499e63224605f2eb13406af0af5b76d</guid>
<pubDate>Mon, 18 Mar 2024 16:22:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Sun-Holdings</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c735071fada1a5dd250d2f527dd6152df1d73b586251177a38841e566c2e76c</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.sunholdings.net/</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>eclinicalsol.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13776</link>
<guid>6968240043185f65f22097299b865f6b</guid>
<pubDate>Mon, 18 Mar 2024 14:57:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>eclinicalsol.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aaf7f81201cc7c7d012aa7110e49d707c1378ee427ca66cea501d9decc1f0918</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/ECS/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/ECS/PROOFDATA DESCRIPTIONS: Thousands of customer data: drug tests, clinical studies and reports, analytical data, corporate correspondence, etc. Database exports. </i><br />Target victim <b>website</b>: <i>eclinicalsol.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>activeconceptsllc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13774</link>
<guid>74707d064c4eeda12c3bf2f1807a7198</guid>
<pubDate>Mon, 18 Mar 2024 13:30:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>activeconceptsllc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b25a72f343e6f0f41e5ce38d75f50b453c027564ca3a7cd05597c34025e5f7cc</i><br /><br />Threat actor <b>description</b>: <i>At Active Concepts, we are aware of how nature can enhance one’s appearance and well-being. As a producer of specialized components for the personal care sector, we collaborate with our clients to discover, create, and implement fresh product concepts in order to help them accomplish their innovation objectives.SITE: www.activeconceptsllc.com Address : 107 Technology Dr, Lincolnton, NC 28092, United StatesALL DATA SIZE: ~1.01tb 1. Accounting 2. Personal employees data 3. HR 4. R&D and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Romark-Laboratories-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13772</link>
<guid>2ff87ef2c8e0ec43f54888b94b9d5d05</guid>
<pubDate>Mon, 18 Mar 2024 06:33:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Romark-Laboratories-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b534b92369d5cf8a64bd8eafcbd9c9012d14e6270e3c708fe6b2d832aae0002f</i><br /><br />Threat actor <b>description</b>: <i>Romark Laboratories was founded in 1993, engaged in the development and supply of new innovative medicines. Romark Laboratories L.C corporate office is located in 3000 Bayport Dr Ste 200, Tampa, Florida, 33607, United States and has 124 employees.</i><br />Target victim <b>website</b>: <i>romark.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>crinetics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13770</link>
<guid>65d141290a7de8a5c5ad8c972e8e6eff</guid>
<pubDate>Mon, 18 Mar 2024 01:25:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>crinetics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ec129da898d56c34ff20f157e53f05da1d6abe4ceed3eda56a2ddfad7e8b339</i><br /><br />Threat actor <b>description</b>: <i>Crinetics is a pharmaceutical company that develops much-needed therapies for people with endocrine diseases. We're here for patients who are eager to find therapies that provide effective disease control and more simplicity in their lives.Note :...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>HUDSONBUSSALES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13761</link>
<guid>0e78a1b0be474c86f804095d2909c141</guid>
<pubDate>Sat, 16 Mar 2024 16:41:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HUDSONBUSSALES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>88061fb3c7a369103c43fdee238f77c15970a839a0ed4b04d55853ae6403663a</i><br /><br />Threat actor <b>description</b>: <i>Hudson Bus Sales - New & Used Bus Sales, Rentals, Sales, Service, and Parts with locations in Cleburne, TX and Orlando, FL</i><br />Target victim <b>website</b>: <i>https://www.HUDSONBUSSALES.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Desco-Steel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13759</link>
<guid>3e3dab60e3a76214aed4a502603e8636</guid>
<pubDate>Sat, 16 Mar 2024 16:31:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Desco-Steel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c9de63ea2fc0e89614a270b48acd2ddfbf215751d995bc120521f1294de4d19c</i><br /><br />Threat actor <b>description</b>: <i>Desco Steel was incorporated in 1991, selling a wide variety of structural steel products. Desco Steel corporate office is located in 270 Lancaster Ave Ste G2, Malvern, Pennsylvania, 19355, United States and has 10 employees.</i><br />Target victim <b>website</b>: <i>descosteel.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Consolidated-Benefits-Resources</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13758</link>
<guid>5fd28170bd0b91d09f02ae9983bc67e6</guid>
<pubDate>Sat, 16 Mar 2024 16:04:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Consolidated-Benefits-Resources</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1cfcc1ab224b2865febf0f999d0af6be18918b005aa061f276dfa1c45d4be9b</i><br /><br />Threat actor <b>description</b>: <i>Consolidated Benefits Resources (CBR) is a claims administrator for Oklahoma workers compensation insurers.</i><br />Target victim <b>website</b>: <i>www.cbrcloud.com</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>hdstrading.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13752</link>
<guid>aded6ee2a29750522670aad156b654bd</guid>
<pubDate>Sat, 16 Mar 2024 14:48:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hdstrading.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b48833e9177dcf0b857d2cf0740208aeefac23b6dfca177bb96e70383619996</i><br /><br />Threat actor <b>description</b>: <i>Established in 2002 HDS Trading Corp is a notable vendor in today's houseware products market. Established on the experience of over 30 years in the retail market, HDS is geared to our buyer's needs in diverse items ranging from kitchen to bath to st...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>certifiedcollection.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13747</link>
<guid>d7f71f28449665f9eefc114e5e7d3e7b</guid>
<pubDate>Sat, 16 Mar 2024 04:20:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>certifiedcollection.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>50decab340b25d5bf534b3d4481330caba324d818b91b3afd7deed5a56307ba6</i><br /><br />Threat actor <b>description</b>: <i>Certified Solutions is a privately held, certified Minority Women Business Enterprise (MWBE) established in New Jersey in 1969. Certified Solutions specializes in accounts receivable management and debt recovery services. Our firm functions as an ext...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Acculabs-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13746</link>
<guid>e2ba9673fc8a4f64bbebfc27f0d73ad2</guid>
<pubDate>Sat, 16 Mar 2024 00:52:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Acculabs-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>afdfcf0694b7af1707d33720245b6cee8012913c337595a8416afb104c62dd72</i><br /><br />Threat actor <b>description</b>: <i>Aculabs, Inc. a full service laboratory, has provided superior quality laboratory testing for over 35 years, and is dedicated to providing serviceof our medical and scientific expertise to meet the...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>ATMCo</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13744</link>
<guid>035eb76e8e1199879473db82502d31dc</guid>
<pubDate>Fri, 15 Mar 2024 16:19:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trigona</b> claims attack for <b>ATMCo</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>72e5d3a58d58faa17aa766be48f7ca309c40f8aa4bc064df6c30f84d0331ebcb</i><br /><br />Threat actor <b>description</b>: <i>       ATMCo is a reputable tax management company based in Broken Arrow, Oklahoma. With a commitment to simplifying tax-related processes for businesses and individuals, ATMCo offers comprehensive services in tax preparation, bookkeeping, and accounting. Company is headquartered at 2220 W Houston St Ste A, Broken Arrow, Oklahoma. Situated in a convenient location, the company is easily accessible to clients seeking professional tax management services.</i><br />Target victim <b>website</b>: <i>https://www.atmco.net/</i>]]></description>
<category>trigona</category>
</item>
<item xmlns:dc='ns:1'>
<title>South-St-Paul-Public-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13742</link>
<guid>bbfac18d2edb930651d866f44fcfcb62</guid>
<pubDate>Fri, 15 Mar 2024 11:48:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>South-St-Paul-Public-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34a7c7b84ad6475d9159d8fcdac6a5e4e1139f86760179eed5dd1ae1d2551e36</i><br /><br />Threat actor <b>description</b>: <i>South St Paul Public Schools is a company that operates in the Education industry. It employs 251-500 people and has $25M-$50M of revenue.</i><br />Target victim <b>website</b>: <i>http://www.sspps.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>worthenind.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13735</link>
<guid>bcb91d59186aa1e622116246fc3fe62c</guid>
<pubDate>Fri, 15 Mar 2024 00:01:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>worthenind.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7982fb58862d07124bbfe1d4dc42c5211f00442f39914d53ba0aff4be1420b5f</i><br /><br />Threat actor <b>description</b>: <i>At Worthen Industries, we manufacture specialty adhesives, coatings, coated products, and thermoplastic extrusion for dynamic markets. But we specialize in sustainable innovation—by applying technology, green chemistry, and customer-first approach to...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>rushenergyservices.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13736</link>
<guid>9c156653d889d37811915236feed8660</guid>
<pubDate>Fri, 15 Mar 2024 00:00:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>rushenergyservices.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>32f5ecf54ecd331b917fee6219474120aa171c49fc872a9b442ef0043dff9f6a</i><br /><br />Threat actor <b>description</b>: <i>Rush Energy Services Inc. develops a network of crude oil custom treating and water management facilities throughout Western Canada. We are investigating numerous opportunities with Canadian producers and mid-streamers for the acquisition and operati...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>mckimcreed.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13734</link>
<guid>8d0edb3d066ad2480d1f7aa966f0fd52</guid>
<pubDate>Thu, 14 Mar 2024 23:59:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>mckimcreed.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97d92cf12e110c65989386664db560f0d95281f155049f35aec0653ca721de45</i><br /><br />Threat actor <b>description</b>: <i>Family. And we treat our clients, and each other, like family. Employee-owned engineering and surveying firm with offices in North Carolina, South Carolina, Florida, Georgia, Virginia, Texas, Pennsylvania & Louisiana.You can contact the main syst...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>moperry.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13732</link>
<guid>934535dc581e59cf47d5121fb1fe4186</guid>
<pubDate>Thu, 14 Mar 2024 17:52:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>moperry.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3b27759ce7b4ad4ae29e2eaae830e4d5112d701e87b03d8ca86a6c841709b993</i><br /><br />Threat actor <b>description</b>: <i>M&O Perry IndustriesEngineered for the World – Designed for YouOur story began in the late 1940s America when two pharmaceutical scientists in New York discovered how to accurately dose penicillin powder using vacuum and pressure. They called the...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>dhanisisd.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13730</link>
<guid>8d97f450424ddf6448b7efe4159d2aa6</guid>
<pubDate>Thu, 14 Mar 2024 13:16:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>dhanisisd.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e54782ac1a008b5b346382ffe7f2c1ebd446936fa3774021968f2e19213e68b5</i><br /><br />Threat actor <b>description</b>: <i>D'Hanis Independent School District is a public school district in Texas.You can contact the main system administrator on the contacts below, waiting for an answer can take some time from 1 minute to several days depending on the workload.Conta...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>yarco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13724</link>
<guid>e1e4fdbce97bad3d9230fb606165dc1b</guid>
<pubDate>Thu, 14 Mar 2024 08:48:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>yarco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b3c33cbe386fe3d48bd8c67ac5e4975aad50da9aad9f9f1d0c39c0eea8865d9c</i><br /><br />Threat actor <b>description</b>: <i>yarco.com 1.9Tb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>McKim--Creed-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13723</link>
<guid>3f9f19645d91da25c3dc1ae235999cc4</guid>
<pubDate>Wed, 13 Mar 2024 23:53:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>McKim--Creed-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d19dcd71bbead3befdb19a1aa97e0fccd6a418a955c46a29e1ff4c6f8a9d2bb7</i><br /><br />Threat actor <b>description</b>: <i>Visits: 62 Data Size: 500+ GB Published: False</i><br />Target victim <b>website</b>: <i>www.mckimcreed.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Summit-Almonds</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13721</link>
<guid>15501c5743a5376e7556886714f1d36f</guid>
<pubDate>Wed, 13 Mar 2024 19:16:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Summit-Almonds</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>daefcf15768f667f66d73beff9716365cd7a335f38e9cea56f2b4befb8cc4c3e</i><br /><br />Threat actor <b>description</b>: <i>Summit Almonds assists California almond, walnut and othertree nut growers and handlers in marketing high quality almonds at prices to our partners and end users around the world. 33Gb of data will be released here. Personal docs, NDAs, forms with personal information and a DB with more than 10000 lines of phones and emails.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Encina-Wastewater-Authority</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13720</link>
<guid>030586fa78fc1abdba85da161d943b08</guid>
<pubDate>Wed, 13 Mar 2024 17:19:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Encina-Wastewater-Authority</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5101baa2071648db0e8a9b6df89b16b55356991f9d0c21a90382f9e2a4290968</i><br /><br />Threat actor <b>description</b>: <i>The Encina Wastewater Authority (EWA) is a public agency located in Carlsbad, California. EWA provides wastewater treatment services to more than 400,000 residents in northwestern San Diego County. EWA's facilities and services are essential for protecting the local ocean environment, preserving public health, and providing valuable water resources for the region. EWA is owned by six public agenci</i><br />Target victim <b>website</b>: <i>https://www.encinajpa.com/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>Judge-Rotenberg-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13719</link>
<guid>b4eb391ccdb1a22629fbf8a3b7950cb9</guid>
<pubDate>Wed, 13 Mar 2024 11:55:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Judge-Rotenberg-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de5903fdcca310052995c70d685775667202dd2dba4b69fb09b09f3a76ff9f0d</i><br /><br />Threat actor <b>description</b>: <i>The JUDGE ROTENBERG CENTER (JRC) is a special needs day and residential school located in Canto</i><br />Target victim <b>website</b>: <i>http://judgerc.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>QEO-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13708</link>
<guid>a0f1a0686c4ecffbf795ea2d2a42817e</guid>
<pubDate>Tue, 12 Mar 2024 23:48:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>QEO-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>184275afe8dadea1e5cd04bf387b2b61dc139ab496be55aa800d4054ce79c122</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.qeo.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kenneth-Young-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13701</link>
<guid>bb9caf96076d335da9c6d368c385dcd3</guid>
<pubDate>Tue, 12 Mar 2024 13:26:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Kenneth-Young-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19c89f1f1b4ffa19499ebba2cd9533d656fa00f9d5d6309ccc9bc0ed0b1961eb</i><br /><br />Threat actor <b>description</b>: <i>Kenneth Young Center is a community-based non-profit, comprehensive provider of mental health and senior citizens' support services. Kenneth Young Center corporate office is located in 1001 Rohlwing Rd, Elk Grove Village, Illinois, 60007, United States and has 200 employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>sunholdings.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13700</link>
<guid>ccbaefcc48cd5f8ec9309165ea694eb2</guid>
<pubDate>Tue, 12 Mar 2024 13:24:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>sunholdings.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f0ce02a9ee03247b3fe7cb62d563c055e5cd668e938a7338184fa7d17ee2de0</i><br /><br />Threat actor <b>description</b>: <i>RMH Franchise, founded in 2012 and headquartered in Atlanta, Georgia, operates as a franchisee of chain restaurants. The Company offers burgers, chicken, steaks, pasta, seafood, and beverages.We have 1.5tb sensitive data.Call me to toxKatie Hec...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>xcelbrands.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13699</link>
<guid>30270b7a8f7d456b15e65e299b5bf199</guid>
<pubDate>Tue, 12 Mar 2024 13:01:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>xcelbrands.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1503212514eaba034fa8a955a2d5c6e44c568f1817ab1691638aff80fe08b6da</i><br /><br />Threat actor <b>description</b>: <i>Xcel Brands Inc is a media and brand management company. It is engaged in the design, merchandising and planning, sourcing and production, licensing, marketing, and brand development. The company offers branded apparel, footwear, accessories, jewelry, home goods, and other consumer products.SITE: www.xcelbrands.com Address : XCEL Brands 1333 Broadway, 10th Floor New York, NY 10018 USAALL DATA SIZE: ~2.5tb 1. Staff folders (personal documents) 2. Accounting 3. Company data 4. HR 5. Executive 6. Private Scan, UserData and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>keystonetech.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13696</link>
<guid>bc264522d8cc7a47fb5e8f606a6013a9</guid>
<pubDate>Tue, 12 Mar 2024 13:01:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>keystonetech.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f2345597eb40e862acb5481bb9ac87d69d700c2d5f17ada6eefce1d0c837992</i><br /><br />Threat actor <b>description</b>: <i>Since our inception in 1945, we’ve been dedicated to belief that lighting should be simple, hassle-free, and enjoyable: Light Made Easy®. We were founded by two WWII vets eyeing the possibilities of fluorescent lighting. We have grown into a company with thousands of SKUs featuring the latest LED and wireless technology. Through it all, we’ve never stopped learning and never stopped reinventing ourselves. We continue to create products with distinctive and intuitive features and back them up with top-notch service. After more than 75 years in business, we remain dedicated to our mission: Light Made Easy.SITE: www.keystonetech.com Address : Keystone Technologies 2750 Morris Rd Lansdale, PA 19446 USAALL DATA SIZE: ~550gb 1. Accounting 2. Financial data 3. HR 4. IT 5. Scans 6. Users folders, personal documents employees & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>dutyfreeamericas.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13695</link>
<guid>a8bf0da1f92e868795401cb281371ed7</guid>
<pubDate>Tue, 12 Mar 2024 13:01:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>dutyfreeamericas.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9a7e2a798cbbb26463095b3e7956b274689c14c5820b7012033af8d86ef7fcd</i><br /><br />Threat actor <b>description</b>: <i>Duty Free Americas (DFA) is the leading travel retailer in the Western Hemisphere offering Duty free-tax free products. DFA operates over 200 stores located in airports and at border crossings offering an extensive selection of world known brands including perfumes, cosmetics, wines, spirits, tobacco, edibles, luxury leather goods, watches, jewelry, sunglasses, and travel exclusive merchandise.SITE: www.dutyfreeamericas.com Address : 6100 Hollywood Blvd, Hollywood, Florida 33024, USTel.# (954) 986-7700ALL DATA SIZE: ~1.5tb 1. Accountings 2. Financial data 3. Human Resources 4. Legal 5. Home folders and Personal users, employees data & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>sierralobo.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13694</link>
<guid>42ae58924107d3be8c6b7b7e3cfd4164</guid>
<pubDate>Tue, 12 Mar 2024 13:01:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>sierralobo.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>98a132d721c0c37a036c0345cb364dab69b16ab12546e28d33fe771618d3cad3</i><br /><br />Threat actor <b>description</b>: <i>Sierra Lobo, Inc. specializes in providing test, evaluation and engineering services to the aerospace sector nationwide. We also offer in-house engineering and R&D services through our Technology Development and Engineering Center (TDEC) in northern Ohio.SITE: www.sierralobo.com Address : 102 Pinnacle Drive Fremont, OH 43420 USALL DATA SIZE: ~1.5tb 1. Accounting 2. Personal employees  documents 3. Payroll 4. Projects and much more…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>creativeenvironments.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13692</link>
<guid>1288625a4bdcf1109ff5adca3bd33753</guid>
<pubDate>Tue, 12 Mar 2024 13:01:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>creativeenvironments.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>68fafc03ee74b45c572db0e06e7daba917d1c401b8b7e25237f9aa86796127b5</i><br /><br />Threat actor <b>description</b>: <i>Creative Environments prides itself in providing cutting-edge professional landscape design services for residential and commercial setting. We build quality outdoor living environments and ensure on-time production, while remaining committed to customer service and customer satisfaction.SITE: www.creativeenvironments.com Address : 8920 S Hardy Dr, Tempe, Arizona, 85284, United StatesPhone Number. (480) 777-9305ALL DATA SIZE: ~2.5tb 1. Accounts 2. Customer Files 3. Human Recources 4. Personal users folders 5. Payroll & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>linksunlimited.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13691</link>
<guid>3cdad14c5d7c1e1fa307772a876b42d7</guid>
<pubDate>Tue, 12 Mar 2024 13:01:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>linksunlimited.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc71c7857ef437a0ab75dcc66b1c7c7e3c4c1ece0a17aa0f15879acb6e59152e</i><br /><br />Threat actor <b>description</b>: <i>Links Unlimited offers a full range of services, from product fulfillment to complete end-to-end solutions for your unique incentive program.SITE: www.linksunlimited.com Address : 1101 Regina Graeter Way, Cincinnati, OH 45216, United StatesALL DATA SIZE: ~500gb 1. Company-Data 2. Users Shared Data 3. Accounting 4. 401k 5. Payrolls 6. Personnel Files & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>imperialtrading.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13690</link>
<guid>a4c07618e910823c1d3d95a2e696e75f</guid>
<pubDate>Tue, 12 Mar 2024 13:01:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>imperialtrading.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b0aff4c6fc79ee81eb1873eb74e844f8298258403ff05a58c659a22ed003ff1</i><br /><br />Threat actor <b>description</b>: <i>C.H. Pelias, a Greek immigrant, founded Imperial Trading in 1916 as a wholesale grocer for independent retail stores in New Orleans. The 3rd generation family business is owned by John Georges and led by President Wayne Baquet, Jr. For over 100 years, our visionary leadership and committed workforce have provided unmatched service and results in the convenience store industry.SITE: www.imperialtrading.com Address : 701 Edwards Ave Elmwood, LA 70123 USATel.# 800-775-4504ALL DATA SIZE: ~500gb 1. Accounting 2. Executive 3. Human Resources & etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brooks-Tropicals</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13689</link>
<guid>9b4192ee086949047cfc64d86d895c2e</guid>
<pubDate>Tue, 12 Mar 2024 11:43:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Brooks-Tropicals</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad820048c517447a554b7db813029017b51bfa9d08b43239e6dd0ef5242bd162</i><br /><br />Threat actor <b>description</b>: <i>Brooks Tropicals Brooks Tropicals grows its popular Caribbean Red papayas in several Caribbean locales.</i><br />Target victim <b>website</b>: <i>brookstropicals.com</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kaplan</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13686</link>
<guid>0b99dab71519032b917dc641cdd7ac5b</guid>
<pubDate>Tue, 12 Mar 2024 05:43:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Kaplan</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d156dcabb7a32a9267c67cb8337f0809aef0a86319f1f71e0b047026ffbac5bf</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://kaplanindustries.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zips-Car-Wash</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13681</link>
<guid>56138186020206c2b1d99be41c8dc9b8</guid>
<pubDate>Mon, 11 Mar 2024 23:46:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Zips-Car-Wash</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>148a72d0e83a7e78c99b303a73d700de7b1f37586b8117ce005da5ed9126f170</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.zipscarwash.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>White-Oak-Partners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13677</link>
<guid>c48eb27d5b0a288f5bbf1545c218e001</guid>
<pubDate>Mon, 11 Mar 2024 19:21:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>White-Oak-Partners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>73348400f1a9fbaff5d28d48e435c4df41f06e2890c669ac122f264419fdcea0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.whiteoakpartners.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ruda-Auto</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13678</link>
<guid>48338c824f561ce12a6f1c33d8ea4125</guid>
<pubDate>Mon, 11 Mar 2024 19:20:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Ruda-Auto</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fddcbea193c8bc4b17422d94f3da7976024468e15458e4a6030b96d3ddd3d6ed</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.rudaauto.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Image-Pointe</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13679</link>
<guid>47817658c89f15d634d488fabe77d4e2</guid>
<pubDate>Mon, 11 Mar 2024 19:20:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Image-Pointe</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dee0e09988d8ca23953d0f2d8176f4f4485fc2623f17dbef10957976cec5cd4a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.imagepointe.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grassmid-Transport</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13674</link>
<guid>c42c101f89ec57e54230d611f74d5ae1</guid>
<pubDate>Mon, 11 Mar 2024 19:19:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Grassmid-Transport</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>84dcf9cdef156d2df6ed7e3df4757746d8472882036ae27b216d794df7ab1f26</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.grassmidtransportinc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>BiTec</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13672</link>
<guid>dfae769c739093f5225cecaf4d5a612f</guid>
<pubDate>Mon, 11 Mar 2024 17:48:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>BiTec</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6c251a5710573c52bcb39c4850363ea27f4c95f845cc05c057aeaea82e13e30</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.bitecsmi.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bridger-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13673</link>
<guid>930473a02d035f62b3c3c2628a284416</guid>
<pubDate>Mon, 11 Mar 2024 17:48:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Bridger-Insurance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1252d54cdd42693e094d4415b843f45c28b3399c660930a9ca8eea4f906bf83a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.bridgerins.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>SREE-Hotels</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13669</link>
<guid>6b18886bc278247582704943f5c66eb9</guid>
<pubDate>Mon, 11 Mar 2024 16:25:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>SREE-Hotels</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a842113330c49e5340373ea9f4a82d0da71ddf881bfa05a70a921860c0fc11cf</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.sree.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Premier-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13666</link>
<guid>bf8af7399db538a24dd5e9ce48e562d2</guid>
<pubDate>Mon, 11 Mar 2024 16:24:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Premier-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8025d18c34eced421fa40e05a1f8713e81629b04bc73c33c45a0d0ed0decbe1e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.premiertechnology.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>plymouth.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13663</link>
<guid>574ebc151c3252c2eb93d6504efdc5ab</guid>
<pubDate>Mon, 11 Mar 2024 13:24:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>plymouth.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>355f5749bca8140c36b0c160fbff18a4b6bed8c92163f70125934c8dee457cdc</i><br /><br />Threat actor <b>description</b>: <i>Download link #1: https://***************.onion/PLYMOUTH/PROOFMirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/PLYMOUTH/PROOFDATA DESCRIPTIONS: Accounting\treasury\taxes 250GB+, HR - payrolls\personal documents\dossiers 150GB+, Customer data - projects\contracts\drawings 90GB+, Engineering\R&D\QA 120GB+, Legal documents 3GB+, corporate correspondence 20GB+, employees' personal folders... Hundreds of Personal Identifying information documents, executive managers personal and corporate documents, engineering database backups, etc.PRICE: $1.5MFILE TREE PRICE: $15K </i><br />Target victim <b>website</b>: <i>plymouth.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>neigc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13661</link>
<guid>676028519e3890cbff8d79635f830913</guid>
<pubDate>Mon, 11 Mar 2024 10:36:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>neigc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c08d98d579d54e507a9994a92e60aa5588ab40a14af2fc6d4e59609ad2201ac9</i><br /><br />Threat actor <b>description</b>: <i>neigc.com 2.9Tb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>NetVigour</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13659</link>
<guid>b5f30ed55c1e0b0c8be8d25edacb6f94</guid>
<pubDate>Mon, 11 Mar 2024 10:16:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>NetVigour</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a65ea967a0ea8e8e4969124c3158fcd03f422ed761f1494eec5efdbcb4d523ed</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.netvigour.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Scadea-Solutions-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13654</link>
<guid>e2d083a5fd066b082d93042169313e21</guid>
<pubDate>Mon, 11 Mar 2024 04:13:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>Scadea-Solutions-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8d383afc06488eb60c46870187a9acaf4b5a48166c7d5c50891b921d271d601</i><br /><br />Threat actor <b>description</b>: <i>Visits: 13 Data Size: 30GB Published: False</i><br />Target victim <b>website</b>: <i>scadea.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lindsay-Municipal-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13646</link>
<guid>0a2b56600097fa2ea81bfc9774f1baaf</guid>
<pubDate>Sat, 09 Mar 2024 17:48:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Lindsay-Municipal-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b37118c576a231d5fc62c50e0fc96c1e4af7e0edd664c671c9fa92eddd1a44d5</i><br /><br />Threat actor <b>description</b>: <i>Lindsay Municipal Hospital proudly serves the Lindsay community and its surrounding areas. LMH is a 26 bed acute care hospital that also hosts a Level IV emergency department, full-service laboratory, and a radiology department offering x-ray, ultrasound, and CT services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Group-Health-Cooperative---Rev-500kk</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13644</link>
<guid>55e2c9d06a7261846e96b8bb2d4e1fe5</guid>
<pubDate>Sat, 09 Mar 2024 14:42:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Group-Health-Cooperative---Rev-500kk</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c63dbe68444775efeb11fa9ed4caf9e8eb7d13746d9979cd92c3b73be147cb05</i><br /><br />Threat actor <b>description</b>: <i>Patient and member data (MRN numbers, SSN numbers, patient ID, DOB, telephone, EMAIL, residential addresses, information about visits, medical history, various Patient Forms, CLINIC NOTE, scans of diagnoses and examinations with personal data, results of various laboratory tests and Lots of other patient information. Financial documents (balance sheets, budgets, PL reports, audits, statements, transaction reports, cashflow, presentations and many other important financial documents) Employees (ssn numbers, residential addresses, DOB, mail, license numbers, scans of personal documents and much more) Partner database, contracts, NDA forms, I Working documentation (drug db, presentation, reports, various government letters/reports and much more) SQL databases (patient database, employee database, participant database), mail correspondence.</i><br />Target victim <b>website</b>: <i>https://ghcscw.com/</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>ACE-Air-Cargo</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13641</link>
<guid>27a5eaafdb88c45dd61732d6a6493421</guid>
<pubDate>Sat, 09 Mar 2024 11:45:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>ACE-Air-Cargo</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de1065b296b9c5daf6697ecb3b1cc1968a59c8b3a179fa4f1edb606437a36a9c</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.aceaircargo.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Watsonclinic.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13640</link>
<guid>080eb9c2c128e1337fcc84d8680f404c</guid>
<pubDate>Sat, 09 Mar 2024 05:51:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>donutleaks</b> claims attack for <b>Watsonclinic.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33d7db946059e10cf32f01fcea2cce169ede57f816c780e9521604194dbb9d4a</i><br /><br />Threat actor <b>description</b>: <i>We starting publishing data related medical company from U.S. they was silent almost a month. Soon here will be posted first pack of data. They was pen-tested by some another us-based company and they found a lot of vulnerability in Watsonclinic active directory network - and 90% of them…</i><br />Target victim <b>website</b>: <i>watsonclinic.com</i>]]></description>
<category>donutleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Continental-Aerospace-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13639</link>
<guid>ad9f2f92fd04851d42d216a6954683c3</guid>
<pubDate>Sat, 09 Mar 2024 00:56:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Continental-Aerospace-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc8269c0f7a9a5c3a5be880b13c5a5fd714897499d97c64c92d9b2f733f8e175</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.continental.aero</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>redwoodcoastrc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13638</link>
<guid>a65eb348fb03103dcd48530b52b996a7</guid>
<pubDate>Fri, 08 Mar 2024 20:39:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>redwoodcoastrc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>763b3203fa5c1967857d0bfab8a0d8069f4cf29d4ba7efe08779bfd669590b35</i><br /><br />Threat actor <b>description</b>: <i>RCRC provides intake, assessment, diagnosis, and coordinates community-based services for over 10,000 children and adults with developmental disabilities in Del Norte, Humboldt, Lake, and Mendocino counties. We work in partnership with many individua...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>PowerRail-Distribution</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13637</link>
<guid>0c48ff739d86fc927eeb6b53379cb782</guid>
<pubDate>Fri, 08 Mar 2024 19:11:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>PowerRail-Distribution</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>257be1f676039fa08e038321c665afd92254ddbaa70ecd2afd83445c141dea3a</i><br /><br />Threat actor <b>description</b>: <i>Originally formed in 2003, PowerRail is a United States-based company, with several locations in various parts of the world.</i><br />Target victim <b>website</b>: <i>http://www.epowerrail.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>PFLEET</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13631</link>
<guid>cb4e345e4246a6264a5050d32e227b79</guid>
<pubDate>Fri, 08 Mar 2024 06:48:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>donex</b> claims attack for <b>PFLEET</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1dd33849c0a20ee86d3ad88017ae16be136476b86102b6173f0867576033b220</i><br /><br />Threat actor <b>description</b>: <i>P-Fleet is a leader in expense and payment management solutions for commercial fleets, including those with owner-operators and in ...</i><br />Target victim <b>website</b>: <i>www.pfleet.com</i>]]></description>
<category>donex</category>
</item>
<item xmlns:dc='ns:1'>
<title>rmhfranchise.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13627</link>
<guid>581c2ccb2333cbefb5909c5b06953f60</guid>
<pubDate>Thu, 07 Mar 2024 23:53:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>rmhfranchise.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97e35216748d983682745ce5051735206ba048f44205833fbc57030c10ddc3d3</i><br /><br />Threat actor <b>description</b>: <i>RMH Franchise, founded in 2012 and headquartered in Atlanta, Georgia, operates as a franchisee of chain restaurants. The Company offers burgers, chicken, steaks, pasta, seafood, and beverages.We have 1.5tb sensitive data.Call me to toxKatie Hec...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-York-Home-Healthcare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13626</link>
<guid>92a795b46873063e419773b4f310fc29</guid>
<pubDate>Thu, 07 Mar 2024 19:25:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>New-York-Home-Healthcare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7bc6613d8f223d742eab7e50b044e1cc7819b2ba7680e3c8c456c3ef7e66fd9</i><br /><br />Threat actor <b>description</b>: <i>New York Home Healthcare strives to provide quality medical equipment and supplies to our customers across the NY metropolitan region.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Palmer-Construction-Co.-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13625</link>
<guid>4375b1899f2a38ba3d4c7d08793325ec</guid>
<pubDate>Thu, 07 Mar 2024 18:44:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Palmer-Construction-Co.-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e670bbf2daa1d3c30d0d5b0a97f7b81fc1601b615ec61bcfa414ea5c1024046</i><br /><br />Threat actor <b>description</b>: <i>Palmer Construction is a design-build, general contractor with a 100% commitment to quality and reliability.</i><br />Target victim <b>website</b>: <i>palmerconstruction.net</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>MainVest</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13617</link>
<guid>88fce63f42b8b78770aae2e70ccb67bc</guid>
<pubDate>Wed, 06 Mar 2024 20:09:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>MainVest</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6fe660382860209983aa430c97cc895938b8a3834be01a0428f368a7cd7c3144</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.mainvest.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Haivision-MCS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13612</link>
<guid>9ff0bbc7c4dde77be85a27a1c5ba6d6c</guid>
<pubDate>Wed, 06 Mar 2024 19:53:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Haivision-MCS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f3876861ba15440db603202cc7be084b9186872142e06d5d44a8503082638f4d</i><br /><br />Threat actor <b>description</b>: <i>Haivision MCS (CineMassive until 2022)focuses on providing highly specialized systems designed to address mission-critical challenges in global security operations centers, joint and tactical operations centers, public safety operations centers, and control rooms. Global Headquarters - 150 Ottley Drive NE Atlanta, GA 30324 United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tocci-Building-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13613</link>
<guid>7da9599ceaa0dd2498d02cc7985f5bde</guid>
<pubDate>Wed, 06 Mar 2024 19:53:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Tocci-Building-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f87dc5b6541f3aff3d40f7546692c528bebbf67da2bd119884d1cd8c6948dc09</i><br /><br />Threat actor <b>description</b>: <i>Tocci Building Corporation, founded in 1985, is one of the construction management firms in New England. Tocci Building corporate office is located in 660 Main St 660, Woburn, Massachusetts, 01801, United States and has 126 employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Renal-Associates-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13615</link>
<guid>f334c47648f6c8f9eb0bc8c416f217a2</guid>
<pubDate>Wed, 06 Mar 2024 19:53:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>American-Renal-Associates-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96fd9e23357884c23d29fb9e807934e647de2761ba3763ea02388f05ca975a08</i><br /><br />Threat actor <b>description</b>: <i>American Renal Associates (part of the Innovative Renal Care (IRC) group of companies) founded in 1999, it provides high-quality care to patients suffering from end-stage kidney disease (ESRD) and other kidney diseases. American Renal Associates corporate office is located in 500 Cummings Ctr Ste 6550, Beverly, Massachusetts, 01915, United States and has 2,127 employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>US-1364-Federal-Credit-Union</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13616</link>
<guid>ea415b5f7047769aac77f70df7226a85</guid>
<pubDate>Wed, 06 Mar 2024 19:52:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>US-1364-Federal-Credit-Union</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab4d42af69dece297ba1f0abd422fe41c2ecc91a24be3fa03052c73e8d71cc43</i><br /><br />Threat actor <b>description</b>: <i>US #1364 Federal Credit Union, founded in 1936, is a local credit union with 5 branches in northwest Indiana. Federal Credit Union corporate office is located in 8400 Broadway, Merrillville, Indiana, 46410, United States and has 73 employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Liquid-Environmental-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13610</link>
<guid>58efa70ac9501993f69ac68489db09ad</guid>
<pubDate>Wed, 06 Mar 2024 18:03:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Liquid-Environmental-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>448048ecf814ee8a146ea7e489381455438f12c51fce0d6a3274e21019585495</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2002, Liquid Environmental Solutions is a full service waste management company. Liquid Environmental Solutions offers liquid and hazardous waste collection, transportation, processing...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Medical-Billing-Specialists</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13606</link>
<guid>4acbedbe977480d19b7b682d4878cae2</guid>
<pubDate>Wed, 06 Mar 2024 14:43:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Medical-Billing-Specialists</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>075817da84a8e598ad6f0c681e102ff9adc90f36a5e4ae978edb803788fe47a8</i><br /><br />Threat actor <b>description</b>: <i>Medical Billing Specialists helps U.S. practices from California to Massachusetts with medical billing solutions and online medical billing software to earn significantly more revenue and reduce expenses. Over 120GB of data will be uploaded here on our blog soon. You will find detailed employees and patients information - addresses, DOB, emails, background checks, phones, correspondence with clients, NDAs and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Biomedical-Research-Institute</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13604</link>
<guid>a77054e9d6c3fb75907aed15140ca1e6</guid>
<pubDate>Wed, 06 Mar 2024 10:20:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Biomedical-Research-Institute</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c11aac4c951262faa03bb074ba6262b6a423f3e1f5b22d77d25a7577746a1e35</i><br /><br />Threat actor <b>description</b>: <i>SALE</i><br />Target victim <b>website</b>: <i>afbr-bri.org</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kudulis-Reisinger-Price</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13602</link>
<guid>d7419ae04f248e5105ac3d0700389775</guid>
<pubDate>Wed, 06 Mar 2024 02:46:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Kudulis-Reisinger-Price</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>caf385a7ba57da5f55c48745c663a12f20ab3a0c817761464845f661a4e2638f</i><br /><br />Threat actor <b>description</b>: <i>Kudulis Reisinger Price represents more credit unions than any other firm in the country. We know the industry from the inside outkrpfirm.com</i><br />Target victim <b>website</b>: <i>krpfirm.com</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>SJCME.EDU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13595</link>
<guid>e30c5701e13a4e6e137d71eb71c416b4</guid>
<pubDate>Tue, 05 Mar 2024 15:25:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SJCME.EDU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7cb79bb6ce44128d8d1571f54f5fd4df85389ad9f9888c2fafb9e726a08bac06</i><br /><br />Threat actor <b>description</b>: <i>Saint Joseph's College of Maine - Maine College + Online Learning</i><br />Target victim <b>website</b>: <i>https://www.SJCME.EDU</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>central.k12.or.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13594</link>
<guid>86f01e5c7135b53cf58b68d44c449156</guid>
<pubDate>Tue, 05 Mar 2024 14:49:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>central.k12.or.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>493a2037175d64f361bc61193a1603bd1844c7f1cd5c9f43b08ebac7131810d6</i><br /><br />Threat actor <b>description</b>: <i>Monmouth Elementary School is a company that operates in the Education industry. It employs 51-100 people and has $10M-$25M of revenue. The company is headquartered in Monmouth, Oregon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Paul-Davis-Restoration</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13587</link>
<guid>efc52ad8c8b25e39ff87d69407971378</guid>
<pubDate>Mon, 04 Mar 2024 22:05:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Paul-Davis-Restoration</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>01de2ccde0bad569e83b6c938b2927a494cba005c8429a21dfb2a671ffddac4f</i><br /><br />Threat actor <b>description</b>: <i>Paul Davis Restoration - founded in 1966, the company currently operates throughout North America (including franchises) and specializes in disaster recovery, restoration and reconstruction.. Paul Davis Restoration corporate office is located in 21 Harvey St, Kingston, Ontario, K7K 5C1, Canada and has 467 employees.</i><br />Target victim <b>website</b>: <i>pauldavis.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Veeco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13588</link>
<guid>49d8e07d99ea659f7b7c42fae98836a1</guid>
<pubDate>Mon, 04 Mar 2024 22:05:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Veeco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a0369635fd7b837662d58e316b91d322cab3c39131d3584050f7bda4e3d3771</i><br /><br />Threat actor <b>description</b>: <i>Veeco is a company that operates in the machinery industry. It employs 11-20 people and has $5M-$10M of revenue. The company is headquartered in Riverside, California.</i><br />Target victim <b>website</b>: <i>www.veeco.com</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>DiVal-Safety-Equipment-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13584</link>
<guid>31c1d3f0e9138ff2f553f8a271dda663</guid>
<pubDate>Mon, 04 Mar 2024 20:53:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>DiVal-Safety-Equipment-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4b54ac15c3b655fc1e446bfb7b5f941dd623f6f2976c1701f4bb095656308ede</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://divalsafety.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>America-Chung-Nam-orACN</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13583</link>
<guid>ad7fe02e59ae7d37c32f8dd238662d0d</guid>
<pubDate>Mon, 04 Mar 2024 16:28:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>America-Chung-Nam-orACN</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>829bd95b9e3585740ed5a2d0d4c8cb7d2e8943588024ee7cad8a20d90fde5b08</i><br /><br />Threat actor <b>description</b>: <i>ACN is one of the world's largest exporters of recovered paper inthe United States, and a leading exporter across the globe in Europe and Asia. We are going to upload their 450Gb of data here soon. You will see operation documents, information about their clients around the globe, contracts, HR files with employees documents and tons of other papers. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>jovani.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13581</link>
<guid>117cdc17fa822afc77008dd9ba74b6af</guid>
<pubDate>Mon, 04 Mar 2024 10:21:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>jovani.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>327212bfb19a248573b98a28dafc7183e30bd06567c8ca5cc8aecc21532359bd</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1983, Jovani Fashion Ltd. has continued to be a fashion leader worldwide. Now entering its 40th year of business, the brand has expanded to include over nine collections in over 2,000 domestic and international stores, including Neiman Mar...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>valoremreply.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13582</link>
<guid>40882bebd317419cfcea3adc3dcfae6c</guid>
<pubDate>Mon, 04 Mar 2024 10:20:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>valoremreply.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>814528df38b3a84bed3fe0edd75e74a1f5452749d042070ae46fe344d3c06375</i><br /><br />Threat actor <b>description</b>: <i>Valorem Reply, part of the Reply Group companies, is a digital transformation firm with innovation, leading-edge technology and deep commitment to exceptional customer experience at the core of who we are. As a trusted Microsoft Partner, we have the...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Martins-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13580</link>
<guid>100f962d991f6846fc9b3e6699ed9b13</guid>
<pubDate>Mon, 04 Mar 2024 10:18:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Martins-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>971ca6fe1e826b19972e54b8574839cbd49229df9782f97f29f8cc645de40c81</i><br /><br />Threat actor <b>description</b>: <i>At Martins Caterers, we are dedicated to creating spectacular events that are perfect for any occasion. For more than 50 years, we have helped individuals, couples, and families throw incredible weddings, bar/bat mitzvahs, corporate events, and more.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eastern-Rio-Blanco-Metropolitan</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13578</link>
<guid>770148201c79c84e752d0b31aebdabc7</guid>
<pubDate>Sun, 03 Mar 2024 17:49:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Eastern-Rio-Blanco-Metropolitan</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ec470fdee56d8ff0523f248b88662080e9513e58a1402737bb526779ed7aab6</i><br /><br />Threat actor <b>description</b>: <i>Eastern Rio Blanco Metropolitan (ERBM) Recreation & Park District is a special district in Rio Blanco County, Colorado that was founded in 1981,in 2008, Meeker Recreation Center was created on its basis.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>THAISUMMIT.US</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13573</link>
<guid>23dc0af4dd299ca63fb05702bf686e6b</guid>
<pubDate>Sun, 03 Mar 2024 17:39:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>THAISUMMIT.US</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b58e93b0ca277e6570caeeadc845c8c6c5031d61bc0a73b60f409362a152254</i><br /><br />Threat actor <b>description</b>: <i>Thai Summit America - World Class Precision Metal Stampings & Assemblies</i><br />Target victim <b>website</b>: <i>https://www.THAISUMMIT.US</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>THESAFIRCHOICE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13574</link>
<guid>96a83c96abbe6d0b40c72b279ebdf76e</guid>
<pubDate>Sun, 03 Mar 2024 17:38:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>THESAFIRCHOICE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d02cd292550c9c2fa4e50314370150f7e7f556e4f5e1ece31c05ff3ff33208b8</i><br /><br />Threat actor <b>description</b>: <i>Home - Safir Law</i><br />Target victim <b>website</b>: <i>https://www.THESAFIRCHOICE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ward-Transport--Logistics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13570</link>
<guid>282ed79347cfc23fc4a700154d671e05</guid>
<pubDate>Sun, 03 Mar 2024 10:21:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Ward-Transport--Logistics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2aeee3ce3f65f1ccf56846e65d304512505f2c407c4d3f9628fcbba1f907456d</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1931, Ward Transport & Logistics delivers obsessive customer service in the form of LTL and Logistics & Brokerage Services. Ward Transport & Logistics is headquartered in Altoona, Pennsylvania. </i><br />Target victim <b>website</b>: <i>wardtlc.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>stockdevelopment.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13566</link>
<guid>4bea9e07f447fd088811cc81697a4d4e</guid>
<pubDate>Sun, 03 Mar 2024 02:53:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>stockdevelopment.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a96ad59f00654479bf3fe55486002dbb03b0614bb40eb49736bcf22085fd970</i><br /><br />Threat actor <b>description</b>: <i>Stock development | Real Estate Company | 1TB Doc</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>aerospace.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13565</link>
<guid>71b10b95017ebdaa1984b0ded4c2a173</guid>
<pubDate>Sat, 02 Mar 2024 21:00:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>aerospace.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f040bafe20fed8bab101ec40300c0616d2d23615161a9504c2b154d91654f0f0</i><br /><br />Threat actor <b>description</b>: <i>The Aerospace Corporation: Who We Are. As an independent, nonprofit corporation operating the only FFRDC for the space enterprise, The Aerospace Corporation performs objective technical analyses and assessments for a variety of government, civil, and...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>unitednotions.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13563</link>
<guid>5276818eded29a652edfb6a40c9308c4</guid>
<pubDate>Sat, 02 Mar 2024 20:57:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>unitednotions.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22fadd54bee421a70d49390e014b92c036e32322b8ee02dbf84f1c7bc718945b</i><br /><br />Threat actor <b>description</b>: <i>unitednotions.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Skyland-Grain</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13552</link>
<guid>cdad431591373e47eba5ab6c984c2b55</guid>
<pubDate>Sat, 02 Mar 2024 01:17:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Skyland-Grain</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a8834d5ceb7a992dd4237f1fe2382d18ed6412576d5f8e52385374ad3c5c3b0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.skylandgrain.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Nuts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13553</link>
<guid>7b0b190604cb556e2a00b412b7156370</guid>
<pubDate>Sat, 02 Mar 2024 01:17:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>American-Nuts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e482f0df204cf88f5f3b0d0f6faf6602a95fbaab5987ee652cfff3a5585367a7</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.americannuts.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>AA-Wireless</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13554</link>
<guid>4a9f57c5dadf5bc6555a2e754ca3cfa7</guid>
<pubDate>Sat, 02 Mar 2024 01:16:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>AA-Wireless</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>68796a592aa734d974282f004b55b2229d5c252478737929cb36205663a94e2f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.aawireless.us</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Powill-Manufacturing--Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13555</link>
<guid>5a1434df03dd6a92adda40a337914256</guid>
<pubDate>Sat, 02 Mar 2024 01:16:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Powill-Manufacturing--Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ea3658e21700bfb1dd531cfc98ebf60016c116638f957cc75a407a8740693e6</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.powill.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Red-River-Title</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13542</link>
<guid>f28c49d8be62973ac7716e0b87dae2f9</guid>
<pubDate>Fri, 01 Mar 2024 23:54:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Red-River-Title</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2919bd6ed31cf800ec76e9beaff42ba09862233cc7929f5703d19126facc4857</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.redrivertitle.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Winona-Pattern--Mold</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13544</link>
<guid>bed827b4857bf056d05980661990ccdc</guid>
<pubDate>Fri, 01 Mar 2024 23:53:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Winona-Pattern--Mold</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>85dba83389ae42b678901fef16cc23b38f661ae8229f7c09b514d2bda90f98d8</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.winonapattern.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Marketon</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13545</link>
<guid>bae00fb8b4115786ba5dbbb67b9b177a</guid>
<pubDate>Fri, 01 Mar 2024 23:52:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Marketon</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ac2e60b9a038e4aeb2e09f6aa4f1b241da1459516c879ad4d9c8307b2546a02</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.marketon.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stack-Infrastructure</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13546</link>
<guid>04ef32630d2b67bf4fe2ef795ec67af9</guid>
<pubDate>Fri, 01 Mar 2024 23:52:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Stack-Infrastructure</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbaa7095a8d038e838177bd267913c80b9b33660be42cfb44a43ea710a2e2102</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.stackinfra.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Coastal-Car</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13547</link>
<guid>2edfb49eafd8d8946543d4504bf90c38</guid>
<pubDate>Fri, 01 Mar 2024 23:51:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Coastal-Car</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2cc68b1dbf7c4d3269ee6f9b398ef38a04f0dfe382048d80c036870291de0579</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.coastalcar.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-Bedford-Welding-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13548</link>
<guid>f73f9ab6a0f3235ab7c4554ea19e09b7</guid>
<pubDate>Fri, 01 Mar 2024 23:51:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>New-Bedford-Welding-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ffae9626c3c1125927e5ebe986c35d5b231a802c1f1014b76dd393b91def26d3</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.nbweldingsupply.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>FBi-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13541</link>
<guid>42a7e8017ab9578358f118300f4720fb</guid>
<pubDate>Fri, 01 Mar 2024 22:32:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>FBi-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eaf369333bfd00e36aa0157fee288c5584bfb4d85121d4aeb26ae6f1ec325545</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.fbiconstruction.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crystal-Window--Door-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13535</link>
<guid>106dcf42d88466444a4f5c6455c4d2ee</guid>
<pubDate>Fri, 01 Mar 2024 19:08:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Crystal-Window--Door-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab72c432ad06f3337539393551699f966837049b58d0c83021078946d3039044</i><br /><br />Threat actor <b>description</b>: <i>Crystal Window & Door Systems, LTD is a manufacturer of windows and door systems for commercial and residential buildings. The company was founded in 1990 and is headquartered in Flushing, New York.</i><br />Target victim <b>website</b>: <i>crystalwindows.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gilmore-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13536</link>
<guid>a3d2924150c8fc0c437925e9bc080941</guid>
<pubDate>Fri, 01 Mar 2024 19:07:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Gilmore-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56c9b1a59dd78192d864416d20340f3e5bd921a043cf6abffccec7b4e827c7d5</i><br /><br />Threat actor <b>description</b>: <i>For over three decades Gilmore Construction has completed millions of square feet of wood framing here in Southern Nevad</i><br />Target victim <b>website</b>: <i>http://www.gilmorelv.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gansevoort-Hotel-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13534</link>
<guid>4204dc3a11678c6b1d0be57cfe0a21b0</guid>
<pubDate>Fri, 01 Mar 2024 17:01:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Gansevoort-Hotel-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0cdeabfe5934cc786c17e2c9f120e59ac4e38db7983925af41e16b4e770eebf2</i><br /><br />Threat actor <b>description</b>: <i>Gansevoort Hotel Group delivers hotels that marry the best of thelocal neighborhood with prominent art, design, tech and local heritage as well as our brand legacy. Passports, driver licenses, insurance cards, SSNs and other data will be available here.</i><br />Target victim <b>website</b>: <i>www.gansevoorthotelgroup.com</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gilmore--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13528</link>
<guid>ec62f93b5e03666fe7429882aa7c0207</guid>
<pubDate>Thu, 29 Feb 2024 22:20:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Gilmore--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2260c055df2bc371f268a14cd686ad09a2e4dbebddab7ec8f585994fa1ef619d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.gilmore-assoc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Allan-Berger--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13527</link>
<guid>1b4219720cc03460e2e65140f5bad4db</guid>
<pubDate>Thu, 29 Feb 2024 20:41:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Allan-Berger--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2286951a391289e70a96fbdcb6d449fab8b877519eed72fcf511fde53ccc75e</i><br /><br />Threat actor <b>description</b>: <i>Over the past four decades, Allan Berger has established himself as one of the region’s most preeminent personal injury law attorneys. With a diverse team of experienced attorneys and specialized support staff, Allan Berger & Associates in New Orleans has a proven record of obtaining multi-million dollar verdicts and settlements for its clients. Since 1974, Berger has been an advocate for the people of Louisiana in all aspects of personal injury law. AB&A represents injured victims and their families primarily in the areas of auto accidents, pharmaceutical litigation, medical malpractice, products liability and offshore injuries.</i><br />Target victim <b>website</b>: <i>https://www.bergerlawnola.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Faison</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13523</link>
<guid>58a64841d710f8f56ebebb6aeba57a98</guid>
<pubDate>Thu, 29 Feb 2024 19:09:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Faison</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b040c0b940ccc008bf54f2ee4a7d50d2b97068ce427947045e0cd4edfc9a0b1</i><br /><br />Threat actor <b>description</b>: <i>Faison is a private real estate investment firm with a strong legacy that dates to the 1970s. </i><br />Target victim <b>website</b>: <i>www.faison.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Artissimo-Designs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13525</link>
<guid>aec3d6abde16f9aad1970fad0fed2cb3</guid>
<pubDate>Thu, 29 Feb 2024 19:09:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Artissimo-Designs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f75466a110e2397a704d96f1dfb3228e4257e199256e57d73f8a0df65f86ab2a</i><br /><br />Threat actor <b>description</b>: <i>Artissimo Designs is a leading manufacturer of ready to hang wall art offering canvas paintings, and including Acrylic, Glass, Metal, Shadowboxes,Wood art. Artissimo Designs is located in California.</i><br />Target victim <b>website</b>: <i>artissimodesigns.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Array-Networks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13522</link>
<guid>468cbac056133a996283cca7e2976336</guid>
<pubDate>Thu, 29 Feb 2024 15:07:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dunghill_leak</b> claims attack for <b>Array-Networks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2bf84f4ca329b6e1c8d5f3ef352b2d6d018bff455007bab8cde960a1c2657b68</i><br /><br />Threat actor <b>description</b>: <i>Array Networks is an American networking hardware company. It sells network traffic encryption tools. Was founded in 2000 by Lawrence Lu and is based in Milpitas, California. It received funding from the venture capital firm U.S. Venture Partners and the private equity firm H&Q Asia Pacific. On May 13, 2009, Array Networks became the first non-Taiwan company to be listed on the Taiwan Stock Exchange. The company sold 54 million shares that had a total value of about $79 million. In 2009, 43% of the company's market share was in China, and its main product type sold there consisted of SSL VPN devices.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dunghill_leak</category>
</item>
<item xmlns:dc='ns:1'>
<title>goodinabernathy.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13521</link>
<guid>f2a58d530f82792e08c9ffb0e7f0ee1f</guid>
<pubDate>Thu, 29 Feb 2024 14:23:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>goodinabernathy.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1373ed7560bb1c718c32601ebb6d599e93cec6c903f0dc977c293d0bdcfc838f</i><br /><br />Threat actor <b>description</b>: <i>Indianapolis Law Firm Goodin Abernathy LLP – Aggressively representing Indiana clients Since 1984 – with a strong focus on Personal Injury, Workers Comp & Employment LawSITE: www.goodinabernathy.com Address : 301 E 38th St, Indianapolis, IN 46205ALL DATA SIZE: ~455gb 1. Personal employees data 2. Confidential Agrements 3. Cases data 4. Company + Users data folders and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>haas4.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13518</link>
<guid>f419f44d19be2787d4830e3bd79dd43f</guid>
<pubDate>Thu, 29 Feb 2024 14:23:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>haas4.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc1a24eaf82ead3bf7a297dd618c2dc517e956452b147f4331eeaa7b8d793a5c</i><br /><br />Threat actor <b>description</b>: <i>Haas Inc. is an experienced concrete, aggregate, excavation and trucking company in Central Wisconsin. For more than 55 years we have been a proud family owned business.SITE: www.haas4.com Address : 203 E. Birch St Thorp, WI  54771 USAALL DATA SIZE: ~498gb 1. Company data 2. Personal employees data 3. projects 4. Confidential documents and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>alanritchey.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13517</link>
<guid>088d6dc6ddb3113e9b902711ccdfafef</guid>
<pubDate>Thu, 29 Feb 2024 14:23:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>alanritchey.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19b869c2b2f603c0757c038d38e7cdd78f0ca81a43ffe23c58c74195948fc4eb</i><br /><br />Threat actor <b>description</b>: <i>Alan Ritchey, Inc. (ARI) is a family owned and operated, multi-industry company that provides services to the government, industrial, agriculture, energy and transportation sectors. We have been serving other businesses for over 50 years. The ARI logo can be seen from the Atlantic to the Pacific. Our mission is to provide experienced personalized solutions while offering an unparalleled combination of quality, service, reliability and value that allow our clients to achieve their goals.SITE: www.alanritchey.com Address : 740 S Frontage Rd Valley View, Texas 76272-9733 Unated States 940-726-3276 800-877-0273ALL DATA SIZE: ~255gb 1. USERS 2. Accounting 3. Legal 4. HR Files and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>sunharbormanor.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13512</link>
<guid>01788bf6c7a271a78202e93a3d90aa46</guid>
<pubDate>Thu, 29 Feb 2024 10:12:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>sunharbormanor.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2417a39ecab9e9054e3bcfa620c7376f1fd903d7cdb3caa4300745b4a8ae98de</i><br /><br />Threat actor <b>description</b>: <i>sunharbormanor.com 91Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>HSPG--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13511</link>
<guid>3c252fa14f21be6264aa55a74246f4d1</guid>
<pubDate>Thu, 29 Feb 2024 09:08:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>HSPG--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f24a3eedab8e3937008ef0353be480b3dcc5874e88b0d6cebe8ba0a78e429b4d</i><br /><br />Threat actor <b>description</b>: <i>180 GB , 205,877 Files, 25,598 Folders of confidential information has been moved to our servers.database backups Professional Tax Software - Tax Preparer Software - Intuit ProSeries</i><br />Target victim <b>website</b>: <i>www.hspgcpas.com</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Essential-Labs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13499</link>
<guid>4d230b683bf9840553ae57f4acc96e81</guid>
<pubDate>Thu, 29 Feb 2024 04:15:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Essential-Labs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e464bd0b7b2f8830d04589de28bb9bb6fac3b9cbc7e8ccd4fd02c1a31afd12c</i><br /><br />Threat actor <b>description</b>: <i>Essential Labs, located in the Pacific Northwest, is a premium natural and organic personal care formulating, contract manufacturing and contract packaging company.ewlnatural.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>easternshipbuilding.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13494</link>
<guid>c87ee42d00306dcb6264ceda372b8a47</guid>
<pubDate>Wed, 28 Feb 2024 21:01:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>easternshipbuilding.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>74843f31882db6ff95dcf38975319998a0e70ed7ed9f25926d77e30c56b43e70</i><br /><br />Threat actor <b>description</b>: <i>Eastern’s original shipyard was established in 1976 for the purpose of constructing commercial fishing boats for the company’s founder and President, Brian R. D’Isernia. As the owner of a fleet of commercial fishing vessels, Mr. D’Isernia ventured in...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>J-A-Piper-Roofing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13493</link>
<guid>75764a6c5b5f3007d5f6addf322fa7f1</guid>
<pubDate>Wed, 28 Feb 2024 20:59:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>J-A-Piper-Roofing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6aa6591700fa7eed839b7cd855f1604707af310639529e55db6f847d80473d2b</i><br /><br />Threat actor <b>description</b>: <i>J.A. Piper Roofing has been providing professional, commercial roofing services and sheet metal work in the Upstate for over 100 years.</i><br />Target victim <b>website</b>: <i>http://www.piperroofing.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>etairoshealth.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13491</link>
<guid>61940b7bc12af1ceb9b3d3754634ae3e</guid>
<pubDate>Wed, 28 Feb 2024 19:20:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>etairoshealth.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8a9ab788001fd275636011893e21ff315a80bbfac16f603fa177ce39f8caa307</i><br /><br />Threat actor <b>description</b>: <i>We care for the patients and each other like we would our own family. It’s a personalized level of care and relationship building that shapes a positive work environment.You'll soon see for yourself how much these guys care about the privac            ...</i><br />Target victim <b>website</b>: <i>Company url</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hypertension-Nephrology-Associates-P.C.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13488</link>
<guid>a5a0902ee31d6265b026c53ea428d284</guid>
<pubDate>Wed, 28 Feb 2024 17:54:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Hypertension-Nephrology-Associates-P.C.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f647b28dd85d67a5cdbb0c95d91848d3a980e388ea669ca768b152de6a1e3c4e</i><br /><br />Threat actor <b>description</b>: <i>Hypertension Nephrology Associates, a medical practice, is committed to being the region's pre-eminent provider of care to patients with kidney disease and high blood pressure.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Change-Healthcare---Optum---UnitedHealth</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13489</link>
<guid>3a06105cf87a4a0d2b22ca218aca4783</guid>
<pubDate>Wed, 28 Feb 2024 17:52:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Change-Healthcare---Optum---UnitedHealth</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b403c2b9b6e797c58b5b1eb7335a1df1ba9873ed5573a8ebb1f2516fa0d34b0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>DTN-Management-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13490</link>
<guid>3685227c64f66ea8888deca4984ed442</guid>
<pubDate>Wed, 28 Feb 2024 17:52:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>DTN-Management-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a8cdedaf14bf78b1bab30a960e0ea2dd37ff52d63151f6f08921c6426eed5fe</i><br /><br />Threat actor <b>description</b>: <i>DTN Management Company is a recognized leader in apartment operations with a portfolio of over 106 communities across Michigan's best markets. These guys are not interested in saving their 68GB of data with all the passport scans, SSNs, driver licenses of their employees and partners.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Orange-Public-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13480</link>
<guid>15134fabce1af48f50bc470ddfacdf56</guid>
<pubDate>Wed, 28 Feb 2024 05:55:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Orange-Public-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9799d09c908cba997f189e867a3dd906cb875c9e1ab21b403b1bcb9c0378aac</i><br /><br />Threat actor <b>description</b>: <i>Vision The Orange Public School District commits to provide a safe and caring environment where each student is expected to grow and succeed. We pledge to prepare all students with equitable...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>JS-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13471</link>
<guid>bffa67e3385cb95c2bd8c0a76d82c150</guid>
<pubDate>Tue, 27 Feb 2024 19:23:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>JS-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a9c8cbe57cbdb3e39066eb5c1450ca7fa5ea67891beb8e04da1e033b1131fdd</i><br /><br />Threat actor <b>description</b>: <i>JS International, Inc. was founded in 1997 and is engaged in the manufacture of solid wood furniture structures (cabinets, accessories, etc.). The company currently has 95 employees. JSI Cabinetry corporate office is located in 485 Commerce Dr, Fall River, Massachusetts, 02720, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ann--Robert-H.-Lurie-Childrens-Hospital-of-Chicago</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13467</link>
<guid>8d4e7eab99697d70f46a556ec9f8f966</guid>
<pubDate>Tue, 27 Feb 2024 11:40:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Ann--Robert-H.-Lurie-Childrens-Hospital-of-Chicago</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba20d1297339c6aacea848b22f3c584caa737a87ded076d3861834df08405682</i><br /><br />Threat actor <b>description</b>: <i>Ann & Robert H. Lurie Children's Hospital of Chicago Ann & Robert H. Lurie Children's Hospital of Chicago provides superior pediatric care in a setting that offers the latest benefits and innovations in medical technology, research and family-friendly design.</i><br />Target victim <b>website</b>: <i>www.luriechildrens.org/</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hardeman-County-Community-Health-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13466</link>
<guid>24b7e056016caf9dd296647bf0d59905</guid>
<pubDate>Tue, 27 Feb 2024 11:39:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Hardeman-County-Community-Health-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4240faa739e7615df821b3e3871bb28e542d57d1754a7c646d148022d5ddeeb7</i><br /><br />Threat actor <b>description</b>: <i>Hardeman County Community Health Center (HCCHC) is a Non-Profit Federal Qualified Health Center (FQHC) who provides comprehensive, integrated and quality health care services to improve the health...</i><br />Target victim <b>website</b>: <i>www.hardemanhealth.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ironrock</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13462</link>
<guid>27dcfa6c9fb04dfa28b3e385698e3e5c</guid>
<pubDate>Mon, 26 Feb 2024 23:45:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Ironrock</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5fbd45a0be95eddbcc1d260825fa13db5e9d2aa1c2c6b2526c65ae0ceb19a030</i><br /><br />Threat actor <b>description</b>: <i>Ironrock Ironrock is a manufacturer of high quality indoor/outdoor unglazed ceramic quarry tile, and architectural thin brick.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>prattindustries.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13458</link>
<guid>33463bc0c4fcc9398bdb211fd530afa4</guid>
<pubDate>Mon, 26 Feb 2024 22:11:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>prattindustries.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>831a0559c5adf42bb515cd8462e5a92e97a78c5e429b845cd5a73d5d47739939</i><br /><br />Threat actor <b>description</b>: <i>Pratt Industries is a leading manufacturer of corrugated boxes and displays, as well as clean energy solutions and paper products. Learn more about their products, services, and sustainability efforts on their website.You can contact the main sys...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>PEDDIE.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13459</link>
<guid>c2e03087da138478aa65a194e4768a3b</guid>
<pubDate>Mon, 26 Feb 2024 22:10:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PEDDIE.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>71ea68e873f50cbba250cc359f2921d8caf9c0b9e1ef14bc2be3145443816c6c</i><br /><br />Threat actor <b>description</b>: <i>Co-Ed Boarding & Day School in NJ - The Peddie School</i><br />Target victim <b>website</b>: <i>https://www.PEDDIE.ORG</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Penn-Cinema-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13457</link>
<guid>1cd45c346398d2ee6a71296e1fa88796</guid>
<pubDate>Mon, 26 Feb 2024 21:56:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Penn-Cinema-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25e1a611e04465f591fbda8f5ee502c020d08f437cff499b91107f66cf27a259</i><br /><br />Threat actor <b>description</b>: <i>Penn Cinema was founded in 2006 as a family-owned and independent cinema and currently operates a chain of 30 cinemas. Penn Cinema corporate office is located in 30 P Pm Lititz Pa 541 Airport Rd, Lititz, Pennsylvania, 17543, United States.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Headwater-Companies-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13454</link>
<guid>a283c2fa682d70aae6928ffd73c13363</guid>
<pubDate>Mon, 26 Feb 2024 19:26:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhub</b> claims attack for <b>Headwater-Companies-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0fe950651e01478b75ed93d50a9b52963007b39e96583563149afc0ce943d9eb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>www.headwaterco.com</i>]]></description>
<category>ransomhub</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southwest-Industrial-Sales</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13452</link>
<guid>da5da79fc8144f79ca907a04066edcd2</guid>
<pubDate>Mon, 26 Feb 2024 19:23:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Southwest-Industrial-Sales</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a8750a683da820416fe8ecff9dc3b1ffd4b63b8111f606086bcfb42de6ef0f1</i><br /><br />Threat actor <b>description</b>: <i>Southwest Industrial Sales, founded in 2008, manufactures precision components, products and assemblies, as well as provides services specializing in automation of the manufacturing and processing industries, precision manufacturing for various industries. SW Industrial Sales corporate office is located in 4012 W Lindbergh Way, Chandler, Arizona, 85226, United States and has 10 employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Angeles-Medical-Centers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13451</link>
<guid>0ae12dc3676bc09a35fe6ed96926a6b5</guid>
<pubDate>Mon, 26 Feb 2024 19:18:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Angeles-Medical-Centers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ebfd2d6bbe6fce225c5bb23cce41556a86e807c3db189847633d1f4115d293a5</i><br /><br />Threat actor <b>description</b>: <i>  Angeles Medical Centers, a space dedicated to emotional and psychological well-being. Our team of highly trained professionals is committed to providing compassionate support and effective solutions to enhance your mental health.  Focused on personalized care, we work together to build a path towards emotional balance and a fuller life. Your well-being is our priority. We take care of you!</i><br />Target victim <b>website</b>: <i>https://angelesmentalhealth.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Professional-Liability-Fund-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13450</link>
<guid>14b094aef5d2df47fa9dd009b2d6ecb1</guid>
<pubDate>Mon, 26 Feb 2024 18:37:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>The-Professional-Liability-Fund-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3aa6a0c3c504897a10154cbb840204fc6881ce2071b0e9aebb56bb6e1e9d3d3</i><br /><br />Threat actor <b>description</b>: <i>The Professional Liability Fund (PLC) was established in 1977 in accordance with state law (ORS 9.080) and with the approval of OSB members. PLF began its operations on July 1, 1978 and since that date has been a mandatory provider of primary negligence insurance for lawyers (more than 7,000 people) in the state of Oregon, the only U.S. state in which such insurance is mandatory. Professional Liability Fund corporate office is located in 16037 SW Upper Boones Ferry Rd Ste 300, Portland, Oregon, 97224, United States and has 68 employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Webber-International-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13448</link>
<guid>77da2f07ed6c94afa27b5f113bea7ebe</guid>
<pubDate>Mon, 26 Feb 2024 16:37:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Webber-International-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd1dd5e8830b3c826f5ed59a4754fbd5ad4275c68a599a15bd36cfa6a87b9f59</i><br /><br />Threat actor <b>description</b>: <i>We have been recognized by the Princeton Review as one of “America’s Best Value Colleges” and a “Best in the Southeast” school. Established in 1927 as one of the first business schools for women in the nation, Webber now hosts men and women from over 48 different nations. Established in 1896 as Flora Macdonald College, St. Andrews University (a branch of Webber International University, formerly known as St. Andrews Presbyterian College) joined the Webber International University family during the summer of 2011. A traditional Liberal Arts university, students at St. Andrews major in a wide variety of fields. Each Webber campus is a traditional residential campus and features a wide array of extra-curricular activities. While most of our students are traditional undergraduates who attend classes in person, all day, play their sport all afternoon and retire to our dorms for the evening, we also offer accelerated adult completion, evening MBA, and completely online degrees. We are a results-oriented organization that expects people to meet their goals and understand that this requires hard work. However, we are a collegial, friendly workplace. We have an open-door policy. We know each other. We know our students</i><br />Target victim <b>website</b>: <i>https://www.webber.edu/</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>silganholdings.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13444</link>
<guid>cbdf0b0d70ec00ff3d9e02bc628c01a4</guid>
<pubDate>Mon, 26 Feb 2024 13:16:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>silganholdings.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ce38c7e4aedce6ae10f1d73b5f421ddbe693c6db8f8439df171a7ec9e024e69</i><br /><br />Threat actor <b>description</b>: <i>Silgan Holdings is a Connecticut-based American manufacturing company that produces consumer goods packaging. The company was founded in 1987 by two former executives of Continental Can, Phil Silver and Greg Horrigan – their names contributing to the...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>ernesthealth.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13445</link>
<guid>e3edca0f6e68bfb76eaf26a8eb6dd94b</guid>
<pubDate>Mon, 26 Feb 2024 13:15:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ernesthealth.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>000018683447fc1b33fc39a847d6957deb93ac235572fcbe424b6695e889db0e</i><br /><br />Threat actor <b>description</b>: <i>Ernest Health is a network of hospitals that provide specialized medical and rehabilitative services to patients recovering from disabilities or chronic conditions. Learn more about their services, locations, awards, and patient stories on their webs...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pot-O-Gold-Coffee</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13437</link>
<guid>b37242925ffe0da400d9b98c254b9fcd</guid>
<pubDate>Sun, 25 Feb 2024 19:18:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ciphbit</b> claims attack for <b>Pot-O-Gold-Coffee</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c14b62de73b92989c281bf5654bcce1a9ad6b0cdbdb62f4b1b43b127838a0591</i><br /><br />Threat actor <b>description</b>: <i>Pot O’ Gold was founded by Larry Jones in 1986 with the dream of providing the very best coffee, equipment and service to the office environment. Since then, we’ve grown to become the largest independent office coffee service in Washington state, expanding to include more than just coffee. Whatever you need for your office breakroom, whether it’s carbonated water coolers or delicious snacks, we’re able to supply you with it. Regardless of the size and demands of your office, we have a uniquely-suited program to meet it. We champion our customers’ needs, maintain quality relationships, and supply personal service recommendations uniquely suited to each individual client. We install commercial coffee brewing equipment (fresh brew, thermal, single cup, semi-auto espresso and fully-auto espresso equipment) in offices throughout the Puget Sound region. We provide routine cleaning and maintenance to this equipment while checking inventory and delivering quality coffee and related products. Over the years, we’ve gained considerable knowledge in the storing, brewing, serving and presentation of high-end coffees for an office environment. Everyone at Pot O’ Gold Coffee Service accepts the responsibilities involved with offering high-quality coffees on an institutional level. Our genuine commitment to provide true value and quality is supported by our investment in futuristic brewing designs and our comprehensive service programs</i><br />Target victim <b>website</b>: <i>http://www.potogoldcoffee.com</i>]]></description>
<category>ciphbit</category>
</item>
<item xmlns:dc='ns:1'>
<title>dunaway.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13434</link>
<guid>e6e8bbe351bf19f963820a96543f25db</guid>
<pubDate>Sun, 25 Feb 2024 13:20:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>dunaway.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>856d69d097dc54ec168e03b4227b6ad66a1ec3df6e2faac523aa179603d7400f</i><br /><br />Threat actor <b>description</b>: <i>Construction Inspection Civil Engineering Structural Engineering Landscape Architecture Survey Construction Inspection Our Featured Projects Bowie House Planning + Landscape Architecture ... READ MORE Mary Will Craig Park Midland Polo Club Killeen Hi...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>crbgroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13431</link>
<guid>065982e894fcde21153454b2ea4b2a8a</guid>
<pubDate>Sun, 25 Feb 2024 03:45:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>crbgroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ceb727e9c055d947b81e39fd253e69b46673c77ec68cb6a79333090d83fe69d6</i><br /><br />Threat actor <b>description</b>: <i>A revolutionary integrated project delivery method that leverages the combined expertise and technical excellence of ONE project team to deliver your facility in a safe, lean and collaborative way. Engineering Architecture Construction Consulting The...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>nationaldentex.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13432</link>
<guid>51ff210a6efc641a4a5722c7b311deac</guid>
<pubDate>Sun, 25 Feb 2024 03:45:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>nationaldentex.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad5be3b91e160a0fcd964e77c0fefa7c80045cc7a609a521c294a28b9024c0ba</i><br /><br />Threat actor <b>description</b>: <i>National Dentex is a full-service dental lab partner that offers a wide range of services, products and solutions for dentists and their patients. Whether you need crowns, bridges, veneers, implants or orthodontics, National Dentex can help you enhan...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>equilend.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13429</link>
<guid>2626669a8167ce41bb83b6b84a1b5b05</guid>
<pubDate>Sun, 25 Feb 2024 03:44:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>equilend.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24f3346122c2301110043178d8d19256d9b79d88b545640819940c2caeb4c875</i><br /><br />Threat actor <b>description</b>: <i>DataLend provides global securities finance data, performance reporting and consulting services for agent lenders, broker-dealers and beneficial owners. Learn More Securities Finance PlatformYou can contact the main system administrator on the...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>magierp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13430</link>
<guid>d77314b5c23c087d9b5ed587e88800d2</guid>
<pubDate>Sun, 25 Feb 2024 03:43:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>magierp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e93f9abf50e7c5e4d93fa7d09b4ea00ddf9c2eae10af97ac578cf3a0d75bb299</i><br /><br />Threat actor <b>description</b>: <i>MAGI develops and supports high quality ERP business solutions for small to mid-sized manufacturers. MAGI has been developing software solutions since 1985 and has installations worldwide. Our premier product, WinMAGI, is a world class manufacturing...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>BRADSHAW-MEDICAL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13446</link>
<guid>0cf9e05e144599e342541462a833f535</guid>
<pubDate>Sat, 24 Feb 2024 17:22:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BRADSHAW-MEDICAL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce9f790cebacebd22f64e0b22a83561d71bf22f7647c882c030985d366110a12</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.BRADSHAW-MEDICAL.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Spine-West</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13427</link>
<guid>360bfbe9fb2fe3f305db7b6fe1f8a4ad</guid>
<pubDate>Sat, 24 Feb 2024 14:43:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Spine-West</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3cff4d254cfec6f024f7bc843ae7bf70a5ece7769ff84f5ee9c412ce9e89dacd</i><br /><br />Threat actor <b>description</b>: <i>Hospitals & Physicians Clinics · Colorado, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>Roncelli-Plastics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13425</link>
<guid>871f70868dc7160a8e1f2d5e076fe144</guid>
<pubDate>Sat, 24 Feb 2024 13:20:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Roncelli-Plastics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c9fe5f101c062d77e3e89055e839cffdae2678de63d68ae9fa3207bc83cefb6</i><br /><br />Threat actor <b>description</b>: <i>Roncelli Plastics was founded in 1969. It specialize in plastic and non-metallic machining and fabrication.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Welchs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13421</link>
<guid>0d2cf688695b43e2b42d77b481f71222</guid>
<pubDate>Fri, 23 Feb 2024 23:49:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Welchs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7e12c18846ce653f25f110e7ef452ec976fbef5ff581233aa72032c1a88a1104</i><br /><br />Threat actor <b>description</b>: <i>Massachusetts, United States</i><br />Target victim <b>website</b>: <i>www.welchs.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Family-Health-center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13419</link>
<guid>7436b0dc99f8aed11026252aeade1a3a</guid>
<pubDate>Fri, 23 Feb 2024 22:19:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Family-Health-center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>55a74d0e64a95a30c172c6df3889e98d682e89e5a6e2ef10c8cf6662101a9fbb</i><br /><br />Threat actor <b>description</b>: <i>Since Moses L. Walker and his colleagues opened the doors for the first time in 1971, Family Health Center (FHC) has been serving community members who are in need of quality and compassionate healthcare. From humble beginnings in a converted trailer to the current state-of-the-art $10 million facility on the same plot of land at the corner of Paterson and Burdick Streets, FHC has become the county’s only Federally Qualified Health Center (FQHC). FHC has also been accredited as a community-based health center by the National Committee for Quality Assurance for over a decade.  What began as a group of dedicated community advocates, volunteer doctors, nurses and assistants is now, more than 53 years later, one of Michigan’s most highly recognized FQHCs. Our team offers comprehensive health services at three locations, with an additional set of mobile health and dental units. Our staff administers approximately 165,000 patient visits annually as part of our commitment to serve the community members of Kalamazoo.  Our leadership and staff at FHC are also passionate about community engagement. Our annual events include the Dr. Lisandra Soto Dental Day of Caring and Back to School Bash. FHC also provides Medical Assistant training to community members interested in pursuing this career path.  One of the hallmarks of FHC is our compassionate staff. We are grateful to all our team members who remain dedicated to honoring Mr. Walker’s legacy and mission of keeping our community members healthy and strong. As we continue our mission to provide quality health care to everyone, we remember our promise to treat our patients with dignity and respect.</i><br />Target victim <b>website</b>: <i>https://fhckzoo.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pressco-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13412</link>
<guid>52af145bae0067bdc52f7363b5a851f4</guid>
<pubDate>Fri, 23 Feb 2024 14:46:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Pressco-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>102f80a447f385eaa80452106a8d8e3c85647b828bd17b9a4c0cefbff1d78637</i><br /><br />Threat actor <b>description</b>: <i>Pressco Technology, founded in 1966 and headquartered in Cleveland, Ohio, is a manufacturer of equipment that specializes in inspection manufacturing process. Pressco Technology corporate office is located in 29200 Aurora Rd, Cleveland, Ohio, 44139, United States and has 212 employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>C-and-J-Industries-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13408</link>
<guid>4c109426911ae8639359ef7f75eb7c89</guid>
<pubDate>Fri, 23 Feb 2024 04:13:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>C-and-J-Industries-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f723eb425cd776faff71308a3ffadedae6960c8a6e520b3af7cf6f35ddb7138b</i><br /><br />Threat actor <b>description</b>: <i>C&J Industries is a plastic injection molding company specializing in injection molding and contract manufacturing of precision plastic componentscjindustries.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Quik-Pawn-Shop</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13405</link>
<guid>0125141592fa9ededc665c55d9958f69</guid>
<pubDate>Thu, 22 Feb 2024 17:42:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Quik-Pawn-Shop</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79e86215c62e28cce21ea2d2f2cefa5f9711e56bbf583b504aea4a7da383dc59</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1978, Quik Pawn Shops™ operates in 15 locations in Montgomery, Birmingham, Mobile and Tuscaloosa areas. We obtained 140Gb of files of this organization and make them available for you soon. There is also a BD with complete information of their customers. Millions of lines with DOB, addresses, ssns, financials transactions and stuff like that.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>PEER-Consultants</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13402</link>
<guid>d90d801833a681b169e4f86c64784cdd</guid>
<pubDate>Thu, 22 Feb 2024 14:43:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>PEER-Consultants</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>865b0bb62148e0b154d19d2483f61d64add8ac226ca03853f4dff711db38f8ad</i><br /><br />Threat actor <b>description</b>: <i>PEER, a full-service environmental engineering consulting firm, provides personalized service to our valuable clients, fosters andmaintains long-term partnerships, and hires passionate and diverse team members. 20Gb of data will be uploaded lots of documents with personal information. Passports, SSNs, driver licenses, confidential agreements, NDAs and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>mtmrobotics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13403</link>
<guid>a6ed9258d53b17bac9cfd263432af8fa</guid>
<pubDate>Thu, 22 Feb 2024 14:42:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>mtmrobotics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f45511bf9cb2d28c46aa4431d7b26ca346712775b4d7193ae64a00ff689b9b76</i><br /><br />Threat actor <b>description</b>: <i>As an Airbus Robotics Company, MTM Robotics is a trusted global provider of high-quality automation systems, software systems, and engineering services for the aerospace and aircraft manufacturing industries.</i><br />Target victim <b>website</b>: <i>mtmrobotics.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>nfllp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13399</link>
<guid>8f94eafb14366ce488946e40d8b4694e</guid>
<pubDate>Thu, 22 Feb 2024 11:41:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>nfllp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38d3d385ba972353910611c60ee444006aa6de34d08277fd0bce7d8301a17f06</i><br /><br />Threat actor <b>description</b>: <i>New York Law Firm with a National Presence When the partners at some of New York’s largest law firms need assistance with New York’s arcane real estate law, or when investors, consumers, and those who have suffered civil rights violations require aggressive representation, they go to Newman Ferrara. With over five decades of experience at its disposal, Newman Ferrara has evolved into a national practice focused on Real Estate, Commercial Litigation, Civil Rights, Class Actions and other Complex, Multiparty Litigation. In addition to teaching at law schools and universities, lecturing at CLE programs and co-authoring some of the state’s leading practice treatises, the firm’s attorneys are regularly called upon by the media to offer their unique insights on the latest legal developments and trends. Newman Ferrara represents many of the city’s largest property owners and managing agents, and handles some of the nation’s most significant class actions and civil rights matters. Whether it involves the purchase or sale of real property, or representing litigants in convoluted disputes, the firm’s lawyers work diligently to get the job done and endeavor to do so in an expeditious and cost-effective manner. Offering a comprehensive and multifaceted range of services, as well as a targeted approach to their clients’ needs, Newman Ferrara provides big-firm quality without compromising the personal attention clients expect and deserve. Newman Ferrara remains committed to pursuing socially meaningful cases and will prosecute them in the most efficient manner and with the highest level of professional competence. The boutique structure of our firm allows us to provide clients with personalized attention and increased access to their attorneys and, when appropriate, Newman Ferrara works in conjunction with a network of counsel, nationwide.SITE: www.nfllp.com Address : 1250 Broadway, 27th Floor New York, NY 10001ALL DATA SIZE: ~835gb 1. Home employees folder with peresonal documents 2. Corporate data 3. Financial data 4. SSNs, Passports, Imsuranses clients 5. alldata folder 6. securecopy, scans and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>climatech.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13400</link>
<guid>bb01f00daaeac676313d2031dfd1e419</guid>
<pubDate>Thu, 22 Feb 2024 11:41:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>climatech.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>93dee2e2fe832ac341984c9539956afab1d44216cebc0b7e4a35d7307ccf86de</i><br /><br />Threat actor <b>description</b>: <i>Commercial / Residential HVAC provider Climatech Inc, is a large full-service mechanical contracting company serving customers in both Pittsburgh, PA and Tampa, FL. Over the past 40 years we have grown into one of the largest contractors for heating, ventilation, air conditioning and refrigeration in Pittsburgh, which is directly attributable to our attitude in providing the highest level of quality in all that we do.SITE: www.climatech.com Address : Climatech, Inc. 200 Bilmar Dr Pittsburgh, PA 15205 412-921-8000ALL DATA SIZE: ~550gb 1. Employees folders and documents 2. Human resources 3. Accounting and finance data 4. Payroll and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>usmerchants.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13401</link>
<guid>7cf68b210274ef46d38b0cd76e059af6</guid>
<pubDate>Thu, 22 Feb 2024 11:40:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>usmerchants.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>490b7f12b9916687ceabebe9fb3a0006736b3b37d19e0d3537d7f2ac8fcfb830</i><br /><br />Threat actor <b>description</b>: <i>US Merchants is a vertically integrated packaging and distribution company. We purchase raw packaging materials and then use those ingredients to manufacture finished packaging products. Everything involved in producing and delivering clamshell blister packaging, two-piece blister packaging, blister cards, and our retail molded plastic products is done in-house from start to finish. This vertical operation reduces costs and helps to insulate suppliers, retailers, and end-customers from the reliability problems that result in more horizontal supply chains.SITE: www.usmerchants.com Address : Corporate Headquarters 8737 Wilshire Blvd Beverly Hills, CA 90211ALL DATA SIZE: ~245gb 1. Corporate documents 2. Employees folders 3. Payroll 4. Scans 5. HR / Accounting / Financial data and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>dilweg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13396</link>
<guid>7ba5e3d6037b3d9c096399fbd3426023</guid>
<pubDate>Thu, 22 Feb 2024 11:39:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>dilweg.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>600b644d412b9b2927ee7f0e03a2a26f2bc0a9ca36bdec77eb815cfe047e52af</i><br /><br />Threat actor <b>description</b>: <i>At Dilweg, consistent refinement of our practices has created unparalleled results. Today, our adaptable strategy and exceptional service are defining the future of real estate investment. Read below to discover what we are made of. To adapt to the contemporary economy, we have deliberately focused our recent efforts on acquiring properties in the Dallas, Atlanta, Tampa, Charlotte, and Raleigh-Durham metropolitan areas. By centering on middle-market assets, we’ve developed lucrative opportunities for purposeful investors throughout the Southeast. Services: asset enhancement, property management, construction management, brokerage & leasing, tax & accounting, marketing & communications, capital markets and investor relations.SITE: www.dilweg.com Address : Corporate Office 5310 South Alston Avenue, Suite 210 Durham, NC 27713 PHONE: (919) 402-9100ALL DATA SIZE: ~DW:453gbgb 1. Financial data 2. Scans 3. Accountings, QBooks 4. Personal users files, documents 5. Onedrive Data and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hardeman-County-Community-Health-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13398</link>
<guid>757deb22acbb6b1e217fc378ac78b2a4</guid>
<pubDate>Thu, 22 Feb 2024 11:37:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Hardeman-County-Community-Health-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>69e4b84f9ff4e8f1c076d63500769e571d7f397d872aef0a484cff6b9153b17a</i><br /><br />Threat actor <b>description</b>: <i>Hardeman County Community Health Center (HCCHC) is a Non-Profit Federal Qualified Health Center (FQHC) who provides comprehensive, integrated and quality health care services to improve the health and well-being of our patients and communities we serve. The mission of Hardeman County Community Health Center is to provide quality, accessible, affordable primary health care services to the residents of Hardeman County, Haywood County, Chester County, and neighboring counties.</i><br />Target victim <b>website</b>: <i>https://hardemanhealth.org/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>KHSS-You-have-3-days</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13391</link>
<guid>81f89eda54f8e14777eddd0812aea85d</guid>
<pubDate>Wed, 21 Feb 2024 20:40:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>KHSS-You-have-3-days</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b81e375a435624d52b11791ff734e7f298c607942279e5eee83aa1a468a81bb</i><br /><br />Threat actor <b>description</b>: <i>KHS&S is transforming construction from a field-based industry to an industry of digital modeling, virtual project delivery, prefabrication and Lean construction.  We are continuously rethinking how projects get built. Our focus is on creating project value, while remaining true to our corporate values that have driven us since our founding.</i><br />Target victim <b>website</b>: <i>https://www.khss.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lancaster</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13389</link>
<guid>dfdfab9941ac833a0c364aa2e608185e</guid>
<pubDate>Wed, 21 Feb 2024 19:16:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Lancaster</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>306e8b8b0b0a7dccae872ec6ab2366ded94df5f1f3847eb2c72bb31ce8d16acc</i><br /><br />Threat actor <b>description</b>: <i>Lancaster is the premier paint sundry distributor, of North America, South America and the Caribbean. We are going to upload theirdata soon. Many accounting and HR documents, contracts and otherbusiness papers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>HRTec-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13387</link>
<guid>b6121869d1d9e7fddaac06016fcb0661</guid>
<pubDate>Wed, 21 Feb 2024 16:17:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>HRTec-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7ee2515ea1caa7b388d42bb4923c98a73e9932b0d3910cb8bbb7223d5de306b0</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1986, Human Resources Technologies, Inc. (HRTec) provides purpose built compliance and technological solutions to public.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Marchassociates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13388</link>
<guid>b446e7f68f7a79f9de9d9f9ee9b764e8</guid>
<pubDate>Wed, 21 Feb 2024 16:16:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Marchassociates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>423e7b5c039d20d4254d2147cc6f7da2d6032892b4f86f51314b06fe83091fda</i><br /><br />Threat actor <b>description</b>: <i>March Construction is a full- service experienced commercial construction services firm and general contractor offering project management and consulting.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Austen-Consultants</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13386</link>
<guid>c88381da8cf2a0197a6542471fe8f107</guid>
<pubDate>Wed, 21 Feb 2024 14:49:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Austen-Consultants</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ec4b5e18793bf6faea6b0e34042c30c0cc5d0b2f7b143094403817a34cdf923</i><br /><br />Threat actor <b>description</b>: <i>IT Consultings Cloud Phone Anti-Ransomware Encrypted network</i><br />Target victim <b>website</b>: <i>https://Austein-it.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>doneff.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13384</link>
<guid>fc75d7ec538864978b5833d6a675c768</guid>
<pubDate>Wed, 21 Feb 2024 12:44:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>doneff.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f0c8240bf2ef6cfdc56f92dd187b35178671ed55020b802e232e8c5e76ed1a51</i><br /><br />Threat actor <b>description</b>: <i>From luxury apartments and exclusive active adult housing to affordable, moderate family living, Doneff Companies LLC has built and manages more than 1,056 apartment homes across central and eastern Wisconsin.</i><br />Target victim <b>website</b>: <i>doneff.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>River-Delta-Unified-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13377</link>
<guid>2a0744cc9d32856e3e6daf321dc69915</guid>
<pubDate>Tue, 20 Feb 2024 19:15:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>River-Delta-Unified-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60b23eccd391c6659f852189562c49667035e2991b7922f086af694d5a6f31fd</i><br /><br />Threat actor <b>description</b>: <i>FREE</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>advancedprosolutions.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13375</link>
<guid>1ca4dffd6cb96dfe66f1a044d3bb7cfb</guid>
<pubDate>Tue, 20 Feb 2024 14:36:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>advancedprosolutions.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>40b554d3f940dd01b1b3b954da3f1374ce84806ca1236a25a54cb1553d08abec</i><br /><br />Threat actor <b>description</b>: <i>Download link #1: https://***************.onion/APS/PROOFMirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/APS/PROOF </i><br />Target victim <b>website</b>: <i>advancedprosolutions.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Raocala</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13374</link>
<guid>05d341cd809694e4e44660c97c11e8e4</guid>
<pubDate>Tue, 20 Feb 2024 14:28:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Raocala</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06ee5025f93b6fc3719d3e2bff86d3835d591be4fd996ba7daef8ff27c826bc0</i><br /><br />Threat actor <b>description</b>: <i>Company has the last 24 hours to contact us using the instructions left. In case of silence, all data will be published here https://raocala.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>First-Professional-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13367</link>
<guid>af9ceb1e9e159d7b393a4c38c660a7cb</guid>
<pubDate>Mon, 19 Feb 2024 12:06:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>First-Professional-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1385c24265833a0f817d2dc24c4b93597256652a86ed13b4186e026ebb738a22</i><br /><br />Threat actor <b>description</b>: <i>Since our inception in 1987, First Professional Services has delivered comprehensive solutions to physician's billing, coding and auditing.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Compression-Leasing-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13361</link>
<guid>bb8c2a522653f0e10c557d9e7cd18784</guid>
<pubDate>Mon, 19 Feb 2024 01:31:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Compression-Leasing-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e0b01daf54268547eac954781f958f847caad4b97d33703140303d32be710c5</i><br /><br />Threat actor <b>description</b>: <i>CLS is a world leader in high pressure compressor fabrication, sales, rentals, service and support. We design, fabricate, sell, rent and service standard to hig...</i><br />Target victim <b>website</b>: <i>compressionleasing.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Westward-360</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13362</link>
<guid>1e5e1435c95e420a1cd34d3202769c18</guid>
<pubDate>Mon, 19 Feb 2024 01:31:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Westward-360</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9b4aea1e1ebce582c70cd0dddcf471e1cf89ccb870f1bc7ae33e965422d18d59</i><br /><br />Threat actor <b>description</b>: <i>Westward360 is dedicated to providing exceptional community management, rental management and brokerage services. Serving multiple markets throughout the United...</i><br />Target victim <b>website</b>: <i>westward360.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>aeromechinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13360</link>
<guid>4c32296316cec19d27f62e4e8db15430</guid>
<pubDate>Sun, 18 Feb 2024 22:44:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>aeromechinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8fabbb8314de344c32e238aa27136538250e48fe291bb6c79f7b93c01284bce9</i><br /><br />Threat actor <b>description</b>: <i>AeroMech Incorporated is a small, dynamic FAA ODA that specializes in airworthiness / aircraft certification, flight testing and provides engineering services to OEMs, airlines, operators, modification shops, and military customers worldwide. AeroMec...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>carlfischer.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13359</link>
<guid>81b0e1902f1c695c267651e72616f46e</guid>
<pubDate>Sun, 18 Feb 2024 22:14:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>carlfischer.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a75b96665b9de71828a1e61975b9c688a615c8bc967bbb3c35160351a40baa78</i><br /><br />Threat actor <b>description</b>: <i>Helping educators and musicians</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>VSP-Dental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13352</link>
<guid>48755028069daa1926dc9a4e3d0d069c</guid>
<pubDate>Sun, 18 Feb 2024 03:03:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>VSP-Dental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a1ed4c025a0dd4c71c9f13b577b3dee07be26a66048b16d1f6c34b1181b86e1</i><br /><br />Threat actor <b>description</b>: <i>Top Cosmetic & Implant Dentist in South-Central Virginia Dr. Patel is the founding dentist of VSP Dental and is highly regarded as one of the top General, Cosmetic, and Implant Dentists in Virginia. Patients love the level of care she provides and travel statewide to be in her stewardship.</i><br />Target victim <b>website</b>: <i>https://www.vspdental.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chicago-Zoological-Society</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13342</link>
<guid>05c41063331401f53332b44885ea913d</guid>
<pubDate>Sat, 17 Feb 2024 09:07:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Chicago-Zoological-Society</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>993d0a20270715fc374e5b9a37a6f0f648a4bc17a54d3bb4852fccc3ddbcfd06</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.czs.org</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wapiti-Energy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13344</link>
<guid>d481fbe55e77099eef411a60f2d36fca</guid>
<pubDate>Sat, 17 Feb 2024 09:06:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Wapiti-Energy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8eb9b52d8ca000786837c7de64c923e01a92899981b4dd658fbd3f8a90871f0e</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.wapitienergy.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>PSI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13337</link>
<guid>f1a2987a8ae3620ed2ed5462e0e80f5e</guid>
<pubDate>Sat, 17 Feb 2024 07:40:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>PSI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>76994a36f045a186c97f7f978d7d13ef02e38bd94bb3700e4c62ac79ce85ae01</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://psi.org</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>CP-Communications</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13336</link>
<guid>ca3445d71de0ef386033037868c58d92</guid>
<pubDate>Sat, 17 Feb 2024 07:39:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>CP-Communications</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>094854d80fccb4235c845077c42c36c817de28a42a66a5f2a62175e9b8ea5692</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.cpcomms.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Prudential-Financial</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13334</link>
<guid>5bf30c6aad7adf06445803878d854044</guid>
<pubDate>Fri, 16 Feb 2024 22:32:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Prudential-Financial</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff54b33996e47e3a5f2ee031ed83d34f0b2801824aa2066be5c64a002328c760</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>LoanDepot</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13335</link>
<guid>82d7f56432e27700a4f968ccc1d65038</guid>
<pubDate>Fri, 16 Feb 2024 22:30:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>LoanDepot</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3590ccb0211d64f38f4238807c9bd0c309e34d4b35f444da2baadce41e777223</i><br /><br />Threat actor <b>description</b>: <i>LoanDepot, is an Irvine, California-based nonbank holding company which sells mortgage and non-mortgage lending products. </i><br />Target victim <b>website</b>: <i>https://loandepot.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Chas.-E.-Phipps</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13331</link>
<guid>f055c54d16a8cc75a8cc996511cc9a9c</guid>
<pubDate>Fri, 16 Feb 2024 21:15:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>The-Chas.-E.-Phipps</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b7fe440ceb375236851182937628bdca4e4933bdf149e91a4d795c5d1621ec43</i><br /><br />Threat actor <b>description</b>: <i>The Chas. E. Phipps - the company was founded in 1921, and currently employs 67 employees. The company supplies concrete accessories, concrete repair materials, sealants, coatings and various building materials to contractors. The Chas E Phipps corporate office is located in 4560 Willow Pkwy, Cleveland, Ohio, 44125, United States.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>BRONSTEIN-CARMONA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13330</link>
<guid>30fad467b7363d55fa24b3398fdef557</guid>
<pubDate>Fri, 16 Feb 2024 17:39:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BRONSTEIN-CARMONA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e05d5c10df6218a03a45349266cd1260467a21636798c5867e23cb9bee80c4d</i><br /><br />Threat actor <b>description</b>: <i>Fort Lauderdale Insurance Defense Law - Bronstein & Carmona</i><br />Target victim <b>website</b>: <i>https://www.BRONSTEIN-CARMONA.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>davidsbridal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13329</link>
<guid>d27bf4d538d65711468835f9daef576e</guid>
<pubDate>Fri, 16 Feb 2024 17:29:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>werewolves</b> claims attack for <b>davidsbridal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a60344f87f38e3062fa32a4ad1b9cf3caeb53ff2bfd69ead7a50755649c7309</i><br /><br />Threat actor <b>description</b>: <i>David's Bridal — известная американская сеть свадебных магазинов, известная своим широким ассортиментом свадебных платьев, платьев для подружек невесты и платьев для особых случаев. Основанная в 1950 году, компания выросла из единственного магазина во Флориде до обширной сети, насчитывающей более 300 магазинов в США, Канаде, Великобритании, а также франчайзинговых магазинов в Мексике.Выручка компании оценивается в $2,2 млрд.На текущий момент мы обладаем очень ценными и важными данными, охватывающими значительный объем личной и корпоративной информации.850000$.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>werewolves</category>
</item>
<item xmlns:dc='ns:1'>
<title>BRAM-Auto-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13328</link>
<guid>5b1add8961a1cfa07e60838ffd0f83e7</guid>
<pubDate>Fri, 16 Feb 2024 16:43:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>BRAM-Auto-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ec826ed7ff36ec521e7922726c26977d6aa5e674db2585a7d2ee15483519a35</i><br /><br />Threat actor <b>description</b>: <i>BRAM Auto Group is one of the largest family owned businesses in the Tri-State area with innovative dealerships throughout NY and NJ. 85GB of files are going to be uploaded here soon. Passports, SSNs, driver licenses, clients information and much of operational data.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>theclosingagent.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13321</link>
<guid>e430f779f7ff81de0e5b4c4f5e316672</guid>
<pubDate>Fri, 16 Feb 2024 08:50:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>theclosingagent.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b2e5cbed3613f95e1fd06b9503e5dc9cf1e868e338219d3b1ca81ee502dc3b3c</i><br /><br />Threat actor <b>description</b>: <i>The Closing Agent is the Orlando Title Company. Real Estate Closing Solution for all of title insurance and settlement needs.Hundreds of terabytes with sensitive data are in our possession.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Griffin-Dewatering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13319</link>
<guid>27e5b67fd10a082a605ee7d995f69eca</guid>
<pubDate>Fri, 16 Feb 2024 06:02:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Griffin-Dewatering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26084f7ece61d8e58daa1b5ce34300ed9ac5431f477c12a3cd9fb912ecebd703</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>https://www.griffindewatering.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dobrowski-Stafford--Pierce</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13316</link>
<guid>98994c4349015b8585779bf0ea5b4618</guid>
<pubDate>Thu, 15 Feb 2024 22:35:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Dobrowski-Stafford--Pierce</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b00474a71d28a9452d62b9822e5d632cc0b50e000b12ea1477f60eb1d42b5ef7</i><br /><br />Threat actor <b>description</b>: <i>Dobrowski Stafford & Pierce is a company that operates in the Legal Services industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>LD-Davis</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13314</link>
<guid>5410e4439f038b0cb96884b2700faad4</guid>
<pubDate>Thu, 15 Feb 2024 19:50:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>LD-Davis</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>15bca7688082de93d13758e6ec5ca5c3f5eeb763d404229f44590527507eb7bb</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.lddavis.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Norman-Fox</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13307</link>
<guid>97fa70856aa8095cb1a6c7343a84bd85</guid>
<pubDate>Thu, 15 Feb 2024 19:49:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Norman-Fox</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>064678778782549523af6dd005fc485d571216aeabcfc003c6418bae6fd2b3e0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.norfoxchem.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>HR-Ewell--Hy-tec</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13308</link>
<guid>91df814c65a828c59c6217aebd6a27c2</guid>
<pubDate>Thu, 15 Feb 2024 19:48:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>HR-Ewell--Hy-tec</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a4620427a7f56bd6e025a36328c62574fdd5773081d944660fd7f10ae25cc8a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.hrewell.com www.hytectank.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mechanical-Reps</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13309</link>
<guid>45b02e9da70144e563ddb3407d8718ae</guid>
<pubDate>Thu, 15 Feb 2024 19:48:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Mechanical-Reps</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3992ddbf7f5e686c1d0f3877a427725440dea28c8dd747c777d5768f309036c7</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.mechreps.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>DuBose-Strapping</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13312</link>
<guid>9dd48d8df816e1b2b78a1573d0b6ce78</guid>
<pubDate>Thu, 15 Feb 2024 19:46:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>DuBose-Strapping</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>498da0558c9215c834cdb4d2d22067f57bae7dc433d8226e4ff441ca445372f2</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.dubosestrapping.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>SilverLining</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13313</link>
<guid>3d36c145f1f16c368173c437335b4acd</guid>
<pubDate>Thu, 15 Feb 2024 19:45:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>SilverLining</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>82beabac218a7c8583c541bbb2566a4020fe9df2923dbb275adba08c13c572c1</i><br /><br />Threat actor <b>description</b>: <i>New York, United States</i><br />Target victim <b>website</b>: <i>www.silverlininginc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Schuster-Trucking-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13306</link>
<guid>846b8bb19a1488bb60ed22ad4af0db5b</guid>
<pubDate>Thu, 15 Feb 2024 18:00:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Schuster-Trucking-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>696abf3b6a063995b257cd2ac4d0c484f326e02ee2c08404f6483f45f5766e72</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://schusterco.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advantage-Orthopedic--Sports-Medicine-Clinic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13304</link>
<guid>22935fba49f7d80d5adf1cfa6b0344f4</guid>
<pubDate>Thu, 15 Feb 2024 16:31:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Advantage-Orthopedic--Sports-Medicine-Clinic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0f0577e64a1f88dd620379c0b2f14b63350602056c8d4689c44ebce56a4a36c</i><br /><br />Threat actor <b>description</b>: <i>Advanced Orthopedics & Sports Medicine Clinic in Gresham provides treatment for podiatry, bunions, tendonitis, hip replacement, ACL surgery and many more.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hawbaker-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13300</link>
<guid>62c1b075041300455ec2b54495d93c99</guid>
<pubDate>Thu, 15 Feb 2024 12:16:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Hawbaker-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>343b3123a72fbf61a79f5657d19477c09713e5892ddc177c0396df839f67c6c3</i><br /><br />Threat actor <b>description</b>: <i>Hawbaker Engineering was born from a desire to build upon our wealth of construction experience, incorporating sound engineering principles into the design process from concept to completion. Combining construction know-how and engineering expertise under one roof allows Hawbaker Engineering to bring a unique perspective to</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>coreengg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13297</link>
<guid>5dc86332c108bc63cafa5c4ea0d34ae1</guid>
<pubDate>Thu, 15 Feb 2024 11:57:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>coreengg.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>678292e313aeb0a1daf6fddb61009b9b4fbd9f72d53e60daca2c4d0a8b6dc64a</i><br /><br />Threat actor <b>description</b>: <i>Core Engineering LLC was founded in 2007, in Corpus Christi, TX. We have grown over the last few years, expanding our services over several states. We are a full-service engineering firm with a multi-discipline team of highly-motivated professionals.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>ASA-Electronics-2.7-TB</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13293</link>
<guid>56f140884852f96cb0fa2c247b378358</guid>
<pubDate>Thu, 15 Feb 2024 07:32:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>ASA-Electronics-2.7-TB</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7ad435c4b35742a88c1d16e3b89d3e249e2762d972c0c4babe14630bdba69d56</i><br /><br />Threat actor <b>description</b>: <i>ASA Electronics® has been designing and manufacturing mobile electronic products for the Marine, RV, PowerSports, Agricultural, Construction, Commercial Vehicle, and Bus industries since 1977. Their proprietary brands are JENSEN®, JENSEN Heavy Duty®, iN-Command® Control Systems, Marine Audio®, Voyager® and ADVENT® Air. ASA Electronics is also a distributor in specialty markets for SiriusXM® Satellite Radio and Polk Ultramarine® products. </i><br />Target victim <b>website</b>: <i>https://www.asaelectronics.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nekoosa-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13292</link>
<guid>21ea3211c68284b0bb4cd9a2cedc524e</guid>
<pubDate>Wed, 14 Feb 2024 17:56:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Nekoosa-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a0a2e555216b9d62346077289d72de9c70281a280cc9565d93db9079e38b9bdd</i><br /><br />Threat actor <b>description</b>: <i>Nekoosa School District is a public school district located in NEKOOSA, WI. Files of this district will be available for downloading soon. Some personal information of staff and students can be found inside. Addresses, phone numbers, scans of documents and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>vanwingerden.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13287</link>
<guid>0ade14765069c05180284d03b3097202</guid>
<pubDate>Wed, 14 Feb 2024 11:53:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>vanwingerden.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ba73a5075da1da5b1dcc7f8d1968849184d88983e7e193a0b493991245da109</i><br /><br />Threat actor <b>description</b>: <i>vanwingerden.com 337Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>KALEEDS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13285</link>
<guid>491159b91b3f6bfcebca81f03ebeee71</guid>
<pubDate>Wed, 14 Feb 2024 10:33:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>KALEEDS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24d656c2cd13a231c9e51e1ff5492d7ce636e4dc26347eaa7cf2ca4ee6b968de</i><br /><br />Threat actor <b>description</b>: <i>Slogan! :) Our goal is to earn the trust of our clients and maintain long-lasting relationships by offering sound, proactive financial guidance. We analyze your financial data to offer insight and advise you on the various strategies and best            ...</i><br />Target victim <b>website</b>: <i>kaleedscpa.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>wsnelson.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13282</link>
<guid>ad1aee42344e7f7432abd116da321569</guid>
<pubDate>Wed, 14 Feb 2024 06:36:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>wsnelson.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>204cbee6be182b210984e4b72b18f4b70b8c11e5b1f745a6909c4df4a00ba2b6</i><br /><br />Threat actor <b>description</b>: <i>Waldemar S. Nelson and Company, Inc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>fultoncountyga.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13281</link>
<guid>44680b5f7cefd57a0e580cfc11a9308f</guid>
<pubDate>Wed, 14 Feb 2024 06:33:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>fultoncountyga.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>67f53a1c40c132da57bc0a4589edad0b696d3de61e66d957109ed4f7537d948d</i><br /><br />Threat actor <b>description</b>: <i>Fulton County GovernmentFulton County's budget of $1.2 billion funds an array of resident services.Fulton County offers a variety of services for businesses to expand. Fulton County is located in Atlanta Georgia.We will demonstrate how local...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Institutional-Casework-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13279</link>
<guid>2808e33b0ef26bac248b17936f0f1938</guid>
<pubDate>Wed, 14 Feb 2024 05:53:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Institutional-Casework-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>705455d85c52279c0d165f22a9309075add76453c8c6f4bde8b7857a2a2d7eaa</i><br /><br />Threat actor <b>description</b>: <i>institutional Casework Inc. is uniquely positioned to serve your complete project needs from steel, stainless steel, or custom wood laboratory and science casework to equipment, fixtures, work surfaces and chemical fume hoodsiciscientific.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>mmiculinary.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13277</link>
<guid>1dbb1c25df6942683e7b1317f0e13db6</guid>
<pubDate>Wed, 14 Feb 2024 04:17:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>mmiculinary.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>49b6bc703c91cf940c213d16cd8677f8ac8335f2f0d675f448b364f6b2300944</i><br /><br />Threat actor <b>description</b>: <i>Greetings!Today we are posting here the new company, "Mr Mudbug .Inc".Company Description: MMIculinary has been producing quality food products since 1986.Headquarters: 615 23rd St S, Birmingham, Alabama, 35233, USAMail: vincemaenza@m...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>adioscancer.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13276</link>
<guid>cca437dfff11995edc035566eabec9a7</guid>
<pubDate>Wed, 14 Feb 2024 00:57:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>adioscancer.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7ec45992e8f38e03045950237d023cbc0b85360692f4745917ad14889ddc7001</i><br /><br />Threat actor <b>description</b>: <i>Caribbean Radiation Oncology Center</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>barberemerson.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13272</link>
<guid>fd7fb6f837e41936eb831b050db82330</guid>
<pubDate>Tue, 13 Feb 2024 22:26:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>barberemerson.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e27a44dbc9af2164e4dfc6778fa6a642329ba4a8b3e56710f7a044444cbe214</i><br /><br />Threat actor <b>description</b>: <i>Established in 1934 in Lawrence, KS the law firm of Barber Emerson, L.C. is one of the oldest and most respected law firms in the state of Kansas. Our practice specializes in the areas of General Civil Practice, Litigation, Corporation, Banking, Real Estate, Estate Planning, Probate, Taxation, Insurance, Workers Compensation and Zoning Law. The firm is committed to provide quality legal representation and is a member of the Bar Register of Preeminent Lawyers. The firm of Barber Emerson, L.C. carries the highest rating attainable by a firm according to Martindale Hubbell standards of excellence, and by peer review. Personal and professional integrity form the foundation of our values, and we are committed to the representation of our clients in accordance with these values. While we offer the specialized legal experience and expertise comparable to much larger firms, we also possess the personal service and practical business traits of a smaller firm.SITE: www.barberemerson.com Address : BARBER EMERSON, L.C.Downtown Lawrence 1211 Massachusetts Street Lawrence, KS 66044 785-843-6600ALL DATA SIZE: ~351gb 1. Personal users folders and documents 2. Corporate data 3. Customers documents and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>globalrescue.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13267</link>
<guid>4049f46696d549c65f5832e15664afdd</guid>
<pubDate>Tue, 13 Feb 2024 22:23:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>globalrescue.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>557e7a36c7d316d3b8d7796081680eca1057cb63c98b817f9d0601c1133c9519</i><br /><br />Threat actor <b>description</b>: <i>Global Rescue (a Global Rescue Company) has been a leader and pioneer in the travel services industry since our founding in 2004. We provide the finest integrated medical, security, travel risk and crisis management services available anywhere, delivered by our teams of critical care paramedics, physicians, nurses and military special operations veterans. Our medical advisory and evacuation services include exclusive relationships with the Johns Hopkins Department of Emergency Medicine Division of Special Operations, Elite Medical Group and Partners HealthCare. Our track record has made us the chosen provider to government agencies and some of the world’s largest companies, universities, nonprofits and tour operators. Our mission is simple – to be there when it matters most.SITE: www.globalrescue.com Address : 85 MECHANIC ST, LEBANON, NH 03766 USAALL DATA SIZE: ~155gb 1. Personal documents 2. Acct 3. Public 4. Legal 5. HCM and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>ssmnlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13268</link>
<guid>951cb7fcf08241d659513d4e84acdfaa</guid>
<pubDate>Tue, 13 Feb 2024 22:23:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>ssmnlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d09cc6d5101ad56947e4476f4daa9a03d57dc9ce7b1a02a791fb10f98210654</i><br /><br />Threat actor <b>description</b>: <i>Sanford, Pierson, Thone & Strean, PLC is a team of result-oriented creative problem solvers working to meet our client’s personal and business needs. Our goal is to help people and businesses have productive todays in pursuit of better tomorrows. Founded in 1995, Sanford, Pierson, Thone & Strean continues to evolve with clients in an ever-changing legal landscape. Our attorneys are licensed to practice law in Minnesota, Wisconsin, North Dakota, and the U.S. District Courts of Minnesota, Western Wisconsin, and Eastern Wisconsin.  We provide legal services in the areas of Business and Corporate Law, Litigation, Estate Planning & Probate, Trustee Services and Real Estate. Sanford, Pierson, Thone & Strean is located in Wayzata, Minnesota.SITE: www.ssmnlaw.com Address : 1905 East Wayzata Blvd., Suite 220 Wayzata, MN 55391 USAPhone: 952-404-2100​ALL DATA SIZE: 401gb 1. Business Data 2. ACCOUNTING 3. Budgeting Documents 4. HUMAN RESOURCES 5. Payroll 6. Users Shared Folders, Documents and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>leonardssyrups.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13269</link>
<guid>01f6211e00cc8f00a7b68e8e24b1b4d6</guid>
<pubDate>Tue, 13 Feb 2024 22:22:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>leonardssyrups.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f3b8b0ea3791c768b0a88bc4407fa366e5e6a129272f2c41dc572b661a8c172f</i><br /><br />Threat actor <b>description</b>: <i>Leonard’s Syrups. Proudly servicing Michigan since 1964. Celebrating 55 years in business, Leonard’s Syrups, a family-owned and operated company, has been a trusted supplier to bars, breweries, and restaurants – large and small – since its establishment in 1964. As a leading beverage gas, draft beer equipment, soda machine, and Coke syrup supplier in Detroit, Saginaw, and Grand Rapids, Leonard’s Syrups serves the diverse needs of businesses all over Michigan, cementing their legacy as a dependable partner in the foodservice industry for over five decades.SITE: www.leonardssyrups.com Address : 4601 Nancy St., Detroit, MI 48212 Unated States (313) 891-4141ALL DATA SIZE: 453gb 1. Leonard’s Documents 2. Human Resources 3. Financial data 4. Personal folders and documents and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>universalservicesms.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13263</link>
<guid>f23077b60542b92033df4d2e208706de</guid>
<pubDate>Tue, 13 Feb 2024 17:42:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>universalservicesms.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b90b4823e9a0006b26c03ff3a681d9805ad9661a2242e10cbeddd510b1c00d5e</i><br /><br />Threat actor <b>description</b>: <i>Greetings!Today we are posting here the new company, "Universal Services LLC".Company Description: Universal Services LLC offers the unique capability of in-house design, fabrication, and installation; saving cost, schedule, and coordination....</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Communication-Federal-Credit-Union</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13264</link>
<guid>e81218f96c55d1006352ed0a3b08d790</guid>
<pubDate>Tue, 13 Feb 2024 17:41:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Communication-Federal-Credit-Union</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0bb2883d311579cf5cf26d71afcac9543b8abc28aef6d3724a209f89031994db</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>https://www.comfedcu.org</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>ArcisGolf</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13260</link>
<guid>18cd151a4b7a5f5258220cfd707fd67b</guid>
<pubDate>Tue, 13 Feb 2024 13:11:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>ArcisGolf</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e691ddfa13e42882b959194026049d917c78e6cd8d09815e76980f628ae2912</i><br /><br />Threat actor <b>description</b>: <i>Arcis Golf is the premier operator of nearly 70 private, resort, and public golf clubs in the United States and an industry leader, providing dynamic direction and unrivaled amenities that complement diverse playing experiences. Our properties enhance the golf and country club lifestyle to a level of excellence designed to exceed the needs and expectations of family, friends, co-workers, and guests of all ages.  We are also known for our innovative management, with a best-in-class leadership team that is reinventing the modern club experience, making it more relevant to the lifestyles of today's consumers. Arcis Golf is committed to enhancing service levels, amenities, and programming to broaden the appeal for members and guests at all its properties.</i><br />Target victim <b>website</b>: <i>https://arcisgolf.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Procopio</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13256</link>
<guid>7d1465fa9e3d1f2e8d9f310b400c614e</guid>
<pubDate>Tue, 13 Feb 2024 11:39:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Procopio</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>658b60d4a97f180b5aabcc4286e892c09195fd08d69cc9494b8f2732876755ef</i><br /><br />Threat actor <b>description</b>: <i>At Procopio, we strive to provide the highest level of client service. Our deep bench of nearly 200 seasoned and diverse attorneys offer practical legal solutions to clients around the world, with expanded reach through affiliations with the Meritas and LEI global law firm networks. We get to know your industry and its challenges, and partner with you to identify your unique business opportunities and capitalize on them now and into the future.</i><br />Target victim <b>website</b>: <i>https://www.procopio.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-Indy-Containerboard</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13257</link>
<guid>f2843fe2048acb2e687eeebe826db352</guid>
<pubDate>Tue, 13 Feb 2024 11:38:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>New-Indy-Containerboard</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5769d269aff3845c6da0b704ef7e366a9dc97be21b557426c482dd272eaccca3</i><br /><br />Threat actor <b>description</b>: <i>A joint venture between The Kraft Group and Schwarz Partners LP was formed to establish New-Indy. The company name is derived from being the Newest Independent manufacturer and supplier of recycled containerboard in the corrugated box industry.  With over 2,000 employees from Southern California to the coasts of the Carolinas, New-Indy plays an integral role in the everyday lives of people across the country and around the world through its innovative packaging solutions to serve the needs of every customer.   At New-Indy, we are your steadfast partners from concept to delivery. Our unwavering support ensures that your products are presented, protected, and transported with excellence, ultimately maximizing your sales potential. </i><br />Target victim <b>website</b>: <i>https://newindycontainerboard.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>garonproducts.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13251</link>
<guid>645f86b5cec4da0a56ffea7a891720c9</guid>
<pubDate>Mon, 12 Feb 2024 22:29:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>garonproducts.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb111b33202e3415bdec9a7eb41e420024fb95483507a2fa2c9693c9109ba265</i><br /><br />Threat actor <b>description</b>: <i>For over 60 years, Garon Products, Inc. has defined what it means to be a trusted concrete coating supplier. Our top-quality concrete floor repair products and floor coatings meet the demands of even the most challenging industrial,...</i><br />Target victim <b>website</b>: <i>garonproducts.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>Antunovich-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13250</link>
<guid>975ae6d3ce8ae6e0711821a97a9f5fae</guid>
<pubDate>Mon, 12 Feb 2024 22:11:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Antunovich-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a381d98d25b6263a14bf7226d31ebdb40bb6c8faf3c870b653919037f688a3de</i><br /><br />Threat actor <b>description</b>: <i>Antunovich Associates is an Architectural, Planning and Interior Design Firm with offices located in Chicago, Illinois, and Washington</i><br />Target victim <b>website</b>: <i>http://antunovich.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>DHXDependable-Hawaiian-Express</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13248</link>
<guid>e7bf615d7da357e85843bafdfbc45719</guid>
<pubDate>Mon, 12 Feb 2024 19:38:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>knight</b> claims attack for <b>DHXDependable-Hawaiian-Express</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ebab7eb7d5ddda4f6510027d8bbb8f14b0b79289ddfdb5977ed40fbcd5fa93e</i><br /><br />Threat actor <b>description</b>: <i>DHX–Dependable Hawaiian Express20 GB of accounting documents were stolenbackup NAS server stolenDHX-Dependable Hawaiian Express is the leading ocean freight company currently serving Hawaii and Guam. Offering ocean services, both Full Container Load (FCL) and Less Than Container Load (LCL), you can ship from all four west coast ports and throughout the continental U.S. to Hawaii and Guam. Using our transcontinental trucking network, we move LCL shipments from any point in the United States, and we offer FCL intermodal services to and from Hawaii and Guam. We also offer both LCL and FCL eastbound service from Hawaii and Guam to the continental U.S.DGX–Dependable Global Express Visit SiteDGX is one of the most respected international ocean and air freight service providers. DGX serves global ocean and air destinations through most ports or airports, to and from any point in the United States, as well as between foreign points. With consolidation, Full Container Load (FCL) and Less Than Container Load (LCL) services from most worldwide locations and all global origins to any point within the continental U.S., DGX has terminals and gateways in Long Beach, Oakland, Portland, Seattle, New York, Atlanta, Chicago and Houston. Additionally we have 14 offices located throughout the Pacific Rim, Oceania, Asia and the Pacific Islands. See all DGX USA Gateway locations.Our air service offers the highest quality of global air freight service available within the air cargo industry. Shipments from 1 lb to 10,000 lbs or more can easily move door to door, or door to airport. Whether oversize, heavyweight or hazardous materials, we ensure that the integrity of your shipment is maintained throughout carriage. DGX is fully compliant with all U.S. Government agency rules and regulations including TSA, DHS, and FAA and is also IATA licensed.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>knight</category>
</item>
<item xmlns:dc='ns:1'>
<title>Forgepresion.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13244</link>
<guid>08823e44200e4d4e71674e8104eff7dd</guid>
<pubDate>Mon, 12 Feb 2024 18:54:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Forgepresion.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d4e93a090e0b9a5ed7c0ca12f19e8ca811a47a8b1163ee960c04b7a42a015524</i><br /><br />Threat actor <b>description</b>: <i>Country: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>bv.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13245</link>
<guid>d68229f521316a03b517e42128c87060</guid>
<pubDate>Mon, 12 Feb 2024 18:54:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>bv.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e70b9b0d4bd3183372fbfd39a3889f304db2e7bcd4f74e3e75bbe3992d027840</i><br /><br />Threat actor <b>description</b>: <i>Country: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lower-Valley-Energy-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13242</link>
<guid>3a78f1864ab77dbd239fbe33cae90bbb</guid>
<pubDate>Mon, 12 Feb 2024 15:00:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Lower-Valley-Energy-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab9f4b7050aa819443deba7c961d515c912059406aa98f90cb95b4c6423d9801</i><br /><br />Threat actor <b>description</b>: <i>Full data dump available. USA phones: AFTON (307) 885-3175 JACKSON (307) 733-2446</i><br />Target victim <b>website</b>: <i>http://lvenergy.com </i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Modern-Kitchens-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13241</link>
<guid>e1241d1b9692c1e9f4ebbf6896f0e33e</guid>
<pubDate>Mon, 12 Feb 2024 14:57:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Modern-Kitchens-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c3d14f6b8aba95cbea57a488daf696b7204f3eaf895ffbbf2b1c9a1b2b5cbad</i><br /><br />Threat actor <b>description</b>: <i>Modern Kitchens is a distributor of built-in appliances and cabinets in upstate New York. The corporate office is located at 5801 Court Street Rd. At Military Cir, Syracuse, New York 13206, US</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Allmetal-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13235</link>
<guid>c1adc7e5ae982a010af2eb442b583640</guid>
<pubDate>Mon, 12 Feb 2024 10:54:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Allmetal-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63fd3352b6afa2546c540eab4ec6e84fa10aa838c8f1c4f7f80f22ccfd9d1b08</i><br /><br />Threat actor <b>description</b>: <i>SALE</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Freedom-Munitions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13236</link>
<guid>7507dafaedac784a18c852536bbd3c88</guid>
<pubDate>Mon, 12 Feb 2024 10:53:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Freedom-Munitions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f068225cb7e8a7754e24fae8d35dc7b3427e0fc2a745feff390304a6f12247ae</i><br /><br />Threat actor <b>description</b>: <i>SALE</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arlington-Perinatal-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13237</link>
<guid>3f258712c3ba708ba78a60afde94352a</guid>
<pubDate>Mon, 12 Feb 2024 10:52:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Arlington-Perinatal-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0aa8b5dd10d0641c8a0f209321ef74f660774612e80fa2831d2e3bba3631b431</i><br /><br />Threat actor <b>description</b>: <i>FREE</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>jacksonvillebeach.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13232</link>
<guid>695553c0c5ba292284a3e1e64da6ed47</guid>
<pubDate>Mon, 12 Feb 2024 10:36:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>jacksonvillebeach.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>394eea285a0873a2be5b51e3608569158455c2c5dd211d4fe283a821819de415</i><br /><br />Threat actor <b>description</b>: <i>Jacksonville Beach, FL</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>robs.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13233</link>
<guid>8f1bac3967e0ff70ebc09d8ca5e08633</guid>
<pubDate>Mon, 12 Feb 2024 10:35:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>robs.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2546e3d1b18ea2452a73a4cac5ffc4f33250ee5af798b4a1ce41a64890436e30</i><br /><br />Threat actor <b>description</b>: <i>River Oaks Baptist School is a private Christian school with grades Preschool-8 in the heart of Houston, Texas</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>grotonschools.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13225</link>
<guid>7884effb9452a6d7a7a79499ef854afd</guid>
<pubDate>Mon, 12 Feb 2024 10:34:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>grotonschools.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff328a5fee52be8d1890bc2be32fba0f1e3b9dd4652eeb9a345dba7d3838d8a1</i><br /><br />Threat actor <b>description</b>: <i>grotonschools.orgGroton Public Schools (GPS, Groton School District) is a school district in New London County, Connecticut based in the city of Groton, Connecticut, United States. The Groton Public School District services approximately 4,000 stud...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>plexustelerad.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13220</link>
<guid>d0d80c2a8e1344d9026b2b1261a070f2</guid>
<pubDate>Mon, 12 Feb 2024 10:29:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>plexustelerad.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f568aac0f122680fce1cc2bbb8e27f094ae05e92e3a88856b73ce8e43977b69</i><br /><br />Threat actor <b>description</b>: <i>PLEXUSTELERAD.COM</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>silverairways.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13223</link>
<guid>c7f1734f2e7b3ea403e447de4a566ed2</guid>
<pubDate>Mon, 12 Feb 2024 10:27:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>silverairways.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cafddc58ce719d12dc5a949429323c7369bb9a5ecf580ff447b8a71bbca7541d</i><br /><br />Threat actor <b>description</b>: <i>Silver Airways is a leading regional U.S. airline operating flights between gateways in Florida, the Southeast and The Bahamas. Silver Airways, affiliates of Versa Capital, is headquartered in Fort Lauderdale, FL. The Silver Airways fleet is comp...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Amoskeag-Network-Consulting-Group-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13213</link>
<guid>65a54865de989d0a6a60a8ad5b07e071</guid>
<pubDate>Sun, 11 Feb 2024 14:27:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Amoskeag-Network-Consulting-Group-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>548fb6d8411d18cbca26e872ff63b2ac6ebc88c80aaa8d7447875c65aaa818bf</i><br /><br />Threat actor <b>description</b>: <i>Amoskeag Network Consulting Group, LLC is a provider of IT outsourcing, virtualization and cloud services, the company was founded more than 30 years ago and employs 13 employees. Amoskeag Network Consulting Group corporate office is located in 75 Gilcreast Rd Unit 306, Londonderry, New Hampshire, 03053, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Upper-Merion-Township</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13211</link>
<guid>4a4ae8ed6f8e3608223f48427320c936</guid>
<pubDate>Sat, 10 Feb 2024 22:14:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Upper-Merion-Township</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>453c2756efedc5bb946d71dd6e6f40ae54524024032e3090d6fa4001f11d0096</i><br /><br />Threat actor <b>description</b>: <i>The Upper Merion Youth Wrestling Association (UMYWA) is a non-profit organization, which has been in existence for over 40 years. The wrestling club was formed with the purpose of introducing our communities youth into the sport of wrestling.            ...</i><br />Target victim <b>website</b>: <i>www.umtownship.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Village-of-Skokie</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13206</link>
<guid>6b406fba78d7b12a242a3bff04399604</guid>
<pubDate>Sat, 10 Feb 2024 19:28:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Village-of-Skokie</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e729fc8b9e9e3d1bcabcae623cb34ee0312936dc51342078da41c4356653a3fa</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.skokie.org</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lancaster-County-Sheriffs-Office</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13207</link>
<guid>1a8207690ac54d845f7a57dd468970fa</guid>
<pubDate>Sat, 10 Feb 2024 19:27:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Lancaster-County-Sheriffs-Office</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>078470035206fd3f8d78c1956d12d4e4eb8e9e01e159457ea84dee4640dca61e</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.lancastersheriff.net/</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Benchmark-Management-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13209</link>
<guid>26a95b3bf6c0fa4ba909250facfb5ae9</guid>
<pubDate>Sat, 10 Feb 2024 19:25:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Benchmark-Management-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>244312956c0e55002b2311ed3d038b055eca7e13b549adfc9e4c0118414dae9e</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.benchmarkgrp.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carespring-Health-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13204</link>
<guid>57e249d780392f6757229ae62dc68318</guid>
<pubDate>Sat, 10 Feb 2024 19:21:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Carespring-Health-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>efba4a7ccbf5444e56416e6ed20fd989ee7e810f77fedaf1bd13fa389e5bcb65</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>https://www.carespring.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>mranet.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13199</link>
<guid>976b1a9632d56fe807128f14925de66b</guid>
<pubDate>Sat, 10 Feb 2024 17:42:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>mranet.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>059dd19b426cc3aaddd96992df66277b4d6bcd3bb3b80e4b84a5940b443a0f37</i><br /><br />Threat actor <b>description</b>: <i>mranet.org 3Tb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>maddockhenson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13198</link>
<guid>1845faa2957cb42b7ddd92b26f114c57</guid>
<pubDate>Sat, 10 Feb 2024 11:37:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>maddockhenson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8339cb44d57cafa5c2260d2b2ba68c64fb4c265da9b1d9a7a7a63b30107a9668</i><br /><br />Threat actor <b>description</b>: <i>OUR MISSION It is our mission to help businesses and individuals prosper by providing them with superior products, solutions, and services.   OUR VALUES Our values are deeply rooted in “good ole fashioned” commitment. We enthusiastically invest the time needed to get to know you and your business thoroughly. MaddockHenson PC is committed to provide our clients with exceptional personal service and advice that delivers long term value. We believe our value is best demonstrated by our long-term relationships (many of them are third generation) and commitment to supporting our staff with education and professional development.    A high level of standards and specialized staff training make a difference to ensuring every client receives a personal level of service.   QUALITY As trusted advisors, we are available to assist our clients by providing insightful advice that helps them make informed financial decisions.   If you have any questions or want to learn more about how we can help you achieve your financial goals, don’t hesitate to contact us today.</i><br />Target victim <b>website</b>: <i>maddockhenson.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>aisg-online.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13197</link>
<guid>5f26cc984eaa1376b07fc0439d531dba</guid>
<pubDate>Sat, 10 Feb 2024 10:30:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>aisg-online.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b356e9c0c23cc00598e9afefb7e3839331b2ca6d32cfe845da1f001063241fe0</i><br /><br />Threat actor <b>description</b>: <i>American Integrated Security Group (AISG) specializes in the design and deployment of open platform integrated systems including IP video surveillance, access control and security intrusion, perimeter protection and a full range of related wireless s...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pacific-American-Fish-Company-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13194</link>
<guid>2a51f806ae5d54633cd1a0ce91256a3c</guid>
<pubDate>Sat, 10 Feb 2024 02:42:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Pacific-American-Fish-Company-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e93344c32da5f220eccce04f9639fd1e2b6da00025a31d0f64ba92968a9839e</i><br /><br />Threat actor <b>description</b>: <i>In 1970, Joseph Huh, an immigrant from South Korea, moved to the United States with a dream. With a deep passion for seafood and cooking, Joseph founded Pacific American Fish Company (PAFCO) in 1977...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>water.cc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13193</link>
<guid>133fb38e53d861f95008113cca0fefbe</guid>
<pubDate>Fri, 09 Feb 2024 23:51:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>water.cc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e9557a7328523ffef4e0393d4914ebebac8ac5a7dc7741d9d6179f507d432c5a</i><br /><br />Threat actor <b>description</b>: <i>Living Water InternationalPursuing the physical, spiritual, and social flourishing of all people who lack safe water, sanitation, and hygiene through the global Christian community.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>CTSI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13191</link>
<guid>978362ce7b096266e2cefb878aa3250b</guid>
<pubDate>Fri, 09 Feb 2024 20:45:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>CTSI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26a40e2544f3f13ed4d9c20e21f60fad7461492c9cbbbc0e39b49e1e51d97391</i><br /><br />Threat actor <b>description</b>: <i>The company provides various services: environmental, health, & safety (EHS), industrial hygiene, technical services, emergency response.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>J.P.-Original</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13192</link>
<guid>fc7079c59bf3610c28028522c22f6ef8</guid>
<pubDate>Fri, 09 Feb 2024 20:45:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>J.P.-Original</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9184171b3911b280eac57aee82748e938b8a37b3580279ccc39e800918025278</i><br /><br />Threat actor <b>description</b>: <i>J.P. Original, makers of the popular labels Bamboo, Anne Michelle, Sunny Feet, Society 86, and Dollhouse is one of the leading shoe manufacturers in the marketplace since 1986.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>magi-erp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13189</link>
<guid>65c5532392c79b258bc34ee22c9cadcb</guid>
<pubDate>Fri, 09 Feb 2024 19:21:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>magi-erp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>275f3b082911aaeec1807b100dae0d44e2cca88746fe0b2627b33d98ce51326e</i><br /><br />Threat actor <b>description</b>: <i>MAGI develops and supports high quality ERP business solutions for small to mid-sized manufacturers. MAGI has been developing software solutions since 1985 and has installations worldwide. Our premier product, WinMAGI, is a world class manufacturing...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Capozzi-Adler-P.C.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13186</link>
<guid>db570f6a73a4d7e10ede827746ae992c</guid>
<pubDate>Fri, 09 Feb 2024 17:51:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Capozzi-Adler-P.C.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33ef9f6bf45c6eef91729539fe45b8561320bdaaf2fa66e760d742f749c74238</i><br /><br />Threat actor <b>description</b>: <i>Capozzi Adler, P.C. primarily serves the legal needs of healthcare and senior living providers that participate in the Medicaid and Medicare programs. Capozzi Adler, P.C.’s healthcare law services include: regulatory compliance & licensure, collections and Medicaid eligibility, CCRC licensure, admission agreements, guardianships, nursing facility sales & acquisitions, employment law & labor law, and Medicaid/ Medicare reimbursement appeals.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Drost-Kivlahan-McMahon--OConnor-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13187</link>
<guid>c3b7cab19af6d5c3b00428af950eef80</guid>
<pubDate>Fri, 09 Feb 2024 17:50:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Drost-Kivlahan-McMahon--OConnor-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>697f36dd04292a9bca36a35d79f69888049b259c81f04d4fed1d53fffb4faf9e</i><br /><br />Threat actor <b>description</b>: <i>Drost Kivlahan McMahon & O'Connor LLC has been establishing lasting relationships with individuals and businesses since 1987. The firm's success is based on the professional and efficient representation of each client in a convenient and friendly atmosphere. The cornerstone of the practice is the firm's ability to respond to client needs in a timely and practical manner while providing high quality legal services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grace-Lutheran-Foundation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13188</link>
<guid>2853427cee00e06272cf17d4be94f7d0</guid>
<pubDate>Fri, 09 Feb 2024 17:50:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Grace-Lutheran-Foundation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ddf252fbdec81738d51d873ca8240ae780430b10adbabb36ed90382044a9ce94</i><br /><br />Threat actor <b>description</b>: <i>Grace Lutheran Foundation Inc. is an organization who offers many areas of care for seniors including: Independent apartments for seniors, Assisted Living, Adult Day Services, Memory Care, Short -term Rehabilitation, Skilled Nursing and School aged childcare program.  The Grace Lutheran Communities network had been breached recently by our organization. As a result over 70GB of data leaked from there.   After a few weeks of negotiations Grace Lutheran Communities refused to protect data of its employees and patients/customers unfortunately. That is why these data is being shared right now to public for free. </i><br />Target victim <b>website</b>: <i>https://www.graceluthfound.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>maximumresearch.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13178</link>
<guid>1d6047b6fe956eae11ba23c70e9fe053</guid>
<pubDate>Fri, 09 Feb 2024 14:39:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>maximumresearch.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6888aa608f0683904dce9754f7a0725d11d8e747fe5bc6212d72e76b57bd14c</i><br /><br />Threat actor <b>description</b>: <i>MAXimum Research, Inc. is a market research firm with over 300 CATI stations. Our facility houses a100 CATI station phone room, in addition to 200+ remote agents across the US. Based in Southern New Jersey, just minutes from Philadelphia, MAXimum Res...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>willislease.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13180</link>
<guid>823de42f619c837112209aa7a127c4af</guid>
<pubDate>Fri, 09 Feb 2024 14:37:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>willislease.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>804eaf1ab2e3472d2e55bca615e19243b2ab55ee9318bf19e317a9998d72424a</i><br /><br />Threat actor <b>description</b>: <i>Willis Lease Finance Corporation has been a pioneer and provider of aviation services for over 45 years. Launched by founder Charles Willis with the then new and radical idea to lease jet engines to commercial airlines, WLFC has since purchased, leased, and sold more engines in more countries over a longer period of time than any independent competitor. We offer one of the broadest product lines in the industry, including engine types from all major manufacturers, lease terms to meet any operational need, engine pools and engine financing, sale leasebacks, forward purchases, finance leases and engine management. As a pioneer in establishing cooperative engine sharing pools, our North American CFM56-7B Engine Sharing Pool provides services for more than 600 aircraft and continues to be the market leader.SITE: www.willislease.com www.wlfc.global Address : 4700 Lyons Technology Parkway Coconut Creek, Florida 33073 USA Tel:  +1 561.349.9989ALL DATA SIZE: 910gb 1. CompanyFolders 2. Executive 3. Finance-Acctg 4. Human-Resources 5. Customers 6. Personnel 7. Users Shared Folders, Documents 8. Confidentiality & Nondisclosure Agrs and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>seymourct.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13172</link>
<guid>2a3d16448453d694b503aeebfd710aa7</guid>
<pubDate>Fri, 09 Feb 2024 11:39:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>seymourct.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b3ac27c67ea862cd5ce7398d663aca3c525acfab218d6c64c72d469f5422cdd4</i><br /><br />Threat actor <b>description</b>: <i>seymourct.org</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>bsaarchitects.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13173</link>
<guid>776a26e444979d5cd460744ae7ad4932</guid>
<pubDate>Fri, 09 Feb 2024 11:39:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>bsaarchitects.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a2f2f7556b4803f7dfbb849f48002663d6d26faf503dc6805a543d7c3b3e64e0</i><br /><br />Threat actor <b>description</b>: <i>Bull Stockwell Allen – Architecture + Planning + InteriorsBull Stockwell Allen is an award winning architecture, interior design and planning firm known for its work in hospitality and resort projects</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>posen.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13175</link>
<guid>fc1ace212b6412408fce9ee74928fb19</guid>
<pubDate>Fri, 09 Feb 2024 11:37:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>posen.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>873e69a010ba9ffcf4c8e719464bfeb959e18e5963012d3e48b29700f1f9afb9</i><br /><br />Threat actor <b>description</b>: <i>Posen Architects 724Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>macqueeneq.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13170</link>
<guid>c034642a2ae7547082484627da30f1fd</guid>
<pubDate>Fri, 09 Feb 2024 10:09:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>macqueeneq.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc2d843cff3eac9d12f3e9aea718e4abf451da64dd0e6df36b8110613e990b74</i><br /><br />Threat actor <b>description</b>: <i>Since 1961 the MacQueen Equipment Group has been growing and serving multiple heavy equipment industries in the Midwest. In addition to sales, MacQueen has five service facilities that provide maintenance, parts and training that deliver maximum upti...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>parksite.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13171</link>
<guid>d6514676989f92a818f029bbc25b7110</guid>
<pubDate>Fri, 09 Feb 2024 10:07:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>parksite.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c37fe2393b37536e0110061e0ece5e4db33165d60591581850941f88ac9f3d2e</i><br /><br />Threat actor <b>description</b>: <i>Download link #1: https://***************.onion/PARKSITE/PROOFMirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/PARKSITE/PROOF </i><br />Target victim <b>website</b>: <i>parksite.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>solveindustrial.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13168</link>
<guid>867079fcaff2dfddeb29ca1f27853ef7</guid>
<pubDate>Fri, 09 Feb 2024 07:13:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>werewolves</b> claims attack for <b>solveindustrial.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>80289a7cba11a47e297f5da0f438bf89a346019f63763068c6364cf772a0efa8</i><br /><br />Threat actor <b>description</b>: <i>Клиенты из самых разных отраслей обращаются к Solve Industrial Motion Group™ за подшипниками и компонентами передачи мощности, которые выдерживают даже самые тяжелые условия. У компании более 25 000 наименований позиций, а также собственный инженерный отдел, который может не только разрабатывать, но и производить компоненты в точном соответствии со спецификациями. Компания помогает OEM-производителям и конечным пользователям по всему миру двигаться вперед.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>werewolves</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ducont</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13165</link>
<guid>d18b09180684862f5665e1932fdb54fb</guid>
<pubDate>Thu, 08 Feb 2024 20:44:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Ducont</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a389a5cf8a8e42dc1b5df680da5423f048e7575e8b10403469977977e979d8c</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.ducont.com/</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>perkinsmfg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13164</link>
<guid>33bd1b801b3cf1b8eaf31d816bca2c95</guid>
<pubDate>Thu, 08 Feb 2024 19:18:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>perkinsmfg.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f08db12f036e9e2e35429235502269ad20556fe9496409c856ccc150c702d2b7</i><br /><br />Threat actor <b>description</b>: <i>Perkins Manufacturing was one of my father’s biggest pride and joy. My siblings and I grew up chasing garbage trucks and going to visit dumpers in the back of restaurants all through our childhood. When I got married we even had our wedding presents...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>originalfootwear.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13163</link>
<guid>f2f9990bcda13be8771d656bf489dad5</guid>
<pubDate>Thu, 08 Feb 2024 18:38:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>originalfootwear.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c62e6cda6892dc7fc725f1f5b489188a81a9481938c9195b73b17a8b599fabcd</i><br /><br />Threat actor <b>description</b>: <i>Original Footwear is the leading manufacturer of occupational and tactical footwear for military, law enforcement and first responders. Founded in 1999, and based in Morrison. Tennessee, Original Footwear is the parent of Altama, Original S.W.A.T and...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jewish-Home-Lifecare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13161</link>
<guid>1df146af0948a68b1342ce39907668fe</guid>
<pubDate>Thu, 08 Feb 2024 17:47:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Jewish-Home-Lifecare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f5a2bc32f932c55d1f46f6c63ea01edb08df0379953b00eb938e26043e6f5e0</i><br /><br />Threat actor <b>description</b>: <i>Phone Number (212) 870-5000 Headquarters 120 W 106th St, New York City, New York, 10025, United States  The New Jewish Home is a comprehensive, mission-driven nonprofit health care system serving older New Yorkers since 1848.</i><br />Target victim <b>website</b>: <i>jewishhome.org</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Western-Municipal-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13160</link>
<guid>a3a8185b610d2c5e39015f64972c8705</guid>
<pubDate>Wed, 07 Feb 2024 19:36:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Western-Municipal-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>67eafd54361af258d81409b568902755d3995e3039af335ed5b5ab0f7c503e9a</i><br /><br />Threat actor <b>description</b>: <i>Commercial & Residential Construction · Montana, United States</i><br />Target victim <b>website</b>: <i>http://www.wmc-i.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southwest-Binding--Laminating</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13158</link>
<guid>1a3c31f4aad8845d25e421c69b07610d</guid>
<pubDate>Wed, 07 Feb 2024 18:00:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Southwest-Binding--Laminating</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>181398632cbd9f0048b4165492f3537574d65d8eac82b955f8e1b0442322ab25</i><br /><br />Threat actor <b>description</b>: <i>Southwest Binding & Laminating is a supplier of document binding and laminating equipment to public and private sector customers nationwide.</i><br />Target victim <b>website</b>: <i>http://swbindinglaminating.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>transaxle.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13157</link>
<guid>966b795bc7f3ccb35e3da08aebe98f18</guid>
<pubDate>Wed, 07 Feb 2024 11:57:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>transaxle.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e802d19785c105df5d1eb5b78df023b61aeeba447e3d5f0bc15336d9bd44aef9</i><br /><br />Threat actor <b>description</b>: <i>transaxle.com 795Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>PWS---The-Laundry-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13155</link>
<guid>afd208b1d98bc70e0aedc93bb4371c14</guid>
<pubDate>Wed, 07 Feb 2024 03:00:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>PWS---The-Laundry-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1564bdf80619b0971901ea8bc124b09aaa41116785ea0eafebd1b2da85584954</i><br /><br />Threat actor <b>description</b>: <i>PWS is committed to being the premier full-service provider to the commercial laundry industry in the United States. We commit to the success of our customers by providing the highest quality equipment brands and service, technological advancements, and innovative business solutions, driven by 40 years of proven performance. pwslaundry.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>PJ-Green-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13149</link>
<guid>822101d70094b444b08be638059568f2</guid>
<pubDate>Wed, 07 Feb 2024 02:59:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>PJ-Green-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f5b8330ced03634f23538928c9ad7f8306c629020a804abeeed9dca965d51ae5</i><br /><br />Threat actor <b>description</b>: <i>PJ Green gets it right the first time! We love a good challenge and can handle every phase of your project from start to finish! PJ Green is an innovative direct marketing communications company specializing in integrated marketing solutions to meet your customer's direct response needs. Our success for the past eighty years stems from our "customer first"​ philosophy coupled with leading edge technologies in data driven management, customized design, printing and mailing services. https://pjgreen.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Worthen-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13150</link>
<guid>302fb879d23a9f8b8b43c453fd3bfed3</guid>
<pubDate>Wed, 07 Feb 2024 02:58:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Worthen-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>551e0a8e09526b35f9178cd0e7982707db4862998aff3ba5c8e44d7e8c51a568</i><br /><br />Threat actor <b>description</b>: <i>Worthen Industries is a chemical and technology manufacturer of high quality industrial adhesives & coatings, extruded films, and coated substrateswww.worthenind.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>deltron.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13142</link>
<guid>cbd37fc75cd08ceff5c904ec09374997</guid>
<pubDate>Tue, 06 Feb 2024 20:46:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>deltron.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>abc4978695153e828a16ee638ba30ebee5a82a6ff61dfe7d00fef1ed60f570e2</i><br /><br />Threat actor <b>description</b>: <i>deltron.com 8.9Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>BB-Electric-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13138</link>
<guid>50a889faa543a3d86525f9325e47e593</guid>
<pubDate>Tue, 06 Feb 2024 17:34:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>BB-Electric-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a0c1073c4be3071d3b1773d2536b495978fffae4f7027c9abb830ceedbe6e4b</i><br /><br />Threat actor <b>description</b>: <i>For 30 years, B&B Electric has been proudly serving customers in a 100-mile radius around Eau Claire and Hudson, Wisconsin. From service calls and home rewiring to new home installation, B&B Electric provides all the services required to keep your home electrical.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hbl-Cpas-P.C.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13137</link>
<guid>c8713899f5d7bf79084d5550b0461b65</guid>
<pubDate>Tue, 06 Feb 2024 16:19:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Hbl-Cpas-P.C.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f24adef80217fa929f61fcd16edbb32bf994b18a55e277de7afcb47eb49be71a</i><br /><br />Threat actor <b>description</b>: <i>Our purpose is to deliver the highest value for our clients to help them achieve their vision by being their best guide and partner. But, what is a partner? What is a guide? And in which order should they occur? A partner is defined as one who takes part in an undertaking with others. A guide is a person who assists others to reach a destination by accompanying them. HBL was started in 1973 with a commitment to provide excellent client service. But over the last 40 years we have learned that providing excellent service isn’t enough. Clients expect excellent service.  We wanted to do better. And so the concept of being our clients’ best partner and guide was developed.</i><br />Target victim <b>website</b>: <i>https://www.hblcpa.com/</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Modern-Kitchens</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13133</link>
<guid>7cff4ce87d7f2179d73e7959bf213529</guid>
<pubDate>Tue, 06 Feb 2024 02:52:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Modern-Kitchens</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7e5165249d9289cd4d837a7d7daf0778b3635147f9f3f7e07f87af6bbfd701a2</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.modernkitchens.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ready-Mixed-Concrete</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13126</link>
<guid>54591b5c8d4291c395119bdbdb3a4ee9</guid>
<pubDate>Tue, 06 Feb 2024 01:33:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Ready-Mixed-Concrete</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a039695ff5bbefd619994f84c1832f36994f9f50b1b83f49a3f19e4abcfea36</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.aareadymix.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Northeastern-Sheet-Metal</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13127</link>
<guid>22781293bd688d958f3be27e4c26d2c3</guid>
<pubDate>Tue, 06 Feb 2024 01:32:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Northeastern-Sheet-Metal</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f21d5b83cacdfb4d80027ea7fffa2bf84607d10922cef55b55016ca97b197a7</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.nesmco.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>McMillan-Pazdan-Smith</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13129</link>
<guid>731d7f5490a6e7b524a9f2dba421edbf</guid>
<pubDate>Tue, 06 Feb 2024 01:31:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>McMillan-Pazdan-Smith</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b153be0976b454af8518fd2da2403f1df65f70060d680169358e75a2269ea31f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.mcmillanpazdansmith.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mason-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13130</link>
<guid>1686c5ec96f728148f941ab2b0f2cc35</guid>
<pubDate>Tue, 06 Feb 2024 01:31:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Mason-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bbc39e6f3b10671e9700c7a4dbe6e625fb42424d51252fa5f6dcaded10914568</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.masonconstruction.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Perry-McCall-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13132</link>
<guid>a868d710aa4ef67a68807ce4fe8bd0da</guid>
<pubDate>Tue, 06 Feb 2024 01:30:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Perry-McCall-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4bee42f62f98c160d41c18ebf2e7892a8e509398e42b7414a8f1aa9799200085</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.perry-mccall.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Virgin-Islands-Lottery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13121</link>
<guid>74890305f6e5581d18ccfdbc2dbd7939</guid>
<pubDate>Tue, 06 Feb 2024 01:29:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Virgin-Islands-Lottery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7bfefd5ae9c81b74299c946fda3c5b1c4ec35b5b501635eff388bb7caa37e6c</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.winusvilottery.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Premier-Facility-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13122</link>
<guid>8922176f5043c3196357e6e8d2d50852</guid>
<pubDate>Tue, 06 Feb 2024 01:29:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Premier-Facility-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b6c03a600819765a16c8cce09ba704f1144396a39d7fe355561e4b085cbc2d4</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.pfmgreen.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Douglas-County-Libraries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13123</link>
<guid>274da997412973c08cf7e78724153f55</guid>
<pubDate>Tue, 06 Feb 2024 01:28:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Douglas-County-Libraries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4af392bbd6f75e82c70bf9df3d008b72080018741a0a27871cbab77f34cc352f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.dcl.org</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Leaders-Staffing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13124</link>
<guid>7d3599b51843974f0e36e2cb2397ed32</guid>
<pubDate>Tue, 06 Feb 2024 01:28:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Leaders-Staffing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e2c57bdbe43e84f2370e08ccda58ed91da16ec18790802a315df9518e882294</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.leadersstaffing.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vail-Summit-Orthopaedics--Neurosurgery-VSON</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13118</link>
<guid>035042d40726e6ace259bef71f0acb03</guid>
<pubDate>Mon, 05 Feb 2024 19:33:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Vail-Summit-Orthopaedics--Neurosurgery-VSON</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>44bf10f63982d7458d2d133fdf08d8a20301edc5e6b388674596dd9e0846aa6f</i><br /><br />Threat actor <b>description</b>: <i>At Vail-Summit Orthopaedics & Neurosurgery, we are dedicated to providing our community (residents and visitors) with the highest quality of musculoskeletal care. Our physicians individualize treatment for each patient, taking their lifestyle, fitness goals, and the unique presentation of their injury into consideration.</i><br />Target victim <b>website</b>: <i>https://vsortho.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>hutchpaving.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13113</link>
<guid>c0e2bf725db7e7a854b8c181154d8059</guid>
<pubDate>Mon, 05 Feb 2024 17:57:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hutchpaving.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52087ba9dabcb334f9872adf887b49e57d2586f4d854fb5b6a83cb9089bb2a46</i><br /><br />Threat actor <b>description</b>: <i>Hutch PavingCommercial & Residential Construction Employees (lists with ssn numbers, residential address, DOB, passport scans, contracts, information on salaries, bonuses and other confidential documents for employees) Finance (budget, audit, tax...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Campaign-for-Tobacco-Free-Kids</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13115</link>
<guid>d3952b85dfe9e8b3b9c453532beb7208</guid>
<pubDate>Mon, 05 Feb 2024 17:55:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Campaign-for-Tobacco-Free-Kids</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>09e0e3b02f77006bdb61e0c8264e5c9dc075020c8faec1305108012433eaf29e</i><br /><br />Threat actor <b>description</b>: <i>Campaign for Tobacco-Free Kids</i><br />Target victim <b>website</b>: <i>http://tobaccofreekids.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>GRTC-Transit-System</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13112</link>
<guid>d6d46a8525c3ddc4c970734e4146e9be</guid>
<pubDate>Mon, 05 Feb 2024 14:47:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>GRTC-Transit-System</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff39c61990b0919ac5cd2cdca9bec8d9dcbf062d9bbbeee8f167c68071af35b6</i><br /><br />Threat actor <b>description</b>: <i>GRTC Transit System operates public transit systems. It provides local route bus transportation and mobility solutions including trip planning.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>ksa-architecture.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13110</link>
<guid>3e55526969e8df9ffaefe69d1d590825</guid>
<pubDate>Mon, 05 Feb 2024 14:34:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ksa-architecture.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6eb842acc7a2009975dba007ef1afb80e45caefadaf368dcee2f72c158ba2df6</i><br /><br />Threat actor <b>description</b>: <i>1 terabyte of private information, projects, construction schemes including Bank schemes</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>ultraflexx.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13108</link>
<guid>aa25a165a029282652901f835f9f83b5</guid>
<pubDate>Mon, 05 Feb 2024 13:32:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ultraflexx.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c53f163c7d64357271fd4c94f5377490649bd3fe29587957b4f2c91ce50ddcb4</i><br /><br />Threat actor <b>description</b>: <i>Our mission is to provide the world's largest, most reliable and compliant inventory of digitally printable textiles and flexible substrates.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>prima.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13104</link>
<guid>037c4b89b115a70b50f13db0d6b4da9d</guid>
<pubDate>Mon, 05 Feb 2024 12:02:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>prima.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d80a01c7523f1757be6992eb34e60020d0a7ad45125d77134c0c7a945af8cd9</i><br /><br />Threat actor <b>description</b>: <i>We're dedicated to growing, packing, and shipping high-quality stone fruits from the heart of California, so you can enjoy the best peaches, plums, nectarines, and apricots our orchards have to offer.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>DOD-contractors-you-are-welcome-in-our-chat.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13102</link>
<guid>213b9c781a1cb3740d204492e6ce20c0</guid>
<pubDate>Mon, 05 Feb 2024 01:35:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>donutleaks</b> claims attack for <b>DOD-contractors-you-are-welcome-in-our-chat.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>acb5e1964be77f50a31adbb036042e0296ee80a58d13f7d9b98240350790cd3f</i><br /><br />Threat actor <b>description</b>: <i>Hello [visitor_name]! We got some contractors of US Department of Defense here. They said SpaceX, Locheed Martin and Boing documents which is their legal property cost 20k usd. So we dont think like that and there our last warning. 500k usd at least: you will pay or all data…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>donutleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cole-Cole-Easley--Sciba</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13100</link>
<guid>2316788c9a61179830bbe49c5e767369</guid>
<pubDate>Sun, 04 Feb 2024 14:58:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Cole-Cole-Easley--Sciba</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>069602da4252b98ed4c4aa9c5af37b88fbf5547c6ccc5b79f8191eef332aa7f4</i><br /><br />Threat actor <b>description</b>: <i>Legal Company that specialize on Personal Injury, Car Accidents, Commercial Litigation, Oil $ Gas Law.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>cxm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13099</link>
<guid>58dcf38e3941ea8a0e4bd27dca3326a4</guid>
<pubDate>Sun, 04 Feb 2024 14:46:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>cxm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>08c569e365f9c7c2827e4220e2de8b464a95b511d7c068e812bba8fd11629b69</i><br /><br />Threat actor <b>description</b>: <i>Chicago Extruded MetalsFinance (budget, audit, cash flow, balance sheet, tax returns, project calculations, YTD reports, bank statements and many other financial documents) Employees (personal data of employees, contracts, information on salaries,...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Commonwealth-Sign</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13098</link>
<guid>4de9b7822e0de81fc734bc5689ab6f03</guid>
<pubDate>Sun, 04 Feb 2024 13:41:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Commonwealth-Sign</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1fdf7ed463f4c26271bd73760befe20e07b0f6bf83689c1b4f533dd9d970cd2</i><br /><br />Threat actor <b>description</b>: <i>The company has chosen to ignore us means its data will be open and available for download below.</i><br />Target victim <b>website</b>: <i>www.commonwealthsign.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>pbwtulsa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13095</link>
<guid>912578cebd95b3483921959730de49f3</guid>
<pubDate>Sat, 03 Feb 2024 12:07:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>pbwtulsa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a71909cc6344aa60c9d2d6eed869ae77f5334d08cd7ca158f6f7941055c6e28</i><br /><br />Threat actor <b>description</b>: <i>Data on lawyers/employees (ssn, ein, residential address, DOB, contracts, scans of passports and ID), financial documents (balance sheet, audits, tax forms, various financial statements, statements),Client databases, client cases containing confide...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Law-Office-of-Michael-H-Joseph</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13087</link>
<guid>25e1cacca4ed260e758af5d015088139</guid>
<pubDate>Fri, 02 Feb 2024 10:25:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Law-Office-of-Michael-H-Joseph</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ceed30ece7cf5500511b3379a432fc1d4290586a2e1338ba1ef0c2f982a3bb14</i><br /><br />Threat actor <b>description</b>: <i>Law Office of Michael H Joseph offers quality legal services to the New York City and Westchester communities.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tandem</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13086</link>
<guid>5159f683253665f2122788b700686d8b</guid>
<pubDate>Fri, 02 Feb 2024 10:24:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Tandem</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a0697afd87fa30f70dbb9cee516e30307a42fc37268883fcd8e6f6a395d44cb</i><br /><br />Threat actor <b>description</b>: <i>TANDEM is an award-winning design studio that was created on the philosophy that design is a product of minds working together.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Innovex-Downhole-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13085</link>
<guid>698ec16e76917ade649bd5c968cfc2b8</guid>
<pubDate>Fri, 02 Feb 2024 01:31:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Innovex-Downhole-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9137f61510714b1f6dbed267a62c2ea70272eb9e223cd04129eb3929b4e4a57</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.innovex-inc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>gatesshields.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13078</link>
<guid>7dc7538f41cbee2be86aa2559ade080c</guid>
<pubDate>Thu, 01 Feb 2024 20:47:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>gatesshields.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>86638478a3e57ed13368623e7d25844aa8cc9a6eca50cc92400759cb489441ca</i><br /><br />Threat actor <b>description</b>: <i>Documents and data in the amount of 400 GB. The documents contain data of more than 1000 clients: Personal data, addresses, telephone numbers, SSN, EIN. Types of documents: Customer loan agreements, real estate documents, wills, police arrest reports...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Borah-Goldstein-Altschuler-Nahins--Goidel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13077</link>
<guid>a14fd85ebbd38dbeddf3cd65ba2c1da1</guid>
<pubDate>Thu, 01 Feb 2024 19:36:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Borah-Goldstein-Altschuler-Nahins--Goidel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d79f30c61c3816aa64825b609d1a7a32275096598c994cfdaec60192c10c92f6</i><br /><br />Threat actor <b>description</b>: <i>Borah, Goldstein, Altschuler, Nahins & Goidel, P.C. specializes in residential and commercial properties law. All the info we haveon their clients and projects will be uploaded here. Lot's of documents with pieces of personal information could be found in thefiles.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>taloninternational.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13075</link>
<guid>9380e398ee9bea45b992a3daaa6b7c4d</guid>
<pubDate>Thu, 01 Feb 2024 12:02:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>taloninternational.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ccb263735dd1a57201f278c577e873a1641c2911fad1a8251d4feb6667346b89</i><br /><br />Threat actor <b>description</b>: <i>Talon International300GBClients (customer database with addresses, phone numbers, information on calculations, to whom and where products are delivered, NDA, contracts, approved design for each client, color scheme, sources, for brands 7FAM, Calv...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>bandcllp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13074</link>
<guid>93e37ed292096ae7d6f59c5d5d854dd9</guid>
<pubDate>Thu, 01 Feb 2024 10:39:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>bandcllp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>034a33ed1a7828b36adf8b1ad3a36e5c18d0b2db75da732f0722f7a021f0c713</i><br /><br />Threat actor <b>description</b>: <i>Baldessari & Coster LLP is a full-service Certified Public Accounting firm licensed in NY. All our CPA's hold valid NY State CPA Certificates.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Robert-D.-Clements-Jr-Law-Group-LLLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13072</link>
<guid>7835a9ef21ac8378a23835829594d598</guid>
<pubDate>Thu, 01 Feb 2024 06:43:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Robert-D.-Clements-Jr-Law-Group-LLLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c94bdadb1411403ce61bc24e0624cbf3ab19d0f0649a67c382fd520251a2f5a6</i><br /><br />Threat actor <b>description</b>: <i>Robert D. Clements, Jr. Law Group, LLLP represents clients seeking legal advice for issues such as divorce, child custody, personal injury, probate, insurance litigation, and business litigation throughout southeast Texas.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>mnorch.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13067</link>
<guid>c9da108374dde45533baccabee5beb23</guid>
<pubDate>Wed, 31 Jan 2024 22:34:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>mnorch.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4aa0c692fd48184ba774e11444a369d3a6d279d5fb4fa7f1746efb15a3b5b1a8</i><br /><br />Threat actor <b>description</b>: <i>Led by Music Director Thomas Søndergård, the Minnesota Orchestra is a Grammy Award-winning orchestra known for acclaimed performances around the world.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Galaxy-Fireworks-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13066</link>
<guid>8e1da93be98c91053ef56a0d7b9e3f9c</guid>
<pubDate>Wed, 31 Jan 2024 18:17:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Galaxy-Fireworks-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>55e15d3e5050173cee449d97424ba1c001b2c1098438753838d438d2b60af707</i><br /><br />Threat actor <b>description</b>: <i>Galaxy Fireworks, Inc. - importer, wholesaler and retailer of fireworks. The company was founded in 1984 and has 26 employees. Galaxy Fireworks corporate office is located in 204 E Dr Martin Luther King Jr Blvd, Tampa, Florida, 33603, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>SportsMEDIA-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13063</link>
<guid>8f48ba716a4af57ae9b2e0308c871c00</guid>
<pubDate>Wed, 31 Jan 2024 18:02:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>SportsMEDIA-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0d35274c66592d9b1c29421aff4275293b41faa8de56f7e067f9b3750265dce8</i><br /><br />Threat actor <b>description</b>: <i>SportsMEDIA Technology (SMT) is a developer and provider of sports technology. SMT technology includes virtual insertion, information systems, data</i><br />Target victim <b>website</b>: <i>www.smt.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>LeClair-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13064</link>
<guid>709f5f3e2479cb21f8f3976dbb3ebd53</guid>
<pubDate>Wed, 31 Jan 2024 18:01:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>LeClair-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8325c2d0ef3365e0622ae9e7fa0e5a7a3e09f79021819a5525b9029cab52371d</i><br /><br />Threat actor <b>description</b>: <i>6701 Upper Afton Rd, Saint Paul, Minnesota, 551... Phone Number(877) 532-5247 LeClair Group is an insurance brokerage general agency dedicated to supporting the growth and success of the independent insur</i><br />Target victim <b>website</b>: <i>www.leclairgroup.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hydraflow</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13065</link>
<guid>fed02ce0e96f989ec31e4eb6596bb06e</guid>
<pubDate>Wed, 31 Jan 2024 18:00:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Hydraflow</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7147e6951b0dbbb48195fda9ce17a3da36e4a1193660476f7be71f8708d3fa6d</i><br /><br />Threat actor <b>description</b>: <i>1881 W Malvern Ave, Fullerton, California, 9283... Phone Number (714) 773-2600  Founded in 1961 and headquartered in Fullerton, California, Hydraflow is a company that creates and manufactures engineered solutions for the fluid</i><br />Target victim <b>website</b>: <i> www.hydraflow.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>North-Hill</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13061</link>
<guid>658900b7144ee7b4f419cb8054361045</guid>
<pubDate>Wed, 31 Jan 2024 14:59:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>North-Hill</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cfd4319d94b43ec70d4762a6a9627741ada1d64552dd62a4fe3f53ccec31e92e</i><br /><br />Threat actor <b>description</b>: <i>Elderly Care Services · Massachusetts, United States · 106 Employees</i><br />Target victim <b>website</b>: <i>http://www.northhill.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ausa</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13058</link>
<guid>902daf6855267276c83a639cbb25165c</guid>
<pubDate>Wed, 31 Jan 2024 09:06:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trigona</b> claims attack for <b>Ausa</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa1f0eb2eeabae9c3da85ccf047257f39cbca04a2391eee46e53edf8bdc4f3ec</i><br /><br />Threat actor <b>description</b>: <i>AUSA, established in 1956 by four visionary individuals driven by a passion for engines, has evolved into a global force in compact all-terrain machines. With a profound history and an expansive presence, the company boasts a network of 600 dealers, operating in 90 countries across five continents.</i><br />Target victim <b>website</b>: <i>https://www.ausa.com/</i>]]></description>
<category>trigona</category>
</item>
<item xmlns:dc='ns:1'>
<title>CMG-Drainage-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13056</link>
<guid>530e685ac1c17f4c13ba184841f66796</guid>
<pubDate>Wed, 31 Jan 2024 09:04:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trigona</b> claims attack for <b>CMG-Drainage-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>23e80ae98ec92fd74bf0be78f78002ea5dcc9b449bcb15e2d6a99e6169cf0c5a</i><br /><br />Threat actor <b>description</b>: <i>Established in 1986, CMG Drainage Engineering stands as a prominent Civil Engineering consulting firm nestled in Tucson, Arizona, United States. For over three decades, CMG has been dedicated to providing exceptional water resource engineering services to both public and private sectors across Central and Southern Arizona. Strategically headquartered at 3555 North Mountain Avenue in Tucson, CMG oversees and manages a wide array of projects, offering comprehensive solutions tailored to meet the diverse needs of its clientele.</i><br />Target victim <b>website</b>: <i>https://www.cmgdrainage.com/</i>]]></description>
<category>trigona</category>
</item>
<item xmlns:dc='ns:1'>
<title>Daher-Contracting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13057</link>
<guid>265e5f95d04550eb5b53ab39f4860336</guid>
<pubDate>Wed, 31 Jan 2024 09:03:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trigona</b> claims attack for <b>Daher-Contracting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec9284c4bbed21b4d5c61d92d7e3deb93cbe36f977fd7a7107d46a0d94c87537</i><br /><br />Threat actor <b>description</b>: <i>Daher Contracting stands as the foremost excavation and site development contractor serving Okaloosa and Walton County. With roots dating back to January 1998, Daher has consistently upheld a commitment to delivering superior quality, cost-efficient results, and meeting even the most rigorous project schedules.</i><br />Target victim <b>website</b>: <i>https://www.dahercontracting.net/</i>]]></description>
<category>trigona</category>
</item>
<item xmlns:dc='ns:1'>
<title>Elliott-Wave-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13050</link>
<guid>9b1cab1b93285ce58e7c1dc576ff8a14</guid>
<pubDate>Wed, 31 Jan 2024 04:30:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Elliott-Wave-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4535746a12fdc8fa3e3eb83d97d7931ce36f78a634cbe948379262fa444124cb</i><br /><br />Threat actor <b>description</b>: <i>Expert Financial Market Analysis using the Elliott Wave Principle Elliott Wave International (EWI) is the largest independent financial analysis and market forecasting firm in the world, with approximately 100 employees spread throughout the country.elliottwave.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Basin-Trucking-and-Oilfield-Services-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13052</link>
<guid>096ce33c96792e289516407eb29b62bb</guid>
<pubDate>Wed, 31 Jan 2024 04:27:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Basin-Trucking-and-Oilfield-Services-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>15660d627b01092032011f5f92c2ad2da7a545fbd22819b9e72d83719eaa46a2</i><br /><br />Threat actor <b>description</b>: <i>Basin Concrete - Trucking and Rental provides oilfield trucking services and rental equipment throughout the central plains from North Dakota to Texas and everywhere in between. Our goal is to provide simple, complete, and cost-effective solutions to complex problemsbasintrucking.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Diamond-Technical-Services-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13047</link>
<guid>e1c599867ee5449a59e6c638200a3d92</guid>
<pubDate>Wed, 31 Jan 2024 02:54:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Diamond-Technical-Services-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7da6fc157769d1f8cab2b2e38d2b1ce72dc429214dd86e2ebcc3ae07bcb27157</i><br /><br />Threat actor <b>description</b>: <i>Diamond Technical Services, Inc. (DTS) is an inspection, technical services, and engineering consulting company focusing on utility, power, chemical, refining, food processing, pharmaceutical, and manufacturing industries. www.diamondtechnicalservices.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>sahchicago.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13045</link>
<guid>158388770a41292b277c199ca8d95ccf</guid>
<pubDate>Wed, 31 Jan 2024 01:02:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>sahchicago.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>84148935d613446cbedde27b1754f9fd3ff11356bb92d7ac856d67a3a132d2f4</i><br /><br />Threat actor <b>description</b>: <i>PART 1 .Always US Hospitals put their greedy interest over those of their patients and clients .Saint Anthony Hospital has been caring for its neighbors for over a century.Saint Anthony Hospital is an independent, nonprofit, faith-based, ac...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>clackamas.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13040</link>
<guid>9f2b49181d2539e79439f4c6a6716836</guid>
<pubDate>Tue, 30 Jan 2024 10:25:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>clackamas.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc4627438cb419be5de2abde64e3c3ddfcc940699d18254c44b6f12d34d6194d</i><br /><br />Threat actor <b>description</b>: <i>Clackamas Community College</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>MA-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13037</link>
<guid>05b0ea6e9b8e791347dfe157d54d679f</guid>
<pubDate>Tue, 30 Jan 2024 02:51:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>MA-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91fba4b7ea6e5680365fda90d4cc683076101998584fb4f8cdcb71b8da9921f5</i><br /><br />Threat actor <b>description</b>: <i>The firm traces its roots to Mancini, Alkateeb & Associates, Inc., a consulting engineering firm founded in 1988 by Peter Mancini and Joe Alkateeb.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>TECHNICA---HACKED-AND-MORE-THEN-300-GB-DATA-LEAKED</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13035</link>
<guid>1c39c39d1a341ba03ae48a942c6a43ef</guid>
<pubDate>Tue, 30 Jan 2024 01:20:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>TECHNICA---HACKED-AND-MORE-THEN-300-GB-DATA-LEAKED</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de713066b3ace8a961d5835f4214a95b3c81ffc54c89044ec7dd2b9c04a9918f</i><br /><br />Threat actor <b>description</b>: <i>Technica Dulles, VA (HQ) 22970 Indian Creek Drive, Suite 500 Dulles, VA 20166 703.662.2000 Contact-Us@technicacorp.com  Technica, founded in 1991 and headquartered in Dulles, Virginia, provides program management, technical expertise and IT solutions to federal government customers.</i><br />Target victim <b>website</b>: <i>https://technicacorp.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lomma-Crane--Rigging</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13031</link>
<guid>9e1a4ad1551fcb87bfeb7061da4e11a2</guid>
<pubDate>Mon, 29 Jan 2024 18:10:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trigona</b> claims attack for <b>Lomma-Crane--Rigging</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53741b062c7c39f2394241d47f779f61fffb8fcfa9f44b2550fed9acff91cf7f</i><br /><br />Threat actor <b>description</b>: <i>       J.F. Lomma, Inc. is a distinguished provider of crane services, offering a wide range of equipment and rigging solutions to meet the evolving needs of the construction industry. With a commitment to excellence and customer satisfaction, J.F. Lomma, Inc. strives to exceed expectations and build long-term relationships with clients.</i><br />Target victim <b>website</b>: <i>https://www.jflommainc.com/</i>]]></description>
<category>trigona</category>
</item>
<item xmlns:dc='ns:1'>
<title>Castilleja-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13030</link>
<guid>f2ce1333f818dec7cb51e00e74bedd15</guid>
<pubDate>Mon, 29 Jan 2024 17:58:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Castilleja-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12d3aa868776e51c8bc0e55cbd24a50ab9967b6e1ea6038284a448f426179f7c</i><br /><br />Threat actor <b>description</b>: <i>Castilleja School is an independent school for girls in grades six through twelve. We are going to upload about 10GB of data containing various files containing education process and administrative information. Numerous files with information about students.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Get-Away-Today</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13026</link>
<guid>14ee3cfc17b13a0f35bc3c22476ff77f</guid>
<pubDate>Mon, 29 Jan 2024 15:17:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Get-Away-Today</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7017419761965c5ab99a12ef20da8641d05182ada4cf495200dd167b42a32d77</i><br /><br />Threat actor <b>description</b>: <i>Get Away Today is an online travel booking service. We've taken afew databases with personal information of their clients. Thousand of lines. We'll make it available soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Safe-Plating</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13027</link>
<guid>9953a9514b2a810825f17416e1e32f7d</guid>
<pubDate>Mon, 29 Jan 2024 15:17:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Safe-Plating</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f00013e408939a88fd1a9793ce88374d70eddd6ded2ef670f1aab2b45ef4ccfa</i><br /><br />Threat actor <b>description</b>: <i>Leading Precious and Non-Precious metal plating in Southern California with 8 reel to reel lines as well as a rack and barrel lines. Their files will be available for downloading soon. Many project files, nda and other business docs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Black-Butte-Coal-Co</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13024</link>
<guid>fa2274da762c785b62434386a4e80f6d</guid>
<pubDate>Mon, 29 Jan 2024 14:55:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Black-Butte-Coal-Co</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ebbf338471dc6f4decc4080639bd015bda5f3e538e145bd73f4de5b841baa949</i><br /><br />Threat actor <b>description</b>: <i>Black Butte Coal Company operates a coal mine. The Company produces high energy, low sulphur coal from a surface mine in Wyoming.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Waterford-Country-School-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13025</link>
<guid>58426cf937eb05143f82b6d41e8968bd</guid>
<pubDate>Mon, 29 Jan 2024 14:55:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Waterford-Country-School-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>297476b9a9c83dc53e6d286f6345eb4b8eb52d7cae01d19af11a2fd90d3befe3</i><br /><br />Threat actor <b>description</b>: <i>For 100 years Waterford Country School has worked to meet the special needs of children and families at risk. Our services and programs have evolved with the transitions that life and community...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Benjamin-Plumbing-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13021</link>
<guid>83a46f92eec62c8ee20f7f38514607d2</guid>
<pubDate>Mon, 29 Jan 2024 14:54:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Benjamin-Plumbing-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>65cede66e26a974b8d1e5ca009e3ab27e4836eae139a41148c78cdc90bfbb90a</i><br /><br />Threat actor <b>description</b>: <i>With only one truck and a kitchen table office, Benjamin Plumbing, Inc. has grown to become an award-winning, second generation, family-owned plumbing business serving the greater Madison, Wisconsin...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>CORBETT-EXTERMINATING-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13022</link>
<guid>250202b148644c266354b266afe7b9d6</guid>
<pubDate>Mon, 29 Jan 2024 14:53:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>CORBETT-EXTERMINATING-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81a19f876b8d1d804202a2fa429d594e3014541efbd78dc1616da027f328fa33</i><br /><br />Threat actor <b>description</b>: <i>Pest control isn't always easy. But it is for us. Since Spencer Corbett founded Corbett Exterminating in 1976, Corbett has successfully managed to control pests for both residential and commercial...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>North-American-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13019</link>
<guid>a2b834e585967887c4522fa09f0b6395</guid>
<pubDate>Mon, 29 Jan 2024 11:58:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>North-American-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa0aa20d8784cafb81a261301eaaa6fffe6daa0a8401631ffb0d320889f8d980</i><br /><br />Threat actor <b>description</b>: <i>NAU is a private, non-profit, full-service college offering baccalaureate degree programs in three disciplines with several concentrations. We are located in South Houston, a few miles away from the...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>mordfin</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13018</link>
<guid>b79daeb88b395cd98299ae2a75ba77e5</guid>
<pubDate>Sun, 28 Jan 2024 18:05:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>mordfin</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>80f9c8cfd2fa38dc1483a1c453ba4c124fdf9c8a18f7a2415256d3345e520289</i><br /><br />Threat actor <b>description</b>: <i>The Mordfin Group was founded in 1922. The company provides accounting, tax, real estate, luxury, auditing, and estate planning services.Now you can download all data from this company.</i><br />Target victim <b>website</b>: <i>www.mordfin.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>oogp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13017</link>
<guid>a0594936f572d14b6fde439d55dc345a</guid>
<pubDate>Sat, 27 Jan 2024 13:10:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>oogp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f4af465e61009ef2ea44c467648edb9483a546fe79c14db6b3e2f3c315e6b11e</i><br /><br />Threat actor <b>description</b>: <i>Download link #1: https://***************.onion/OOGP/PROOF  </i><br />Target victim <b>website</b>: <i>oogp.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>vidalung.ai</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13015</link>
<guid>9990b876c04ba1532bf63a8944989828</guid>
<pubDate>Sat, 27 Jan 2024 10:24:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>vidalung.ai</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b12c04f80524f19787fc303c5fdb5d96911c973e0d8acd41cbc30f2c7654279a</i><br /><br />Threat actor <b>description</b>: <i>vidalung.ai 1.7Tb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kansas-City-Area-Transportation-Authority</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13013</link>
<guid>0079e3e6d496ad07cee7fd63d3d7c9b2</guid>
<pubDate>Fri, 26 Jan 2024 19:51:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Kansas-City-Area-Transportation-Authority</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff23f82b09ed1e8b945638192a4d86327eb2c2bc8df3f438cb4f1f315ee080a3</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1969 The Kansas City Area Transportation Authority is a public transportation agency serving counties in the Kansas City Area and has 327 employees.Kansas City Area Transportation Authority corporate office is located in 1200 E 18th St, Kansas City, Missouri, 64108, United States.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cislo--Thomas-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13010</link>
<guid>76185584223b2f7b9f3a91a2f9913135</guid>
<pubDate>Fri, 26 Jan 2024 19:37:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Cislo--Thomas-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>70b26fe26cb06d74b263833b3b44e025808dea9631fe64f19fe0b070dc14aaf5</i><br /><br />Threat actor <b>description</b>: <i>Cislo & Thomas LLP is a full-service intellectual property law firm providing patent, trademark, copyright and trade secret and legal services to the business and entertainment industries, both locally and globally through our network of partners.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Image-Craft</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13011</link>
<guid>3da508de45fcad17289fd382a1b95376</guid>
<pubDate>Fri, 26 Jan 2024 19:37:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Image-Craft</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d42634cd2c305cf73055c8844fa96ec56e495854a4947b7b1377457482b31066</i><br /><br />Threat actor <b>description</b>: <i>Image Craft is nationally recognized for planning, production and execution any kind of unique and exciting methods of visual communications.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shoma-group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13012</link>
<guid>d4e879aca51d48e0feba3112f0d1b8cd</guid>
<pubDate>Fri, 26 Jan 2024 19:36:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Shoma-group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d89ba3bb050bb917fe65d472dea8d83a65f58002369c9b5fb8792eacaabf1e71</i><br /><br />Threat actor <b>description</b>: <i>Shoma Group is a real estate development company that expertise in property management service of residential and commercial projects.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>ehsd.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13009</link>
<guid>c077c0cd415753c0f5f3aa9397d739e3</guid>
<pubDate>Fri, 26 Jan 2024 18:02:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ehsd.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d259518b1d889309bf83b67b2f65f90b1d5838c65ea3489fe1543ed239040c41</i><br /><br />Threat actor <b>description</b>: <i>Contra Costa County Employment & Human ServicesEmployees (lists with SSN numbers, residential address, telephone, email, passport scans, DOB, contracts, information on salaries, bonuses, and other confidential documents) Finance (budget, audit, tax...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>US-government-private-data-RothschildRockefeller</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13008</link>
<guid>5ca90602d3acd9a8f30b8a7cac1bdbb5</guid>
<pubDate>Fri, 26 Jan 2024 17:03:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>US-government-private-data-RothschildRockefeller</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3607a59dce183a588d9aa330609d058d764ee3bd177baa2f986881a11b200f03</i><br /><br />Threat actor <b>description</b>: <i>More information in our telegram channel https://t.me/snatch_teamIf you are wary of downloading information from our portal, all of it is duplicated in the open in our telegram channel.Joseph (Joe) Robinett Biden Jr.(+ Bonus Hunter Biden )Lloyd James Austin IIIAntony John BlinkenWilliam Joseph BurnsKimberly</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>sipicorp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13007</link>
<guid>b344953b75615eb41588c6753a3899e9</guid>
<pubDate>Fri, 26 Jan 2024 16:35:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>sipicorp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8a318dfdf7996f8610f847f9d6f88c8c3d0b258d6c3993ce91477ceb56064cbf</i><br /><br />Threat actor <b>description</b>: <i>Welcome to Sipi Corporation. Over the course of more than a century we have witnessed global economic highs and lows while maintaining a steady course to become a recognized leader in refining, recycling and reusing the world’s most valuable materials.SITE: www.sipicorp.com Address : Sipi Metals Corp. 1720 N. Elston Avenue Chicago, Illinois 60642-1579ALL DATA SIZE: 145gb 1. Users personal folders 2. ACCOUNTING 3. Corporate documents and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>elandenergy.com---------Eland-Energy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13005</link>
<guid>777faedf322f9cda62e87a9a1db76d24</guid>
<pubDate>Fri, 26 Jan 2024 15:01:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>mydata</b> claims attack for <b>elandenergy.com---------Eland-Energy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a5958cdadd5e5759b3d78e968dfb8edff9871f134a51e8e34f9600c9fc50e66</i><br /><br />Threat actor <b>description</b>: <i>Eland Energy is an independent oil and natural gas exploration and production company. Eland's operations are focused onshore in the United States.stole ~100gb docs</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>mydata</category>
</item>
<item xmlns:dc='ns:1'>
<title>Valley-TeleCom-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13004</link>
<guid>a62567b46de3c8efcf74bdf8317532b3</guid>
<pubDate>Fri, 26 Jan 2024 14:50:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Valley-TeleCom-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d5a42719ee39a1159eb345ae840e8d62e1558e4cdaa3236a4cbd86a39ebb91be</i><br /><br />Threat actor <b>description</b>: <i>Valley TeleCom is a leader in state-of-the-art broadband servicesthroughout service exchanges in Arizona and New Mexico with a wide range of products to fit the varied needs of current and future subscribers. We've obtained about 310GB of their files. Lots ofndas, confidential agreements, customers information, operational files and so on. We'll share everything soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>jaygroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13003</link>
<guid>7881f1e0495cfb89d108dae7db90f763</guid>
<pubDate>Fri, 26 Jan 2024 11:51:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>jaygroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c6859eca5f43c0a702de10a7d83b5ab8e26945fb7f31afd0a1470f131298cd73</i><br /><br />Threat actor <b>description</b>: <i>Download link #1: https://***************.onion/JAYGROUP/PROOF </i><br />Target victim <b>website</b>: <i>jaygroup.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Draneas-Huglin-Dooley-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=13000</link>
<guid>c7bc77c261dc56714cf777b3e72cca43</guid>
<pubDate>Fri, 26 Jan 2024 08:54:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Draneas-Huglin-Dooley-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3c4c1a92533e361f0ad66f478db66101b2afe01b90acbbe2e0cf53f868441fb</i><br /><br />Threat actor <b>description</b>: <i>Draneas Huglin Dooley LLC is an experienced law firm that has an exceptional reputation and is well respected in the community. Serving clients in the greater Portland metropolitan area and throughout Oregon, we focus on estate planning, taxation, litigation, business formation, real estate, probate, trust administration, guardianship and conservatorship, elder law, Medicaid, and special needs planning. Our strong tax background sets our firm apart. This knowledge and experience is helpful to business owners and individuals. Our qualifications and experience give the attorneys at Draneas Huglin Dooley LLC a well-rounded ability to provide practical and sound legal advice in an increasingly complex world.</i><br />Target victim <b>website</b>: <i>https://draneaslaw.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>OrthoNY-Orthopedic-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12998</link>
<guid>7d806dddbe08d7bec369ecdfdd6f7cbf</guid>
<pubDate>Thu, 25 Jan 2024 19:20:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>OrthoNY-Orthopedic-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4bd1b83c9c7bbac73b94ce134455d2a546bf22478d983d38e67692c280f08c17</i><br /><br />Threat actor <b>description</b>: <i>OrthoNY is a group of physicians, physician assistants and nurse practitioners, engaging within the orthopaedic care industry. The practice has locations in the greater Capital/Saratoga Region...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Four-Hands-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12997</link>
<guid>ac5145d76cd82e2fb875e94ba0c5b4b4</guid>
<pubDate>Thu, 25 Jan 2024 17:30:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>0mega</b> claims attack for <b>Four-Hands-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7afb0cd6e9d5b2162dec7edf9dce1658d2464567301e140965aa887e07dd9161</i><br /><br />Threat actor <b>description</b>: <i>Manufacturing and distributing home furnishing products, retail, design</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>0mega</category>
</item>
<item xmlns:dc='ns:1'>
<title>leclairgroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12993</link>
<guid>aba36cc3760e0b1c6a655f019a68b878</guid>
<pubDate>Thu, 25 Jan 2024 16:12:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>leclairgroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a960e452cbe83f9226725f7ff0d71ebf116b9414e81ba2e675d3711798e942f</i><br /><br />Threat actor <b>description</b>: <i>“Insurance Marketing” doesn’t exactly rhyme with “Madison Avenue.” Yet our business can be just as dynamic. That’s because helping you market insurance is not about selling cigarettes or skin cream but instead about building the brand called “you.” And no one gets you like LeClair. Built by brokers, for brokers, since 1931.SITE: www.leclairgroup.com Address : 6701 Upper Afton Road Saint Paul, MN 55125 UNITED STATES 651.739.2010FULL DATA SIZE: 1.5tb 1. Insurance 2. I-9 forms 3. 401K forms 4. Confidentiality</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>NOVA-Business-Law-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12994</link>
<guid>5d5c18e4cd078a34b4db2ac85fbc1ed0</guid>
<pubDate>Thu, 25 Jan 2024 16:11:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>NOVA-Business-Law-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d8836ba00d17d1e81031ed851d67d6f921e7e0ca6080bc2409f2a89ca443fee</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2003, Nova Business Law Group is a law firm based in Fairfax, Virginia. The firm's practice areas include contract drafting and review, employment dispute resolution, commercial litigation, commercial transactions, intellectual property, commercial real estate, and business immigration. The firm caters to financial services, energy and natural resources, health care, pharmaceuticals, telecommunications, technology, property development, and manufacturing among others.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Wiser-Financial-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12995</link>
<guid>e9f4bcf9d56d5602c41b7ec6ab371bdc</guid>
<pubDate>Thu, 25 Jan 2024 16:11:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>The-Wiser-Financial-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>500e80a6b520d4167953b75828e76353b8c8e5ce59e8067765c13f00a269fcc9</i><br /><br />Threat actor <b>description</b>: <i>The Wiser Financial Group (WFG) is one of southwest Michigan's oldest and largest independent financial services organizations. Since 1960 we have been helping families throughout the country identify a plan to help achieve their financial goals including retiremen.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>ANI-Networks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12992</link>
<guid>ec2f08ae409f4a81a531d63db671d55f</guid>
<pubDate>Thu, 25 Jan 2024 14:41:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>ANI-Networks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0648ef451b8bc4c86b075ae520d1e00b481b4207e5969edcf1366ed264f8de7a</i><br /><br />Threat actor <b>description</b>: <i>ANI Networks is a leader in the wholesale, carrier-class telecommunications industry. 30GB of data will be uploaded. There will bemany files with personal information (SSN, DOB and so on), nda, confidential agreements and other operational files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brightstar-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12987</link>
<guid>94f79e7c90b87514a07c47bdc5498262</guid>
<pubDate>Wed, 24 Jan 2024 22:23:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Brightstar-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4067b52b4bfb2f1a756212a7789f303698d41d2d91210fedcc442575bebe842a</i><br /><br />Threat actor <b>description</b>: <i>BrightStar Care was founded over 20 years ago on the belief that the best care always goes the extra mile. And that’s why we do exactly that for every client, family and organization we serve across the nation. From personal care, therapy, care communities, medical staffing and more, we’re always there for those who need us, showing that next level care is the most important part of who we are. We call it A Higher Standard®.</i><br />Target victim <b>website</b>: <i>https://www.brightstarcare.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hawbaker-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12986</link>
<guid>97f58cc60361f36cb40942c5c9a9e029</guid>
<pubDate>Wed, 24 Jan 2024 20:41:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Hawbaker-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1ad07cb83e33a26522c763a46869e58a63d0129825cb8dd0a7bbb33222cb099</i><br /><br />Threat actor <b>description</b>: <i>Hawbaker Engineering was born from a desire to build upon our wealth of construction experience, incorporating sound engineering principles into the design process from concept to completion. Combining construction know-how and engineering expertise under one roof allows Hawbaker Engineering to bring a unique perspective to the engineering, design, and construction communities. Since 2002 Hawbaker Engineering has been providing exemplary civil engineering, surveying, land development, and construction management services. We take pride in tailoring our services to best fit our client’s needs and budget. The inherent benefit of continual and integrated examination of project value, performance, constructability and schedule is one of the key drivers to Hawbaker Engineer’s success.</i><br />Target victim <b>website</b>: <i>https://www.hawbakerengineering.com/</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Innovative-Automation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12985</link>
<guid>2e37d41c9bf5cbd339a02696196e9a7b</guid>
<pubDate>Wed, 24 Jan 2024 19:21:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Innovative-Automation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>183b5f11f133a062ba962afd785d3d13e4b4d9cea49287780bed29ac9c547a13</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://inautomation.com/</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>IntegrityInc.org---Integrity-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12977</link>
<guid>001b8e3cf76f4e64cbe5be9882db4aa0</guid>
<pubDate>Wed, 24 Jan 2024 14:45:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>mydata</b> claims attack for <b>IntegrityInc.org---Integrity-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6e0aa3ce503e5a75362c5ddf6d402e5ce614798298022dde97529c2a26636c30</i><br /><br />Threat actor <b>description</b>: <i>IntegrityInc.org   Integrity, Inc. is an organization that provides home and community based services for people with developmental disabilities in the state of Arkansas.!!!this company has allowed confidential data to be published!!!SQL DB/accounting and other docs</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>mydata</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpswww.mikeferry.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12975</link>
<guid>3b63d1d64de8f499eadb49b53aa90964</guid>
<pubDate>Wed, 24 Jan 2024 14:43:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>mydata</b> claims attack for <b>httpswww.mikeferry.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>417c8b69b6ed64d751ad9f234791f2c4493ce5b0372c506ef80785b0fd6f16b9</i><br /><br />Threat actor <b>description</b>: <i>We publish the database of Mike Ferry, it includes the entire accounting of the company, the CRM base! Phones and personal data of the company's clients!Mike Ferry is the founder of The Mike Ferry Organization, the Global Leader in Real Estate Coaching and Training. Mike has been involved in...Read more ⇒</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>mydata</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dirig-Sheet-Metal</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12971</link>
<guid>9bb9852b78e55603158ed65149db7dd6</guid>
<pubDate>Wed, 24 Jan 2024 14:21:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Dirig-Sheet-Metal</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b021aa921f19c0a205c75ed581de247e140e96a3cbc06fc2dc71c2ffbbaa7674</i><br /><br />Threat actor <b>description</b>: <i>Dirig Sheet Metal provides comprehensive services for industrial customers, from customized evaluations and recommendations to thefull range of resources required to complete industrial projects. 65GB of data will be available for downloading. You can find detailed information of projects with drawings, contracts, confidential agreements, a bit of personal information, financial data and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Winona-Pattern--Mold</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12970</link>
<guid>b1d3a8fba2c3b1a07da18922ec3d5664</guid>
<pubDate>Wed, 24 Jan 2024 10:28:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Winona-Pattern--Mold</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1360155ef038b2ecf703d293c1e8e7a34429e84361c23a38e766ca3bf42ba97</i><br /><br />Threat actor <b>description</b>: <i>SALE</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Signature-Performance-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12969</link>
<guid>4cbb466a35d3bb7304ea43cd687929f0</guid>
<pubDate>Wed, 24 Jan 2024 08:42:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Signature-Performance-Insurance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8299ec1374e40fb6eb302231263e3fa90b85c0d08f2b0f3b54e2b6a930133b4</i><br /><br />Threat actor <b>description</b>: <i>Signature Performance (Signature) is a leading provider of healthcare administrative solutions and services. The company was created in 2004, at present the staff of the arts are more than 1250 people. Signature Performance corporate office is located in 10250 Regency Cir Ste 500, Omaha, Nebraska, 68114, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Midwest-Service-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12963</link>
<guid>8ad124e01f97c4cf812b49a875fc0965</guid>
<pubDate>Wed, 24 Jan 2024 02:54:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Midwest-Service-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9af23a943f343c18c95d59f9d69fe7e0d253ae38745350b27aeee09849b2400b</i><br /><br />Threat actor <b>description</b>: <i>Since 1972, Midwest Service Center (MSC) has defined "quality", "responsiveness" and "best practices" in electrical and mechanical equipment services for a host of customers.www.midwestservicecenter.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>synergyfinancialgrp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12960</link>
<guid>657538ca3ad286a7b345fb515d41e14b</guid>
<pubDate>Tue, 23 Jan 2024 23:53:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>synergyfinancialgrp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e8920acf3196a3e633e376cb7cb0012a9be04ec5cf47e6fa8b8618558583182</i><br /><br />Threat actor <b>description</b>: <i>Synergy Financial Group 97Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>micrometals.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12961</link>
<guid>4830891d089fc2c90e9fd352fd77dad6</guid>
<pubDate>Tue, 23 Jan 2024 23:53:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>micrometals.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>242f7e407b4b4c742df7ddee56192bf33207280138648b05d74f284df489102a</i><br /><br />Threat actor <b>description</b>: <i>Micrometals, Inc. 997Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>lyonshipyard.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12958</link>
<guid>d3779a48ccf8e469f915ffdbc55f6e2e</guid>
<pubDate>Tue, 23 Jan 2024 22:25:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>lyonshipyard.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6aba18bdfbf9bf1aec1d221fa055420444fc084d4c33de0d93569ea40114e19a</i><br /><br />Threat actor <b>description</b>: <i>Lyon Shipyard is a customer focused, family-owned and operated, ship repair facility on the Elizabeth River in Norfolk, VA established in 1928. Lyon Shipyard, Inc.  serves as a full service ship repair facility with over 90 years of continuous servic...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>sierrafrontgroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12956</link>
<guid>066999ed9322bd434f20ad5ec4dd6b48</guid>
<pubDate>Tue, 23 Jan 2024 22:24:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>sierrafrontgroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b557aa36f48af180dedb7a2fcc2276566dfeda8ae76b742fea7f40aa44cd07aa</i><br /><br />Threat actor <b>description</b>: <i>Sierra Front Group has experience providing Cloud Hosting, Event Wi-Fi, Email Hosting, Web Hosting, Network Design, IT Consulting, and much more.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cryopak</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12957</link>
<guid>8e0251b8f27dd86e04c9049a1eeda4a3</guid>
<pubDate>Tue, 23 Jan 2024 22:22:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Cryopak</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a89d2b5be97282d65ef8673455a7760d4c476b84bb2700e675f39ec7d0e4943</i><br /><br />Threat actor <b>description</b>: <i>Cryopak, a subsidiary of Integreon Global (formerly known as TCP Reliable), is a cold chain solutions provider for the pharmaceutical, life sciences, biotech, and food industries. We are preparing a few archives with their data for uploading. You can expect itsoon. There will be a lot of passports, driver licenses, NDAs, confidential agreements etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>fairmontfcu.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12955</link>
<guid>61cb6463141119abd41762825ad4f9cd</guid>
<pubDate>Tue, 23 Jan 2024 19:24:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>fairmontfcu.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba51e8b26076186f3c043772103f6e21bf52b84c8a0c5eb7fa3eeb4d3ee45cdb</i><br /><br />Threat actor <b>description</b>: <i>Fairmont Federal Credit Union is a not-for-profit financial organization, democratically controlled, owned, and operated by our members for the benefit of all who belong. We operate 9 regional branches with over 120 employees.SITE: www.fairmontfcu.com Address : PO Box 2139, Fairmont, West Virginia, 26555, USAALL DATA SIZE: 403gb 1. User data 2. Corporate data 3. Legal 4. Loans 5. Personal documents, scans and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>ktbslaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12949</link>
<guid>420c841038c492fed4d19999a813009d</guid>
<pubDate>Tue, 23 Jan 2024 17:53:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>ktbslaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c46fa864b5125fc131fda42ef3e3787af3ad7cb474f418b2dd4b7db4917887b</i><br /><br />Threat actor <b>description</b>: <i>KTBS Law LLP prides itself on the quality, responsiveness, and creativity of its attorneys, and has an outstanding record of delivering exceptional and cost-effective business solutions.  From the most senior attorney to the most junior, KTBS lawyers are nationally recognized, for their talent, the results they achieve for their clients, and the manner in which they achieve those results, often under the most challenging of circumstances.  Capitalizing on their depth of experience and creative approach to dealing with legal and business challenges, KTBS attorneys quickly assess even the most complicated situations, identify options, make recommendations, and immediately implement the course of action selected by their clients. Where action is required in court, our litigators aggressively advocate on behalf of clients, bringing to bear years of courtroom experience.  Where the challenge is in the transactional arena, our corporate attorneys work equally hard to achieve the clients’ critical business objectives – and get the deal done timely and cost-effectively.SITE: www.ktbslaw.com Address : 1801 Century Park East 26th Floor Los Angeles, CA 90067-2328ALL DATA SIZE: 735gb 1. Finance 2. Users personal documents 3. Confidential 4. Accounting 5. Company data and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>kivibros.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12951</link>
<guid>3e62ca0e35314ff421d335f15170775e</guid>
<pubDate>Tue, 23 Jan 2024 17:51:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>kivibros.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5df4388d3d9925e35aa725ef730f983ecf4582960efee8741e1bf956a2b7891</i><br /><br />Threat actor <b>description</b>: <i>Kivi Bros. Trucking of Duluth, MN, is an experienced leader in the transportation industry and offers trucking logistics, heavy hauling, step decks, conestogas, and flatbed trailers. We serve the U.S. Nationwide including Alaska and Canada. Along with our Headquarters in Duluth, MN. We also have a terminal in Blaine, MN. and Harrodsburg, KY. Just outside of Lexington, KY.SITE: www.kivibros.com Address : 5739 OLD HWY. 61, DULUTH, MN 55810ALL DATA SIZE: 111gb 1. Human Resources 2. Payroll 3. Accounting and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>cinfab.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12953</link>
<guid>0baa10f95ef302bf877f1f11e8ffef58</guid>
<pubDate>Tue, 23 Jan 2024 17:50:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>cinfab.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6da263ac1303525d824dd33f00dde3ec6f2d639606f004a4838d553816f1cbde</i><br /><br />Threat actor <b>description</b>: <i>Established in 1981, CINFAB filled the need for a high-quality, competitively priced commercial HVAC sheet metal contractor. Since then, we’ve grown our operations to include a 40,000-square-foot full-service fabrication shop. And we’ve expanded our capabilities to meet the specific design, fabrication and installation needs of our customers. We’ve built our excellent reputation on the exceptional talent of our design, manufacturing and installation staff and more than 35 years of experience.SITE: www.cinfab.com Address : 5240 Lester Rd. Cincinnati, OH 45213 Unated States T: 513.396.6100 F: 513.396.7574ALL DATA SIZE: 1.1tb 1. Employee files 2. Users personal folders 3. Budgets 4. Projects and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>prudentpublishing.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12954</link>
<guid>ab96c631d50e81c5f961bcbf25e49475</guid>
<pubDate>Tue, 23 Jan 2024 17:50:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>prudentpublishing.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e1bd5ba6588cd2ae41cf3d93444942a4cbc61afaec20ba2398695e012c50cc4</i><br /><br />Threat actor <b>description</b>: <i>The Gallery Collection is the leading business-to-business online and mail order publisher of premium quality personalized Christmas, Holiday, and Everyday greeting cards in the United States. Established in 1929, and still family owned by Prudent Publishing Company, we are proud to present the finest quality personal and business greeting cards available. We guarantee it!SITE: www.prudentpublishing.com Address : 65 Challenger Rd, Ridgefield Park, New Jersey, 07660, United StatesALL DATA SIZE: 352gb 1. HR 2. User personal folders 3. Tax  confidential forms and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wilhoit-Properties</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12947</link>
<guid>16ad66b2d7d7eda19f34e2f6197e2236</guid>
<pubDate>Tue, 23 Jan 2024 17:46:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Wilhoit-Properties</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>483dbfbfbd99b202cb1c624475e9c66bbdcdadcfa5647a4b537dcc4b3d5077ea</i><br /><br />Threat actor <b>description</b>: <i>Wilhoit Properties, Inc. founded in 1967 and headquartered in Springfield, Missouri, is a property management company. We will upload their files soon. There are not many HR files but a lot of incident reports where you can find complete personal information with SSN and other data. Besides that there are a lot of projects and financial data.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Total-Air-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12943</link>
<guid>aba5d6a59e6e1d77c270efd80b65ab54</guid>
<pubDate>Tue, 23 Jan 2024 13:15:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Total-Air-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>73c7ff9c62b554a53a8bd53dddcc39580f7440de70e0cbdf110cce5037db19ec</i><br /><br />Threat actor <b>description</b>: <i>Total Air Solutions provides residential and commercial HVAC services throughout North Port, Tampa, and Bradenton.  The network of this company has been breached by our organisation. As a result over 250GB of data leaked from there.  Stolen data contains but not limited with the following data related to Total Air Solutions:   -financial data  -projects data  -projects closeouts  -blueprints  -engineering  -personal documents  -contracts and subcontracts  -vendor and customers contacts  -employee personal data </i><br />Target victim <b>website</b>: <i>https://totalairfl.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>R.C.-Moore-Trucking</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12940</link>
<guid>b1db5ee8a6bccccb7e72c7951abcde46</guid>
<pubDate>Tue, 23 Jan 2024 11:42:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>R.C.-Moore-Trucking</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>294258d4dd2b333047a72bb4e1096a377419e699a1359b89158102f00ffdcad3</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>https://www.rcmoore.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Herrs-You-have-72-hours</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12942</link>
<guid>8d2583b317ce1bd4962cec8605c5676a</guid>
<pubDate>Tue, 23 Jan 2024 11:41:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Herrs-You-have-72-hours</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d4f787600f330d71ead68fd8b757deeccff66745cb1727efefc91743d2ee0092</i><br /><br />Threat actor <b>description</b>: <i>Herr's is an American brand of potato chips and other snack foods produced and marketed by eponymous private American company Herr Foods Inc. based in Nottingham, Pennsylvania. While their products are sold primarily throughout the Eastern United States and Canada, their stronghold is the Mid-Atlantic region. Herr's products are sold in all 50 American states and in over 40 countries</i><br />Target victim <b>website</b>: <i>https://herrs.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Smith-Capital---Press-Release</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12937</link>
<guid>577bacbdbbb574034730d06aa6ab049c</guid>
<pubDate>Tue, 23 Jan 2024 08:44:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Smith-Capital---Press-Release</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b4fcf671da48e8b36392b72244c007e3e2a0fe0e7e550f4389622235eec74bd</i><br /><br />Threat actor <b>description</b>: <i>Smith Affiliated Capital (SAC) was formed in 1982 to provide both discretionary and advisory investment management services to high-net worth individuals, their families, and institutional investors.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>C-and-F-Packing-Company-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12935</link>
<guid>c8f1cc280396d04dd0da7a20529a0315</guid>
<pubDate>Tue, 23 Jan 2024 05:47:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>C-and-F-Packing-Company-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f2673a07f7441176084675d7728caf8f093f8287b4b069735297ff3dcf953a1a</i><br /><br />Threat actor <b>description</b>: <i>Since these early beginnings, C & F Packing Company has grown into one of the largest  independent producers in the country of custom private label sausage products, meat toppings and fillings.  In 1986, the company built and moved to its first state-of-the-art facility to specialize in cooked pizza toppings.  C & F has continued to grow with the construction of a new 120,000 square-foot  plant that was completed in 2001.  This revolutionary plant is part of the next generation of food facilities that completely separates raw product operations from cooked product operations.  This ensures the safety and quality of our products. cfpacking.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>davidsbridal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12932</link>
<guid>41884c79b3339f66e8b7e121f785d641</guid>
<pubDate>Mon, 22 Jan 2024 19:36:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>davidsbridal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5cf65b50aa0e86e7c03c8e709bba4e310346beb42b398a15a955ac961f7d36d9</i><br /><br />Threat actor <b>description</b>: <i>David's Bridal. Revenue $2.2 BillionWe possess highly valuable and critical data, encompassing a substantial volume of personal and corporate information.David's Bridal is a prominent American bridal-store chain known for its wide range of weddin...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Double-Eagle-Development</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12930</link>
<guid>f072c02ed22738d28a2d25004b7ecabf</guid>
<pubDate>Mon, 22 Jan 2024 17:58:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Double-Eagle-Development</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e27b06b64e7a6369cf3206d7484591cfdf9e7fb0be4567f356db89cbd37483cd</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://web.archive.org/web/20230927152926/http://www.doubleeagledevelopment.com/</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Waldners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12926</link>
<guid>b5280e06d32aafdfebb9d93393c92d23</guid>
<pubDate>Mon, 22 Jan 2024 14:13:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Waldners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f98f1180a0b7e4d86f7d2c6e4cf0e87ef466621fdbc619883e667f373ae64fc4</i><br /><br />Threat actor <b>description</b>: <i>Waldner's, founded in 1939, is an office furniture company. They offer a variety of products including chairs, open plan workstations, tables and more. Waldner's corporate office is located in 215 Lexington Ave, New York City, New York, 10016, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>gattoplaters.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12919</link>
<guid>44788404a9a7eee60c80ad849e3efb7b</guid>
<pubDate>Mon, 22 Jan 2024 02:58:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>gattoplaters.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1dc9c9250d3f3e7191f8447b93c5dc17cb499d8b1c75f878d955a676063193bb</i><br /><br />Threat actor <b>description</b>: <i>King KongGatto is now home to North America’s largest zinc plating line – King Kong!PrevNextISO 9001:2015 CERTIFIED ZINC PLATING COMPANYFounded in 1974, Gatto Industrial Platers is an ISO 9001:2015 Certified Plating Company focused on being...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>hughessupplyco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12923</link>
<guid>fb45343c4635769a36c5072e04b6b978</guid>
<pubDate>Mon, 22 Jan 2024 02:55:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hughessupplyco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3bf3f439837a50aaff3e5282de8f9f5118fec0e84283dc89cb7a368257129af9</i><br /><br />Threat actor <b>description</b>: <i>WE ARE HUGHES SUPPLY! We are an injection molding & engineering company located in Thomasville, NC and serve companies across the United States.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>shenandoahtx.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12917</link>
<guid>fa93ac46951909a7575d591bc4d85ce6</guid>
<pubDate>Mon, 22 Jan 2024 02:52:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>shenandoahtx.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4477ca7702256165514cb982ea06ea74134ce25a3d54a8f5f5519f55ad61f27a</i><br /><br />Threat actor <b>description</b>: <i>Shenandoah is a city in Montgomery County, Texas, United States. Its population was 3,499 at the 2020 census. It is the hometown of David Vetter, the famous "boy in the plastic bubble". In 1986, the Shenandoah city council renamed Tamina School Road...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>stjohnrochester.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12913</link>
<guid>40cb9f2ff30f26a410c5af6b22b7b80b</guid>
<pubDate>Sun, 21 Jan 2024 22:25:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>stjohnrochester.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb5e52cbaba4049f89a60b84235f5cb19a9eab14a0e4470c4b436b4fda6cd697</i><br /><br />Threat actor <b>description</b>: <i>John Lutheran Church & SchoolAddress: 1011 W University Dr Rochester, MI, 48307-1862 United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>North-Star-Tax-And-Accounting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12909</link>
<guid>f194ca6b8132aaa26558b309fa044e01</guid>
<pubDate>Sun, 21 Jan 2024 16:24:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>North-Star-Tax-And-Accounting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>668603958a869da0a4e7e444cee557d53b80c95798df4e444340652eadafb6fc</i><br /><br />Threat actor <b>description</b>: <i>North Star Tax & Accounting is committed to providing quality services to both businesses and individuals.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>KC-Pharmaceuticals</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12910</link>
<guid>e82a7c661e834d935311ae02bdb4314c</guid>
<pubDate>Sun, 21 Jan 2024 16:23:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>KC-Pharmaceuticals</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18c622580ac97f3c613ff35fc1bde8cb15126cb04f6ddd040c7c4a24e5a45732</i><br /><br />Threat actor <b>description</b>: <i>KC Pharmaceuticals is a pharmaceutical company. It specializes in manufacturing and distribution of Private Label over-the-counter Eye Care, Contact Lens Care, Anti-diarrhea, and Nasal Spray products.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Martinaire-Aviation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12911</link>
<guid>136aa7fe7fd745073fec3fb4ef67e3b9</guid>
<pubDate>Sun, 21 Jan 2024 16:23:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Martinaire-Aviation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77dce5f4e46f2fc58a38e3d76473112efb97d62a9c7705cf89a3076025f52c05</i><br /><br />Threat actor <b>description</b>: <i>Martinaire Aviation, L.L.C. is an American cargo airline based on the grounds of Addison Airport in Addison, Texas, USA, near Dallas.[1] It operates feeder flights for overnight package delivery services, most notably on behalf of UPS.[2] It is owned by Xwing.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>bmc-cpa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12908</link>
<guid>b53b8bcccc2850c4f7bc651343e63dc0</guid>
<pubDate>Sun, 21 Jan 2024 14:38:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>bmc-cpa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c240085e740c5a182f61dde857f0352f51d9a55bc99269ca3fa9169b394bc6e</i><br /><br />Threat actor <b>description</b>: <i>The management team of partners Don Beasley, Christine Wright, Brad Beasley, Tony Morán, and Christopher Salcido, along with our tax & audit managers, have over 400 years of accounting experience! We have represented our clients before state & nation...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>subway.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12907</link>
<guid>867c51ec0949a1a888b8ddd7ccd77ca8</guid>
<pubDate>Sun, 21 Jan 2024 10:34:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>subway.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cf4bc65b1a45792f423dff526b311292c218507983435f3ae9bbc0cefc9763f1</i><br /><br />Threat actor <b>description</b>: <i>The biggest sandwich chain is pretending that nothing happened. We exfiltrated their SUBS internal system which includes hundreds of gigabytes of  data and all financial expects of the franchise, including employee salaries, franchise royalty payment...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>swiftair.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12900</link>
<guid>09ea221d3db11df1f369094ffb4bda7c</guid>
<pubDate>Sat, 20 Jan 2024 11:51:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>swiftair.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8524323ee877e83ac9c6ad4ea6b4be7c2e534baaedc410c8fe7f69f2ff9bdc98</i><br /><br />Threat actor <b>description</b>: <i>Swiftair is a leading company in the airline sector, offering both freight and passenger transport. Unfortunately, they dont care at all about the security of corporate information and personal information of its employees. We give them the last chan...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Worthen-Industries-You-have-three-days</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12901</link>
<guid>570ad3934c8f0b03f70f9481e7bd8b13</guid>
<pubDate>Sat, 20 Jan 2024 11:50:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Worthen-Industries-You-have-three-days</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9d78f978aba2bb026235a105e3e715fddb821eb624601abf066fe9689906f4be</i><br /><br />Threat actor <b>description</b>: <i>Worthen Industries	  Chemicals & Related Products · New Hampshire, United States ·   300 Employees  At Worthen Industries we specialize in sustainable solutions by applying technology and a customer-first approach to every  challenge. The result isn’t just an industry-leading product. It’s a solution that ensures your processes, product quality,  efficiency and environmental practices are optimized. We believe the future is worth doing right.  Headquarters Location 3 E Spit Brook Rd, Nashua, New Hampshire, 03060, United States   Social:  https://www.facebook.com/worthenindustries/ https://twitter.com/WorthenInd https://www.youtube.com/channel/UCjiZcdHfOhYBx2vHIMi03LQ https://www.linkedin.com/company/worthenindustries/</i><br />Target victim <b>website</b>: <i>https://www.worthenind.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Anna-Jaques-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12898</link>
<guid>0eeee4beb285c6046d12de9cb4033d5d</guid>
<pubDate>Fri, 19 Jan 2024 22:36:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>moneymessage</b> claims attack for <b>Anna-Jaques-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b70dc2d420a7e05a332ef9afc5ca3f01461ecce45a6153c94a2e12b72affecdc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>moneymessage</category>
</item>
<item xmlns:dc='ns:1'>
<title>pratt.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12896</link>
<guid>bd8d8aaed497d204a9c3a92e55e4aeab</guid>
<pubDate>Fri, 19 Jan 2024 22:26:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>pratt.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c5476d949cc96ed4591ecfdeb359fc7f2a9db30b1bfb9733bdc87a31f128e0a</i><br /><br />Threat actor <b>description</b>: <i>Colleges & UniversitiesEstablished in 1887 and located in Brooklyn, New York, the Pratt Institute is a private university with programs primarily in engineering, architecture, and fine arts.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>seiu1000.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12897</link>
<guid>f61b215f9d7ee27ff88b8de694fee22e</guid>
<pubDate>Fri, 19 Jan 2024 22:25:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>seiu1000.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4101c5e4ea1cfb4e575352b10044fad7e1406c1e26282b928cdb5a383cfe1f90</i><br /><br />Threat actor <b>description</b>: <i>Local 1000 of the Service Employees International Union is a united front of 96,000 working people employed by the State of California, making Local 1000 the largest public sector union in California and one of the largest in the country. 308GBEm...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sykes-Consulting-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12895</link>
<guid>e85f439bc16dc2341eb5957a1e9c2f5f</guid>
<pubDate>Fri, 19 Jan 2024 22:23:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Sykes-Consulting-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4878869fe5c6ecbb373e685537b7953ffff33a5f937dd9c997393d84ac000bb5</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2001, by Darien M. Sykes, PE, SE, Sykes Consulting provides structural engineering consulting for public and private sector markets locally, nationally, and internationally. The firm...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>TPG-Architecture</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12893</link>
<guid>f4d2f2d6500412c8a6da7c426bbc7e69</guid>
<pubDate>Fri, 19 Jan 2024 19:38:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>TPG-Architecture</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f2aa3e898038e3bdb1c78950e304bec03565c0ede594c079921e8192ec1f659</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.tpgarchitecture.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hamilton-Madison-House</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12889</link>
<guid>b458201027eb55a7a6dcb41b0af61993</guid>
<pubDate>Fri, 19 Jan 2024 17:58:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Hamilton-Madison-House</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a16c8d04fcaaf92d34d937ad05d66760773181f7df099cee16e0ce527b8e59ce</i><br /><br />Threat actor <b>description</b>: <i>The Hamilton-Madison House is a historic 118-year old settlement house/multi service agency addressing the education, health and social needs of immigrant and ethnic minority communities. As you understand there are so many personal files. We will upload about10Gb of their files and you can find so much interesting in there (passports, birth certificates, IDs etc).</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Busse--Busee-PC-Attorneys-at-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12891</link>
<guid>324ceee24a671ea9383a804c12866b49</guid>
<pubDate>Fri, 19 Jan 2024 17:57:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Busse--Busee-PC-Attorneys-at-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db56a44f2e7d7c99dbeb0493f3bb38ea53caa8c7eed42c535ebf7d3e75523876</i><br /><br />Threat actor <b>description</b>: <i>At Busse & Busse, P.C., your deeds and data will be leaked.  Consider carefully before reaching out to this law firm.</i><br />Target victim <b>website</b>: <i>https://bussepc.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>evit.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12887</link>
<guid>4738aad4137d4c3d49b67e8d4e2db4c5</guid>
<pubDate>Fri, 19 Jan 2024 16:23:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>evit.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cfc335748a1dacd8bdea60b0a73053d637a86e8d899acc1ed8319f80f99356a7</i><br /><br />Threat actor <b>description</b>: <i>East Valley Institute of Technology</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Premier-Facility-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12881</link>
<guid>ce74b141bbb6d057b757fffd582cad93</guid>
<pubDate>Thu, 18 Jan 2024 23:24:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trigona</b> claims attack for <b>Premier-Facility-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c633ba44f172cc7c93fcc9f45f889c697bc732f00863277e05e5dc5e5f0addb</i><br /><br />Threat actor <b>description</b>: <i>Premier Facility Management (PFM) stands as a leader in sustainable green programs, offering customized and innovative solutions to meet the demands of today's environmentally conscious market. With a commitment to keeping it green, PFM specializes in sustainable by-product marketing, surplus material exchanges, and global outlets for recyclables. The company, founded in 1987, has built a highly reputable track record of donating reusable items to charity organizations. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>trigona</category>
</item>
<item xmlns:dc='ns:1'>
<title>Groveport-Madison-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12875</link>
<guid>064d5929fb1f298f64353d6f3e25ffac</guid>
<pubDate>Thu, 18 Jan 2024 19:25:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Groveport-Madison-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f2c5f90b2b49a50d1c9f456ef54171489950eadab5fb7b136b4a07766d41c4c1</i><br /><br />Threat actor <b>description</b>: <i>Education · Ohio, United States · 106 Employees</i><br />Target victim <b>website</b>: <i>http://www.gocruisers.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>GROWTH-by-NCRC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12876</link>
<guid>5e056558ced8fa424facc20b1ba2369c</guid>
<pubDate>Thu, 18 Jan 2024 19:24:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>GROWTH-by-NCRC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d954d7dcb7700da8fb8b72e22da9cf0cdf9d79035faeff86f554d81d9b275386</i><br /><br />Threat actor <b>description</b>: <i>NCRC invests and manages a network of affiliated social enterprises and investment funds to expand access to affordable home ownership, living wage jobs and careers and capital for small businesses. The NCRC Community Development Fund is a US Department of Treasury-certified Community Development Financial Institution that makes loans to support economic mobility, bridge the nation’s racial wealth gap, expand access to affordable homeownership and provide loan capital that helps Black-, Brown-, and woman-owned businesses thrive. The NCRC Housing Rehab Fund, known as GROWTH by NCRC, renovates and builds affordable homes in cities across the nation.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>LT-Business-Dynamics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12877</link>
<guid>06d77b5b9334a3747200e0e617cb73d5</guid>
<pubDate>Thu, 18 Jan 2024 19:23:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>LT-Business-Dynamics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1aed8c22fdd40a7d0b7c49261558e41c31772220a4c6696ab8f2f5fb63d6f16f</i><br /><br />Threat actor <b>description</b>: <i>LT Business Dynamics, we provide this level of service and expertise to corporations, nonprofits, and government contractors. While their are certainly some nuances about our offerings to those different types of organizations (e.g., we can manage the annual audit process for a nonprofit organisations).</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>digipwr.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12874</link>
<guid>77684c8fdb7c184134e96d5535715990</guid>
<pubDate>Thu, 18 Jan 2024 17:53:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>digipwr.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1bc0dfd5badd5d67afc105d0af24fc4bf313c336246eb0a2ca6e6fbfb1064a6</i><br /><br />Threat actor <b>description</b>: <i>Digital Power is an innovative leader and supplier of cutting-edge power product solutions for medical, industrial, telecom, and defense markets. The company is recognized throughout the industry for flexible, cutting-edge, feature-rich, top-quality...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>jaffeandasher.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12873</link>
<guid>08b90c2ebcce5d7f46176eb7c05af0ea</guid>
<pubDate>Thu, 18 Jan 2024 16:27:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>jaffeandasher.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b956f725fac5128336504788e6765b4226cc621e3a43806f38c8bb11315a7ec5</i><br /><br />Threat actor <b>description</b>: <i>653 GB Data on employees (ssn, insurance, residential address, telephone, DOB, contracts, scans of passports), financial documents (balance sheet, budget, PL, audits, tax forms, various financial statements, statements), customer database, client c...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gallup-McKinley-County-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12872</link>
<guid>83b7e1c6a22424f5b4c47bb30798b770</guid>
<pubDate>Thu, 18 Jan 2024 11:08:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Gallup-McKinley-County-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d257e49f6980987f3355223b821fe2dc5165c0a689e40625ce981c4908c1c3a7</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : no - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://gmcs.org/</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stone-Avant-amp-Daniels</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12868</link>
<guid>28542e7ec2f6c92bb1bfe25c58e0b28c</guid>
<pubDate>Wed, 17 Jan 2024 08:45:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Stone-Avant-amp-Daniels</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>165a35e4b979ca709f184f1a1abddc05f7f3ab97f139cc292acc1c3dfcac8197</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>nobleweb.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12858</link>
<guid>552d21cc507489b0da0c67a0713f80bb</guid>
<pubDate>Tue, 16 Jan 2024 20:58:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noname</b> claims attack for <b>nobleweb.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b85145c2867fdc7cfcbb09252119eedb9884eadefa6fdfbbfa2135eb2a65aee4</i><br /><br />Threat actor <b>description</b>: <i>M Since 1992, The Noble Group has built a dedicated team of professionals all working together to revitalize neighborhoods, provide new homes for families and build a better future for our investors. 260GB lists with ssn numbers, residential addresses, date of birth, salary and tax information, contracts, and other confidential forms for employees budget, cash [&#8230;]</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>noname</category>
</item>
<item xmlns:dc='ns:1'>
<title>Becker-Logistics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12856</link>
<guid>0f40c9bdd25fd8950dc1c7e66862e6d9</guid>
<pubDate>Tue, 16 Jan 2024 17:40:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Becker-Logistics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b83407bb8a117568e0b779f6d522d4b4b849fe90fb4b982afa72b211e1966dc7</i><br /><br />Threat actor <b>description</b>: <i>Becker Logistics, headquartered in Glendale Heights, Illinois, and established in 1997, is a transportation management company. Wewill upload about 43gb of files with numerous documents containing personal information, HR, customer info, nda documents, contracts, accounting and financials files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bestway-Sales</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12855</link>
<guid>4e0db76ef57112b337ab492a727a6069</guid>
<pubDate>Tue, 16 Jan 2024 14:40:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Bestway-Sales</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dafb74069f211c29378b4fb1e78753065b610e810a33a491bbb835984657bea6</i><br /><br />Threat actor <b>description</b>: <i>Bestway Sales a leading manufacturer and marketer of agriculturalsprayers, recently announced the introduction of a line of UTV Skid Mounted Sprayers that are designed for rugged use by farmers,ranchers and commercial spraying operations. Operational data, customer information and other files will be available soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>TGS-Transportation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12853</link>
<guid>5ef893a3104ab0cc85519a2ad3fec050</guid>
<pubDate>Tue, 16 Jan 2024 13:10:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>TGS-Transportation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>571c43facae52c9cac1762d86543de78bf62284fc74bbba52c9d8a01e9aff630</i><br /><br />Threat actor <b>description</b>: <i>TGS Transportation is an international and domestic intermodal drayage provider. We will upload their files soon. There are financial, HR, customers data with contacts and other operational data.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Premium-Guard</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12854</link>
<guid>b5d4adb2328af2ef23f9db2582ab3578</guid>
<pubDate>Tue, 16 Jan 2024 13:10:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Premium-Guard</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbd0ceb065ea8a5c06b3368e1a322f8617e0b0e7436f1631e1fa181c2f74f4ad</i><br /><br />Threat actor <b>description</b>: <i>Premium Guard Inc. (PGI) specializes in designing, manufacturing,and distributing products for automotive, diesel, powersport, and specialty filter markets. 40GB of files with clients and customers data, financial files, projects, orders, contracts will be available for downloading soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>F-J-OHara--Sons</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12852</link>
<guid>186f8f4eba86cca7bdf06db31f155a15</guid>
<pubDate>Tue, 16 Jan 2024 10:26:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>F-J-OHara--Sons</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9bb8d2f47b668e2e9c8311aceeb207b6b2b60dc52e02c91df821a8a741e6bec3</i><br /><br />Threat actor <b>description</b>: <i>F J O'Hara & Sons Inc is a company that operates in the Information Technology and Services industry. It employs 11-20 people and has $5M-$10M of revenue. The company is headquartered in Boston, Massachusetts. We have a lot of data from this            ...</i><br />Target victim <b>website</b>: <i>www.fjohara.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Northeast-Spine-and-Sports-Medicines</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12844</link>
<guid>7d8db0888ae70f287e5329d840975bcb</guid>
<pubDate>Mon, 15 Jan 2024 05:17:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Northeast-Spine-and-Sports-Medicines</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b84e50dbaed06dbff7fff7dd724d0c33393b1b81ca9939bb7fca593a96766d09</i><br /><br />Threat actor <b>description</b>: <i>NorthEast Spine and Sports Medicine is a large multi-specialty medical group in New Jersey specializing in orthopedic surgery, neurosurgery, pain management, sports medicine, chiropractic, physical & occupational therapy, acupuncture and massage.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-International-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12839</link>
<guid>7ffe08e7623a46843e73565ae1618f5b</guid>
<pubDate>Sun, 14 Jan 2024 23:22:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>unsafe</b> claims attack for <b>American-International-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c9a7e21e73a5c38441b7cb5c75e1ac9cc4c1680dec35c6891f44e7eda189c25</i><br /><br />Threat actor <b>description</b>: <i> country: US - revenue: 135.00M</i><br />Target victim <b>website</b>: <i>https://www.aic.edu</i>]]></description>
<category>unsafe</category>
</item>
<item xmlns:dc='ns:1'>
<title>Republic-Shipping-Consolidators-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12836</link>
<guid>4b4984066015df12cfc4e8f6d60b7147</guid>
<pubDate>Sun, 14 Jan 2024 22:36:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Republic-Shipping-Consolidators-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6a2492a096e18b3af18bd1dd54b6fde35adbe70e45b15a8f1329dcec95835c5</i><br /><br />Threat actor <b>description</b>: <i>At Republic Shippin we offer NVOCC Ocean and Air Freight Consolidation services to Central and South America, Nicaragua, Asia, Caribbean and Europe. With more than 25 years of knowledge we offer quality and professional services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>amenitek.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12832</link>
<guid>1dfe257477e8cc749ac0a3bdcd98fca0</guid>
<pubDate>Sun, 14 Jan 2024 12:37:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>amenitek.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29bb11ca05296e887dbb96bdf51f3975bd061c58c3b073977017fa0179837dc4</i><br /><br />Threat actor <b>description</b>: <i>AMENITEKAudio, Technology, Video, Computer, Security, and Electrical Systems Installation14 Williamstown RoadLanesborough, MA 01237tel (413) 776-0354fax (413) 776-0355https://i.imgur.com/UdvPFB2.pnghttps://i.imgur.com/sjsVUFe.pngh...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lee-Spring</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12829</link>
<guid>b9b95b18f155ea0c4d365ad4f973fe67</guid>
<pubDate>Sat, 13 Jan 2024 10:43:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Lee-Spring</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9128d84db4f99260cd2c16db046164746fdd67be1d29b7c723094828c23cfe3d</i><br /><br />Threat actor <b>description</b>: <i>Lee Spring Lee Spring manufactures and distributes mechanical springs, wire forms, stampings and fourslide parts worldwide.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Charm-Sciences</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12827</link>
<guid>44c62bd3f8177f420ed8cee90fdbc0a1</guid>
<pubDate>Sat, 13 Jan 2024 09:56:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Charm-Sciences</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1cbc1b6c6f17b1ef128bc873bfea4ef1bfbdd47ba4e9530b17fb8cfccdd648ec</i><br /><br />Threat actor <b>description</b>: <i>More information in our telegram channel https://t.me/snatch_team Persons responsible for data leakage:Stanley Charm:President+1 978-687-9200[email protected];Robert Markovsky:President/Chairman of the Executive Board+1 978-687-9200[email protected], [email protected];Gerard Ruth:VP, VP, Marketing+1 978-687-9200[email protected];David Legg:VP, VP, Quality Assurance+1 978-687-9200[email protected];Meikel Brewster:Executive VP, President, VP+1 978-687-9200[email protected];Robert Salter:VP+1 978-835-6391+1 978-687-9200, +1 978-687-9200 ext. 134[email protected];Stephen Holmes:VP+1</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>arrowinternational.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12825</link>
<guid>0e3e75d3095f3746ec2531e0bf543a5c</guid>
<pubDate>Fri, 12 Jan 2024 23:46:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>arrowinternational.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f764bdf7119827a71ab5a4ed6522df91bedf9b3c803be5c0f9071e3e85e3da17</i><br /><br />Threat actor <b>description</b>: <i>World's largest manufacturer of bingo products, pulltabs, daubers, bingo equipment and hand held and fixed base electronic bingo devices for charity fundraising and social gaming.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>pharrusa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12822</link>
<guid>03ea906731be85e38d49277fa858b7a1</guid>
<pubDate>Fri, 12 Jan 2024 19:26:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>pharrusa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4de1306d170486ee0310539a8e5b5d68fbae7243cc12d978dc88622fa14227b0</i><br /><br />Threat actor <b>description</b>: <i>Headquartered in McAdenville, North Carolina, Pharr Yarns is one of the most diversified sales yarn manufacturers in the world. We serve our diversified global customer base from offices across the United States and Europe. Our US operations...</i><br />Target victim <b>website</b>: <i>pharrusa.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>Builcore</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12820</link>
<guid>e4017fc196bfb479f173f387595d79e5</guid>
<pubDate>Fri, 12 Jan 2024 19:12:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Builcore</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbabaa9a63885cd289237aef925aca13880c3919e066897775c5950d76124b15</i><br /><br />Threat actor <b>description</b>: <i>Builcore is a Florida State certified general contracting firm that specializes in commercial, institutional, and high-end residential projects.</i><br />Target victim <b>website</b>: <i>https://www.builcore.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>olea.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12817</link>
<guid>410a0338f4f2038cfa92723d64c52900</guid>
<pubDate>Fri, 12 Jan 2024 16:11:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>olea.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0dd181e364e8e19534bc780cae687916b2aef21f33c3cf50dd11d69004c5f08d</i><br /><br />Threat actor <b>description</b>: <i>Olea Kiosks Inc. is the leading Kiosk design and manufacturer of standard and custom Kiosks. For over 40 years.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>asburyauto.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12815</link>
<guid>a48de938587144be6be3b95682b5b948</guid>
<pubDate>Fri, 12 Jan 2024 14:44:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>asburyauto.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2955e114e2b9fa51cd66b942541fd2bb061b13d0e05446cc769adea7a8962d2e</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/ABG/PROOF </i><br />Target victim <b>website</b>: <i>asburyauto.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Washington-School-For-The-Deaf</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12813</link>
<guid>8cf40e328089249cf77075692aa0c09b</guid>
<pubDate>Fri, 12 Jan 2024 11:48:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Washington-School-For-The-Deaf</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>72142194c32cd607974dc74603fa0af654306590826083546efc9ab98a7277bb</i><br /><br />Threat actor <b>description</b>: <i>ESTABLISHED IN 1886
Washington School for the Deaf is the state of Washington’s only ASL-English bilingual school serving deaf and hard or hearing students in Pre-K through 12th grade.

WSD’s...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>International-Trade-Brokers-and-Forwarders</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12811</link>
<guid>ec26dcdc2dd4deebfc38610ebe2ef318</guid>
<pubDate>Fri, 12 Jan 2024 08:45:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>International-Trade-Brokers-and-Forwarders</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1a3cca496af30a8a375aa22c0b79870977f8c2cc1f1be3c8e2e4ce9faf16e7a</i><br /><br />Threat actor <b>description</b>: <i>ITBF is a company with more than 20 years of experience in the area of International Trade services. As a licensed Broker certified by the C-TPAT (Custom Trade Partnership Against Terrorism), of National Customs in the United States, we provide customs clearance services for merchandise arriving to the US at any port of unloading including Puerto Rico and Hawaii. Our direct communication with U.S. Customs allows us to provide agile and opportune support to our clients in the matter of operations logistics transportation. https://www.itbfusa.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Anderson-King-Energy-Consultants-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12808</link>
<guid>2959ced850c7261ff93292042fed7240</guid>
<pubDate>Fri, 12 Jan 2024 08:44:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Anderson-King-Energy-Consultants-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8df38b0e55c1cb4e36435d7a5e9409098f09a36fbcf89fb7097c341e2f9a806c</i><br /><br />Threat actor <b>description</b>: <i>Anderson King Energy Consultants serves the energy industry as an independent A&D advisor and technical consultant. Anderson King Energy Consultants, LLC serves the energy industry as an independent A&D advisor and technical consultant. With over 215 years of combined industry experience, our team offers a unique blend of technical expertise and transaction history which is truly unmatched. Our business is built on relationships and integrity.  https://www.andersonkingenergy.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sems-and-Specials-Incorporated</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12809</link>
<guid>65ddf8fc40f919eba2239c13c19bead4</guid>
<pubDate>Fri, 12 Jan 2024 08:43:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Sems-and-Specials-Incorporated</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4bf3e10c865c0174cb93b56a7883312cacd94763d20320b718766197aa2e47f2</i><br /><br />Threat actor <b>description</b>: <i>Sems and Specials is your go-to source for Cold Formed Quality Fasteners. Our innovative products are produced to our highest standards, ensuring durability and reliability when you need it most. Our standard and custom products along with our industry experience are unrivaled. THINK OUTSIDE THE BOX - WE ENCOURAGE IT! Since 1991, as a cold heading manufacturer of fasteners, Sems and Specials has offered a diverse portfolio of products ranging from standard commercial to custom specials and ending with class II military hardware. www.semsandspecials.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>acutis.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12804</link>
<guid>07a81d45ff030b63fe2a0f375b779f09</guid>
<pubDate>Fri, 12 Jan 2024 05:47:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>acutis.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b7bfef9ec26fb678a674cc62ee4a38c4d0dfae5e413b28b4652d9358dc8b541</i><br /><br />Threat actor <b>description</b>: <i>Download link #1: https://***************.onion/ACUTIS/PROOF </i><br />Target victim <b>website</b>: <i>acutis.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>dtsolutions.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12805</link>
<guid>b82b80956cfbe75101bd223fe6319dec</guid>
<pubDate>Fri, 12 Jan 2024 05:46:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>dtsolutions.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>62710221e7226911f31ba7baf446e463275a3a639d4e1563a95b9dd1955f37a4</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/DTS/PROOF </i><br />Target victim <b>website</b>: <i>dtsolutions.net</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>intercityinvestments.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12806</link>
<guid>b984bddf9e7c8fb09854e208c0284764</guid>
<pubDate>Fri, 12 Jan 2024 05:46:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>intercityinvestments.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e055acd819226842083afc6f4f2b04612329fb9144fec60a8f32827edb078171</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/ICIREALESTATE/PROOF </i><br />Target victim <b>website</b>: <i>intercityinvestments.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>hi-cone.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12803</link>
<guid>bbf514d16a56cba73809fd0b7e262436</guid>
<pubDate>Fri, 12 Jan 2024 05:44:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>hi-cone.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6e678e872465fe342431179ac74492b7408dddc692de9c336df3aa9b9370006c</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://***************.onion/HICONE/PROOF </i><br />Target victim <b>website</b>: <i>hi-cone.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alliedwoundcare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12802</link>
<guid>93c6cea607715faa19391e37c48fac33</guid>
<pubDate>Fri, 12 Jan 2024 04:16:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Alliedwoundcare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2cb7a0adcc26296d0a10a1329c3b39185448d2604d8f067e83aff5ebe8247aeb</i><br /><br />Threat actor <b>description</b>: <i>Company has the last 24 hours to contact us using the instructions left. In case of silence, all data will be published here https://alliedwoundcare.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Primeimaging</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12801</link>
<guid>bc786a7e5492c8c5c3e3d9d1b9ba3ec0</guid>
<pubDate>Fri, 12 Jan 2024 02:54:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Primeimaging</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e9ec6ca9ae8f771f528f75aef23c6e857c0b50f9d121c17d5136fb6066ac0af</i><br /><br />Threat actor <b>description</b>: <i>Company has the last 24 hours to contact us using the instructions left. In case of silence, all data will be published here https://primeimaging.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Blackburn-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12799</link>
<guid>3d65824c0a13e8417758ea807a431500</guid>
<pubDate>Thu, 11 Jan 2024 16:16:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Blackburn-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e81b10585bff40e88b1d468dc6b5e2a03395aef3bc3c2069e2c1f100e7ba04f</i><br /><br />Threat actor <b>description</b>: <i>Blackburn College is a private college in Carlinville, Illinois. Blackburn is a federally recognized work college with a student-managed work program, enabling students to gain leadership experience as they manage other students. We are going to upload 30GB ofthe college files. There are many operational files inside, HR files with personal docs of students and employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Water-For-People</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12798</link>
<guid>3b2f3a493d32e9aca1df90ef35b587e7</guid>
<pubDate>Thu, 11 Jan 2024 13:26:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Water-For-People</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36c7b82eed21464ae07c11cbe5c7d7d195a54a1031efefaa1e0f1ec3384b4311</i><br /><br />Threat actor <b>description</b>: <i>Water For People is a global nonprofit dedicated to promoting the development of high-quality drinking water and sanitation services, accessible to all, and sustained by strong communities, businesses and governments. The main office of the company is located at 100 E Tennessee Ave, Denver, Colorado, 80209, United States.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>pactchangeslives.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12796</link>
<guid>aaac13f3595dfe0baefd3839d1529a4f</guid>
<pubDate>Thu, 11 Jan 2024 12:43:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>pactchangeslives.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbaff9632ac3b12eef658fef625e723e1418ad5b7f4651830952b507e38c09e4</i><br /><br />Threat actor <b>description</b>: <i>PACT operates in an open, collaborative partnership with other agencies and resources to solve the problems that stem from criminal behavior. We challenge individuals and organizations to become part of the solution and invite you to join us.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Viridi</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12781</link>
<guid>cc7d159d6ff3ea6f39b9419877dfc81f</guid>
<pubDate>Tue, 09 Jan 2024 17:37:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Viridi</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>820b9fb0c044ac4c2df6d481e9becf0465ac930ff06267ee50fa64375b466897</i><br /><br />Threat actor <b>description</b>: <i>Viridi Parente designs and builds fail-safe battery systems for industrial, medical, commercial, municipal, and residential building applications. 70 GB of data contain lots of files with accounting, payment, projects information. There are also many nondisclosure documents, NDA and personal documents of employees. Uploading is coming.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Corinth-Coca-Cola-Bottling-Works</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12780</link>
<guid>f7bbcc6ef14fd79655f09efb14b99316</guid>
<pubDate>Tue, 09 Jan 2024 14:43:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Corinth-Coca-Cola-Bottling-Works</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e053af030f513701211f788bd6dd5ceb7318327fdce9ed3da413c7bc937bd6e7</i><br /><br />Threat actor <b>description</b>: <i>Corinth Coca-Cola Bottling Works Grocery Retail · Mississippi, United States · 109 Employees  About Corinth Coca-Cola Bottling Works Inc.: Corinth Coca-Cola Bottling Works, Inc. is a privately held, family-owned Coca-Cola bottling and di            ...</i><br />Target victim <b>website</b>: <i>corinthcoke.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Precision-Tune-Auto-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12779</link>
<guid>52c8b8d56837155b4870fc2658b676f0</guid>
<pubDate>Tue, 09 Jan 2024 05:38:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Precision-Tune-Auto-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>848d7d35f79c0de195c3f4e840e49ebfc956e90da3bcc9a1ff4d3fb7e244ec99</i><br /><br />Threat actor <b>description</b>: <i>Precision Tune Auto Care celebrates 45+ years of taking care of cars and the people who ride in them, providing car owners with a one-stop shop for factory scheduled maintenance service and repairs for autos, SUVs, MiniVans and Hybrids.  https://www.precisiontune.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Van-Buren-Public-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12776</link>
<guid>e86698eadde4101913eaf1c8ea42c8ce</guid>
<pubDate>Mon, 08 Jan 2024 17:42:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Van-Buren-Public-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4000a4bb43de9a991565b554e317afb1b33843d1c29fabb0f54c9ad03c8abefa</i><br /><br />Threat actor <b>description</b>: <i>The Van Buren Public Schools is a school district headquartered in Belleville, Michigan. A lot of files with information about students and their parents, HR information, accounting and other files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Heller-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12775</link>
<guid>d2bb0d1b75c96ad873f38e9d4292528d</guid>
<pubDate>Mon, 08 Jan 2024 16:10:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Heller-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1583b7180e1e43d593a9fc97e1ff2ab738952be68901928d4a31275d25b7a41</i><br /><br />Threat actor <b>description</b>: <i>Heller Industries, Inc. provides reflow technology solutions. TheCompany offers curing systems, semi conductors, and reflow equipment for electronic manufacturers and assemblers. Almost 300gb ofdata will be available soon. There are numerous NDAs with names of widely known corporations, personal documents, finance files and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>CellNetix-Pathology--Laboratories-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12773</link>
<guid>f73850aa36d8564629a0d62c51009acf</guid>
<pubDate>Mon, 08 Jan 2024 14:37:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>CellNetix-Pathology--Laboratories-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3dd5aaaadad61f901d604d2d054d3f6f72c70e83fc147535bbdfcfc64936b3f0</i><br /><br />Threat actor <b>description</b>: <i>CellNetix Pathology & Laboratories is a dynamic, rapidly growing private pathology company headquartered in Tukwila, WA, and serving hospitals and clients throughout the Pacific Northwest. CellNetix...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>morganpilate.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12772</link>
<guid>423215dae3a7a243e300638262f9242d</guid>
<pubDate>Mon, 08 Jan 2024 10:09:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>morganpilate.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1bf05d8cfa73e35af9cae42f220c614fc90572f49a75dfd7e2fe9ab0bf954c56</i><br /><br />Threat actor <b>description</b>: <i>It’s where we work every day. We have successfully defended clients against a wide variety of federal charges, including:    Wire fraud    Bank fraud    Procurement fraud    Healthcare fraud    Money laundering    Structuring    Mortg...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>mciwv.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12771</link>
<guid>01bbd2e040c52958685756692ec4f2e9</guid>
<pubDate>Mon, 08 Jan 2024 08:38:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>mciwv.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>51edfb83dbd3ae11668146ba8ceb792659ab207b72e4617c1266854ddb6bb90c</i><br /><br />Threat actor <b>description</b>: <i>https://mega.nz/folder/3h531ByC#sv5kMsOSqL2xqEkLBUWI_g</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>capitalhealth.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12770</link>
<guid>4d7c59dcc50edd1199828ea005928f85</guid>
<pubDate>Sun, 07 Jan 2024 17:35:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>capitalhealth.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db49e598ada78590c677369818723c34cd0d431172dcd61103011a8e98c8a97a</i><br /><br />Threat actor <b>description</b>: <i>We purposely didn't encrypt this hospital so as not to interfere with patient care. We just stole over 10 million files. Over 7 terabytes of medical confidentiality data valued at $250,000. That's all you need to know about this hospital.Capital...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Maas911.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12765</link>
<guid>c80bfa00454a7564c07c0559808294fa</guid>
<pubDate>Sat, 06 Jan 2024 13:52:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Maas911.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>02ab3a2a8f50cb0d4f61ef372a325470fa61b2b860a4a733462b6a21ae05c165</i><br /><br />Threat actor <b>description</b>: <i>Country: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Televerde</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12763</link>
<guid>e6da32eef072f987685b6eddca072d4f</guid>
<pubDate>Sat, 06 Jan 2024 08:38:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Televerde</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac830c0a359cc09f595dba944216320a36a394f5397a7d6c62009fa57b0660ea</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.televerde.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Geologics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12762</link>
<guid>154d7da9e669c75ee317d46614381dd8</guid>
<pubDate>Sat, 06 Jan 2024 01:11:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Geologics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cdc438227d63502f5d54384a462608eb008d224620c137cfb5ecac63bdc5d842</i><br /><br />Threat actor <b>description</b>: <i>GeoLogics has grown to become a successful and award-winning high-technology company supporting the defense, IT, and telecommunications industries, as well as n...</i><br />Target victim <b>website</b>: <i>geologics.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Somerset-Logistics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12759</link>
<guid>cc255b9a267faa3cc19c3293c5fd7c9a</guid>
<pubDate>Fri, 05 Jan 2024 14:30:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Somerset-Logistics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>210bfc76c1957f478f331b07514b5c2a8a3444dd7795494fc54f9b6d4b7e2650</i><br /><br />Threat actor <b>description</b>: <i>Somerset Logistics is a nationwide logistics company, arranging transportation solutions throughout North America as well as internationally.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Project-M.O.R.E.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12755</link>
<guid>95653e801f64ca51dbadb7cbd02471ae</guid>
<pubDate>Thu, 04 Jan 2024 14:34:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Project-M.O.R.E.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4c62fc2ccf9307a9761ae0c2c335ded28ff3fda4bc162a0e4e2b4677c3f4e440</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://projectmore.org</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gunning--LaFazia-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12757</link>
<guid>5b61616b138596dfa7c219db523f73a6</guid>
<pubDate>Thu, 04 Jan 2024 14:33:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Gunning--LaFazia-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8d6cfecf6097c6a91df2c7168c465769a93ae400a631ab0a03df4770e59b5b78</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://gunninglafazia.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Diablo-Valley-Oncology-and-Hematology-Medical-Group---Press-Release</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12754</link>
<guid>45012e4d2d42c232d4d284754e19d9cf</guid>
<pubDate>Thu, 04 Jan 2024 13:14:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Diablo-Valley-Oncology-and-Hematology-Medical-Group---Press-Release</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3b97b0250778070f81dc4ccf8483dfe51517f30ac0b034da69f835259e5046eb</i><br /><br />Threat actor <b>description</b>: <i>Diablo Valley Oncology provides comprehensive cancer care to patients by bringing together medical oncology, chemotherapy, radiation therapy, PET/CT and diagnostic imaging, research, and supportive care all in one convenient location.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kershaw-County-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12753</link>
<guid>a896144046a1b5bd6e3e034d00b4f73a</guid>
<pubDate>Wed, 03 Jan 2024 19:06:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Kershaw-County-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52b86ed805911519f08bf857551469b61122bb15cbf4fa5fe0bf29f47bdbd4fb</i><br /><br />Threat actor <b>description</b>: <i>Nestled in the heart of the Palmetto State, the Kershaw County School District is home to almost 10,000 students and over 1,300 employees in 20 schools</i><br />Target victim <b>website</b>: <i>http://kcsdschools.net</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bradford-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12751</link>
<guid>c77704219ca3bd62e309f297b3c39fd9</guid>
<pubDate>Wed, 03 Jan 2024 18:25:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Bradford-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>07e864658dc8e8439bf02a5a072ef6f9e758eafdac13445d6e8170bc9f122530</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://bradfordhealth.net</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Madison-Capital--WPM--The-Time-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12750</link>
<guid>45b865d134d2c25cf5ed131317fe88de</guid>
<pubDate>Tue, 02 Jan 2024 22:33:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Madison-Capital--WPM--The-Time-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b3c423f5d2a3019d0331966de765b3a4fea8d3620587a741a3c4fabc91eebbf3</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.madisoncapital.com www.wpmllc.com www.thetimegroup.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>leonardsexpress.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12746</link>
<guid>c1fcffd51eb7c38b7209a6106d66cc84</guid>
<pubDate>Tue, 02 Jan 2024 13:18:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>leonardsexpress.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>956e64fe09a5bb231a951b695bdbb9463350cad126495f3a3284d9f9b9b2ea78</i><br /><br />Threat actor <b>description</b>: <i>Leonard’s Express is a family owned asset-based transportation provider located in Farmington, New York with offices located throughout the United States. We provide transportation solutions for a wide range of customers that encompass many industries. With our nationwide footprint of offices, we are prepared to tailor a solution to fit your specific supply chain needs. With our state of the art technology and our dedicated staff, Leonard’s Express is willing and able to provide you and your company with dependable, diversified and creative solutions that are responsive and cost-effective.SITE: www.leonardsexpress.com Address : 1360 County Rd, Farmington, New York, 14425, United StatesALL DATA SIZE: 182gb 1. Finance 2. Insurances 3. 1099 Info 4. Users personal documents: DL, SSN, passports and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>nals.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12747</link>
<guid>9afa24d3da745fd5606e7d710a0763eb</guid>
<pubDate>Tue, 02 Jan 2024 13:17:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>nals.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42a62f6d6ea4a1aca0ec28c6f8b88e91d42cebcfe0c8050300f2d2e5717adb17</i><br /><br />Threat actor <b>description</b>: <i>NALS Apartment Homes is a fully-integrated real estate investment firm engaged in the acquisition, ownership, management, and rehabilitation of multifamily apartment communities. Headquartered in Santa Barbara CA, NALS owns and manages over 15,000 apartment homes geographically dispersed across 15 different markets. Our success remains grounded in disciplined investing principles and a company culture of collaboration and excellence. Our friendly, professional team members across the nation work hard to provide every resident with a quality place to call home. By providing more amenities, more service, and more value, we strive to make apartment living both enjoyable and easy. NALS was founded by Henry Nevins in Los Angeles in 1984. Since then, we have brought in partners and management leaders that share our investment and management principles to provide continuity and sustainable growth. In 2017, our company celebrated its 100th property acquisition with our dedicated 480 employees.SITE: www.nals.com Address : 920 Garden St Ste A, Santa Barbara, California, 93101, United StatesALL DATA SIZE: 145gb 1. Reports 2. Payroll 3. Personal 4. Accting 5. Personal users folders, documents amd etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>MPM-Medical-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12744</link>
<guid>829807aa78485041f87d209b458fcdf3</guid>
<pubDate>Tue, 02 Jan 2024 01:08:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ciphbit</b> claims attack for <b>MPM-Medical-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6d598cbbd204ff984ef9ed918c818fc5092b52e729a386dc9655c60726c85778</i><br /><br />Threat actor <b>description</b>: <i>MPM Medical Supply is a state of the art medical distributor. Recognized for Superior service, low prices and innovative value-added solutions – MPM Medical Supply is dedicated to helping our customers practice high-quality healthcare. From hospitals and surgery centers to physician offices we are dedicated to serving your needs. As the healthcare industry is faced with the challenges of having to do more with less – we are committed to helping you reduce costs without sacrificing the quality of care. Our relationships with Industry leading healthcare manufacturers are an important part of our success. We only partner with manufacturers who have the knowledge and expertise to provide you with the quality products, superior service and innovative solutions you deserve. At MPM Medical Supply, we are dedicated to helping our customers manage cost and practice high-quality healthcare without cutting care. We do this through superior service, low prices, and innovative value added solutions. We're a trusted medical distributor serving hospitals, surgery centers and physician offices for 20+ years. </i><br />Target victim <b>website</b>: <i>http://www.mpmmedicalsupply.com</i>]]></description>
<category>ciphbit</category>
</item>
<item xmlns:dc='ns:1'>
<title>DELPHINUS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12742</link>
<guid>97208e4cb6de9c04b325c2185316439f</guid>
<pubDate>Mon, 01 Jan 2024 19:35:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DELPHINUS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e4cebd18b283b289a1394039442d373537df67998aacfcb3cb75e8429b7d6d81</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.DELPHINUS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southeast-Vermont-Transit-MOOver</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12740</link>
<guid>e6b73239f1c528d79233c34ffe4ccf8b</guid>
<pubDate>Mon, 01 Jan 2024 09:46:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Southeast-Vermont-Transit-MOOver</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>62a2383fa5ffc411966da3d7a5ec2cdc5f5b816b0f5ea5de3951d73cc2977a8d</i><br /><br />Threat actor <b>description</b>: <i>The MOOver division of Southeast Vermont Transit operates in transportation services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Morgan-Chambers--Wright--The-Green-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12739</link>
<guid>597073e68fcefaa6bdf39ca6b399c28c</guid>
<pubDate>Sat, 30 Dec 2023 23:56:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Morgan-Chambers--Wright--The-Green-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b40d292e24e4e4d59f23ea67bb5aa33f4a2dc09a4e35773391bdea1025a25a5c</i><br /><br />Threat actor <b>description</b>: <i>United States : M?????n C?????? & W?? & The ???? G????</i><br />Target victim <b>website</b>: <i>www.m?????nc??????.com www.w????c.com www.the????g????.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Xerox-Corp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12736</link>
<guid>fc9e5c39356354a60d33ca59499913ca</guid>
<pubDate>Sat, 30 Dec 2023 15:45:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Xerox-Corp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e907f97a7ba6327636f89055738d27b2227ad4e1ecbb450b16af8f4c9511ebbb</i><br /><br />Threat actor <b>description</b>: <i>Xerox Corporation provides document management solutions worldwide. The companys Document Technology segment offers desktop monochrome and color printers, multifunction printers, copiers, digital...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clearwinds</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12734</link>
<guid>872de53a900f3250ae5649ea19e5c381</guid>
<pubDate>Sat, 30 Dec 2023 10:04:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Clearwinds</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8df1c49ef51fc6ad78bd8de3d49f9863656a27fd165dc1db5476252d6534ffeb</i><br /><br />Threat actor <b>description</b>: <i>We provide the reliable and responsive IT support for your organization’s everyday IT needs. Clear Winds is an Alabama based IT company that has served business IT needs for 20+ years! </i><br />Target victim <b>website</b>: <i>https://www.clearwinds.net/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nej-Inc-was-hacked</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12721</link>
<guid>b26be92d375bc16823077bd874693e9c</guid>
<pubDate>Fri, 29 Dec 2023 08:36:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Nej-Inc-was-hacked</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ad8c1be6b0a6835d9f7db9fbdec17299da6e6615f5fce262cc2f4a5deaa45c9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>americanalarm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12717</link>
<guid>646e058fac455de8d1e52c4c49baac06</guid>
<pubDate>Thu, 28 Dec 2023 20:38:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>americanalarm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>735ae9dfe96555ca75d1864dd87cd60c7cec0ead029b51c7049b20c57cd2fb3e</i><br /><br />Threat actor <b>description</b>: <i>American Alarm and Communications Founded in 1971 and headquartered in Arlington, Massachusetts, American Alarm and communications is a 24-hour security system integration and monitoring company. At American Alarm we believe in reliable, local protection. We’ve been protecting homes and businesses across New England since 1971. Our company is staffed with dedicated professionals who live in the communities they serve- perhaps even in your neighborhood.SITE: www.americanalarm.com Address : 297 Broadway, Arlington, Massachusetts, 02474, United StatesALL DATA SIZE: 504gb 1. Accounting 2. Financial 3. Human Resources 4. 401(k) and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Northland-Mechanical-Contractors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12715</link>
<guid>47ba327b57be22b98eee0e5dc3e14711</guid>
<pubDate>Thu, 28 Dec 2023 16:08:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Northland-Mechanical-Contractors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee810fe8cce31eb7dc84f120c73230c561a25e7a27b085ca6f80c55a1b43fb99</i><br /><br />Threat actor <b>description</b>: <i>Commercial & Residential Construction.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>CVR-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12710</link>
<guid>b83b4b4fb7dee46fd2e688f76e3f3928</guid>
<pubDate>Thu, 28 Dec 2023 13:31:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>CVR-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e3d0f8cb101abc9396a5c21aedca2c9090b293d195a8ab151b13194da0290039</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.cvrassociates.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>hoffmanestates.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12708</link>
<guid>ad1288236b3a6b1d28115a1f92ab8bb6</guid>
<pubDate>Thu, 28 Dec 2023 10:11:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hoffmanestates.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>15678e3a83454304a70fc74712fe675fc18d1f1cf3ce07009490addce10c077a</i><br /><br />Threat actor <b>description</b>: <i>Village of Hoffman Estates</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>coastalplainsctr.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12709</link>
<guid>a7cd33d1194ce48a10c5b2dce99a3cfc</guid>
<pubDate>Thu, 28 Dec 2023 10:11:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>coastalplainsctr.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f248d2d018b6c8b9fa5ce8f1bd09e6220bf9cf2e50a7df19ea49dc23f8fc785</i><br /><br />Threat actor <b>description</b>: <i>Coastal Plains Integrated Health is a not-for-profit Behavioral Health Center that serves individuals with Mental Health Needs</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ohio-Lottery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12706</link>
<guid>785a4b39ca0768ebd5be9064105f0705</guid>
<pubDate>Wed, 27 Dec 2023 22:15:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Ohio-Lottery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>836cbe6edb42b3ac7ed33fbd3aaf21fb0df4c008d8eca297fee5d94ee676b2d9</i><br /><br />Threat actor <b>description</b>: <i>More than 3,000,000+ entries, first name, last name, mail, addresses, winning amounts! SSN + DOB records of employees and players. It's a jackpot! We suggested ...</i><br />Target victim <b>website</b>: <i>ohiolottery.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>webblaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12707</link>
<guid>373d71f842ca1c1bff5a1d8b1da9f1b2</guid>
<pubDate>Wed, 27 Dec 2023 22:15:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>webblaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3fe0a7696a246f0a1d5baceb8bc4f9e0c8933559d3daf8a21b293f733bd9445a</i><br /><br />Threat actor <b>description</b>: <i>The most innovative corporations in the world entrust The Webb Law Firm to safeguard their Intellectual Property. Focused on all aspects of Intellectual Property law since 1845, we have grown progressively and now offer over 50 attorneys to service our clients’ needs. Our clients range from large global businesses to emerging companies. Every major industry and technical discipline is represented in our client base and reflected in the capabilities of our dual-degreed attorneys. We are known for delivering high quality Intellectual Property legal solutions that fit our clients’ needs ranging from individual projects to full-service IP legal services. Our attorneys work in all aspects of technology, including steel, glass, medical devices, advanced manufacturing, life sciences, and information technology. Attorneys at The Webb Law Firm are registered to practice before the U.S. Patent & Trademark Office and have degrees in both the law and the sciences, plus many have extensive experience in the industries in which our clients operate.</i><br />Target victim <b>website</b>: <i>www.webblaw.com</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lake-of-the-Woods-County</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12705</link>
<guid>0780e8f5d5df0c219dcafae6e0f35043</guid>
<pubDate>Wed, 27 Dec 2023 14:40:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Lake-of-the-Woods-County</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7dc6dd6bdfe521ec34565f19d3fd10fabf4eefbe87ad76ac45a649b7d266860c</i><br /><br />Threat actor <b>description</b>: <i>PREVIEW</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Morg</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12702</link>
<guid>f9e817650f505b7c38f29416dfd0ba69</guid>
<pubDate>Wed, 27 Dec 2023 12:50:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Morg</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d76cf3661859bfaf31b6d23cc3f179b84316f7fc4f5e32b30fbaa45041bb8d4a</i><br /><br />Threat actor <b>description</b>: <i>Country: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ultra-Intelligence--Communications</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12699</link>
<guid>129ccfc1c1a82b0b23d4473a72373a0a</guid>
<pubDate>Wed, 27 Dec 2023 12:41:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Ultra-Intelligence--Communications</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b45131e05e8d5b0d710c88ef0e820f30cf3122641cfef31a891f7bebc4a6ab33</i><br /><br />Threat actor <b>description</b>: <i>Ultra Intelligence & Communications provides critical, tactical capabilities that inform decision making in the most challenging environments. Our team of experts possess decades of expertise in mission-critical, multi-domain communications, command and control, and cyber security. Real-time C2 and integrated intelligence and leading-edge networked radio solutions are helping to reimagine the future of the connected digital battlespace.</i><br />Target victim <b>website</b>: <i>https://www.ultra-ic.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aura-Engineering-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12700</link>
<guid>bdffc7973c9f8f88ab4effb397c59f92</guid>
<pubDate>Wed, 27 Dec 2023 12:41:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Aura-Engineering-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5eb49e130fbe2aad2be6d227fd148cd062ada2c340d5c9df031b7eb04f9662d8</i><br /><br />Threat actor <b>description</b>: <i>Aura Engineering solves problems. For nearly 30 years, we’ve provided efficient and reliable solutions to customers in the chemical and petrochemical industries. Our skilled team of system designers customizes each project to your specifications. No matter your engineering challenge, our experienced and knowledgeable staff is ready for the task. Aura Engineering, LLC was established in 1996 with the goal of providing professional engineering and design services to the petrochemical, chemical, and storage terminal industries.</i><br />Target victim <b>website</b>: <i>https://aura-engineering.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>FIRST-5-Santa-Clara-County</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12701</link>
<guid>8fc81fd7630f52aca6381ff6df0f6cec</guid>
<pubDate>Wed, 27 Dec 2023 12:40:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>FIRST-5-Santa-Clara-County</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2cf1177df67dc43b09d7b775d946ab0e25c02f8628758c398181fe3ca00cf23b</i><br /><br />Threat actor <b>description</b>: <i>FIRST 5 Santa Clara County supports the healthy development of children in our community. We aim to make a difference, helping to develop every community as a good place to live, raise and educate children. We encourage community members to become involved in the healthy development of all children. We want you to know what FIRST 5 Santa Clara County is doing in your community and ask you to share your thoughts on where your community could use our support.</i><br />Target victim <b>website</b>: <i>https://www.first5kids.org/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>richmont.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12696</link>
<guid>d7852cd2408d9d3205dc75b59a6ce22e</guid>
<pubDate>Tue, 26 Dec 2023 20:43:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>richmont.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>771c577dee69fdfbb60cc3a7d27931271d13dec0f27f035410e8be7aba68ed12</i><br /><br />Threat actor <b>description</b>: <i>Greetings!Today we are posting here the new company, "Richmont Graduate University".Company Description: Richmont Graduate University is a nonprofit organization providinggraduate education in the fields of professional counseling, mental h...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>coaxis.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12695</link>
<guid>d869c99656ec60fc9de27338a87b2506</guid>
<pubDate>Tue, 26 Dec 2023 20:31:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>coaxis.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0170f806da728623ab0efe8b055acbbd0e3f75f46af1fceade212118c7ef2c27</i><br /><br />Threat actor <b>description</b>: <i>Coaxis provides CPA Firms with a fully-hosted and managed network solution designed to remove the complexities of federal and industry compliances, curb the demands of information technology infrastructure, and greatly minimize the threat of cybercri...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Blaine-County-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12686</link>
<guid>1dd5a4016c624ef51f0542d4ae60e281</guid>
<pubDate>Mon, 25 Dec 2023 22:17:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Blaine-County-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>54df108b6914bbe4d4c53ff5072b73dab920265d50839145dd333731269f51df</i><br /><br />Threat actor <b>description</b>: <i>Blaine County Schools is a company that operates in the Education industry. It employs 251-500 people and has $25M-$50M of revenue.</i><br />Target victim <b>website</b>: <i>http://www.blaineschools.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>International-Electronic-Machines-Corp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12684</link>
<guid>67adf2b28a9bca8c22616cadac7b6b84</guid>
<pubDate>Mon, 25 Dec 2023 16:07:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>International-Electronic-Machines-Corp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe9c4b42831fc01ce83584177313925689fca44acf4a5399863c8e3bb8265fdd</i><br /><br />Threat actor <b>description</b>: <i>On this blessed day we are sharing with you that another company is going to celebrate the New Year with their data on our blog. International Electronic Machines develops, produces and markets innovative imaging, optical and other sensor-based systems for safety and security applications for intelligent transportation system applications. 16Gb of data will be uploaded early next year. Many HR files with personal information, IP, project files and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>co.pickens.sc.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12682</link>
<guid>b79b48dd646ef0af02646b332a92d855</guid>
<pubDate>Mon, 25 Dec 2023 10:32:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>co.pickens.sc.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>885c9695662b6d4e2456b84d01591c8d9ab9e4a82dcbb57ba22a75ca7fa9a3ac</i><br /><br />Threat actor <b>description</b>: <i>Welcome to Pickens County, SC</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>hendelsinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12680</link>
<guid>78b73d22a1920ea41999e0d9290ce7d1</guid>
<pubDate>Mon, 25 Dec 2023 10:04:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hendelsinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e8c5912364b02b28831c86f0a0b84b6fde39861f6ddcf5ebdeec359f57ff90d</i><br /><br />Threat actor <b>description</b>: <i>Hendels, Inc distributes petroleum and petroleum products. The Company offers gasoline, diesel, lubricant oil, and propane tanks.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Associates-Family-Dentistry</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12668</link>
<guid>354680832fcea7e2b7057a5ac2c489f8</guid>
<pubDate>Sat, 23 Dec 2023 22:26:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Associates-Family-Dentistry</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc72a82611ceff01f461c842a5d3b0326dbfd5d7bfae2c0233c7ee8cb1f2ad05</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bay-Orthopedic--Rehabilitation-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12664</link>
<guid>2adfd952d109f78f310901931aa1675b</guid>
<pubDate>Sat, 23 Dec 2023 19:01:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Bay-Orthopedic--Rehabilitation-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eda4ae0b46ca04911584b996fcf0cb7ec36ad983bacce9e6ceff9798a980b1f4</i><br /><br />Threat actor <b>description</b>: <i>The staff at Bay Orthopedic & Rehabilitation Supply Co. Inc., have been serving the Orthotic and Prosthetic needs of Long Island and the Metropolitan New York Area since 1977.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>quakerwindows.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12659</link>
<guid>204fdcae117b31aa8d74aad10e7e37ce</guid>
<pubDate>Sat, 23 Dec 2023 13:16:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>quakerwindows.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f00bba0710146532d9311217b145dd88bae8d10b74632ef0d96677612fe537c5</i><br /><br />Threat actor <b>description</b>: <i>Download link #1:  https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/QUAKER/PROOF/ </i><br />Target victim <b>website</b>: <i>quakerwindows.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>VF-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12651</link>
<guid>6fbb698655e6b0fdd299a543951c27ec</guid>
<pubDate>Fri, 22 Dec 2023 22:19:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>VF-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12b8fb5637bbe4afee7329ec430b725fded0fb122b4b6ade2a5133455890749c</i><br /><br />Threat actor <b>description</b>: <i>VF Corporation is an American global apparel and footwear company founded in 1899 by John Barbey and headquartered in Denver, Colorado. The company's 13 brands are organized into three categories: Outdoor, Active and Work. In 2015, the company controlled 55% of the U.S. backpack market with the JanSport, Eastpak, Timberland, and The North Face brands.</i><br />Target victim <b>website</b>: <i>https://www.vfc.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>whafh.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12648</link>
<guid>1bff3f64f354e35b89422273e74cab8f</guid>
<pubDate>Fri, 22 Dec 2023 19:17:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>whafh.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f8150e080a7751797b8bf3c9d217915bba84ad98e3b9ba4e2535a1651a0132f</i><br /><br />Threat actor <b>description</b>: <i>Wolf Haldenstein Adler Freeman & Herz LLP has decades of experience in complex litigation, with an emphasis on securities and shareholder derivative litigation, antitrust litigation, copyright litigation, business litigation, and consumer protection. The Firm has recovered more than $9 billion for its clients, including defrauded shareholders and investors, antitrust victims, victims of copyright infringement, and injured consumers. Wolf Haldenstein has earned global acclaim for its many groundbreaking achievements.SITE: www.whafh.com Address  270 Madison Avenue New York, New York 10016 UNITED STATES (212) 545-4600Symphony Towers 750 B Street, Suite 1820 San Diego, California 92101 UNITED STATES (619) 239-4599111 West Jackson, Suite 1700 Chicago, IL 60604 UNITED STATES (312) 984-00001008 17th Ave South Nashville, TN 37212 UNITED STATES (615) 270-8111FULL DATA SIZE: 452gb 1. I-9 forms 2. ConfidentialityNETWORK: WHAFHGROUP-------------------------DOMAIN ADMINS------------------------- admin          Administrator      Avada citrix          cyberdocs        dbagent discovery        dm            docs eqt_controller      fusion          gateway gjata          gwweb          hal2000 ldap           legalkey         mail mann           monitor         newwinny newwinsd         NYDC2DHCP        scheduler summation2        whafhapps        whafhch whafhny         whafhsd         whafhsql whafhweb         wolf1WHAFHGROUP\Administrator !w0lf1888!son-------------------------DC------------------------- whafhny.whafh.com 10.1.3.2 Windows Server 2008 R2 Standard WHAFHSD.whafh.com 10.3.1.2 Windows Server 2012 R2 Standard NYDC1.whafh.com 10.1.3.3 Windows Server 2008 R2 Standard SDDC1.whafh.com 10.3.1.2 Windows Server 2012 R2 Standard-------------------------SERVERS------------------------- Tabsny.whafh.com  Windows Server 2019 Standard WIN-19.whafh.com  Windows Server 2019 Standard tabs.whafh.com 10.1.3.4 Windows Server 2019 Standard CTX4.whafh.com 10.1.3.20 Windows Server 2012 R2 Standard WStorefront.whafh.com 10.1.3.69 Windows Server 2012 R2 Standard VWNY.whafh.com 10.1.3.150 Windows Server 2012 R2 Standard WSUS.whafh.com 10.1.3.120 Windows Server 2012 R2 Standard CTX2.whafh.com 10.1.3.19 Windows Server 2012 R2 Standard CTX1.whafh.com 10.1.3.33 Windows Server 2012 R2 Standard DMNY.whafh.com 10.1.3.24 Windows Server 2012 R2 Standard DMSD.whafh.com 10.3.1.18 Windows Server 2012 R2 Standard whafhapps.whafh.com 10.1.3.12 Windows Server 2012 R2 Standard mailny1.whafh.com 10.1.3.7 Windows Server 2012 R2 Standard wolf1.whafh.com 10.1.0.8 Windows Server 2012 R2 Standard equitrac.whafh.com 10.1.1.18 Windows Server 2008 R2 Standard NYSQL.whafh.com 10.1.3.30 Windows Server 2008 R2 Standard SUMMATION.whafh.com 10.1.3.26 Windows Server 2008 R2 Standard DISCOVERY.whafh.com 10.1.3.32 Windows Server 2008 R2 Standard MONITOR.whafh.com  Windows Server 2008 R2 Standard HP2.whafh.com  Windows Server 2008 R2 Standard SQL.whafh.com 10.1.3.22 Windows Server 2008 R2 Standard HP1.whafh.com  Windows Server 2008 R2 Standard NYPRT.whafh.com 10.1.3.16 Windows Server 2008 R2 Standard WHAFHCA2.whafh.com 10.1.3.77 Windows Server 2008 R2 Standard CITRIX1.whafh.com 10.1.3.19 Windows Server 2008 R2 Standard WEB.whafh.com 10.1.0.15 Windows Server 2008 R2 Standard FUSION.whafh.com 10.1.3.5 Windows Server 2008 R2 Standard DM.whafh.com  Windows Server 2008 R2 Standard mailny.whafh.com  Windows Server® 2008 Standard</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>igs-inc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12643</link>
<guid>08b1366504a4a5a1e679e2eaad38b595</guid>
<pubDate>Fri, 22 Dec 2023 05:29:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>igs-inc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a85abc14f215f2483e3394cce2cf2c92c73b566c83043c7f49fda21b1a958165</i><br /><br />Threat actor <b>description</b>: <i>Integrated Geotechnical Solutions, Inc. (IGS) is a leading provider of monitoring systems, consultation services and risk management solutions. With locations throughout North America, our services have been used in the construction, aggregate, subwa...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>fager-mcgee.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12638</link>
<guid>195d221c982e47eb58347e5d06ce3180</guid>
<pubDate>Fri, 22 Dec 2023 02:32:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>fager-mcgee.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a516d6274caebeede3a855a8b0457a2c7f9404e72d98fc72bd629fc7e96da93e</i><br /><br />Threat actor <b>description</b>: <i>Fager-McGee Commercial Construction, Inc. was founded on July 30, 1986 under the laws of the state of Illinois by Bruce E. Fager and Steven L. McGee.The Corporate Objective is to provide full-services for General Contracting, Design/Build and Con...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>ACE-Air-Cargo</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12620</link>
<guid>8cb3522da182ff9ea5925bbd8975b203</guid>
<pubDate>Thu, 21 Dec 2023 02:38:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>ACE-Air-Cargo</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f15117b3d7ae1a29f3fe2bdef31946cb0677d2c11252926bd04a4187a5b0d856</i><br /><br />Threat actor <b>description</b>: <i>ACE offers scheduled cargo flights, passenger and cargo charters, small package service and logistics.</i><br />Target victim <b>website</b>: <i>aceaircargo.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kinetic-Leasing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12621</link>
<guid>ac4c0c5d6b6b20ce69643ff104689db0</guid>
<pubDate>Thu, 21 Dec 2023 02:38:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Kinetic-Leasing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>109ecbd205fd680915d569fa953df08208c873a7aaf7961414c17811146a28d9</i><br /><br />Threat actor <b>description</b>: <i>Kinetic Leasing, Inc. is a general equipment leasing company providing flexible, creative leasing solutions to middle market businesses and municipalities acros...</i><br />Target victim <b>website</b>: <i>kineticlease.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Packaging-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12612</link>
<guid>1b31a4f23c784d5b162a3066fa9aaf4f</guid>
<pubDate>Thu, 21 Dec 2023 00:35:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Packaging-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0b7c867a4a37b9ac1dd31450ec480c893a74f90b3aff279c6d9bec2473b9ced</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.digipackaging.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bladen-County-Public-Library</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12606</link>
<guid>4d91e93c7905243a769485162b66e3dc</guid>
<pubDate>Wed, 20 Dec 2023 22:16:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Bladen-County-Public-Library</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd9aada89f713975ff8f37d4e7fc78956925897f8f9495f77ffaad111c569fb2</i><br /><br />Threat actor <b>description</b>: <i>SALE</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Unite-Here</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12604</link>
<guid>359f449e012b58f30cbc80ea8b9e794a</guid>
<pubDate>Wed, 20 Dec 2023 20:34:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Unite-Here</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1389fb18750b8087bd41d7e860e485ef3b1261839e87e85878519261bddecf3</i><br /><br />Threat actor <b>description</b>: <i>UNITE HERE is a labor union in the United States and Canada with roughly 300,000 active members. The union's members work predominantly in the hotel, food service, laundry, warehouse, and casino...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>smudlers.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12605</link>
<guid>254b6cccc84a3b7e5c696e67c9ef656e</guid>
<pubDate>Wed, 20 Dec 2023 20:33:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>smudlers.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6e5feb73482295bdb837a7409013663b01d8a21ca12ace4799a84d1fa675aac</i><br /><br />Threat actor <b>description</b>: <i>Smulders is an international steel construction company with more than 50 years experience in the engineering, construction, supply and assembly of steel constructions. Smulders has more than 1,400 employees working across different locations in Belg...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>DBMG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12601</link>
<guid>47af10edfc4c96329531345635a4baa9</guid>
<pubDate>Wed, 20 Dec 2023 17:36:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>DBMG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bae7d0d30b8e71107bd30bac212db097a0114ec6c7f5e24cc41a45242812578d</i><br /><br />Threat actor <b>description</b>: <i>Download link #1: https://acfckf3l6l7v2tsnedfx222a4og63zt6dmvheqbvsd72hkhaqadrrsad.onion/DBMG/kE0cZ6KmMsBN/ </i><br />Target victim <b>website</b>: <i>dbmgroup.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rockford-Gastroenterology-Associates-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12594</link>
<guid>0dce20892f775d8953c42e4a49978e38</guid>
<pubDate>Wed, 20 Dec 2023 16:19:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ragroup</b> claims attack for <b>Rockford-Gastroenterology-Associates-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4670857a5694ef81d8df81afe4937df06a1c935bde3d4420ed62a805c486ca7f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ragroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>dobsystems.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12591</link>
<guid>89f3c33175c57115408f4fd8a8557751</guid>
<pubDate>Wed, 20 Dec 2023 16:04:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>dobsystems.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc04ead7d509aaeab566bc32213557baf030e5399eadd103c6d9a1cc7e583e47</i><br /><br />Threat actor <b>description</b>: <i>We are the leader in airline industry data processing and provide a suite of Business Intelligence solutions for our customers. We concentrate on delivering accurate, tailored, and timely competitive information to our customers</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>HUNTER</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12592</link>
<guid>ff47afc1bc40f685b0982f6b0e40248b</guid>
<pubDate>Wed, 20 Dec 2023 16:03:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>HUNTER</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>27f4879fbe674830018a1a1e6c407f40df2fdd073f2a3f8edfbeb22c6ed18c99</i><br /><br />Threat actor <b>description</b>: <i>Download link #1: https://acfckf3l6l7v2tsnedfx222a4og63zt6dmvheqbvsd72hkhaqadrrsad.onion/HUNTER/68ZRg2b1oA20/ </i><br />Target victim <b>website</b>: <i>hunterbuildings.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Navigation-Financial-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12590</link>
<guid>21a38ed2ee0c2c081c31286d29db2acc</guid>
<pubDate>Wed, 20 Dec 2023 14:35:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Navigation-Financial-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>65ee813481f60ec6aa513c0a2e91e9a35cc32d1ad49dc5e5175a765a4eb44b96</i><br /><br />Threat actor <b>description</b>: <i>Our mission is to free our clients from financial concern, to counsel according to our clients' individual goals, to listen, to strive to exceed our clients' expectations, and to enrich our community.</i><br />Target victim <b>website</b>: <i>https://www.navigationfinancial.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>des-igngroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12589</link>
<guid>ff111e4a5406ed4024a901c57e811167</guid>
<pubDate>Wed, 20 Dec 2023 14:28:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>des-igngroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89b52a59b6c7d259ef0b698e584d8df238527a92adc881ca3210a5457a119a0d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>emprint.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12578</link>
<guid>fdd73fe694d1c8e25b44c49f91906b9c</guid>
<pubDate>Wed, 20 Dec 2023 10:43:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>werewolves</b> claims attack for <b>emprint.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25add52a7c9e23a5ebcca55f9bf4e315c3682bbb9dd9dcbe58536497778cd1e6</i><br /><br />Threat actor <b>description</b>: <i>Emprint предлагает различные решения для печати и бизнеса, такие как вариативная печать, переплет, печать по запросу, интернет-магазины и многое другое.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>werewolves</category>
</item>
<item xmlns:dc='ns:1'>
<title>acac.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12580</link>
<guid>7ae7778c9ae86d2ded133e891995dc9e</guid>
<pubDate>Wed, 20 Dec 2023 10:41:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>werewolves</b> claims attack for <b>acac.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>528fd9506315dd91e359cc73e7255bcb6b809fa7a6ea73b6c61cb457d2607f9d</i><br /><br />Threat actor <b>description</b>: <i>We’re dedicated to the integration of medicine and fitness to improve community health by focusing on prevention, treatment, and rehabilitation of lifestyle-related disease.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>werewolves</category>
</item>
<item xmlns:dc='ns:1'>
<title>Employ-Milwaukee</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12558</link>
<guid>004a68efcee088ddeaaca5c5a3afaa2f</guid>
<pubDate>Wed, 20 Dec 2023 08:34:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Employ-Milwaukee</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9556690ec18f59738ce58fd725daddacef358bd35fad71709d147db262b771bf</i><br /><br />Threat actor <b>description</b>: <i>Employ Milwaukee is the Milwaukee County workforce development board. We are part of the public workforce system made up of federal, state and local initiatives that strengthens Milwaukee's workforce. Employ Milwaukee is the workforce development board serving Milwaukee County. We help connect job seekers to employment opportunities, provide education and training options in high-growth, high-demand sectors and assist in providing a skilled and sustainable workforce to attract, retain and grow diverse businesses in our Milwaukee 7 regionemploymilwaukee.org</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Horizon-Pool--Spa</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12559</link>
<guid>9b8c60725a0193e78368bf8b84c37fb2</guid>
<pubDate>Wed, 20 Dec 2023 08:33:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Horizon-Pool--Spa</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c52a784bddbd8cc98a3be1a85ee1c27f3cf7fd744dea4269c31d760f4ea7181b</i><br /><br />Threat actor <b>description</b>: <i>Horizon is a wholesale distributor of pool and spa parts for repair, construction and retail companies.www.horizonparts.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Davis-Cedillo--Mendoza-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12561</link>
<guid>1514f187930072575629709336826443</guid>
<pubDate>Wed, 20 Dec 2023 08:31:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Davis-Cedillo--Mendoza-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff7c3e5d3e0b5e145ca5c1a6c04d28bb7907ae21dedee6e7e4ccc82da08513ae</i><br /><br />Threat actor <b>description</b>: <i>Davis, Cedillo & Mendoza, Inc. specializes in business litigation, products liability, tort defense, and real estate and commercial transactions. Our firm is committed to designing unique, cost-effective legal strategies that deliver positive outcomes.www.lawdcm.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>WELBRO-Building-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12555</link>
<guid>04c7f37f2420f0532d7f0e062ff2d5b5</guid>
<pubDate>Wed, 20 Dec 2023 04:08:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>WELBRO-Building-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>86b2fdbaa80de11ee8ef590606912f4871f02d32f578afa07a971b96fd049504</i><br /><br />Threat actor <b>description</b>: <i>WELBRO Building Corporation, Inc., is committed to building personalized, dedicated, and superior services to meet the needs of our clients. WELBRO offers preconstruction design, build and construction management services to hotel, hospitality, education and retail buildings welbro.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>spiritleatherworks.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12554</link>
<guid>6644cb08d30b2ca55c284344a9750c2e</guid>
<pubDate>Wed, 20 Dec 2023 02:33:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>spiritleatherworks.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe1924d9a5b6c258e1ab86598dea8d973e0f6efa80f66f5f3697b5f235ba476d</i><br /><br />Threat actor <b>description</b>: <i>Spirit Leatherworks (SLW) is a product design, manufacturing, and distribution company focusing on premium craftsmanship & construction of leather goods. The common location of Eugene OR, helped make history in 2004 when Nike granted its first outsid...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>RCSB-PDB</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12552</link>
<guid>90a6a3e4bf2f998638f0ea1bb15ed6f4</guid>
<pubDate>Tue, 19 Dec 2023 22:13:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>RCSB-PDB</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b3061831521aa46ff1dea35faf11f65390bf67ebfec13bf3ca6cd98594de3d5</i><br /><br />Threat actor <b>description</b>: <i>PREVIEW</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>mtsd-vt.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12549</link>
<guid>3695d85c350d924e662ea2cd3b760d40</guid>
<pubDate>Tue, 19 Dec 2023 20:29:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>mtsd-vt.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>14e652c964b0a953b14311aa8331514768837f31ae2483b1c38505e910288d54</i><br /><br />Threat actor <b>description</b>: <i>Through inclusive and reflective practices, the Milton School Community empowers all members to be resilient and passionate learners who are engaged locally and globally.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Viking-Therapeutics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12550</link>
<guid>a72dddf884c1fd3602200e6effac1bb7</guid>
<pubDate>Tue, 19 Dec 2023 20:28:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Viking-Therapeutics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7a357659a33b45ece5a6967a71a4d3f860b499d23ba3bcad83b3f631b828182</i><br /><br />Threat actor <b>description</b>: <i>Viking Therapeutics, Inc. is a clinical-stage biopharmaceutical company, which engages in the development of therapies for metabolic and endocrine disorders. The company was founded by Brian Lian and Michael A. Dinerman on September 24, 2012 and is headquartered in San Diego, CA.</i><br />Target victim <b>website</b>: <i>https://vikingtherapeutics.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.nistx.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12454</link>
<guid>e43a09ffc30b44cb1f0db46f87836f40</guid>
<pubDate>Tue, 19 Dec 2023 19:19:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>www.nistx.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7579d43fc964b3ba88e3f3b18b097f3b4bafa6eea1e1eaa91de0330ab52330b6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://www.nistx.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.herrickindustrial.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12456</link>
<guid>6a9edcb7b63821802aa44d35d531c9fc</guid>
<pubDate>Tue, 19 Dec 2023 19:19:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>www.herrickindustrial.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad72cb0d51d65f70f124a85d8569679415768204c8884cccee19c895551cc9c0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://www.herrickindustrial.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>wsies.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12462</link>
<guid>fadb05d5189a7da64138023a4e807b45</guid>
<pubDate>Tue, 19 Dec 2023 19:19:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>wsies.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>adfe1205cac8ca7ec0415a51218ced928e4fdb460ef8e1731ec54f443e731c70</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://wsies.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>shop.shopsupply.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12478</link>
<guid>5031fe4276fb6a875ffaeaf2aff15db7</guid>
<pubDate>Tue, 19 Dec 2023 19:18:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>shop.shopsupply.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8503dcc4bbedf42641d6d6394cf1f90718d7c1c6060909a99c7609a995b649be</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://shop.shopsupply.net/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>shop.reggiemckenzieindustrial.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12479</link>
<guid>b89e04758347769429463d62d8212877</guid>
<pubDate>Tue, 19 Dec 2023 19:18:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>shop.reggiemckenzieindustrial.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b42491fba3d87f70f6ace1ad70bc48b612a81715e182e4b9cb6c5c3bf5926b93</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://shop.reggiemckenzieindustrial.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>selwayindustrialsupply.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12486</link>
<guid>dad8cbca829b18de405baf430f37234c</guid>
<pubDate>Tue, 19 Dec 2023 19:18:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>selwayindustrialsupply.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4dbd2c7e2e1c19a4a67c4b52d5283eb2d9732fda19676d218f538055da1d6b3f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://selwayindustrialsupply.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>rocket-supply.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12487</link>
<guid>1b308c0bf9f1e621437a73c326840a20</guid>
<pubDate>Tue, 19 Dec 2023 19:18:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>rocket-supply.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>feb2ac53bf036aebaa249072f4474e8eff90ba0cc7e63ae1b6180cac3b724063</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://rocket-supply.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>rmpis.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12488</link>
<guid>798fa73dc39804b96742e2d3e6c5343a</guid>
<pubDate>Tue, 19 Dec 2023 19:18:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>rmpis.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e5dfb3c7384a33c5e8278364b610d09169c8fde1c33d1daf5fda5b24cce280f1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://rmpis.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>pts-tools.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12490</link>
<guid>e5fb88b398b042f6cccce46bf3fa53e8</guid>
<pubDate>Tue, 19 Dec 2023 19:18:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>pts-tools.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eaf58fb2f9ba34c734b4ae94c1c11ce4e44071d4cd859556b599021b9c1dc1ad</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://pts-tools.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>pmt-usa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12492</link>
<guid>c9772667ba6122896327f5856ff8224f</guid>
<pubDate>Tue, 19 Dec 2023 19:18:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>pmt-usa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d2244dd34f7435c71b60ab24319669413690e40e70921eb7005df00bf69e9c25</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://pmt-usa.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>paragon-supply.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12496</link>
<guid>631ceaa1abe4dcc8659f7477bbe1f4bf</guid>
<pubDate>Tue, 19 Dec 2023 19:18:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>paragon-supply.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>723d5e57a600a3d83f3d1a9cd916558e60cd6486074ec0d386c4d06fda215c3c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://paragon-supply.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>northernprecisionsales.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12499</link>
<guid>cc99626e2a87a37dd612eaa6dcac473c</guid>
<pubDate>Tue, 19 Dec 2023 19:17:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>northernprecisionsales.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7838ba8ff2970d5ed079e4a7df40fe41e2fea68a25fc881f4ebcd65573e88610</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://northernprecisionsales.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>newstore.johnstoncompanies.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12500</link>
<guid>fd512441a1a791770a6fa573d688bff5</guid>
<pubDate>Tue, 19 Dec 2023 19:17:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>newstore.johnstoncompanies.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd5374bc058074fea9fd73abda2463fe6e50e59911237edae2dd7d69b8264a54</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://newstore.johnstoncompanies.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>morsecuttingtools.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12502</link>
<guid>b1501a9528a292585b7e90e8708143f1</guid>
<pubDate>Tue, 19 Dec 2023 19:17:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>morsecuttingtools.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ef44903b3150788f4d4d1389283ddea1613777d6d6b5e3cc852428b9d50b3eb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://morsecuttingtools.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>mitchellmckinney.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12503</link>
<guid>d70538d0bcd4bacb90ae29025815166f</guid>
<pubDate>Tue, 19 Dec 2023 19:17:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>mitchellmckinney.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>193d98f0db80403b779ee26448dc2a2fdf7ee60e1df0d264d277a7e09b0fccce</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://mitchellmckinney.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>mgisales.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12504</link>
<guid>84281e5e3728a8f8d1d8f85895895442</guid>
<pubDate>Tue, 19 Dec 2023 19:17:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>mgisales.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be6e33b6d1e6c825bf1b66029be6bdfa927ffd5834efec703de1c6f933b41ad8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://mgisales.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>libertytool.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12506</link>
<guid>30637ce29549ac951061fd211d43c3b0</guid>
<pubDate>Tue, 19 Dec 2023 19:17:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>libertytool.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b49d208487fc4dd8fac18cd03ca26f9d7372210976ba70c51b22f33bcaa924fa</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://libertytool.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>knightesupply.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12508</link>
<guid>9910489e4ff310896dce21303a8e7fda</guid>
<pubDate>Tue, 19 Dec 2023 19:17:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>knightesupply.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ee3fba8576b55f931158dcce4f2a1b9be82ac4d2846d099de00ab1be905ccd5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://knightesupply.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>its-supply.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12511</link>
<guid>dddc621ebab7b6489e0340b2292ebd5e</guid>
<pubDate>Tue, 19 Dec 2023 19:17:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>its-supply.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f0c209cdad0925bb2c737c92807f83a262e48380f716e5116965b125ee75f3a3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://its-supply.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>goronco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12513</link>
<guid>38da053032cb4c18a10fe33f871fc2bd</guid>
<pubDate>Tue, 19 Dec 2023 19:17:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>goronco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>202ca28f6b9ef970f46232427c7a1c090bebabbfed769e57d56d48a736bc7e06</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://goronco.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>gordonindustrial.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12514</link>
<guid>01c9d2c5b3ff5cbba349ec39a570b5e3</guid>
<pubDate>Tue, 19 Dec 2023 19:17:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>gordonindustrial.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91b6201f5c65cf4831d62977da6d6882f6acdfdb163c890574f655fce3dc7576</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://gordonindustrial.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>giddirect.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12516</link>
<guid>86174520c23c6c61f0f50da7294b9f13</guid>
<pubDate>Tue, 19 Dec 2023 19:17:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>giddirect.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa0835067126b3e01588a008ca18acc9f7e14cc07ca73deaf1c0c44bba65c990</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://giddirect.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>gfwdsupply.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12517</link>
<guid>d3c5785c581b1cd0f22e4ad542504122</guid>
<pubDate>Tue, 19 Dec 2023 19:17:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>gfwdsupply.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6bd7f853b8d8995a5535b7f84c0b741b7341f684d5c0e09566a1f9e15525054</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://gfwdsupply.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>fugatesales.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12518</link>
<guid>0878e4a063af2c3c2191cf4fc560c094</guid>
<pubDate>Tue, 19 Dec 2023 19:17:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>fugatesales.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6e0fb5be915aee9dc59a61127c633631c9ac943267727db6c928b5c9bd85a256</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://fugatesales.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>dixie-tool.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12520</link>
<guid>9d34d86df01c81eba7b2fc4a11bf0cb8</guid>
<pubDate>Tue, 19 Dec 2023 19:17:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>dixie-tool.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e4d452bdac5e9db7e8dd5b204bec69b7fa6843fd233c47a2d9b0ee242278c479</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://dixie-tool.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>dctsupply.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12521</link>
<guid>70322d1064e4f050c636cc507a59f5a3</guid>
<pubDate>Tue, 19 Dec 2023 19:17:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>dctsupply.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2a9d1adbd7e4168cb8775fa48c24959f7464c207bdb29865f86433fdf2b1f7b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://dctsupply.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>cspartners.caesarstoneus.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12523</link>
<guid>3f62d610adac92bbf2996bb4d8ff7657</guid>
<pubDate>Tue, 19 Dec 2023 19:17:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>cspartners.caesarstoneus.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e93f8c3d743fb54a78faaefd99ed5a0c904a8125f4766037f033330e3d97d5b5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://cspartners.caesarstoneus.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>colmarindustrial.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12530</link>
<guid>e26dbb5b1843bf566ea7ec757f3325c4</guid>
<pubDate>Tue, 19 Dec 2023 19:16:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>colmarindustrial.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9647abe35bc27478eaaa8e2f840ebd4190a6177aba39607b75c680005d08f333</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://colmarindustrial.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>cmtindustrial.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12531</link>
<guid>4bcd537b6c034e297f0030cf08887426</guid>
<pubDate>Tue, 19 Dec 2023 19:16:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>cmtindustrial.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b812d1eaf78d765d67ff3f1b0dfdc003d0250ec240bb7f3d74decd409d74de7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://cmtindustrial.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>cdt1.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12532</link>
<guid>aa988447067c0355df0223065af9d055</guid>
<pubDate>Tue, 19 Dec 2023 19:16:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>cdt1.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fceb6dcdd75d138a46ab096869fed3fe261af74cd8e701c2caa0d1b400336be9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://cdt1.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>catalog.toolkrib.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12534</link>
<guid>f675d8aec99e98b4e62c6aae5fb12fb6</guid>
<pubDate>Tue, 19 Dec 2023 19:16:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>catalog.toolkrib.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>497561f581a74076a1d11979f254a42c2897f64f75de580a52b1bc00276c09df</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://catalog.toolkrib.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>catalog.fotcnc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12535</link>
<guid>ee88b3cea2051be97bcddf2e0d9a28f6</guid>
<pubDate>Tue, 19 Dec 2023 19:16:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>catalog.fotcnc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8027b6fc8165bc16c4e726388be26923450d57c2ba7041106dc4b61dc0a1b318</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://catalog.fotcnc.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>butlerbros.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12537</link>
<guid>4b459ea1a5917be436df5f0bd5b3c4ad</guid>
<pubDate>Tue, 19 Dec 2023 19:16:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>butlerbros.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db9eb9fb85213b9ed81cc9a9680ff7ef9451837e9cd019dd1f21936065256d41</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://butlerbros.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>blueashsupply.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12538</link>
<guid>71af59614c8b42af334933e9261e53be</guid>
<pubDate>Tue, 19 Dec 2023 19:16:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>blueashsupply.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>961926aaa0c34b3a0b34377686862c389c63b6fcafabacd0531ddf9c62fd9100</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://blueashsupply.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>berkshireesupply.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12539</link>
<guid>b2bb9671f6bda2005155a9078b6fcd07</guid>
<pubDate>Tue, 19 Dec 2023 19:16:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>berkshireesupply.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60c937ec95c35d273bc9eca8e20808d9f89bff8fb0586b7ca6531cc4f9435be7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://berkshireesupply.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>barindustrial.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12540</link>
<guid>22dabd20ca39458b881ee5a1a2404281</guid>
<pubDate>Tue, 19 Dec 2023 19:16:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>barindustrial.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f8130055f1edf8f734a77acc3b05bee377da6180acf0614cbe51a80a9cf8e1c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://barindustrial.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>badgermill.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12541</link>
<guid>2aa99900aa004f52980b7c2cad7ed31a</guid>
<pubDate>Tue, 19 Dec 2023 19:16:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>badgermill.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b3b57e6d6626ab432d96fedd0acc06ffc02e7b714d534d687ce9849897d2598</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://badgermill.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>atwoodindustries.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12542</link>
<guid>719e427d3b21a35b8cdcd2d88db6ca11</guid>
<pubDate>Tue, 19 Dec 2023 19:16:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>atwoodindustries.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>079723c94063409aa5e9cd999faec5ce02a9535ea9e9c33e7cf9271810d4552a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://atwoodindustries.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>arieladar.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12543</link>
<guid>f2d7e2fc28ededdf63c1684a3b6d0c5f</guid>
<pubDate>Tue, 19 Dec 2023 19:16:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>arieladar.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e2bcc88cf0aa7375a55a8948007ce57bc33992eeafdc093c04575ae36c48cd4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://arieladar.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>apisinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12545</link>
<guid>1f086a86e2a604cfa7787dbbffe246cf</guid>
<pubDate>Tue, 19 Dec 2023 19:16:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>apisinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fdeef9049b423e0ffcb53199c6a94fdedb77dbec70c8d0cfbdb4d005d2104b88</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://apisinc.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>amtektool.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12546</link>
<guid>59bbfbe0d3922ccd1d167661a26d8353</guid>
<pubDate>Tue, 19 Dec 2023 19:16:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>amtektool.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7135ca3902601287f77cc3b4498245cd7557283075660eb1268e06554e7b4710</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://amtektool.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>alleghenytool.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12547</link>
<guid>a3fc34dce15cda93287496c84af5203c</guid>
<pubDate>Tue, 19 Dec 2023 19:16:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>alleghenytool.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cbea49ef7c92763e199c8b6ccb7da8b0a3da5717f1829e8077d08d42f8b8dab3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://alleghenytool.net/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>alcornindustrial.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12548</link>
<guid>194585b5215aea447389c5fefca09c61</guid>
<pubDate>Tue, 19 Dec 2023 19:16:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>alcornindustrial.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c806f7c86be17a59829f39110d7389084a7f37092fb3572d01f2f9b444426209</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://alcornindustrial.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>ustg.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12450</link>
<guid>a896b6cbbe199b67c0f76f6f0e4b55d5</guid>
<pubDate>Tue, 19 Dec 2023 16:14:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>ustg.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>960f9e48a04cac631b56eacd73f343ac4f6de64d90b491a0ad6892db334b7e4d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://ustg.net/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>pecofoods.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12449</link>
<guid>d9eca0697ce00e28c61e029120c518c9</guid>
<pubDate>Tue, 19 Dec 2023 14:51:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>pecofoods.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7bdfe2ca552f406a77b588e8bea6c750508e28281262207c8c34762310877c10</i><br /><br />Threat actor <b>description</b>: <i>Peco Foods hopes you’ll pick up their poultry. Producing some 24 million pounds of poultry each week, the company processes private-label and store-brand chicken for US retail and foodservice customers. Peco Foods also exports items to Canada, Mexico, South America, Asia, and Eastern Europe. The processing company’s frozen, deli, and tray-pack products include boneless, skinless chicken breasts and tenderloins; boneless thighs; and jumbo legs and wings; as well as value-added breaded and flavored products. As a fully integrated processor, Peco Foods operates feed mills and hatcheries in three US states to support its poultry production facilities. Peco Foods is owned and operated by the founding Hickman family.SITE: www.pecofoods.com Address : 1101 Greensboro Ave Tuscaloosa, Alabama 35401, United StatesALL DATA SIZE: 510gb 1. Users personal documents 2. Human Resources 3. Accounting 4. Scans and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>chuzefitness.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12447</link>
<guid>165fdc9623e63b94742e6dd07b81e45b</guid>
<pubDate>Tue, 19 Dec 2023 12:35:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>chuzefitness.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ab346d75751f9791fb0199633813713624a54eb0a0bee682932161ae8b8fd64</i><br /><br />Threat actor <b>description</b>: <i>More 100 000 files accounting and personal data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Blackstone-Valley-Community-Health-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12444</link>
<guid>b7cf1dbb51db462f3ad750d65d42a3a6</guid>
<pubDate>Tue, 19 Dec 2023 01:07:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Blackstone-Valley-Community-Health-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ee4b4df0e0a794eedde1e25ce1d61d3d1577f3156d85af89bf82608fabda8d7</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://bvchc.org</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Richard-Harris-Personal-Injury-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12439</link>
<guid>5f221386d076f4e7f6a97bb3b406c7b8</guid>
<pubDate>Mon, 18 Dec 2023 23:59:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Richard-Harris-Personal-Injury-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04e97a1b949482140c21ad9c48aec6d9c7156a6e769890fefbdecde9b9acbd0e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.richardharrislaw.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Waldners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12441</link>
<guid>1e50b8b75ce32422bed8115d5da4fbaf</guid>
<pubDate>Mon, 18 Dec 2023 23:58:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Waldners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8a8fb4435bc14915d5d039df7c93b9c59a68735679d6915a3842feec01bbcd5</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.waldners.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>DYWIDAG-Systems--American-Transportation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12443</link>
<guid>8e9cd191d3eaf58c4d262677292270e5</guid>
<pubDate>Mon, 18 Dec 2023 23:57:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>DYWIDAG-Systems--American-Transportation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5928adacc5601f75d17a38103371fac7319437cbd6f81a65e5cde7a2dad539c</i><br /><br />Threat actor <b>description</b>: <i>Luxembourg, United States</i><br />Target victim <b>website</b>: <i>www.dywidag-systems.com www.dsiamerica.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cz</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12437</link>
<guid>08d537b63384743f5636110435721adb</guid>
<pubDate>Mon, 18 Dec 2023 22:24:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Cz</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>11f762e03481df2c5d6dc885521ce1331c5eb78e74e21705093493ee70da6863</i><br /><br />Threat actor <b>description</b>: <i>New York, United States</i><br />Target victim <b>website</b>: <i>www.c?????z????.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-CM-Paula</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12438</link>
<guid>40b5c8b6d8b88afbe7ab4a75ba11f9f2</guid>
<pubDate>Mon, 18 Dec 2023 22:24:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>The-CM-Paula</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ea8d381a003915d1dfc03b966e0897f2bdc364d0b471f218df2135450057a0a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.cmpaula.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>naandanjain.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12434</link>
<guid>1f3e9145ab192941f32098750221c602</guid>
<pubDate>Mon, 18 Dec 2023 17:37:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>naandanjain.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6468b95f3f09ee52d492143fa616f9ce46912787c05b2591c1f835fb4fd6c985</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://naandanjain.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>LAJOLLAGROUP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12433</link>
<guid>858e47701162578e5e627cd93ab0938a</guid>
<pubDate>Mon, 18 Dec 2023 17:18:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>LAJOLLAGROUP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e9848847db609876469d62876535a950889dcc61d4237c6f86ddc97a5259a68</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1993, La Jolla Group is an industry leading apparel and accessories company that specializes in building brands that inspire consumers. In today’s digitally-focused environment, it has never been easier to start a brand and never more difficult to scale. With a proven track record, robust infrastructure, and a specialized team, La Jolla Group is uniquely positioned to take your brand to the next level by providing custom solutions that meet your specific needs. Website: https://www.lajollagroup.com Revenue : $35.2M Address: 14350 Myford Rd Ste 100, Irvine, California, 92606, United States Phone Number: (949) 428-2800</i><br />Target victim <b>website</b>: <i>lajollagroup.com</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ta-Supply.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12431</link>
<guid>5dcef39f7ee1e03911b48b876ecf448e</guid>
<pubDate>Mon, 18 Dec 2023 16:18:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>toufan</b> claims attack for <b>Ta-Supply.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2541b7d3d6625f2d0c8337e90a1dd42590bb11c245b3bf70c606b0b4f7c6b783</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://Ta-Supply.com/</i>]]></description>
<category>toufan</category>
</item>
<item xmlns:dc='ns:1'>
<title>navitaspet.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12428</link>
<guid>ca0525bfe5cab4c577d169d3343a5452</guid>
<pubDate>Mon, 18 Dec 2023 13:07:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>navitaspet.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fdb92d9c39bc0d374500fe182b15b6b2183b437f24d091181689e98837c1d8ab</i><br /><br />Threat actor <b>description</b>: <i>Navitas Petroleum is a publicly traded (TASE:NVPT.L) North America focused, O&G exploration and production partnership. Navitas Petroleum has an established asset portfolio, including: conventional onshore production (Neches field), robust offshore production (Buckskin project), development stage assets (post-FID Shenandoah project) and high-impact exploration prospects (Block 7, offshore Canada).SITE: www.navitaspet.com Address  5847 San Felipe #2200 Houston, Texas 77057 UNITED STATES 713-955-7944 Ext 402FULL DATA SIZE: 330gb 1. Accounting 2. HR 3. W-9 forms 4. ConfidentialityNETWORK: PELES-------------------------DOMAIN ADMINS------------------------- AdministratorPELES\Administrator Pr0t3ctM3!!!-------------------------DC------------------------- DC01-Peles.Peles.local 10.10.1.30 Windows Server 2019 Standard-------------------------SERVERS------------------------- License01-Peles.Peles.local  Windows Server 2019 Standard ACCT01-PELES.Peles.local 10.10.1.39 Windows Server 2019 Standard FS01-Peles.Peles.local 10.10.1.34 Windows Server 2019 Standard Citrix01-Peles.Peles.local 10.10.1.32 Windows Server 2019 Standard Citrix02-Peles.Peles.local 10.10.1.33 Windows Server 2019 Standard VDA01-Peles.Peles.local 10.10.1.29 Windows Server 2019 Standard Petra01-Peles.Peles.local 10.10.1.38 Windows Server 2016 Standard scada01-Peles.Peles.local  Windows Server 2016 Standard</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>vyera.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12429</link>
<guid>5c9b5c47258cf1499c2dc64b7072e735</guid>
<pubDate>Mon, 18 Dec 2023 13:07:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>vyera.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8433735d0815d913d8bf5288facf8709950a58ed73ee42f17213f709ac8bf63</i><br /><br />Threat actor <b>description</b>: <i>Vyera Pharmaceuticals is committed to developing and commercializing treatments that address serious and neglected diseases with high unmet medical needs.SITE: www.vyera.com Address  600 Third Avenue, 19th Floor New York, NY  10016 UNITED STATES 212.202.5935FULL DATA SIZE: 226gb 1. R&D 2. HR 3. W-9 forms 4. ConfidentialityNETWORK: NYNY ny.vyera.com-------------------------DOMAIN ADMINS------------------------- Administrator      a-mkolias        gunjan.jain kbezrodnykh       pauserid-svc       rpatel rws           rws.ind         rws.support SCCMADMIN        varonis-svcny.vyera.com\Administrator P@$$m0rd_2021 ny.vyera.com\SCCMADMIN P@$$m0rd_2021 ny.vyera.com\rws.support M@$$m0rd_2023-------------------------DC------------------------- vny-dc01.ny.vyera.com 172.16.15.2 Windows Server 2016 Datacenter vny-dc02.ny.vyera.com vny-dc03.ny.vyera.com 172.17.9.4 Windows Server 2019 Datacenter VNY-RDC01.ny.vyera.com 172.16.26.2 Windows Server 2016 Datacenter NOT REAL DC: vny-rdc01.ny.vyera.com 172.16.26.2 Windows Server 2016 Datacenter-------------------------SERVERS------------------------- fileserver.ny.vyera.com  Windows Server 2016 Datacenter fileserver-cl.ny.vyera.com  Windows Server 2016 Datacenter vnj-cl02.ny.vyera.com  Windows Server 2016 Datacenter vny-ms05.ny.vyera.com 172.16.15.15 Windows Server 2016 Datacenter vny-ms04.ny.vyera.com 172.16.15.26 Windows Server 2016 Datacenter vye-ny-as02.ny.vyera.com  Windows Server 2016 Datacenter vnj-cfs01.ny.vyera.com  Windows Server 2016 Datacenter vnj-as01.ny.vyera.com  Windows Server 2016 Datacenter vnj-dc01.ny.vyera.com  Windows Server 2016 Datacenter vnj-hv01.ny.vyera.com  Windows Server 2016 Datacenter vnj-cfs02.ny.vyera.com  Windows Server 2016 Datacenter vnj-dc02.ny.vyera.com  Windows Server 2016 Datacenter vny-hv03.ny.vyera.com 172.16.16.10 Windows Server 2016 Datacenter nsc01.ny.vyera.com  Windows Server 2016 Datacenter vny-bi01.ny.vyera.com 172.16.15.43 Windows Server 2016 Datacenter vny-br01.ny.vyera.com  Windows Server 2016 Datacenter vny-fs01.ny.vyera.com 172.16.15.12 Windows Server 2016 Datacenter rws_test.ny.vyera.com  Windows Server 2016 Datacenter test.ny.vyera.com  Windows Server 2016 Datacenter vny-gw01.ny.vyera.com  Windows Server 2016 Datacenter vny-ns02.ny.vyera.com  Windows Server 2016 Datacenter vnj-ws01.ny.vyera.com  Windows Server 2016 Datacenter vny-cfs03.ny.vyera.com 172.16.15.31 Windows Server 2016 Datacenter vny-sh01.ny.vyera.com  Windows Server 2016 Datacenter vny-ws01.ny.vyera.com  Windows Server 2016 Datacenter vny-ms06.ny.vyera.com 172.16.15.25 Windows Server 2016 Datacenter vny-db05.ny.vyera.com 172.16.15.24 Windows Server 2016 Datacenter vny-cfs02.ny.vyera.com  Windows Server 2016 Datacenter vny-cfs01.ny.vyera.com  Windows Server 2016 Datacenter vny-cl01.ny.vyera.com 172.16.15.23 Windows Server 2016 Datacenter vny-cl02.ny.vyera.com 172.16.15.29 Windows Server 2016 Datacenter vny-db04.ny.vyera.com  Windows Server 2016 Datacenter vny-db03.ny.vyera.com 172.16.15.18 Windows Server 2016 Datacenter vny-us01.ny.vyera.com  Windows Server 2016 Datacenter vny-db01.ny.vyera.com 172.16.15.69 Windows Server 2016 Datacenter vny-pr01.ny.vyera.com  Windows Server 2016 Datacenter vny-hv01.ny.vyera.com 172.16.15.70 Windows Server 2016 Datacenter vny-sc01.ny.vyera.com 172.16.15.34 Windows Server 2016 Datacenter vny-bk01.ny.vyera.com 172.16.15.79 Windows Server 2016 Datacenter vny-db02.ny.vyera.com  Windows Server 2016 Datacenter vny-as04.ny.vyera.com 172.16.15.17 Windows Server 2016 Datacenter vny-cx05.ny.vyera.com 172.16.15.11 Windows Server 2016 Datacenter vny-cx04.ny.vyera.com  Windows Server 2016 Datacenter vny-as06.ny.vyera.com 172.16.15.37 Windows Server 2016 Datacenter vny-vc01.ny.vyera.com  Windows Server 2016 Datacenter vny-hv02.ny.vyera.com 172.16.15.21 Windows Server 2016 Datacenter vny-cx02.ny.vyera.com 172.16.15.65 Windows Server 2016 Datacenter vny-as02.ny.vyera.com  Windows Server 2016 Datacenter vny-ns01.ny.vyera.com  Windows Server 2016 Datacenter vny-cx03.ny.vyera.com 172.16.15.64 Windows Server 2016 Datacenter vny-as01.ny.vyera.com 172.16.15.42 Windows Server 2016 Datacenter vny-as03.ny.vyera.com  Windows Server 2016 Datacenter admtpc.ny.vyera.com  Windows Server 2016 DatacenterPHXCH phoenixus.com-------------------------DOMAIN ADMINS------------------------- Administrator      a-mkolias        gunjan.jain kbezrodnykh       pauserid-svc       rpatel rws           rws.ind         rws.support SCCMADMIN        varonis-svcphxch\Administrator 1@rmyKnife!!-------------------------DC------------------------- phx-dc01.phoenixus.com 172.16.105.2 Windows Server 2016 Datacenter phx-dc02.phoenixus.com 172.16.105.3 Windows Server 2016 Datacenter-------------------------SERVERS------------------------- phx-hv02.phoenixus.com 172.16.105.33 Windows Server 2016 Datacenter phx-hv01.phoenixus.com 172.16.105.16 Windows Server 2016 Datacenter phx-bk01.phoenixus.com  Windows Server 2016 Datacenter phx-pbx01.phoenixus.com 172.16.111.20 Windows Server 2016 Datacenter phx-cl01.phoenixus.com 172.16.105.19 Windows Server 2016 Datacenter phx-test-cl.phoenixus.com  Windows Server 2016 Datacenter test-cfs03.phoenixus.com  Windows Server 2016 Datacenter phx-as01.phoenixus.com 172.16.105.32 Windows Server 2016 Datacenter phx-ps01.phoenixus.com 172.16.105.10 Windows Server 2016 Datacenter phx-fs01.phoenixus.com 172.16.105.35 Windows Server 2016 Datacenter phx-ws01.phoenixus.com 172.16.105.13 Windows Server 2016 Datacenter phx-sc01.phoenixus.com 172.16.105.14 Windows Server 2016 Datacenter phx-ns01.phoenixus.com 172.16.105.15 Windows Server 2016 Datacenter phx-ca02.phoenixus.com 172.16.105.11 Windows Server 2016 Datacenter test-fs01.phoenixus.com  Windows Server 2016 StandardVYERA vyera.com-------------------------DOMAIN ADMINS------------------------- Administrator      admt-svc        AzureADSyncvyera.com\AzureADSync Provost_ver!!!23-------------------------DC------------------------- v-dc01.vyera.com 172.16.14.2 Windows Server 2016 Datacenter v-dc02.vyera.com v-dc03.vyera.com 172.17.8.4 Windows Server 2019 Datacenter-------------------------SERVERS------------------------- v-ca02.vyera.com 172.16.15.55 Windows Server 2016 Datacenter v-ws01.vyera.com  Windows Server 2016 Datacenter Sage_Test.vyera.com  Windows Server 2016 Datacenter EvaluationOAK oakrumpharma.com-------------------------DOMAIN ADMINS------------------------- Administrator      veeam-svc        Azure-svc varonis-svcOAK\veeam-svc 4RfIp@YXq,j&j,Px1LypRnsu-------------------------DC------------------------- oak-dc01.oakrumpharma.com 172.16.92.2 Windows Server 2016 Datacenter oak-dc02.oakrumpharma.com 172.16.92.3 Windows Server 2016 Datacenter-------------------------SERVERS------------------------- oak-fs01.oakrumpharma.com 172.16.92.5 Windows Server 2016 DatacenterSSP sevenscorepharma.com-------------------------DOMAIN ADMINS------------------------- Administratorsevenscorepharma.com\Administrator P@$$m0rd_2021-------------------------DC------------------------- ssp-dc01.sevenscorepharma.com ssp-dc02.sevenscorepharma.com 172.21.15.3 Windows Server 2016 Datacenter-------------------------SERVERS------------------------- ssp-as01.sevenscorepharma.com 172.21.15.13 Windows Server 2016 Datacenter ssp-ps01.sevenscorepharma.com  Windows Server 2016 Datacenter ssp-fs01.sevenscorepharma.com 172.21.15.11 Windows Server 2016 Datacenter</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Electrical-Connections</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12427</link>
<guid>36ef259d4d9967f3a81aa326160128c7</guid>
<pubDate>Mon, 18 Dec 2023 12:38:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Electrical-Connections</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d6263981bc95c11cc069b94e176a47b27be6fcdb54ca481cea43304c7452abbc</i><br /><br />Threat actor <b>description</b>: <i>The company Commercial & Residential Construction, Electricity.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>ATCO-Products-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12421</link>
<guid>eff2afaf73d134f6ea9eb98ff373426c</guid>
<pubDate>Sun, 17 Dec 2023 16:20:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>ATCO-Products-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8844cf06468178aa5dece416a7afe5d674bf428eff4746cdf828c392774c864</i><br /><br />Threat actor <b>description</b>: <i>ATCO Products Inc. designs, manufactures, and supplies automotive air conditioning components for original equipment suppliers and aftermarket customers. The companys product categories include accumulators and driers, hose assemblies, crimpers and tools.The main office of the company is located at  Interstate Hwy 45, Ferris, Texas, 75125, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Biomatrix-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12420</link>
<guid>2b8f7198614e3d872116d3c2840fd37c</guid>
<pubDate>Sun, 17 Dec 2023 16:18:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Biomatrix-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6801118b1e66a63f4d2cd530de9ea2e8eb48bce35aea1b62f93b8ee2adafaea</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1997, Biomatrix LLC specializes in biomedical and clinical research services. The company is based in Plantation, Florida, 33324, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>E--J-Gallo-Winery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12415</link>
<guid>4424ce31e37d8c81d626e3b5a3024da5</guid>
<pubDate>Sat, 16 Dec 2023 23:32:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>E--J-Gallo-Winery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc600a958b667695a11a27e82ddc94a6ac2916e6462b82010881aabb9a1a9606</i><br /><br />Threat actor <b>description</b>: <i>One of the largest wineries in the United States. E & J Gallo Winery is a winery and distributor headquartered in Modesto, California. It is the largest wine producer in the world, producing over 3% of the world's entire annual supply of 35 billion bottles with an annual revenue of $5.3 billion it is also the largest family-owned winery in the United States.  </i><br />Target victim <b>website</b>: <i>https://ejgallo.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kraft-Foods</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12410</link>
<guid>c23885620670bb335ef4c917657362b9</guid>
<pubDate>Sat, 16 Dec 2023 17:23:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Kraft-Foods</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1b146c22d11134fb9e1554c8ec976ebb9b6f51bd5298557abf38b98ecc7b2fb</i><br /><br />Threat actor <b>description</b>: <i>For 150 years, Kraft Heinz has produced some of the world's most beloved products. We are one of the largest global food and beverage companies, with a portfolio that is a diverse mix of iconic and emerging brands. As the guardians of these brands and</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Spaulding-Clinical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12411</link>
<guid>bcad7b839e99d2542617d19206b9540a</guid>
<pubDate>Sat, 16 Dec 2023 17:22:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Spaulding-Clinical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c1074611ea9546159f17978d26d4d67d6429334cf56463cbd1ec7a28f092ec2</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2007, Spaulding Clinical is a full-service, state-of-the-art paperless Phase I clinical pharmacology unit. Our facility, originally a hospital, features fully integrated bedside electronic data capture and sets the standard for patient care. We specialize in IND-enabling clinical pharmacology studies, cardiovascular safety, and clinical</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>DSG-US.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12413</link>
<guid>9d0c28b6d738ff820e4fa6cb7e659344</guid>
<pubDate>Sat, 16 Dec 2023 17:21:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DSG-US.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>896e74f54ef3059c9845fb28f35d4285cf072abc411149a542a8154ea1b908d8</i><br /><br />Threat actor <b>description</b>: <i>DSG Clinical Trial Software and Data Management Solutions</i><br />Target victim <b>website</b>: <i>https://www.DSG-US.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-York-School-of-Interior-Design</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12408</link>
<guid>460191c72f67e90150a093b4585e7eb4</guid>
<pubDate>Sat, 16 Dec 2023 14:30:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>New-York-School-of-Interior-Design</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>13ff9784fb555ff60c46a1210c5eeec6cc9fd47d4b395b2813be65a16e23de23</i><br /><br />Threat actor <b>description</b>: <i>The New York School of Interior Design enters its 2023-2026 strategic plan with renewed confidence in knowing that despite facing unprecedented changes in the last several years, it stands firm in...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>kohlwholesale.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12407</link>
<guid>2d661a763280f48803f3c9ba8ba0e00b</guid>
<pubDate>Sat, 16 Dec 2023 14:28:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>kohlwholesale.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e7773e1b7acf3ea12910306adedbd36b8c1279ccd2a9cd3de28e4f7740fc075</i><br /><br />Threat actor <b>description</b>: <i>We are a strong broadline distributing force in Illinois, Iowa and Missouri and are committed to fulfilling the foodservice needs of our customers. Kohl Wholesale is a proud distributor of many national and regional brands in our inventory of over 14,000 products. Because we view our relationships with our suppliers and customers as working partnerships, we provide unmatched support for your operation, every step of the way! Kohl Wholesale strives to exceed customer expectations by delivering valuable goods and services from our family to yours.SITE: www.kohlwholesale.com Address : 130 Jersey St. Quincy, IL 62301 USAALL DATA SIZE: 525gb 1. Accounting 2. AccidentInformation 3. Customer Service 4. Human Resources 5. DL, Medical cards and other personal documents and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Insidesource</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12405</link>
<guid>38298f3cad250b58051bda2c11721e56</guid>
<pubDate>Sat, 16 Dec 2023 05:28:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Insidesource</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9af61be7180ae3385e5a2b9a3214d8b4ef8b6e7023a1f68ecf20763367b5d78c</i><br /><br />Threat actor <b>description</b>: <i>Insidesource is San Francisco and Silicon Valley's leading provider of new and pre-owned office furniture. We hand-pick suppliers to create fresh, affordable, forward-thinking work environments that help spark innovation at companies around the globe. Nominated on the Top 100 Fastest Growing Private Companies insidesource.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>hebeler.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12403</link>
<guid>9352d6848d5f8868810d431499d34639</guid>
<pubDate>Fri, 15 Dec 2023 18:37:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hebeler.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4762c354cd3ed734f80b8d9a4e0e5135583828db7747e2e7a562e47179b1f51f</i><br /><br />Threat actor <b>description</b>: <i>Our talented team of electricians offers superior design, installation, and service for technology systems and their vital infrastructure, within the industrial, manufacturing, commercial, and institutional markets Howard Marten Process Systems Train...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fred-Hutchinson-Cancer-Research-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12394</link>
<guid>ffe10e9c76e6c72bf05ab38c20f8431a</guid>
<pubDate>Fri, 15 Dec 2023 13:02:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Fred-Hutchinson-Cancer-Research-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b7c92a66f41922ff00ceed4f7c06926f0e2131b05bddfe8577edbdcebf648215</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>https://www.fredhutch.org/</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>rpassoc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12391</link>
<guid>47c00b40b245c5389dfc3100ebb4b7a0</guid>
<pubDate>Fri, 15 Dec 2023 04:30:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>rpassoc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9100fb270646eb181d7edbab0b89e9b95bef8e48020dc56d7212a13fddfee070</i><br /><br />Threat actor <b>description</b>: <i>Robert F. Pagano & Associates provides complete accounting, tax, and advisory services to private and public companies.Phone 617-227-6511 ext. 15. Email: info@rpassoc.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>converzemedia.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12389</link>
<guid>945a1b4276b1524763d2acc19dc8c475</guid>
<pubDate>Fri, 15 Dec 2023 00:57:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>converzemedia.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>416b40b2b178c74c41a68e3d06711e80c4744132cf965ceb1b9914ce66c3deb7</i><br /><br />Threat actor <b>description</b>: <i>Converze Media Group is a company that specializes in the media planning and buying industry. The company specializing in results-oriented radio, television, cable, and print advertising. The company was founded in 2009 and is headquartered in Huntin...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>bemes.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12388</link>
<guid>37841383bc8c327de7912cf44790f3fd</guid>
<pubDate>Thu, 14 Dec 2023 22:30:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>bemes.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3fc3490ea87eeff2deecb510ebdeedc44f79b8e49071ab76bdae594267c3e792</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1977, Bemes, Inc. specializes in respiratory medical equipment and is headquartered in Fenton</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chaney-Couch-Callaway-Carter--Associates-Family-Dentistry</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12385</link>
<guid>c1714160652ca6408774473810765950</guid>
<pubDate>Thu, 14 Dec 2023 21:58:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Chaney-Couch-Callaway-Carter--Associates-Family-Dentistry</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>65ad9a89f91d458593db0985bf3a892fc189fefc931d21a1cbfbb03790a54a3d</i><br /><br />Threat actor <b>description</b>: <i>The premier cosmetic and general dentists in Tallahassee, FL.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Greenbox-Loans-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12387</link>
<guid>73eae46e2ba0a8705e9c75ca5720f3b5</guid>
<pubDate>Thu, 14 Dec 2023 21:57:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Greenbox-Loans-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2da40a937ebf4c5b9f489f860a61aaa9cfd14ae7b647056e9d56d35c8df80e3</i><br /><br />Threat actor <b>description</b>: <i>Greenbox Loans is a leader in the residential lending market, with over 70 years of combined experience. Greenbox Loans was founded based on the concept of 'Out of the Box' underwriting of residential loans.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hyman-Hayes-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12382</link>
<guid>9a1d8e7dcd9cc4fd0e9806ea87e3105f</guid>
<pubDate>Thu, 14 Dec 2023 17:34:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Hyman-Hayes-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a21646108aba199d18643c2eeaf83b2580bdedc81ec069cae69eedd1e48787ab</i><br /><br />Threat actor <b>description</b>: <i>Hyman Hayes Associates is a full service architecture firm specializing in healthcare, laboratory, and general building design. These guys do not need their data so the files of this company willbe available for downloading soon. There are many files with project information, a bit financials and contracts, other operational docs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>mcs360.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12380</link>
<guid>ab9a3f4c92c0f50204a1fe6dbf2e1d0a</guid>
<pubDate>Thu, 14 Dec 2023 12:40:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>mcs360.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c074f0ea66e35352bcaf336e3bd06d8b576197b1a3fec19b2e62a6756da56fb</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1986, the company established itself as one of the premier default and property preservation providers for the mortgage industry, building relationships with many of the largest financial institutions across the country. In 2022, MCS expan...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>grandrapidswomenshealth.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12379</link>
<guid>066f182b787111ed4cb65ed437f0855b</guid>
<pubDate>Thu, 14 Dec 2023 08:30:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>grandrapidswomenshealth.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a91be9d70f55172687c2ec893e9224044d04f2d70d2e6148fd54e2644b419c8b</i><br /><br />Threat actor <b>description</b>: <i>Providing comprehensive evaluation, knowledge, and treatment to our patients is our passion. As the largest independent OB/GYN practice in West Michigan, we offer a dynamic combination of physician expertise, advanced technology, and a skilled, compa...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>austen-it.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12378</link>
<guid>d325c14493d4d39e4591e65600ac5423</guid>
<pubDate>Thu, 14 Dec 2023 01:02:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>austen-it.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>233eeb2cb4dc274259ecd85de22787ab6ca3614bf46370b36957592a8c1419f7</i><br /><br />Threat actor <b>description</b>: <i>Austen Consultants provides 24/7 IT Support 365 days a year. Austen Consultants Headquarters4325 Ashburn Way, Keller, Texas, 76244, United StatesPhone Number (817) 989-6400</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gaido-fintzen.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12376</link>
<guid>ff7cc29289db44861ce4b3e5e56fe234</guid>
<pubDate>Wed, 13 Dec 2023 23:25:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Gaido-fintzen.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>895750d0271a6c47515fbb628b793d0301a38b7c282af2e3293f7f7c7c3506cb</i><br /><br />Threat actor <b>description</b>: <i>Country: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>cityofdefiance.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12375</link>
<guid>2609acbab44e192aa3764849a69b7dd8</guid>
<pubDate>Wed, 13 Dec 2023 23:23:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>knight</b> claims attack for <b>cityofdefiance.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f330ba4dabcfbf0b911bbbfd5de0af2a89492bd5e869029cbadcfce8fb4b4f86</i><br /><br />Threat actor <b>description</b>: <i>We have obtained more than 390Gb files on our internal network, which contain employee files,law enforcement video,mail and various confidential documents such as contracts.Defiance,OhioCity in and the county seat of Defiance County, Ohio, United States •&nbsp;Defiance is a city in and the county seat of Defiance County, Ohio, United States, about 55 miles southwest of Toledo and 47 miles northeast of Fort Wayne, Indiana, in Ohio's northwestern corner. The population was 17,066 at the 2020 censusCity of Defiance631 Perry Street&nbsp;Defiance, Ohio 43512Phone: 419-784-2101https://www.facebook.com/cityofdefiance/50MB sample files:https://gofile.io/d/5lGY2F</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>knight</category>
</item>
<item xmlns:dc='ns:1'>
<title>Heart-of-Texas-Region-MHMR</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12357</link>
<guid>a3680c6e501817ba33a063289a47bd63</guid>
<pubDate>Wed, 13 Dec 2023 23:13:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Heart-of-Texas-Region-MHMR</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>84bc023379a97eaacaf6cc244dbfda309281d0446730d45f3bfe1abc006afd3b</i><br /><br />Threat actor <b>description</b>: <i>Heart of Texas Region MHMR Center strives to deliver accessible and responsive support services to individuals and families coping with mental illness, intellec...</i><br />Target victim <b>website</b>: <i>www.hotrmhmr.org</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>PCTEL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12358</link>
<guid>06d86297d6e28d4637d60c86c2a2f5b6</guid>
<pubDate>Wed, 13 Dec 2023 23:13:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>PCTEL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e6b162beb8b8916fc7368cd692b4d039ebfbf973473b0d5e92c08e532631517</i><br /><br />Threat actor <b>description</b>: <i>PCTEL, Inc., together with its subsidiaries, delivers performance critical telecom solutions in the Asia Pacific, Europe, the Middle East, Africa, and the Ameri...</i><br />Target victim <b>website</b>: <i>www.pctel.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Agl-Welding-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12359</link>
<guid>d9dbc51dc534921589adf460c85cd824</guid>
<pubDate>Wed, 13 Dec 2023 23:13:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Agl-Welding-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60bc70e2f9bd19e904d2226bdcb36561b2349ed5aff3a738595c422c5f248c62</i><br /><br />Threat actor <b>description</b>: <i>Family owned and operated since 1920, AGL holds itself to a higher standard. For us, that means living our corporate values and giving back to the communities w...</i><br />Target victim <b>website</b>: <i>aglweldingsupply.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grayhill</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12360</link>
<guid>0ffb8460d08197d28aaf795711fc8f65</guid>
<pubDate>Wed, 13 Dec 2023 23:13:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Grayhill</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ddb99f3b342298f8da7e9fb14a9eb2767ec2756bc1cd6b9562495476c276125e</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1943, Grayhill is a company that manufactures electronic components including, optical and mechanical encoders, rotary switches, and joysticks. Grayh...</i><br />Target victim <b>website</b>: <i>grayhill.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>World-Emblem-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12364</link>
<guid>905669063311d8a17bd6958cd353eedd</guid>
<pubDate>Wed, 13 Dec 2023 23:13:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>World-Emblem-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f9fc10106968d02535c90773b022b6c356fba6ef43c17fda43c0e1ae402f1ac</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1993, World Emblem International is an apparel company that specializes in the manufacturing and design of emblems. They are based in Miami, Florida.</i><br />Target victim <b>website</b>: <i>worldemblem.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-GBUAHN</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12365</link>
<guid>a25e0e62a4702353f399953579424997</guid>
<pubDate>Wed, 13 Dec 2023 23:13:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>The-GBUAHN</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dcc1c9532c82b785e1677f466298d94e83693169baa2231f8ce910d78136fff1</i><br /><br />Threat actor <b>description</b>: <i>GBUAHN is the first health organization in WNY to utilize Tyto Care's cutting-edge solution for remote chronic care management The Greater Buffalo United Accoun...</i><br />Target victim <b>website</b>: <i>gbuahn.org</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lunacon-Construction-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12368</link>
<guid>15bc628d47f736bedf12b75d723abc1d</guid>
<pubDate>Wed, 13 Dec 2023 23:13:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Lunacon-Construction-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e4b9e47594e21fa0d5c6430ddae044642699ffbb621c6d0f218e30fc9b3ef821</i><br /><br />Threat actor <b>description</b>: <i>Lunacon Construction Group was founded in Miami, FL in 2007, based on the principles of integrity, diversity, and excellence in building. Over the past decade, ...</i><br />Target victim <b>website</b>: <i>lunaconcorp.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Seven-Seas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12370</link>
<guid>cceb1161867ab91def7fac026ead455c</guid>
<pubDate>Wed, 13 Dec 2023 23:12:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Seven-Seas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f36fbf26adbb967403f39ece89ed9aaaf9bf75be4245fcb14dda53192c6fc2b0</i><br /><br />Threat actor <b>description</b>: <i>Established in 1971, Seven Seas is a global maritime services group specializing in the provision of general ship supplies, stores, spare parts, and leading tec...</i><br />Target victim <b>website</b>: <i>sevenseasgroup.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Greater-Cincinnati-Behavioral-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12373</link>
<guid>1634908a456f1807f5c7375e92dddeb2</guid>
<pubDate>Wed, 13 Dec 2023 23:12:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Greater-Cincinnati-Behavioral-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>528ef6937beeb35c822f14b7e3eed73249f1bedc5629bf0ece5aed90b34644c3</i><br /><br />Threat actor <b>description</b>: <i>Greater Cincinnati Behavioral Health Services (GCB) is the most comprehensive mental health provider in Southwestern Ohio and Northern Kentucky serving people w...</i><br />Target victim <b>website</b>: <i>https://gcbhs.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>ccadm.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12350</link>
<guid>533a7de111ee3af214eee5e09e3fa1bc</guid>
<pubDate>Wed, 13 Dec 2023 22:02:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ccadm.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f94e8a5ab34e6f19f89fdf4a2243c84381ef466b17bfbe4f79d225366ba0ead9</i><br /><br />Threat actor <b>description</b>: <i>Thus the Associated Catholic Charities was born on March 8, 1931. These pioneering Catholic community representatives had the vision at the time to come together to plan the best strategy to take so that those in need would be able to get the help th...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tulane-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12353</link>
<guid>5568795189ad15dcd771866c97edfd37</guid>
<pubDate>Wed, 13 Dec 2023 17:42:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Tulane-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3284df348ec1325a5ad0058b6d694b7f2c5274997ec987f5e111b37d2db779e0</i><br /><br />Threat actor <b>description</b>: <i>PREVIEW</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>thirdstreetbrewhouse.com---carolinabeveragegroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12354</link>
<guid>a6bb4faacdff9dcdcb6f6e22bc51eac9</guid>
<pubDate>Wed, 13 Dec 2023 17:29:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>thirdstreetbrewhouse.com---carolinabeveragegroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4535ca33e41685791c6884a75276cb21dd924ee61f855611c1193054603eec06</i><br /><br />Threat actor <b>description</b>: <i>THIRD STREET BREWHOUSE / CAROLINA BEVERAGE GROUP LLC, with a legacy dating back to 1874, Carolina Beverage Group has become the go-to source for quality contract beverage production.   We operate three state-of-the-art facilities in the Southeast, Southwest and Midwest. This uniquely positions our company to better serve customers throughout the United States.THIRD STREET BREWHOUSE TRACES ITS HISTORY ALL THE WAY BACK TO 1874, WHEN MICHAEL SARGL, A GERMAN IMMIGRANT, STARTED BREWING BEER NEAR A COLD UNDERGROUND SPRING THAT GAVE HIS NEWFOUND BREWERY AND SURROUNDING TOWN ITS NAME.SITE: www.thirdstreetbrewhouse.com SITE: www.carolinabeveragegroup.com Address  219 Red River Ave Cold Spring, MN 56320 UNITED STATES 320.685.3690110 Barley Park Lane Mooresville, NC 28115 UNITED STATES 704.799.233713300 Park Vista Blvd Fort Worth, TX 76177 UNITED STATES 682.502.5048FULL DATA SIZE: 316gb 1. Accounting 2. I-9 forms 3. 401K forms 4. ConfidentialityNETWORK: GLUEKGLUEK GLUEK.COM-------------------------DOMAIN ADMINS------------------------- acadmin         Administrator      apt_svc bdr           BHuffAdmin        CBG.Admin cisco_ldap        cpenickadmin       CSB_SAPApp_srvc CSB_SAPdb_srvc      CSB_SAPScan_srvc     CSB_Trust_Admin epluseng         gorpongadmin       jondadmin nable_svc        rchouffani        rjacksonadmin Sonicwall        svc_acbackup       svc_loftware svcat          svcbe          svcranger svcsql          svcvc          svcvr Trevor.BlankenshipGLUEK.COM\rchouffani Lucas0207 GLUEK.COM\svc_loftware Beer320.-------------------------DC------------------------- csbdc3.GLUEK.COM 192.168.20.130 Windows Server 2012 R2 Standard csbdc4.GLUEK.COM 192.168.20.131 Windows Server 2012 R2 Standard CSB1378-AD03.GLUEK.COM 172.20.47.112 Windows Server 2012 R2 Datacenter-------------------------SERVERS------------------------- CSB-SRV-UTIL.GLUEK.COM 10.201.0.5 Windows Server 2022 Datacenter CSB-SRV-DEV.GLUEK.COM 10.201.0.6 Windows Server 2022 Datacenter CSB-SQL-DEV.GLUEK.COM 10.201.0.7 Windows Server 2022 Datacenter Azure Edition CSB-BI.GLUEK.COM 10.201.0.9 Windows Server 2019 Datacenter CSB-SAP-SRVT.GLUEK.COM 10.201.0.10 Windows Server 2019 Datacenter CSB-SAP-SQLT.GLUEK.COM 10.201.0.8 Windows Server 2019 Datacenter CSB-SAP-NPS.GLUEK.COM 10.201.0.12 Windows Server 2019 Datacenter CSB-SAP-PRT.GLUEK.COM 10.201.0.14 Windows Server 2019 Datacenter CSB-RDSLabel.GLUEK.COM  Windows Server 2019 Datacenter CSB-PRT-SERVER.GLUEK.COM 10.201.0.13 Windows Server 2019 Datacenter csbrds02.GLUEK.COM  Windows Server 2016 Standard CSB-SRV-IGNTS.GLUEK.COM  Windows Server 2016 Standard CSBMGMT.GLUEK.COM 192.168.20.90 Windows Server 2016 Standard csbrds01.GLUEK.COM  Windows Server 2016 Standard csbapt.GLUEK.COM  Windows Server 2012 R2 Standard csbapt-sql.GLUEK.COM  Windows Server 2012 R2 Standard csbaptts1.GLUEK.COM  Windows Server 2012 R2 Standard CSBFS2.GLUEK.COM 192.168.20.12 Windows Server 2012 R2 Standard CSBTS5.GLUEK.COM  Windows Server 2012 R2 Standard csbsp.GLUEK.COM  Windows Server 2012 R2 Standard csbignition.GLUEK.COM  Windows Server 2012 R2 Standard csbmp2-12.GLUEK.COM  Windows Server 2012 R2 Standard BREWHOUSE-BDR.GLUEK.COM  Windows Server 2012 R2 Standard csbmsds.GLUEK.COM  Windows Server 2012 R2 Standard CSBMP2TS2.GLUEK.com  Windows Server 2008 R2 Standard CSBUTIL.GLUEK.com  Windows Server 2008 R2 Standard CSBVC1.GLUEK.com  Windows Server 2008 R2 Standard CSBSQL64.GLUEK.com  Windows Server 2008 R2 Standard csbpp1.GLUEK.COM  Windows Server® 2008 Standard csbpp2.GLUEK.COM  Windows Server® 2008 Standard csbtc.GLUEK.COM  Windows Server® 2008 Standard csbtsacct.GLUEK.COM  Windows Server® 2008 Standard csbmp2.GLUEK.COM  Windows Server 2003 csbsql.GLUEK.COM  Windows Server 2003GLUEK GLUEK.COM-------------------------DOMAIN ADMINS------------------------- RJACKSONADMIN JONDADMIN GORPONGADMIN BHUFFADMIN RILEYADMIN CPENICKADMIN BTS.ADMINISTRATOR SAPDB_SRVC SHANEADMIN CBGSQL CAROL.ADMIN VANTAGE.ADMIN CONCERTO CBG_TRUST_ADMIN CBG_SERVICES EPLUSADMIN DANIELADMIN NABLE_SVC REDAADMIN VENDOR.ADMIN ADSYNC BIZTECHDATA APPASSURE SAPAPP_SRVC VEEAM-BACKUPS SAPSCAN_SRVC CA-ACCOUNT DIR.SYNC SAPSRVADMIN SONICWALLSSO VMWARE SONICWALLLDAP2 BACKUP SAPADMIN BESADMIN EXCHANGE ADMINISTRATORcbb2.local\bts.administrator Gr@ph1t3 cbb2.local\CBGSQL 110Barley cbb2.local\Vendor.Admin 346Plaza-------------------------DC------------------------- CBG-DC-NC01.cbb2.local 192.168.0.8 Windows Server 2022 Standard CBG-DC-TX01.cbb2.local CBG-DC-AZ01.cbb2.local 192.168.122.62 Windows Server 2022 Datacenter Azure Edition-------------------------SERVERS------------------------- CBG-PRT-SERVER.cbb2.local 192.168.122.53 Windows Server 2022 Datacenter CBG-SAP-FP2222.cbb2.local 192.168.122.48 Windows Server 2022 Datacenter CBG-EDI-SRV.cbb2.local 192.168.122.54 Windows Server 2022 Datacenter CBGDC03.cbb2.local  Windows Server 2022 Datacenter Azure Edition CBG-ADSync.cbb2.local 192.168.122.58 Windows Server 2022 Datacenter Azure Edition TRANSMAN-AZ.cbb2.local  Windows Server 2022 Datacenter Azure Edition scanportal3.cbb2.local  Windows Server 2022 Datacenter Azure Edition CBG-SRV-WEB.cbb2.local  Windows Server 2022 Datacenter Azure Edition TESTPGPO.cbb2.local  Windows Server 2022 Datacenter Azure Edition RDSCBGLABEL.cbb2.local 192.168.122.25 Windows Server 2022 Datacenter Azure Edition CBGDC07.cbb2.local  Windows Server 2022 Datacenter Azure Edition CBGSRV1.cbb2.local  Windows Server 2022 Standard CBG-HA-DHCP.cbb2.local 192.168.0.54 Windows Server 2022 Standard TX-DHCP-HA.cbb2.local  Windows Server 2022 Standard CBG-SAP-DCD.cbb2.local 192.168.122.35 Windows Server 2019 Datacenter CBG-SAP-FP2108.cbb2.local  Windows Server 2019 Datacenter Transman-Azure.cbb2.local 192.168.122.60 Windows Server 2019 Datacenter CBG-SAP-SRVSQLT.cbb2.local 192.168.122.49 Windows Server 2019 Datacenter CBG-SAP-FP2111.cbb2.local  Windows Server 2019 Datacenter CBG-SAP-TRN.cbb2.local 192.168.122.17 Windows Server 2019 Datacenter CBG-SAP-FP2111CLONE.cbb2.local 192.168.122.31 Windows Server 2019 Datacenter CBG-SAP-PRT.cbb2.local 192.168.122.50 Windows Server 2019 Datacenter CBG-SAP-BI.cbb2.local  Windows Server 2019 Datacenter CBG-SAP-CRTL.cbb2.local 192.168.122.33 Windows Server 2019 Datacenter RedZoneTX.cbb2.local 192.168.122.24 Windows Server 2019 Datacenter CBGSAP10.cbb2.local  Windows Server 2019 Datacenter CBG-SAP-SRVP.cbb2.local 192.168.122.30 Windows Server 2019 Datacenter CBG-SAP-SQL-P.cbb2.local  Windows Server 2019 Datacenter TQBscan.cbb2.local  Windows Server 2019 Datacenter CBG-SAP-SRVD.cbb2.local  Windows Server 2019 Datacenter CBG-SAP-SQL-D.cbb2.local  Windows Server 2019 Datacenter CBG-SAP-SQL-T.cbb2.local  Windows Server 2019 Datacenter SCANPORTAL.cbb2.local 192.168.122.38 Windows Server 2019 Datacenter CBG-BI.cbb2.local 192.168.122.37 Windows Server 2019 Datacenter CBGAppDev.cbb2.local  Windows Server 2019 Datacenter CBG-SAP-SRV-T.cbb2.local  Windows Server 2019 Datacenter CBG-SAP-SQL-P3.cbb2.local  Windows Server 2019 Datacenter CBG-Relay.cbb2.local  Windows Server 2019 Standard 2018CBGSAP.cbb2.local  Windows Server 2016 Datacenter CBG-PRT-SRV.cbb2.local 192.168.0.129 Windows Server 2016 Datacenter CBG-SAP-SQL16.cbb2.local  Windows Server 2016 Datacenter CBGTX-SeamView.cbb2.local  Windows Server 2016 Datacenter CBGSAPDEV.cbb2.local 192.168.0.22 Windows Server 2016 Datacenter CBGScan8.cbb2.local 192.168.122.38 Windows Server 2016 Datacenter CBGSAPTest.cbb2.local 192.168.122.14 Windows Server 2016 Datacenter BI360Report.cbb2.local  Windows Server 2016 Datacenter RedZone.cbb2.local 192.168.122.19 Windows Server 2016 Datacenter CBGETQAPP.cbb2.local 192.168.122.21 Windows Server 2016 Datacenter CBGLabelPortal.cbb2.local 192.168.122.7 Windows Server 2016 Datacenter BI360WebApp.cbb2.local  Windows Server 2016 Datacenter ScanPrintServer.cbb2.local 192.168.122.8 Windows Server 2016 Datacenter CBG-Radius.cbb2.local 192.168.0.16 Windows Server 2016 Standard CBG-File.cbb2.local 192.168.0.28 Windows Server 2016 Standard NCCIP1.cbb2.local 192.168.100.94 Windows Server 2016 Standard NCCIP2.cbb2.local 192.168.100.95 Windows Server 2016 Standard Office365-Link.cbb2.local 192.168.0.112 Windows Server 2016 Standard CBG-DA.cbb2.local  Windows Server 2012 Datacenter TMWFBS.cbb2.local  Windows Server 2012 Datacenter CBG-EXCH-HYBRID.cbb2.local  Windows Server 2012 Datacenter SQL.cbb2.local 192.168.0.83 Windows Server 2012 Datacenter 2008ActiveDirectory.cbb2.local  Windows Server 2012 Datacenter CBG-VSRV-SP13.cbb2.local  Windows Server 2012 Datacenter SAPRDS2.cbb2.local 192.168.122.13 Windows Server 2012 R2 Datacenter CBGSQL16.cbb2.local 192.168.122.11 Windows Server 2012 R2 Datacenter azuredc.cbb2.local  Windows Server 2012 R2 Datacenter CBGCrystalRpt.cbb2.local  Windows Server 2012 R2 Datacenter CBGVeeam.cbb2.local  Windows Server 2012 R2 Datacenter CBGSAP.cbb2.local  Windows Server 2012 R2 Datacenter SAPRDS3.cbb2.local 192.168.122.56 Windows Server 2012 R2 Datacenter SAPRDS1.cbb2.local 192.168.122.12 Windows Server 2012 R2 Datacenter CBGScan.cbb2.local  Windows Server 2012 R2 Datacenter CBGScanSSSR.cbb2.local  Windows Server 2012 R2 Datacenter CBGScanDC.cbb2.local  Windows Server 2012 R2 Datacenter CBGSAP2.cbb2.local  Windows Server 2012 R2 Datacenter CBGTX-DC02.cbb2.local  Windows Server 2012 Standard CBGTX-PRINT.cbb2.local  Windows Server 2012 Standard printserver2.cbb2.local 192.168.0.57 Windows Server 2008 R2 Datacenter TRANSMAN.cbb2.local  Windows Server 2008 R2 Standard CBG-SRV-VC.cbb2.local  Windows Server 2008 R2 Standard TQB-BR1-FTH-SRV.cbb2.local  Windows Server 2008 R2 Standard TQB-BR1-FTV-SRV.cbb2.local  Windows Server 2008 R2 StandardCSB1378 CSB1378.LOCAL-------------------------DOMAIN ADMINS------------------------- AAkan          aaliokhin        acadmin        ACADMIN2         Administrator      AKozlov aKuthala         Andy.Bertha       arazuev        AStatsenko        AXIntUsr         AXSupport basu           cbb2admin        CChevalier        cdrost          CLOUD_ADMIN       CRobbins DPerepelov        dschmidt         fkramer        JBurkhart        jHurylovich       jkatz jsogge          kkrieger         kschmitz        mLarkin         mswift          mthostenson nadmin          nsreelaya        NStein        okhoroshylov       OMaliutenko       oseleznov pschleich        RChouffani        svc_snow_CSB1378        tdownie         tejby          tmercurio tsaeb          vlitovchenkoCSB1378\arazuev Mollo1378 CSB1378\cbb2admin C0nc3rt0!-------------------------DC------------------------- CSB1378-AD01.CSB1378.LOCAL 172.20.47.103 Windows Server 2012 R2 Datacenter CSB1378-AD02.CSB1378.LOCAL 172.20.47.104 Windows Server 2012 R2 Datacenter-------------------------SERVERS------------------------- CSB1378-FS01.CSB1378.LOCAL 172.20.47.107 Windows Server 2019 Datacenter CSB1378-AOS03P.CSB1378.LOCAL 172.20.5.18 Windows Server 2012 R2 Datacenter CSB1378-XEN04P.CSB1378.LOCAL 172.20.5.10 Windows Server 2012 R2 Datacenter CSB1378-AOS01P.CSB1378.LOCAL 172.20.5.16 Windows Server 2012 R2 Datacenter CSB1378-AOS02P.CSB1378.LOCAL 172.20.5.17 Windows Server 2012 R2 Datacenter CSB1378-XEN02P.CSB1378.LOCAL 172.20.5.8 Windows Server 2012 R2 Datacenter CSB1378-XEN01P.CSB1378.LOCAL 172.20.5.7 Windows Server 2012 R2 Datacenter CSB1378-XEN01.CSB1378.LOCAL 172.20.47.111 Windows Server 2012 R2 Datacenter CSB1378-AOS04P.CSB1378.LOCAL 172.20.5.19 Windows Server 2012 R2 Datacenter CSB1378-XEN03P.CSB1378.LOCAL 172.20.5.9 Windows Server 2012 R2 Datacenter CSB1378-AOS01.CSB1378.LOCAL 172.20.47.105 Windows Server 2012 R2 Datacenter CSB1378-AOS02.CSB1378.LOCAL 172.20.47.106 Windows Server 2012 R2 Datacenter CSB1378-SQL01.CSB1378.LOCAL 172.20.47.109 Windows Server 2012 R2 Datacenter CSB1378-CDC01.CSB1378.LOCAL 172.20.47.110 Windows Server 2012 R2 Datacenter CSB1378-AOS03.CSB1378.LOCAL  Windows Server 2012 R2 Datacenter CSB1378-SSRS01P.CSB1378.LOCAL 172.20.5.14 Windows Server 2012 R2 Datacenter CSB1378-APP01P.CSB1378.LOCAL 172.20.5.13 Windows Server 2012 R2 Datacenter CSB1378-AOS04.CSB1378.LOCAL  Windows Server 2012 R2 Datacenter CSB1378-SQL01P.CSB1378.LOCAL 172.20.5.15 Windows Server 2012 R2 Datacenter</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dameron-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12356</link>
<guid>7cec85c75537840dad40251576e5b757</guid>
<pubDate>Wed, 13 Dec 2023 16:13:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Dameron-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e1cf09e913a4e832af924fc08e1a59de3263bd949238b7ab139f177f68236bc</i><br /><br />Threat actor <b>description</b>: <i>Dameron Hospital provides acute and tertiary level care. This hospital provides cardio, emergency, pharmacy, physical therapy, and a variety of other individual and family health care services. Dameron is headquartered in Stockton, California.</i><br />Target victim <b>website</b>: <i>https://www.dameronhospital.org/</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>agy.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12347</link>
<guid>8a13dab3f5ec9e22d0d1495c8c85e436</guid>
<pubDate>Wed, 13 Dec 2023 13:23:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>agy.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9d1f451bdfd6244aa904064f4132d6013c186c65de4c29f6f41b57afb2407a07</i><br /><br />Threat actor <b>description</b>: <i>AGY is a world leader in high performance materials used in a range of markets including Electronics, Thermoplastics, Industrial, Aerospace, Recreation / Consumer and Defense with a focus on making our customers’ products lighter, faster and stronger. High performance materials in the form of glass fiber yarns and reinforcements provide our customers with six vital enhanced properties:  strength, impact resistance, stiffness, temperature resistance, fatigue resistance and radar transparency. With a product portfolio developed for extreme performance utilizing a set of unique manufacturing platforms AGY provides tailored materials solutions to end-use customers for the most demanding applications worldwide.SITE: www.agy.com Address : 2556 Wagener Road Aiken, South Carolina, USA 29801ALL DATA SIZE: 403gb 1. Human Resources 2. Finance 3. Engineering 4. Science & Technology 5. Departmental data 6. Home users data files 7. Drawings 8. Incident reports and etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dillard-Door--Security</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12345</link>
<guid>827ccb0eea8a706c4c34a16891f84e7b</guid>
<pubDate>Wed, 13 Dec 2023 11:33:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>Dillard-Door--Security</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cef5a530ff2a3b8f343313660978fc5413d8a7abedcea1e9bdbe1aa4fed054ee</i><br /><br />Threat actor <b>description</b>: <i>First established as a door company in the 1940s, Dillard Door has grown into one of the most successful security system providers in Tennessee today. In our 60-plus years of experience, we have earned a reputation for integrity, reliability and ingenuity. Simply stated, we do what we promise – and do it right. Rather than selling “quick-fix” products, we help companies develop complete security solutions, installing everything from entrance gates to security cameras to complete Access Control Systems – anything you need to protect your assets and ensure total control of your facility.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>VAC-U-MAX</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12339</link>
<guid>ab7d19e82cc921e91e92dd470f68d47f</guid>
<pubDate>Wed, 13 Dec 2023 10:07:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>VAC-U-MAX</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1dd695b9bbdd962249fa6d242ef066aa906f55e450157ba75cac91215404db4d</i><br /><br />Threat actor <b>description</b>: <i>Since 1954, VAC-U-MAX has designed and manufactured pneumatic conveying components and automated bulk material handling systems for conveying, weighing, and batching of powders and granular bulk materials. VAC-U-MAX has defined the leading edge of technology for bulk material handling, designing, manufacturing, selling and supporting VAC-U-MAX systems worldwide. VAC-U-MAX has been the pioneer in vacuum pneumatic conveying, developing the first air-powered venturi unit, advancing technologies for direct-loading of vacuum tolerant process equipment, and the first to design vertical-wall "Tube Hopper" material receivers https://www.vac-u-max.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hawkins-Sales</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12340</link>
<guid>8e3308c853e47411c761429193511819</guid>
<pubDate>Wed, 13 Dec 2023 10:07:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Hawkins-Sales</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6fa85ccc7e54e83a7f554aa127b7f03d0a43cd19dd049a18e0ef010c6dc8575c</i><br /><br />Threat actor <b>description</b>: <i>Hawkins Sales is a leading manufacturer‘s representative serving the electrical industry. We represent the top manufacturers from around the country and strive to offer the best service, prices and products for our customers. Hawkins Sales is a company built on a solid foundation of principles grounded by integrity and hard work. Our company is dedicated to providing the most trusted and motivated sales team for our industry partners. We continually research and develop new business opportunities and highlight the newest available products to current customers hawkinssales.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>King-Aerospace-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12334</link>
<guid>120705de7e61c5b322ad798b8ef225a7</guid>
<pubDate>Wed, 13 Dec 2023 01:08:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>King-Aerospace-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3eb74cca24d80c0984a9342eba1856603d33ab293cfdebc28595ae3cbd93b73</i><br /><br />Threat actor <b>description</b>: <i>King Aerospace, Inc. (KAI) is a global operation that serves the U.S. military and government to deliver responsive aircraft maintenance and logistics support in some of the world's most hostile...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>GlobalSpec</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12333</link>
<guid>a8ae104615cb4e966ddb435f3e575a02</guid>
<pubDate>Tue, 12 Dec 2023 23:53:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>GlobalSpec</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>40336063a454ef3fe749b7398c5bd454c5ebe73b6c85e68565b97de007da43f7</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.globalspec.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>woodruffenterprises.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12330</link>
<guid>cc3d7fc970bf568a7724296d431785f0</guid>
<pubDate>Tue, 12 Dec 2023 17:42:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>woodruffenterprises.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>00c53b245208c4b52b359560f6dfcd3a3dc668d73b30974e427af2051f0ca970</i><br /><br />Threat actor <b>description</b>: <i>Woodruff Enterprises Inc. is a rapidly growing company with roots in farming and agriculture. It was by the request of our loyal customers that we began hauling livestock with a pickup truck and a gooseneck trailer...</i><br />Target victim <b>website</b>: <i>woodruffenterprises.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>shareharris.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12331</link>
<guid>e4c4e24edd254bb81fc6e3fe7a1a5dd4</guid>
<pubDate>Tue, 12 Dec 2023 17:42:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>shareharris.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c415e7403df63bdbb1ab893f4af88894e548946c013e72c0ffc8bff4d72aa2c3</i><br /><br />Threat actor <b>description</b>: <i>Share & Harris LLC is a company that operates in the Accounting industry. It employs 11-20 people and has $1M-$5M of revenue. The company is headquartered in East Brunswick, New Jersey, 08816, United States</i><br />Target victim <b>website</b>: <i>shareharris.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>SmartWave-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12329</link>
<guid>3a098b02e2d67a733c661fa9bfbe89ec</guid>
<pubDate>Tue, 12 Dec 2023 17:28:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>SmartWave-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0adbef50a299484d15d4ab11251229c2ede96459d1383f89f365c8184110bb47</i><br /><br />Threat actor <b>description</b>: <i>SmartWave Technologies is a vertically integrated team of engineers, scientists and technicians that provide design-through-manufacturing capability. These guys don't care about their 65 GB of data containing confidential personal information, lots of HR docs,even medical information. Clients, projects and accounting filesare represented as well. We'll provide access to the files soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Teaching-Company-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12327</link>
<guid>bf15e9bbff22c7719020f9df4badc20a</guid>
<pubDate>Tue, 12 Dec 2023 14:24:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-Teaching-Company-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d1dc4b1efad7d833b42970ac1acfd621a82149a058b57e4c9d0c1e082faf5e2c</i><br /><br />Threat actor <b>description</b>: <i>The Teaching Company, doing business as The Great Courses, provides courses on digital versatile disc, audio compact disc, and other formats. 60Gb of data will be uploaded. Clients information, lots of accounting and finance data, courses info and even a holiday video! We will update soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Memorial-Sloan-Kettering-Cancer-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12326</link>
<guid>0b896b55f96acbc46c6a443acd5da879</guid>
<pubDate>Tue, 12 Dec 2023 11:40:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Memorial-Sloan-Kettering-Cancer-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>515a26cc5634a69c7ca39d3ba8fe086570eac5980c116ea8589a0ff41afd3588</i><br /><br />Threat actor <b>description</b>: <i>PREVIEW</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Insomniac-Games</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12320</link>
<guid>0c620bcfc2a979fe9f22acbe0019f276</guid>
<pubDate>Tue, 12 Dec 2023 02:41:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Insomniac-Games</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea2ef9a6a702a7fcd260311057dbae0a58e91f9b0ff1a5045e90c06702f5d725</i><br /><br />Threat actor <b>description</b>: <i>Insomniac Games Insomniac Games, Inc. is an American video game developer based in Burbank, California.</i><br />Target victim <b>website</b>: <i>http://rhysidafohrhyy2aszi7bm32tnjat5xri65fopcxkdfxhi4tidsg7cad.onion?company=69</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>phillipsglobal.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12319</link>
<guid>ec42787cefadf6378e1fd7917aa05b5f</guid>
<pubDate>Tue, 12 Dec 2023 01:00:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>phillipsglobal.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>deae0303e3999908ab8083f4b4e78349de4cdd0aef188949ff16b64c53082dc5</i><br /><br />Threat actor <b>description</b>: <i>It’s in our DNA to keep our customers up and running – regardless of their industry segment. Having repaired equipment for many of the world’s largest operations and greatest manufacturers, we have grown to know every bolt, seam, angle and weld known...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>greenbriersportingclub.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12318</link>
<guid>bdbd5ebfde4934142c8a88e7a3796cd5</guid>
<pubDate>Tue, 12 Dec 2023 00:56:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>greenbriersportingclub.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3589d3e26f9560b7c7b03d475a5a0705e06680b7a3ac0e1c5e5943200f968bab</i><br /><br />Threat actor <b>description</b>: <i>The Greenbrier Sporting Club is a private, equity club organized for the purpose of offering memberships to those that own real estate at The Greenbrier. LocationNestled within the grounds of The Greenbrier, The Greenbrier Sporting Club is locate...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bayer-Heritage-Federal-Credit-Union</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12313</link>
<guid>f7e0ef389ac6133c88aedbd66b44a4e1</guid>
<pubDate>Mon, 11 Dec 2023 17:39:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lorenz</b> claims attack for <b>Bayer-Heritage-Federal-Credit-Union</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>efaead176708386e4536a6d760f3ca25792ceab55eb198cadcb96ecc3b71b9a5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lorenz</category>
</item>
<item xmlns:dc='ns:1'>
<title>MSD-Information-technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12311</link>
<guid>35e2dcdbea1950a7a290dd0c282da0a0</guid>
<pubDate>Mon, 11 Dec 2023 17:27:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>MSD-Information-technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7353830515ce07bc8f02e96a9034369d7c4a0f09b30a4e005bbf761e46432140</i><br /><br />Threat actor <b>description</b>: <i>MSD is a proven Managed I.T. Solutions provider & Specialized Software Provider. 47 of data will be available here soon. Some of personal information, finance, clients docs are inside.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hinsdale-School-District-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12310</link>
<guid>0f19d4d93ea331b17b6156e8fcdc6e3c</guid>
<pubDate>Mon, 11 Dec 2023 16:11:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Hinsdale-School-District-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ddc39e8e6f0a4cf323d0629a5fda40b17d8cbfc311ba4f35cca19166eed8470d</i><br /><br />Threat actor <b>description</b>: <i>Hinsdale School District is an educational institution. It offers primary & high school education, job openings, professional development, financial information, and assessment. The school district was established in 1879 and is headquartered in Hinsdal,New Hampshire, 03451, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Independent-Recovery-Resources-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12308</link>
<guid>c305a250710e95cf6bad18c18a1c02f4</guid>
<pubDate>Mon, 11 Dec 2023 14:27:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Independent-Recovery-Resources-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf8598433df97945e9b5bd54778687cd001be4b3553f8f501c777f98123c9669</i><br /><br />Threat actor <b>description</b>: <i>Company is a full service 3rd party debt collection agency dedicated to supporting Government Agencies, Corporate Entities, Educational Institutions and Healthcare Providers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Glendale-Unified-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12305</link>
<guid>42b61e2c4e0d4b1ccce37d9e09410439</guid>
<pubDate>Mon, 11 Dec 2023 04:33:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>The-Glendale-Unified-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>41e2bd109a6cc70328785d8f28540159e9172448532feb030b7bdad5aada71f8</i><br /><br />Threat actor <b>description</b>: <i>The Glendale Unified School District is a school district based in Glendale, California, United States. It consists of 20 elementary schools, 4 middle schools, 4 high schools and 3 facilities for homeschoolers and special-needs students.It currently has about 20,000 students</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Graphic-Solutions-Group-Inc-US</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12297</link>
<guid>35fcfa9e4c022b77e94c0c09a10690c8</guid>
<pubDate>Sat, 09 Dec 2023 06:35:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>daixin</b> claims attack for <b>Graphic-Solutions-Group-Inc-US</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8773a8114d1df40e86ba33370ecfcae7ce41ee210f2530873deb35b7de46d4ec</i><br /><br />Threat actor <b>description</b>: <i>GSG digital printing technologies with a half a century of knowledge and experience in traditional sign, screen printing, embroidery and textile decorating.</i><br />Target victim <b>website</b>: <i> https://gogsg.com</i>]]></description>
<category>daixin</category>
</item>
<item xmlns:dc='ns:1'>
<title>OpTransRights---2</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12296</link>
<guid>0498b76a320aee7c36942926866cfc94</guid>
<pubDate>Sat, 09 Dec 2023 01:15:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>siegedsec</b> claims attack for <b>OpTransRights---2</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>74005e954b340acb9efdb9a677ddc5c0345dfd7c20ba5c2b6bac1e4b350a3813</i><br /><br />Threat actor <b>description</b>: <i>healthcare</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>siegedsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Portland-Government--United-states-government</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12292</link>
<guid>2fdf132bc31b24922316fa3a6ec7c196</guid>
<pubDate>Sat, 09 Dec 2023 01:13:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>siegedsec</b> claims attack for <b>Portland-Government--United-states-government</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3bbd42df7797fbe158549cd865380316c4ebede1761230fb332201eeaec737a9</i><br /><br />Threat actor <b>description</b>: <i>governmental</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>siegedsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Staples</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12293</link>
<guid>e5be35e61264ba3d5c63534a6a3656d7</guid>
<pubDate>Sat, 09 Dec 2023 01:12:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>siegedsec</b> claims attack for <b>Staples</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29e34b0d75ce20aa7a26c07cb50844c79c124a98d75e8f5cf4e3d861e5190698</i><br /><br />Threat actor <b>description</b>: <i>retail</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>siegedsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>HMW---Press-Release</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12287</link>
<guid>91fd7b300a09c5d358306361b2ea17b3</guid>
<pubDate>Fri, 08 Dec 2023 22:30:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>HMW---Press-Release</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1bb8c0754106fbfcd964c0d5f18960e2d29940170cc47a903f6a2d0b609b778d</i><br /><br />Threat actor <b>description</b>: <i>#Robert_stop_fap_on_kids
HMW Special Utility District is a Texas water district and special utility district under Chapters 49 and 65, Texas Water Code. Its purpose is to provide water utility services as permitted by applicable law.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>midlandindustries.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12283</link>
<guid>9455664174358cac2500dec3f80dc833</guid>
<pubDate>Fri, 08 Dec 2023 09:59:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>midlandindustries.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbb6320b8dcc7d6f411f9586e09dd73a57cea96397062560aa85aefa30ad9bbf</i><br /><br />Threat actor <b>description</b>: <i>With our history of outstanding customer service and innovation, Midland Industries is the perfect fit of customer-driven solutions, smart technology, and deep product selection - built on strong family values and traditions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Idaho-National-Laboratory</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12278</link>
<guid>b58144d7e90b5a43edcce1ca9e642882</guid>
<pubDate>Fri, 08 Dec 2023 08:47:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>siegedsec</b> claims attack for <b>Idaho-National-Laboratory</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>705575dbb0f82d8f012e79552d22decc0ab5047069681f227fa008d964569706</i><br /><br />Threat actor <b>description</b>: <i>nuclear research, nuclear power, power plant</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>siegedsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cellcom</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12280</link>
<guid>aae094199bf30b0b1a58e8ec1bbad5ec</guid>
<pubDate>Fri, 08 Dec 2023 08:46:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>siegedsec</b> claims attack for <b>Cellcom</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e242ae7e00b68c18d0f4530b8f4f63f4bbaa0c64677171184831827a54cc5c3</i><br /><br />Threat actor <b>description</b>: <i>telecommunications</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>siegedsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Operation-Jane</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12271</link>
<guid>dea92ba3dcf99dec356e0520d4647a88</guid>
<pubDate>Fri, 08 Dec 2023 08:44:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>siegedsec</b> claims attack for <b>Operation-Jane</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cafa2f1816b603347813c73623ac3e90523d2caf24f6c7196220f1ce591fbbbb</i><br /><br />Threat actor <b>description</b>: <i>industrial control systems, government</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>siegedsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Atlassian</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12272</link>
<guid>f868fbc4057d1296214afd7cc3670450</guid>
<pubDate>Fri, 08 Dec 2023 08:44:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>siegedsec</b> claims attack for <b>Atlassian</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a4d46c504e8269762ff6f349722edc6eb228cce4a23fc5e543b9a3e89e83e93</i><br /><br />Threat actor <b>description</b>: <i>software developers, project managers, it service management</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>siegedsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>SMRT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12263</link>
<guid>50d758cc9ab8bb51177b071d370caac2</guid>
<pubDate>Thu, 07 Dec 2023 22:13:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>SMRT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7653c8e57e2e66844fdc1c665ef0b58fd13ae3cc7bf4266eb2631e2171fffef8</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.smrtinc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Intrepid-Sea-Air--Space-Museum</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12264</link>
<guid>562a18872fb4620235fcb21a097aa0a7</guid>
<pubDate>Thu, 07 Dec 2023 22:12:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Intrepid-Sea-Air--Space-Museum</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0902cebc7f7bfb4a660860ae64866814f15ff09e34431631d8a4d8790d15fcd1</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.intrepidmuseum.org</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Postworks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12265</link>
<guid>2b3e69a7084c76e56be15598fc72ded6</guid>
<pubDate>Thu, 07 Dec 2023 22:12:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Postworks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97a43255edffd899f79c7c31e2d70a2c9e57e7f6f24d68a012b4b22f698aac1a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.postworks.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>PLS-Logistics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12266</link>
<guid>4f01f3fbc8bcf75f3290c2202361b86d</guid>
<pubDate>Thu, 07 Dec 2023 22:11:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>PLS-Logistics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e3ce76caf8f8ea6dbf907b68af5df8eadb08261019979af47221cdc950382a2e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.plslogistics.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ridge-Vineyards</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12267</link>
<guid>1d21c3a84d2fdfaab4c97764f8bb27d7</guid>
<pubDate>Thu, 07 Dec 2023 22:11:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Ridge-Vineyards</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>550eb8ec627f8677dff17779244d992a7f42e88ef9534e6ce8c964892940d595</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ridgewine.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>AJO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12268</link>
<guid>ef8f157ca5b0983df9112aaca855ec2b</guid>
<pubDate>Thu, 07 Dec 2023 22:11:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>AJO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>255d371a150056d935f1146921a9a414546d1f7c1173074eabeb77dc7fbe27eb</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ajopartners.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>PHIBRO-GMBH</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12269</link>
<guid>d9fef29f176742d075a466c19efcb9da</guid>
<pubDate>Thu, 07 Dec 2023 22:10:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>PHIBRO-GMBH</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9aae6942efb414b8ece420352a646f773f94e4ca927e11cf2713e11fe62682cd</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.phibro.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Silvent-North-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12255</link>
<guid>e16ff47e6c201e7636a5325e01185656</guid>
<pubDate>Thu, 07 Dec 2023 19:12:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Silvent-North-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>581ac5df4fcfdfe166c83d1f6107e9ae7589335e93d0f698ac6d3956691c7517</i><br /><br />Threat actor <b>description</b>: <i>Sweden</i><br />Target victim <b>website</b>: <i>www.silvent.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>GreenWaste-Recovery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12256</link>
<guid>7880d7226e872b776d8b9f23975e2a3d</guid>
<pubDate>Thu, 07 Dec 2023 19:11:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>GreenWaste-Recovery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eeab82b3f590c986cb3fdda50775146a7e6ea5ed4d2795fc111f0874d9bd4d4e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.greenwaste.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Burton-Wire--Cable</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12257</link>
<guid>d754f7302ec0da60aeb079c36b4938d4</guid>
<pubDate>Thu, 07 Dec 2023 19:11:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Burton-Wire--Cable</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd7567cbba7ec3ab6829b63634a104dfa47c0444518524e729c52562f41b612b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.burtonwire.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Becker-Furniture-World</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12259</link>
<guid>9bdc3efe2bdc1946dbb253b2d101b484</guid>
<pubDate>Thu, 07 Dec 2023 19:10:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Becker-Furniture-World</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c169e7dbf6b010f18f80a785a20531357efa84ec5ba05c109cd5da504ca62aaa</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.beckerfurnitureworld.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>GVM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12250</link>
<guid>91866be0ed30d6a36df817992d2a2ef3</guid>
<pubDate>Thu, 07 Dec 2023 19:08:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>GVM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52eb20849e329376112e25da3a92c82bc50c6d539baf2dcf465700874ccf7d22</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.gvminc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Planbox</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12251</link>
<guid>956058422500de80654a14d89ca9a010</guid>
<pubDate>Thu, 07 Dec 2023 19:08:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Planbox</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>627961eb803577949d59d3145dbeb97c0e43ff2e403140ffd37ffd78b8c12dcf</i><br /><br />Threat actor <b>description</b>: <i>Canada</i><br />Target victim <b>website</b>: <i>www.planbox.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>AG-Consulting-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12252</link>
<guid>a9bca7629c60b646a4be02e9c9449de9</guid>
<pubDate>Thu, 07 Dec 2023 19:07:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>AG-Consulting-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b5ece09bd289ac7ab6ba7c0a244a840125bb197fa19e54b984c9174956884009</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.agceng.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Greater-Richmond-Transit</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12253</link>
<guid>5bff5f1eccc4274235c7ccdb2541b540</guid>
<pubDate>Thu, 07 Dec 2023 19:07:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Greater-Richmond-Transit</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>424a240d3b08ff6df46c806fa1da10726b7799fa4b4d6e2fb1bafb6333c56546</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ridegrtc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kuriyama-of-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12254</link>
<guid>536b08b12d4f3c719bb351eefcf1669f</guid>
<pubDate>Thu, 07 Dec 2023 19:06:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Kuriyama-of-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>402532141d947236a97c0d0af5b1b5fe65e36083ce7f7f9d8901d7da676f187f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.kuriyama.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>omegapainclinic.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12247</link>
<guid>5e56343dada029d40a90b44e1ca3d495</guid>
<pubDate>Thu, 07 Dec 2023 18:53:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>omegapainclinic.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f931cf0638afd4f83b549400481ffd93867083bfde13549a99eecce415058d2b</i><br /><br />Threat actor <b>description</b>: <i>The Best Interventional Pain Clinic In Utah. At Omega Interventional Pain Clinic, we specialize in the treatment of acute and chronic pain.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>AMCO-Proteins</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12245</link>
<guid>af0da643a413a1551f47198cfccae577</guid>
<pubDate>Thu, 07 Dec 2023 17:25:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>AMCO-Proteins</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c82586eaaa19ce7cc6cf749b650b5a32fe7f611fb0ef4c4a64998bfaf327c45</i><br /><br />Threat actor <b>description</b>: <i>For more than 50 years AMCO Proteins has been manufacturing and developing functional protein ingredients for customers around the world.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>stormtech</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12242</link>
<guid>47a878d199b3fcb8447a9a1b3a78ee73</guid>
<pubDate>Thu, 07 Dec 2023 14:38:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>metaencryptor</b> claims attack for <b>stormtech</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>604469ba0bfc9ee55260e7610141dfda763f516e7b7bafe4ff4af8baa6ad8c66</i><br /><br />Threat actor <b>description</b>: <i>stormtech</i><br />Target victim <b>website</b>: <i>stormtech.com</i>]]></description>
<category>metaencryptor</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tri-city-Medical-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12240</link>
<guid>b750f74544cb00c138079607276995e9</guid>
<pubDate>Thu, 07 Dec 2023 14:23:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Tri-city-Medical-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7e9e0c176f78f5a658c1e2caed0ddb3a95e14749f03b1b691fb408efb751a7f</i><br /><br />Threat actor <b>description</b>: <i>Tri-City Medical Center has served San Diego County’s coastal communities of Carlsbad, Oceanside and Vista, as well as the surrounding region for more than 60 years and is one of the largest...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tasteful-Selections</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12241</link>
<guid>1b0251ccb8bd5f9ccf444e4bda7713e3</guid>
<pubDate>Thu, 07 Dec 2023 14:22:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Tasteful-Selections</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>00e5ed010762f394d2074d93ea1d4dcfaf26eabe985abd51794fdfaea14b34f1</i><br /><br />Threat actor <b>description</b>: <i>Tasteful Selections is a joint venture of RPE, CSS Farms and Plover River Farms Alliance, Inc. They are a vertically integrated grower, shipper, marketer of premium specialty potatoes. 410 Gb of their data will be available here soon. Lots of personal information (SSN and passports. Mostly employees), confidential agreements, clients information and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ware-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12238</link>
<guid>792b765aa995daf26cf6f17f519c949d</guid>
<pubDate>Thu, 07 Dec 2023 13:12:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Ware-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a2d18594366c867c0094dbaee47edb59ced423f2c7cc76770eca48e35b0bcffb</i><br /><br />Threat actor <b>description</b>: <i>Family-owned for 25 years, we make innovative, fun products that enrich the lives of pets and their people, at a great value.Soon you will be able to download all the data taken from this company.</i><br />Target victim <b>website</b>: <i>www.warepet.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Neurology-Center-of-Nevada</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12239</link>
<guid>61b07251e835d37322b7460d2b88c05b</guid>
<pubDate>Thu, 07 Dec 2023 13:12:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Neurology-Center-of-Nevada</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e171d6c53aba599f6d83750b2bfad5baa14254fc57be0a94be6c783bcf01b1d0</i><br /><br />Threat actor <b>description</b>: <i>Neurology Center of Nevada™s medical team specializes in the diagnosis and treatment of the Nervous System and Neurological Disorders. Soon you will be able to download all the data taken from this company.</i><br />Target victim <b>website</b>: <i>neurocnv.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>National-Nail-Corp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12237</link>
<guid>d6b6536a9a9352f17189a9dff2f569b6</guid>
<pubDate>Thu, 07 Dec 2023 12:58:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>National-Nail-Corp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b852a63036790f7b1d7af9d12b3446af1e010ed25292f334152595f501cae2b5</i><br /><br />Threat actor <b>description</b>: <i>National Nail has been a proud part of the American building materials industry for over 50 years as a manufacturer and distributor of high-quality, innovative product and service solutions for the residential, commercial, and industrial construction industries. We partner with multiple national and global suppliers and distributors to serve the hardware wholesale, roofing wholesale, independent, chain, home center and STAFDA channels.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>citizenswv.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12234</link>
<guid>2fc4a68635c26db1019047965180ce1b</guid>
<pubDate>Thu, 07 Dec 2023 11:29:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>citizenswv.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8d530f804794cc4c186b05fb91d87cb6c3edc17dff3f8927c80030799854f934</i><br /><br />Threat actor <b>description</b>: <i>Just another greedy company that puts their own money above clients privacy and interest .Welcome to Citizens Bank of West Virginia, a locally owned community bank which provides a comprehensive line of banking, trust and investment products to c...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>directradiology.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12235</link>
<guid>b63c87b0a41016ad29313f0d7393cee8</guid>
<pubDate>Thu, 07 Dec 2023 11:29:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>directradiology.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>269b3af042ab3985e603b29d600e4c8c5db14ee14c607c11aff425bec67f711c</i><br /><br />Threat actor <b>description</b>: <i>Direct Radiology is a custom teleradiology company.If negotiations fail, patient records, doctor docs, and company data will be publicly available.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>bpce.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12233</link>
<guid>b53086d558f1127993271e8c504ded45</guid>
<pubDate>Thu, 07 Dec 2023 10:03:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>bpce.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>931153277efce69cd8402e0bb7b8cc4b8d5660662ba7d697f808f9d5c72ff4f8</i><br /><br />Threat actor <b>description</b>: <i>Bridgers Paxton Consulting EngineersEstablished in 1951, Bridgers & Paxton Consulting Engineers offers a full range of mechanical, electrical, plumbing, technology and energy consulting engineering services. B&P has offices in Arizona, Colorado and...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>hopto.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12230</link>
<guid>b9ea004175174b1db18270d463c3455c</guid>
<pubDate>Thu, 07 Dec 2023 08:34:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hopto.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a02c65ce15f479f796dbe6a94de9846a57c57ebb12b1d9424931233429149c9</i><br /><br />Threat actor <b>description</b>: <i>hopTo Inc., together with its subsidiaries, develops and sells application virtualization and cloud computing software products for various computer operating systems in the United States, Brazil, and internationally.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tryax-Realty-Management---Press-Release</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12227</link>
<guid>f84c76bab4c292f023613b276edf4293</guid>
<pubDate>Wed, 06 Dec 2023 22:08:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Tryax-Realty-Management---Press-Release</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0946387e033c383a585aeaa9fe0d1dab6be10dc3aa7228106827797847225774</i><br /><br />Threat actor <b>description</b>: <i>Tryax Realty Management serves the West Bronx communities of Morris Heights, Mt. Eden, Melrose, High Bridge, Kingsbridge and Norwood, and the Harlem communities of Hamilton Heights, Sugar Hill, and Strivers Row.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>Campbell-County-Schools-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12226</link>
<guid>de07edeeba9f475c9395959494cd8f64</guid>
<pubDate>Wed, 06 Dec 2023 14:55:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Campbell-County-Schools-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b7ae91d802ce85720cc587181ddc8543249613f5d5572a7ba60791d891966e9f</i><br /><br />Threat actor <b>description</b>: <i>Campbell County Schools is a school district operating schools in Campbell County, Kentucky in Greater Cincinnati. Its headquarters are in Alexandria. The number of students in the school district is more than 8000 thousand people</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>syrtech.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12221</link>
<guid>00c1de56b1cbab48f9869c1460d70e76</guid>
<pubDate>Wed, 06 Dec 2023 08:57:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>syrtech.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f732e938d6cb051705a5fbca41514c66aac95490fdf1661bc9af8ab852109f4b</i><br /><br />Threat actor <b>description</b>: <i>Syr-Tech manufactures custom perforated metal as well as roll formed metal shapes to your exact specifications. With hundreds of stock perforated metal patterns as well as a huge assortment of standard roll formed tooling, chances are we...</i><br />Target victim <b>website</b>: <i>syrtech.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>ACCU-Reference-Medical-Lab</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12219</link>
<guid>ed7ec77be8029e30e8532d41448d1c52</guid>
<pubDate>Wed, 06 Dec 2023 08:54:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>ACCU-Reference-Medical-Lab</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d5d1f44782649424d0cb5064160e02d412eb18d764a00b823eb92cbd6a559490</i><br /><br />Threat actor <b>description</b>: <i>ACCU Reference Medical Lab is a New Jersey-based full-service medical testing laboratory. Established in 2005, ACCU Reference Medical Lab serves healthcare providers in 19 states and employs over 750 professionals. The main office of the company is located at 1901 E Linden Ave Unit 25, Linden, New Jersey, 07036, United States. Over 1.2TB of data has been uploaded.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sagent</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12220</link>
<guid>96752f0608aff8b3436a1b5a5099c0ce</guid>
<pubDate>Wed, 06 Dec 2023 08:53:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Sagent</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ede53de034f3956c77d8e31a41768a75879347beec16ded21cf10d901d26420</i><br /><br />Threat actor <b>description</b>: <i>Sagent provides a comprehensive array of network services and helps their clients lower the cost of network ownership by using business analytics and network support services.The main office of the company is located at 120 Dividend Dr Ste 160, Coppell, Texas, 75019, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lischkoff-and-Pitts-P.C.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12212</link>
<guid>1ec12035e5b91874abca57cefbd59200</guid>
<pubDate>Wed, 06 Dec 2023 07:14:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Lischkoff-and-Pitts-P.C.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33c970a3b27ca447ffb545a175efbfc94d40dd09ee0fc779e058f83f956bc0f1</i><br /><br />Threat actor <b>description</b>: <i>ABOUT OUR FIRMFor years, Lischkoff & Pitts, P.C. has been providing quality, personalized financial guidance to individuals and businesses. Our expertise ranges from tax compliance, management and accounting services to more in-depth services such as financial statements, financial planning, estates and trusts. Lischkoff & Pitts, P.C. is one of the leading tax and financial statement firms in the area. By combining our expertise, experience and the team mentality of our staff, we assure that every client receives the close analysis and attention they deserve. We are dedicated to high standards, hiring of seasoned professionals, and productive work ethic. https://www.lischkoffpitts.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Henry-Schein-Inc---Henrys--LOST-SHINE-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12209</link>
<guid>747e32ab0fea7fbd2ad9ec03daa3f840</guid>
<pubDate>Tue, 05 Dec 2023 20:41:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Henry-Schein-Inc---Henrys--LOST-SHINE-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e804c85956a599b800160da9929a2a0474954dcf86aaa35aa9bb78dca9a7e6d</i><br /><br />Threat actor <b>description</b>: <i>*</i><br />Target victim <b>website</b>: <i>HTTPS://HENRYSCHEIN.COM</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>TraCS-Florida-FSU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12210</link>
<guid>c1e247e2235eb596c080297d6903cf39</guid>
<pubDate>Tue, 05 Dec 2023 20:41:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>TraCS-Florida-FSU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a8442c436fe6c10f1af6eca49f0d9b970def32648467f97672072aa406f635b</i><br /><br />Threat actor <b>description</b>: <i>TraCS Florida is a grant-funded program provided by the Florida Department of Transportation (FDOT) to Florida State University (FSU) to develop a software package for law enforcement across the state that will facilitate the electronic submission of traffic crash</i><br />Target victim <b>website</b>: <i>https://www.tracsflorida.org</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>mapc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12206</link>
<guid>dfcebbaf79842c2e6fca7b77741de3a6</guid>
<pubDate>Tue, 05 Dec 2023 16:32:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>mapc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b76ca3427e98706ea21ecfc35322a2031b39096f9f332eaaea88b974ef44af30</i><br /><br />Threat actor <b>description</b>: <i>The Metropolitan Area Planning Council (MAPC) is the regional planning agency serving the people who live and work in the 101 cities and towns of Metropolitan Boston.Established in 1963, MAPC is a public agency created under Massachusetts General...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>ussignandmill.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12204</link>
<guid>8417b4b7a64929b9e6dea71c8c247959</guid>
<pubDate>Tue, 05 Dec 2023 16:11:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>ussignandmill.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eec52d1c4f3118b42777c9624f02ed942685efdb394f34d7121a8e68ffa17e1e</i><br /><br />Threat actor <b>description</b>: <i>We typically serve two types of customers: national powerhouses looking for mass-produced, brand-consistent signage and local business owners seeking custom builds. While both have very different goals, one thing remains...</i><br />Target victim <b>website</b>: <i>ussignandmill.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>Supply-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12199</link>
<guid>56921b5830dc422b9e197e0df48c5b8c</guid>
<pubDate>Tue, 05 Dec 2023 14:51:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dunghill_leak</b> claims attack for <b>Supply-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ab3f1bc87894a5318690762835647930b6c0deac6ef5c2bebf077b30f6aed07</i><br /><br />Threat actor <b>description</b>: <i>Supply Technologies, a subsidiary of ParkOhio(NASDAQ:PKOH), specializes in supplier selection and management, planning, implementing, managing the physical flow of product for world-class international manufacturing companies, and servicing customers in the various markets. Supply Technologies has expertise in global sourcing with more than 7,500 suppliers worldwide and ensures that you’ll get the exact parts you need, on time, at the best quality and at the right price. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dunghill_leak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Akumin</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12194</link>
<guid>835bafd2c534a1830c0590774285ff88</guid>
<pubDate>Tue, 05 Dec 2023 10:11:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Akumin</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9d3e50fce9859b9ba5fc7e400dda040a26f8a6f9c9f87e7488d6edbfa6f540cc</i><br /><br />Threat actor <b>description</b>: <i>Akumin is a national leader in comprehensive outpatient radiology and oncology solutions and a partner of choice for U.S. hospitals, health systems and physician groups.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>CLATSKANIEPUD</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12195</link>
<guid>b259a593d2ac9619df8c8a5a6c2717a2</guid>
<pubDate>Tue, 05 Dec 2023 10:10:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>CLATSKANIEPUD</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>489e27136225546bd42eb4131ede5bc639c94847020807c518292c038d45a9f0</i><br /><br />Threat actor <b>description</b>: <i>Clatskanie People’s Utility District is here to serve you. Find out more about us by clicking on the links below.  MISSION STATEMENT “Creating economic advantage for our communities by providing the best energy value for all of our customer-owners”  VISION STATEMENT “Benefit our customers through innovation and adaptability”  What is a People’s Utility District? A People’s Utility District (PUD) is a publicly owned utility formed pursuant to Chapter 261 of the Oregon Constitution. We provide electric service to customers located within and without of the District boundaries. People’s Utility Districts are formed or exist in areas where a majority of the public has sought local ownership and control of their utility and lower electric costs. A People’s Utility District can usually offer lower costs because its products and services are sold at cost-based rates, there is no profit added in. The District is overseen by a five member Board of Directors representing individual Districts and elected within the District they represent. The Board appoints a General Manager to be the Chief Executive Officer for the District.</i><br />Target victim <b>website</b>: <i>https://www.clatskaniepud.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bowden-Barlow-Law-PA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12190</link>
<guid>391e1830d381c2f388575154a12b19a8</guid>
<pubDate>Tue, 05 Dec 2023 05:57:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Bowden-Barlow-Law-PA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f980688d1495cb8da6fa2516350cb8cecf9d5482b37e2c33f2bb40ed6720f93</i><br /><br />Threat actor <b>description</b>: <i>Bowden Barlow Law PA is a company that operates in the Legal Services industry. It employs 6-10 people and has $1M-$5M of revenue. The main office of the company is located at 3845 5th Ave N, Saint Petersburg, Florida, 33713, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rosens-Diversified-Inc-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12191</link>
<guid>c4c28b367e14df88993ad475dedf6b77</guid>
<pubDate>Tue, 05 Dec 2023 05:56:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Rosens-Diversified-Inc-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1592b20ebb21d4b9b8bd2c8b508b7dc8d3a80624f6c0622043269eb4c7b65821</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1946, Rosens Diversified Inc (RDI) provides agriculture products, operates a beef processing company, conducts a fleet of semi trailer trucks, has a line of performance pet products, and has acquired an in-house marketing agency. The main office of the company is located at 8101 34th Ave S Ste 400, Bloomington, Minnesota, 55425, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Henry-County-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12189</link>
<guid>ab2b6bce20603d512008b6174060afa5</guid>
<pubDate>Tue, 05 Dec 2023 02:41:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Henry-County-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ae2aeb5e68b0290c25272d79ba281578f970beced4a830e6cbbf7644b521c06</i><br /><br />Threat actor <b>description</b>: <i>Henry County Schools operates high schools, middle schools, and elementary schools throughout the state of Georgia.</i><br />Target victim <b>website</b>: <i>http://www.henry.k12.ga.us</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>CMS-Communications</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12185</link>
<guid>95c7dfc5538e1ce71301cf92a9a96bd0</guid>
<pubDate>Mon, 04 Dec 2023 19:22:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>CMS-Communications</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42a2ad0ee87ab0a79530fb896a1bf7c8ddd1effab5ae08694270cb802f67d034</i><br /><br />Threat actor <b>description</b>: <i>CMS Solutions, founded in 1985, is a communications solutions provider. It offers new and refurbished voice, data, mobile products, advanced IP telephone systems and technical support. CMS Solutions serves a wide range of organizations from m            ...</i><br />Target victim <b>website</b>: <i>www.cmsc.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Great-Lakes-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12183</link>
<guid>6acfe16b984d473723a8495a84e548b7</guid>
<pubDate>Mon, 04 Dec 2023 17:51:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Great-Lakes-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0988fb3e2151ea14104c0f84d8cc28ac9d3c199c4ceed99c04fa3ff1b763b8a3</i><br /><br />Threat actor <b>description</b>: <i>Great Lakes Technologies & Manufacturing LLC promotes a culture of innovation and is committed to eliminating waste, costly duplication of efforts and production start-up problems for our customers. We accomplish this by providing proprietary            ...</i><br />Target victim <b>website</b>: <i>www.greatlakestech.net</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>nlt.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12179</link>
<guid>e18cfe46b96c30852b565e561152d055</guid>
<pubDate>Mon, 04 Dec 2023 13:21:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>nlt.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d4208e8ea3290578701d1fd93cf3b817af7e4466d98f4c78a17f75337ef745fe</i><br /><br />Threat actor <b>description</b>: <i>National Lift Truck, Inc. in Franklin Park, Illinois, USA is a family owned and operated company established over six decades ago. Unlike most companies in our industry, we are a One-Stop Shop For ALL Your Material Handling Needs. We deal in New and Used Lift Equipment Sales and Rental - Forklifts, Aerial Work Platforms, Scissor Lifts, Boom Lifts, Telehandlers, Forklift Attachments, Cranes, Industrial Batteries and Chargers, Generators, Light Towers and more. We offer Equipment Service & Repair, Replacement Parts and a complete array of Material Handling Supplies. We also have Specialized Haul-For-Hire Services and Logistics with Long and Short-Term Indoor and Outdoor Industrial Storage as well as Warehousing Services, Warehousing Products and 3PL. We also provide Forklift and Area Work Platform Operator Safety Training.SITE: www.nlt.com Address : 921 171st St, Hazel Crest, Illinois, 60429, United StatesALL DATA SIZE: 331gb 1. Human Resources 2. Accounting 3. 401(k) form 4. Customer informations 5. Personal employees documents and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>UF-Resources</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12176</link>
<guid>64d29f56aa43279ba07617b9724d5597</guid>
<pubDate>Mon, 04 Dec 2023 08:56:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>UF-Resources</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a83fb135b5ca8ace8f3325250d03d5a5ff78ade41ebf437206243cb98122c25</i><br /><br />Threat actor <b>description</b>: <i>These UF Resources services include providing consolidated resources in the areas of finance, accounting, human resources, information technology, sales, marketing and othe...</i><br />Target victim <b>website</b>: <i>https://www.ufresources.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nida-Corp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12177</link>
<guid>07217414eb3fbe24d4e5b6cafb91ca18</guid>
<pubDate>Mon, 04 Dec 2023 08:55:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Nida-Corp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac9ed49dac3d9766ea41b4cde4496233c671e5a4eb29cdbdc6dca87717c305c6</i><br /><br />Threat actor <b>description</b>: <i>Nida Corporation understands that a critical element of learning a technical skill involves working with the physical hardware. Our team of electrical, mechanical, and soft...</i><br />Target victim <b>website</b>: <i>https://nida.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tipalti-claimed-as-a-victim---but-well-extort-Roblox-one-of-their-affected-clients-indi</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12170</link>
<guid>b8e32c77dec45bcb3429af70c8fd7a8b</guid>
<pubDate>Sun, 03 Dec 2023 02:39:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Tipalti-claimed-as-a-victim---but-well-extort-Roblox-one-of-their-affected-clients-indi</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f69b2f76306403a0fb8287b23b1d711f78f59ebc416b2eb12a9e65a2a1ce956</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>bboed.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12168</link>
<guid>27dbb28ea03fd64ae84f717f6dfac59c</guid>
<pubDate>Sat, 02 Dec 2023 21:58:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>bboed.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1484ebe0a76baee0b8454650cf28711411faf7d32ea2106c340501939381df84</i><br /><br />Threat actor <b>description</b>: <i>Bayonne Board of Education is a comprehensive public school district serving students from pre-kindergarten through twelfth grade from Bayonne in Hudson County, New Jersey.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Austal-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12165</link>
<guid>2b1a9e41c7cb15669337c1a583af31f8</guid>
<pubDate>Sat, 02 Dec 2023 13:03:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Austal-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>236462406be0f571f0dd8daf2a9254bd9f67d2a2b0e46ebdff9c1690307da94b</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>https://austalusa.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jerry-Pate-Energy-hack-from-Saltmarsh-Financial-Advisors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12162</link>
<guid>c58ec9af29371058432c2c0ddf1f3c9a</guid>
<pubDate>Sat, 02 Dec 2023 10:21:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Jerry-Pate-Energy-hack-from-Saltmarsh-Financial-Advisors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc95a8d41d199eb21c8d8c90eeaa98ca47fcc4ed810ca0d392b3312d083d4fdc</i><br /><br />Threat actor <b>description</b>: <i>Jerry Pate Company is the premier provider of outdoor beautification products in the Southeast and Midwest, and is committed to quality service and exceptional customer care. We proudly represent the industry’s leading equipment and irrigation brands and products, including Toro, Ventrac, Echo, Shindaiwa, Club Car,</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>St.-Johns-River-Water-Management-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12156</link>
<guid>4756c77f32f14b12aa71e976505e02b5</guid>
<pubDate>Fri, 01 Dec 2023 17:29:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>St.-Johns-River-Water-Management-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df12615ea68dda388b70a3769e61a2b2519bfb3b6272cc68622cc3028dd81fa2</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.sjrwmd.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kellett--Bartholow-PLLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12154</link>
<guid>48c0b3cf0c62e40eeff5a9b07a63d953</guid>
<pubDate>Fri, 01 Dec 2023 15:55:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Kellett--Bartholow-PLLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1bbc60989cab52d65c71743ede3b60867a4029dd161e832cd816086ce9b9f4d</i><br /><br />Threat actor <b>description</b>: <i>At Kellett & Bartholow PLLC, we help consumers protect their rights and their financial interests with skilled, aggressive representation in both individual and class action lawsuits, combining more...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Thenewtrongroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12149</link>
<guid>885fd739d31951206a8c4f0d6472fcf0</guid>
<pubDate>Fri, 01 Dec 2023 13:20:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>Thenewtrongroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa7781bed02c399c37b895ce1c7a75ed39991b0145766d4c6839e585a0854c15</i><br /><br />Threat actor <b>description</b>: <i>Country: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Agamatrix</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12145</link>
<guid>6be79387cf426fe3b783ad30bf234677</guid>
<pubDate>Fri, 01 Dec 2023 11:32:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Agamatrix</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b4d875f89f5dc6e50d9def13d02151008885c92f09b55fd8b0d4f464ddd4d77</i><br /><br />Threat actor <b>description</b>: <i>PREVIEW</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>HTC-Global-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12142</link>
<guid>87ca4eb840b6f78e3b6d6b418c0fef40</guid>
<pubDate>Thu, 30 Nov 2023 23:33:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>HTC-Global-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fcac125249f44055f95003aed2aca3397eb119360673ab5965e5f60800537062</i><br /><br />Threat actor <b>description</b>: <i>HTC Global Services, established in 1990 and headquartered in Troy, Michigan is a provider of information technology and business process services.  The company offers grant management software that automates the grant management process. HTC has installed Enterprise Grants Management System (EGrAMS)for various states and state agencies in USA.  HTC is a Tier 2 investment partner of Kuali Foundation to develop and deliver next-generation library management system for various universities.</i><br />Target victim <b>website</b>: <i>https://www.htcinc.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>hnncsb.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12141</link>
<guid>ae8bb42b9a0f7d84a7879ec8da8a4a36</guid>
<pubDate>Thu, 30 Nov 2023 22:36:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hnncsb.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a05921afc1aecc5129ea833f2923504f5655dedbaf86c5eff56bb314998cf8f</i><br /><br />Threat actor <b>description</b>: <i>Hampton Newport News CSB is a drug rehab and alcohol rehabilitation center360GBData on patients (MRN, SSN, ID, DOB numbers, phone number, residential addresses, information about visits, medical history, results of various studies, various Patien...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Covenant-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12138</link>
<guid>4163634d39ec5b1d3e126f44619243b2</guid>
<pubDate>Thu, 30 Nov 2023 14:30:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Covenant-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7501747ec3b5c52cf67fc7d502af6ef0edc4aa9c3b6ef5549212f4f5c027d2b8</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://covenantcare.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wakefield--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12136</link>
<guid>3f59bced6cb38237762e1d2b8cd4e086</guid>
<pubDate>Thu, 30 Nov 2023 13:18:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>knight</b> claims attack for <b>Wakefield--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d407299994b58e88fd8c5f8cc90a14134e441be0917ce3310376c29a54a44c1</i><br /><br />Threat actor <b>description</b>: <i>www.wakeassoc.com&nbsp;We have over 400GB of data from Wakefield and AssociatesThey refuse to come to discuss a deal with us. If you do not contact us soon all this information will be shared to their clients/partners and the world to see.proof 1.jpg 331.01 KBproof 2.jpg 59.34 KBproof 3.jpg 119.89 KBproof 4.jpg 59.26 KBproof 5.jpg 75.65 KBproof 6.jpg 78.77 KB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>knight</category>
</item>
<item xmlns:dc='ns:1'>
<title>DePauw-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12133</link>
<guid>37e01843867c460c5db02b0e58a6f236</guid>
<pubDate>Thu, 30 Nov 2023 13:03:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>DePauw-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3b4fe9986cd7200e8da475ec3be576e143a9b3f3d7411f0cd7cde3fc0a553d8c</i><br /><br />Threat actor <b>description</b>: <i>DePauw University in Greencastle, Indiana, USA, is a private, national liberal arts college and School of Music. The school has a Methodist heritage and was originally known as Indiana Asbury University.</i><br />Target victim <b>website</b>: <i>http://www.depauw.edu</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>aurobindousa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12132</link>
<guid>1a523f7353bfa6bd1dca95624748e712</guid>
<pubDate>Thu, 30 Nov 2023 10:30:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>aurobindousa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3b50e7a5aa2dfa1d2b3467b0b7a210106c86b7f2b9a3b1247b19a26462bc3fcd</i><br /><br />Threat actor <b>description</b>: <i>Aurobindo 3,7Tb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>andersonandjones.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12131</link>
<guid>7a6322d4cd522986abfc17e6f73ef4ab</guid>
<pubDate>Thu, 30 Nov 2023 10:21:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>andersonandjones.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dcfa3ba0bd30338995160ddb283ef1ba22cb80eb2b6d26a3d9261c3c50b99f53</i><br /><br />Threat actor <b>description</b>: <i>Anderson Jones, PLLC is an award-winning, full-service law firm located in Raleigh, N.C. serving North Carolina and Georgia. Concentrating in the areas of construction law, construction litigation, lien and bond claims, contracts, administrative law, workers’ compensation defense, real estate, employment law, OSHA defense, estate planning, estate administration and settlement, and general commercial litigation, Anderson Jones represents local and national clients in both state and federal courts. Built on the core principles of solid values, integrity in billing, aggressive pursuit of business solutions, efficiency through technology and tenacious representation, Anderson Jones’ attorneys lend leadership, expertise and professionalism in legal matters to always achieve the best attainable results for clients.SITE: www.andersonandjones.com Address  421 N. Blount Street Raleigh, NC 27601 UNITED STATESFULL DATA SIZE: 360gb 1. Health Insurance 2. W-9 forms 3. 401K forms 4. ConfidentialityNETWORK: ANDERSONJONES-------------------------DOMAIN ADMINS------------------------- Administrator           Administrator Tmpl      aptiis Network Admin           SBS Backup User         SBSMonAcctandersonjones.local\Administrator ds#$fsKFS3-------------------------DC------------------------- FILESERVER.andersonjones.local 192.168.1.3 Windows Server 2012 R2 Standard-------------------------SERVERS------------------------- RDS-SRV.andersonjones.local 192.168.1.9 Windows Server 2012 R2 Standard 2012-VMHOST-AJ.andersonjones.local 192.168.1.41 Windows Server 2012 R2 Standard DA-SRV.andersonjones.local 192.168.1.8 Windows Server 2012 R2 Standard 2012VMHOST.andersonjones.local Windows Server 2012 R2 Standard JURIS.andersonjones.local 192.168.1.4 Windows Server 2012 R2 Standard</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Science-History-Institute</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12129</link>
<guid>37160db944a57234ac9bf1ea9e99ae58</guid>
<pubDate>Thu, 30 Nov 2023 05:29:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Science-History-Institute</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e32cfbdf48d8c3d4b26f281b66ae0898df0cdccc264ba5317776506345bcc06</i><br /><br />Threat actor <b>description</b>: <i>The Science History Institute collects, preserves, interprets, and shares that past by exploring lesser-known and sometimes overlooked stories from the history of science a...</i><br />Target victim <b>website</b>: <i>https://www.sciencehistory.org</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>Yale-Appliance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12130</link>
<guid>8a2bd3e7515b99c88006a6956bc284e9</guid>
<pubDate>Thu, 30 Nov 2023 05:27:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Yale-Appliance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>129fef7ab4bd64e53b272586bcc620bd01f79958e3d0fa3ba2680faa6fc01fdf</i><br /><br />Threat actor <b>description</b>: <i>Find Sub-Zero, Wolf, Miele and Thermador refrigerators, ranges, washers and dryers, ovens, grills and plumbing at our Boston appliance showrooms. Shopping for new appliances is more stressful and overwhelming than it should be. That's why Yale doesn't just sell you an appliance. Unlike other stores, we also deliver, install and service, so you can sit back, relax, and enjoy your beautiful kitchen for years to come yaleappliance.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>pcli.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12128</link>
<guid>6d620ec78d3291c35fc5c59d91cf2548</guid>
<pubDate>Thu, 30 Nov 2023 02:46:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>pcli.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1cee1b67e4838d2d42b85f29f317d518b58dfffe24355370bb2fdeebb57c039</i><br /><br />Threat actor <b>description</b>: <i>Thankfully, front office phones and fax machines are now operational at all PCLI locations. Our clinical and surgical equipment is operational and unaffected and we continue to see patients. Although some appointments have been canceled, we're doing...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chetu-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12125</link>
<guid>46f6341ce05f71416cddc3e42a76102c</guid>
<pubDate>Wed, 29 Nov 2023 22:07:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Chetu-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bcc99c6b6753862a124a21acc22f0ec4ab3bf71ae0206d4a417c0f4d2419e54a</i><br /><br />Threat actor <b>description</b>: <i>Chetu is an American software development company providing industry—specific software solutions for businesses around the world. The main office is located at 1500 Concord Ter Ste 100, Sunrise, Florida, 33323, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-River-Community-Technical-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12121</link>
<guid>de872154ffbf91a5dcc0e539dd2d5106</guid>
<pubDate>Wed, 29 Nov 2023 17:32:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>New-River-Community-Technical-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0809517a155e465c94704649eedbb34a9a1ce9cc030c6093ba591c502bc28b5a</i><br /><br />Threat actor <b>description</b>: <i>New River Community and Technical College serves nine counties in southeast and south central West Virginia: Fayette, Greenbrier, Mercer, Monroe, Nicholas, Pocahontas, Raleigh, Summers and Webster.</i><br />Target victim <b>website</b>: <i>http://newriver.edu</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>s-t-e-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12122</link>
<guid>1d388729fedebe69bea4a1c795f49026</guid>
<pubDate>Wed, 29 Nov 2023 17:31:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>s-t-e-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a02bf543cc5b0e8330a4f8420536a9e555b4263ced4f7f8e4de21c45a7a6168c</i><br /><br />Threat actor <b>description</b>: <i>The company provides various services: environmental, health, & safety (EHS), industrial hygiene, technical services, emergency response.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>jacobsfarmdelcabo.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12118</link>
<guid>5407aabf833278d35792a23092982caa</guid>
<pubDate>Wed, 29 Nov 2023 17:24:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>jacobsfarmdelcabo.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81d5ad0c607c1931738aca974283d805bdd94a945b2f6033e269d869a4e6874a</i><br /><br />Threat actor <b>description</b>: <i>Jacobs Farm began as a small organic family farm in 1980 on Californias Central Coast, founded by Larry Jacobs and Sandra Belin in 1980. Jacobs Farm produces sustainable crops of healthy, flavorful food for three decades.SITE: www.jacobsfarmdelcabo.comADDDRESS: 303 Potrero St Ste 3, Santa Cruz, California, 95060, United StatesALL DATA SIZE: 405gb 1. Accounting 2. Human Resources 3. Users personal folders and etc…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lydall-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12116</link>
<guid>9df2afabcdd08dbe0db7a49e509403c9</guid>
<pubDate>Wed, 29 Nov 2023 16:00:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Lydall-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b114b5374cc169bc234789b009b3c43321ae0fce1aedbff12079e315906039bf</i><br /><br />Threat actor <b>description</b>: <i>Lydall is a New York Stock Exchange listed company, headquarteredin Manchester, Connecticut with global manufacturing operations producing specialty engineered products for the thermal/acoustical and filtration/separation markets. We are going to upload a good amount of their projects files with drawing and everything. There are many HR files with detailed information, finance, accounting in there. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Great-Valley-School-District-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12114</link>
<guid>2eff4694dc9b370d5464f920c0fbb7ba</guid>
<pubDate>Wed, 29 Nov 2023 13:13:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Great-Valley-School-District-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e948f4b262df44acc513735aec0373580e5c64215a602443b590807842554f1c</i><br /><br />Threat actor <b>description</b>: <i>Great Valley School District is located on the Philadelphia Main Line in eastern Chester County, Pennsylvania. The district provides public education for students in Charlestown, East Whiteland, and Willistown townships, and the borough of Malvern.At the moment, it has more than 4,000 students</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Teleflora</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12113</link>
<guid>e7d81336a1915eff69e6eb7f32cf1e77</guid>
<pubDate>Wed, 29 Nov 2023 12:59:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Teleflora</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8006072c7be8e8a0c60989bd4f1255d419ba479bed330d30f7873316f996981b</i><br /><br />Threat actor <b>description</b>: <i>Teleflora is an online flower company headquartered in Los Angeles, California, Teleflora has over 10,000 member florists throughout the U.S. and Canada, with an additional 20,000 affiliated florists outside North America. We'll share a couple of dozens Gbs ofthis company files. Operational, financial docs, some HR files etc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hunt-Guillot--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12108</link>
<guid>786fc80896b25422b5324cb6e57b701c</guid>
<pubDate>Wed, 29 Nov 2023 09:27:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Hunt-Guillot--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d120dd3ec6f29a087affffa7a073f050e7ecacfbf703107c996de96d5608b947</i><br /><br />Threat actor <b>description</b>: <i>HGA is a multi-disciplined project management and engineering services company providing professional services to an extensive portfolio of customers throughout numerous industries for more than 20 years.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kologik</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12106</link>
<guid>59378da7650a0c665518961273af6b05</guid>
<pubDate>Wed, 29 Nov 2023 09:27:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Kologik</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d62e283f766c2a0c5a30e518d9c4c2548b67a62202a063fbe1483cefd0bff11</i><br /><br />Threat actor <b>description</b>: <i>More information in our telegram channel https://t.me/snatch_team Persons responsible for data leakage:Teri Jones:CFO[email protected];Ben Balvin:Chief Architect[email protected];Matthew Follis:CFO, Financial Officer+1 972-839-9511[email protected];Aubrey Wardwell:VP+1 804-986-3318[email protected];Matt Chism:President, President, Sales, VP, VP, Sales[email protected];Rob Powell:Manager, Manager, Operations, Service Manager, Technical Service Manager, VP+1 225-291-5440[email protected];Sean Murphy:VP, VP, Product Development+1 225-291-5440[email protected];Melanie Smith:Director,</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>tcw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12109</link>
<guid>1b8e84dcae97ad25234484e38615c570</guid>
<pubDate>Wed, 29 Nov 2023 08:30:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>tcw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7082c0588989899320683845b545b49ea04368a13290b1c3069940fc4b2d123</i><br /><br />Threat actor <b>description</b>: <i>TCW is a leading global asset management firm with five decades of investment experience and a broad range of products across fixed income, equities, emerging markets, and alternative investments. TCW’s clients include many of the world’s largest cor...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>OLA-Consulting-Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12102</link>
<guid>c728615c8a166f73ec481b345cac1e84</guid>
<pubDate>Wed, 29 Nov 2023 07:17:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>OLA-Consulting-Engineers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f5b2c0ac82abe73e264c7ea1648ef71cdaed5bebf91319071dd98e5491ee8ae8</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.olace.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Labtopia</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12103</link>
<guid>751f879c2408105e969d31617d31fbf5</guid>
<pubDate>Wed, 29 Nov 2023 07:16:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Labtopia</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d7ba7fbdc5e7c59e2f5fdda58c10e232260f04598e07c3bcdcdfe46b94e0cb85</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.labtopiainc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>SC-Hydraulic-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12104</link>
<guid>2976a6e4f9f094965adb965397c96dcf</guid>
<pubDate>Wed, 29 Nov 2023 07:15:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>SC-Hydraulic-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db4d330328e129901017a6c2067581f43413afa50c5079b9866ba2db045df647</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.schydraulic.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Unitransfer</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12100</link>
<guid>c8829bcfb9c1d89b93f14dee9add8a0b</guid>
<pubDate>Wed, 29 Nov 2023 07:11:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Unitransfer</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96ecd92bd36f1f0f048cd824167b7f10c1cc4baa570a7b982e7f621e45dcc18a</i><br /><br />Threat actor <b>description</b>: <i>Florida, United States</i><br />Target victim <b>website</b>: <i>www.unitransfer.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wild-Republic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12098</link>
<guid>f73c2c536908327c3e7ab819ea778560</guid>
<pubDate>Wed, 29 Nov 2023 05:36:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Wild-Republic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>27244cb13b1bf682f6ae636856f9d05663b32b8fbe9ad6d980d08fe6b2205851</i><br /><br />Threat actor <b>description</b>: <i>Wild Republic started with an artist and a vision in 1979. We have been delighting consumers around the globe with an expansive collection of nature-related toys and gifts ever since. Headquartered in Independence, Ohio, Wild Republic has offices throughout the world with international distribution serving zoos, museums, aquariums, and other retailers. Our global product offerings include three major plush brands made 100% from recycled water bottles. Ecokins, with over fifty plush species on offer, was launched in 2019. Our most recent launches of 100% certified ecofriendly products include Message from the Planet plush and Monsterkins. Everything we do is inspired by our Promise to the Planet, Animals and People.  wildrepublic.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Leezer-Agency</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12092</link>
<guid>397d6b4c83c91021fe928a8c4220386b</guid>
<pubDate>Wed, 29 Nov 2023 05:34:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Leezer-Agency</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d4e08a95cced22e2d340924d4400550377128573a369da4174909c253dda647b</i><br /><br />Threat actor <b>description</b>: <i>Leezer Insurance Agency is a company that operates in the Insurance industry.  The company is headquartered in Toulon, Illinois leezeragency.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cimbali-National-Accounts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12093</link>
<guid>8864b99db2b2651e51dbd14fde0e361e</guid>
<pubDate>Wed, 29 Nov 2023 05:34:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Cimbali-National-Accounts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b20d9e6892ab4a8d9822c9e7689c7cdde191594b13cda13279c66caaf89e9e1d</i><br /><br />Threat actor <b>description</b>: <i>Elegance, reliability and high performance: the finest tradition of Italian espresso coffee. Explore our large range of professional espresso and cappuccino machines of La Cimbali. Cimbali is a manufacturer and supplier of coffee machine and rosters https://www.cimbali.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fortiss-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12094</link>
<guid>7f7ed8ecfca9e17696ff654508efd86a</guid>
<pubDate>Wed, 29 Nov 2023 05:32:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Fortiss-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>84833199accadb3f84381dbe9313c968849474a7dd9b3073f7d1b6a089c15325</i><br /><br />Threat actor <b>description</b>: <i>Fortiss, LLC started in 2005, as a provider of accounting and management consulting services that cater to the needs of casinos and card rooms throughout California. Offering a wide range of customized business solutions for the gaming industry, Fortiss provides services from recruiting and training programs to specialized accounting and human resources consulting. The goal at Fortiss is to help clients identify ways to streamline their casino or card club operation, and leverage new industry opportunities while maximizing profitability. fortiss.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Noble-Mountain-Tree-Farm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12090</link>
<guid>b285f0192e689b14171efa16647d7170</guid>
<pubDate>Tue, 28 Nov 2023 20:53:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Noble-Mountain-Tree-Farm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbbdaf4c383dc01ba2d2420e24df605d4fe960494240f476dcb4abb9d78b07bc</i><br /><br />Threat actor <b>description</b>: <i>Oregon, United States</i><br />Target victim <b>website</b>: <i>www.noblemountain.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>hi-schoolpharmacy.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12089</link>
<guid>75e0d8c653ea7377eb3a4c55234c6a43</guid>
<pubDate>Tue, 28 Nov 2023 20:41:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hi-schoolpharmacy.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>323e170f70181a52cee6de030c9c4e88a21e1da81ebfb10113abaaba3a74e8b3</i><br /><br />Threat actor <b>description</b>: <i>Hi School Pharmacy has a history founded in the tradition of the classic corner drug store.The original store was opened by Dick Yetman in the early 1900’s. It was named “High School Store” due to its location across the street from Vancouver Hig...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>EDGE-Realty-Partners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12080</link>
<guid>3d73b94a1b27fbac9fcf22ed243127e3</guid>
<pubDate>Tue, 28 Nov 2023 19:28:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>EDGE-Realty-Partners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>feff412ffbde6d87c72ac951af5add035c7ee9c6ec0f9c44f79b9796adf70b15</i><br /><br />Threat actor <b>description</b>: <i>Texas, United States</i><br />Target victim <b>website</b>: <i>www.edge-re.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>SurvTech-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12081</link>
<guid>7cecfe41e1394109d7b8620ca3926166</guid>
<pubDate>Tue, 28 Nov 2023 19:28:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>SurvTech-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>017dcad358ab18110daaf1e78f37e4f578b9f6e299d6f144cc25a7bf364c7849</i><br /><br />Threat actor <b>description</b>: <i>Florida, United States</i><br />Target victim <b>website</b>: <i>www.survtechsolutions.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Retailer-Web-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12083</link>
<guid>7c1192a2afb55fdee2a326ef8de8a3a0</guid>
<pubDate>Tue, 28 Nov 2023 19:27:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Retailer-Web-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e423fb99053abb07d274d2ba0056af605f28228b95fa4fc699ef565aabbfa45</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.nflandisappliances.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Continental-Shipping-Line</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12085</link>
<guid>19aa6c6fb4ba9fcf39e893ff1fd5b5bd</guid>
<pubDate>Tue, 28 Nov 2023 19:26:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Continental-Shipping-Line</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dcf247c2572bfcf7ebae710ed73f48a25879102f927125c3c6365317323c62ce</i><br /><br />Threat actor <b>description</b>: <i>Texas, United States</i><br />Target victim <b>website</b>: <i>www.cslusa.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>MooreCo</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12086</link>
<guid>42a1aa5d08ca708ab153b9bd5429a670</guid>
<pubDate>Tue, 28 Nov 2023 19:25:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>MooreCo</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0f6ddc3264c8686eaa484f08397c96b6b5f8189d7853d0ea1d82f4a5e48b409</i><br /><br />Threat actor <b>description</b>: <i>Texas, United States</i><br />Target victim <b>website</b>: <i>www.moorecoinc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>AMERICAN-INSULATED-GLASS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12077</link>
<guid>c35a4c435947597d8ba9718c4d7d6643</guid>
<pubDate>Tue, 28 Nov 2023 19:24:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>AMERICAN-INSULATED-GLASS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46ecb2b0ce94ef69f10ba510defd3444fb8ff8bd22c730178150b31b129010aa</i><br /><br />Threat actor <b>description</b>: <i>Georgia, United States</i><br />Target victim <b>website</b>: <i>www.aiglass.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Elston-nationwide</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12078</link>
<guid>a41acbd3ffd616b5fd306761bb865d23</guid>
<pubDate>Tue, 28 Nov 2023 19:24:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Elston-nationwide</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1fdb79bab726609dd0bf5eed4981713fb2e53e6c6a229e4249c728d0e4f966e</i><br /><br />Threat actor <b>description</b>: <i>Texas, United States</i><br />Target victim <b>website</b>: <i>www.elstonnationwide.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Thillens</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12079</link>
<guid>62752c5f9ee3bf051713cd8db0961616</guid>
<pubDate>Tue, 28 Nov 2023 19:23:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Thillens</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2654d9e72818c4473f9068827e0390bdf0dfe5ea73630f2cb7961d1607ad5a9</i><br /><br />Threat actor <b>description</b>: <i>Illinois, United States</i><br />Target victim <b>website</b>: <i>www.thillens.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>SinglePoint-Outsourcing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12075</link>
<guid>7495bfe3bcb0defae0b795cb11c19e13</guid>
<pubDate>Tue, 28 Nov 2023 18:40:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>SinglePoint-Outsourcing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63e50b84cd40176753bc53e8865de4eeb366659b0200543a26e5953a7519cc09</i><br /><br />Threat actor <b>description</b>: <i>California, United States</i><br />Target victim <b>website</b>: <i>www.single-point.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>First-Housing-Development</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12074</link>
<guid>44d88dac3da240ef83bff8bdfd61b9aa</guid>
<pubDate>Tue, 28 Nov 2023 16:16:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>First-Housing-Development</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c82db5fe0535e742b5682762b245ff3aeaeb576652db90adad47aac26f0ea2dc</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://firsthousingfl.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Axiom-Construction--Consulting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12070</link>
<guid>5125298703cf51ccf35408683be9055c</guid>
<pubDate>Tue, 28 Nov 2023 11:35:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>Axiom-Construction--Consulting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>51454270d68166d0d64dbdf73eaffccfa0055fd0866499c590f24e0091cfd615</i><br /><br />Threat actor <b>description</b>: <i>Axiom Construction and Consulting is a full-envelope architectural sheet-metal contractor and professional manager of construction services. We deliver a wide range of retail and commercial projects throughout Washington. To date, Axiom has completed over 130 projects that have consisted of over two million square feet of metal siding and roofing.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>NCCU.EDU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12068</link>
<guid>7d50c67063c0736612686f397a294fa4</guid>
<pubDate>Tue, 28 Nov 2023 10:57:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NCCU.EDU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7e1ba2f7e80ad4589c14be5b6dfd950a5edbe6d4b93451a0a98e3a3d8f5c98b3</i><br /><br />Threat actor <b>description</b>: <i>Attention Required! - Cloudflare</i><br />Target victim <b>website</b>: <i>https://www.NCCU.EDU</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>North-Texas-Municipal-Water-District-US</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12066</link>
<guid>0a94eea42ecd117d87eb79c61bdd656e</guid>
<pubDate>Tue, 28 Nov 2023 01:03:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>daixin</b> claims attack for <b>North-Texas-Municipal-Water-District-US</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>92158cdb9eca18a92ebfe5c43685be362d916b32f7dac1e2242666690d13319c</i><br /><br />Threat actor <b>description</b>: <i>The North Texas Municipal Water District (NTMWD) provides vital wholesale water, wastewater and solid waste management services to more than two million people who call North Texas their home.</i><br />Target victim <b>website</b>: <i> https://www.ntmwd.com/</i>]]></description>
<category>daixin</category>
</item>
<item xmlns:dc='ns:1'>
<title>First-Financial-Security</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12065</link>
<guid>a1d4643376bf11b37c51f5c76fcaff79</guid>
<pubDate>Tue, 28 Nov 2023 00:52:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>First-Financial-Security</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29d49dd0e8970befb76c19d54f28ef70ff5f69a2cfddeb3ac20e7e9dd65a30cb</i><br /><br />Threat actor <b>description</b>: <i>First Financial Security (FFS) is a national brokerage agency that works to equip, train, and support licensed insurance representatives to deliver innovative financial products to households across America.</i><br />Target victim <b>website</b>: <i>https://www.firstfinancialsecurity.com/</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>NC-Central-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12062</link>
<guid>60be21f3ebf28ff7b8a692a752d92cf8</guid>
<pubDate>Mon, 27 Nov 2023 22:02:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>NC-Central-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c6712b97949d6beef3a054a8b06dbaf8fd75b64694877270000ad8c30f0ba13</i><br /><br />Threat actor <b>description</b>: <i>NC Central University North Carolina Central University (NCCU), a distinguished institution nestled in the heart of Durham, North Carolina, has earned national acclaim for its unwavering commitment to academic excellence, groundbreaking research opportunities and remarkable achievements in securing grants for innovative projects.</i><br />Target victim <b>website</b>: <i>http://rhysidafohrhyy2aszi7bm32tnjat5xri65fopcxkdfxhi4tidsg7cad.onion?company=63</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Law-Offices-of-John-E-Hill---Press-Release</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12061</link>
<guid>25d0a45ccd9e33b6b1ef8760801b6841</guid>
<pubDate>Mon, 27 Nov 2023 20:52:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Law-Offices-of-John-E-Hill---Press-Release</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>37cf3e56a6f03358bfb414b0998d49bccc732b45f22d7bf0fb51a6bad5ac5775</i><br /><br />Threat actor <b>description</b>: <i>We are dedicated to providing you with the personal service and attention you expect. Our goal is to help you understand your rights and assess your options, so that you can obtain the maximum recovery possible.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>stsaviationgroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12059</link>
<guid>d95935d7d6fbe4895b69f61eaebfc247</guid>
<pubDate>Mon, 27 Nov 2023 19:13:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>stsaviationgroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e3e71d7615afc0597d7329ff3d89c5607e007998a097cfb7df7932b88daee9b</i><br /><br />Threat actor <b>description</b>: <i>STS Aviation Group is a service provider for the aviation industry. The company was founded in 1986 and is headquartered in Jensen Beach, Florida.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>InstantWhip</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12055</link>
<guid>723e8f97fde15f7a8d5ff8d558ea3f16</guid>
<pubDate>Mon, 27 Nov 2023 17:42:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>InstantWhip</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8f77a10de2b75339288f2f5171ce6097867fe7374f3f37036b22deea052149ca</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://instantwhip.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fischione-Instruments-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12057</link>
<guid>8b910e56415eb6bd1037b46e6e619c58</guid>
<pubDate>Mon, 27 Nov 2023 17:40:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Fischione-Instruments-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b31508ae8b7623062b19b47e43827ea0cc017292ae12a1dabce2ae44e60f196d</i><br /><br />Threat actor <b>description</b>: <i>Fischione Instruments has earned a reputation as a trusted leader in electron microscopy sample preparation for material characterization and as a developer of innovative tools for both physical and life sciences. </i><br />Target victim <b>website</b>: <i>https://www.fischione.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Legacy-Mail-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12058</link>
<guid>de56596363329673fab1b93be2210df7</guid>
<pubDate>Mon, 27 Nov 2023 17:40:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Legacy-Mail-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>705084ef3d486cc53222b1f26276b907d99050a64ad6d557e2ed903b438b3384</i><br /><br />Threat actor <b>description</b>: <i>The company categorized under Mailing and Shipping Services. It was established in 2016 and incorporated in IA. The data we got from them will be uploaded here within this week. There are more than 40000 files will be available for downloading and studying. Please wait for updates.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>carrellblanton.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12054</link>
<guid>db33fd3fae645e90637fd0d498958c41</guid>
<pubDate>Mon, 27 Nov 2023 16:23:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>carrellblanton.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>818cdde76623048b9ac860d82b546d88aca922de8ca9ad4bf3e1a485ab1d7702</i><br /><br />Threat actor <b>description</b>: <i>FOUR LOCATIONS. ONE FIRM. As a boutique law firm, specializing in estate planning, trust and estate administration, and elder law, we are dedicated to serving all our clients with a high level of quality, effort, and creativity. Pulling...</i><br />Target victim <b>website</b>: <i>carrellblanton.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>Plastic-Molding-Technology-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12053</link>
<guid>8b8f66308ee7c3ad5d1031a5721f0753</guid>
<pubDate>Mon, 27 Nov 2023 16:10:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Plastic-Molding-Technology-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>23fd4730ab12e7952acd2023227c65fc5e02ec5e7ff4811192bfda5e01dc77fd</i><br /><br />Threat actor <b>description</b>: <i>Plastic Molding Technology Inc. (PMT) is an ISO 9001- and IATF 16949-certified manufacturer of precision-engineered, injection-molded plastic components, producing over 150 million parts per year. The company provides a single-source solution from engineering.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Huber-Heights</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12051</link>
<guid>50e1781e60d725365a74d585a2734062</guid>
<pubDate>Mon, 27 Nov 2023 14:36:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Huber-Heights</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a672a4da5146559a8cb24db3e07a87136ec770b6b6f3ecd6e284762bc12fb56</i><br /><br />Threat actor <b>description</b>: <i>The City of Huber Heights and United Water are committed to providing reliable and efficient water and wastewater utility services to our customers</i><br />Target victim <b>website</b>: <i>http://www.hhoh.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Katsky-Korins</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12047</link>
<guid>e99298b28ed320343949b7631bebe7e5</guid>
<pubDate>Sun, 26 Nov 2023 14:41:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Katsky-Korins</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf72637bfa473769c0bdc587a5ded60e8b5e3a70b84dd0c395bf23d55d1b33b8</i><br /><br />Threat actor <b>description</b>: <i>PREVIEW</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Albert-Righter--Tittmann-architechts-inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12038</link>
<guid>22d0c530efd7037118d2011a68444823</guid>
<pubDate>Fri, 24 Nov 2023 17:44:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>donutleaks</b> claims attack for <b>Albert-Righter--Tittmann-architechts-inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>95353ce36b977dbfde15aa59223fd2f4e9aafbe0cf5c632e11fb59e1e715b35e</i><br /><br />Threat actor <b>description</b>: <i>Full amount of his data will upload to our torrent server. Here will be placed magnet url and torrent file and full listing also. Update coming soon https://www.artarchitects.com/…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>donutleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>nrtw.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12036</link>
<guid>37241d744c96e57d29332979a23b8c5c</guid>
<pubDate>Fri, 24 Nov 2023 16:11:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>nrtw.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0445940144521bba029c132ed1f5bc771dcd37e02f55f56cf8be779c115ed006</i><br /><br />Threat actor <b>description</b>: <i>The National Right to Work Legal Defense Foundation is a nonprofit, charitable organization providing free legal aid to employees whose human or civil rights have been violated by compulsory unionism abuses.HR data, insurances data, legal data, p...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lincoln-Office</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12028</link>
<guid>cb13de2e50ac695aad8fbfe59e1ba869</guid>
<pubDate>Fri, 24 Nov 2023 14:35:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Lincoln-Office</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4f828d33fa13f8f2385b8b4d586d455dadd27bac531bbdc87f5c1dc685aeb74</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.lincolnoffice.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Spectrum-Solutions-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12025</link>
<guid>6fbcc3ce3f65b647deed9b9e489b584e</guid>
<pubDate>Fri, 24 Nov 2023 09:59:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Spectrum-Solutions-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6718ac8dfd38b53ab7609355f4b519f55b61df1365b048f13a839ba5e3ae52fb</i><br /><br />Threat actor <b>description</b>: <i>Our Story Since 2006, Spectrum Solutions has been a single-source provider of high-quality, direct-to-consumer product innovation & global fulfillment. For the last decade, Spectrum has found a specialized focus in the medical science sector that includes the engineering and manufacturing of industry innovating medical devices. Spectrum’s innovation has made such an impact within the life science sector it has been honored with several prestigious awards, received incredible industry and private sector recognition, and is directly responsible for the birth of a new billion-dollar saliva diagnostic industry.  We engineer and have medical device contract manufacturing, actively participate in medical science research programs, develop, and license diagnostic testing assays, we are uniquely able to offer our contract manufacturing and MedTech outsourcing customers measurable process optimization, a shorter time to market window, unmatched scalability, and full product development-to-delivery solutions.  Sometimes a fresh perspective on something we thought we understood, can open the door of new possibilities we hadn’t even considered. Focused on pioneering medical device innovation, Spectrum Solutions commissioned the breakthrough saliva study that dared to suggest a complete transformation in viral PCR testing protocols to an easier, pain-free, non-invasive, 99.998% accurate, and infinitely safer option using saliva (spit).  Saliva’s recent MVP status is a new development even though saliva’s been used in diagnostics for more than 2000 years. Analysis of the properties in saliva using biochemical and physiological methodologies are traced back to at least a century ago. Unlike blood, saliva analysis looks at the cellular level (the biologically active compounds), making it a better representative of what is clinically relevant.  Years from now, the medical community, patients, and history books will look back on 2020 and COVID-19 testing as the diagnostic turning point in favor of saliva.  In affirmation of this diagnostic innovation pivot, a speedy and unprecedented FDA response secured the first Emergency Use Authorization (EUA) early March 2020, for the use of saliva, solely collected using the Spectrum SDNA-1000, as a diagnostic biomaterial for COVID-19 testing.  A few weeks later, requests for additional product and process information to further validate safety and sample efficacy in extended storage and transport scenarios. The device’s remarkable performance locked in the FDA’s first direct-to-patient at-home testing authorization for the self-collection of saliva. A timely decision that drove product integration both nationwide and globally.  Saliva collected using a Spectrum bio-sample collection system creates the most robust and safest testing biomaterial. We believe when you bridge the gap between science and real medical solutions you deliver innovation with the practical power to impact and change outcomes. Our products, services, and expertise are paving the way and pioneering a new era of direct-to-consumer health & wellness, point-of-care, and at-home molecular diagnostic testing.</i><br />Target victim <b>website</b>: <i>https://spectrumsolution.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Back-Roads</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12018</link>
<guid>66ef61e290a84099441f2a95ebfce8d5</guid>
<pubDate>Fri, 24 Nov 2023 05:02:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Back-Roads</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34612e0ec8dd23e19bee2eb83a816b9e4d3181ef9be036d9a38ae94476b9ed8e</i><br /><br />Threat actor <b>description</b>: <i>1% LEAKED</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Equaldex</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12019</link>
<guid>172188c0dacb487075bdc0c9afd757b2</guid>
<pubDate>Fri, 24 Nov 2023 05:01:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Equaldex</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0f9004b1db20ce867512c84681f25a7dd7f97f62ecfb535f32b25778d705a08</i><br /><br />Threat actor <b>description</b>: <i>100% LEAKED</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vanderbilt-University-Medical-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12020</link>
<guid>dac3de6c87dadcc7bd2c9a8326afc9ac</guid>
<pubDate>Fri, 24 Nov 2023 05:01:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Vanderbilt-University-Medical-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b2d13fb9c0791e45a9096a4f1d4e28381380568a29b7cc75f6a6de6abdcb8d77</i><br /><br />Threat actor <b>description</b>: <i>100% LEAKED</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>Standard-Filter</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12021</link>
<guid>49ca03822497d26a3943d5084ed59130</guid>
<pubDate>Fri, 24 Nov 2023 05:00:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>meow</b> claims attack for <b>Standard-Filter</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b5aa86cacb5c90a12666af0ed109cc6b1f4181658b5f750e24f2c5d9c6f597c1</i><br /><br />Threat actor <b>description</b>: <i>PREVIEW</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>meow</category>
</item>
<item xmlns:dc='ns:1'>
<title>des-ae.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12010</link>
<guid>c4b108f53550f1d5967305a9a8140ddd</guid>
<pubDate>Thu, 23 Nov 2023 17:32:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>des-ae.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c471ace2e2702df158a245961163c2184eeb963c95e7b04e429f66bfccf7cf6</i><br /><br />Threat actor <b>description</b>: <i>As an integrated design firm, we collaborate between disciplines, from architecture and interior design to planning and engineering. We are here to cross boundaries. The clients we attract span technology, education, life science, healthcare, and rea...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>SWEETLAKE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12008</link>
<guid>b6c8cf4c587f2ead0c08955ee6e2502b</guid>
<pubDate>Thu, 23 Nov 2023 13:28:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SWEETLAKE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a5b2b6d3aad5e630f6fba4dd1b20ac703428999c58b2705da3c5f034560625bc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.SWEETLAKE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ingo-Money-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11999</link>
<guid>0f34314d2dd0c1b9311cb8f40eb4f255</guid>
<pubDate>Thu, 23 Nov 2023 08:36:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Ingo-Money-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2aee9a1b0927df4a2007e599efc26e32557843f36fa7ada370649787f3b6e95a</i><br /><br />Threat actor <b>description</b>: <i>On a Mission to Make Money Movement
Instant, Digital and Secure
Since 2001, we have focused on a singular mission: to give people and businesses instant, digital and secure access to their money...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nicole-Miller</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12000</link>
<guid>831bb3dd5d09fb053fc65257e81b28f8</guid>
<pubDate>Thu, 23 Nov 2023 08:35:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Nicole-Miller</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9450989d773ae7ada0253b30741936a811bb94bc0f5442cb5aaee5d6252c124e</i><br /><br />Threat actor <b>description</b>: <i>NICOLE MILLER is a global fashion and lifestyle brand headquartered in New York City. Founded in 1982, the iconic brand has grown to be one of the premier names in American fashion. With an emphasis...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pro-Metals-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12001</link>
<guid>ba3abb2c0cb388f3cd4e77de3c78ff51</guid>
<pubDate>Thu, 23 Nov 2023 08:35:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Pro-Metals-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc58b7d4ccaddb3c0fbdccdb2cd24da33e721e3321878021c5dbb765c46f2f2f</i><br /><br />Threat actor <b>description</b>: <i>When John Olivarez and a business partner started Pro Metals in 2007 it was located in a small 2,400 square foot building in Kansas City, Kansas. Mr. Olivarez took sole ownership of Pro Metals in...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Springfield-Area-Chamber-of-Commerce</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11995</link>
<guid>c782079784c74ffdf81ee12ec6b74512</guid>
<pubDate>Thu, 23 Nov 2023 08:34:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Springfield-Area-Chamber-of-Commerce</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a5d32d3a58533f195c8b85739094392f509d3428b267565ef6652142bf0b1913</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1919 and headquartered in Springfield, Missouri, Springfield Area Chamber of Commerce is a private, not-for-profit organization. The organization serves as the principal advocate for...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trylon-TSF-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11996</link>
<guid>29f3a1e25bd95e7d181c7c3e12fd9321</guid>
<pubDate>Thu, 23 Nov 2023 08:34:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Trylon-TSF-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b86b0ed0ac3c846d03a2cae2177a4658470cc36c8d7649a2b037e3592e61454f</i><br /><br />Threat actor <b>description</b>: <i>Trylon has been supplying innovative, cell site steel infrastructure, as well as site acquisition, engineering services, installation and technical services for wireless networks since the...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fidelity-National-Financial</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11994</link>
<guid>91db811b080f2bcfd928589f2414b7aa</guid>
<pubDate>Wed, 22 Nov 2023 23:44:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Fidelity-National-Financial</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8393fc36dc7ee3cdc82298cfd56dde83f7c2db5f76b3428b81e363aa95b8769</i><br /><br />Threat actor <b>description</b>: <i>Fidelity National Financial (NYSE: FNF) is the nation's largest group of title companies and underwriters in the country and, collectively, we issue more title insurance policies than anyone else in the United States.</i><br />Target victim <b>website</b>: <i>https://fnf.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>McHale-Landscape-Design</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11993</link>
<guid>8f87878fd33e07ea418c37fa7ac69b73</guid>
<pubDate>Wed, 22 Nov 2023 22:31:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>McHale-Landscape-Design</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd8f39bb5ac997d4b9703495db6036e143d62aeae731f0b72ebe1a5574841db0</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.mchalelandscape.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Custom-Engineering-Fabrication-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11992</link>
<guid>949686ecef4ee20a62d16b4a2d7ccca3</guid>
<pubDate>Wed, 22 Nov 2023 17:37:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Custom-Engineering-Fabrication-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9132b4e191113cae7b69f11bdea8582eb2af103b2ce2d027a8f1b5e61c108f01</i><br /><br />Threat actor <b>description</b>: <i>Custom Engineering & Fabrication is a leading provider of manufacturing solutions to a wide variety of industries, including asphalt, scrap recycling, steel, glass, foam, exterior doors, wood, mineral wool, and paper. These tricky guys lost about 700Gb of their data and don't want it back. Many business docs with personal information there are in the archives. We will share the files here with you soon. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>IQ-Supply-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11990</link>
<guid>ff73f9b77514c1bfe14ce8e1579a7b9f</guid>
<pubDate>Wed, 22 Nov 2023 16:07:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>IQ-Supply-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>444d2e557b46d3ca093f6c53c88090ba63fd3fcdb79c6fe04137ca73b49438c0</i><br /><br />Threat actor <b>description</b>: <i>IQ Supply Solutions was founded in November 2017. As a women owned company we have expanded our business by being dedicated to giving our customers the very best service with a focus on detail, dependability and uniqueness. A few Gb of data including personal information will be uploaded soon. The women decided to show their real dedication to their clients.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Community-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11988</link>
<guid>05751401fb782aa43ddf0bc31c121b7b</guid>
<pubDate>Wed, 22 Nov 2023 10:24:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Community-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f93a59effd9ecb1cd9d6e78e12c690d367a381d1b0ae7783ad5c5169bd43fcf3</i><br /><br />Threat actor <b>description</b>: <i>Community Hospital - founded in 1926 and headquartered in Tallassee, Alabama, Community Hospital provides healthcare services for the residents of Tallassee and surrounding areas.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>therobisongroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11986</link>
<guid>b7c386cf600f4649ccbaf2136bf37a97</guid>
<pubDate>Wed, 22 Nov 2023 09:59:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>therobisongroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b4d53519b6b4c65edab67e13981db43965ede0e13da16560e029a670568538f</i><br /><br />Threat actor <b>description</b>: <i>The Robison Group is an agency of professional investigators and support teams offering surveillance, SIU, and a comprehensive list of desktop investigation services. We adhere to the philosophy that great service and extraordinary product tell our s...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hills-Legal-Group-Ltd</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11983</link>
<guid>20aa45d37b34428587d43bf5aa2d6db7</guid>
<pubDate>Wed, 22 Nov 2023 07:10:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Hills-Legal-Group-Ltd</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4dcbed83913114f98d71735d3ab2ff4b8770b57303c30d5b3d9a0e12d703dc2d</i><br /><br />Threat actor <b>description</b>: <i>For over 30 years, we have focused our practice in the field of litigation, from trials to appellate level representation. Every case deserves a thorough defense and we are committed to providing our clients with experienced, aggressive, and economical representation.   No case is too small to defend and each gets the attention it deserves. For our work, the firm has received an AV rating from Martindale Hubbell, connoting a “very high to preeminent” rating on both our legal abilities and ethical standards. We pride ourselves on the recognition we have received from the legal community and deliver respected representation to our clients, day in and day out. hillslegal.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>floydskerenlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11973</link>
<guid>f9b625bde54bf6a9c3d40501c0d21f93</guid>
<pubDate>Tue, 21 Nov 2023 20:30:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>floydskerenlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb008e8353536d77251f2269f57225f8d0471dd619121bd2f2c5a5817e8d599c</i><br /><br />Threat actor <b>description</b>: <i>LAW FIRM890GBClient databases, cases containing confidential data, various legal documents, many results of medical research of clients, judicial acts, many documents marked confidential, proposals on various cases, many correspondence by mail...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>bnpmedia.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11974</link>
<guid>6b9938b3a148badea27e07af4ead5551</guid>
<pubDate>Tue, 21 Nov 2023 20:29:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>bnpmedia.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e2da6a455c9a955ff6ff3b90a3fc9b892c17ab0edac2072ea981baab32f46ec</i><br /><br />Threat actor <b>description</b>: <i>Our services. Our services focus on some of your most important business and marketing needs. From infusing your decisions with the confidence that high-quality research provides, to developing authoritative, industry-relevant content or continuing e...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Petersen-Health-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11971</link>
<guid>e702100aa47b752bd7099ed3c9d9ea33</guid>
<pubDate>Tue, 21 Nov 2023 17:44:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>Petersen-Health-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87573851d7e866aca73226eb50eaf58e6d811314b7b478c56355eaa001f7743e</i><br /><br />Threat actor <b>description</b>: <i>It is the mission of each Petersen Health Care facility to be great community partners. All Petersen Health Care homes are encouraged to host community activities and participate in fundraisers for the good of the community and local organizations. Petersen Health Care is recognized as a leader in the industry for community participation.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Paul-Stuart</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11972</link>
<guid>6d79e030371e47e6231337805a7a2685</guid>
<pubDate>Tue, 21 Nov 2023 17:44:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>Paul-Stuart</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3271c3c681085dcb8ed410b4f7fb34b920fa5483277eafc3b45069ff69795a05</i><br /><br />Threat actor <b>description</b>: <i>Paul Stuart has lasted the test of time being one of the only remaining haberdashers on Madison Avenue. We credit our continued success to the desire to stay true to our roots while innovating with the times. Renowned for expert craftsmanship, thoughtful design using materials and fabrics sourced from the finest mills around the world, Paul Stuart combines Savile Row, Old Hollywood and classic New York to create timeless American classics with contemporary sophistication.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crystal-Lake-Health-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11969</link>
<guid>f7eb745a5f9b3016b083019da91b5f74</guid>
<pubDate>Tue, 21 Nov 2023 16:07:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Crystal-Lake-Health-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbc70ac991577333979d8883830d1c99a0e217c1aa1a0fea2aef0996da01997f</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://crystallakehealthcenters.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>phihydraulics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11968</link>
<guid>13d8532225dea4fca8e0ebdfb27b83e4</guid>
<pubDate>Tue, 21 Nov 2023 14:26:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>phihydraulics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee3187b46cb36b257ec9698f8085effc6c5e59cba03998f99bb3d07b636207f4</i><br /><br />Threat actor <b>description</b>: <i>PHI, a division of Tulip Corporation, was originally founded during the early 1940's as Preco Incorporated of Los Angeles, a maker of bench-type molding presses for laminating documents and identification cards. Since those early beginnings.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Growers-Express</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11959</link>
<guid>b02980b0db1585859d77d1f033e23f42</guid>
<pubDate>Tue, 21 Nov 2023 08:43:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Growers-Express</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd4a5fd2ba0412222bdab539a4157de4371d5d16d582862a96e6e4b2244654d2</i><br /><br />Threat actor <b>description</b>: <i>Growers Express was founded in 1987 by South Monterey County, California growers David Gill, Steven Gill, Johnny Gill, John Romans, Stan Pura, Mike Hitchcock, Dennis Frudden and Ron Frudden, as well as head lettuce industry icon Joe Puga Sr., who all held the same values—growing and providing their own premium quality products, ensuring a consistent year-round supply, and offering superior customer service.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>P</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11961</link>
<guid>0a97e4f47718632c556e9ac591d5f3c2</guid>
<pubDate>Tue, 21 Nov 2023 08:42:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>P</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c838c4621e77b76b1730165af85ed0ab4a86841dcbb3ded4dd98975078b6b25</i><br /><br />Threat actor <b>description</b>: <i>The leading protein manufacturer focused on powder based functional and nutritional solutions for the food.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>P-T</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11962</link>
<guid>e8c1bdc555e17fd06b44ea4d3b4adbda</guid>
<pubDate>Tue, 21 Nov 2023 08:42:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>P-T</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>08a59e31320fb05fdba348c4afda248e325e5de7a5a0254ca7a162e03a29ada6</i><br /><br />Threat actor <b>description</b>: <i>The manufacturer of plastic components in various fields (aerospace, medical, energy, industry).</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rc-Moore-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11955</link>
<guid>5647bde37cc5842544d19e224e75766f</guid>
<pubDate>Tue, 21 Nov 2023 02:46:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Rc-Moore-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a590ea2c0d4b36424e3add8c06dba201eb4a3f4afc1f80864b16efe04b23c686</i><br /><br />Threat actor <b>description</b>: <i>Headquartered in Scarborough, ME., R.C. Moore has created a substantial presence on the east coast and established themselves as a trusted partner in logistics for over 60 ...</i><br />Target victim <b>website</b>: <i>https://rcmoore.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>nybravestfcu.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11953</link>
<guid>c6a024f688cd57cf6fd4495dbc50e353</guid>
<pubDate>Mon, 20 Nov 2023 22:01:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>nybravestfcu.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eb84309cb157e0bf85a0f8c421edc90da96ecd9c2ddf3f7eb21f1b4302fe2180</i><br /><br />Threat actor <b>description</b>: <i>Albany branch</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hampton-Newport-News-CSB</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11952</link>
<guid>b8c78ee23d4f42c6c58cede44fedb0cd</guid>
<pubDate>Mon, 20 Nov 2023 21:59:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Hampton-Newport-News-CSB</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8167f878582596bff00cda460588e8b04d1a27cd0a5855a1b1bdf8a1ca04f28</i><br /><br />Threat actor <b>description</b>: <i>Hampton Newport News CSB is a drug rehab and alcohol rehabilitation center that is located at 2351 Terminal Avenue Newport News, VA 23607</i><br />Target victim <b>website</b>: <i>https://www.hnncsb.org/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Barnett-Millworks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11949</link>
<guid>3463ba87bdc01378649630ed94f57eef</guid>
<pubDate>Mon, 20 Nov 2023 20:38:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>knight</b> claims attack for <b>Barnett-Millworks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>55f170c6252f2ba74156a1da795cd6fa1230f11b763c6efbc191e4a0a28f24dc</i><br /><br />Threat actor <b>description</b>: <i>Your network has been locked by us.350GB of data has been downloaded to our servers.We're waiting for you in the chat room to negotiate.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>knight</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dreyfuss-Williams--Associates-Co.-LPA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11950</link>
<guid>3d816b6235b7f8751305f990bdb8c887</guid>
<pubDate>Mon, 20 Nov 2023 20:38:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>knight</b> claims attack for <b>Dreyfuss-Williams--Associates-Co.-LPA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b98d521d5b271558b4c6fd2948c23e5a27bac5e70a2fe6d55cca1075e6d4d38f</i><br /><br />Threat actor <b>description</b>: <i>Domain:www.dreyfuss.com300GB+ of data has been downloaded from Dreyfuss100k+ documents containing information on USA residents including SSN DOB.We wait for you on our chat to take this further if not then we will upload data for the world to see.Disclose a portion of the data : http://r6chas4skrvna72fg5ui3cqkke4fnpinsskvlo57aiolrrdb3r777mqd.onion/dreyfuss/enjoy.zipEnjoy!proof1.png 7.1 KBproof2.png 83.61 KBproof3.png 191.75 KB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>knight</category>
</item>
<item xmlns:dc='ns:1'>
<title>onyourmark.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11947</link>
<guid>211cbc6c7d410d6372ec40eda30e8baa</guid>
<pubDate>Mon, 20 Nov 2023 15:58:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>onyourmark.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b8eb4107367ba44ded4a2fda4a516679f5137c9f3b1a6db208dd44c5d1a9719</i><br /><br />Threat actor <b>description</b>: <i>The mission of On Your Mark is to provide innovative and comprehensive community-based service to people with intellectual and developmental disabilities across their lifespan. We are committed to helping each individual experience the highest qualit...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>arenaproducts.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11944</link>
<guid>c7bf0b7c1a86d5eb3be2c722cf2cf746</guid>
<pubDate>Mon, 20 Nov 2023 14:27:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>arenaproducts.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>435eccc117532771f6f2ee5fcb7821076109a92c182d237f4a5f481924215a64</i><br /><br />Threat actor <b>description</b>: <i>Arena Products is a leading packaging, design and pooling company in North America. With 30 years of experience, we provide a full spectrum of services for the design and development of customized reusable transport packaging systems. Solutions focused and results driven, Arena Products is a company that is differentiated from the rest. Every day, we help our customers cut waste and improve their bottom line by designing, testing, building and pooling custom, reusable transport systems. With our unique approach to cooperative development, Arena Products understands all aspects in the design, development and implementation of reusable transport packaging systems. Through integrated design and engineering to materials and fabrication, we are able to focus on improving efficiency and packaging sustainability, while adding measurable ROI for all involved. An integral part of what we do is providing asset management and logistics infrastructure for every product offering, which range from rugged, space-saving containers to new pallet designs. Combined with our proven track record of innovation, this capability keeps us at the forefront of an industry that requires speed and ingenuity at every level.SITE: www.arenaproducts.com Address : 100 Metro Park Rochester, NY 14623 | (844) 762-0127FULL DATA SIZE: 413gb 1. HR 2. Finance 3. Accounting 4. Confidentiality 5. Customer Files 6. Users data: personal users file(employee forms, SSN, DL employee data and etc)</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>brownintegratedlogistics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11942</link>
<guid>c93e07f14a29ef0aeb9ffb75fbd148e3</guid>
<pubDate>Mon, 20 Nov 2023 12:48:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>brownintegratedlogistics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53bda5f2b387f96a9bf63bbb3ee0c0f71155f56f0d7bdf6cf832fb6f8fb55335</i><br /><br />Threat actor <b>description</b>: <i>Brown Integrated Logistics, through its subsidiaries Brown Logistics Services, West Logistics, Brown Fleet Services and Brown Trucking provides a suite of world-class services including third party logistics, brokerage, warehousing, fleet maintenance...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hahn--Clay-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11940</link>
<guid>7866457eb90d2c8f68d6c9cf461be3b2</guid>
<pubDate>Mon, 20 Nov 2023 05:27:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Hahn--Clay-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d84ca15ba7acba55be046b3bce3cfb42cd30b718f08d5b7a75dafd8135d7966</i><br /><br />Threat actor <b>description</b>: <i>We provide fabrication, machining, repair services and turnaround services to most industrial markets including: chemical processing, oil/gas, military, food processing, power generation and marine. hahnclay.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>U.L.-COLEMAN-COMPANIES</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11939</link>
<guid>412f1f1340a245ffec9fb8d47654da57</guid>
<pubDate>Sun, 19 Nov 2023 20:27:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>U.L.-COLEMAN-COMPANIES</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb36551d7c1b1e985ea16fe03a2aae0e789e0a76c001b34c0a45983de03e32dc</i><br /><br />Threat actor <b>description</b>: <i>Founded by CEO, Linc Coleman in 1973, U. L. Coleman Companies has grown to become a leading full-service real estate group providing diverse product expertise for commercial and multifamily residential products. In providing these services, we utilize a fully integrated approach; one that respects the environment and social and economic needs of communities. The growth of our companies has created employment opportunities for more than 150 team members in various departments and locations. Our approach combines professional planning, aesthetic appeal, and quality service. From land development and construction, to property management, U. L. Coleman Companies offer attractive, affordable working and living environments and sound investment opportunities. With its corporate headquarters located in Shreveport, Louisiana, U. L. Coleman Properties, LLC was the first commercial real estate company in North Louisiana to receive the Accredited Management Organization® (AMO®) designation. Our management portfolio includes over 2.7 million square feet of office buildings, shopping centers, industrial properties, mini-storage facilities and multifamily communities. Whether you are looking for the right office, retail, industrial environment, multifamily community for your lifestyle, or a professional, accredited organization to manage your real estate investments, U. L. Coleman Companies will exceed your expectations in providing successful solutions and long term results.</i><br />Target victim <b>website</b>: <i>https://www.ulcoleman.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Autonomous-Flight---autonomousfly</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11937</link>
<guid>24aef8cb3281a2422a59b51659f1ad2e</guid>
<pubDate>Sun, 19 Nov 2023 07:02:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Autonomous-Flight---autonomousfly</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>526f313c05580961fbba3218f5538bac6f32424e8bc43e1d59e1ce91b574358a</i><br /><br />Threat actor <b>description</b>: <i> Incorporated in 2012, Autonomous Flight Technologies (AFT) began as a research and development firm specializing in manufacturing and progressing advancement for automated Unmanned Aircraft Systems (UAS) for use in the United States. Originally based in Roanoke, Virginia; AFT has worked with numerous companies throughout the eastern seaboard as well as many colleges including Virginia Tech  In October of 2015, AFT received an exemption status from the FAA to conduct commercial UAS operations throughout the United States. Our exemption, No. 13319; was approved for the following areas of work: Industrial Mapping, Agricultural Mapping, Research and Development, Emergency Response and Operations Training, sUAS Operator Training, Real Estate Photography and Cinematography, and Product Demonstrations.  Since receiving our exemption status, AFT is committed to providing UAS flight operations for the above-mentioned industries. Our work has evolved our company into two basic departments:      The first being a full audio and visual production company. We have provided production for college campuses, private corporations, professional design and cinematography firms and film companies, as well as news and media outlets.      The second department is geared towards industry specific needs. Whether it being aggregate assessments, construction BIM progression and assessment, industrial inspection and mapping, engineering firms, SARS and emergency management evaluation, or agricultural inspection; we have yet to find a specific industry the does not benefit from the services we provide.   Early in the beginning of 2016, AFT joined and supported fellow UAS industries along with Virginia Tech’s (VTTI) department to create a local AUVSI charter for the SWVA corridor. Since founded, Ridge & Valley AUVSI, has worked diligently with Gov. Terry McAuliffe to establish our SWVA as a “UAS Hotbed” advocating the advancement of UAS industry in the area. In doing so, the charter recently presented figures estimating local UAS industry will create more than 3500 new jobs and adding $2.7 billion to the state’s local economy within the first decade.  Autonomous Flight Technologies, Inc (AFT) is a privately owned and operated company specializing in the advancement of small scale aircraft related to the UAV/UAS industry. For over 15 years we have stayed in the forefront of this expanding industry by obtaining, flying, and researching all aspects regarding small unmanned aircraft carrying payloads of up to 10 pounds/ 4.5 kilograms.  AFT is fully authorized to operate UAS commercially across the United States. Our crews offer everything from professional filming and photography to industry specific mapping and monitoring.  No job too big or small, having multiple crews allows us to  serve multiple clients across the country.  Autonomous Flight Technologies  is working diligently to create industry specific packages to suit any and all needs. Autonomous mapping, environmental monitoring, surveillance, aerial photography and filming, and much more. You provide us with the your aerial needs and we can build the aircraft to suit.</i><br />Target victim <b>website</b>: <i>https://www.autonomousflight.us/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>generalrefrig.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11931</link>
<guid>0b36451530d9491114523d4b66253837</guid>
<pubDate>Sat, 18 Nov 2023 08:35:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>generalrefrig.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79e0866c0ec74328520d3a40b3eb3c903bde8a06244a4fe41dd7047c52471c3f</i><br /><br />Threat actor <b>description</b>: <i>General Refrigeration Company is a leader in the industrial refrigeration industry serving customers throughout the eastern United States. We have the expertise and ability to support you in all of your refrigeration design and engineering, construct...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>PruittHealth</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11929</link>
<guid>43c5b26b6738782b9e45719d8a45db1b</guid>
<pubDate>Sat, 18 Nov 2023 04:12:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>PruittHealth</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2a4d6f7f63b2913d7b1d35dcc37942f78a95fceb3f57d924aa45e84fcf31835</i><br /><br />Threat actor <b>description</b>: <i>A family-owned organization for more than 50 years, PruittHealth provides a seamless network of post-acute care services and resources, offering skilled nursing care, home ...</i><br />Target victim <b>website</b>: <i>https://pruitthealth.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>ajcfood.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11926</link>
<guid>22bc03237452c8b64f1380e2a11d84f7</guid>
<pubDate>Fri, 17 Nov 2023 22:27:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ajcfood.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cced62139d6faebb4c158934f4d83f231bd923c02370adc2112f804c14613c8a</i><br /><br />Threat actor <b>description</b>: <i>AJC International is a global leader in the procurement and sale of frozen meat, poultry, pork, seafood and vegetable products, and their respective derivatives, with 50+ years of experience.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>McCray--Withrow-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11925</link>
<guid>5f04c04810f633dd0b4ab8e18efb66cc</guid>
<pubDate>Fri, 17 Nov 2023 22:17:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>McCray--Withrow-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fef27b1a387e9aec00d87184b726eddc4eb45844b33d7145184dad79d09cd079</i><br /><br />Threat actor <b>description</b>: <i>Olivetti, McCray & Withrow are Hilton Head Island Attorneys practicing in real estate, estate planning, probate, personal injury & medical malpractice. The company's office is located at 52 New Orleans Rd Fl 3, Hilton Head Island, South Carolina, 29928, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kwik-Industries-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11922</link>
<guid>d42e579306a4869517f243e83a3eab4b</guid>
<pubDate>Fri, 17 Nov 2023 16:11:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Kwik-Industries-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df3bb896ab5c79f6a276933ddb1eddfac9c36373f92b1289a8495044063ac0a3</i><br /><br />Threat actor <b>description</b>: <i>Kwik Industries provides both full-service and self-service options for automotive lube & tune, car washes, dry cleaners and laundry care. We help you find, build, stock an...</i><br />Target victim <b>website</b>: <i>https://www.kwikind.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>WellLife-Network-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11920</link>
<guid>f0d48bde60d407c45af7ca00d1ef927b</guid>
<pubDate>Fri, 17 Nov 2023 16:01:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>WellLife-Network-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4074e527c50c3156323f9a5259c21df3e7887f1f440ac309e33a93e57103dbf3</i><br /><br />Threat actor <b>description</b>: <i>Today, with an annual operating budget of $100 million, a workforce of 1,800 staff, interns and volunteers and an affiliate subsidiary company, WellLife Network delivers critical services in the...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Select-Education-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11918</link>
<guid>ded081fcbbe6cda656e5bc51dfc6bbfa</guid>
<pubDate>Fri, 17 Nov 2023 13:04:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Select-Education-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec63ae6da72775953d1bc44d3360e84f7536bdfcf9573b19f98906eb35537569</i><br /><br />Threat actor <b>description</b>: <i>5601 Stoddard Rd, Modesto, California, 95356, United States</i><br />Target victim <b>website</b>: <i>http://www.selecteducationgroup.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Consilium-staffing-llc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11907</link>
<guid>ad086f59924fffe0773f8d0ca22ea712</guid>
<pubDate>Fri, 17 Nov 2023 08:11:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Consilium-staffing-llc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a393a8b9a90cf7b4796d678b480353b3e9d3f84cdfc6e95f464bf7be66809a0</i><br /><br />Threat actor <b>description</b>: <i>Consilium Staffing is a locum tenens company that connects contract healthcare providers with understaffed medical facilities. The company offers locum tenens, healthcare staffing, physician...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>planethomelending.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11882</link>
<guid>fa2246fa0fdf0d3e270c86767b77ba1b</guid>
<pubDate>Thu, 16 Nov 2023 16:31:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>planethomelending.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>67127a19f74e38736e65818cc6d72aedbcbac97f8d243b70410421aef7602397</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2007, Planet Home Lending is a privately held mortgage lender with multiple business channels uniquely positioned to provide competitive products and services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>communitydentalme.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11883</link>
<guid>c4525d4b0ad85bb7ed6e5f31fbe008ce</guid>
<pubDate>Thu, 16 Nov 2023 14:32:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>communitydentalme.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>634f26b0fdb640322de446b03b2f68917692be9b133502e259cb0caffd50b14e</i><br /><br />Threat actor <b>description</b>: <i>Our mission is to improve the lives of children and adults in our communities by providing needed, accessible, comprehensive, quality oral health care.We have personal data of clients, accounting information, medical data of clients, their medica...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>FEAM-Maintenance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11879</link>
<guid>5226ac4e0683ad4f37000ec897761687</guid>
<pubDate>Thu, 16 Nov 2023 13:01:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>FEAM-Maintenance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d8796ed57e686c1ea4af65901854384872f68a8b7f021cd7fe95de3b301d3341</i><br /><br />Threat actor <b>description</b>: <i>About  The legacy of FEAM AERO began when a two-man aircraft maintenance operation set out to relentlessly accomplish one thing: to become the world’s leader in aircraft line maintenance services.  30 years later, FEAM has accomplished exactly that, while never losing sight of where we came from or our commitment to safety, quality, and putting people first. As a proud family-owned and veteran-owned operation, FEAM places missions over markets because when you take care of people, business is inevitable. It is because of our employees’ relentless effort and entrepreneurial spirit that we were able to grow into a global leader in Line Maintenance.  Headquarters: 657 South Dr Ste 306, Miami, Florida, 33166, United States Phone Number: (305) 871-3758</i><br />Target victim <b>website</b>: <i>www.feam.aero</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>thewalkerschool</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11878</link>
<guid>b32a29fd7425fb6b46049bf9e240cda1</guid>
<pubDate>Thu, 16 Nov 2023 11:31:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>thewalkerschool</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>08c3005d2ce0105b7faacada0e83dbf91963c35ef3e231ad9693d3dae9e7955c</i><br /><br />Threat actor <b>description</b>: <i>The Walker School is metro Atlanta's college-preparatory independent school for students in PK3 through 12th grade seeking an engaging educational experience within an intimately scaled, caring and diverse community where opportunities abound and meaningful relationships inspire transformative learning. </i><br />Target victim <b>website</b>: <i>https://thewalkerschool.org</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tyson-Foods</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12032</link>
<guid>7104a226fe65be03fecf10f5bceff8a6</guid>
<pubDate>Thu, 16 Nov 2023 10:45:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Tyson-Foods</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e7f9253754930895513fde7a12d0d1f2cb2d3ae4bd1ff3883191635de7d2c84</i><br /><br />Threat actor <b>description</b>: <i>We built our name on providing generations of families with wholesome, great-tasting chicken. But today’s Tyson Foods is so much more. As values and behaviors around food have changed, so have we. Today, we’re innovators uniquely positioned to reshape what it means to feed our</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Montachusett-Regional-Vocational-Technical-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=12030</link>
<guid>496cd8b01b0600a185e6156487bf96ed</guid>
<pubDate>Thu, 16 Nov 2023 10:45:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Montachusett-Regional-Vocational-Technical-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a58e379f04b97e11b6400caad6d07f1434ba076dd0e1eec8f31168bf26fb3572</i><br /><br />Threat actor <b>description</b>: <i>Montachusett Regional Vocational Technical School, also known as Monty Tech, is a grade 9 (age 14–15) to grade 12 (age 17–18) public, secondary, vocational, open enrollment school in Fitchburg and Westminster, Massachusetts, United States. It provides training in 21 different trades and is the second</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>chicagotrading.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11888</link>
<guid>94c28dcfc97557df0df6d1f7222fc384</guid>
<pubDate>Wed, 15 Nov 2023 20:34:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>chicagotrading.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf0cdafbeec251d18875a991a5cd59e54fd226d85d0d9541e31b5abfdacc1d49</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1995, the Chicago Trading Company operates as a trading firm. The company trades in equities, interest rates, and commodities.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>adyne.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11889</link>
<guid>11a31db27a7b70be0bb9759cf73d0939</guid>
<pubDate>Wed, 15 Nov 2023 20:34:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>adyne.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d02fa251253be22c35550ab1f0f4cea433047ee3e5b27b7d81cccfa39b9651d</i><br /><br />Threat actor <b>description</b>: <i>Alphadyne Asset Management is an alternative investment management firm led by founding member and Chief Investment Officer Philippe Khuong-Huu.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Decatur-Independent-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11891</link>
<guid>6ef1173b096aa200158bfbc8af3ae8e3</guid>
<pubDate>Wed, 15 Nov 2023 18:40:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Decatur-Independent-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48b423de384963cb1d250868294c2ace1aa6a5068587e0defbb6a83babb77335</i><br /><br />Threat actor <b>description</b>: <i>Decatur Independent School District is a public school district based in Decatur, Texas, northwest of Fort Worth. In addition to Decatur, the district also serves portions of New Fairview and Rhome...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cardinal-MetalWorks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11873</link>
<guid>8fbf752a03d27d94c949ca816b453196</guid>
<pubDate>Wed, 15 Nov 2023 12:54:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Cardinal-MetalWorks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>174f306a0bb1545703ea44eff805e6bbb3932e0778a20319fbd78fde2fb1a252</i><br /><br />Threat actor <b>description</b>: <i>Cardinal MetalWorks is an ISO 9001:2015 registered company providing precision sheet metal fabricating services using the most technologically advanced equipment available in the world today.</i><br />Target victim <b>website</b>: <i>https://www.cardinalmetalworks.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>ADH-Health-Products-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11874</link>
<guid>786ab8c4d7ee758f80d57e65582e609d</guid>
<pubDate>Wed, 15 Nov 2023 12:53:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>ADH-Health-Products-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>efa287872b8da2e2205b10c2f6d5e87236fac2aa4d8834fd7eacb00abdbcf4dc</i><br /><br />Threat actor <b>description</b>: <i>ADH Health Products Inc in Congers, NY. ADH is a leading contract manufacturer of nutritional supplements.</i><br />Target victim <b>website</b>: <i>https://www.adhhealth.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gallagher-Tire-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11870</link>
<guid>30f0641c041f03d94e95a76b9d8bd58f</guid>
<pubDate>Wed, 15 Nov 2023 10:32:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Gallagher-Tire-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5d492daac1b966c12fe8cd58de961b88d0ae50a97a28bad2fd6731725b84aaca</i><br /><br />Threat actor <b>description</b>: <i>Gallagher Tire Inc is a premier distributor of specialty tires and related products. We provide our partners with unrivaled service, knowledge, products, price, and expertise. And we take great pride in building a partnership based on trust and satisfaction. With distribution centers located in Levittown, PA, Harrisburg, PA, and Liverpool, NY along with an office in Charlotte, NC – we are able to service the entire East Coast with delivery available Nationwide.  gallaghertire.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Storey-Trucking-Company-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11872</link>
<guid>f1558e79c0736bcc9770373fdf03dccb</guid>
<pubDate>Wed, 15 Nov 2023 10:30:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Storey-Trucking-Company-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>88301bbbbee2d67b58fad6fb4df5ecde5313070e41f91c12dd3c81e84d11942c</i><br /><br />Threat actor <b>description</b>: <i>Storey Trucking is a driver-first trucking company based in Henagar, Alabama, roughly 50 miles outside Chattanooga, Tennessee, a well-known logistics hub. Our experience, integrity, and solid track record have earned Storey Trucking a reputation as one of the nation's leading transport companies in both temperature-controlled and dry products. https://www.storeytrucking.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>MERRILL-Technologies-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11865</link>
<guid>fa393b662023edc37bd15563ac2c2167</guid>
<pubDate>Wed, 15 Nov 2023 10:28:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>MERRILL-Technologies-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed0cde4a3ddc294c72bbdb5a3b3e26051a68d5f7a7303763b4ba9a250659151b</i><br /><br />Threat actor <b>description</b>: <i>MERRILL is a highly innovative American small business delivering contract manufacturing services to the defense, aerospace, heavy equipment, automation, energy and transportation markets. Headquartered in Saginaw, MI, we have some 350 skilled and value-driven team members and nearly 700,000 sq. ft. of manufacturing floor space. Our resources are dedicated to the design, fabrication, machining and integration of components, systems and programs. If you need it, MERRILL can make it merrilltg.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>PIKE-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11860</link>
<guid>00650747d878eecae4d468a880de38b2</guid>
<pubDate>Wed, 15 Nov 2023 01:15:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>PIKE-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fee14fd5c1b648805c28a9452fafe53e8e01c2c397ed6ebfcb848cedcfd3b9a9</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.piketech.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Proforma-Albrecht</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11861</link>
<guid>d5c60496784f8d6c43344eb3bd18574b</guid>
<pubDate>Wed, 15 Nov 2023 01:15:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Proforma-Albrecht</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>076d2c1d23cb9beca8dc7287b874fef79efc51ff83557e43dc4fa711aa88d6cd</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.albrechtco.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trademark-Property</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11852</link>
<guid>ba67e777107290283dcc9adaed9459e1</guid>
<pubDate>Wed, 15 Nov 2023 01:14:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Trademark-Property</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba372c56a377fd32b7b0f9806356c56b954a41caac26823932a54518808a4686</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.trademarkproperty.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Thompson-Candy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11855</link>
<guid>c519d47c329c79537fbb2b6f1c551ff0</guid>
<pubDate>Wed, 15 Nov 2023 01:12:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Thompson-Candy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e396e22fdf406430ff9ca9744bd15c658aefba933cf32146fc799f68ae8fe71</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.thompsonchocolate.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Road-Scholar-Transport</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11856</link>
<guid>ef77022c7b788c29c95a72a87414cd96</guid>
<pubDate>Wed, 15 Nov 2023 01:12:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Road-Scholar-Transport</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>244f4bf97f1f79fca1afdfa369f30d920bc049ddc8e080e18b70819d960ec675</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.roadscholar.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wyatt-Detention-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11858</link>
<guid>e4848ea6b69df2c66c87e2877e74726b</guid>
<pubDate>Wed, 15 Nov 2023 01:11:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Wyatt-Detention-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>00261794d769602f30b95f40df569a0697e9984f9cef92ecd9dd57d45c09f277</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.wyattdetention.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Guntert--Zimmerman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11859</link>
<guid>76aee0a3b1e75275219a7b41ffdb904d</guid>
<pubDate>Wed, 15 Nov 2023 01:10:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Guntert--Zimmerman</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48d680587b7719827a1836a38f36e63299ab17132b4ba491f868a274f9bcafc7</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.guntert.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Premise-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11848</link>
<guid>397d991d3c5b8183562b39b2fab837b2</guid>
<pubDate>Wed, 15 Nov 2023 00:58:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Premise-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f2b3840ddd4f66febad5b1b03f3c8dfaadaedeee3e0c06643d2d52f745b448b</i><br /><br />Threat actor <b>description</b>: <i> Premise Health is the worlds leading direct healthcare provider. Their transformative approach focuses on clinical expertise, easy access to care, and a seamless and simple member experience.</i><br />Target victim <b>website</b>: <i>https://premisehealth.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>MeridianLink</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11849</link>
<guid>2fa8af078803491746235057c546c1b6</guid>
<pubDate>Wed, 15 Nov 2023 00:57:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>MeridianLink</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d20bea1a9ac9e454018f92e042029b0d9dffff8062120afe8a781c2f5c9756f3</i><br /><br />Threat actor <b>description</b>: <i>MeridianLink is the provider of Loan Origination System & Digital Lending Platform for Banks, Credit Unions, & Other Financial Institutions.</i><br />Target victim <b>website</b>: <i>https://www.meridianlink.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gnome-Landscapes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11847</link>
<guid>fea93b2c5bcdbd7363cc3a126dfd0d33</guid>
<pubDate>Tue, 14 Nov 2023 18:57:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Gnome-Landscapes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b735e1835240f216acdb1ac9f174f6ee38cbd41d7701ba618d5c0a8e452dbf6</i><br /><br />Threat actor <b>description</b>: <i>Gnome Landscapes is a company that operates in the Construction industry. It employs 21-50 people and has $10M-$25M of revenue. </i><br />Target victim <b>website</b>: <i>https://www.gnomelandscapes.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>cmcsheetmetal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11843</link>
<guid>b451da363bb08b9a81ceadbadb5133ef</guid>
<pubDate>Tue, 14 Nov 2023 17:27:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>cmcsheetmetal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4fa4adf6375aa56577bab1065bdd3eb4840dca1acd5bd22439dd04413b34c810</i><br /><br />Threat actor <b>description</b>: <i>CMC Sheet Metal is a premier sheet metal fabrication facility located in Capitol Heights, Maryland providing the highest quality HVAC Construction Services to our clients and the industry. During that time we have preformed individual projects ranging well over thirteen million dollars. What started over 40 years ago with the idea that a full-service sheet metal contracting firm could deliver high quality and prompt service grew into one of the most respected industrial enterprises in the Washington, D.C. area. We have the experience needed to produce top results, the proof to demonstrate our top quality and a complete client satisfaction in all of the work we do.SITE: www.cmcsheetmetal.com Address  1208 MARBLEWOOD AVENUE CAPITOL HEIGHTS, MD 20743 UNITED STATESFULL DATA SIZE: 154gb 1. Administrators 2. Accounting 3. Project Managers 4. Users datas</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>diagnostechs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11838</link>
<guid>8c86c617f818ea789cd189816f16455f</guid>
<pubDate>Tue, 14 Nov 2023 11:26:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cuba</b> claims attack for <b>diagnostechs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>03644e5b90ab5a6783f939781d23f12f4e39fe04718e148ede625d866c9fbadf</i><br /><br />Threat actor <b>description</b>: <i>HistoryEstablished in 1987, DiagnosTechs was the first laboratory to introduce saliva hormone testing into routine clinical practice. In 1995, DiagnosTechs added saliva and stool-based gastrointestinal and food sensitivity testing,...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cuba</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lander-County-Convention--Tourism-Authority</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11835</link>
<guid>a73d18446f20a30be28c26ab513da8d8</guid>
<pubDate>Tue, 14 Nov 2023 07:08:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Lander-County-Convention--Tourism-Authority</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>73e7f302bcad27f7b292f9e2f30362d29b43aff3dfa6b25602c9ee439d8c87e5</i><br /><br />Threat actor <b>description</b>: <i>Are you planning a weekend trip or a long getaway in Lander County, NV? No matter how long you'll be here, you won't run out of places to visit and things to do. We've comp...</i><br />Target victim <b>website</b>: <i>https://www.landercountynv.org</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southeastern-Orthopaedic-Specialists</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11836</link>
<guid>2a2f98d3597419498e4d734d8c2dd106</guid>
<pubDate>Tue, 14 Nov 2023 07:08:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Southeastern-Orthopaedic-Specialists</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1828ab7828abd3ed12a560b1b1e233ff0e8cdadcf76dcb2f6772c60575293f7</i><br /><br />Threat actor <b>description</b>: <i>Southeastern Orthopaedic Specialists, P.A. is an organization made up of two orthopedic practices in the Piedmont Triad area of North Carolina. Both practices have professi...</i><br />Target victim <b>website</b>: <i>https://www.sosbonedocs.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carespring</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11834</link>
<guid>e1360bb1174a56e62f5a7d1194950342</guid>
<pubDate>Tue, 14 Nov 2023 04:07:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Carespring</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>85c26e05d45484e04117bef151d26c847f9421b34a529b780a08e6b1a0014e5d</i><br /><br />Threat actor <b>description</b>: <i>We engage our patients on a personal level. Every patient in our communities is a part of our Carespring family. We get to know them-their stories, their families, what the...</i><br />Target victim <b>website</b>: <i>https://www.carespring.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>Warren-General-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11833</link>
<guid>3c8f9a173f749710d6377d3150cf90da</guid>
<pubDate>Mon, 13 Nov 2023 23:42:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Warren-General-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b92cd57299b28ebb6d19fa502e3c71fe4c3e8d179ce7f7bcd7726df2650b65f</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1900, Warren General is an 87-bed community hospital that offers a wide range of clinical services, from primary and emergency care to cancer care, orthopedic, general surgery, renal care, comprehensive rehabilitation services, psychiatric and detoxifica.</i><br />Target victim <b>website</b>: <i>https://www.wgh.org/</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>tarltonandson.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11830</link>
<guid>26325336b22306af9defd5aaad5e6151</guid>
<pubDate>Mon, 13 Nov 2023 20:27:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>tarltonandson.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>13326decae9ef3f9d103dcb8a43b12d28fb4f2c36323e5710b91c6d8e1274b35</i><br /><br />Threat actor <b>description</b>: <i>For more than 30 years, Tarlton and Son, Inc. has been specializing in lath, plaster, drywall, scaffold, metal studs, and EIFS. It has since grown into a company of 240 plus employees. Hundreds of Gigabytes are exfiltrated and prepared to be publ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>ASM-GLOBAL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11831</link>
<guid>38956a0686dada69583538ba009a8607</guid>
<pubDate>Mon, 13 Nov 2023 20:26:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>ASM-GLOBAL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7dcafcf845a19f2226adcd863e52e62c5106d4a4bf5d5115d5ca8374dbbaffa6</i><br /><br />Threat actor <b>description</b>: <i>ASM Global is a venue & event management company based in LA, specializing in managing stadiums, convention centers, theaters, and unique venues.</i><br />Target victim <b>website</b>: <i>https://asmglobal.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>St.-Lucie-County-Tax-Collectors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11829</link>
<guid>bdba33c9c0089cabdd362693a28afd33</guid>
<pubDate>Mon, 13 Nov 2023 18:57:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>St.-Lucie-County-Tax-Collectors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>223698ad1382aeb9f0df1af7c0a7ea8989ff4b718ecb843d04f2a89541d99865</i><br /><br />Threat actor <b>description</b>: <i>Proof of Leakage First part listing  Full data dump soon... - more personal data with SSN, address, DOB, DL, W4, W9, CC</i><br />Target victim <b>website</b>: <i>https://www.tcslc.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Garr-Silpe-P.C.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11818</link>
<guid>cbaca3167c8aa7c3352f2e7be9300285</guid>
<pubDate>Mon, 13 Nov 2023 14:47:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Garr-Silpe-P.C.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>50a3e22c6b21b50e6ba68f5588d8a739436da8cf9adf96b4612a9d1964b6b220</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : no</i><br />Target victim <b>website</b>: <i>https://garrsilpe.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Builders-Hardware-and-Hollow-Metal-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11822</link>
<guid>c6bcb74c53f3b1fbb7cc951f07923003</guid>
<pubDate>Mon, 13 Nov 2023 14:47:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Builders-Hardware-and-Hollow-Metal-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6cc185d5cc43ca8c4a5e39e58a5109ff9964e491a83a6e5efb135d9456507f1a</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.bh-hm.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Homeland-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11823</link>
<guid>dd4e2c1d8782aaecc1ca31b373b3faa8</guid>
<pubDate>Mon, 13 Nov 2023 14:47:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Homeland-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8f32fe7c30c5784a175d6b62b5258a23eef700a2609d36899003283580ea91f</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://homelandinc.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Medjet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11827</link>
<guid>d20a02a9e737c129366a62e99b77d14b</guid>
<pubDate>Mon, 13 Nov 2023 14:47:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Medjet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>785d1975fc4d61f5060bd291d3677f2408bfef32a7a80340fab1659d0c093829</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://medjetassist.com</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>United-Site-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11815</link>
<guid>d873508ba95219387e5684f17335da47</guid>
<pubDate>Mon, 13 Nov 2023 14:24:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>United-Site-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc9779cb47c4c8fcbdf212337bf2451e41130403bb26b84e79e9b16d67dfa5a6</i><br /><br />Threat actor <b>description</b>: <i>United Site Services is a company that provides portable toilet and temporary fence rental services. It offers portable restrooms trailers, roll-off dumpsters, hand washing, shower trailers, holding tanks, temporary power, and other related solutions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>muellersystems.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11812</link>
<guid>8374bd0a22f6bc6622fe9d119ceb5e53</guid>
<pubDate>Mon, 13 Nov 2023 08:28:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>muellersystems.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c839db5e033b2b9883948b7977fdda048df5c0d01dedf72bd9ce1653d989231</i><br /><br />Threat actor <b>description</b>: <i>Mueller Systems is a manufacturer and distributor of advanced metering infrastructure and automatic meter reading technology, as well as residential, commercial and fire-line meters and related products. It is a subsidiary of Mueller Water Products....</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Putzel-Electrical-Contractors-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11811</link>
<guid>988ffc07e6cc403de91ec70d5508767e</guid>
<pubDate>Mon, 13 Nov 2023 04:07:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Putzel-Electrical-Contractors-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77c07343711a76d50adbec6c3db9964c9c8184cd7e30ea7781115e9b872c0fe5</i><br /><br />Threat actor <b>description</b>: <i>Putzel offers a rich history of experience in commercial electrical contracting dating back over a century. Locally owned & operated, Putzel was founded in Macon, Georgia b...</i><br />Target victim <b>website</b>: <i>https://www.putzelelectric.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>thewalkerschool.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11806</link>
<guid>ea0d1687bc7b27bc6b5b34bc88f1b5dd</guid>
<pubDate>Sun, 12 Nov 2023 18:58:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>thewalkerschool.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da3e0c0cc0157bec7fda1e37d2b12d952ca6a758f7499e2c9a229e400376783b</i><br /><br />Threat actor <b>description</b>: <i>Experience the wonder of Walker firsthand! For the seventh year in a row, The Walker School was named the Best Private School in Cobb County. The infinite worth and dignity of each student define our approach to learning. With an average class size o...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>modafabrics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11807</link>
<guid>13c86fac19a52dbc843105b709dc71fc</guid>
<pubDate>Sun, 12 Nov 2023 18:58:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>modafabrics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e60cf6e16911348796dd6a608f02f4f55629d9d4a4853769023748d991016236</i><br /><br />Threat actor <b>description</b>: <i>Moda Fabrics. Moda Home + Gift. United Notions. One company - one goal. Manufacturing and distributing the best fabrics, finished products and supplies in the industry. WELCOME TO MODA FABRICS Lovestruck from Lella Boutique Shop Lella Boutique Fabric...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>wombleco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11808</link>
<guid>6425d167c06fe773378b10b546b6e923</guid>
<pubDate>Sun, 12 Nov 2023 18:57:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>wombleco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0167498eca7d0c8783d6e07270717598967008462bfd1d80856e21cf9a3005a8</i><br /><br />Threat actor <b>description</b>: <i>Womble Company has been protecting your investment for over 40 years. We apply both internal and external pipeline coating systems. The amount of pipe we have coated could circle the earth 3 times.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>cityofclarksville.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11803</link>
<guid>6275d7071d005260ab9d0766d6df1145</guid>
<pubDate>Sun, 12 Nov 2023 17:31:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>cityofclarksville.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>94bb43d3ea1fc37269a37f6f89353fb14f2887f9a8b946f4c974e771c0b78de1</i><br /><br />Threat actor <b>description</b>: <i>City of Clarksville kicks off 2023 Wreaths Across America campaign. The City of Clarksville is hosting a wreath-laying ceremony for the service members resting at Riverview Cemetery during National Wreaths Across America Day on Saturday, Dec. 16 to r...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>hotelemc2.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11805</link>
<guid>13ec9935e17e00bed6ec8f06230e33a9</guid>
<pubDate>Sun, 12 Nov 2023 17:30:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hotelemc2.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25825f51a4cd7a0db28d783f240022c9a51363db04098e312d23ce399dc3fc3b</i><br /><br />Threat actor <b>description</b>: <i>Hotel EMC2 is a downtown Chicago boutique hotel by the Magnificent Mile and Northwestern Memorial Hospital in Chicago's Streeterville neighborhood.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>carsonteam.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11802</link>
<guid>153e7487e891837a34233c390e64c710</guid>
<pubDate>Sun, 12 Nov 2023 12:59:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>carsonteam.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>804673d32c2b780090b060ea72ff2492ea4bd8910a4c75dc34064d79cc4b1000</i><br /><br />Threat actor <b>description</b>: <i>Family-Owned & Operated Since 1938Carson has been a Northwestern leader in energy & transportation solutions for over 85 years.Offices in Oregon, Washington, Idaho and California.All confidential information in the USA has been accessed. Informat...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pricesmart</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11799</link>
<guid>ceb9f6b8ffa77c49b6b4570ea19c76bf</guid>
<pubDate>Sun, 12 Nov 2023 08:23:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Pricesmart</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>65ab8a05030d936e2e23d1505709a105771290031e07cbf5aacd0c3447f5e0c5</i><br /><br />Threat actor <b>description</b>: <i>PriceSmart, Inc. is an American operator of membership warehouse clubs in Central America, the Caribbean, and South America. PriceSmart was founded by Sol and Robert Price, founders of The Price Club; Robert Price is chairman of the board</i><br />Target victim <b>website</b>: <i>https://www.pricesmart.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>PAR-Group-Co</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11791</link>
<guid>5c1f2cfaeb142bf38d5c31dae7247e3d</guid>
<pubDate>Sat, 11 Nov 2023 17:36:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>PAR-Group-Co</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8597d514ad9ccda3b024970e6e9464620c9e5d1ad88d7bb74dd98a8f02c95531</i><br /><br />Threat actor <b>description</b>: <i>Par Plumbing started four generations ago with a small shop in Brooklyn. We have now grown into The Par Group, New York’s premier provider of plumbing, HVAC, fire protectio...</i><br />Target victim <b>website</b>: <i>https://www.pargroup.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>MHM-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11790</link>
<guid>c7a19fe3198a7cdef110e52e5b455e36</guid>
<pubDate>Sat, 11 Nov 2023 14:44:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>MHM-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b15030dc30f8d74d18ab515c72e796207f801c619f39192044fd0d31cce0a3f</i><br /><br />Threat actor <b>description</b>: <i>MHM Health MHM Health is dedicated to help our partner Independent Physician Associations remain independent as the healthcare industry transitions to value-based care.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>estes-express.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11789</link>
<guid>b92f8ab7a47e21fb033068842d6663b0</guid>
<pubDate>Sat, 11 Nov 2023 12:55:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>estes-express.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0bd71825869a95d204fce762276c3ba91cb0bc4783c4bb9010f00cfe8e43e7c9</i><br /><br />Threat actor <b>description</b>: <i>This firm transports drugs, the evidence is in the stolen files.Seamless cross-border shipping to and from all regions. Navigating the U.S., Canada, Mexico, and beyond. Everything you need to ship with us, right at your fingertips. Cost-effective...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>shawneemilling.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11788</link>
<guid>f6d1ecd13a24f8caf9c014e14dda156d</guid>
<pubDate>Sat, 11 Nov 2023 12:54:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>shawneemilling.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c68f5b12a836e3aec8f91b5d79c786d887950b8ad29c56a89664146139946e9</i><br /><br />Threat actor <b>description</b>: <i>Shawnee Mills 805Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dragos-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11786</link>
<guid>6aed81cf880f4f9090f0fa8fc5c25d62</guid>
<pubDate>Sat, 11 Nov 2023 02:25:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Dragos-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c3f614856a42bc37a485a491d686d0f1767747eb78460e25da6a70798c9b33c</i><br /><br />Threat actor <b>description</b>: <i>Dragos has unmatched experience securing industrial assets across vertical industries. Protect the operational technology that helps run chemical production facilities and the valuable intellectual property regarding chemical formulas from a potential cyber attack. Rob Lee - it is time to open up your coffers. </i><br />Target victim <b>website</b>: <i>https://www.dragos.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>floortex.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11782</link>
<guid>30b4a92517ace5825f5944c8a794ad3e</guid>
<pubDate>Fri, 10 Nov 2023 22:04:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>floortex.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29aae4770749851710d102f6c69a276b2ffdae23585fd141786c0356a06e9541</i><br /><br />Threat actor <b>description</b>: <i>UNITED KINGDOMSince 2002 Floortex has been at the forefront of innovation in the manufacture and marketing of floor protection products. Offering an unrivalled range of products with exceptional quality, Floortex products provide unquestionable v...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>planning.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11783</link>
<guid>fc4086d44c30e34b3ffe83b44db222a9</guid>
<pubDate>Fri, 10 Nov 2023 22:04:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>planning.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e370d76240082b134d17576ece5ce8dffc4b08e889188e65795500e42ddc7cd</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1978, American Planning Association is headquartered in Chicago, Illinois, They are a professional organization representing the field of urban planning in the United States.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>SWISHSMILES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11781</link>
<guid>30f21d8fae944d4353b36d59500d9eaa</guid>
<pubDate>Fri, 10 Nov 2023 17:46:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SWISHSMILES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bac7fdfe5ec097c9da909ece4e773fd16c136f7e269ac3b0f5ea07800f0574bb</i><br /><br />Threat actor <b>description</b>: <i>Austin, TX Dental Services for the Whole Family - Swish Dental®️</i><br />Target victim <b>website</b>: <i>https://www.SWISHSMILES.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SGMGROUP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11779</link>
<guid>7d9d329731cad1688ade8b557b74c68c</guid>
<pubDate>Fri, 10 Nov 2023 17:46:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SGMGROUP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9fa038f214067be22b8f3d4175a243a71997416e06ab546f7ee9cf4243e2987d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.SGMGROUP.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TXWES.EDU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11778</link>
<guid>6c015f9b69e6a50c3d30b75ee796bc46</guid>
<pubDate>Fri, 10 Nov 2023 17:46:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TXWES.EDU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0473aea7475e3d6f9ea6c96c216eec39f44ed3c5adc39a8e0241261b8d478018</i><br /><br />Threat actor <b>description</b>: <i>Home - Texas Wesleyan University</i><br />Target victim <b>website</b>: <i>https://www.TXWES.EDU</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>browardfactory.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11775</link>
<guid>88059058ba56daa4bf889eb6cdf2e6c1</guid>
<pubDate>Fri, 10 Nov 2023 17:22:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>browardfactory.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9fb48c1c892cdcc18feea53ccb3b400477443e6c2fe38f6c8cc1642d7bd0b7ca</i><br /><br />Threat actor <b>description</b>: <i>BFS provides Heating, Ventilation & Air Conditioning(HVAC) Services, home warranty, and finance services to families in Florida, Texas, Arizona and Nevada. It all started when the president of Broward Factory Service/ BFS Home Warranty, Crockett Herd, was working as an electrician from 9-5 and taking advantage of any overtime opportunities he was offered to support his family. It was at this time, in 1973 that Mr. Herd had the idea of branching out and providing complete household services to families in the Broward County area. Mr. Herd approached condominiums and homeowners associations with this idea and with his hard work, evident integrity, and passion for helping families, BFS was born. Over the past forty plus years BFS has grown to service 4 states, with 18 local service centers. Integrity- doing the right thing, even when no one is looking. This is the whole premise that BFS was born and has grown upon. One of Mr. Herd’s favorite sayings is “Always treat your customers as you would want your mother to be treated,” and this is what our customer service representatives strive to do each and every day. Our mission here at BFS is to keep your family comfortable by providing exceptional service through integrity, hard work, and treating our customers like family. With Crockett Herd still at the helm, two subsequent generations on board, and a close-knit workforce of 200 plus employees, family is still the core of this company today. We look forward to the opportunity to make your family a priority, while providing you with complete indoor comfort by taking care of all of your HVAC and household appliance needs.SITE: www.browardfactory.com Address : 3500 N. 28th Terrace Hollywood, FL 33020 (800) 237-9910</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>morningstarco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11772</link>
<guid>740c6faec4dc6f885b63c458995f6332</guid>
<pubDate>Fri, 10 Nov 2023 16:07:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>morningstarco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a2dc29f400f7b8d7a51916035ebc539c462f44f8d6c645a8ad654aa8923c7f0f</i><br /><br />Threat actor <b>description</b>: <i>Morning Star Packing Company is 1 billion corporation established in 1970. Morning Star Packing Company is a manufacturer of bulk tomato products and is headquartered in Williams, California</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mariposa-Landscapes-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11773</link>
<guid>e17aeca56fab22ce30ac615e72cc64e5</guid>
<pubDate>Fri, 10 Nov 2023 16:05:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Mariposa-Landscapes-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a066b6c2600623ecf0a8745b5fc3c7ca2a434812a1b936202d63121e1d5494bd</i><br /><br />Threat actor <b>description</b>: <i>Providing expert landscape maintenance, landscape construction and tree care services for commercial, municipal and homeowner associations.</i><br />Target victim <b>website</b>: <i>http://mariposa-ca.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>aei.cc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11770</link>
<guid>3d8d871debc0dcfeb788f3fbf310f07f</guid>
<pubDate>Fri, 10 Nov 2023 06:58:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>aei.cc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>728a138aef950e32a1426367342c2a34fd24aef28b871d20727b479dc33c3141</i><br /><br />Threat actor <b>description</b>: <i>American Engineers, Inc. is a full-service, award-winning, civil engineering firm established more than 35 years ago with three locations in Kentucky and one in Georgia.Confidential documents, contracts for the construction of urban projects were a...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Battle-Motors-CraneCarrier-CCC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11764</link>
<guid>3653cce234494bfbd33e077f4a028f66</guid>
<pubDate>Thu, 09 Nov 2023 16:00:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Battle-Motors-CraneCarrier-CCC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9c656e9524d1f3db868cce29b585723a52798adbb639ca30cad20ce27034c96</i><br /><br />Threat actor <b>description</b>: <i>Battle Motors is a leader in the vocational truck industry, providing custom, severe-service chassis under Battle Motors Engineered Chassis brands. Their data of 50Gb size will be available for downloading here soon. Operational, business agreements, contracts, accounting data etc are in the archive waiting for uploading.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>gotocfr.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11760</link>
<guid>9576675320d0f299324b34331e85d31f</guid>
<pubDate>Thu, 09 Nov 2023 14:28:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>gotocfr.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b844446910313baacbd319acbf344523d65376c6e4a65e206a32a06d92d47037</i><br /><br />Threat actor <b>description</b>: <i>CFR is a privately held Wisconsin –USA based system integrator for the dairy and food industry. 553GBEmployees (ssn numbers, residential addresses, license numbers, contracts, salary information, tax forms, FMLA forms and more)Clients (informat...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cogdell-Memorial-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11759</link>
<guid>25926f529e257cfd6ee8ba86fd76cfe9</guid>
<pubDate>Thu, 09 Nov 2023 13:09:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lorenz</b> claims attack for <b>Cogdell-Memorial-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3fe63b5cc8f7007434691ca1d11104d31a2d701feda87ec8adf148a29b2afde3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.Cogdell Memorial Hospital</i>]]></description>
<category>lorenz</category>
</item>
<item xmlns:dc='ns:1'>
<title>Simons-PetroleumMaxum-PetroleumPilot-Thomas-Logistics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11757</link>
<guid>2d680487650d66445b50d3d759eccad4</guid>
<pubDate>Thu, 09 Nov 2023 12:59:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Simons-PetroleumMaxum-PetroleumPilot-Thomas-Logistics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f67502dd9e8814827c70f7b1a7f13607a79a457d9fb04435f8691e3a0d716a1</i><br /><br />Threat actor <b>description</b>: <i>We've obtained about 70Gb data of a group of companies in logistics/energy providing fields named Simons Petroleum, Maxum Petroleum and Pilot Thomas Logistics. Lots of operating files, confidential docs, personal information of employees, NDAs and so on. I'll make an update soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jeffcoat-Mechanical-Services-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11756</link>
<guid>c928d86ff00aeb89a39bd4a80e652a38</guid>
<pubDate>Thu, 09 Nov 2023 11:39:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Jeffcoat-Mechanical-Services-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b524f0598d1a6b17a4306e21d54695e5711e3d6f2ce3677d8fa58b4dd23871e3</i><br /><br />Threat actor <b>description</b>: <i>Jeffcoat Mechanical Services Is your source for all your heating, ventilation, and air-conditioning needs in Birmingham, Alabama.The Service network was successfully encryp...</i><br />Target victim <b>website</b>: <i>https://www.jeffcoat.us</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>JS-Hovnanian--Sons</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11754</link>
<guid>6ec0c5782be255c0a32bcfbda47aa0cd</guid>
<pubDate>Thu, 09 Nov 2023 00:58:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>JS-Hovnanian--Sons</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3721bd1c962020731f435fb6a2562b7417772b0ecbb6f1565dc1aab621d5adda</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.hovhomes.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Identification-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11752</link>
<guid>aee5620fa0432e528275b8668581d9a8</guid>
<pubDate>Wed, 08 Nov 2023 23:35:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Identification-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9f414453fdeae87fed1ef828bf6be3cd9cb0e5838ba5740349ff9960f56ec35</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.idproducts.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>M.R.-Williams</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11753</link>
<guid>f27a0cac5e379821e29bceef40e015d5</guid>
<pubDate>Wed, 08 Nov 2023 23:35:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>M.R.-Williams</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd1e52da2a3bbfb0ffb51b8af4217c5dd63a9c6a2571f8badee881eb4d24f382</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.mrwilliams.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Supply-Room-Companies--Citron-WorkSpaces</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11746</link>
<guid>604b37ea63ea51fa5fb3d8a89ec056e6</guid>
<pubDate>Wed, 08 Nov 2023 23:34:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>The-Supply-Room-Companies--Citron-WorkSpaces</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f9e4d86c8321446a344abdc1703f9bb74fc1a6052c466563587a3d50b0c74f2</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.thesupplyroom.com www.sourceot.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ackerman-Estvold</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11747</link>
<guid>2af1e9eaa807096a11b32ed26ecc2cbb</guid>
<pubDate>Wed, 08 Nov 2023 23:33:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Ackerman-Estvold</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee415f9f8d27d1315062228f8c1626afdbcc0227f6ad936fb3ce859b3e2b2125</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.ackerman-estvold.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Conditioned-Air</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11749</link>
<guid>191b624691ab236e4958bcac976a1de6</guid>
<pubDate>Wed, 08 Nov 2023 23:32:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Conditioned-Air</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fbe032437c3a92ac592ce4b960937b243f5f486c42614d71a6c998e743df9acf</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.conditionedair.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Inclinator</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11750</link>
<guid>12d16adf4a9355513f9d574b76087a08</guid>
<pubDate>Wed, 08 Nov 2023 23:32:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Inclinator</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0dc76a738166ce059a2642f8d017f2fcbbb78838aa17f753dd3a5c9faf581cf7</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.inclinator.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crown-Supply-Co</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11751</link>
<guid>e464656edca5e58850f8cec98cbb979b</guid>
<pubDate>Wed, 08 Nov 2023 23:31:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Crown-Supply-Co</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a54a5a89f8a0f1804f38a437012590fb0382e564da47bb4fbcfe48d7755bb082</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.crownsupply.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Orion-Township-Public-Library</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11741</link>
<guid>bddcda5d65fcfdec9de3838794a77265</guid>
<pubDate>Wed, 08 Nov 2023 16:13:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Orion-Township-Public-Library</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4793ab683eaf13f47964ab1271a6f9c9b7493064d5a12563a1d95f8f4346a40</i><br /><br />Threat actor <b>description</b>: <i>Designed to serve a population of 30,000 and house a collection of 100,000 volumes with a capacity for a 200,000 items per year circulation, the new Orion Township Public L...</i><br />Target victim <b>website</b>: <i>https://www.orionlibrary.org</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>sheehyware.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11740</link>
<guid>45e03f0f460f42940faebd081950bf57</guid>
<pubDate>Wed, 08 Nov 2023 16:00:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>sheehyware.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f979c32ce6019570f4d9741bd464cfad899e80da70f4d37f72d89f4762ad5866</i><br /><br />Threat actor <b>description</b>: <i>We have more than 1.5 TB of sensitive data about your company, customer files, personal data of employees, your Coyote database and much more.  If I were you, I wouldn’t waste time and follow the link in the file, otherwise we will publish these files and then you will have to close your company, because there will be a huge number of lawsuits against you.</i><br />Target victim <b>website</b>: <i>https://sheehyware.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>foley.k12.mn.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11738</link>
<guid>4440d927e935e3273252c4be793c9152</guid>
<pubDate>Wed, 08 Nov 2023 11:34:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>foley.k12.mn.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e486775639cb06a64f3742ddbe328946c0a66d39af1b1b6d501dfa29a910cdea</i><br /><br />Threat actor <b>description</b>: <i>Foley Public Schools has a rich history of quality academic curriculum, outstanding fine arts and athletic programs as well as committed community support. Founded in 1890, our schools have grown from a small country school to an impressive campus wi...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>OE-Federal-Credit-Union</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11736</link>
<guid>54dbaef707bbde46c875e9c0d9bc103e</guid>
<pubDate>Wed, 08 Nov 2023 05:36:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>OE-Federal-Credit-Union</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0df93fda7832dc8fe5fafb5af83d3b8340e83e911623ca74886ad82fece850de</i><br /><br />Threat actor <b>description</b>: <i>Built on a foundation of union pride, OE Federal is the country’s largest labor-based credit union. We understand the unique needs of union workers and their families in wa...</i><br />Target victim <b>website</b>: <i>https://oefederal.org</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>gitiusa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11735</link>
<guid>a318166b8539611449bf21ddc297a783</guid>
<pubDate>Wed, 08 Nov 2023 04:02:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>gitiusa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2635074343777276e0617e42ba6af35217965bd14cd4be97b6d74cc92952dc4d</i><br /><br />Threat actor <b>description</b>: <i>GITI Tire USA, one of the largest tire companies in the world. Revenu of the organization $230M. All confidential information in the USA has been accessed. Information that will be published soon, more than 100 thousand files: confidential informatio...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Truck-Bodies--Equipment-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11730</link>
<guid>7d9151910198dc0e9938f28d90b3723a</guid>
<pubDate>Tue, 07 Nov 2023 17:41:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lorenz</b> claims attack for <b>Truck-Bodies--Equipment-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a7cb1af1e9ba29a418ef66543c6767ae704da5bad41e7a56dd58bfd415e3a84</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.Truck Bodies & Equipment International</i>]]></description>
<category>lorenz</category>
</item>
<item xmlns:dc='ns:1'>
<title>Access-to-the-large-database-of-a-US-Medical-organization</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11729</link>
<guid>b599e8250e4481aaa405a715419c8179</guid>
<pubDate>Tue, 07 Nov 2023 17:32:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Access-to-the-large-database-of-a-US-Medical-organization</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81d88539256931b98c5a90191c07a46c4c153265bd3ac9b8ba930aabf851c584</i><br /><br />Threat actor <b>description</b>: <i>Available actions with patient data in the panelSearch, Edit, Print, DownloadThe base is replenished from different clinics, both public and privatehttps://www.srmcfl.comhttps://www.adventhealth.comhttps://www.advimg.comAnd many others Name DOB Gender SSN Address Home Phone Work PhoneSite MPI MRN Dept Num Patient Class Admitted Discharged Site Location Hospital Svc Point of CareFacility Building Room Bed Attending Referring Consulting Admitting Visit […]</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>h-tube.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11726</link>
<guid>3a6c2c9231df58107434b942fa600b22</guid>
<pubDate>Tue, 07 Nov 2023 16:21:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>h-tube.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9fe684db908d0636a5d8477db43aa1ae22e7c0ff2c50bab9af5ba9da8b8cb5ed</i><br /><br />Threat actor <b>description</b>: <i>H & H Tube offers tube fabrication, hydroforming, machining, and tube bending services.SITE: h-htube.com Address : 579 Garfield St, Vanderbilt, Michigan, 49795, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Certified-Mortgage-Planners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11727</link>
<guid>f621f27661e5da0ee6019f6c7841bb47</guid>
<pubDate>Tue, 07 Nov 2023 16:01:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Certified-Mortgage-Planners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3389489640401d8805aad41b780d6fbba15bc8e008004dc0f3e9a1905cbd653e</i><br /><br />Threat actor <b>description</b>: <i>Certified Mortgage Planners is located in Lake Mary Florida, USA. Primarily operates in the Mortgage Bankers and Loan Correspondents business within the Nondepository Credit Institutions sector. This organization has been operating for approximately 5 years and estimated to generate $26m in annual revenues.</i><br />Target victim <b>website</b>: <i>https://cmpfl.com/ </i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hopewell-Area-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11717</link>
<guid>7da9de56f480e009b5e9f18b279859d7</guid>
<pubDate>Tue, 07 Nov 2023 10:04:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Hopewell-Area-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8892dbdcff1f9117522badb5078946271f9fd30ea417c802fa1974b9911e85af</i><br /><br />Threat actor <b>description</b>: <i>Hopewell Area School District contains 5 schools (Hopewell Elementary, Independence Elementary, Margaret Ross Elementary, Hopewell Memorial Junior High School, Hopewell High School) and 2,107 students. The school district is located in Beaver County, Pennsylvania, USA. It serves the townships of Hopewell, Raccoon, and Independence.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>prime-art</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11716</link>
<guid>d7e8c82ac1c68ac300294f69470c103f</guid>
<pubDate>Tue, 07 Nov 2023 08:33:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cuba</b> claims attack for <b>prime-art</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c34936d6aaed4a5d8c85d6030694b3cca3fbb3471e875a34a867d5c468a0ba8d</i><br /><br />Threat actor <b>description</b>: <i>For PAJ, your success is our success.Jewelry making is an art and a science. We are constantly improving and optimizing our skills while integrating cutting-edge technology.By always delivering a troy grain more than anticipated, we...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cuba</category>
</item>
<item xmlns:dc='ns:1'>
<title>sacksteinlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11710</link>
<guid>227bd2473d68947040e511b7f29ce553</guid>
<pubDate>Mon, 06 Nov 2023 20:18:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>sacksteinlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>62c10822e2694919ff51b271654d1a9334addf90295afa997aaa0e9e1bcdb13a</i><br /><br />Threat actor <b>description</b>: <i>For more than 70 years, our firm has successfully overcome the challenges posed by insurance carriers in car accidents and other types of accident cases. We have won numerous verdicts and negotiated countless settlements. We have recovered millions of dollars for injury victims to help them offset expenses, disabilities and uncertain futures. We always seek to maximize your recovery, and our track record of proven case results reflects our dedication and hard won experience. Our family of personal injury attorneys at Sackstein Sackstein & Lee, LLP has been helping families like yours get the compensation they deserve since 1952. With offices throughout the New York City and Long Island area, and more than 60 years of serving your community, we provide excellent service and fight to get you the maximum compensation for your injury or loss.SITE: www.sacksteinlaw.com Address  15408 Northern Blvd Ste 2C Flushing, New York, 11354 United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>good-lawyer.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11708</link>
<guid>f7779710d2026dca44c41da7a9b7c748</guid>
<pubDate>Mon, 06 Nov 2023 18:59:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>good-lawyer.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>51baed066ecb4ba431a20ad6463fe3fa25a468e077cb3a460fd062482c4dbd97</i><br /><br />Threat actor <b>description</b>: <i>We are a Trusted Network of Good Lawyers. Over 10,000 clients served every year. $1 BILLION in debt managed in 2019. 25,000 reviews from our satisfied clients</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>kbrlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11706</link>
<guid>f2b1b9275b094c26ff1998a09cd9412d</guid>
<pubDate>Mon, 06 Nov 2023 17:30:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>kbrlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d509f772dd59ddf978ababaddb1cd7d47428265d59a9ea2fe8c1d8c535d29073</i><br /><br />Threat actor <b>description</b>: <i>Kaufman Borgeest & Ryan LLP is a law firm that specializes in appellate practice, bankruptcy, commercial litigation. The firm provides legal services for accountants professional liability, food, drug & medical device litigation, healthcare law, cybe...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>eyephy.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11707</link>
<guid>e2ce14e81dba66dbff9cbc35ecfdb704</guid>
<pubDate>Mon, 06 Nov 2023 17:30:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>eyephy.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>28c9de17d5e957cb8b988924ca04b188a8bea309f545283fcec62f12f6d87408</i><br /><br />Threat actor <b>description</b>: <i>At Eye Physicians of Central Florida our mission is to provide our pediatric and adult patients with the highest quality of eye care.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mount-St.-Marys-Seminary</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11705</link>
<guid>f4380fd29ac34f2610014e8361d088fb</guid>
<pubDate>Mon, 06 Nov 2023 13:08:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Mount-St.-Marys-Seminary</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47b5aac8c2c808c9337e669843ac0dda0b9280f98bf956e934ff9b002b742743</i><br /><br />Threat actor <b>description</b>: <i>Mount St. Mary's Seminary Mount St. Mary's Seminary is the oldest division of the Athenaeum. The seminary has as its mission the preparation of candidates for the Catholic priesthood�a gift of God and the fruit of an integrated approach to formation.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>concretevalue.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11700</link>
<guid>e9f54fe5fc20785719006f84f1920703</guid>
<pubDate>Mon, 06 Nov 2023 11:29:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>concretevalue.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9e429840e8f7d2a78de9d282ce5a7844c48faf5fc7d714fd1830d8e76d1087c</i><br /><br />Threat actor <b>description</b>: <i>CVC Concrete Value Corp is one of the nations largest concrete subcontractors successfully completing over 100,000 jobs serving Northern, Southern and Central California and Nevada. We are currently celebrating our 20th year together as a company....</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>howlandlaw.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11701</link>
<guid>80ca4ee101d7cf153771824cc0b00098</guid>
<pubDate>Mon, 06 Nov 2023 11:29:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>howlandlaw.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>595709247fd4cf909c196a74f6130c0ae1a67ea2caa902b5e5a6b33bd7234b1c</i><br /><br />Threat actor <b>description</b>: <i>Howland Law Office is a company that operates in the Legal Services industry. https://g.co/kgs/cfPCRW</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Currax-Pharmaceuticals</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11698</link>
<guid>fc8ce6292e51ac8214f544324c56d10d</guid>
<pubDate>Mon, 06 Nov 2023 00:58:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Currax-Pharmaceuticals</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dac265856a4f6542e35d6dc96b1e77643d491af39e29b980ffbebb1259a8e7d0</i><br /><br />Threat actor <b>description</b>: <i>Currax Pharmaceuticals is a specialty biopharmaceutical company dedicated to expanding patient access to clinically differentiated prescription medicines worldwide. Currax is primarily focused on the number one and number two causes of preventable death in the U.S., obesity and smoking.</i><br />Target victim <b>website</b>: <i>https://www.curraxpharma.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Weidmann--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11696</link>
<guid>3c30bc3ec05967d33995f258b184fabb</guid>
<pubDate>Sun, 05 Nov 2023 20:55:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Weidmann--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>afee091c065bf2ac4d5fec92e07ebd8095a9ae3c20a873bd815e298955d37093</i><br /><br />Threat actor <b>description</b>: <i>Weidmann & Associates, Inc. was founded by Bill Weidmann in 1989. The company is engaged in the repair and reconstruction of facilities in the Greater Atlanta area.The main office of the company is located at 1875 Old Alabama Rd Ste 1310, Roswell, Georgia, 30076, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Leaguers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11694</link>
<guid>9377fe00f10ec83e025ae6a77878ae62</guid>
<pubDate>Sun, 05 Nov 2023 20:52:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Leaguers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e5b7a5ebe3adc9f3c4b2c6817578976b0fe2fbc4d58a2f51d2e80188027068ff</i><br /><br />Threat actor <b>description</b>: <i>The Leaguers is a multi-purpose non-profit social services organization providing various services to the community for over 70 Years. The main office is located 405 University Ave 425, Newark, New Jersey, 07102, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zon-Beachside</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11695</link>
<guid>45713f6ff2041d3fdfae927b82488db8</guid>
<pubDate>Sun, 05 Nov 2023 20:50:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Zon-Beachside</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>341647a9f8d8e4dedfd5a2e92a0602fc9834eda906266a8f3ac7b2ce741dc13e</i><br /><br />Threat actor <b>description</b>: <i>Zon Beachside - a commercial center for the care of the elderly and disabled. The main office is located at 1894 S Patrick Dr, Indian Harbour Beach, Florida, 32937, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>lathamcenters.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11690</link>
<guid>418b5015d870b2632c0840039bfec155</guid>
<pubDate>Sun, 05 Nov 2023 19:05:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>lathamcenters.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e210b8bc840089bd14e81eb6c4dc4bb0882764aa03b7e4fe8c15e1b406ce88a9</i><br /><br />Threat actor <b>description</b>: <i>lathamcenters.org 75Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>nckb.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11683</link>
<guid>01390c18f72b8afe9e95fc57289a6675</guid>
<pubDate>Sun, 05 Nov 2023 08:31:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>nckb.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c2679378687ac16738f129ac28ab58275003c0cb64b6e90fc4e7b4fd7902ed7f</i><br /><br />Threat actor <b>description</b>: <i>About New Century Kitchen and BathIn their own wordsNew Century Kitchen and Bath is a full service kitchen and bath company based in San Leandro, CA. We are established in 1991 and has recently changed ownership in 2019. We specialized in stone f...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>brlogistics.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11676</link>
<guid>de65a3fb6d48ee7cd6f5f9309d16e3fb</guid>
<pubDate>Sun, 05 Nov 2023 08:28:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>brlogistics.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a80079e48376ac0f42329e0f685b375f7863d3f6f581b600cfc43633d1fea122</i><br /><br />Threat actor <b>description</b>: <i>BR LOGISTICS USA - Shipping - Imports & Exports</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>springeroil.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11670</link>
<guid>1fc8c3d03b0021478a8c9ebdcd457c67</guid>
<pubDate>Sun, 05 Nov 2023 08:24:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>springeroil.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>58da831d35f0de4bda5588b0610285766d7cfdc6ad1440e56145d3996e15fb2c</i><br /><br />Threat actor <b>description</b>: <i>A locally owned & operated company serving the Cape Fear Region. Our professionally trained staff is always ready to help you with your fuel needs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>studio483.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11673</link>
<guid>41965fdab3cb2bd0fdc4536d321ad4fc</guid>
<pubDate>Sun, 05 Nov 2023 08:23:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>studio483.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a5ba6386c3f1176eb8dbcbe6624de44d710f35ec684a78914560e4cda535559</i><br /><br />Threat actor <b>description</b>: <i>At Studio 483 we focus on providing the best service to our clients by tailoring each project to meet their specific program needs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>GeoPoint-Surveying</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11652</link>
<guid>8c71d6367dc1f7a95488ccff97c2f37e</guid>
<pubDate>Fri, 03 Nov 2023 23:46:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>GeoPoint-Surveying</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>286babef0d0cf5807e95d82083bab605d562b4b5460ef791ae517e8f37e5cc3b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.geopointsurvey.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>abhmfg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11649</link>
<guid>6595d842ae9e6c1ecfd9f976dcb8e058</guid>
<pubDate>Fri, 03 Nov 2023 19:02:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>abhmfg.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ce05738d4859b64bf086bbe9021f56e9ad91326b49bd191e58581dfe4cb903d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>portlandtractor.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11646</link>
<guid>ac8645c4e666d447670bebf90cf8fbc2</guid>
<pubDate>Fri, 03 Nov 2023 17:36:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>portlandtractor.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>75583a9c0a6a5450245a25c08582bd5d2629b62ee7bc6c73a0a14a8a08ea72b3</i><br /><br />Threat actor <b>description</b>: <i>Portland Tractor, IncLocated in the heart of the Pacific Northwest, our expansive yard is spread across 10 acres and includes over 60,000 square feet under the roof. Our yard holds not only the machines that we are currently dismantling, but also a...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>jewell.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11644</link>
<guid>b55812911f2a27b05425d0692f19a039</guid>
<pubDate>Fri, 03 Nov 2023 16:01:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>jewell.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc28b8c753de364d985f3f568e985a2bdf5a1a786046a2714306853ee3599f6b</i><br /><br />Threat actor <b>description</b>: <i>William Jewell College</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>microtrain.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11643</link>
<guid>8ce8ac3252f7a8981a64d5a473e48ea0</guid>
<pubDate>Fri, 03 Nov 2023 08:29:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>microtrain.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7bb96f95bfc02384803a1d7005ea1331ef29e367859ed43fc8fb5169a13cb997</i><br /><br />Threat actor <b>description</b>: <i>MicroTrain Technologies provides instructor-led training to individuals and corporations. MicroTrain's facilities are conveniently located in downtown Chicago and in the surrounding Chicagoland suburbs. Founded in 1999 by Stan Van Nice and Dennis Mul...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>labor-force-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11642</link>
<guid>05d74c48b5b30514d8e9bd60320fc8f6</guid>
<pubDate>Fri, 03 Nov 2023 05:38:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>labor-force-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca1e0fa45a640f8c63f9e51bfc0f06a1f35b6f9f41816969eebf8dd8c7faa724</i><br /><br />Threat actor <b>description</b>: <i>Labor Force® is an employment and staffing agency that offers clients solutions to temporary and temp-to-hire employment requirements. Since 1970, we have stood behind our ...</i><br />Target victim <b>website</b>: <i>https://www.laborforce.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bry-Air</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11639</link>
<guid>51efec699670c82f306c1b8251b8a6ae</guid>
<pubDate>Thu, 02 Nov 2023 23:50:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Bry-Air</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>289f70d7f1518f652d97ab33dde81474cb2671ff28f6f347ee3e1fba37a3d34f</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.bry-air.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>JDRM-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11640</link>
<guid>0dceb0ffa039ab83600259310bccae25</guid>
<pubDate>Thu, 02 Nov 2023 23:50:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>JDRM-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>01a2622f9ce4652dc0ba08ce1a1d4f0bc50b527f4eac70de3c3f12f5988efe64</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.jdrm.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Craft-Maid</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11634</link>
<guid>5f96320c454aed712e4545adacdba754</guid>
<pubDate>Thu, 02 Nov 2023 23:49:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Craft-Maid</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>11df40aa77b8e81ae86ce195a1d883b7160aed598e8d07ceb485d29cd61cc422</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.craft-maid.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hilyards</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11635</link>
<guid>e8808f55fa5fe1efe93b16e8d3534992</guid>
<pubDate>Thu, 02 Nov 2023 23:49:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Hilyards</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f8db84c1ea3bd4daa93940b276072e45fd3ebc687912c2b6b026fdfdc81cdbb2</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.hilyards.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>North-Dakota-Grain-Inspection-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11636</link>
<guid>8c458fc1ed9bb89c1cd16889cb7e7e68</guid>
<pubDate>Thu, 02 Nov 2023 23:48:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>North-Dakota-Grain-Inspection-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5de91e739fa07672a9cb56686f66ada35a29463b6b09dd5ee692c1811966e23d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.graininspection.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gsp-Components</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11637</link>
<guid>878cbc9ed11d6c167ef0065805a85392</guid>
<pubDate>Thu, 02 Nov 2023 23:48:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Gsp-Components</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e9d44580ecd02dc770b2b96b6ef0fb1896d114149bdfb88ff3bd9a10c11ee88e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.gspcomponents.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Contact-Cottrell-and-McCullough</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11654</link>
<guid>459f9394f0bcd67a08a322b56db20dd3</guid>
<pubDate>Thu, 02 Nov 2023 14:30:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Contact-Cottrell-and-McCullough</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa3f7596b984c9d850541cadd9eac1d3d6bd71407e552341d59a5639db61470a</i><br /><br />Threat actor <b>description</b>: <i>The Contact Cottrell and McCullough clinic’s @cottrell-dental patient data became publicly available as a result of a hacker attack.</i><br />Target victim <b>website</b>: <i>https://www.cottrelldental.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>psmicorp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11630</link>
<guid>1c9884d82761f8718077f56cee0c1da4</guid>
<pubDate>Thu, 02 Nov 2023 13:01:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>psmicorp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0df1ac5e35f387ae8f7c4b57a1bd2c90ae416da7b4dd598f4ad173f26b85727</i><br /><br />Threat actor <b>description</b>: <i>PSMI was founded in 2005 with the sole objective of increasing operational effectiveness by reducing tooling and MRO spending.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>AF-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11655</link>
<guid>8541259db852d274c5de8d45fc29ea21</guid>
<pubDate>Thu, 02 Nov 2023 11:26:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>AF-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e0de4f8a6bed8fcb00d2ec4eabfd46d4d488c9e910d8ae1dbd0ecc7ddd2e6a6e</i><br /><br />Threat actor <b>description</b>: <i>-</i><br />Target victim <b>website</b>: <i>https://afsupply.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Detroit-Symphony-Orchestra</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11624</link>
<guid>e1c1c18c55ad8fad38e352a95bf4192e</guid>
<pubDate>Thu, 02 Nov 2023 01:03:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Detroit-Symphony-Orchestra</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c879318e94161fbca507abb86c26df1d7fa7b21f643bd6a94d9e95056128c04f</i><br /><br />Threat actor <b>description</b>: <i>The Detroit Symphony Orchestra, America’s fourth-oldest, has a history as varied and exciting as that of its hometown. The DSO has been at the center of Detroit’s musical heartbeat for more than 130 years, but it has faced plenty of challenges – including finding stages</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>steelofcarolina.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11618</link>
<guid>de4994a3a1ec0331d2c59d37631a4776</guid>
<pubDate>Wed, 01 Nov 2023 23:28:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>steelofcarolina.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>73d39c3e480893d12283782122866b39f4410770820f4d933d7ee9c4f1a0f422</i><br /><br />Threat actor <b>description</b>: <i>Division 5 is a full-service structural steel fabricator based in Winston GA. Founded in 2001, we currently have four manufacturing plants totalling 350,000+ square feet and over 200 hard-working, skilled men and women. We have the capacity to produc...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>kitprofs.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11620</link>
<guid>ec5972de2ccb6e92baa69e11c892ca33</guid>
<pubDate>Wed, 01 Nov 2023 23:27:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>kitprofs.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4560e973c4f501b9a978dd3307609b563f85341724ade03e32d8b3f909d7e07d</i><br /><br />Threat actor <b>description</b>: <i>Established in 1999, KIT Professionals, Inc., (KIT) is a rapidly growing multidisciplinary civil engineering and environmental consulting firm consisting of highly qualified and hands on Professional Engineers, Planners, Construction Managers and Tec...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Software-Systems-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11615</link>
<guid>19f59064291ed0341ae3765060cc4ad7</guid>
<pubDate>Wed, 01 Nov 2023 20:47:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Software-Systems-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2931a998e861db757ed500174d2140520760ae253d3c0acbf022482bf9d0cdb2</i><br /><br />Threat actor <b>description</b>: <i>Software Systems is an American company providing data processing solutions for the education market and software systems for the Indiana education market. The company's main office is located at 432 S Emerson Ave Ste 200, Greenwood, Indiana, 46143, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hawkeye-Area-Community-Action-Program-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11614</link>
<guid>c6344b0ae32e496be8b1b701e540d566</guid>
<pubDate>Wed, 01 Nov 2023 20:40:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Hawkeye-Area-Community-Action-Program-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ea361a2ae42938a84c7dd5d71497dda1f8c6b744c123b4f97ed30f8cd19df7f</i><br /><br />Threat actor <b>description</b>: <i>Hawkeye Area Community Action Program, Inc. (HACAP) began service for Linn County in 1965, following the enactment of the Economic Opportunity Act of 1964. This act provided for the development of community action programs that provide: "services, assistance, and other activities...to give promise of progress toward elimination of poverty." (EOA of 1964, Sec. 202a). This federal law provided for community-based efforts to minimize the negative impacts of low-wage incomes upon families and the community overall.</i><br />Target victim <b>website</b>: <i>http://hacap.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advarra-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11657</link>
<guid>5957b59b3b33dbf65c5f66aecb0394f7</guid>
<pubDate>Wed, 01 Nov 2023 20:40:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Advarra-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e90d8d3ea36a73ec4244d6e5676799483cee08aec7ceb4f6f9e94342162b483a</i><br /><br />Threat actor <b>description</b>: <i>.</i><br />Target victim <b>website</b>: <i>https://www.advarra.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>summithealth.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11613</link>
<guid>19781cfbcf60d73cb688a6c6ca5e55ff</guid>
<pubDate>Wed, 01 Nov 2023 19:10:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>summithealth.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a238fa6e74c1dcdf93de6bf76e13138f93c60dd4467844359dec1e5b60104345</i><br /><br />Threat actor <b>description</b>: <i>Summit Health is a physician-driven, patient-centric network committed to simplifying the complexities of health care and bringing a more connected kind of care.  Formed by the 2019 merger between Summit Medical Group, one of the nation's premier ind...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>US-Claims-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11612</link>
<guid>840aae12cd1e21200e2b729b1e151323</guid>
<pubDate>Wed, 01 Nov 2023 19:09:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>knight</b> claims attack for <b>US-Claims-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96e6396f77fb0643d548a97b536759b4a7f2004ce212195da62c24668156ee71</i><br /><br />Threat actor <b>description</b>: <i>Over 600GB of sensitive data were stolen from there. &nbsp;US CLAIMS SOLUTIONS&nbsp;Mankin Custom Motors, LLC &nbsp; https://www. mcmtx.comFF&amp;O a subsidiary of The FF&amp;O Group&nbsp;https://www.usclaimssolutions.com&nbsp;&nbsp;https://www. mcmtx.com &nbsp;&nbsp;https://www.ffando.com&nbsp;Doug IT&nbsp; : doug@squaremoat.comHere is a part of data and .......... :) We don't like players &nbsp;</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>knight</category>
</item>
<item xmlns:dc='ns:1'>
<title>Town-of-Lowa</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11658</link>
<guid>5fdfe2c20035ef27771422342d1842ff</guid>
<pubDate>Wed, 01 Nov 2023 11:28:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Town-of-Lowa</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>15a8e851bf54ed57e8667af7289a6e9661431072b600ebf6cc9d9fcc5c09c5d7</i><br /><br />Threat actor <b>description</b>: <i>In the Town of Iowa, we are defined less by boundaries on a map than by the sense of shared values our residents hold dear. Small town values, guided growth, preservation of historical, cultural, and natural heritage are just a few of the core principles that makes Town of Iowa a wonderful place to call home.</i><br />Target victim <b>website</b>: <i>https://iowala.org/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>bionpharma.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11602</link>
<guid>6412fe12d3b2f5591d7cc7f6121a8a01</guid>
<pubDate>Wed, 01 Nov 2023 11:19:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>bionpharma.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fb1e331ee3bd3d74b25c6142e6af506fa96e64dc8dff8f30edec77dfb15328b6</i><br /><br />Threat actor <b>description</b>: <i>Launched in 2014, BionPharma was founded by a team of executives and professionals with years of cumulative experience in the generics industry. Bionpharma’s goals are to develop and commercialize affordable quality generics and building strong and effective partnerships. Based in Princeton, New Jersey, and with offices in Raleigh, North Carolina BionPharma is licensed to do business in the United States and is accomplished in the areas of product development, regulatory affairs, quality management, sales and distribution, and supply chain management. Today, Bionpharma is one of the largest suppliers of soft gel capsules in the US market with a strong presence in both the prescription and over-the-counter markets. Bionpharma enjoys a presence in all the pharmacy chains across the US market, with online presence for certain of our OTC products on AmazonSITE: https://www.bionpharma.com Address  400 Alexander Park Princeton, NJ 08540</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Armstrong-Consultants</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11596</link>
<guid>711c6c3a8e58e31089c6ceb3242d8aff</guid>
<pubDate>Wed, 01 Nov 2023 06:57:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Armstrong-Consultants</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3eb1bdd050bfe6751c546da53300629c2e35b7451046c6b1806c9d0e1cb3efcd</i><br /><br />Threat actor <b>description</b>: <i>We offer a wide range of engineering, planning, environmental, and construction administration services to span the entire lifespan of any airport project. Armstrong Consultants, Inc. is a professional consulting firm specializing exclusively in airport planning, engineering, and construction administration services. As a firm, our purpose is to provide opportunities for future generations by partnering with communities to improve their airports. Our objective is to help you accomplish your vision for your airport by delivering innovative and effective ongoing airport planning and engineering services. Since 1973, Armstrong has brought an unmatched level of expertise, commitment, and perspective to the field of aviation. Our firm delivers innovative solutions to today's most pressing airport challenges armstrongconsultants.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kingsport-Times-News</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11593</link>
<guid>285baacbdf8fda1de94b19282acd23e2</guid>
<pubDate>Wed, 01 Nov 2023 00:54:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Kingsport-Times-News</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5542aa2a0f7932fba06457e399af4bad2424043448e6bdef3f5bb13119d02424</i><br /><br />Threat actor <b>description</b>: <i>Local News Weather and Sports coverage for Kingsport Tennessee and the Tri-Cities The Kingsport Times News is a daily newspaper serving Northeast Tennessee and Southwest Virginia https://www.timesnews.net/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Universal-Sewing-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11591</link>
<guid>6595f3201568e5db6f3cac0a73bff243</guid>
<pubDate>Tue, 31 Oct 2023 21:03:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Universal-Sewing-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96942ba38589557ad29f8f4092422a2ab504f7acd7d8916f7ad5a701d3722890</i><br /><br />Threat actor <b>description</b>: <i>Universal Sewing Supply was founded in 1956 in St. Louis, Missouri. Universal Sewing Supply provides industrial sewing equipment, supplies, and parts as well as air line components, valves, air hoses...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>riohondo.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11584</link>
<guid>67a3c1520c0b54c1f3be3fcfb4f1dca0</guid>
<pubDate>Tue, 31 Oct 2023 15:14:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>riohondo.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ed5fbbddcd13aa694f956414822b7f4d3db14acb61b638b819fb69f0c187e3c</i><br /><br />Threat actor <b>description</b>: <i>Río Hondo College is an educational and community partner committed to advancing social justice and equity as an antiracist institution that collectively invests in all students’ academic and career pathways that lead to attainment of degree, certifi...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Prasan-Enterprises</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11583</link>
<guid>1fa93a4060e2f6c604a3f5173e19d227</guid>
<pubDate>Tue, 31 Oct 2023 15:07:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Prasan-Enterprises</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>404c74a966d4d95313b06dc693a75b1dd75c7ff20258eb6e443e56aaadef0231</i><br /><br />Threat actor <b>description</b>: <i>Prasan Enterprises is now one of the largest distributors of telecommunication products in the United States.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mount-Carmel-Care-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11579</link>
<guid>5ef20b89bab8fed38253e98a12f26316</guid>
<pubDate>Tue, 31 Oct 2023 10:33:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Mount-Carmel-Care-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4cb5243c6f293c3b4441bae05849ae9a187dc919570def65901420ff338ceb3</i><br /><br />Threat actor <b>description</b>: <i>Mount Carmel Care Center, Inc. is a member of the Carmelite System, exclusively comprised of nursing and rehabilitation, independent living and assisted living facilities that span the Northeast and the Midwest, as well as a facility in Dublin, Ireland.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dynametal-Technologies-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11575</link>
<guid>12007262fce809193497e0dd36b00f8d</guid>
<pubDate>Tue, 31 Oct 2023 07:24:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Dynametal-Technologies-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5ff1a514b8f05dfc520e24cec95902c941b6570a3883e9b34f9b95c316b1db3f</i><br /><br />Threat actor <b>description</b>: <i>Dynametal Technologies Inc. is an employee owned company and we take great pride in serving our customer's needs for over forty years from our Brownsville, Tennessee facili...</i><br />Target victim <b>website</b>: <i>https://www.dynametal.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>Intellipop-Fiber-Internet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11570</link>
<guid>eb2538078fc0e47beef6c4bd5188c471</guid>
<pubDate>Tue, 31 Oct 2023 06:16:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>knight</b> claims attack for <b>Intellipop-Fiber-Internet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>773dd4bcc3a43e68717a518068cda5766698e606a6fb07c217b7a74755ed5e12</i><br /><br />Threat actor <b>description</b>: <i>Intellipop is a locally owned Internet Service Provider located in Payson, UT. We have been in service since 2014 and provide local residents a better, local alternative to internet service without the hidden fees, contracts and data limits you might find with other providers.We offer lightning fast services specializing in high speed internet in Payson and Santaquin and in all Utopia Fiber cities.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>knight</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brodart</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11562</link>
<guid>673de96b04fa3adcae1aacda704217ef</guid>
<pubDate>Mon, 30 Oct 2023 22:31:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Brodart</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>134d43cc189d7148c429e7744e256a52f3163e7530078a9fd33b01409ee908cb</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.brodart.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Global-Export-Marketing-Co.-Ltd.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11552</link>
<guid>31929d25d1c8e249e562153efe1dc65b</guid>
<pubDate>Mon, 30 Oct 2023 01:04:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Global-Export-Marketing-Co.-Ltd.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>041e7fdad552a9f16b1fc2ac9d7822ec5c1647eb20887e849024aeff0730f550</i><br /><br />Threat actor <b>description</b>: <i>GEMCO is a pioneering company that helps American international brands to reach out to the world. We are driven by quality, service, reliability, and our success over the last 31 years has been...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>WACOSA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11660</link>
<guid>7b72de504960bfce0e38c14bdfeda3f1</guid>
<pubDate>Sun, 29 Oct 2023 17:36:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>WACOSA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e92df45bd6e5fc7fa1241c57b1beefed848409abb4bd7f84173adc07063eca96</i><br /><br />Threat actor <b>description</b>: <i>WACOSA works for adults with disabilities, building a circle of support that empowers individuals to develop skills, explore and pursue employment, and foster community connections from graduation through retirement.  </i><br />Target victim <b>website</b>: <i>https://wacosa.org/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>IBACOS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11551</link>
<guid>34b9e872ae045712e436677940befcff</guid>
<pubDate>Sun, 29 Oct 2023 13:11:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>IBACOS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c812601c2f65bcf750c2a1c0a2f342dd910321e93574e1a2fb6f62f4b16d5091</i><br /><br />Threat actor <b>description</b>: <i>IBACOS specializes in home building innovation and the delivery of new product and process technologies. For over 30 years, we have worked with leading homebuilders, industry suppliers, and the U.S. Department of Energy to improve the quality and performance of the American home. For over 30 years, IBACOS has worked with leading homebuilders, industry suppliers, and the U.S. Department of Energy to improve the quality and performance of the American home. The IBACOS team has extensive experience in the processes of innovation, building science research, construction quality management, technology deployment, risk mitigation, and business strategy. IBACOS specializes in homebuilding innovation and partners with production homebuilders to ensure that homes are built to the expected levels of quality and sustainability. ibacos.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dallas-County</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11548</link>
<guid>6f3ee5b43d930a54d31a59930b071adc</guid>
<pubDate>Sat, 28 Oct 2023 22:46:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Dallas-County</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>67bacc232c964cf86658b18724c15a28ef60d64b2cf1e1c0e5b907e4c0168f6b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.dallascounty.org</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alpha-Mortgage</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11549</link>
<guid>77bea4fdd88777d0914a739a47c775ea</guid>
<pubDate>Sat, 28 Oct 2023 22:45:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Alpha-Mortgage</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d855a074216a8605f05571f21a31534fabdf3de3a3d9a1a3a20dc5d4a7651b3b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.alphamortgage.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Encompass-Elements</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11550</link>
<guid>78bbb28f2ca60a5b9e82650b8b297cd4</guid>
<pubDate>Sat, 28 Oct 2023 22:45:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Encompass-Elements</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b73953d01a10bd69306566e23bf08d97565f1e3951635833a25313207977fd6</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.encompasselements.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>CK-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11546</link>
<guid>fa12a7143c24200577be53e74c33f9f6</guid>
<pubDate>Sat, 28 Oct 2023 22:44:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>CK-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9b1e7cb680c6bc515fa2157018bf809dcc755e079ce9aaf0bed687f656b73cb</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.c-ka.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Yingling-Aviation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11547</link>
<guid>a74721c39a4065c138540602ec99d2cf</guid>
<pubDate>Sat, 28 Oct 2023 22:43:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Yingling-Aviation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e5c1724f6503842c4d6e919a29ccab8b6d90890ebe40a257754a5478ebe1cd79</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.yinglingaviation.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sam-Tell-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11539</link>
<guid>411529f9fb48ac607d085905b0b3a9f1</guid>
<pubDate>Sat, 28 Oct 2023 18:14:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Sam-Tell-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0744f156b8ce37905d955c6ff72bd17cbc7860abeb378bc04b6e208b7900f743</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.samtell.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Waterstone-Faucets</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11540</link>
<guid>eed43ed95207149ced1c0f1f8a2c0f67</guid>
<pubDate>Sat, 28 Oct 2023 18:14:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Waterstone-Faucets</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>43894be42c065e1ff9504ad023044d22dd9aac9a597ad464f428eb5882942391</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.waterstoneco.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bush-Refrigeration</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11541</link>
<guid>28bbd522fee8ef2020ff5828be644942</guid>
<pubDate>Sat, 28 Oct 2023 18:13:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Bush-Refrigeration</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fcea215f4234c9f0524d6dcbc1fe65842a04079bb0fd8d5cd934335ad76e4c1e</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.bushrefrigeration.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Drug-Emporium</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11542</link>
<guid>ba4849411c8bbdd386150e5e32204198</guid>
<pubDate>Sat, 28 Oct 2023 18:13:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Drug-Emporium</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e9ec2e424ea917b0615d790092075b5db8a7a4b7ecd555403cd974baa7e0fd87</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.drugemporiuminc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Online-Development</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11543</link>
<guid>119cfdda78d6eb10cb33fa329c735eb4</guid>
<pubDate>Sat, 28 Oct 2023 18:12:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Online-Development</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e0d3cd34656e2b4196aaee7143523dd756f08abfc6dbd2e45077d7b366a929d</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.oldi.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>KDI-Office-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11544</link>
<guid>049a632efba268d49b6a861759a4268a</guid>
<pubDate>Sat, 28 Oct 2023 18:12:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>KDI-Office-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf6fa98d23ac8a83a0a1fb69cdcd7487a8cfa10f7b4d7deeb27b7aac1420382a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.kdi-inc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>TNT-Plastic-Molding</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11538</link>
<guid>cf55a3f1c3e9436d5febcd736ed7fc43</guid>
<pubDate>Sat, 28 Oct 2023 18:04:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>TNT-Plastic-Molding</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>80fb606e1d269527f8181af5b67015640965e697930149b50469217ab4cebba0</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1973, TNT Plastic Molding is conveniently located in the city of Corona, California. Our 120,000 square-foot facility is equipped with state-of-the-art machinery, robotics, computerization and Quality Management Systems.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>boeing.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11536</link>
<guid>8ee7730e97c67473a424ccfeff49ab20</guid>
<pubDate>Fri, 27 Oct 2023 19:22:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>boeing.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>65a9c37167e5d79027fee9311ef833ad2ded42ae38ec84bd60926a198737e536</i><br /><br />Threat actor <b>description</b>: <i>Boeing, the 60 billion Company, together with its subsidiaries, designs, develops, manufactures, sells, services, and supports commercial jetliners, military aircraft, satellites, missile defense, human space flight, and launch systems and services w...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>tilden-coil.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11533</link>
<guid>c21f4ce780c5c9d774f79841b81fdc6d</guid>
<pubDate>Fri, 27 Oct 2023 13:23:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>tilden-coil.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7fdc00b71ada437d2edf47f5e67ad868f4c6f2bd546e1611e0dbb9b950ca068c</i><br /><br />Threat actor <b>description</b>: <i>Tilden-Coil Constructors, Inc. is a general contractor and construction manager focusing on high quality educational, institutional, commercial and industrial facilities throughout Southern California for over 80 years.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mutual-Underwriters</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11663</link>
<guid>80e4e458131f4edc49cacad3ec586437</guid>
<pubDate>Fri, 27 Oct 2023 13:20:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Mutual-Underwriters</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a726fef4ac08a6521f01aeeffdea075d2d0e9c5bad68433cac01322e5b1cb07b</i><br /><br />Threat actor <b>description</b>: <i>Top insurance providers in Hawaii. Since 1958,Mutual Underwriters have provided insurance to folks in Hawaii and have expanded our services to include every type of  insurance whether it's for your home, vehicle or family health. We also offer insurance for commercial needs.   Over 700GB of personal data were stolen from there, including:  - detailed insurance information (name of insured, amount of payments, contacts, address, etc)  - financial data (transfers, payments, etc)  - access to insurance providers applications (with possibility to manage insurances)  - employees personal details (contacts, payments, passwords to personal services, etc)  - other sensitive data elated to customers and employees which supposed to be protected    Unfortunately for ordinary people the top management of Mutual Underwriters offered only "words" to protect their data. This sum is unacceptable. Since all the time needed for their bosses to make a decision were given and all the evidences were provided, Mutual Underwriters decided to stop the negotiation process,  you can find all the data stolen from them for free download now.  </i><br />Target victim <b>website</b>: <i>https://www.mutualunderwriters.net/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stanford-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11534</link>
<guid>50c57f7019bb52cfbebdfe5bdc42b422</guid>
<pubDate>Fri, 27 Oct 2023 13:20:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Stanford-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>334ac4094bdf62854b53634d0715b4f6cca9f13fb78ea4118995283fe87e9a6a</i><br /><br />Threat actor <b>description</b>: <i>Stanford University is one of the world's leading research universities. Stanford is known for its entrepreneurial character, drawn from the legacy of its founders, Jane and Leland Stanford, and its relationship to Silicon Valley. Soon the university will be also known for 430Gb of internal data leaked online. Private information, confidential documents etc. Who is interested - contact us in messages section.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wilson-Lewis</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11531</link>
<guid>fd92a703e837c873aca02bf1edfafcfe</guid>
<pubDate>Fri, 27 Oct 2023 09:59:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Wilson-Lewis</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aed978207104a020fd844ffec7b915d877ece7e065056481f6b00409da40d395</i><br /><br />Threat actor <b>description</b>: <i>Wilson Lewis is a certified public accounting firm designed to make your life easier. Our main objective is to offer quality advisory services, personal attention, and an economic guide created to protect and grow your future. To accomplish that goal, we've assembled a team of experienced professionals that will meet your needs with an unmatched quality of expertise. At Wilson Lewis, every effort is made to develop an understanding of our clients' needs, business endeavors and future goals. Our clients' success, security, financial needs and trust are extremely important to us. We measure our success based upon the success of our clients. We value our professional relationships and treat them with the utmost respect and confidentiality. We are not one of the "big" CPA firms, and this works to our clients' advantage in many ways. Our advantage is the personal involvement we are able to offer our clients, allowing us to adapt to their personal needs today and develop trusting relationships to grow with them tomorrow. https://www.wilsonlewis.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>caminorealcs.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11527</link>
<guid>83e8fe6279ad25f15b23c6298c6a3584</guid>
<pubDate>Thu, 26 Oct 2023 18:01:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>caminorealcs.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b85802e754e3eba05f49a70b4c6b9895430f8e7c2dab3eada5db6e1420643307</i><br /><br />Threat actor <b>description</b>: <i>Camino Real Community Services providing mental, behavioral and intellectual disability services to Atascosa, Dimmit, Frio, Karnes, La Salle, Maverick, McMullen, Wilson and Zavala counties.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>doverchem.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11526</link>
<guid>5f928e920ac121d34a2aeae8c87953d4</guid>
<pubDate>Thu, 26 Oct 2023 16:37:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>doverchem.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7e2b54b30a866ff0d9aca58d63a277eccc1382377631a51ba571a76bbab7815a</i><br /><br />Threat actor <b>description</b>: <i>Dover Chemical Corporation is a leading producer of alkylphenols, chlorinated alkanes, polymer additives, liquid and solid antioxidants (including organophosphites), flame retardants, additives for water-based and oil-based metalworking fluids and dr...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>claimtek.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11524</link>
<guid>e2d52448d36918c575fa79d88647ba66</guid>
<pubDate>Thu, 26 Oct 2023 12:21:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>claimtek.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fdba35881b26a9c5f7b70bccb606e912882f527434f8e70faa6796d1a512a6ff</i><br /><br />Threat actor <b>description</b>: <i>ClaimTek’s Professional Medical & Dental Billing Software Offers Advanced Features, Versatility And Flexibility. When you work with ClaimTek, you are working directly with the software developer. ClaimTek offers a professional suite of modern...</i><br />Target victim <b>website</b>: <i>claimtek.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>apexga.bank</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11523</link>
<guid>88ceeb0496aa9e60b4b6b6a5dafe3648</guid>
<pubDate>Thu, 26 Oct 2023 10:38:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>apexga.bank</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3eaa39d100f3cf1745fdb96af12440b4d203a45179885aad93285d6da4e299bf</i><br /><br />Threat actor <b>description</b>: <i>apexga.bank 5 VMware  VM  from Production Servers</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fortive-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11521</link>
<guid>40a0f39c64ba33b9d04168d476f53407</guid>
<pubDate>Thu, 26 Oct 2023 00:29:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Fortive-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45f8c4e0e39f12090c6040854c0a7bd8f80592e6eedf60ac78131925ba002da8</i><br /><br />Threat actor <b>description</b>: <i>Fortive Corporation is a provider of essential technologies for connected workflow solutions across a range of attractive endmarkets. Our strategic segments - Intelligent Operating Solutions, Precision Technologies, and Advanced Healthcare Solutions - include well-known brands with leading positions in their markets. Our businesses design, develop, manufacture, and service professional and engineered products, software, and services, building upon leading brand names, innovative technologies, and significant market positions. We are headquartered in Everett, Washington and employ a team of more than 18,000 research and development, manufacturing, sales, distribution, service, and administrative employees in more than 50 countries around the world.SITE: www.fortive.com Address  6920 Seaway Blvd, Everett Washington, 98203 United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mn-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11519</link>
<guid>22f791da07b0d8a2504c2537c560001c</guid>
<pubDate>Wed, 25 Oct 2023 21:26:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Mn-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9eec7b96c3fb176d8d0370228907a370075fd0c50a2d11930d96eb5c81687592</i><br /><br />Threat actor <b>description</b>: <i>M&N Management has been in business for greater than 25 years. What makes M&N Management unique is our attention to detail. This detail is achieved through not only our commitment to maintenance and service but our long term ownership and familiarity with the property and</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ancillae-Assumpta-Academy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11520</link>
<guid>cdf49f5251e7b3eb4f009483121e9b64</guid>
<pubDate>Wed, 25 Oct 2023 21:25:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Ancillae-Assumpta-Academy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bed97ad6883e3f4dfc00ec3e0c0ee5ba8e361f7df717fa7683826f73a9a60aae</i><br /><br />Threat actor <b>description</b>: <i>As a private Catholic elementary school, Ancillae-Assumpta Academy has a clearly articulated and rigorous curriculum rooted in Gospel values and focused on 21st century skills. Since 1945, the Handmaids of the Sacred Heart of Jesus have provided a unique educational program for students in pre-school</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pine-River-Pre-Pack-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11514</link>
<guid>e6eb49c63548fd56f34508d1a0c3b37b</guid>
<pubDate>Wed, 25 Oct 2023 13:24:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Pine-River-Pre-Pack-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c90bc19c401c5270404b027798146cf3712819c35ceb82829c1b7753ebb1643f</i><br /><br />Threat actor <b>description</b>: <i>Located in the Wisconsin countryside, Pine River has been making award-winning cheese spreads and confections since 1963. Located in the Wisconsin countryside, we have been making award-winning cheese spreads and confections since 1963. We combine more than four generations of experience in the cheese business with today's precision processing techniques to make our cheese spreads. Exacting manufacturing standards and our state-of-the-art cutter assure standout flavor and texture. Pine River makes two types of cheese spread: Cold Pack and Snack Spread. They are distinguished by the method of mixing and ingredients. Both are packaged fresh in durable poly tubs with high-speed filling, sealing and labeling machines. Containers range from consumer sizes for home use (six to 32 ounce tubs) to institutional portions for restaurant and deli use (10 or 30 pound buckets). Pine River currently has five excellent brochures that you can use to raise money for your school, team, band, charity organization, or other worthy cause. Our products are always fresh and of the highest quality. Our quick turn around times will also help your friends and family receive their products on time. Let Pine River make your next fundraiser easy and a great success! pineriver.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Harmann-Studios-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11515</link>
<guid>82e9e7a12665240d13d0b928be28f230</guid>
<pubDate>Wed, 25 Oct 2023 13:23:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Harmann-Studios-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>774fbcc4810f966cdaefb56c38317f427ec7cd87ced989b5c45239ec92bbc07c</i><br /><br />Threat actor <b>description</b>: <i>Harmanns is a studio, school, and commercial photographer, specializing in senior, family, business, and church photography. Serving Appleton, Green Bay, De Pere, and Luxemburg. High School Senior, Family, and Business Photographer Harmann Studios is a 50 year old business but has not settled for business practices that were set back in the beginning by Clif and Wayne Harmann but have used it as a foundation. The foundation of exquisite imaging with the attention to detail in lighting, posing, and printing have carried on in the traditions that the founders have brought to Harmann Studios. The digital age has brought many new opportunities such as self publishing, printing on many substrates, and given our customer new opportunities to receive custom products that are catered to their needs harmann.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Broad-River-RetailAshley-Store</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11513</link>
<guid>5d9a8bf41762edc791eb6d353d7772b1</guid>
<pubDate>Wed, 25 Oct 2023 11:57:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lorenz</b> claims attack for <b>Broad-River-RetailAshley-Store</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2fdf74816d132b688be61fc093ff355d2517f30933ce36d7d0c445258c4a5262</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.Broad River Retail/Ashley Store</i>]]></description>
<category>lorenz</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cardiovascular-Consultants-Ltd</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11512</link>
<guid>646c9941d7fb1bc793a7929328ae3f2f</guid>
<pubDate>Wed, 25 Oct 2023 10:31:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Cardiovascular-Consultants-Ltd</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>855b303656449fc2624d7a7e2648dc1dabaf85adff2180cdc579da1ffb3355cb</i><br /><br />Threat actor <b>description</b>: <i>You can download all personal data of clients and employees of this company below</i><br />Target victim <b>website</b>: <i>cvcheart.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>LBA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11665</link>
<guid>a6e94d012df993c363fb358bf365ee05</guid>
<pubDate>Wed, 25 Oct 2023 10:19:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>LBA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f8125902a23edaaf4076899be104e0865d17ad9497f58bee0c1893a81944611b</i><br /><br />Threat actor <b>description</b>: <i>Established in 1973, LBA Hospitality is a hotel management, development and consulting company headquartered in Dothan, Alabama</i><br />Target victim <b>website</b>: <i>https://www.lbaproperties.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>camico.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11507</link>
<guid>a1d438de7c606094c7a374b8da4418ad</guid>
<pubDate>Tue, 24 Oct 2023 22:13:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>camico.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c5e2343d2a36c7de9c52402b838471484d95a1ccf0779d341aeee70af1b8865</i><br /><br />Threat actor <b>description</b>: <i>CAMICO challenges the traditional insurance company approach to protecting CPAsCAMICO proactively protects you with products and services designed specifically for CPAs. We take better care of accountants with specialized expertise and a dedicate...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>martinsonservices.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11509</link>
<guid>8a488824cb3388fe033e110b350ef9e9</guid>
<pubDate>Tue, 24 Oct 2023 22:12:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>martinsonservices.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>104fb27d7188e6f8403085d8b4618301d46af92048f40a540403958afa26f8c0</i><br /><br />Threat actor <b>description</b>: <i>Address: 8640 Welby Road Thornton, Colorado 80229 Martinson Snow Removal provides complete grounds services. We are your source for all parking lot and property maintenance services including snow removal, sweeping, striping, asphalt and concrete rep...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Victorville</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11506</link>
<guid>d51c43b88fceb9f8c8cc37be2f550139</guid>
<pubDate>Tue, 24 Oct 2023 21:04:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>City-of-Victorville</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6419dc6a91dea0d586e5c0002c7135bd896b5c94a510d5d850cbc88138dbd506</i><br /><br />Threat actor <b>description</b>: <i>Located in Southern California at the high-point between Los Angeles and Las Vegas, Victorville is the leading city for both industry and retail in the High Desert region. ...</i><br />Target victim <b>website</b>: <i>https://victorvilleca.gov</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>CMC-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11500</link>
<guid>bdcb5c740603615e28537070b93f9c26</guid>
<pubDate>Tue, 24 Oct 2023 17:52:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>CMC-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>072c739c43a9b8cef5c01af9d8af89fd97aa9a1790ba2769e0da17250545899c</i><br /><br />Threat actor <b>description</b>: <i>CMC Group is a fully integrated real estate development company focused on luxury residential, commercial and retail properties. 270Gb of data will be available. Very detailed clients informationincluding a DB (addresses, phone numbers, passports/ssns scans etc), confidential documents, contracts projects... And enormous number of accounting files are going to be uploaded. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Pittsburg</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11666</link>
<guid>1325cdae3b6f0f91a1b629307bf2d498</guid>
<pubDate>Tue, 24 Oct 2023 13:21:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>City-of-Pittsburg</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c111591964acea8c1cca6f86f811da578528503e24c59f293ebdc9a4c605d1d8</i><br /><br />Threat actor <b>description</b>: <i>Pittsburg is a city in Crawford County, Kansas, United States, located in southeast Kansas near the Missouri state border. It is the most populous city in Crawford County and southeast Kansas. As of the 2020 census, the population of the city was 20,646. It is the home of Pittsburg State University</i><br />Target victim <b>website</b>: <i>https://www.pittks.org/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>EDUARDO-G.-BARROSO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11499</link>
<guid>c9db8f9fa9b8bccb28acb108e1d07a3c</guid>
<pubDate>Tue, 24 Oct 2023 13:18:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>EDUARDO-G.-BARROSO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c3b557dfc6e3499cf6274c43a4f936093a133b37c8351559b7f28451119717e</i><br /><br />Threat actor <b>description</b>: <i>We are committed to helping our patients look and feel beautiful and confident every day of their lives.We strive to provide our patients with the highest quality of care and our guarantee of personal attention at each step of the surgical process. From your first visit to your last post procedure check-up, you will experience a comfortable and relaxed atmosphere with a focus on patient education and thorough discussion so you can make well informed decisions. Our goal is to formulate the best treatment plan that will help you reach your aesthetic needs with the most natural appearing outcomes. We couple this experience with strictest standards of patient privacy and confidentiality. https://plasticsurgerymd.net</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.portage.k12.in.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11498</link>
<guid>91cff01af640a24e7f9f7a5ab407889f</guid>
<pubDate>Tue, 24 Oct 2023 09:59:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>www.portage.k12.in.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38c3f4eaf074d7a1b6400ee4078043fe3eaa5b4c3d9f74e66a51259da4d8756f</i><br /><br />Threat actor <b>description</b>: <i>If we do not receive the ransom within 48 hours. All data will be published.</i><br />Target victim <b>website</b>: <i>https://www.portage.k12.in.us/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>SURTECO-North-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11496</link>
<guid>63f2376b07a18fdca7e3553b052e2eab</guid>
<pubDate>Tue, 24 Oct 2023 07:06:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>SURTECO-North-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7af26d8ce00fb9bbb6ecdab69a44cc8df4233c02dd86a4369043944e96d19849</i><br /><br />Threat actor <b>description</b>: <i>Surteco NA is a leading, full service provider of decorative surfaces. Starting with designs created from natural material, our products provide a way to achieve your ultimate vision. Three brands, one shared vision. Surteco, Dollken and BauschLinneman are perfecting products and increasing the number of ways in which ideas can be turned into reality. With our many years of experience, technical know-how and design expertise, Surteco provides more than a product; we provide a comprehensive solution. Surteco offers complete vertical integration for our customers: design development, cylinder engraving, decor printing, finish foils created with a state of the art lacquer process and an extensive variety of edgebanding. suddekorllc.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Newconcepttech</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11495</link>
<guid>8e08227323cd829e449559bb381484b7</guid>
<pubDate>Mon, 23 Oct 2023 19:06:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cuba</b> claims attack for <b>Newconcepttech</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa783e0b7ff8b71a70228f0968ac69068b339c3d44e72876c5b525d2112f9536</i><br /><br />Threat actor <b>description</b>: <i>FROM A SINGLE START-UP TO A MULTI-MILLION DOLLAR COMPANYOur prosperity is due to three interlocking factors: the first, being our customers, who have always come first.The second, our employees, who are passionate about serving our...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cuba</category>
</item>
<item xmlns:dc='ns:1'>
<title>Motorcycles-of-Charlotte--Greensboro</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11484</link>
<guid>97fc9b260a90d9c0aca468d2e6536980</guid>
<pubDate>Mon, 23 Oct 2023 16:14:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Motorcycles-of-Charlotte--Greensboro</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33959fad723fc07313e3e2571b0656e956daad12a152d81a89c458bb2fb8f682</i><br /><br />Threat actor <b>description</b>: <i>Welcome to Motorcycles of Charlotte & Greensboro, one of the Southeast's oldest European Motorcycle Dealers. We specialize in BMW, Ducati, Triumph, Morgan Three-Wheelers, M...</i><br />Target victim <b>website</b>: <i>https://www.bmw-ducati.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>3-D-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11667</link>
<guid>fc5c0cd21ddca3b39da73342bc41752c</guid>
<pubDate>Mon, 23 Oct 2023 16:02:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>3-D-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56d1ceb3089117bc873d6f4f5cc1d18e957c9925126515ce14a216a585e6ae74</i><br /><br />Threat actor <b>description</b>: <i> 3-D Engineering Corporation was founded to meet the growing demands for high quality outsourced Engineering Services. We recognized in 1998 as we do today, the need for High Quality, Cost Effective Solutions essential for today’s technology based companies.  Since our inception, we have worked relentlessly to identify and integrate key engineering and manufacturing capabilities to serve our clients needs. Our core set of best practices and industry knowledge spans the entire product development life-cycle.  This ranges from product requirements definition, analysis, concept creation, design development, prototyping and manufacturing. 3-D Engineering enables organizations to decrease time-to-market and costs while improving product quality. We have established both internal resources and partnerships to meet our client’s needs rapidly.  Clients recognize the value we deliver when presented with challenging new technologies and manufactured products. We serve diverse markets, with special emphasis in the commercial, consumer and microlithography sectors. We offer you:      Industry recognized best practices     Utilization of the latest technologies     Cost effective established supply chain     Consistent execution     Proven track record     Measurable results     One-stop-shop     Technical expertise and industry sector knowledge     Proven success in diverse areas of service </i><br />Target victim <b>website</b>: <i>https://www.3deng.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ada-Borup-West-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11477</link>
<guid>61add4df79c2f21aa7f7dfa9a394fab9</guid>
<pubDate>Mon, 23 Oct 2023 13:14:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusalocker</b> claims attack for <b>Ada-Borup-West-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0047ae40cb1da32eaaba8bea6e9195290dd4468d28274ff66846ef93e3f2a16c</i><br /><br />Threat actor <b>description</b>: <i>Descriptionemployee information – student information – all contracts Price: 35000$</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusalocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>wellons.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11478</link>
<guid>6954f0b6918c1bcf7446eb6505553d65</guid>
<pubDate>Mon, 23 Oct 2023 13:14:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusalocker</b> claims attack for <b>wellons.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a23eb0db8cd85929b807840914793aa711c778ec84d12b4f9cb02b98c4f793e6</i><br /><br />Threat actor <b>description</b>: <i>Descriptionemployee information – agreement – customer email(.xls)- pst files 15+GB all outlook message 2006-2023 year Price: 55000$</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusalocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>harlingentx.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11475</link>
<guid>661b1e76b95cc50a7a11a85619a67d95</guid>
<pubDate>Mon, 23 Oct 2023 08:39:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>harlingentx.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e154fa395f35969e27a3dec29d89275f57de180b085b7b8e9b6009d84b12c78f</i><br /><br />Threat actor <b>description</b>: <i>Harlingen, Texas</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dr.-Jaime-Schwartz-MD-FACS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11474</link>
<guid>0607f4c705595b911a4f3e7a127b44e0</guid>
<pubDate>Sun, 22 Oct 2023 13:04:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hunters</b> claims attack for <b>Dr.-Jaime-Schwartz-MD-FACS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c37ab9981f32775a2aa01ff46672017f1099435292940a97da2ac360b17d2e8f</i><br /><br />Threat actor <b>description</b>: <i>Country : United States of America - Exfiltraded data : yes - Encrypted data : yes</i><br />Target victim <b>website</b>: <i>https://www.drjaimeschwartz.com/</i>]]></description>
<category>hunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Edwards-Business-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11470</link>
<guid>139ae036df3080e2678cdb11bb2b88de</guid>
<pubDate>Sun, 22 Oct 2023 08:32:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Edwards-Business-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7e862cdb170805ca06790e8655aa61b57406f5fc40f18e6f28f24c710f1c784</i><br /><br />Threat actor <b>description</b>: <i>Edwards Business Systems has served local companies in Eastern PA since 1954. Today the company is one of the largest independent office equipment companies in North America. Edwards offers solutions from the best-known names in the office equipment industry. The company delivers fully integrated document solutions backed by local professionals that deliver outstanding service. Our Mission is to do the best for our clients and to completely satisfy them by providing quality business systems and superior services. Edwards Business Systems has been in business for over 60 years, making it one of the oldest independent dealers in the country https://www.edwardsbusiness.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>JC-Roman-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11472</link>
<guid>b7852f3d3a775b5188139a2c07024397</guid>
<pubDate>Sun, 22 Oct 2023 08:31:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>JC-Roman-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d6fe0dd8ca3c9b5daffdad9bf520421fe65451a1fd6158f5504da549a2db9d30</i><br /><br />Threat actor <b>description</b>: <i>JC Roman Construction Company has been in business for over 18 years and our knowledgeable staff have over 100 years of combined experience in underground utilities https://jcroman.net/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>APS---Automotive-Parts-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11473</link>
<guid>c8512d142a2d849725f31a9a7a361ab9</guid>
<pubDate>Sun, 22 Oct 2023 08:30:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>APS---Automotive-Parts-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>beb2d06418e24fa2a07681093d645d120d24244c1890ccd7594c9017a03371f7</i><br /><br />Threat actor <b>description</b>: <i>Automotive Parts Solutions, Inc. located in the Rockville - St. Cloud area of Minnesota is a supplier of used auto parts to insurance companies, collision centers and auto repair facilities throughout Minnesota, North Dakota, South Dakota, Wisconsin, and Iowa. APS is an URG 8000 certified and CAR Gold Seal certified recycler, which guarantees you are getting accurate part descriptions, quality auto parts, and professional service https://automotiveps.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>kvc-constructors-inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11469</link>
<guid>20337d9ceb6b6438f1195b399ed0a0e2</guid>
<pubDate>Sun, 22 Oct 2023 04:50:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>kvc-constructors-inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f6f48c9c20cd63e8eeabc8bc36b7b5ba6737dd1f1856ae111ef52bbba789f92</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Foursquare-Healthcare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11468</link>
<guid>170f22f2d331241cb0480a8c4c416dda</guid>
<pubDate>Sat, 21 Oct 2023 22:15:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Foursquare-Healthcare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46b0bbd2e9145c23dac204a7039c75e126a3b330b733d748f396a83102f348d3</i><br /><br />Threat actor <b>description</b>: <i>We Are The Leaders In Compassionate Care. Our supported facilities combine the industry’s latest treatment techniques and equipment in a highly personalized interdisciplinary approach to care. This patient-centered treatment enables our rehabilitation guests to return home as quickly as possible. We will provide our long-term residents with an enhanced well being and quality of life with the home town hospitality that you will learn to know and trust</i><br />Target victim <b>website</b>: <i>https://www.foursquarehealthcare.com/</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Simpson-Strong-Tie</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11464</link>
<guid>cdaa9b682e10c291d3bbadca4c96f5de</guid>
<pubDate>Sat, 21 Oct 2023 20:19:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Simpson-Strong-Tie</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>78e7533f4e7f0856a7a287f2b1540ee210b770c54a0945565085efbbc2da9932</i><br /><br />Threat actor <b>description</b>: <i>Simpson Strong-Tie is the world leader in structural engineering solutions and deeply dedicated to a mission of helping people design and build safer, stronger structures. For more than 60 years, Simpson Strong-Tie has dedicated itself to creating structural solutions and technology to help people construct safer, stronger homes and buildings. Considered an industry leader in structural systems research, testing and innovation, Simpson Strong-Tie works closely with construction professionals to provide code-listed, field-tested products and value-engineered solutions. Our engineered products and solutions are recognized for helping structures resist high winds, hurricanes and seismic forces. They include structural connectors, fasteners, fastening systems, lateral-force-resisting systems, anchors, software solutions, and product solutions for repairing, protecting and strengthening concrete. From product development and testing to training and engineering and field support, Simpson Strong-Tie is committed to helping customers succeed.SITE: www.strongtie.com Address  5956 W. Las Positas Blvd *Pleasanton, Ca 94588 * United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sidockgroup</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11463</link>
<guid>8d56f73cb2ee64adf1c0a24a0cd432f5</guid>
<pubDate>Sat, 21 Oct 2023 17:34:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>donutleaks</b> claims attack for <b>Sidockgroup</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2760e7e45177648ac7761854058fb59fa32626a5cfd65fc52507e7a137b6408</i><br /><br />Threat actor <b>description</b>: <i>Established in 1974, we are a full-service firm with offices  throughout Michigan and have completed projects in most market sectors (website: sidockgroup.com) First sample of the data which will be posted.. There a lot of credit card information, bills and SSNs, carders will be very happy to use it.…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>donutleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tru-val-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11457</link>
<guid>57b4b4a28e16316cdd028bf6e23ae100</guid>
<pubDate>Fri, 20 Oct 2023 20:50:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Tru-val-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a94355cdf25e1b826183f0cdc409d99732a0901b4c8d559743dc52bbadecd26a</i><br /><br />Threat actor <b>description</b>: <i>New Jersey, United States</i><br />Target victim <b>website</b>: <i>www.tru-val.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bridgeport-Fittings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11447</link>
<guid>327e125136fd2d7d012efe5acf1a1301</guid>
<pubDate>Fri, 20 Oct 2023 20:49:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Bridgeport-Fittings</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>67a66b690ef754ab84e363391a7ee294711afd70252ae407b7afd24bf23f3edc</i><br /><br />Threat actor <b>description</b>: <i>Connecticut, United States</i><br />Target victim <b>website</b>: <i>www.bptfittings.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kobi-Karp-Architecture-and-Interior-Design</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11448</link>
<guid>2c029952e202c0e560626a4c5980d64c</guid>
<pubDate>Fri, 20 Oct 2023 20:49:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Kobi-Karp-Architecture-and-Interior-Design</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c749d45e5218679d1bec3590d638cf6aae26f5d1533a764abbbad81d8b630c4</i><br /><br />Threat actor <b>description</b>: <i>Florida, United States</i><br />Target victim <b>website</b>: <i>www.kobikarp.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>RADISE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11449</link>
<guid>e2e2fd34c1cfebdf431177db8e49fdd2</guid>
<pubDate>Fri, 20 Oct 2023 20:48:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>RADISE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>88800e1302eded519c1e10ecbafa9935ad94124b826c97a24d97a069288391f8</i><br /><br />Threat actor <b>description</b>: <i>Florida, United States</i><br />Target victim <b>website</b>: <i>www.radise.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Polar-Tech-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11450</link>
<guid>40210a8b585beb1df047a786b7516bb9</guid>
<pubDate>Fri, 20 Oct 2023 20:48:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Polar-Tech-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42643df028e666afb6c2557ef8f704c27542d26f7ecc924328c866ee84a5e4bd</i><br /><br />Threat actor <b>description</b>: <i>Illinois, United States</i><br />Target victim <b>website</b>: <i>www.polar-tech.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ipswich-Bay-Glass</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11451</link>
<guid>f0eb6568ea114ba6e293f903c34d7488</guid>
<pubDate>Fri, 20 Oct 2023 20:47:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Ipswich-Bay-Glass</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96f26d08c48c79a92ae7e534d33503c5bec94d82e3c5d8254afda672958a22f9</i><br /><br />Threat actor <b>description</b>: <i>Massachusetts, United States</i><br />Target victim <b>website</b>: <i>www.ibglass.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hygieneering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11452</link>
<guid>211fff9e65c0e47a790c629116e32996</guid>
<pubDate>Fri, 20 Oct 2023 20:47:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Hygieneering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e721acb5f179ce700d6e54e49aa7f0825fd964e6288dc0962b18e53624a06f34</i><br /><br />Threat actor <b>description</b>: <i>Illinois, United States</i><br />Target victim <b>website</b>: <i>www.hygieneering.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Fountain-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11453</link>
<guid>0ec96be397dd6d3cf2fecb4a2d627c1c</guid>
<pubDate>Fri, 20 Oct 2023 20:46:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>The-Fountain-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d78a821fd315492792a7a641ae36a80883acaeb65d9df4c2f31b00654ecb827c</i><br /><br />Threat actor <b>description</b>: <i>Florida, United State</i><br />Target victim <b>website</b>: <i>www.thefountaingroup.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Venture-Plastics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11454</link>
<guid>8b36cb431b5aa0d245be4e62cdb8e6b3</guid>
<pubDate>Fri, 20 Oct 2023 20:46:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Venture-Plastics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e648daed9ce278c8bc3d75e5f72492760f1d99113b5f6a32fd8d4f73d236696f</i><br /><br />Threat actor <b>description</b>: <i>Ohio, United States</i><br />Target victim <b>website</b>: <i>www.ventureplastics.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Milk-Source</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11455</link>
<guid>20ba66f905957b34253d9d7abde919f3</guid>
<pubDate>Fri, 20 Oct 2023 20:45:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Milk-Source</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b2b43f2be2d2a740f353341a3fb08b9ea0749cd6017de3be68fae6ecaacbba52</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.milksource.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>charleystaxi.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11444</link>
<guid>5bf88d474bd2a6d3e7e073163f0c4d12</guid>
<pubDate>Fri, 20 Oct 2023 19:04:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>charleystaxi.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e4ed324be1a0745ca17782d520cf86dd1c8729be40de4347b9ee32bc1d961399</i><br /><br />Threat actor <b>description</b>: <i>Charley’s Taxi was founded in 1938 by Charles and Helen Morita.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southland-IntegratedServices</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11440</link>
<guid>acf8b366843afe53ac7efe9af8c1b90b</guid>
<pubDate>Fri, 20 Oct 2023 13:03:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Southland-IntegratedServices</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9bc7ccbeaf76fce9c2f8bd6ec036619c248456a9136b6eff5e89308e36763ed3</i><br /><br />Threat actor <b>description</b>: <i>Southland Integrated Services provides a variety of health and social services such as primary care, behavioral health, dental services, and more. All the 40Gb we have will be uploaded soon. Medical records, confidential docs, passports may be found in there. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Associated-Wholesale-Grocers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11437</link>
<guid>d6e4228a1ac71c06c3aa8c0fb9686bd6</guid>
<pubDate>Thu, 19 Oct 2023 17:48:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Associated-Wholesale-Grocers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48a2064904d97a00399b4cc35736f87c8a41061757b3191566f167d027925161</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.awginc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Visionary-Integration-Professionals</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11435</link>
<guid>7fe3d1eba30c8f2f8de4261ce4352f48</guid>
<pubDate>Thu, 19 Oct 2023 14:40:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Visionary-Integration-Professionals</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>743027b1a2cd59d3132b212343572c9218142a1f4d5615c988147247106c892a</i><br /><br />Threat actor <b>description</b>: <i>Visionary Integration Professionals (VIP) is a technology firm providing tech-enabled business solutions, IT managed services, andmanagement consulting. Inside the 80Gb archive we are going to upload you can find lots of passports, ssns, dls and other id and personal employee information. There are also tons of accounting documents, contracts and confidential files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>nirolaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11433</link>
<guid>56a32ddf374ecd774959be244161cb72</guid>
<pubDate>Thu, 19 Oct 2023 13:04:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>nirolaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fcd335e94104280c1d8d6bc8b6f49816e32cc741a20f547ab9d262fc05ed1788</i><br /><br />Threat actor <b>description</b>: <i>Chicago-based intellectual property lawyers representing artists, inventors, entrepreneurs and business people.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>QuadraNet-Enterprises</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11434</link>
<guid>c13ffb792c2cc71a9202bea953215f5a</guid>
<pubDate>Thu, 19 Oct 2023 13:02:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>QuadraNet-Enterprises</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c54056834268ebe9a65fc679dbee1498090b34b00230fadfb40c9a950d5177b</i><br /><br />Threat actor <b>description</b>: <i>QuadraNet, since 2001, has been a leader in hosting and data center solutions as a telecommunications provider in Los Angeles and the surrounding areas. They don't want their data back so 640Gb will be uploaded here soon. Passports, ssns and everything we loveis inside.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>hgmonline.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11432</link>
<guid>57335eb19f0669886d99414968f976c3</guid>
<pubDate>Thu, 19 Oct 2023 11:36:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hgmonline.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>98b0ae31d4789f72f1d50a970dcec9b1448677072650a34b0a6de053d1bbc056</i><br /><br />Threat actor <b>description</b>: <i>HGM Associates Inc. provides in-house architectural, structural and civil engineering, landscape architecture, and surveying services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>smart-union.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11428</link>
<guid>7314d504754f8d59517932ccb4f89d13</guid>
<pubDate>Thu, 19 Oct 2023 08:36:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>smart-union.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>98a9278edc50c4d82baba0d4d224ed678a4402044005d06775212383de86b41d</i><br /><br />Threat actor <b>description</b>: <i>SMART has approximately 700 local unions and councils in the United States, Canada and Puerto Rico. The International Union, based in Washington, DC and Cleveland, Ohio coordinates the union’s activity on behalf of the membership. The International a...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>CADRE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11426</link>
<guid>874f44f0fc7f98682c91ecbf990e5a2f</guid>
<pubDate>Thu, 19 Oct 2023 02:24:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>CADRE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ad1b43ba8b9a75f837b83dab831c80b0b784575d7676176b5e4df04971ecacb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>ITW-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11425</link>
<guid>b651cae8df57ba4f067380ea9ea6ae73</guid>
<pubDate>Wed, 18 Oct 2023 22:42:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>ITW-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60ba18184968d000eab86ddd5b34169d77fe075a1042ffa8f04e4de0b4608774</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>U-S-S-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11415</link>
<guid>54e0e46b6647aa736c13ef9d09eab432</guid>
<pubDate>Wed, 18 Oct 2023 14:57:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>U-S-S-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab927a4b19fb92a29b07cb1406469d389e5788667560884323113ba94c0ac94c</i><br /><br />Threat actor <b>description</b>: <i>Provides portable restrooms and sinks, temporary fence, restroom trailers, and other site services; Serves customers across a broad variety of end markets, including infrastructure, commercial and industrial, residential construction, special events, government/military, disaster relief efforts, and other.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>-Ps-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11416</link>
<guid>2f64bf56821bc84ff5418577e2dc48d9</guid>
<pubDate>Wed, 18 Oct 2023 14:57:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>-Ps-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f5b17865235326928cee19ccd8ae83ff42d017416198b77480ba034e6f1f20bb</i><br /><br />Threat actor <b>description</b>: <i>The company providing high-quality 'drug' products and medical devices at affordable prices.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dow-Golub-Remels--Gilbreath</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11417</link>
<guid>1487987e862c44b91a0296cf3866387e</guid>
<pubDate>Wed, 18 Oct 2023 14:57:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Dow-Golub-Remels--Gilbreath</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>792822e30f49905dbf0d9707f71b76b1a1f535f4b83e775aef9bb2340c0eccea</i><br /><br />Threat actor <b>description</b>: <i>Dow Golub Remels & Gilbreath PLLC is a Houston, TX law firm that has in-depth experience in the areas of financial advisory and investment management services, real estate development and management, computer software services, health care, construction, manufacturing, oil and gas exploration and production, oil field services, and food services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Griffing--Company-P.C</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11418</link>
<guid>a8dbb2bec6ec3e82cef906b52cebbe7d</guid>
<pubDate>Wed, 18 Oct 2023 14:57:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Griffing--Company-P.C</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dba6411cd1da2cce92c00b8aaf68eb332a53cde9148d904371b260e226e590ef</i><br /><br />Threat actor <b>description</b>: <i>Griffing & Company, P.C. - Is a Public Accounting and Consulting Firm dedicated to client service. The firm was established in 1987 and offers a full range of services. These include computerized accounting setups, support and training; tax planning and compliance; financial statement preparation or review; audits; business advisory services, litigation support, research and special projects.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>International-Biomedical-Ltd</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11419</link>
<guid>109f08ce8c30365b3040d1284390101e</guid>
<pubDate>Wed, 18 Oct 2023 14:57:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>International-Biomedical-Ltd</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6a61632a25dc11f5903c8901c7e40cdd93132e20e4c15528326141b4b1f8f1c</i><br /><br />Threat actor <b>description</b>: <i>International Biomedical, Ltd. engages in designing and manufacturing systems for transporting premature and sick newborns and pediatric patients.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rotorcraft-Leasing-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11413</link>
<guid>79b6245ff93841eb8c120cec9bf8be14</guid>
<pubDate>Tue, 17 Oct 2023 22:09:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>0mega</b> claims attack for <b>Rotorcraft-Leasing-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c76818bcd9d7f4045b98a9d7d5c224d0b937ed852b75f5ce8b85f6e10027336e</i><br /><br />Threat actor <b>description</b>: <i>Helicopter support, pilot training, fueling service, maintenance</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>0mega</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ampersand</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11406</link>
<guid>f3848b78b70702300c576fcd56a9addd</guid>
<pubDate>Tue, 17 Oct 2023 16:20:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Ampersand</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8080c019047ef023acc35f07f0376dcd95ff20477c66c69744f3df3b7532cb0f</i><br /><br />Threat actor <b>description</b>: <i>Ampersand is a data-driven TV advertising sales and technology company. We reach 116 million multiscreen households, providing viewership insights and planning on 42 million households, in 200+ DMAs, across more than 165+ networks and in all dayparts. Meet Ampersand. The vision for NCC Media was born by a couple, Linda and Bob Williams, in Boston in 1981. Originally called New England Cable Rep, these two entrepreneurs ambitiously set out to unify cable inventory so that an advertiser could have a simpler way to buy cable programming in the local TV market.SITE: www.ampersand.tv Address  151 W 42nd St Fl 11 New York City, New York 10036, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Greenpoint</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11402</link>
<guid>49c2694acd8a7b592f993d5ab39f932e</guid>
<pubDate>Tue, 17 Oct 2023 04:46:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Greenpoint</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>608b1e734dfcdd4942d983014be998335576ae359f2a5de5c3c16e92017b44a5</i><br /><br />Threat actor <b>description</b>: <i>Established in 1987, Greenpoint Technologies is one of the original licensed Business Jet Completion Centers providing turnkey interior completions for private individuals, corporations and Heads of...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>cpstate.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11400</link>
<guid>f56de5ef149cf0aedcc8f4797031e229</guid>
<pubDate>Mon, 16 Oct 2023 21:44:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>cpstate.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dfae945f0115ab7f1f64cacdfb4e11f15b3918ff8df2884f0653ac606692cf47</i><br /><br />Threat actor <b>description</b>: <i>Cerebral Palsy Associations of New York State (CPOFNYS.ORG). CP State is a broad-based, multi-service organization encompassing nearly 30 Affiliates and 19,000 employees providing services and programs for more than 100,000 individuals with cerebral...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Global-Product-Sales</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11399</link>
<guid>85ba4c9aa69f722ed73d37afa4ad75ca</guid>
<pubDate>Mon, 16 Oct 2023 19:16:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Global-Product-Sales</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7ed1f382bd7f5736a6be960de32701a57db2ed942982740b78463290eaed486e</i><br /><br />Threat actor <b>description</b>: <i>Global Product Sales is an American company working in the field of agriculture. The main office of the company is located at 1018 E Oleander St, Lakeland, Florida, 33801, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>OmniVision-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11395</link>
<guid>d974ad2631a2a6977d640ba9d4c98bdd</guid>
<pubDate>Mon, 16 Oct 2023 19:06:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>OmniVision-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ac1bf122b1b6538c2549249629cf8dc545835266683ee6448fb7c95df99e49c</i><br /><br />Threat actor <b>description</b>: <i>Since being founded in 1995 OMNIVISION has been at the leading-edge of technology, developing and delivering advanced digital imaging, analog, and touch & display solutions for multiple applications across several industries. As a global fabless semiconductor organization, our award-winning innovative technologies have enabled smoother human/machine interfacing solutions within the automotive, medical, security & surveillance, computing, mobile phone, and emerging technology spaces.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Believe-Productions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11392</link>
<guid>2b6bb5354a56ce256116b6b307a1ea10</guid>
<pubDate>Mon, 16 Oct 2023 17:43:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Believe-Productions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5d3856410038dd526d42d75edcacab6df00fda75c927c3775c196ca759c99039</i><br /><br />Threat actor <b>description</b>: <i>Believe Productions is a company based in Denver, Colorado, founded in 1997 as a link between music education and the music industry. The main office of the company is located at 9540 Maroon Cir Unit 100, Englewood, Colorado, 80112, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>kasperekusaoptical.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11391</link>
<guid>ff4dfdf5904e920ce52b48c1cef97829</guid>
<pubDate>Mon, 16 Oct 2023 16:49:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>kasperekusaoptical.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d17a09290218afba7645cd5b584dd1f85407931cca7718f17fea62dbfb8400b</i><br /><br />Threat actor <b>description</b>: <i>Kasperek Optical is a family-owned and operated wholesale optical distributor and manufacturer. Headquartered in Michigan, Kasperek Optical has been providing eyewear and accessories to independent eye care professionals since 1978. Kasperek Optical...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mount-Holly-Nissan</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11390</link>
<guid>0c0bf917c7942b5a08df71f9da626f97</guid>
<pubDate>Mon, 16 Oct 2023 16:13:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Mount-Holly-Nissan</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>14a5d4f21e7528dca3d38d2fcff6b83b1087a62c7ea7534dc085a77cb8207d22</i><br /><br />Threat actor <b>description</b>: <i>Mount Holly Nissan is a company that operates in the Automotive industry. It employs 21-50 people and has $5M-$10M of revenue.At Mount Holly Nissan serving Burlington, Cher...</i><br />Target victim <b>website</b>: <i>https://mthollynissan.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>Boise-Rescue-Mission-Ministries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11389</link>
<guid>47c6d232c6a4468118a74a72097b1876</guid>
<pubDate>Mon, 16 Oct 2023 13:48:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Boise-Rescue-Mission-Ministries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>013d98a8dd7a7f81989dc9d8f078516e196f88ec6f754d63a065ac27fa531c59</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>NCC2</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11388</link>
<guid>98f0d5f93731b7f3186531c37cca0945</guid>
<pubDate>Mon, 16 Oct 2023 10:21:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>NCC2</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91512bab622281f879469a75396b2b733d7a063f67071d56c43ccab08448e1f5</i><br /><br />Threat actor <b>description</b>: <i>Ampersand is a data-driven TV advertising sales and technology company. We reach 116 million multiscreen households, providing viewership insights and planning on 42 million households, in 200+ DMAs, across more than 165+ networks and in all dayparts. Meet Ampersand. The vision for NCC Media was born by a couple, Linda and Bob Williams, in Boston in 1981. Originally called New England Cable Rep, these two entrepreneurs ambitiously set out to unify cable inventory so that an advertiser could have a simpler way to buy cable programming in the local TV market.SITE: www.ampersand.tv Address  151 W 42nd St Fl 11 New York City, New York 10036, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>QSI-INC---Credit-Cards--Transaction-Processing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11381</link>
<guid>189e3f782cbb3f4cc1ae9702adca884e</guid>
<pubDate>Sun, 15 Oct 2023 01:36:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>QSI-INC---Credit-Cards--Transaction-Processing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b5832f8b9d8d1a68ee2821b0ad868db12f2d545c6b9aa42b79f34cd568221e9a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Law-Offices-of-Julian-Lewis-Sanders--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11379</link>
<guid>94e945f53cd92f059c89b61e2a4b1323</guid>
<pubDate>Sat, 14 Oct 2023 14:41:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>The-Law-Offices-of-Julian-Lewis-Sanders--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c9c41fd8ee1c227c0e2a3f342e53973c5987af7a53eaf5e8c4337f70302e1803</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Intech</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11375</link>
<guid>ecfb953d9d17e80aa226d13ff9dd04a8</guid>
<pubDate>Fri, 13 Oct 2023 23:38:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Intech</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30aa8726094469130f9f222c4d489de44a95c6bb0bde2a27e67e37796cda02a4</i><br /><br />Threat actor <b>description</b>: <i>More information in our telegram channel https://t.me/snatch_team Persons responsible for data leakage: Antonio Hernandez:CEOantoniohernandez@intech.com.mxantoniohernandez@usa-intech.com+12147127327https://www.linkedin.com/in/antoniohernandezintechhttps://www.facebook.com/tonylaviada;Jerry Pickett:Senior Program Managerjerrypickett@intech.com.mxjerrypickett@usa-intech.comjerry.pickett@hanes.comhttps://www.linkedin.com/in/jerrypickett;Dino Gonzalez:Sr. Technical Director+12142061411+14697341493+19724085738+19725529787dinogonzalez@intech.com.mxdinogonzalez@usa-intech.comuugonzalez@yahoo.comdgonzalez6@netzero.netdinog12000@yahoo.comhttps://www.linkedin.com/in/dino-gonzalez-5a0a71bhttps://facebook.com/uugonzalez;Jorge Lopez-Cepero:F and A Directorjorgelopezcepero@intech.com.mxjorgelopezcepero@usa-intech.comhttps://www.linkedin.com/in/jorgelc;Nora Cabello:Operations Directionnoracabello@intech.com.mxnoracabello@usa-intech.comhttps://www.linkedin.com/in/nora-cabello-48773331;Ninfa Barajas:General Accountantninfabarajas@usa-intech.comninfabarajas@intech.com.mxhttps://www.linkedin.com/in/ninfa-barajas-trabajo-42551352;Delsy Verenice Hernandez Garcia:Tester Srdelsygarcia@usa-intech.comdelsygarcia@intech.com.mxhttps://www.linkedin.com/in/delsy-verenice-hernandez-garcia-0849424a;Patti Pickett:VPpattipickett@usa-intech.compattipickett@intech.com.mxpattipickett@coldwellbankerhomes.comncjpickett@aol.com+17042364727+17048448232+17049079360https://www.linkedin.com/in/patti-pickett-185b8014https://www.linkedin.com/in/patti-pickett-20667612;Juani Sanchez:Bilingual Executive Assistantjuanisanchez@usa-intech.comjuanisanchez@intech.com.mxjnymacias@hotmail.comhttps://www.linkedin.com/in/juani-sanchez-516a6740;Cesar Moscol De La Cruz:Jefatura de Talleres and</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Colonial-Pipeline-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11373</link>
<guid>367ac971f08b41f2fe1248a63e28e837</guid>
<pubDate>Fri, 13 Oct 2023 21:44:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomedvc</b> claims attack for <b>Colonial-Pipeline-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7e81e272aca333073de3f04d430959d88218e8a06b33f0143af120e2eebba12</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomedvc</category>
</item>
<item xmlns:dc='ns:1'>
<title>Catholic-Charities</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11372</link>
<guid>f4b31bee138ff5f7b84ce1575a738f95</guid>
<pubDate>Fri, 13 Oct 2023 20:47:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Catholic-Charities</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af4021893f62b492297d9df5e0b303d8e5dcb80bc8fdcf0e8bcde4ad8e5fe092</i><br /><br />Threat actor <b>description</b>: <i>Catholic Charities of Broome County is the lead agency in the joint initiative, called Encompass Family Health Home, which was selected back in June 2015 by the New York State Department of Health as...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cleveland-City-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11353</link>
<guid>0babdd954699df097833f3d27e01d03d</guid>
<pubDate>Fri, 13 Oct 2023 17:37:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Cleveland-City-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d2ceac78a231294a563c11597a07776e938860d64ec3cdc876c315b056f51460</i><br /><br />Threat actor <b>description</b>: <i>Cleveland City Schools is a public school system located in Cleveland, Tennessee. We serve over 5,000 students across nine schools, including seven elementary schools, one middle school, and one high...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Morrison-Community-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11351</link>
<guid>7f46c947fb6d99b46df4e2181237e2d0</guid>
<pubDate>Fri, 13 Oct 2023 13:46:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Morrison-Community-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fae83451299b2fce124c91a5c88a01999d9bb822181003667ff737118e2ed577</i><br /><br />Threat actor <b>description</b>: <i>A Critical Access Hospital providing immediate life improving medical services.  The mission of Morrison Community Hospital is to improve the health of the residents of the hospital district and the surrounding area, focusing on personalized care.</i><br />Target victim <b>website</b>: <i>https://morrisonhospital.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alconex-Specialty-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11350</link>
<guid>81836b7cd16991abb7febfd7832927fd</guid>
<pubDate>Fri, 13 Oct 2023 13:21:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trigona</b> claims attack for <b>Alconex-Specialty-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>93e5b2e277447626e2ace2ef81e973c7d8cec7d53cde3fa897d34cad5d80b123</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>trigona</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vicon-industries-inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11329</link>
<guid>de312ddeff82ecc47ed90967ed3cbc91</guid>
<pubDate>Thu, 12 Oct 2023 19:04:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Vicon-industries-inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>15b066df3f07cecc9a88521b7b4e0d1cb7f8e2f76e74c106b500dc4ee8ec618f</i><br /><br />Threat actor <b>description</b>: <i>Vicon is a global leader in advanced security and surveillance technology to safeguard businesses, schools, municipalities, hospitals and cities across the world. We specialize in engineering...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Seattle-Housing-Authority</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11328</link>
<guid>49ad9d5423f3fcc69626dcbfb7bddb48</guid>
<pubDate>Thu, 12 Oct 2023 17:45:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Seattle-Housing-Authority</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>861c839dcc8b6abc347eeded785df3776f766453de02ef2758360df60b017efc</i><br /><br />Threat actor <b>description</b>: <i>Established in 1939, the Seattle Housing Authority provides safe and affordable living environments that foster stability and self-sufficiency for people with low incomes i...</i><br />Target victim <b>website</b>: <i>https://www.seattlehousing.org</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>KTUA-Landscape-Architecture-and-Planning</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11318</link>
<guid>684fa3de91be141a2bc896fa5870aed7</guid>
<pubDate>Thu, 12 Oct 2023 04:45:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>KTUA-Landscape-Architecture-and-Planning</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9458367f02e567b4ac0e791a3f6cb46bb40764452deaaa623ba09b4a7e1c531f</i><br /><br />Threat actor <b>description</b>: <i>As planners and landscape architects, KTUA is focused on the principles of healthy placemaking – a collaborative process for reshaping the public realm of our neighborhoods, communities and regions. The link between our natural and built environments and the health of individuals, families and communities is proven. Well designed streets, parks, open spaces, public places and buildings facilitate human connectivity and improve people's mental, physical and social health. In our vision and our actions, KTUA collaborates with our community leaders, public agencies, private developers, allied professionals, neighbors and families to develop implementable plans that address social, physical, environmental and economic goals that shape healthy places. By building support for these plans and projects from the ground up, we provide opportunities for civic engagement and transformative ideas KTUA.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Instron--ITW-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11310</link>
<guid>435d43e52666cd74203c69c2bfe2caa7</guid>
<pubDate>Wed, 11 Oct 2023 19:00:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Instron--ITW-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5fd29b6e5709dd875585b208f42b67da38fe97aaf8bf162a0f0393698d114521</i><br /><br />Threat actor <b>description</b>: <i>Instron manufactures and services a wide range of cutting-edge materials testing equipment used by research scientists, design engineers, and quality control managers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mid-America-Real-Estate-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11307</link>
<guid>c69dc1d8a3a3b79d0de6fbedb4cb80a7</guid>
<pubDate>Wed, 11 Oct 2023 16:44:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Mid-America-Real-Estate-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6cb2d8ef19771440a6be47dba205d917bcbf1b1e9bb0be5af22aee89fb5acd5f</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1984, Mid-America Real Estate Group is a full-service retail real estate organization in the Midwest providing services from finding retail space, managing a portfolio, developing a shopping center or finding the right buyer in a sales transaction.</i><br />Target victim <b>website</b>: <i>https://midamericagrp.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Catarineau--Givens-P.A.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11299</link>
<guid>641e167f974d1dd076c0886d17271975</guid>
<pubDate>Wed, 11 Oct 2023 10:48:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Catarineau--Givens-P.A.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3cde249a7eff726dd424afc5316f27756f43ee8ebc04cc41285e9605b06ce7a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sobieski</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11298</link>
<guid>b9c7f3a9c40b2d928c666388a71378d4</guid>
<pubDate>Wed, 11 Oct 2023 05:42:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Sobieski</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7501dd9f211b271b25315544962870d30654f7b6bf1c7eea09526be65a2451c</i><br /><br />Threat actor <b>description</b>: <i>A Vision For the Future

“35 years ago, J. F. Sobieski, Inc. was founded with a clear idea of what we would need for a successful future.”

– John F. Sobieski, III, CEO

Founded more than thirty-five...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Metro-Transit</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11296</link>
<guid>fe50ae64d08d4f8245aaabc55d1baf79</guid>
<pubDate>Tue, 10 Oct 2023 23:44:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Metro-Transit</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a5806ef0be801ae9fe6daf14b2a9260fb9216fe1e7b030a08a0441a517748e1b</i><br /><br />Threat actor <b>description</b>: <i>Missouri, United States</i><br />Target victim <b>website</b>: <i>www.metrostlouis.org</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alliance-Virgil-Roberts-Leadership-Academy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11294</link>
<guid>83d3d4b6c9579515e1679aca8cbc8033</guid>
<pubDate>Tue, 10 Oct 2023 21:40:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Alliance-Virgil-Roberts-Leadership-Academy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>befe1558b74c6d941af76ae96cd41398ef3f56bfa3a02be92c0d3efa864c3f86</i><br /><br />Threat actor <b>description</b>: <i>Alliance College-Ready Public Schools is committed to building an anti-racist, pro-Black community to improve equitable outcomes for all Black and Brown scholars, ensuring our scholars graduate “college ready” with pride in their racial, cultural, and personal identities.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>foremostgroups.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11292</link>
<guid>4a6762703f33302e6d1e65db02155a47</guid>
<pubDate>Tue, 10 Oct 2023 19:42:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>foremostgroups.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25ed3fb916cb65c65456c4b92e9698f7d431dcd5dc8b6b4d6a511709e8a0c80e</i><br /><br />Threat actor <b>description</b>: <i>Revenue zoominfo 500kk+Big holdingWe have all legal data, budgets, forecasts, bank, finance data, salaries, insurances, passports, confidential agreements with customers, audit private info, all human resources data, all consolidation reports...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>ExdionInsurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11270</link>
<guid>7183145a2a3e0ce2b68cd3735186b1d5</guid>
<pubDate>Tue, 10 Oct 2023 06:46:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>ExdionInsurance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45724dc96973e4ec6f6dec1223ec854ffb03630de824a3d01295854ae1574176</i><br /><br />Threat actor <b>description</b>: <i>Exdion is the leading Digital Insurance Platform, Solutions & Software in USA & India that helps insurance agencies digitally transform to be future ready. Exdion Insurance is the leading digital and artificial intelligence (AI) strategy partner for forward thinking insurance businesses. We are a solutions-based practice, delivering powerful AI products to national and global insurance brokers who are leaders in their field. As pioneers in generative AI and machine learning for the sector, we draw on our deep insurance industry knowledge to maximize the profitability of our clients' businesses.  www.exdioninsurance.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Starr-Finley</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11262</link>
<guid>3029352d500acce2c1d5b2c6575c5718</guid>
<pubDate>Mon, 09 Oct 2023 23:54:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Starr-Finley</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2436c2d707a58f38a28eb667f2ec3e182ef8f9fa2332ffb252e2ed7e3eb8f420</i><br /><br />Threat actor <b>description</b>: <i>California, United States</i><br />Target victim <b>website</b>: <i>www.starrfinley.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Centek-industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11265</link>
<guid>03ca3c0b0ff4ff69a7aec17953d03e0c</guid>
<pubDate>Mon, 09 Oct 2023 23:52:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Centek-industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0963847a527e4ad43aaf0b5a2f06ee3f82c1ada367c7e1c4e20ddb3c943de69</i><br /><br />Threat actor <b>description</b>: <i>Georgia, United States</i><br />Target victim <b>website</b>: <i>www.centekindustries.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Penfield-Fire-Co</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11266</link>
<guid>b6b90237b3ebd1e462a5d11dbc5c4dae</guid>
<pubDate>Mon, 09 Oct 2023 23:51:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Penfield-Fire-Co</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dfa53d2758784af8d3de28b650393592e657530647ea6896f440d70200e58369</i><br /><br />Threat actor <b>description</b>: <i>The Penfield Fire Company is comprised of 100% volunteers of both men and women living in the community. Our units operate within a 30 square mile district which covers ove...</i><br />Target victim <b>website</b>: <i>https://www.penfieldfire.org</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hughes-Gill-Cochrane-Tinetti</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11260</link>
<guid>70c549b28626adf8c0d6349053a844af</guid>
<pubDate>Mon, 09 Oct 2023 23:40:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Hughes-Gill-Cochrane-Tinetti</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22751b0e7c4c397f08c668939d77d61a5add503d473494f5975b8f933da361db</i><br /><br />Threat actor <b>description</b>: <i>California, United States</i><br />Target victim <b>website</b>: <i>www.hughes-gill.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wyndemere-Senior-Care-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11255</link>
<guid>543378fb36a83810ded2d725f2b6c883</guid>
<pubDate>Mon, 09 Oct 2023 20:47:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Wyndemere-Senior-Care-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36b01c2c671369470f83f421b9e387b70b7e6527af32223d167b66d42e5341d4</i><br /><br />Threat actor <b>description</b>: <i>Senior Living Community in Wheaton, IL At Wyndemere, you can live life on your terms, free from the responsibilities of homeownership and concerns about future health care needs. Tucked away on 22 beautiful acres minutes from downtown Wheaton, Illinois, our Life Plan Community offers vibrant independent living, along with the assurance of on-site care, including assisted living, skilled nursing, memory care and rehabilitation. Wyndemere has been owned and managed by Life Care Services®, An LCS® Company, since March 2010.  As one of the nation’s leading and most progressive forces in the senior living management industry, LCS has over 40 years of experience managing more than 130 communities.</i><br />Target victim <b>website</b>: <i>https://wyndemerelcs.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>First-Judicial-Circuit---Florida-Court</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11254</link>
<guid>50f9999b2ee27e222c5513e945e9ea9c</guid>
<pubDate>Mon, 09 Oct 2023 18:47:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>First-Judicial-Circuit---Florida-Court</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>27a517bc3f0d01e12d40112a4525e8ff5302912d1844ad2316b35dd83f055d08</i><br /><br />Threat actor <b>description</b>: <i>Data includes: - Employees personal data (including judges) - CVs, DL, SSN. - Complete network map including credentials for local and remote services. - Court documents, court reports, orders, voice records, video records, archives of legal proceedings, current investigations, jail reports, confidential court documents, databases. - And more...</i><br />Target victim <b>website</b>: <i>https://www.firstjudicialcircuit.org</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>atlantatech.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11252</link>
<guid>753a043674f0193523abc1bbce678686</guid>
<pubDate>Mon, 09 Oct 2023 17:39:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>atlantatech.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aed72c91084120dd87f3568a9a722f8ce41b75ddce6537ca8e54a54e8f5eb45c</i><br /><br />Threat actor <b>description</b>: <i>Atlanta Technical College is a public technical college in Atlanta, Georgia. It is part of the Technical College System of Georgia and provides education services for Fulton and Clayton counties.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Superline---Press-Release</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11251</link>
<guid>6cb993c8fa82ad11ff71fad64d213a72</guid>
<pubDate>Mon, 09 Oct 2023 14:57:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Superline---Press-Release</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>05fcc0ead0afbce98e083ec906ebced8fecdfa280df4fdc05d1cd590fd80bedb</i><br /><br />Threat actor <b>description</b>: <i>Our utmost priorities are to bring the latest trends to our customers while providing each and every one with the quality care and service that they deserve.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>vsmpo-tirus.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11249</link>
<guid>a56fd138b4e913761cd5a28a8ad30174</guid>
<pubDate>Mon, 09 Oct 2023 14:36:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>vsmpo-tirus.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f7cf37d58295950ea9daa85ed2bca024b8a5c8fede85ba806451027bbdb8820</i><br /><br />Threat actor <b>description</b>: <i>Tirus US is one of the largest suppliers of titanium mill products to the aerospace, medical and consumer products industries.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southern-Arkansas-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11243</link>
<guid>e3c92f539bc17efbcc0c2e5229efa268</guid>
<pubDate>Mon, 09 Oct 2023 02:53:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Southern-Arkansas-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4fb4feea64b55f3cc4d2785dc6e816214a4b13149ed4081629b23b990b908d36</i><br /><br />Threat actor <b>description</b>: <i>Southern Arkansas University Southern Arkansas University offers personalized tour visits, faculty and staff who invest in student success, and a caring campus community.    More</i><br />Target victim <b>website</b>: <i>http://rhysidafohrhyy2aszi7bm32tnjat5xri65fopcxkdfxhi4tidsg7cad.onion/archive.php?company=52</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Guhring-was-hacked.-Thousands-of-confidential-files-stolen.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11241</link>
<guid>4e316bf7cad703ffd97bd72c174b72c6</guid>
<pubDate>Sun, 08 Oct 2023 20:39:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>knight</b> claims attack for <b>Guhring-was-hacked.-Thousands-of-confidential-files-stolen.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f013ec120ea746573d3d9340d5c89a2829db5b4110f28ad9a959fc023c6ffdd8</i><br /><br />Threat actor <b>description</b>: <i>This blog will be published 72 hours after the attack, all data will be posted publicly unless Guhring does not contact us to protect its data or ignores this message.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>knight</category>
</item>
<item xmlns:dc='ns:1'>
<title>urc-automation.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11239</link>
<guid>178930ab96f41d43179e4d2d1a3a16e7</guid>
<pubDate>Sun, 08 Oct 2023 17:46:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>urc-automation.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bab74cab550a9f8cf31d7d3a79051b209a17fd5844ff8fc34e6eaf666e0e83f8</i><br /><br />Threat actor <b>description</b>: <i>Greetings!Today we are posting here the new company, "Universe Remote Control inc.".Company Description: URC is a global leader in smart home automation and control solutions. More than 100 million remote controls have been sold in the past 1...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Petersen-Johnson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11237</link>
<guid>4ae61b10179243bbbd49128329ddc145</guid>
<pubDate>Sun, 08 Oct 2023 04:41:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Petersen-Johnson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18ab40a7bccc55c7decf0e7d2fd69acde413e3a3c28ccd6364275a6909ab78e2</i><br /><br />Threat actor <b>description</b>: <i>Petersen Johnson is a leading Arizona personal injury law firm. We represent accident and injury victims throughout the Phoenix metro area. We provide our clients with the best legal representation. As personal injury lawyers we are dedicated to protecting your rights when you have been injured as the result of an accident or negligence. https://petersenjohnson.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Healix</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11233</link>
<guid>60e4ac6a656ef4b4fd82aaaf25f14736</guid>
<pubDate>Sat, 07 Oct 2023 13:07:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Healix</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>245bc32cf3e66a78243331bbb4ba2fbe66d386233207b49a29e8ef7e56f3f46b</i><br /><br />Threat actor <b>description</b>: <i>Healix provides physician office-based infusion services. We obtained 642Gb of this company data and there is a probability that the files will be available here for downloading next week. Complete personal information set with medical records of thousands patients could be found in the data. Medical staff personal info is presented as well, Wait for the update.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Hurley-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11232</link>
<guid>c291b01517f3e6797c774c306591cc32</guid>
<pubDate>Sat, 07 Oct 2023 12:54:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>The-Hurley-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>78eeed730d98cf4af8f0a5028e86f84120fbf964b63c67d97ede001f0d34dc32</i><br /><br />Threat actor <b>description</b>: <i>Based in New Haven, Connecticut, The Hurley Group is a real estate development and property management firm that specializes in properties throughout New Haven and Fairfield counties.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>International-Presence-Ltd---Leaked</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11230</link>
<guid>b4572f47b7c69e27b8e46646d9579e67</guid>
<pubDate>Fri, 06 Oct 2023 16:07:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ragnarlocker</b> claims attack for <b>International-Presence-Ltd---Leaked</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>265de1c3a09d252e58d2c90d73a6a62340857beac0fc665418fe76dbf88ded75</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ragnarlocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>SALE-District-Of-Columbia-Elections-600k-lines-VOTERS-DATA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11288</link>
<guid>cc40d06ff0a16a793d066dbfa2917bab</guid>
<pubDate>Fri, 06 Oct 2023 11:33:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomedvc</b> claims attack for <b>SALE-District-Of-Columbia-Elections-600k-lines-VOTERS-DATA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52df804a0d8ff2bd030763bbda4790786b4b80a6566f6d6d9913cf90fe9ab896</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomedvc</category>
</item>
<item xmlns:dc='ns:1'>
<title>eemotors.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11225</link>
<guid>0c3dd1f58f7ef11b0eb09971760dfdbd</guid>
<pubDate>Fri, 06 Oct 2023 08:35:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>eemotors.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a4451efdcb66d5a0e41ec229a4a81c4a157ac4f5d679789d2335c4249f5244dc</i><br /><br />Threat actor <b>description</b>: <i>Economic Electric Motors positions itself as one of the leading providers of electrical and HVAC products to customers such as Department of Defense, Department of Interior, Department of Justice, Number of Branches of State Governments, Universities...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Granger-Medical-Clinic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11218</link>
<guid>568221292bd68ebdd821521ce60a8110</guid>
<pubDate>Fri, 06 Oct 2023 02:47:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Granger-Medical-Clinic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f3d2ced3b8857acea07435d772361c56048d96ef4530b57e53cca726070792eb</i><br /><br />Threat actor <b>description</b>: <i>Granger Medical Clinic was founded in 1954 by Doctors LaVere Poulsen and Glenn Wilson. The two providers came together with the hope of better serving the Granger community...</i><br />Target victim <b>website</b>: <i>https://www.grangermedical.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>sirva.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11215</link>
<guid>d81d658f7fb3fca03ea5e74f787f1f51</guid>
<pubDate>Thu, 05 Oct 2023 23:33:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>sirva.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8c71ac0daba1cf4526c2162e75e47236e4ebc171363e2b339bc9d93b856a6cb1</i><br /><br />Threat actor <b>description</b>: <i>We have over 1.5TB of documents leaked + 3 full backups of CRM for branches (eu, na and au)Sirva Worldwide, Inc. provides HR and mobility professionals with the resources, guidance, and support they need to achieve the best possible relocation for...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>W-d--g</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11214</link>
<guid>52f4691a4de70b3c441bca6c546979d9</guid>
<pubDate>Thu, 05 Oct 2023 19:08:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>W-d--g</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d68b960250b91cc92850881be32616a3b24b10f6e1d0e4bedf58e12034dc70ce</i><br /><br />Threat actor <b>description</b>: <i>Personal injury attorneys in Florida.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cornerstone-Projects-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11208</link>
<guid>bea5b83d3a056039813089e7aa7f7e9a</guid>
<pubDate>Thu, 05 Oct 2023 15:37:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>Cornerstone-Projects-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc2a2a8fcd7fa475862522c963ba4c1832131a964705e318b0274475a825effa</i><br /><br />Threat actor <b>description</b>: <i>Cornerstone Projects Group offers commercial clients an unrivaled service and a commitment founded on the simple principle of stewardship: lead in the development, architecture and construction of real estate investments by serving the individual needs of each client.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Terwilliger-Land-Survey-Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11206</link>
<guid>1ac978c8020be6d7212aa71d4f040fc3</guid>
<pubDate>Thu, 05 Oct 2023 14:29:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Terwilliger-Land-Survey-Engineers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b441cf2beb73ac6a9d98346f466357fe22d6d921c9f2a5eac38a3eebcf785c5</i><br /><br />Threat actor <b>description</b>: <i>Terwilliger Land Survey Engineers offer drone, land survey, and engineering services across multiple business sectors. We will share their 25Gb data here as they don't care about it. You can findthere much of projects information, court documents and other files.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Healthy-Baby-Essentials-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11203</link>
<guid>c24c65259d90ed4a19ab37b6fd6fe716</guid>
<pubDate>Thu, 05 Oct 2023 02:45:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Healthy-Baby-Essentials-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>444f884c7f4574bbd0c20f70977c6b8171c8da79792a6031be7a1270e35ef4c2</i><br /><br />Threat actor <b>description</b>: <i>Healthy Baby Essentials Inc respect for patient rights is reflected in the caring and professional manner in which we deliver our equipment and services. The satisfaction o...</i><br />Target victim <b>website</b>: <i>https://www.breastpumps.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>DiTRONICS-Financial-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11202</link>
<guid>fe998b49c41c4208c968bce204fa1cbb</guid>
<pubDate>Wed, 04 Oct 2023 22:18:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>DiTRONICS-Financial-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4cf0b233b74ada8678e764683e12d7fb76ec407dcfbf1b38ab19670510ce68e2</i><br /><br />Threat actor <b>description</b>: <i>"DiTRONICS continues to define the future of funds access with a fully integrated suite of products and services that includes ATMs, Ticket Redemption Kiosks, Check Guarantee Software, Cash Advance Software, and now offers a Title 31 complian            ...</i><br />Target victim <b>website</b>: <i>ditronics.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>suncoast-chc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11201</link>
<guid>dc1d3cb9517bda57aacd65f5b1986c6e</guid>
<pubDate>Wed, 04 Oct 2023 21:45:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>suncoast-chc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1f1d9442e23a0533ceae6555f3034ed1c34e9752a49e67dea2cff678048e1a6</i><br /><br />Threat actor <b>description</b>: <i>We are state of the art, full service facilities.  We offer multiple services at our facilities including adult and pediatric medical and dental care, behavioral health, optometry, lab services, x-ray, pharmacies, women’s health, podiatry, and much m...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Meridian-Cooperative</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11200</link>
<guid>edd47ba7fa1bbff38973841c9cd0733c</guid>
<pubDate>Wed, 04 Oct 2023 20:42:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Meridian-Cooperative</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b45c9fe43ee812cb5ed1886966e3e2be4b2b1e12bcc3bbc0a20096fca5e8027a</i><br /><br />Threat actor <b>description</b>: <i>Meridian Cooperative is the only enterprise solution that delivers flexible leading-edge software, services, and technology to utility providers across the country. With solutions ranging from consumer billing and finance to IT, GIS, advanced analytics, cybersecurity, and operations, our enterprise suite provides the tools utilities need to manage business from the office to the field efficiently and securely.</i><br />Target victim <b>website</b>: <i>https://www.meridian.coop/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>Roof-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11199</link>
<guid>8dbdbf0cedc89e9a82967a7d983c11ca</guid>
<pubDate>Wed, 04 Oct 2023 19:20:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Roof-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>00ddc1da18bca3c755e6564883b22f9b684097bcd334ee4de632878bfdd1272c</i><br /><br />Threat actor <b>description</b>: <i>Ohio, United States</i><br />Target victim <b>website</b>: <i>www.roof-management.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Security-Instrument</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11196</link>
<guid>09733dde1da9c47d431c043b24056f4e</guid>
<pubDate>Wed, 04 Oct 2023 19:19:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Security-Instrument</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9de42f4238b94f0acf0b1711274a258750af6d44bd28ec9d5f4dc3e63ddae5f2</i><br /><br />Threat actor <b>description</b>: <i>Delaware, United States</i><br />Target victim <b>website</b>: <i>www.securityinstrument.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cinepolis-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11198</link>
<guid>6934456f54af5ab56c6f347c6427afeb</guid>
<pubDate>Wed, 04 Oct 2023 19:18:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Cinepolis-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cbd6c2842d43299d26367d1a02753a26c7c4b8fa8a8affbe6115ecb93fccfc9e</i><br /><br />Threat actor <b>description</b>: <i>Texas, United States</i><br />Target victim <b>website</b>: <i>www.cinepolisusa.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gruskin-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11193</link>
<guid>7b7916dd2de56297aa29cccb2bbf48d4</guid>
<pubDate>Wed, 04 Oct 2023 17:16:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Gruskin-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f2d14822790320877e42601869a25936de49c3ceb76396858974521c1c328d0</i><br /><br />Threat actor <b>description</b>: <i>Gruskin Group is an integrated design firm that builds unified brand experiences through architecture, brand development, visual communications, web/interactive, industrial design, interior design, strategic consulting, and sustainable design. They've lost 37 Gb of data and we wanted help them but they refused. As a result,their files (accounting, HR, projects and so on) will be uploaded here and available for downloading.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>US-Liner-Company--American-Made-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11190</link>
<guid>e81f1e4fe5b85be7a6619d0b33427e01</guid>
<pubDate>Wed, 04 Oct 2023 03:41:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>0mega</b> claims attack for <b>US-Liner-Company--American-Made-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>13b2cac745f91425dc65b2b464e8ce09dd5300f90e1d49d9e51d4469e33565e8</i><br /><br />Threat actor <b>description</b>: <i>Industrial engineering, manufacturing, advanced materials, thermoplastic composite solutions</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>0mega</category>
</item>
<item xmlns:dc='ns:1'>
<title>MD-LOGISTICS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11187</link>
<guid>421b9ff13e012545c871fff7824cd12a</guid>
<pubDate>Tue, 03 Oct 2023 17:50:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>moneymessage</b> claims attack for <b>MD-LOGISTICS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>511d623e2a4cb1899eeea958f1810d4cf108b0a26cd6510453c678b719289c6a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>moneymessage</category>
</item>
<item xmlns:dc='ns:1'>
<title>Maxco-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11185</link>
<guid>51e12869e03348d481ca682359282739</guid>
<pubDate>Tue, 03 Oct 2023 17:40:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>moneymessage</b> claims attack for <b>Maxco-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d1ce62791760198d0eb06b92cbffd6cb16692745774995b844bec9de8366f32</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>moneymessage</category>
</item>
<item xmlns:dc='ns:1'>
<title>co.rock.wi.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11180</link>
<guid>09dbc1177211571ef3e1ca961cc39363</guid>
<pubDate>Tue, 03 Oct 2023 09:41:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cuba</b> claims attack for <b>co.rock.wi.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97e003aa22b91b3d117f5ca65515a2eef06c3fc925ca58075ffcbddd8c62aceb</i><br /><br />Threat actor <b>description</b>: <i>Rock County Public Health DepartmentThe Rock County Public Health Department (RCPHD) is a level III health department in Rock County, Wisconsin. Our staff serves over 160,000 people in more than 25 cities, villages, and towns. As a...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cuba</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ted-Pella-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11177</link>
<guid>296b62d0af509baab599abe4af78ae8c</guid>
<pubDate>Tue, 03 Oct 2023 05:34:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Ted-Pella-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b97d1c6a2caa3e01eb9b0d0656126ccab3aec4797e8bc067f7a76991edd9915</i><br /><br />Threat actor <b>description</b>: <i>Electron microscopy supplies and instruments, light microscopy, atomic force microscopy, laboratory supplies We manufacture instruments and supplies and serve laboratories dedicated to a variety of types of microscopy: Transmission and Scanning Electron Microscopy, Electron Microprobe Analysis, Atomic Force Microscopy, Confocal Laser Microscopy and Light Microscopy. We serve a diverse set of fields including Biology, Biotechnology, Chemistry, Chemical Engineering, Failure Analysis, Forensics, Genetics, Histology, Materials Science, MEMS, Materialography/Metallography, Microelectronics, Nanotechnology, Neurosciences, Pathology, Pharmaceuticals, Physics, Quality Assurance and Semiconductors. We serve colleges and universities, private companies, hospitals and various branches of government, domestic and international. https://www.tedpella.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>tayloredservices.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11157</link>
<guid>89f692589fe6ce8f82cf75828b0821d3</guid>
<pubDate>Sun, 01 Oct 2023 23:40:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>tayloredservices.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>919a7eee0b1c91ecbea735f240e3d323781722f9b0865851a556842b93adffa0</i><br /><br />Threat actor <b>description</b>: <i>Established in 1992 and headquartered in Edison, New Jersey, Taylored Services is a leading multichannel logistics provider.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>fcps1.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11152</link>
<guid>c8bcfd3fedd67f9abb731ef4aca58448</guid>
<pubDate>Sun, 01 Oct 2023 23:39:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>fcps1.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec84ed615b048edc3c96a26919155fc9061369ae0598c8e8be6e408121700420</i><br /><br />Threat actor <b>description</b>: <i>Fauquier County Public Schools</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cascade-Family-Dental---Press-Release</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11149</link>
<guid>51a6ce0252d8fa6e913524bdce8db490</guid>
<pubDate>Sun, 01 Oct 2023 19:13:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Cascade-Family-Dental---Press-Release</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>68c3d28402e06d907496552fb248347021ad2386b7208aeb19de640aa7973b4d</i><br /><br />Threat actor <b>description</b>: <i>Cascade Family Dental offers dental services for families in the Payson and Springville, Utah area.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rainbow-Travel-Service---Press-Release</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11150</link>
<guid>accfa1212a61b379ba0b009549113863</guid>
<pubDate>Sun, 01 Oct 2023 19:13:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Rainbow-Travel-Service---Press-Release</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>68a657fb82a4e0d4076dfeb98f72aba872fd3cd707715cbd7d19c6a99e79feb0</i><br /><br />Threat actor <b>description</b>: <i>Rainbow Travel is a full service agency specializing in upscale leisure, special interest travel, and cruises.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>Flamingo-Holland</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11146</link>
<guid>9c42d4338e4e653d3ad3f12340edf005</guid>
<pubDate>Sun, 01 Oct 2023 16:36:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trigona</b> claims attack for <b>Flamingo-Holland</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ffe67191bf26ba67ea446a9baac3617de3b693ba86a97b4ade9ca1b88deae19c</i><br /><br />Threat actor <b>description</b>: <i>Flamingo Holland is a Dutch-based flower company that specializes in growing, exporting, and wholesaling high-quality cut flowers, specifically, roses, peonies, tulips, and other seasonal flowers globally. The company was founded in 1985 and has since then become one of the leading flower companies in the Netherlands.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>trigona</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aria-Care-Partners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11147</link>
<guid>eed054ecd7a0a544cf73292836023ffe</guid>
<pubDate>Sun, 01 Oct 2023 16:35:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trigona</b> claims attack for <b>Aria-Care-Partners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c818daa79bbdd06320e99bf1e31de58961a95abc048fdc73160510c3dccc5a1e</i><br /><br />Threat actor <b>description</b>: <i>Aria Care Partners is a healthcare provider that offers post-acute care services to patients in Kansas. It was founded in 2016 and is headquartered in Overland Park, KS. Company specializes in post-acute care services such as transitional care, home health, and hospice care. It aims to provide customized care plans to help patients recover, regain independence, and improve their quality of life.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>trigona</category>
</item>
<item xmlns:dc='ns:1'>
<title>Quest-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11145</link>
<guid>7e8dc0f571ac8e270a4a3ff986430e96</guid>
<pubDate>Sun, 01 Oct 2023 16:33:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trigona</b> claims attack for <b>Quest-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be80010f3a2e3614be416ef6f9b065eb041b240b68b7c8e3ad66851dfaffda0a</i><br /><br />Threat actor <b>description</b>: <i>Quest International is a leading global post-sales service support partner for original equipment manufacturers (OEMs) across various industries, founded in 1982. Company offers services supporting OEM customers through depot repairs, field services, supply-chain logistics, and other professional services. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>trigona</category>
</item>
<item xmlns:dc='ns:1'>
<title>mclaren-health-care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11135</link>
<guid>47599716060306c09493e977bbbce22e</guid>
<pubDate>Fri, 29 Sep 2023 23:37:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>mclaren-health-care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b9818b1705e64ff9e65d1f3d153ccfc6b147eaf9696a73c5f09c51b936cb5ec6</i><br /><br />Threat actor <b>description</b>: <i>/</i><br />Target victim <b>website</b>: <i>https://mclaren.org</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>solveindustrial.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11133</link>
<guid>652c208b21f13f6e995bfc1154a1a2e5</guid>
<pubDate>Fri, 29 Sep 2023 20:37:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>solveindustrial.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f56a4db84dcd7e0d2e25aa1f517a368553c283321d9d78f09de9f932c052fd2</i><br /><br />Threat actor <b>description</b>: <i>Combining the complementary strengths of the IPTCI, PTI and LMS product lines, Solve Industrial Motion Group™ has grown to become a leading provider of high-quality Metric and American Standard power transmission components and industrial-grade beari...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Garn-Mason-Orthodontics-was-hacked.-All-insurance-and-personal-data-of-customers-was-stole</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11132</link>
<guid>d9de6a144a3cc26cb4b3c47b206a121a</guid>
<pubDate>Fri, 29 Sep 2023 19:37:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>knight</b> claims attack for <b>Garn-Mason-Orthodontics-was-hacked.-All-insurance-and-personal-data-of-customers-was-stole</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4efebe869c696feb8ae40859a129e7485631b2867ccef7069beddd4239350592</i><br /><br />Threat actor <b>description</b>: <i>Garn Mason Orthodontics was hacked. All insurance and personal data of customers was stolen</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>knight</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vertical-Development</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11129</link>
<guid>64714a86909d401f8feb83e8c2d94b23</guid>
<pubDate>Fri, 29 Sep 2023 13:07:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Vertical-Development</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6d9f97f8e7c3f1d5f3ba20302941b69b3ac7a363a33702ba0ad46981c2df8db</i><br /><br />Threat actor <b>description</b>: <i>Vertical Development has helped companies design parts catalogs for over 30 years, both in paper and digital formats. Numerous contracts and agreement, NDAs, confidential docs and employee information of the company will be available soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>MNGI-Digestive-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11128</link>
<guid>293c3b96edea6588bc4b9415c3be4e66</guid>
<pubDate>Fri, 29 Sep 2023 08:52:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>MNGI-Digestive-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>28cf89e549b918045c16ab5eec44be755bfb6545ab25778b892b0750bdc89b47</i><br /><br />Threat actor <b>description</b>: <i>MNGI Digestive Health </i><br />Target victim <b>website</b>: <i>https://mngastro.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>C.F.-Service--Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11125</link>
<guid>cbca7635077d4074f8d30094a3176972</guid>
<pubDate>Fri, 29 Sep 2023 07:05:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>C.F.-Service--Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c688e7f85109178654b7ade71aef2d3118a11970f5f52315f10d0f82ef54671</i><br /><br />Threat actor <b>description</b>: <i>C.F. Service & Supply in Liberal, KS, are your fire safety & protection experts servicing fire extinguishers throughout SW Kansas as well as your experienced suppliers of rig supplies & services. We offer on-call, after-hour services, too.  CFSERVICEANDSUPPLY.COM</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kona-Equity</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11126</link>
<guid>0b74c9847e45c3be47e0d1a8f92bcab8</guid>
<pubDate>Fri, 29 Sep 2023 07:05:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Kona-Equity</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a6c663d3f2d51c351c0f6e7ebf57d2a084048c7f563a8c6be4272ec8bffc14b</i><br /><br />Threat actor <b>description</b>: <i>Kona Equity is a private company intelligence platform for small and medium sized businesses. Connecting companies with acquirers. Kona Equity is a leading buyside acquisition search investment firm that tracks over 2 million companies. Our experienced team acts as industry-focused adviser to well-capitalized private equity funds and corporations seeking to pursue new investments and buy-and-build strategies. Kona Equity is unique in that we use machine learning, crowdsourcing and proprietary data to source companies for the firms that we advise. Our team is well-attuned to the needs of privately-held companies, working with family and founder-owned businesses to explore options tailored to their goals and wishes https://www.konaequity.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jacobson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11116</link>
<guid>4e4faae72b1c3cbd446a70e89e59d8fc</guid>
<pubDate>Thu, 28 Sep 2023 22:23:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Jacobson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53a5483386044d9c8c0c6b0a71b16060beaec5ba32c87f919f92948fbe4e1eda</i><br /><br />Threat actor <b>description</b>: <i>New Jersey, United States</i><br />Target victim <b>website</b>: <i>www.jacobsoncompany.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Robuck-Homes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11117</link>
<guid>307eb8ee16198da891c521eca21464c1</guid>
<pubDate>Thu, 28 Sep 2023 22:22:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Robuck-Homes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4b346c51b07240b7b9831ba5f3d4cc2f5a7ef6acf477ff2abb875281eb04e784</i><br /><br />Threat actor <b>description</b>: <i>North Carolina, United States</i><br />Target victim <b>website</b>: <i>www.robuckhomes.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Webb-Landscape</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11118</link>
<guid>d585d095b00cd2f5b50acb64add23834</guid>
<pubDate>Thu, 28 Sep 2023 22:22:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Webb-Landscape</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f2d0083947ede3e64c81e89ab5f036a74a91ad07ee966ad96cd410a2ad0beb9</i><br /><br />Threat actor <b>description</b>: <i>Idaho, United States</i><br />Target victim <b>website</b>: <i>www.webbland.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Amanzi-Marble--Granite</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11119</link>
<guid>e2d56b6b53ce40332aec920b78d030c1</guid>
<pubDate>Thu, 28 Sep 2023 22:21:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Amanzi-Marble--Granite</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>954aceb914a4eddf1e32a059f3eb80fe4ed0b2e7cfa746f69155bcf97582ef5b</i><br /><br />Threat actor <b>description</b>: <i>North Carolina, United States</i><br />Target victim <b>website</b>: <i>www.amanzigranite.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>BAMO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11120</link>
<guid>20c8b2aa5b567ae19224040bc52b36f1</guid>
<pubDate>Thu, 28 Sep 2023 22:21:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>BAMO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b813219a8ba63df779777794385c5855c0aa86ef8a87e5c300261b95deef048c</i><br /><br />Threat actor <b>description</b>: <i>California, United States</i><br />Target victim <b>website</b>: <i>www.bamo.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Terralogic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11122</link>
<guid>2bf0ccdbb4d3ebbcb990af74bd78c658</guid>
<pubDate>Thu, 28 Sep 2023 22:20:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Terralogic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f3b1d22404de16157b43863ed248e686d724ebd61b2081145e48a030a04850c2</i><br /><br />Threat actor <b>description</b>: <i>Virginia, United States</i><br />Target victim <b>website</b>: <i>www.terralogic.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kessler-Collins</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11123</link>
<guid>d5397f1497b5cdaad7253fdc92db610b</guid>
<pubDate>Thu, 28 Sep 2023 22:20:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Kessler-Collins</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c4857fbecf1f7315eaa34a037602de1af242142be6b8e72e8fac1d70929f2df4</i><br /><br />Threat actor <b>description</b>: <i>Texas, United States</i><br />Target victim <b>website</b>: <i>www.kesslercollins.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>ezpaybuildings.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11111</link>
<guid>b0baee9d279d34fa1dfd71aadb908c3f</guid>
<pubDate>Thu, 28 Sep 2023 20:39:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ezpaybuildings.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c837aeeb866334d9a009481d6bf281615c694a580cb38527ecf14d7c7defa456</i><br /><br />Threat actor <b>description</b>: <i>EZ Pay Buildings provides programs enabling consumers the ability to acquire ownership of Storage Barns, Steel Buildings, Gazebos, and more. Our dedicated sales team work towards growing the business of our partners. Our customer service representati...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jacobsen-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11110</link>
<guid>805d94d14046509f82c7bdb1819c64af</guid>
<pubDate>Thu, 28 Sep 2023 16:15:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Jacobsen-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e4b56a57d6777a78eb8eb2b4c31b606bd6be3e78b553d81f3dd0982e703b553b</i><br /><br />Threat actor <b>description</b>: <i>We present to you - jacobsenconstruction.com

We use an uncommon and empowering employee-ownership structure that creates significant long-term financial opportunities for the workforce; promotes...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>simmonsequip.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11109</link>
<guid>6a52db09e45a58b3e50bcc6213785282</guid>
<pubDate>Thu, 28 Sep 2023 13:18:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>simmonsequip.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>64bd6ead04a6ca5b21752ce4b72218dc4b3a823fb0ac3015a09a5b82d41a174c</i><br /><br />Threat actor <b>description</b>: <i>Simmons Equipment Company was honored to again be an exhibitor at the 2013 Bluefield Coal Show. With 240 exhibitors, and an estimated 5,000 visitors during the three-day show, the Bluefield show continues to be one of the nation's top regional...</i><br />Target victim <b>website</b>: <i>simmonsequip.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>Civic-San-Diego</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11104</link>
<guid>bf03faf089665754a8af5dce381a42ca</guid>
<pubDate>Wed, 27 Sep 2023 17:33:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Civic-San-Diego</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3230c45b2c1f64b744ba91257981c3436f4ef158e9824e56d2d96a409664b0db</i><br /><br />Threat actor <b>description</b>: <i>CCDC is the public, non-profit corporation created by the City ofSan Diego to staff and implement Downtown redevelopment projectsand programs. Almost 200Gb of files. Confidential documents, personal information etc. Uploading soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>UTC-Overseas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11103</link>
<guid>fb25b181bed28630afa6c026a6ed31fe</guid>
<pubDate>Wed, 27 Sep 2023 16:07:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>UTC-Overseas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52a210f9f37fd5f5af87a913dcf7ae4278f1340b9c2495d1daead10192f16449</i><br /><br />Threat actor <b>description</b>: <i>Utc Overseas Inc. provides freight forwarding services. The Company offers a variety of services including ocean and air freight, project logistics, trucking, cargo insurance, customs brokerage, and warehousing.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Unitex-Textile-Rental-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11102</link>
<guid>52c4608c2f126708211b9e0a60eaf050</guid>
<pubDate>Wed, 27 Sep 2023 14:48:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>Unitex-Textile-Rental-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6733f186180e8e029dd1cccadcb75be7993179008875f88406764f1b9a8d5c0</i><br /><br />Threat actor <b>description</b>: <i>For more than 100 years, our family-run business has been leading the way in the medical uniform and linen rental industry. Today, we’re the largest family-owned healthcare service provider in the country. Because our family is involved in every inch of the business, our unflagging attention to detail results in a clear advantage for you and your business. Now in our 4th generation, we continue to provide our clients the kind of quality, cleanliness and service that has become the unrivaled standard. We don’t make idle promises; we don’t cut corners; we always strive to exceed expectations. That is, simply, the way this family business has always been run. And because we closely watch and refine and improve every inch of our business every day, when it comes to laundry, linen and uniforms, Unitex Healthcare Laundry Services gives you a competitive advantage.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Polish-AmericanAssociation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11101</link>
<guid>e4db4fc1ef9ae443ced49d00f2192445</guid>
<pubDate>Wed, 27 Sep 2023 13:11:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-Polish-AmericanAssociation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>387843f613648e0a0ad941727ce671f4ee8664ca9fbc0f9a4a46ad5b48d2c374</i><br /><br />Threat actor <b>description</b>: <i>Have you ever been interested in the US-Poland friendship details? The Polish American Association is ready to share it's internallive secrets. 185GB SQL will be available for downloading soon. Who cares of immigrants, right?</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Muenz-Engineered-Sales</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11099</link>
<guid>533d2891bb1b332f3845f7bfd09b78ef</guid>
<pubDate>Wed, 27 Sep 2023 07:07:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Muenz-Engineered-Sales</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42bdc1986c00d91ef3d09d566cd872871e99dbe2885c0fb7a7915cd0b2b6a75f</i><br /><br />Threat actor <b>description</b>: <i>Home from Muenz-Engineered Sales Company, Inc. for all your industrial needs. MESCO is a leading distributor of abrasives, cutting tools, industrial adhesives, PPE equipment and much more with over 200 years of experience. We are proud to offer a wide variety of quality products in addition to our services including, Vendor Managed Inventory Solutions. https://www.buymesco.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Robins--Morton</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11094</link>
<guid>e946209592563be0f01c844ab2170f0c</guid>
<pubDate>Tue, 26 Sep 2023 23:36:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dunghill_leak</b> claims attack for <b>Robins--Morton</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9bb60ad5d96ac07c373de23e996c600d46545100f6f4a9ad319defb96c1cce3c</i><br /><br />Threat actor <b>description</b>: <i>Robins and Morton is a company operating as a construction firm. It specializes in planning and design, construction management, multiple delivery methods, self-performed work, and green building. The company serves healthcare, government, and commercial markets. In the past ten years alone, it have completed nearly $10 billion in projects. These projects vary from major new hospitals and complex renovations, to hospitality projects and a variety of other commercial work.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dunghill_leak</category>
</item>
<item xmlns:dc='ns:1'>
<title>CannonDesign</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11095</link>
<guid>ec5de3e8dc6bd121a79794021bf20cb1</guid>
<pubDate>Tue, 26 Sep 2023 23:36:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dunghill_leak</b> claims attack for <b>CannonDesign</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f6b97055a3f08f464ef9d2d6ebbd6cf701d77b755976c8dbd56e5716f75fa51</i><br /><br />Threat actor <b>description</b>: <i>CannonDesign is a global architecture, engineering and consulting practice that provides services for a range of project types, including hospitals and medical centers, corporate headquarters and commercial office buildings, higher education and PK-12 education facilities, hotels and hospitality, mixed-use, sports facilities, and science and research buildings. In 2017 and 2019, Fast Company named CannonDesign one of the 10 most innovative architecture firms in the world.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dunghill_leak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Roper--Vertafore</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11091</link>
<guid>f508afaa848fefb2033d262ad7237a5c</guid>
<pubDate>Tue, 26 Sep 2023 22:10:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dunghill_leak</b> claims attack for <b>Roper--Vertafore</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2046839cc528b334f2d9eaf03a169529c5beced640beaf40558d4b3461458213</i><br /><br />Threat actor <b>description</b>: <i>Vertafore is a Denver-based insurance technology company. It has developed various software for insurance companies, such as content management and workflow software, insurance knowledge base, data and analytics. It's insurance management software solutions allow participants in the insurance distribution channel to adapt to an evolving insurance industry by efficiently scaling their businesses through deeper access to information and insights.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dunghill_leak</category>
</item>
<item xmlns:dc='ns:1'>
<title>GCserv.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11090</link>
<guid>5839ddf15d7eafa3befa98544d2c1e9d</guid>
<pubDate>Tue, 26 Sep 2023 19:38:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>GCserv.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>438594c88a807481cfa7a24d2be06d9da4fae48e576bf41972df3d231e500a60</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Woody-Anderson-Ford</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11086</link>
<guid>df321578b4f5f132345d2e6b39743126</guid>
<pubDate>Tue, 26 Sep 2023 14:56:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Woody-Anderson-Ford</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77d283972aefa13d9f9eead687482760988e1c2c636bc47faaf4cc96b0b8c6b8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nordic-Security-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11085</link>
<guid>43b2dd1c93748297cfbbea4d31247641</guid>
<pubDate>Tue, 26 Sep 2023 13:46:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Nordic-Security-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>459d7238e5262efe94d06bbb2fdff15b90d25f6663b189c938be22d07c30893f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Prestige-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11083</link>
<guid>9877c66299c5b98d81fed12827d87e4b</guid>
<pubDate>Tue, 26 Sep 2023 12:55:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Prestige-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d07f2822904fadb2e7c7569eb432c478b22eb1b91a631e904ef7445a3728cd99</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>BestPack-Packaging</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11082</link>
<guid>4bcd83a98bc4ee323ec93c0f0e704d04</guid>
<pubDate>Tue, 26 Sep 2023 11:35:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>BestPack-Packaging</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47ecda8c8e425866bd738c0e618b9bc268c1842a9d3c8db14b6f873800510ff7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>C---</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11074</link>
<guid>daecf755df5b1d637033bb29b319c39a</guid>
<pubDate>Tue, 26 Sep 2023 11:30:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>C---</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f70d8f2184c3961a2930a78be7b3406d465b27a0f395e53f98d6b00e253b78cb</i><br /><br />Threat actor <b>description</b>: <i>Personnel agency in Tempe.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kramer-Tree-Specialists-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11075</link>
<guid>5c528e25e1fdeaf9d8160dc24dbf4d60</guid>
<pubDate>Tue, 26 Sep 2023 11:30:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Kramer-Tree-Specialists-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b72d4d4f19dca186a53fa4f3d1c6f2355ac9a1bfa19c3d01fdc1f2abb4ed224a</i><br /><br />Threat actor <b>description</b>: <i>Kramer Tree Specialists, Inc. is dedicated to meeting and exceeding the highest standards of excellence within the arboricultural industry. Our success over the years is in part due to our dedicated and loyal staff and the diversity of services and products that we offer.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>N-O</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11076</link>
<guid>96b8294326cb6595573cf2689f3f6dda</guid>
<pubDate>Tue, 26 Sep 2023 11:30:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>N-O</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53051f40acf0f34800746b3829644528d9a5f6fcfb792c0da0f9e00439ead412</i><br /><br />Threat actor <b>description</b>: <i>Dental Clinic in California.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>P-U</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11077</link>
<guid>644c87da09444b4942bef3299de94372</guid>
<pubDate>Tue, 26 Sep 2023 11:30:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>P-U</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cab02b5dc309857081367a5978e01a70950e5696534b99fda430cb8da064b4f2</i><br /><br />Threat actor <b>description</b>: <i>The company installation of underground electric, gas, and communication infrastructure in Texas.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>T-H-G</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11078</link>
<guid>b015f24e9c4eaa54104d9abcbc99b2d0</guid>
<pubDate>Tue, 26 Sep 2023 11:30:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>T-H-G</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dfb5c7ef4a8f886efcfcccfc48344d9f861f9d3ac0f52c0e74efcfb2457a9817</i><br /><br />Threat actor <b>description</b>: <i>The company owns and operates bars & grills and nightclubs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>W-C-A-D-D</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11079</link>
<guid>21f2a5c3244b531186b4e7f91d555861</guid>
<pubDate>Tue, 26 Sep 2023 11:30:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>W-C-A-D-D</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df17a92d961bb2f4c7a8f1c516ae9e6c19559f6c4293905cdd27d5bdc806c8b1</i><br /><br />Threat actor <b>description</b>: <i>The company that operates in the Government appraiser industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lutheran-Church-and-Preschool</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11080</link>
<guid>3f13cf4ddf6fc50c0d39a1d5aeb57dd8</guid>
<pubDate>Tue, 26 Sep 2023 11:30:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Lutheran-Church-and-Preschool</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3442979a2765eb607a5b22b70b04a833498c691f92ca92b298f45715c473d035</i><br /><br />Threat actor <b>description</b>: <i>Lutheran Church & Preschool.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Saint-Mark-Catholic-Church</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11081</link>
<guid>77772713a7d7e02b10ca9bd90e4f6a31</guid>
<pubDate>Tue, 26 Sep 2023 11:30:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Saint-Mark-Catholic-Church</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>84d10fb0aba333afabbb2222803d58fc8a5b712ddca63686d870cb4ee0a2792d</i><br /><br />Threat actor <b>description</b>: <i>Saint Mark Catholic Church.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arazoza-Brothers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11021</link>
<guid>ebf9f48abbc1bf77558f22526b9a7238</guid>
<pubDate>Tue, 26 Sep 2023 11:10:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Arazoza-Brothers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9afd3aa033e0d8fa80f953e120e96ce4ccad793598efbfd6f3417bb12bc3343</i><br /><br />Threat actor <b>description</b>: <i>Arazoza Brothers is Florida’s leading Commercial Landscape company. We take pride in delivering consistently excellent results for clients across the state, throughout the lifespan of their landscapes.</i><br />Target victim <b>website</b>: <i>https://arazozabrothers.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hoosier-Uplands-Economic-Development</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11024</link>
<guid>8c3c27ac7d298331a1bdfd0a5e8703d3</guid>
<pubDate>Tue, 26 Sep 2023 11:10:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Hoosier-Uplands-Economic-Development</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>467dff5fac8fa503fa9f7124a043d7ff2de7ad899a9af0ce113ac7a416ea8484</i><br /><br />Threat actor <b>description</b>: <i>Hoosier Uplands is a local non-profit agency based in Southern Indiana that serves as an Area Agency on Aging, Community Action Agency, licensed Home Health Care and Hospice agency, and Community Housing Development Organization!</i><br />Target victim <b>website</b>: <i>https://hoosieruplands.org</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Oasys-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11025</link>
<guid>977f8b33d303564416bf9f4ab1c39720</guid>
<pubDate>Tue, 26 Sep 2023 11:10:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Oasys-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4c22cf164ec755028eccce46e07ec8621383c642f71d279b587149f23ffbd183</i><br /><br />Threat actor <b>description</b>: <i>Oasys Technologies is the premiere IT staffing and consulting firm in Minnesota. Serving the largest corporations in the Midwest, Oasys Technologies offers talented IT resources, software engineers trained in the most current technologies, and long-term careers.</i><br />Target victim <b>website</b>: <i>https://oasystechnologies.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Merced-City-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11026</link>
<guid>42e499e591496cb71d9a11ae109dc962</guid>
<pubDate>Tue, 26 Sep 2023 11:10:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Merced-City-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>398ac970482d43e2bd0fa6033150286ab0287d06f27885421a90f30bd802cb87</i><br /><br />Threat actor <b>description</b>: <i>OUR MISSION All scholars are ensured equitable access to high quality instruction in environments that value and build from their unique talents. Guiding scholars toward mastery of academics, we build from our scholars talents to nurture their continuous academic achievement, critical-thinking skills, and develop the resiliency, perseverance and confidence necessary to excel in learning and life. Our District team provides positive, inclusive environments where all scholars feel safe, respected, and connected.</i><br />Target victim <b>website</b>: <i>https://mcsd.k12.ca.us</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Morgan-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11027</link>
<guid>b13b768ca3df456b8a0423880c3b239b</guid>
<pubDate>Tue, 26 Sep 2023 11:10:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Morgan-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>32f4d99c123396f47e8221df77b7f32e3523b8551d0c90b8142f05d71a5d09a8</i><br /><br />Threat actor <b>description</b>: <i>The Morgan County School District Community stands united in the pursuit of educational excellence.  It is our mission to create a challenging, learning environment that emphasizes literacy and numeracy.  We seek to assist students as they prepare for responsible citizenship, meaningful work, advanced education, and life-long learning.</i><br />Target victim <b>website</b>: <i>https://morgansd.org</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ferguson-Wellman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11028</link>
<guid>f9e70773c750b0b4ef0b7b2a0b07fe67</guid>
<pubDate>Tue, 26 Sep 2023 11:10:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Ferguson-Wellman</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4763ea003f7f22004c8fa55660d63d98e085b6791b08733e1221ee25ef4424e0</i><br /><br />Threat actor <b>description</b>: <i>WE ARE A PRIVATELY OWNED, INVESTMENT ADVISORY FIRM serving individuals, families and institutions.   For more than 40 years, we have designed and managed customized investment portfolios for clients’ IRAs, trusts, foundations, endowments, corporate retirement and pension plans. Ferguson Wellman and its division, West Bearing Investments, manage $8.2 billion for 913 clients. (updated annually, as of  January 1, 2022)  We have created two entry points to the same investment strategies that have been created by our own team of analysts. Our minimum for Ferguson Wellman client portfolios is $4 million and $1 million for West Bearing clients. With areas of expertise in investments, wealth management, institutional services and financial planning, we work together as a team to serve all client needs. Our private family office, Octavia Group, provides a suite of services that bring order and clarity to clients’ entire financial well-being. It is designed exclusively for our clients who have a minimum of $10 million managed by our firm.</i><br />Target victim <b>website</b>: <i>https://fergusonwellman.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brown-and-Streza</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11030</link>
<guid>11a32152b03a749d6bfcc5865300518e</guid>
<pubDate>Tue, 26 Sep 2023 11:10:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Brown-and-Streza</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e3651a80e3be4011ac412bd7912935d3db3f9d66daf2f9fdadf820aaea65280</i><br /><br />Threat actor <b>description</b>: <i>OUR MISSION Serve families, businesses, entrepreneurs, investors, philanthropists, and charitable organizations through our unified approach to business and personal planning.   Provide exceptional, integrated domestic and international legal services in:   • Comprehensive Tax Planning          • Trusts & Estates Planning                 • Ultra-High-Net-Worth Planning      • Trust & Estate Administration          • Charitable Sector • Business Planning  • Mergers & Acquisitions  • Business Succession Planning • Real Estate    Proactively serve clients, staff, and professional advisors by investing in technology, education, and long-term relationships.</i><br />Target victim <b>website</b>: <i>https://brownandstreza.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Glassline</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11032</link>
<guid>b43500a3d5362c75c3b893ca2d8a3c0f</guid>
<pubDate>Tue, 26 Sep 2023 11:10:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Glassline</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1177c22b743f7b223790f79425767ff24c2667499ee383d29f269c7f3c9e17c8</i><br /><br />Threat actor <b>description</b>: <i>Glassline® has come a long way from our humble beginnings of building double edgers in 1970. Our glass processing plant started in Toledo, Ohio with pioneering spirit and just seven employees on our team. You can be certain we have learned a few things over the last 50 years. Our product line has grown to include machines for nearly every facet of glass fabrication. And speaking of facets(sort of), we also produce diamond tools right here in our Perrysburg facility. Though the GLASSLINE CORPORATION family now consists of several divisions(packaging, food, bottling, and more), serving worldwide clientele, our core values remain the same: Focus on delivering Customer value through superior designs, and quality at reasonable prices.</i><br />Target victim <b>website</b>: <i>https://glassline.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>SydganCorp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11033</link>
<guid>ea9f6bbe0b86ae4c80610e31aacb8358</guid>
<pubDate>Tue, 26 Sep 2023 11:10:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>SydganCorp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e65cd4e45c6ea30fe7891c00d4fb0e293a81b78f50054b7e925810039d7e7bf4</i><br /><br />Threat actor <b>description</b>: <i>As a leading property management and development company, Sydgan is committed to making Winter Park, FL a more beautiful place to live and work, not just for the better of the individual but for the better of the community as a whole. We offer single family, multi family, retail, industrial and commercial properties for lease.</i><br />Target victim <b>website</b>: <i>https://www.sydgan.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alexander-City-Alabama</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11034</link>
<guid>5f123c605d90ec98e3b8544d49136c31</guid>
<pubDate>Tue, 26 Sep 2023 11:10:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Alexander-City-Alabama</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd3ed25abd5cbcb2787e9569702c55a8c85ff4750a1af5e3dbb67f6f4950e240</i><br /><br />Threat actor <b>description</b>: <i>Alexander City, known to locals as "Alex City", is the largest city in Tallapoosa County, Alabama, United States, with a population of 14,843 as of the 2020 census. It has been the largest community in Tallapoosa County since 1910. It is known for Lake Martin with its 750 miles (1,210 km) of wooded shoreline and 44,000 acres (18,000 ha) of water. Lake Martin stands on the Tallapoosa River and offers boating, swimming, fishing, golfing, and camping. Many neighborhoods and luxury homes are located on the lake.  The city's economy was traditionally based on the textile industry, but in recent times its economic base has become more diversified as textile jobs have gone to India.</i><br />Target victim <b>website</b>: <i>https://www.alexandercityal.gov</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>SPEC-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11035</link>
<guid>0bf76a53f4021dd7bd49affd1419a2e7</guid>
<pubDate>Tue, 26 Sep 2023 11:10:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>SPEC-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a6f10ac60b7d2b5e3ce1796cd9fb250ca453f61f5f154e1a7f40d57b79adc0d</i><br /><br />Threat actor <b>description</b>: <i>Delivering excellence for over two decades, SPEC proudly stands tall as an all-in-one premier EPC solutions provider for the oil and gas, new energies, and refineries & petrochemicals industries. The company consistently gains customers’ trust and confidence with its customized and innovative solutions from concept to commissioning, in the harshest and most challenging terrains across the globe.</i><br />Target victim <b>website</b>: <i>https://www.spec-pro.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jersey-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11036</link>
<guid>bbf37bc29caa653170cf5a578f1e7464</guid>
<pubDate>Tue, 26 Sep 2023 11:10:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Jersey-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d9a646ecc06e28e405e647eacdd2aa6336fd42c9696e0bb3fa48d33a4d3c7dd</i><br /><br />Threat actor <b>description</b>: <i>As a private, post-secondary institution, Jersey College strives to provide its students with an education that will help them thrive in the field of nursing. The core of the program focuses on the skills and knowledge of a Certified Nurse Assistant and provides potential nurses the opportunity to become a License Practical Nurse or continue on to become a Registered Nurse. Our mission is to bridge the labor gap that has been observed in fields such as nursing and to prepare professionals that will be skilled and ready to join the job forces.</i><br />Target victim <b>website</b>: <i>https://www.jerseycollege.edu</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Key-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11038</link>
<guid>641aa381139a7254f52aaf4bfc5d99da</guid>
<pubDate>Tue, 26 Sep 2023 11:10:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Key-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c1a40be26cc1cd042db10b9932679cb0fdea182a5c47b38e6512ebe8a412d60e</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1978, Key remains true to the belief that strong relationships with everyone from clients to subcontractors is the key to their success. With offices throughout the Midwest and hundreds of projects completed throughout the country, Key has become one of the most respected general contractors in the United States. Key is consistently recognized in the ENR Top 400 Contractors and as one of the fastest growing, highest quality contractors in the country. Every day, on every project, Key fulfills its mission of complete, no-excuses customer satisfaction.</i><br />Target victim <b>website</b>: <i>https://www.keyconstruction.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Liberty-Lines</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11040</link>
<guid>dd5c25815ea64c1c15cf6eef3ee527ea</guid>
<pubDate>Tue, 26 Sep 2023 11:10:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Liberty-Lines</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>436621756c74380fa49eb027c8340478513fe8c46696166d26917a7623fa0d13</i><br /><br />Threat actor <b>description</b>: <i>Since its meager beginnings in 1953 as a 4 vehicle operation, Liberty Lines has grown through merger and acquisition to become one of the largest privately owned transportation companies in New York State.</i><br />Target victim <b>website</b>: <i>https://www.libertylines.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>LoopLoc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11041</link>
<guid>e10559d57b97636f684ed48d171889e8</guid>
<pubDate>Tue, 26 Sep 2023 11:10:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>LoopLoc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>70d9489f0331cc9a631750f4d08850809a4afda21b9f2f44c01d34c30f4856bc</i><br /><br />Threat actor <b>description</b>: <i>In 1978, Bill Donation founded LOOP-LOC with five employees. In 2000, Bill’s daughter, LeeAnn Donaton took over as President & CEO, and today LOOP-LOC boasts a 200,000 square foot headquarters in Hauppauge, New York with 300 employees.</i><br />Target victim <b>website</b>: <i>https://www.looploc.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ananda-Temple</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11043</link>
<guid>8e99cbf1c0c904e0c58e043da2e993c5</guid>
<pubDate>Tue, 26 Sep 2023 11:10:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Ananda-Temple</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c3c174f6b54f54773ccdc45c3a574db13ab2811b7eaa223a82311799bc28e2a</i><br /><br />Threat actor <b>description</b>: <i>Ananda is a worldwide group of individuals who share the search for higher consciousness and the ideal of service to others. We express this service by modeling uplifting values and sharing techniques for achieving peace of mind and inner happiness. Ananda, which means "joy" in Sanskrit, was founded in 1968 by J. Donald Walters (Swami Kriyananda) to support others in their quest for spiritual growth.</i><br />Target victim <b>website</b>: <i>https://www.ananda.org</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Paradise-Custom-Kitchens</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11045</link>
<guid>85934679f30131d812a8c7475a7d0f74</guid>
<pubDate>Tue, 26 Sep 2023 11:10:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Paradise-Custom-Kitchens</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7cc336e62f0e257475169a3a4b5c021bd5b5e29de161cb93608c0afa7a3c1994</i><br /><br />Threat actor <b>description</b>: <i>Paradise Custom Kitchens is a custom cabinetry and remodeling company rooted in quality craftsmanship and exceptional service in both kitchen and bath design.</i><br />Target victim <b>website</b>: <i>https://www.paradisecustomkitchens.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-WorkPlace</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11047</link>
<guid>45d38ce7f5231602e24a2103a0300ae6</guid>
<pubDate>Tue, 26 Sep 2023 11:10:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>The-WorkPlace</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a21f2a29413e361ba895d8e7ccd0e100a2efae286cfdba118ed99098c0437ce0</i><br /><br />Threat actor <b>description</b>: <i>Serving as southwest Connecticut's Workforce Development Board we administer job training and preparation funds distributed by state and federal agencies. To provide much needed additional "fill-the-gap" services and training, we also pursue competitive grants and funding from foundations and corporations. Together with community partners, The WorkPlace provides targeted programs and employment services designed to help job seekers identify or regain a career that will facilitate their success. Additionally, we ensure that employers are able to find the workforce talent they need to operate and compete in a global marketplace.</i><br />Target victim <b>website</b>: <i>https://www.workplace.org</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Professional-Moving-Company---Mackie-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11048</link>
<guid>1010cedf85f6a7e24b087e63235dc12e</guid>
<pubDate>Tue, 26 Sep 2023 11:10:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Professional-Moving-Company---Mackie-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d557e7694f3e476548c65a538732a61b70cc68b4091fdfd36782b778557cb9a1</i><br /><br />Threat actor <b>description</b>: <i>The Mackie Group of companies has represented the highest standard of quality, professionalism and commitment to customer service since 1928. On a daily basis, we perform a diverse suite of services for our clients that positively impact their brand. We offer customized solutions to corporations and individuals worldwide. From a local household goods move to a North American turnkey supply chain solution, Mackie has a proud history of developing long-standing client partnerships. Mackie has evolved from a pure household goods and transportation provider to the Automotive industry to a vibrant, diverse organization.</i><br />Target victim <b>website</b>: <i>https://www.mackiegroup.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Central-Trenching</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11050</link>
<guid>ff1f3e444a6ff6fe872f07716803ae18</guid>
<pubDate>Tue, 26 Sep 2023 11:10:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Central-Trenching</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>393cc9757eaef8b6de2e26937caf5492486ad77b86a55d0a924b6a18c75311cf</i><br /><br />Threat actor <b>description</b>: <i>CTI is a growing North Dakota based company that specializes in directional boring, trenching, plowing in cables and pipes, hydrovacing, hot shot services, and turn-key fiber optic installation. For decades CTI has proudly worked with customers from municipalities, utility companies, various corporations/contractors and home owners both locally and from other states.</i><br />Target victim <b>website</b>: <i>https://www.centraltrenching.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cullum-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11052</link>
<guid>74e1513cc2927e89575044e7d6dbc8e0</guid>
<pubDate>Tue, 26 Sep 2023 11:10:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Cullum-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a6dda57c02cefb4bcc996e9ded320a9f6e2cb1ea1aa020ab65596ab64b7664a</i><br /><br />Threat actor <b>description</b>: <i>Cullum Services, Inc., has provided mechanical maintenance, repair and retrofit services in South Carolina since 1972. It has offices across the state (North Charleston, Columbia, Florence and Greenville) and over 90,000 square feet in sheet metal and pipe fabrication shops. This infrastructure ensures that inventory is readily available and service is timely. Cullum Services, Inc. is a subsidiary of Cullum Mechanical Construction, Inc., and sister company of Cullum Constructors, Inc.</i><br />Target victim <b>website</b>: <i>https://https://culluminc.com/</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gold-Coin-Restaurant</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11053</link>
<guid>0d2f28fbfb3c845930a1cba0672950b1</guid>
<pubDate>Tue, 26 Sep 2023 11:10:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Gold-Coin-Restaurant</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eb6a708d6d618ade9c5de19a83f44d205a4841aee88cb68c2567b1ff50343a6a</i><br /><br />Threat actor <b>description</b>: <i>Gold Coin Restaurant is a company that operates in the Restaurants industry. It employs 11-20 people and has $1M-$5M of revenue.</i><br />Target victim <b>website</b>: <i>https://www.goldcoinrestaurant.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Marlboro-Township-Public-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11054</link>
<guid>d5a24856959a183b69834f99fad86e5d</guid>
<pubDate>Tue, 26 Sep 2023 11:10:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Marlboro-Township-Public-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3cc464732b23a0f23aee99a362666e1ebc8006dff9d129ead8881f16dbafab73</i><br /><br />Threat actor <b>description</b>: <i>The Marlboro Township School District is a community public school district that serves students in pre-kindergarten through eighth grade in Marlboro Township in Monmouth County, New Jersey, United States. The district is classified by the New Jersey Department of Education as being in District Factor Group "I", the second-highest of eight groupings. District Factor Groups organize districts statewide to allow comparison by common socioeconomic characteristics of the local districts. From lowest socioeconomic status to highest, the categories are A, B, CD, DE, FG, GH, I and J</i><br />Target victim <b>website</b>: <i>https://www.mtps.org</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Johnson-Boiler-Works</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11056</link>
<guid>19a04d6ae3e382a86229740a17307c22</guid>
<pubDate>Tue, 26 Sep 2023 11:10:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Johnson-Boiler-Works</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f6a3ab5bb023fd11061814376029cb371f7e1fc2a78c59a75b6ac341c82d935</i><br /><br />Threat actor <b>description</b>: <i>Johnson Boiler is one of the best, instant and efficient service provider in town. We are utilizing their services since so many years and we are quite satisfied with their level of professionalism in the area of heating and cooling services.</i><br />Target victim <b>website</b>: <i>https://www.johnsonboiler.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>EnCom-Polymers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11057</link>
<guid>ca3f4ad48be4dc9ef210f96327e1331b</guid>
<pubDate>Tue, 26 Sep 2023 11:10:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>EnCom-Polymers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>88486b83264cca3e1cb0be8008dc1e6ae357336f2447550253f42a168192669a</i><br /><br />Threat actor <b>description</b>: <i>EnCom Polymers was established in October 1999, with a goal of servicing automotive companies in the Midwest and their Tier 1 and Tier 2 suppliers. Through our commitment to customer service, product quality, and new product development, EnCom Polymers has grown to serve a broad range of industries such as telecommunications, medical, electrical and electronic, material handling, and industrial.</i><br />Target victim <b>website</b>: <i>https://www.encompolymers.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Colors-Dress</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11059</link>
<guid>70431e77d378d760c3c5456519f06efe</guid>
<pubDate>Tue, 26 Sep 2023 11:10:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Colors-Dress</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>35f7ee71c3cda795d6c8096f401ba9d2e5686e5bebfd04e4b1596887e06b30e5</i><br /><br />Threat actor <b>description</b>: <i>Colors Dress is adding more wonder to their dresses. Dedicated to making the most magical night of your life even more memorable. Each dress is designed to have you feel like a fairy tale princess from dusk till dawn.</i><br />Target victim <b>website</b>: <i>https://www.colorsdress.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>THEATER-LEAGUE-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11060</link>
<guid>37c691988cb0a6f0fdc8cc41f6ede4f1</guid>
<pubDate>Tue, 26 Sep 2023 11:10:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>THEATER-LEAGUE-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>59b59a8964885ab7bfc8829344a615c6cc9b7c759266e4df1c6c74491da861e9</i><br /><br />Threat actor <b>description</b>: <i>Theater League is a not-for-profit civic performing arts organization dedicated to enhancing the quality of life in the communities it serves with the thrill of live! theater. Founded by Mark Edelman in Kansas City in 1977, the organization has presented the Best of Broadway in theaters across the country to well over a million patrons. Today, we dedicate ourselves to supporting professional theater through grants, student ticket subsidies and new works development in our hometown of Kansas City and around the country.</i><br />Target victim <b>website</b>: <i>https://www.theaterleague.org</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>GI-Medical-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11061</link>
<guid>14c1633ad4334a68c87e6ce4b737e775</guid>
<pubDate>Tue, 26 Sep 2023 11:10:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>GI-Medical-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>faf0c464d2cf5f3063e53a2db1e6025fda333ccb261b430cb14482fa492aec25</i><br /><br />Threat actor <b>description</b>: <i>GI Medical Services is Staten Island’s premiere provider of expert gastroenterology services. GI Medical Services is a company that operates in the Hospital & Health Care industry. It employs 1-5 people and has $0M-$1M of revenue. The company is headquartered in Staten Island</i><br />Target victim <b>website</b>: <i>https://www.gastrostatenisland.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gordon-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11062</link>
<guid>ed2357bbbd318d584d579d024d9fd808</guid>
<pubDate>Tue, 26 Sep 2023 11:10:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Gordon-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da46296dad1d191fcbc97976edd103e491bb536f72eef5bdf9c4e7637fde28e8</i><br /><br />Threat actor <b>description</b>: <i>The Gordon Law Firm is an experienced and accomplished law office in New Orleans, Louisiana, Our lawyers and attorneys serve New Orleans, Baton Rouge</i><br />Target victim <b>website</b>: <i>https://www.gordonlawfirm.net</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Contraband-Control-Specialists</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11063</link>
<guid>10374578600d43dd62268569d5ebd226</guid>
<pubDate>Tue, 26 Sep 2023 11:10:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Contraband-Control-Specialists</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a64d10fdb1b6d6aad04a4d96bdf8db278f00b546cd608f82b9f9218bc8a1e9f1</i><br /><br />Threat actor <b>description</b>: <i>Contraband Control Specialists is a renowned private investigation and professional education consulting firm, widely recognized for its expertise in addressing "Drugs in the Workplace." As a California-based company, we have proudly established a robust client base and secured contracts in 42 states across the nation. Our dedicated professionals have successfully trained over 12,000 supervisors in the crucial skills of recognizing and addressing employee drug use and abuse.</i><br />Target victim <b>website</b>: <i>https://www.contrabandcontrol.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>IY-Senior-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11064</link>
<guid>39799c18791e8d7eb29704fc5bc04ac8</guid>
<pubDate>Tue, 26 Sep 2023 11:10:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>IY-Senior-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9fd8b6a46b241d7b3e3cae6823b8c4bacf7a682ece25b36f1d73fb90df1f9eca</i><br /><br />Threat actor <b>description</b>: <i>The Agency provides qualified and paraprofessionals who are under the supervision of the Agency's Registered Nurse: Home Health Aides Personal Care Aides Hourly and 24 Hour Live-In Home Health Aides and Personal Care Aides</i><br />Target victim <b>website</b>: <i>https://www.iyseniorcare.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>EWBizservice</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11065</link>
<guid>7de64fd4ad48b97aa81f0250c25b899a</guid>
<pubDate>Tue, 26 Sep 2023 11:10:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>EWBizservice</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d62c78fddeb6971fce77314e42ae7f9f5c0f953c6c7044a726f67c5a3699b7ca</i><br /><br />Threat actor <b>description</b>: <i>Ewbizservice was created to allow a business owner to focus on what he loves. A cook opens a restaurant to prepare food, a gardener opens a business to provide landscaping services, an HVAC owner opens a business to provide air-conditioning services. We have never meet a business owner whose dream was to pay bills, prepare payroll, handle tax issues, etc. In addition, to being mundane work most owners are not trained in the nuances of running a business. Our goal is to allow the owner to focus on their craft while we handle the rest. Our clients have found that when these tasks are out-sourced to our company their business has grown exponentially. A little background about the partners. Rob Schoenberg is a CPA and Jamie Webber is an MBA. Both have years or experience running business in multiple industries. Rob is in New York State and Jamie is located in the State of Washington. Rob and Jamie are both former collegiate wrestlers. Our training has allowed us to apply the principles of hard-work , passion and dedication to our clients</i><br />Target victim <b>website</b>: <i>https://www.ewbizservice.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Center-Township-Trustee</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11066</link>
<guid>e0330da43b4d33f4ef9247ad260074f4</guid>
<pubDate>Tue, 26 Sep 2023 11:10:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Center-Township-Trustee</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>715edbde1b0665812bcc165558d5bacfdf26433139d0deabbbcedefd36d5fa4c</i><br /><br />Threat actor <b>description</b>: <i>Everything we do at the Center Township Trustee's Office makes a difference for our Muncie community.</i><br />Target victim <b>website</b>: <i>https://Center Township Trustee</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Garlick--Markison</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11067</link>
<guid>4fe068d05b9b1470b7ffba0732b4446f</guid>
<pubDate>Tue, 26 Sep 2023 11:10:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Garlick--Markison</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fffebc93fb8433c39c3738f5107fcc36e16bc7626a6acaf7be5c977573b7a7b2</i><br /><br />Threat actor <b>description</b>: <i>Garlick & Markison is a boutique law firm specializing in patent portfolio building for its clients. Each practitioner in the firm is registered with the U.S. Patent and Trademark Office and has a background in electrical engineering or the software arts</i><br />Target victim <b>website</b>: <i>https://www.texaspatents.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Swanns-Furniture--Design</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11069</link>
<guid>2bc4cdc1b8653fb1a7c3213c0a9bf1bd</guid>
<pubDate>Tue, 26 Sep 2023 11:10:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Swanns-Furniture--Design</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>271133161eeae3df82c7da115300c0d9eb253eccfa676e882648a69c16ba040c</i><br /><br />Threat actor <b>description</b>: <i>Shop at Swann's Furniture store for the best selection and latest styles in home decor and furniture design at the lowest price!Universal furniture in Tyler,TX(Texas)</i><br />Target victim <b>website</b>: <i>https://www.swanns.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Asia-Vegetable</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11071</link>
<guid>7e2674f6f4343ce9f635b86d124851ce</guid>
<pubDate>Tue, 26 Sep 2023 11:09:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Asia-Vegetable</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>229285ee6f807295ac0b1530bc253a7f3f97906a6cb23a554fc40bf4a7424d9f</i><br /><br />Threat actor <b>description</b>: <i>After our Founder, Wai K. Lo, immigrated to the United States, he spent his earlier years working in the restaurant industry. He noticed the difficulty in procuring fresh Asian produce within the industry. With this in mind, he was inspired to bring the freshest Asian vegetables and fruits to South Florida. Teaming up with his wife, Xiu Li, Asia Vegetable & Food Supply has since served South Florida since 1984.   Today, with the help of his sons, we import and distribute produce from the USA, Mexico, and many other countries. Not only have we remained the place to buy quality Asian vegetables, but we now have fresh sweet fruits as well! We have expanded our service across the nation and also to the Caribbean Islands.</i><br />Target victim <b>website</b>: <i>https://asiavegetable.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>Foundation-Professionals-of-Florida</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11073</link>
<guid>840348ae33163924c1d29fd2c22faf13</guid>
<pubDate>Tue, 26 Sep 2023 11:09:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>losttrust</b> claims attack for <b>Foundation-Professionals-of-Florida</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bedd2484289ee60b29403502b3c449e27fa7d050652017e1d1dfc8934f4cb45e</i><br /><br />Threat actor <b>description</b>: <i>Foundation Professionals of Florida are foundation repair experts in foundation repair for the Virgin Islands. Let our team of experts assess the needs of your home and offer improvements and solutions to any foundation problems that need to be solved.</i><br />Target victim <b>website</b>: <i>https://www.foundationprosfl.com</i>]]></description>
<category>losttrust</category>
</item>
<item xmlns:dc='ns:1'>
<title>WEBBER-RESTAURANT-GROUP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11020</link>
<guid>f2ece8b7033187c53bdec16c369964e7</guid>
<pubDate>Tue, 26 Sep 2023 08:42:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>WEBBER-RESTAURANT-GROUP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>90386b7926ac5841a4cbc5f10db921a39a52c7f338d6f967c9eb7341d4a61649</i><br /><br />Threat actor <b>description</b>: <i>Webber Restaurant Group has owned and operated hospitality businesses in Massachusetts since 2004 and we pride ourselves on our commitment to work/life balance and the large number of employees who have been with us for over 5, 10, and 15 years.  Today, Webber Restaurant Group includes the following businesses: Gibbet Hill Grill (Groton, MA) The Barn at Gibbet Hill (Groton, MA) Gibbet Hill Farm (Groton, MA) Scarlet Oak Tavern (Hingham, MA) The Bancroft (Burlington, MA) The Double Bull (Peabody, MA) Fireside Catering (Burlington, MA) Fireside Catering is the exclusive caterer to the following historic venues: The Estate at Moraine Farm (Beverly, MA) Fruitlands Museum (Harvard, MA) The Crane Estate (Ipswich, MA) The Bradley Estate (Canton,MA) The Stevens Estate (North Andover, MA) https://www.webberrestaurantgroup.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Waterloo-Media</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11003</link>
<guid>2da6a99a5ce7553b10fb03803d4994a9</guid>
<pubDate>Tue, 26 Sep 2023 02:42:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Waterloo-Media</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>320cc6ec39147089d421aa9789cf44d6307ad7256d6fc5a617dc3549874faf5b</i><br /><br />Threat actor <b>description</b>: <i>Waterloo Media is connected to the Austin community with a reach that is unparalleled. We create marketing plans that deliver results for our clients and use our local foot...</i><br />Target victim <b>website</b>: <i>https://www.waterloomedia.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>Powerhouse-Retail-Services-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=11000</link>
<guid>33d6548e48d4318ceb0e3916a79afc84</guid>
<pubDate>Tue, 26 Sep 2023 01:12:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Powerhouse-Retail-Services-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2e23e11d61bd4a3034c10858e47fd96131fbee531ac027c7962ecc62c63ceb54</i><br /><br />Threat actor <b>description</b>: <i>From facilities maintenance to exterior services, rollout and refresh programs, Powerhouse is your turnkey solution for commercial infrastructure maintenance and enhancemen...</i><br />Target victim <b>website</b>: <i>https://powerhousenow.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nusmiles-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10996</link>
<guid>214cfbe603b7f9f9bc005d5f53f7a1d3</guid>
<pubDate>Mon, 25 Sep 2023 18:49:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>knight</b> claims attack for <b>Nusmiles-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a5e6bdd132a8ac9ae2499bbdb9f072f388b64ba381ff0c412bac692a737bd99e</i><br /><br />Threat actor <b>description</b>: <i>https://www.nusmiles.com/ nusmiles is a general dentist specializing in dental procedures and services in Takoma Park, MD. Michele Dozier, DDS is located in Takoma Park,</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>knight</category>
</item>
<item xmlns:dc='ns:1'>
<title>PRETZEL-STOUFFER</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10992</link>
<guid>48dd34fa4a5fc8e0045aba1952e1818e</guid>
<pubDate>Mon, 25 Sep 2023 09:40:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>PRETZEL-STOUFFER</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cf892a5f6e45ff5db184a28c4a07a13172fc0f8559a2c81ecd29dad9ae1817ab</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>J.T.-Cullen-Co.-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10990</link>
<guid>8eec1a372e8a99076315db9ea4d24b2c</guid>
<pubDate>Mon, 25 Sep 2023 05:29:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>J.T.-Cullen-Co.-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>066c4f539d1deb6c946bb3eec034ff56237c615570fcc2d32b99bdbc44b6d97e</i><br /><br />Threat actor <b>description</b>: <i>We are an employee owned (ESOP) custom metal fabrication company located in Fulton, Il specializing in large and unique metal fabrications. For over 60 years, our company has been providing high quality fabrications to various industries including power, steel mill, architectural and rail. We are an ISO 9001:2015 and ASME certified company with a very experienced and dedicated employee base. https://www.jtcullenco.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Springer-Eubank</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10989</link>
<guid>9e1a36515d6704d7eb7a30d783400e5d</guid>
<pubDate>Mon, 25 Sep 2023 04:39:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Springer-Eubank</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36db47c13eb1daf2a6242759e13bdd82feb9953bf4c483c62d48f5a65574b55e</i><br /><br />Threat actor <b>description</b>: <i>A locally owned & operated company serving the Cape Fear Region.Our professionally trained staff is always ready to help you with your fuel needs.Springer Eubank Supplies Fuel to Southeastern North CarolinaLocated just off the Cape Fear River near the entrance to the state shipyards in Wilmington, Springer Eubank provides fuel delivery to the southeastern NC region throughout New Hanover and Pender Counties, along with deliveries to the Jacksonville area in North Carolina. springeroil.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>altmanplants.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10981</link>
<guid>0b01c7d68feb22290f3b0da91bef689d</guid>
<pubDate>Sun, 24 Sep 2023 19:37:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>altmanplants.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a04f5a27880c3e44d8cf614ac2e33fd7b4cab9dfe2688a1d2eb17e5b22e3fb90</i><br /><br />Threat actor <b>description</b>: <i>A 3 Billion revenue company nestled in the hills of north San Diego County, Altman Plants is home to over 1,025 unique varieties of cacti and succulents. In 1975, Altman Plants was simply a backyard hobby for Ken and Deena Altman.File list and sa...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>BPR-Properties-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10961</link>
<guid>d9bec6b996ff7a16fc57fb253e6255c8</guid>
<pubDate>Sat, 23 Sep 2023 09:58:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>BPR-Properties-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e3b16e2196bc3e249ac4e174052b265d561f340543720f5e8356f11b6bc754e</i><br /><br />Threat actor <b>description</b>: <i>BPR Properties was founded in 1983, with the purchase of our first property: a smoke shop in Staten Island, New York. Since our humble beginnings, BPR Properties has acquir...</i><br />Target victim <b>website</b>: <i>https://bpr-properties.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>Franktronics-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10960</link>
<guid>018d335e8cc3c437150a76fa6f052a44</guid>
<pubDate>Sat, 23 Sep 2023 08:45:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Franktronics-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b684bb767305e69e8c5b03142672f85c5228d2ccc17a2de4ee47d2a7e61390e0</i><br /><br />Threat actor <b>description</b>: <i>Franktronics, Inc. is an information technology and services company based out of 3618 George Washington Memorial Hwy, Hayes, Virginia, 23072, United States.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>SMWLLC.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10952</link>
<guid>ed7336aa18ce41622a5b41a6a62f4fea</guid>
<pubDate>Fri, 22 Sep 2023 22:17:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SMWLLC.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8d659ed22a885d45274701e6436cd33b7b8d04272c75685930cd23cb69ccce09</i><br /><br />Threat actor <b>description</b>: <i>SM&W - Acoustic, Audiovisual & Technology Design Consultants</i><br />Target victim <b>website</b>: <i>https://www.SMWLLC.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>precisionpractice.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10951</link>
<guid>0561bc7ecba98e39ca7994f93311ba23</guid>
<pubDate>Fri, 22 Sep 2023 22:05:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>precisionpractice.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c02fa1745e9e91df934b7769ca2c8de410bcbe933f75a99a0b0224f325c86033</i><br /><br />Threat actor <b>description</b>: <i>Medical Billing, RCM, & Medical Technology Solutions and Revenue Cycle Management Experts. At Precision, we believe best-in-class technology and revenue cycle processes are essential in order for hospitals and medical practices to succeed in the heal...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>marshallindtech.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10950</link>
<guid>26639a69fd612eeaf1f8a17cc9d1ca6f</guid>
<pubDate>Fri, 22 Sep 2023 21:36:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>marshallindtech.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c22378e19132b16431b21cfd57ba3ceb163b6031a740ea81096565f6f154d0f0</i><br /><br />Threat actor <b>description</b>: <i>Marshall Industrial Technologies was established in 1951. Strategically located in the heart of the northeastern industrial community, we have evolved over the years into a major "One Source" supplier for all of your plant equipment installation and...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>CLX-Logistics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10948</link>
<guid>6e04df31f1bbb1c02666d0dfa3638f76</guid>
<pubDate>Fri, 22 Sep 2023 20:34:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>CLX-Logistics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>51fbd517875ca2c1d6a65c74b4b21d88da8c73f8890d0afad8eac26c1583bce0</i><br /><br />Threat actor <b>description</b>: <i>CLX Logistics, LLC is a global 3PL provider of transportation management systems, managed services, supply chain consulting and intermodal transportation services for a broad base of industry verticals. We almost finished their data transportation and will upload 26GB of their data soon. Tons of business information: clients, personal information, a few confidential docs. We will update.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pik-Rite</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10946</link>
<guid>df202fc4b213028833dec15dd526256d</guid>
<pubDate>Fri, 22 Sep 2023 19:35:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Pik-Rite</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6284cc1eea7eac277f55d6695904b7facc938e2e5e8bfbc337d7ba8e97ca0b26</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Progressive-Leasing--40-million-Customers-PII-Data-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10945</link>
<guid>122915b6774a4467be946ddae541af52</guid>
<pubDate>Fri, 22 Sep 2023 18:43:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Progressive-Leasing--40-million-Customers-PII-Data-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>550d7467c41a366915e068f8c4f3e94d0d42452cc819cdb1de74b580fe71dd0c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carlo-Ditta</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10941</link>
<guid>f18288b44fa19637ee5476ac4cdc77d8</guid>
<pubDate>Fri, 22 Sep 2023 15:37:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Carlo-Ditta</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e5cda1d8281c0ad80c796922c5a8b469d0334de9638ea474051aa859dfd67942</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Yusen-Logistics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10940</link>
<guid>4f3fcf17644bb65a1732f02d6f10034a</guid>
<pubDate>Fri, 22 Sep 2023 14:40:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Yusen-Logistics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec5b8b45d3cfc61ecc1870603cf6720b9964ebd51ecb327388049fa9f65a54d6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>fi-tech.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10938</link>
<guid>73dc680c73e6a18c296d5889e67b6b55</guid>
<pubDate>Fri, 22 Sep 2023 13:16:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>fi-tech.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3503059d9a485dc3772d02246aa7d588f38dd658f9bac877a39906ba192198fd</i><br /><br />Threat actor <b>description</b>: <i>Fi-Tech is “your global connection” to the leading manufacturers of complete machines or technical components used in the production of Polymer, Synthetic Fibers, Nonwovens, Textiles, Converting, Perforated Products or in Tobacco Processing. ...</i><br />Target victim <b>website</b>: <i>fi-tech.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>Yakima-Valley-Radiology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10936</link>
<guid>3eb46aa5d93b7a5939616af91addfa88</guid>
<pubDate>Fri, 22 Sep 2023 13:05:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>Yakima-Valley-Radiology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b524ef1b9a619d1010cc72b3346bbe19a5574bc60373674c0f6c2627359e4713</i><br /><br />Threat actor <b>description</b>: <i>Yakima Valley Radiology PC is a company that operates in the Hospital & Health Care industry. 10 of the organization contain financial reports, client lists with contacts, list of patients for 15 years (212579 rows), a database of social security numbers (including staff, doctors) with 766000  rows.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hospice-of-Huntington</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10935</link>
<guid>a0a40b610afc7e41298f3ebd55c60ded</guid>
<pubDate>Fri, 22 Sep 2023 12:49:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>Hospice-of-Huntington</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>521aa0d3e73fd106915ff0ce82625ba08c6c4fb15411f9eaeafbdff479a739a1</i><br /><br />Threat actor <b>description</b>: <i>Hospice of Huntington, Inc. is the first hospice in the State of West Virginia. Founded in 1982. Karakurt has obtained 20 gb data of the hospice. Many financial and operating files. HR information, medical records, PI of volunteers, information of donations and much other. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>PainCare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10932</link>
<guid>df5192a28088ba286c78665fd53c8d40</guid>
<pubDate>Fri, 22 Sep 2023 10:50:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>PainCare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c64272cb1b237cb01d68f497af929f52190cadeb66cbff16c7cf31d2ee64f96</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>TAOGLAS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10931</link>
<guid>40d32ab6b85a206c1d2ccf7309f1c638</guid>
<pubDate>Fri, 22 Sep 2023 08:43:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>TAOGLAS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7e6f96fcfa9696e34ff4511a3704dbbd77b3dff7df11d0e0e767780af7db25bd</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>C--m</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10920</link>
<guid>3cdb82a314eeef6d77aa4cbacb7280dd</guid>
<pubDate>Thu, 21 Sep 2023 14:34:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>C--m</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3c86459d1bc4857338e7c94981d7e8dadb6f176c6029f0e91cd4622c291c997</i><br /><br />Threat actor <b>description</b>: <i>The company providing their platforms for exchanging messages whether it is voice, fax, or sms.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Road-Safety</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10921</link>
<guid>9a4d6e8685bd057e4f68930bd7c8ecc0</guid>
<pubDate>Thu, 21 Sep 2023 14:34:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Road-Safety</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8217ebcc4c1b9b0dcb7c3e9ca7309318a003f5b0bb3ed5384a3df7cbbde83bd</i><br /><br />Threat actor <b>description</b>: <i>Road Safety Inc. is a certified Minority Business Enterprise (MBE) and a licensed full-service traffic control contractor.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hawkins-Delafield-Wood</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10916</link>
<guid>60e6a2389c9bea9dada095ad43ebde86</guid>
<pubDate>Thu, 21 Sep 2023 07:13:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Hawkins-Delafield-Wood</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b87f842ee53abd6b35cb4a62fdab5dac89fce84e4aafb3dcaa9e41c9ee9c5bed</i><br /><br />Threat actor <b>description</b>: <i>Hawkins offers governmental agencies, non-profit corporations and financial institutions exceptional legal service and sophisticated counsel in finance and infrastructure transactions.  Founded in 1854 and with 90 lawyers in ten offices across the country, the firm is consistently recognized by clients and peers for sustained excellence.  Our professionals practice with the distinctive collegiality and mutual respect intrinsic to traditional law firm partnerships.</i><br />Target victim <b>website</b>: <i>https://www.hawkins.com/</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>messner.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10911</link>
<guid>6bd2ab1de93563ccc2ac555b8f1808de</guid>
<pubDate>Wed, 20 Sep 2023 18:44:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>messner.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>54aa2999220071ce6896e3181c4a54183287d695fb0ad291a89f6852b003bed4</i><br /><br />Threat actor <b>description</b>: <i>At Messner Reeves LLP we firmly believe every business, regardless of size, deserves exceptional legal services at a reasonable rate.Messner Reeves is a national full-service business law firm providing legal services to a diverse group of client...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chait</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10910</link>
<guid>08e5d8066881eab185d0de9db3b36c7f</guid>
<pubDate>Wed, 20 Sep 2023 16:16:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Chait</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>accca2e29102e41501db13c961d35a2cf92d27ee232c59e20ac94537bde3f806</i><br /><br />Threat actor <b>description</b>: <i>Chait & Company is a Los Angeles—based firm offering a wide range of architectural design, general contracting and construction management services, recognized in 1994. The company's main office is located at 14931 a Celica St Ste A, Van Nuys, California, 91411, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gulf-American-Lines</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10906</link>
<guid>5f7f02b7e4ade23430f345f954c938c1</guid>
<pubDate>Wed, 20 Sep 2023 16:14:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Gulf-American-Lines</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>20339820f43264ce1f218f2d4270d28075137d7e0ef9e9d3a71db5dbab59b836</i><br /><br />Threat actor <b>description</b>: <i>Headquartered in Berkeley Heights, New Jersey, Gulf American Line is a leader in freight forwarding, warehousing and logistics provider. The company occupies a leading position in terms of the volume of transported goods in the United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>constantinecannon.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10904</link>
<guid>bfc5f29ce3bf163d0c27ca8d9d17ec49</guid>
<pubDate>Wed, 20 Sep 2023 16:03:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>constantinecannon.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>13f9878823ef2fc21fc58c0a4eb232d637611aedcc86782c9144ade88439fb3f</i><br /><br />Threat actor <b>description</b>: <i>At Constantine Cannon, we are one law firm with two internationally renowned practices – antitrust and representing whistleblowers. We also excel at litigation, compliance, and intellectual property.Extracted SQL tables list and sample tablesht...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>compass-inc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10905</link>
<guid>3bc412ad4910c19f6710515540190792</guid>
<pubDate>Wed, 20 Sep 2023 16:01:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>compass-inc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c52b7b23164c205e12fe8a540ecc965bc4f06286fe2b6a7c0be977869e590a82</i><br /><br />Threat actor <b>description</b>: <i>Provider of health care consulting services based in Portland, Maine. The company's thorough and accurate analysis of health care costs, financial risk, regulatory issues, enable their clients to improve efficiency and save costs.File list and sa...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>bauscherhepp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10903</link>
<guid>b4337d69a5afc0c2ff74d7c95065edf3</guid>
<pubDate>Wed, 20 Sep 2023 15:41:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>bauscherhepp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5df53e4998a4b192893276e783a267ed6c0f081f01e3836e445db70a30ad657f</i><br /><br />Threat actor <b>description</b>: <i>BauscherHepp, Inc. distributes the BAUSCHER, HEPP, TAFELSTERN, WMF, and LUIGI BORMIOLI brands in USA. Additionally, BauscherHepp, Inc. distributes BAUSCHER, HEPP, and Luigi Bormioli in Canada.File list, SQL dump list and file sampleshttps://sha...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>hwwealth.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10902</link>
<guid>2ffe95614e083e7091c76b4c1e0c4f88</guid>
<pubDate>Wed, 20 Sep 2023 14:41:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hwwealth.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>791a9ce30a9d124f01dd0a170ba37d68810e28124fb00095a9505459dc2e4912</i><br /><br />Threat actor <b>description</b>: <i>HUTCHISON WHITEHEAD WEALTH MANAGEMENT IS A FEE-ONLY, FIDUCIARY REGISTERED INVESTMENT ADVISOR SEASONED SINCE 2004File list and sampleshttp://lockbitfile2tcudkcqqt2ve6btssyvqwlizbpv5vz337lslmhff2uad.onion/r/NyDGzUVwj_#o1sE8yi15Ct11XOCfOhp/J0dyA7B...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>ENTRUST-Solutions-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10899</link>
<guid>3f597e2d7a67b6520a585618d23e2d1b</guid>
<pubDate>Wed, 20 Sep 2023 14:31:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>ENTRUST-Solutions-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>76321c6c971f6e69ac7f5ff325f25b8311b1d9ea137e1b0cf193346ff75654c2</i><br /><br />Threat actor <b>description</b>: <i>ENTRUST Solutions Group is a community of people, 3,100+ strong, who are committed to our clients and each other. We are diverse, talented, dedicated, and wholly focused on not only meeting the needs...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Federal-Labor-Relations-Authority</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10900</link>
<guid>1a16abf2a3149fc7cd6083687cce01c2</guid>
<pubDate>Wed, 20 Sep 2023 14:31:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Federal-Labor-Relations-Authority</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0983d30eb25616099f58e63deb531c6a6d7cfa711d795c0a6094cc4edd5d6818</i><br /><br />Threat actor <b>description</b>: <i>The Federal Labor Relations Authority (FLRA) is an independent agency of the United States government that governs labor relations between the federal government and its employees.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Spuncast</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10898</link>
<guid>3bbca1d243b01b47c2bf42b29a8b265c</guid>
<pubDate>Wed, 20 Sep 2023 13:44:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>Spuncast</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3350657de20a8a930e594177876f2aa7e4f7ce019c6ad865c2a0ea659ad17602</i><br /><br />Threat actor <b>description</b>: <i>Spuncast, Inc was founded in 1976 and is headquartered in Watertown, Wisconsin. The company provides centrifugal castings and offers stainless steel tubing products, such as hydraulic cylinders.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bacon-Universal</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10897</link>
<guid>98785ca89cfbbe933921bfe68a94553b</guid>
<pubDate>Wed, 20 Sep 2023 12:50:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>Bacon-Universal</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff582b2a341af186e4444838683b1c6898c75c9940656cd33163f7c4179122cc</i><br /><br />Threat actor <b>description</b>: <i>Bacon Universal Company, Inc. has proudly served Hawaii's Construction Industry for more than 60 years.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>payrollselectservices.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10895</link>
<guid>ab38e9193c5e03752556a0a238ed5080</guid>
<pubDate>Wed, 20 Sep 2023 10:36:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>payrollselectservices.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e75b8f73eccca422dbd111b1d1749b1f73d07db6e74345b5e2d2c89486279e2</i><br /><br />Threat actor <b>description</b>: <i>We downloaded all the confidential data of their company, clients, employees, partners. Confidential data of every company they serve. This includes 180 clients, personal account logins and passwords, taxes, employees, SSN, bank details, etc.Info...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-University-of-Antigua</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10889</link>
<guid>cc0e1713aa0e2bcba6f5edf1436b81ef</guid>
<pubDate>Tue, 19 Sep 2023 17:37:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>American-University-of-Antigua</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f9d4e713a547dd891caf7dc83bf2c7a604689c1d919aa44812ead328277e208</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>CEFCO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10879</link>
<guid>86ef0ad0a49f303beba23d4e796fc50b</guid>
<pubDate>Mon, 18 Sep 2023 23:44:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>CEFCO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9016a1852ecad62bedf1024b5bf45848bc45aaf773bf754897994a385dcfbc1b</i><br /><br />Threat actor <b>description</b>: <i>We have been in the fuel business a long time – since 1952, in fact. During that time, we have learned more than a thing or two about gasoline and diesel fuel. Most importantly, we have learned the importance of delivering quality fuel at a</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Florida-Department-of-Veterans-Affairs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10881</link>
<guid>9ec1994bb176cb0b7a2cec414fe8ffb2</guid>
<pubDate>Mon, 18 Sep 2023 23:43:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Florida-Department-of-Veterans-Affairs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4222af4f5efc5be32eda47dd9dbfc3398de5dd13725aa234d1236352b32ea97a</i><br /><br />Threat actor <b>description</b>: <i>Watching over and advocating for our state’s veterans and their families are the more than 1,100 men and women of the Florida Department of Veterans’ Affairs.Florida has earned a reputation as the most veteran-friendly state in the nation. Our state’s veterans bring more than $18.4</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rea-Magnet-Wire</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10876</link>
<guid>f64c495d0e53078162a5d6c862f12aae</guid>
<pubDate>Mon, 18 Sep 2023 20:46:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Rea-Magnet-Wire</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b67eed58140f995373be3fc80e76cc7438901b55042d8f1fb4e0a8a12c53ab3</i><br /><br />Threat actor <b>description</b>: <i>Indiana, United States</i><br />Target victim <b>website</b>: <i>www.reawire.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>RTA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10877</link>
<guid>8571ddcc1c64ca1fa11891d899cab05d</guid>
<pubDate>Mon, 18 Sep 2023 20:45:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>RTA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d2c81f377581e46d880dd7880d602d077b604747280e4c78ca4e02ac6a20376</i><br /><br />Threat actor <b>description</b>: <i>Arizona, United States</i><br />Target victim <b>website</b>: <i>www.rtafleet.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>TSC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10878</link>
<guid>c33b41e89e420a81275220cbe2cf603c</guid>
<pubDate>Mon, 18 Sep 2023 20:45:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>TSC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>76a87566c9eeceda0ae2802b9969d48eb979063b84aa48d64d0bf91284b98f79</i><br /><br />Threat actor <b>description</b>: <i>Texas, United States</i><br />Target victim <b>website</b>: <i>www.t-s-c.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Elemetal</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10873</link>
<guid>2d1bcedd27b586d2a9562a0f8e076b41</guid>
<pubDate>Mon, 18 Sep 2023 20:35:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Elemetal</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>14c397c1dbd31deb24e5f24f82e55a879938b9bcee8f17e9329c5d1fa86cd068</i><br /><br />Threat actor <b>description</b>: <i>Elemetal is one of the largest precious metals refiner. They are laundering money for drug cartel and can't find a small amount to prevent data leak. Cost of their privacy is $160.000. 600GB of...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Glovis-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10872</link>
<guid>63e8e3643e7f7198858eef325b0600f9</guid>
<pubDate>Mon, 18 Sep 2023 20:34:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Glovis-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6ab7832d4871bc8659021cf25bb211f6c7fe14a9e5826fa853cc66ddebfffd8</i><br /><br />Threat actor <b>description</b>: <i>The company offers technical jobs, human resources support roles,safety supervisors and managers, or strategic management and leadership positions. 10 GB of data will be available for downloading here soon. Some projects info, personal employee documents, financial and accounting papers. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fuji-Seal-International-US-branch</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10870</link>
<guid>fb9d433088a21464e7d634c4e190b31a</guid>
<pubDate>Mon, 18 Sep 2023 17:33:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Fuji-Seal-International-US-branch</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4298fa4cf3821013a8432ddb43b6e997ff4dbf59663c0b3fe43ce655b268113b</i><br /><br />Threat actor <b>description</b>: <i>Fuji Seal Group provides shrink sleeve labels, self-adhesive labels, spouted pouches and label-application systems. The US branch of the company has been recently breached and the management refuses to negotiate. So we are informing you about the upcoming uploading of 30GB size data here. There are numerous confidential docs, contracts, agreements etc. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>cucs.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10865</link>
<guid>4d171e8c3b2ef70c7afb02614b99e632</guid>
<pubDate>Mon, 18 Sep 2023 10:39:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>cucs.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3472927cf15fc6b58b50208d9b6da880f641ea3b72b454560b1584d416653d71</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dustin-J-Will-LCC--Dustin-J-Will-Sole-MBR</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10863</link>
<guid>ee88c0f86505bcab820bb84ad06e895e</guid>
<pubDate>Mon, 18 Sep 2023 10:07:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>knight</b> claims attack for <b>Dustin-J-Will-LCC--Dustin-J-Will-Sole-MBR</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ebb0a9aadcf26ad305f65d97594ffaa8d57c37a561b294a3150fe4b3122db6b</i><br /><br />Threat actor <b>description</b>: <i>Dustin J Will LCC / Dustin J Will Sole MBR 47-49497xx Wealth Strategies and Employee Benefit Advisors  Dustin Will is a Financial Representative of Benefit Management INC and individual financial …</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>knight</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lopez--Associates-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10864</link>
<guid>e7364a5abd2a860cf8e33b114369b92b</guid>
<pubDate>Mon, 18 Sep 2023 10:05:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>knight</b> claims attack for <b>Lopez--Associates-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7244e8e3b92940a3902195b89c191bf9285d018038113888ed05d45bc703131d</i><br /><br />Threat actor <b>description</b>: <i>Lopez & Associates Inc. photocopy service remains one of California's leaders  in the photocopy service industry. Our company has positioned itself to respond to the industry's need for immediate and…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>knight</category>
</item>
<item xmlns:dc='ns:1'>
<title>perfectlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10852</link>
<guid>2a93f39020f6d31d33f81a191b048cb1</guid>
<pubDate>Sat, 16 Sep 2023 13:11:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>perfectlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>86e7fe25c0da60ab0c4f3064fae1ca9f5036ab0a0f172882f49b9f7fbbcb9f7a</i><br /><br />Threat actor <b>description</b>: <i>PerfectLaw® is the most function- and feature-rich legal software that uses a single All-in-One® database for all law office applications. This means you enter your data once and it is immediately available to everyone and every application, subject...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>beamconstruction.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10853</link>
<guid>9c36b930df0e0e8b05d4e1fcb4cdef27</guid>
<pubDate>Sat, 16 Sep 2023 13:11:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>beamconstruction.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b0c212bf67370022a3ea181bdf189cffa6df55dde56cf034b037fbfb6b6313d0</i><br /><br />Threat actor <b>description</b>: <i>Construction company.187GB- Financial reports, payment journal, bank statements, tax forms, various accounting documentation- Lists of employees with confidential data (ssn numbers, residential addresses, date of birth, contracts, FMLA forms, s...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>scottpartners.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10854</link>
<guid>03201ae30e1239054512737f608b91cf</guid>
<pubDate>Sat, 16 Sep 2023 13:10:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>scottpartners.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6cd112a836333c0896c66751328711ffc318e498567544371d1cdb1c0eb5429b</i><br /><br />Threat actor <b>description</b>: <i>Scott + PartnersHospitality · Vermont, United States ·</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>faithfamilyacademy.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10844</link>
<guid>9697361bd81c04fb4ea891d63104a5a3</guid>
<pubDate>Sat, 16 Sep 2023 13:08:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>faithfamilyacademy.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>35554b1a225f09d32866ef0e71472137a2611c6a1c36edba47d5ea9f48ac9ff3</i><br /><br />Threat actor <b>description</b>: <i>Oak Cliff Faith Family Academy is an charter elementary/secondary school in Dallas, TX, in the Waxahachie Faith Family Academy school district. As of the 2021-2022 school year, it had 2,325 students.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>commercialfluidpower.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10838</link>
<guid>157792e4abb490f99dbd738483e0d2d4</guid>
<pubDate>Sat, 16 Sep 2023 13:04:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>commercialfluidpower.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87736813bae2759f43949addf6dcb804626923e445dac18266006b9c28d6fa73</i><br /><br />Threat actor <b>description</b>: <i>Commercial Fluid Power is a one stop shop for your fluid power needs. We carry a complete line of materials and offer extensive honing and machining capabilities. And with plants in Dover & North Canton, Ohio as well as Rome, Georgia, we are convenie...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Financial-Decisions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10835</link>
<guid>8c12cbc89eb07068855968f976662a18</guid>
<pubDate>Sat, 16 Sep 2023 08:38:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Financial-Decisions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a2609884c51c229f9e4c6fc3e5e4a71104083ad795df1ce36a40599e0fd5639d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>pelicanwoodcliff.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10824</link>
<guid>ab1991b977dbb108c0a36a3475d0bc48</guid>
<pubDate>Fri, 15 Sep 2023 10:38:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>pelicanwoodcliff.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>caff9fd43b0716188013a81264b6561575ad37948bdbe25082bdaeff5197fd23</i><br /><br />Threat actor <b>description</b>: <i>Welcome to Pelican Woodcliff. We are an independent multi-disciplinary real estate advisory and cost consulting firm. It is our goal to envision, evaluate and excel in order to maximize the success of our clients projects. We enhance the chances of a...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>hillsboroughschools.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10823</link>
<guid>1f47cef5e38c952f94c5d61726027439</guid>
<pubDate>Fri, 15 Sep 2023 08:38:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hillsboroughschools.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>133839c7ad133fe1f7a1d475089f783e57c62c161219b46f4a5cdfdd061cfac5</i><br /><br />Threat actor <b>description</b>: <i>250+ Affected Schools. Hillsborough County Public Schools is a school district that runs the public school system of Hillsborough County in west central Florida and is headquartered in Tampa, Florida. It is frequently referred to as the School Distri...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>hollandspecial</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10822</link>
<guid>c940e50f90b9e73f42045c05d49c6e17</guid>
<pubDate>Fri, 15 Sep 2023 07:36:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>hollandspecial</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e5a3e48527e033ac4cff23b0ffaa5125e59ba6cb06c3fe3eda7d6f9db0654d1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>visitingphysiciansnetwork.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10819</link>
<guid>7366b7a89fc9d6c90e308d633d63884f</guid>
<pubDate>Thu, 14 Sep 2023 21:31:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>visitingphysiciansnetwork.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e993263a36ac07bcbde6f6dbced648a58e72242fae3cf79f0f93ad496dc596d3</i><br /><br />Threat actor <b>description</b>: <i>We are a North Texas based physician group committed to making healthcare more accessible for those individuals who are unable or have difficulty leaving their home to receive medical treatment. Visiting Physician's Network...</i><br />Target victim <b>website</b>: <i>visitingphysiciansnetwork.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>pvbfabs.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10815</link>
<guid>ec0387f057705a013c09bc5508249ea7</guid>
<pubDate>Thu, 14 Sep 2023 21:27:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>pvbfabs.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ddb2de6d63a38e5737e68d108d9840ace462a8f5155da031c2e21f0cd940c72f</i><br /><br />Threat actor <b>description</b>: <i>Since 2003, PVB Fabrications, Inc. (PVB) has provided quality welding and fabrication services while steadily developing into a direct-hire, multi-disciplined general contractor. PVB has the technical ability to...</i><br />Target victim <b>website</b>: <i>pvbfabs.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>intechims.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10816</link>
<guid>69ddb50142a89123ba6f870ab07e6fbb</guid>
<pubDate>Thu, 14 Sep 2023 21:26:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>intechims.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>948a77c7e1fee735a8f1330d214cf277ddb8a59e46f9adb2409eeb87c78db23c</i><br /><br />Threat actor <b>description</b>: <i>Specializing in Beverage Re-Packing and Fulfillment for just about anything Start increasing your production with our fully automated variety packaging services. We have the bandwidth to quickly...</i><br />Target victim <b>website</b>: <i>intechims.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>zero-pointorganics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10817</link>
<guid>dac4a67bdc4a800113b0f1ad67ed696f</guid>
<pubDate>Thu, 14 Sep 2023 21:26:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>zero-pointorganics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77d59936c956b871093f35335dbd8603790f355247e7c6672fc49d41dcbf1544</i><br /><br />Threat actor <b>description</b>: <i>What started out as a hobby in the kitchen summer of 2016 turned into a full time passion for growing nutrient dense foods. We’re now partnered with restaurants, hotels, and country clubs throughout the Houston and College Station/Bryan Texas...</i><br />Target victim <b>website</b>: <i>zero-pointorganics.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>clearwaterlandscape.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10818</link>
<guid>fb6e7c396949fea1f6f6bf144dbc7908</guid>
<pubDate>Thu, 14 Sep 2023 21:25:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>clearwaterlandscape.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>16c6cd4525e25cd8eb0a3beb4881bdfed53ade9715ea639aa1a71beb359ad12d</i><br /><br />Threat actor <b>description</b>: <i>Since 1989, Clearwater Landscape & Nursery has been a renowned leader in luxury landscaping and outdoor-living space construction throughout our region. We are proud to serve homeowners, developers...</i><br />Target victim <b>website</b>: <i>clearwaterlandscape.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>Statement-on-MGM-Resorts-International-Setting-the-record-straight</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10813</link>
<guid>d9b64cee05c46d31b10b9869a3198a6d</guid>
<pubDate>Thu, 14 Sep 2023 20:39:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Statement-on-MGM-Resorts-International-Setting-the-record-straight</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0cb777566b913c9451f7a4aafa92c6e950b0c83078d1cef3149288cf7fc05623</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Steel--Aluminum</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10809</link>
<guid>37f20a73a8c5b03607f9532b2a9c6396</guid>
<pubDate>Thu, 14 Sep 2023 17:34:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>American-Steel--Aluminum</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>28c2e0da97fee7f3838b6a978f6479fbbed2e202370c7f956cc9620b7328530d</i><br /><br />Threat actor <b>description</b>: <i>American Steel & Aluminum Co., Inc. was founded in 1967 with 3 employees, a small fabrication shop, and some big dreams for the future. Today they have 70 employees and 70Gb of data that will be uploaded here. There is much project information and financial docs. Employee information is also will be available. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ja-Quith-Press-Release</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10802</link>
<guid>de9d96171258bf940fc7b77c09b1cde4</guid>
<pubDate>Thu, 14 Sep 2023 14:40:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Ja-Quith-Press-Release</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>626ad2a8b53d98390c8b62068ed4a0ad28e654f2ebda36bbba9129067811eff3</i><br /><br />Threat actor <b>description</b>: <i>Jaquith Industries three main specialties - Airport Lighting - BMF Metal Forms - Custom Contract Fabrication are manufactured here in the USA.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>East-Baking-Press-Release</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10801</link>
<guid>a3ce63a7a8521c37a513db67129855a8</guid>
<pubDate>Thu, 14 Sep 2023 13:47:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>East-Baking-Press-Release</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b497cb62b9a78f1489bac3e963a3140299d53cdfb6137d9a9422bc075a55b7b</i><br /><br />Threat actor <b>description</b>: <i>East Baking Company Inc. has the ability to manufacture any private label bakery program from bagels, breads, rolls, pancakes, and sweet goods to a very specific customized bakery products.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>carthagehospital.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10800</link>
<guid>d299a92004734135de74355770b7c785</guid>
<pubDate>Thu, 14 Sep 2023 11:34:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>carthagehospital.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7bc624c7d4f29d4edab840469efb8f01829293e760214f143ba63b5d1276e925</i><br /><br />Threat actor <b>description</b>: <i>Claxton-Hepburn Medical Center is a private, not-for-profit, 127-bed community hospital and regional referral center. Claxton-Hepburn includes 67 acute-care beds, a 10-bed intensive care unit, a 10-bed birthing center, a 28-bed acute adult mental hea...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>clearcreek.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10795</link>
<guid>b600b000f151513b54a08ff4c246a62b</guid>
<pubDate>Wed, 13 Sep 2023 19:36:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>clearcreek.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63668ef2abcae5358277ca8489d78726d638eab02e0dff2b49bfd8d6e023a052</i><br /><br />Threat actor <b>description</b>: <i>There are some things that make Clear Creek who we are. We find our root in the Bible but we stay on mission in our modern world by remembering and focusing on five primary values: Gospel Centrality, Biblical Community, Missional Living, Relentless S...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Benefit-Management-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10790</link>
<guid>4e77c1b05bf7e361197a5adb20faa212</guid>
<pubDate>Wed, 13 Sep 2023 07:39:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>knight</b> claims attack for <b>Benefit-Management-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3768f947bc1b4c809b8be4bbe83a881439dcef93942872a10cacd056a7d47893</i><br /><br />Threat actor <b>description</b>: <i>Before start running the encryption to your servers and computers ,  we upload your backups and delete from the backups from iDrive.  We have collected more sensitive information from your all comp…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>knight</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dpc--S</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10788</link>
<guid>5fb118206fd781294cdfddc3e7544633</guid>
<pubDate>Wed, 13 Sep 2023 04:22:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Dpc--S</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db337eae8965eeb26eee97c43caea2fef2598ed08e608440eb2d3da7bf8acb56</i><br /><br />Threat actor <b>description</b>: <i>Arizona, United States</i><br />Target victim <b>website</b>: <i>www.dpconsulting.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Accuride</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10785</link>
<guid>92316afaebe71e3e55c62c02659c6d5d</guid>
<pubDate>Tue, 12 Sep 2023 23:29:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Accuride</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bcaf91d6b3e73113b8bb8f1635ad822a377ed15dbedc4178bb0b70a7a58a5140</i><br /><br />Threat actor <b>description</b>: <i>Accuride, founded in 1986 and headquartered in Evansville, Indiana, manufactures and supplies vehicle components. Almost terabyte of files will be available for you. Of course there will be many interesting ones. For instance, engineering drawings and photo for TESLA, Mirelli and other sound names. Besides that many confidential documents, personal information of employees with private photo and docs, medical information etc. And finally there is muchinfo about clients and their orders and projects with detailed description (drawings, 3D models). Should I note tons of financialand accounting information? Wait for the release.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>SAC-Finance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10784</link>
<guid>9b972ab65a176d0a3aabf71ea0c01ffc</guid>
<pubDate>Tue, 12 Sep 2023 21:36:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>SAC-Finance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>59b5c61899db101e283d2273a85cc04c6744b8a3d9d075b20cca5e77096df635</i><br /><br />Threat actor <b>description</b>: <i>SAC Finance  as one of the largest, privately-held automotive retailers in the United States, we are a notable name that you can trust...</i><br />Target victim <b>website</b>: <i>https://www.sacfinance.com/</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Morgan-Smith-Industries-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10782</link>
<guid>bc9d03fca6bcbe7f8b591f9d2bf8497a</guid>
<pubDate>Tue, 12 Sep 2023 19:05:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>knight</b> claims attack for <b>Morgan-Smith-Industries-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6f80c7caec4bd1712995ff3428a310294884f327bcb573b952cc2337160b887</i><br /><br />Threat actor <b>description</b>: <i>We are a premier, custom Architectural Millwork, Casework, and Contract Furniture manufacturer located in South Central Kentucky. Using cutting edge technologies, machinery, and methods, our Project …</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>knight</category>
</item>
<item xmlns:dc='ns:1'>
<title>BFS-Civil-Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10777</link>
<guid>94cdbdb84e8e1de8a725fa2ed61498a4</guid>
<pubDate>Tue, 12 Sep 2023 14:39:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lorenz</b> claims attack for <b>BFS-Civil-Engineers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e1ecb76e428cd79f698c45c3a3abec8787b8929b523e3b9e4eb2d6ceabfc50c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.BF&S Civil Engineers</i>]]></description>
<category>lorenz</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dee-Sign</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10778</link>
<guid>32e54441e6382a7fbacbbbaf3c450059</guid>
<pubDate>Tue, 12 Sep 2023 14:39:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lorenz</b> claims attack for <b>Dee-Sign</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56bc00838ea88ffceeaae20a3158124983c1400d3eb504339731dd545f19aaa6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.Dee Sign</i>]]></description>
<category>lorenz</category>
</item>
<item xmlns:dc='ns:1'>
<title>CORTEL-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10773</link>
<guid>ea89621bee7c88b2c5be6681c8ef4906</guid>
<pubDate>Tue, 12 Sep 2023 02:37:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>CORTEL-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>006cb8ce8502a64cd1af34a7d60205ff51f08c4a7cb5caff99bcde30782686c8</i><br /><br />Threat actor <b>description</b>: <i>Cortel is a cloud technology vendor that partners with businesses to deploy phone systems that connect customers to businesses.  Below you can see a small part of the data which were taken from the servers of this company.</i><br />Target victim <b>website</b>: <i>cortel.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>deeroaks.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10764</link>
<guid>2f46b9c859dfc08b8cdeb961418d126d</guid>
<pubDate>Mon, 11 Sep 2023 18:47:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>deeroaks.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7a71e5c60297e20d44ea5a673758af9e839e305280dac1cedfb61df0b5560ee</i><br /><br />Threat actor <b>description</b>: <i>REVENUE about of 30kkDeer Oaks is a full-service behavioral health organization. It offers a comprehensive employee assistance program, geropsychology services, psychiatric medication, management services, and telemedicine services. The company w...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wardlaw-Claims-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10761</link>
<guid>44c74289986156fe463934320cf9444e</guid>
<pubDate>Mon, 11 Sep 2023 15:56:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>Wardlaw-Claims-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a02569a1ef2d35a4eff3acbcb7e34b065effab439eb7780a5d1542d7f3c78867</i><br /><br />Threat actor <b>description</b>: <i>Wardlaw Claims Service is an industry-leading claims management and risk solutions firm founded in 1965. Today, we remain one of the largest privately held IA firms in the industry. No large conglomerates here! Our clients experience personalized services tailored to the nature of their risk management needs. Our services range from Daily & Catastrophe Field Adjusting in Residential and Commercial Property to Desk Adjusting, Auto Appraisal, Casualty & Liability, Emergency Services Invoice Reviews and more. We use industry leading claims technology to best serve our clients and their policyholders with INTEGRITY, ACCURACY & EXCELLENCE.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>I-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10762</link>
<guid>085ebbec4e5bc8d8f79481dbf896267a</guid>
<pubDate>Mon, 11 Sep 2023 15:55:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>I-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da43f7fd2a1f2aca3eb7b7fe7b397f51a40cd03c8e5c1c6e88e2e11538982963</i><br /><br />Threat actor <b>description</b>: <i>Test & Measurement Equipment, Manufacturing.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>-e-e-e</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10763</link>
<guid>21780a686b0ad3b45a6929f284dfd571</guid>
<pubDate>Mon, 11 Sep 2023 15:55:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>-e-e-e</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff9adedcdd515913d63dc9cf32806eabfe9e79c564dcf14cdf85548b644d2de2</i><br /><br />Threat actor <b>description</b>: <i>The world's leading nonprofit organisation, employing around 25,000 staff and operating in 116 countries.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cmranallolaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10759</link>
<guid>4564e13a85364d6743e38059a8544f34</guid>
<pubDate>Mon, 11 Sep 2023 15:43:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Cmranallolaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>67c57926f16eab6e220cdca7f659c8206afeb33bdd3f5c8d265be43e07699a64</i><br /><br />Threat actor <b>description</b>: <i>-Confidential data of a law firm-Tax forms, dl, ssn etc.-Contracts-Personal data of clients-Financial documents-Internal correspondence and emails To fully delete these files, company representatives must contact by September 15, 2023.Otherwise, all this data will be published here and other forums,in the same way, the company’s customers will be notified and receive copies of their files</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Levine-Bagade-Han</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10754</link>
<guid>0d924f0e6b3fd0d91074c22727a53966</guid>
<pubDate>Mon, 11 Sep 2023 14:35:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>Levine-Bagade-Han</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>09a6862a4669f289e7d275be94c8dc307dbe1827a0b86661c75f310cce4991ba</i><br /><br />Threat actor <b>description</b>: <i>Levine Bagade Han LLP is an intellectual property law practice in Palo Alto, CA. We work closely with fast-moving clients who care about their intellectual property. Though we have experience in other areas, we focus on IP. Strategy, invention disclosure management, patent prosecution, portfolio management, due diligence (client and investor based), licensing, litigation strategy… We help you with IP strategy that matches your company's business objectives. We use our experience to guide clients through IP mazes and minefields. At our core, we strive to create a client-centered practice that is unique to the intellectual property legal field.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>I-l-Ltd.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10753</link>
<guid>761213bcd999998a5b22d22b13db075f</guid>
<pubDate>Mon, 11 Sep 2023 13:41:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>I-l-Ltd.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>621347e1e54f279f55fe41c63df6ae1b30d34c6f44402859d224ef4e6b4e80bc</i><br /><br />Threat actor <b>description</b>: <i>The manufacturing company that offers transport incubators, such as infant, air and ground, nitric oxide and high-frequency ventilation.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wave-Hill</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10749</link>
<guid>69bfa2aa2b7b139ff581a806abf0a886</guid>
<pubDate>Mon, 11 Sep 2023 10:10:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Wave-Hill</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9560ac2e0e3257a180d2ef6bae606abd07cd20b24ea6dab9e2ae4e472a81a924</i><br /><br />Threat actor <b>description</b>: <i>Wave Hill is a community garden and cultural center located in New York City. The company's head office is located at 675 W 252nd St, Bronx, New York, 10471, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>co.grant.mn.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10747</link>
<guid>244143829010ed3436bb57d2b5eed048</guid>
<pubDate>Mon, 11 Sep 2023 08:43:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>co.grant.mn.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cbdbb914485f367dc4b2d185adcc230dc27a3a8f315c306de599a8691c70b285</i><br /><br />Threat actor <b>description</b>: <i>The City of Grant is located on the eastern fringe of the Twin Cities' urban core area within west central Washington County.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-Venture-Escrow</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10745</link>
<guid>08525774e9cc6cc7577ed9be1f01a185</guid>
<pubDate>Sun, 10 Sep 2023 20:46:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>New-Venture-Escrow</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c09663f4a9b7f89319ca4b79e5d5ccfbdde6cf45d5dbaa86e2b00d4f6ee34556</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2011, New Venture Escrow formerly known as American Major Escrow creates an escrow process for California real estate agents, their buyers, and their sellers. The company is based in San Diego, CA.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>BOZOVICH-TIMBER-PRODUCTS-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10744</link>
<guid>2ff1bae67446353d609918975ef1d0e4</guid>
<pubDate>Sun, 10 Sep 2023 10:41:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>mallox</b> claims attack for <b>BOZOVICH-TIMBER-PRODUCTS-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2abf0921a1f05c9980cb30c27a32e6b8e1c3cc87a5e3e15b037a8d6bad4be61e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>mallox</category>
</item>
<item xmlns:dc='ns:1'>
<title>njsba.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10743</link>
<guid>c9f06258da6455f5bf50c5b9260efeff</guid>
<pubDate>Sun, 10 Sep 2023 08:45:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>njsba.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ab94a5445bdfa9cea9039ebf1437299e6b4e883ddcdcba1bd0743efb05b5771</i><br /><br />Threat actor <b>description</b>: <i>NJSBA , 529Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>Singing-River-Health-System</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10741</link>
<guid>f7a124943b6aa6654d787f07eee84d2c</guid>
<pubDate>Sun, 10 Sep 2023 05:37:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Singing-River-Health-System</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b43e560eeb14eb3d4dbdd105333583a086eeacb3c8aae6810c5b3dce0b80ccd</i><br /><br />Threat actor <b>description</b>: <i>Singing River Health System Singing River Health System is both a mission-driven provider of health services and one of the largest employers on the Mississippi Gulf Coast.</i><br />Target victim <b>website</b>: <i>https://www.singingriverhealthsystem.com/</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kirby-Risk</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10740</link>
<guid>f75ce735a80f6ac091aea546866fb4bb</guid>
<pubDate>Sat, 09 Sep 2023 18:39:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Kirby-Risk</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>17bb66984313d3c1435d7f0007ee0dc943356782adf4cfd20d0bb94aa36c0f26</i><br /><br />Threat actor <b>description</b>: <i>Since 1926, Kirby Risk has remained committed to the concept of sacrificial service by going above and beyond what it takes to provide you with the right products and services at the right time, to the right place, at the right cost—working hard every day to MAKE IT HAPPEN!Today, Kirby Risk is still known by our customers as a dependable resource dedicated to solving their problems with the more than 40 locations throughout Indiana, Illinois, Ohio and Georgia. Our skilled and experienced team members are available around the clock to meet your electrical product and service needs. We represent over 2,000 manufacturers and carry more than 90,000 top-quality products.</i><br />Target victim <b>website</b>: <i>https://www.kirbyrisk.com/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.northriverco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10674</link>
<guid>85ffb002f52455e760e4c90cc3b71ac3</guid>
<pubDate>Fri, 08 Sep 2023 23:35:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>www.northriverco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>714ae81a58235d8485daec21780c534155190d94045bda975268bef3e98daa34</i><br /><br />Threat actor <b>description</b>: <i>North River Co LLC, 303Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>sd69.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10672</link>
<guid>5470abe68052c72afb19be45bb418d02</guid>
<pubDate>Fri, 08 Sep 2023 20:31:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>sd69.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>627a03ab2be93cf8c4632d5c6f7bf04855f84776df7ada796cc81bc6d509ac1c</i><br /><br />Threat actor <b>description</b>: <i>In partnership with families and our community, District 69 supports every child's development within an environment of belonging.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>milbermakris.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10670</link>
<guid>5631e6ee59a4175cd06c305840562ff3</guid>
<pubDate>Fri, 08 Sep 2023 17:38:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>milbermakris.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>587bac642cbddb50c96c8549493837b8f3d96494bc6a697ae0e7eb2258262ae0</i><br /><br />Threat actor <b>description</b>: <i>Milber Makris Plousadis & Seiden, LLP is a full-service civil litigation defense firm and business partner to the insurance industry</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Geo-Tek</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10668</link>
<guid>32609807394d8cca2b23a6d9a75ccedd</guid>
<pubDate>Fri, 08 Sep 2023 14:35:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>Geo-Tek</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06fb2f63c49f7e69682bdac739259c3604c46514a843118579f729d4a9291707</i><br /><br />Threat actor <b>description</b>: <i>Incorporated in 1997, GeoTek is a full service consulting engineering firm specializing in geotechnical engineering, construction materials testing, special inspections, and environmental consulting. GeoTek is founded on the principal of providing strong business partnerships with clients by demonstrating a committed passion for those who demand technical advice and responsive customer service that adds value to the client's project.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Custom-Powder-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10666</link>
<guid>10ce75ac40fc149330ea64671feda328</guid>
<pubDate>Fri, 08 Sep 2023 13:07:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>Custom-Powder-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8095def9667b4df5c26af989dcc74a7b575f9d0c0a4edae0edc491d4e6513c5a</i><br /><br />Threat actor <b>description</b>: <i>Custom Powder Systems is actually a containment company, so as a containment company, we offer many different solutions for customers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>JSS-Almonds</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10667</link>
<guid>2e7fc7cb9bf8baacf29f1b7286976f53</guid>
<pubDate>Fri, 08 Sep 2023 13:07:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>JSS-Almonds</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f3ae28711b333d0b534bdf181f08fae9d0bdc0f034408870811189f85945a20</i><br /><br />Threat actor <b>description</b>: <i>JSS Almonds is a grower and processor of whole and natural California Almonds. Our facility specializes in shelled and inshell almonds. JSS Almonds serves over 15000 acres and specializes in natural, whole, and brown skin almond processing.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>BRiC-Partnership</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10664</link>
<guid>40c0cefb6fc4c2f2892648f76473bbda</guid>
<pubDate>Fri, 08 Sep 2023 11:37:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>BRiC-Partnership</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34ef7a4a474f28a528506a95656133e00a6057d5fc6ff83783f8537c6f39cd7c</i><br /><br />Threat actor <b>description</b>: <i>BRiC is a consulting engineering firm with offices located in Belleville, Illinois; Evansville, Indiana; Springfield, Illinois; and Kirkwood, Missouri. While the four principals have been providing engineering services since the 1980's, BRiC Partnership was formed in 2002.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>WACOAL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10662</link>
<guid>01b7575c38dac42f3cfb7d500438b875</guid>
<pubDate>Fri, 08 Sep 2023 10:11:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>WACOAL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd2fe373f2b58782961449d412653d6cc88025356dd0f03441cd397f9246726e</i><br /><br />Threat actor <b>description</b>: <i>Wacoal America is an apparel & fashion company specializing in lingerie and intimate wear.  In the near future, we will publish a large leak from the network of this company. Including all customer data.</i><br />Target victim <b>website</b>: <i>wacoal-america.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>247-Express-Logistics-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10659</link>
<guid>f2b4053221961416d47d497814a8064f</guid>
<pubDate>Thu, 07 Sep 2023 22:16:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ragroup</b> claims attack for <b>247-Express-Logistics-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7fb6872472c213bca8f3c332a4ef0fef23704f15283cbe723d793abe1ef2639</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ragroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>FOCUS-Business-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10657</link>
<guid>687cb95f9d89142b67e41ab640c0a002</guid>
<pubDate>Thu, 07 Sep 2023 22:07:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>FOCUS-Business-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34f0a73d474cbcb733a59560031ccf1da8a053e474146307a83e4f4f5f389460</i><br /><br />Threat actor <b>description</b>: <i>FOCUS was founded in 1998 with the simple vision of delivering great cost savings and compliance services to importers and exporters at a fair price. Clients engage us to manage their compliance and duty savings programs within their limited budgets. Being highly responsive and flexible to meet the unique business and compliance needs of each of our clients is why clients have stayed with us for 25 years. We deliver the highest quality customs management and compliance services to our clients.</i><br />Target victim <b>website</b>: <i>https://focus-solutions.net/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chambersburg-Area-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10658</link>
<guid>6811f9b2bf86bf64e3f320973119b959</guid>
<pubDate>Thu, 07 Sep 2023 22:07:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Chambersburg-Area-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6cc7bcdb300b22ea681ad690a2ca832da780093cb8b995a2d9370a3361f59476</i><br /><br />Threat actor <b>description</b>: <i>The Chambersburg Area School District covers 250 square miles in Franklin County, Pennsylvania, near the center of the Cumberland Valley. More than 61,000 people live in the district, which is composed of the Borough of Chambersburg, Greene, Hamilton, Letterkenny, and Lurgan townships, and most of Guilford Township. The Chambersburg Area School District has a rich and important history. We are fortunate to have almost 10,000 students of many different backgrounds and nations of origin. Just in the past several years, our English Language Learners have increased from approximately 500 to 1000 students or 10% of our student population.</i><br />Target victim <b>website</b>: <i>https://www.casdonline.org/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>toua.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10655</link>
<guid>a70101b271810b66fdc35a5d4ff5e058</guid>
<pubDate>Thu, 07 Sep 2023 20:32:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>toua.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30f9ea3af9992cd42009c63f136f0bc233b26db0e766d218cefc76d649aeb4fd</i><br /><br />Threat actor <b>description</b>: <i>Provides electricity, water, communication and internet services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>K--</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10651</link>
<guid>7476533956dd3568c1d787c5d33a547f</guid>
<pubDate>Thu, 07 Sep 2023 13:01:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>K--</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5735dc936ea7349eff55d458b4723d068db7a92ee6f352f6040d092ff821c7ea</i><br /><br />Threat actor <b>description</b>: <i>Landscape Services organisation USA.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>TORMAX-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10648</link>
<guid>b59f635e9f984164bf71aa36a8dd265e</guid>
<pubDate>Thu, 07 Sep 2023 11:30:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>TORMAX-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>198345e543369f7049099c3a5ac48094c088dbeb83f9cd55be86b5c133409fca</i><br /><br />Threat actor <b>description</b>: <i>TORMAX USA Inc. is committed to providing exceptional services with highly qualified technical advisers and service technicians on automatic door systems since 1997.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>West-Craft-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10649</link>
<guid>b93f552915e01e40fb9b66d6fd114f7b</guid>
<pubDate>Thu, 07 Sep 2023 11:30:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>West-Craft-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48c8ca30d1440f7dcb3fac889c4e74c1d8f081e1eec81d07de21eb1d349db656</i><br /><br />Threat actor <b>description</b>: <i>West Craft Manufacturing Inc. is an industry leader in the production of custom hydraulic cylinders and pneumatic cylinders for a diverse range of industries. We are specialized in designing and manufacturing custom hydraulic cylinders as per your specifications.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trimaran-Capital-Partners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10650</link>
<guid>3a5f9129110203548b21c0e40e9cd7af</guid>
<pubDate>Thu, 07 Sep 2023 11:30:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>Trimaran-Capital-Partners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6cca61c21c76d4d759b4415550cbd9b1858e031827369eba57c9ef26da8a313</i><br /><br />Threat actor <b>description</b>: <i>Led by Managing Partners Jay R. Bloom and Dean C. Kehler and Managing Director Michael G. Maselli, Trimaran Capital Partners ("Trimaran") is a private New York-based investment firm based in New York founded in 1998.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>nobleweb.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10641</link>
<guid>c95d62c68196b2d0c1c1de8c7eeb6d50</guid>
<pubDate>Wed, 06 Sep 2023 23:33:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>nobleweb.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>698a303baaa9969b37f3c964ce568565726d41fe7c5a31c57d9bc3cae9544f7c</i><br /><br />Threat actor <b>description</b>: <i>Since 1992, The Noble Group has built a dedicated team of professionals all working together to revitalize neighborhoods, provide new homes for families and build a better future for our investors.260GBlists with ssn numbers, residential addresse...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>I-Keating-Furniture-World</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10640</link>
<guid>2cb274e6ce940f47beb8011d8ecb1462</guid>
<pubDate>Wed, 06 Sep 2023 22:05:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>I-Keating-Furniture-World</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d7c64dcbaf4519733381e5cad61c016fe2c83fe1d991631a2860a5d22a1415aa</i><br /><br />Threat actor <b>description</b>: <i>I. Keating Furniture World is a family owned Furniture & Mattresses store located in Minot, ND.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>gormanusa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10639</link>
<guid>861f8aa2598860c0023f399e992eb747</guid>
<pubDate>Wed, 06 Sep 2023 22:02:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>gormanusa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4282b8a09ee0168e182d51e78bcf8c96424fec078d0d8c9090453a8787dfb980</i><br /><br />Threat actor <b>description</b>: <i>Gorman & Company was founded in 1984. They work closely with local governments and community groups to help communities meet their development, planning, economic and social goals.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>It4-Solutions-Robras</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10635</link>
<guid>184cb48a11bd10712686ebd5611812af</guid>
<pubDate>Wed, 06 Sep 2023 20:31:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>It4-Solutions-Robras</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>71c7665483bfde50fd633c6e345a304d3a28ab6553de47fe9b2060c9622d625f</i><br /><br />Threat actor <b>description</b>: <i>It4 Solutions Robras Corp is a company that operates in the Information Technology and Services industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Smead</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10636</link>
<guid>02d35f682ff59f1acc13065dec46fe25</guid>
<pubDate>Wed, 06 Sep 2023 20:30:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Smead</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c515b383f9ac2a6797e26c40be8394e8aab02d01eb6b81fcc3f43e5245714713</i><br /><br />Threat actor <b>description</b>: <i>Smead Manufacturing keeps its customers' offices organized. Accordingly, the company makes more than 5,000 paper filing products that are sold in office supply stores nationwide. Smead's product assortment includes folders (hanging, tabbed, and expandable), labels, fasteners, and binder and report covers. The firm also supplies open and secure shelving systems.The company was founded in 1906 by Charles Smead. After the founder's death, Smead Manufacturing was purchased by employee P. A. Hoffman, whose granddaughter, Sharon Hoffman Avent, is president and CEO today.</i><br />Target victim <b>website</b>: <i>https://www.smead.com/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ayass-BioScience</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10634</link>
<guid>a22c0238589078fb10b606ab62015744</guid>
<pubDate>Wed, 06 Sep 2023 18:55:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Ayass-BioScience</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4714ad074fe8cae92cddc6eb2c1c27e7cb124b8373c2161da600fa3c4748bed5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Solano-Napa-Pet-Emergency-Clinic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10633</link>
<guid>3d8c34ed1d91e42e80ccda0c6dd0b027</guid>
<pubDate>Wed, 06 Sep 2023 17:32:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>knight</b> claims attack for <b>Solano-Napa-Pet-Emergency-Clinic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1175dbcb18ad4a61e2ddf3f83d890d960e9ed81a052c4e0d4656a675275749e3</i><br /><br />Threat actor <b>description</b>: <i>Solano-Napa Pet Emergency Clinic is Animal hospital in Fairfield, California.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>knight</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sabre-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10632</link>
<guid>2eeb0ca3f02a275d5179f3b6d9e86e7d</guid>
<pubDate>Wed, 06 Sep 2023 13:33:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dunghill_leak</b> claims attack for <b>Sabre-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>007faf03a6434b4800098e194e6b82275f2c22f59cd74cb779abec42c897ed28</i><br /><br />Threat actor <b>description</b>: <i>Sabre Corporation is the largest global distribution systems provider for air bookings in North America. It's software, data, mobile and distribution solutions are used by hundreds of airlines and thousands of hotel properties to manage critical operations. Sabre is a leading software and technology company that powers the global travel industry. It partners with airlines, hoteliers, agencies and other travel partners to retail, distribute and fulfill travel. Its technology is the intelligence behind mobile apps, airport check-in kiosks, online travel sites, airline and hotel reservation networks, travel agent terminals, and scores of other travel solutions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dunghill_leak</category>
</item>
<item xmlns:dc='ns:1'>
<title>FRESH-TASTE-PRODUCE-USA-AND-ASSOCIATES-INC.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10630</link>
<guid>547e254ad67a3f2b4cd98de28e663293</guid>
<pubDate>Wed, 06 Sep 2023 10:00:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>FRESH-TASTE-PRODUCE-USA-AND-ASSOCIATES-INC.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a8f6c6e9c08da472539a3e100f2344d86220a5a194c3c3c6389edeb405f9591</i><br /><br />Threat actor <b>description</b>: <i>Fresh Taste Produce provides commercial and independent partners with the highest-quality fruits and vegetables from around the world. We are a multifaceted organization within the fresh fruit and vegetable industry, directly involved in farming, packing, importing, processing and distributing fresh produce from more than 35 countries https://freshtasteproduce.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chula-Vista-Electric-CVE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10629</link>
<guid>acf068d3e5e1ab3b6ae7d718587f654e</guid>
<pubDate>Wed, 06 Sep 2023 07:00:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Chula-Vista-Electric-CVE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56e399a295f77a31b4dd17773443af7845e6ba4a906574bd66a832c321f4aff1</i><br /><br />Threat actor <b>description</b>: <i>Since 1925, family-owned Chula Vista Electric (CVE) has been providing electrical services to Southern California. We started in downtown San Diego’s commercial district, in a small street-side store. As demand for electrical services grew, so did we. Today, we’re in a state-of-the-art-facility in Santee, with nearly 100 employees and a fleet of service trucks. Over the years, CVE has worked in many exciting places,from mines in Chile to the sunny shores of Hawaii — designing and building electric systems for the long haul. As we move into the future, CVE is embracing renewables and other evolving technologies and will continue to focus on being a company that exceeds industry standards and client expectations. https://www.c-v-e.com/about-us</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Precisely-Winshuttle</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10624</link>
<guid>6d65b5ac1f4ec80b9a7309311f4f9b13</guid>
<pubDate>Tue, 05 Sep 2023 23:42:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Precisely-Winshuttle</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3019d689b58f389fe2d4ed7eddb8d490098ae220e862e92c6a0e391fd9a0511</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.precisely.com www.winshuttle.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kikkerland-Design</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10625</link>
<guid>40b8498f89a8b101cd6fc6bb690231f9</guid>
<pubDate>Tue, 05 Sep 2023 23:41:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Kikkerland-Design</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a4f013f51898efd89dd04f58ea6a6eeb5c2611fc246ebfbc43c74d93c2e1c5be</i><br /><br />Threat actor <b>description</b>: <i>New York, United States</i><br />Target victim <b>website</b>: <i>www.kikkerland.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Master-Interiors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10627</link>
<guid>346401548fda241720bfad6c7f671255</guid>
<pubDate>Tue, 05 Sep 2023 23:40:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Master-Interiors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a36038afe6c7509beb614ba8781e6c3507a942f95276413db6f4d7bf456d81a1</i><br /><br />Threat actor <b>description</b>: <i>Delaware, United States</i><br />Target victim <b>website</b>: <i>www.masterinteriors.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bordelon-Marine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10628</link>
<guid>066ca7bf90807fcd8e4f1eaef4e4e8f7</guid>
<pubDate>Tue, 05 Sep 2023 23:40:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Bordelon-Marine</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9b0906db3ac89945e632db0e13d2855e08bb05e6de808ad4f837bb7fe2f0502</i><br /><br />Threat actor <b>description</b>: <i>Louisiana, United States</i><br />Target victim <b>website</b>: <i>www.bordelonmarine.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Majestic-Spice</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10623</link>
<guid>28538c394c36e4d5ea8ff5ad60562a93</guid>
<pubDate>Tue, 05 Sep 2023 23:39:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Majestic-Spice</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30aedb54935e4248000200c4d446e6bcd053e3bda867e7495755580f9171e584</i><br /><br />Threat actor <b>description</b>: <i>California, United States</i><br />Target victim <b>website</b>: <i>www.majesticspice.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Infinity-Construction-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10621</link>
<guid>eb76c4a54e67598df815abe79dda4b97</guid>
<pubDate>Tue, 05 Sep 2023 17:41:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Infinity-Construction-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6e3ec30bfa9ac42803c6a5657afa7b5981f802014cca23373fc7cd79c2689a3b</i><br /><br />Threat actor <b>description</b>: <i>Infinity Construction Company provide General Contracting, Construction Management, and Design-Build services throughout the State of Ohio.  Our major markets include Healthcare, Office, Education, Public and Non-Profit,...</i><br />Target victim <b>website</b>: <i>https://www.infinityconstruction.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>Maxxd-Trailers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10617</link>
<guid>2a5a0ae9dc9f6e54fca5f0f61b0e9b5b</guid>
<pubDate>Tue, 05 Sep 2023 17:35:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>Maxxd-Trailers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f88a3edc187539b396b24651009eab4b4e021f978406b1c2fb35e11d90df0b66</i><br /><br />Threat actor <b>description</b>: <i>MAXXD is a subsidiary of Maxey Trailers Mfg. Inc., a Texas company in business since 1999. The company began as a one man shop and has grown to an operation of 70 employees who produce 5,000 trailers annually for clients across the U.S. and Canada.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Barsco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10611</link>
<guid>101345ba77f8222dfe153e06123def94</guid>
<pubDate>Tue, 05 Sep 2023 11:26:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>Barsco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3fa42b525b07ee0376988ff170c0f0d2dbbb34bfcd7857b94a24cd45ad72f5ff</i><br /><br />Threat actor <b>description</b>: <i>Texas located Heating, Ventilation, Air Conditioning, and Refrigeration wholesale supplier. Since 1934 and under many names Barsco has been atop the HVAC/R industry. Centered in Dallas, Barsco operates across the North, East, and Central Texas frontiers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>spmblaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10610</link>
<guid>5b708c065dfab38528050a84d852bf13</guid>
<pubDate>Tue, 05 Sep 2023 10:04:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>spmblaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac97f0c4abfbd58052dc67b9e64df85f086b94d241190e700acbca99a9955ef4</i><br /><br />Threat actor <b>description</b>: <i>Simmons Perrine Moyer Bergman PLC is a full-service law firm. From business consulting to the most complex litigation.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>godbeylaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10607</link>
<guid>4379cf00e1a95a97a33dac10ce454ca4</guid>
<pubDate>Tue, 05 Sep 2023 05:31:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>godbeylaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fce42013a2663ea53928fd4416f9daeb0e0520eda5fc7be52adf4e60858fe221</i><br /><br />Threat actor <b>description</b>: <i>Personal Injury & Family Law Attorneys Cincinnati Ohio & Northern Kentucky</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>easydentalcare.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10596</link>
<guid>68bd22864919297c8c8a8c32378e89b4</guid>
<pubDate>Mon, 04 Sep 2023 20:39:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomedvc</b> claims attack for <b>easydentalcare.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>74b10b548c868931ce5c6280066378adf00c3be2fe0e79df5dd5a7dcf810cbcd</i><br /><br />Threat actor <b>description</b>: <i>We Have accessed all of the critical infrasrtucture of the company, we are on our way to publish all of the data, if not paidArchive SnapshotWe require a ransom of $18,000</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomedvc</category>
</item>
<item xmlns:dc='ns:1'>
<title>quantinuum.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10597</link>
<guid>e2a23af417a2344fe3a23e652924091f</guid>
<pubDate>Mon, 04 Sep 2023 20:39:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomedvc</b> claims attack for <b>quantinuum.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e3b96182452997b8c9033fdd48f86aee8b71e54f47d403bcd01f4f82ebc412c6</i><br /><br />Threat actor <b>description</b>: <i>we have access everything on their servers, including the Database, and other non public documents.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomedvc</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mulkay-Cardiology-Consultants</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10592</link>
<guid>f6c2a0c4b566bc99d596e58638e342b0</guid>
<pubDate>Mon, 04 Sep 2023 19:07:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Mulkay-Cardiology-Consultants</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8f9d44302c7ff8a63002de60e1abfc35d68a498d2094ad3ef8c88095bd2ff1db</i><br /><br />Threat actor <b>description</b>: <i>Angel J. Mulkay, MD, cardiac and peripheral interventionalist founded Mulkay Cardiology Consultants more than a decade ago. The network was successfully encrypted and compromised.We have 60GB of confidential and personal...</i><br />Target victim <b>website</b>: <i>https://www.mulkaycardiology.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>HBME-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10593</link>
<guid>d530d454337fb09964237fecb4bea6ce</guid>
<pubDate>Mon, 04 Sep 2023 19:07:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>HBME-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>780a10a77c1bef83293717d7027ffa218df3269de3661b60e11b36d1ff986af3</i><br /><br />Threat actor <b>description</b>: <i>HBME LLC is an accounting company that provides tax planning, consultation, business accounting and IRS audit representation services. The company has been successfully compromised and we have 25GB of service data from 2...</i><br />Target victim <b>website</b>: <i>https://hbme.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>Barco-Uniforms</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10591</link>
<guid>dd4729902a3476b2bc9675e3530a852c</guid>
<pubDate>Mon, 04 Sep 2023 17:29:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>Barco-Uniforms</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53844897a40fc57a26fca9222942d1f821a7513046cbe670594033d90f564d68</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1929, Barco Uniforms is a leader of design innovation in the premium professional apparel industry, offering award-winning premium uniforms that elevate and honor the individuals in the healthcare, enterprise, and food service industries.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>cdwg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10587</link>
<guid>244c14ea3d510ea640df31ff78b3158a</guid>
<pubDate>Mon, 04 Sep 2023 08:49:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>cdwg.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>17c4317a120de08ec106c1747251f335e0f3c3e8d161a4aefb4905ac904f7306</i><br /><br />Threat actor <b>description</b>: <i>About CDW. CDW Corporation (Nasdaq: CDW) is a leading multi-brand provider of information technology solutions to business, government, education and healthcare customers in the United States, the United Kingdom and Canada.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Knight-Barry-Title</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10582</link>
<guid>106fac81e07001e1825eadbb39fcde11</guid>
<pubDate>Sun, 03 Sep 2023 23:34:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Knight-Barry-Title</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e9dbbeac2859a0f62af7ef1691293a588673e8df4ae21a8b14f935e9c4c5bcab</i><br /><br />Threat actor <b>description</b>: <i>We are produly present over 10TB ofcommercial data (customer data, finance) for Knight Barry Title Insurance company represeting 10y data. It has over 500 employees in 5 states and executes over 120K service orders annualy which makes over 1M of unique customer data available. Ready</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>paynesvilleareainsurance.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10580</link>
<guid>0bd4cddb7692ab6e39732c404f093a2a</guid>
<pubDate>Sun, 03 Sep 2023 22:47:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomedvc</b> claims attack for <b>paynesvilleareainsurance.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3295cd94ac148d67f996a1da7c54ca3f343e8d1ff535bab8ca8455ff69effbb</i><br /><br />Threat actor <b>description</b>: <i>We have compromissed the servers of paynesvilleareainsurance.com. We decided to make sure they remember us so we have also defaced them.Archive SnapshopWe require a ransom of $10,000</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomedvc</category>
</item>
<item xmlns:dc='ns:1'>
<title>gosslaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10577</link>
<guid>be89ae8f13cb396cf3ad1f20355b5ea7</guid>
<pubDate>Sun, 03 Sep 2023 22:00:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>gosslaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c3ce41fb19726a79de9037f47c7ea4b0efa30e5f6d859e0b008e6ca37bef035</i><br /><br />Threat actor <b>description</b>: <i>VETERANS' LAWYERYou Deserve Representation and Security.We Focus on Results for U.S. Veterans Worldwide.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Taylor-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10571</link>
<guid>447664a3141eb12771bd889d6d4e1bdb</guid>
<pubDate>Sun, 03 Sep 2023 20:03:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>moneymessage</b> claims attack for <b>Taylor-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33f6e604bbd07e1f768339bae2a7b4cfe5703b577d0391dac35c8592f143981d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>moneymessage</category>
</item>
<item xmlns:dc='ns:1'>
<title>Riverside-Logistics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10572</link>
<guid>411fac00c3df193cf777bc45f7d444d4</guid>
<pubDate>Sun, 03 Sep 2023 20:02:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>moneymessage</b> claims attack for <b>Riverside-Logistics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89a5d0889e7f683ac78c46005854a55a37735d14789e233d1975532277f6bbe2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>moneymessage</category>
</item>
<item xmlns:dc='ns:1'>
<title>Estes-Design--Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10573</link>
<guid>17446a8ae7dbf7e2c2535ba49340b4b9</guid>
<pubDate>Sun, 03 Sep 2023 20:02:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>moneymessage</b> claims attack for <b>Estes-Design--Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a7ecacd6b91a11d3acda69173b43e60ddcecb32d11f60dc92c0cdffc4dbe185</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>moneymessage</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aiphone</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10574</link>
<guid>f1cf2a082126bf02de0b307778ce73a7</guid>
<pubDate>Sun, 03 Sep 2023 20:01:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>moneymessage</b> claims attack for <b>Aiphone</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa10f2dd51b6ce958d21f15605eca02649481991aad2cbcf1d320c0280cd5d3d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>moneymessage</category>
</item>
<item xmlns:dc='ns:1'>
<title>DDB-Unlimited-ddbunlimited.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10569</link>
<guid>e8c6ba1577afdf09f6ca0ea7fb987590</guid>
<pubDate>Sun, 03 Sep 2023 19:11:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rancoz</b> claims attack for <b>DDB-Unlimited-ddbunlimited.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06b7606134e7dbee16fd8a72001f425e14d671960ee6f940aed9b3ceb27dd81a</i><br /><br />Threat actor <b>description</b>: <i>Manufactures</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rancoz</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rick-Ramos-Law-rickramoslaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10570</link>
<guid>6b2f1de75dcb0dc79ef2b50af850de6f</guid>
<pubDate>Sun, 03 Sep 2023 19:10:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rancoz</b> claims attack for <b>Rick-Ramos-Law-rickramoslaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7bee2abb255a40d439ad0b74a8448716b31daa8553e849375ea8f14dea4e2fdb</i><br /><br />Threat actor <b>description</b>: <i>Legal Services industry</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rancoz</category>
</item>
<item xmlns:dc='ns:1'>
<title>ramlowstein.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10562</link>
<guid>5a5a2994bba00e071d152145344b741d</guid>
<pubDate>Sat, 02 Sep 2023 17:30:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ramlowstein.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>543ddfdf74d1e4a22445a52509ec4c654caa15b44f7b4304fe22fcef1737d31b</i><br /><br />Threat actor <b>description</b>: <i>Architecture, Engineering & Design · Wisconsin, United States ·</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>sterncoengineers.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10557</link>
<guid>7c8aa9ae1ab630196ed047f0ed2ee15c</guid>
<pubDate>Sat, 02 Sep 2023 16:01:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>sterncoengineers.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>440116992e402cd6459bacb9cd82bf50e9ee7b62cbfa86c7f489b47649f815c9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>attorneydanwinder.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10558</link>
<guid>129062814faa8bf423948596f415072b</guid>
<pubDate>Sat, 02 Sep 2023 16:00:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>attorneydanwinder.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c2c9222dc141840fc9e2fd907a308487aec1de499c0e718615ff1cacbb750506</i><br /><br />Threat actor <b>description</b>: <i>For the best legal assistance in Las Vegas, NV, trust the dedicated staff at the Law Office Of Dan M Winder, P.C., who will work hard to ensure the best possible outcome for you. We have a wealth of experience to serve your legal needs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>designlink.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10559</link>
<guid>7a20fd764fa23d34b52bd85bf5cb49a6</guid>
<pubDate>Sat, 02 Sep 2023 16:00:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>designlink.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff16130fa05422d182be8a311764bf8378f7e0fb76729890a25d260ff5bb9a18</i><br /><br />Threat actor <b>description</b>: <i>Design Link - Business InformationBusiness Services · Georgia, United States ·</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>gh2.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10556</link>
<guid>0bae6e6182d08d4cb16f87505dcb60ca</guid>
<pubDate>Sat, 02 Sep 2023 16:00:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>gh2.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f2866c62e89ddf6fb9d6d85a781585aabb7cf080bdf48f55c72d7fc38293c455</i><br /><br />Threat actor <b>description</b>: <i>GH2 Architects - Business InformationArchitecture, Engineering & Design · Oklahoma, United States ·</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Statefarm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10551</link>
<guid>3804bff92df360b252a43180009510c7</guid>
<pubDate>Sat, 02 Sep 2023 12:46:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Statefarm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>808ff6dc37e91df21ab1a7d561d7d3ebb9db06834fff338b928a056389fbfa15</i><br /><br />Threat actor <b>description</b>: <i>About 400,000,000 customer insurance records database was stolen from their network.No need to say anything moreWe are will wait for company representative until 05.09.2023 Otherwise all data will be sold to third parties</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>GORDON-MUIR--FOLEY-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10548</link>
<guid>722a7c7bd524abea0323c6ee7e2f8dcf</guid>
<pubDate>Sat, 02 Sep 2023 05:33:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>GORDON-MUIR--FOLEY-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf3fa1c560d5525f7a61531e770d9dc30aa8453ae6c0ca9640ca6a57886dc7e2</i><br /><br />Threat actor <b>description</b>: <i>Gordon, Muir & Foley represents diverse clients in a broad range of practice areas.  Founded in 1947, we are dedicated to creative and efficient legal solutions tailored to the needs of each client. Open communication is...</i><br />Target victim <b>website</b>: <i>https://www.gmflaw.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>N---and-c</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10547</link>
<guid>7180ee78abc8c4401d89f708582062e4</guid>
<pubDate>Fri, 01 Sep 2023 22:00:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>N---and-c</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5605e6a430070432a76b2a0aeeec01fd957697a3e7bb67e87ae07454b940d945</i><br /><br />Threat actor <b>description</b>: <i>The company providing financial services to businesses and individuals.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hawaii-Health-System</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10540</link>
<guid>9dd16e049becf4d5087c90a83fea403b</guid>
<pubDate>Fri, 01 Sep 2023 16:01:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomedvc</b> claims attack for <b>Hawaii-Health-System</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ceb3b8d84ca805c3944b1fdcb4e57bd3f169608d290545bb73f54ec9ef2df112</i><br /><br />Threat actor <b>description</b>: <i>We were able to dump and deface the official site of the hawaii health system. We demand a ransom not in the form of money      but in the form of public Excuse. We want Joe Biden to come with a russian flag in hands and Excuse himselfs for what he did until      now.Wayback Archive Snapshot</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomedvc</category>
</item>
<item xmlns:dc='ns:1'>
<title>hamilton-techservices.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10537</link>
<guid>5dc2596e6bd8d9a511a4af7e6d1fef81</guid>
<pubDate>Fri, 01 Sep 2023 10:02:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hamilton-techservices.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b9968070b2ece44d565a1fdce0513b77f7bdd301f6da4a00e34880ded330cd72</i><br /><br />Threat actor <b>description</b>: <i>hamilton-techservices.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Valley-Mountain-Regional-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10528</link>
<guid>51200d29d1fc15f5a71c1dab4bb54f7c</guid>
<pubDate>Thu, 31 Aug 2023 17:40:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>Valley-Mountain-Regional-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5490fbb3e4c492a8e516d05efbd3e968e6df3a73aa84e674374f9742990c6871</i><br /><br />Threat actor <b>description</b>: <i>Valley Mountain Regional Center is a private company that serves children and adults with developmental disabilities. Data: 147GB (medical record, passports, SSNs, accounting, financial documents).Soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-York--Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10526</link>
<guid>8fa2a95ee83cd1633cfd64f78e856bd3</guid>
<pubDate>Thu, 31 Aug 2023 17:36:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>New-York--Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9bc864813cbffe7cb929046bebbf0857ca955eda635bbdea80bddb750ff72cbe</i><br /><br />Threat actor <b>description</b>: <i>New York & Company is a leading specialty manufacturer and retailer of women's fashion apparel and accessories providing women with modern, wear to work solutions that are multi-functional at affordable prices. The company's website has a list of its best deals, with more to be added soon. But I wouldn't say it will be one of the best deals for them. They have broken off the dialog, and at this point we have no choice but to post their corporate fileshere for everyone to see. Stand by for the release. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Childrens-Home-of-Wyoming-Conference</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10527</link>
<guid>a79c7a2d44b2ca012e938b0cf16bc04f</guid>
<pubDate>Thu, 31 Aug 2023 17:36:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Childrens-Home-of-Wyoming-Conference</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7bf65535c866f4db9d36d8cdf2f58ae5d85fce2bbcd3c40f853258f791736f8</i><br /><br />Threat actor <b>description</b>: <i>The Children's Home is a family-centered agency with 16 programs,nearly 300 employees and more than 8 locations. CHWC offer six areas of assistance:Behavioral & Emotional Health, Therapeutic Intervention & Clinical Treatment, Leadership & Development, Physical Health & Wellness, Community Outreach & Civic Engagement, Academic Success & Career Readiness.More than 70Gb personal and company documentation data.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.lasaterandmartin.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10525</link>
<guid>ebd64e2bf193fc8c658af2b91952ce8d</guid>
<pubDate>Thu, 31 Aug 2023 16:05:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>www.lasaterandmartin.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a9477f78c328af6fca34cdf68f767aef3aac8e02f05ec4e23b1ffad013077ad</i><br /><br />Threat actor <b>description</b>: <i>Lasater & Martin, P.C. Attorneys, 697Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wilder--Co</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10524</link>
<guid>9db6faeef387dc789777227a8bed4d52</guid>
<pubDate>Thu, 31 Aug 2023 14:46:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Wilder--Co</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>622b56b03ee3868af255a4d557060b26624d68417aaed8bf6afcf30dd5a50df9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rivers-Casino</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10516</link>
<guid>8208dd730fb0a5670e2817252c6de728</guid>
<pubDate>Thu, 31 Aug 2023 12:59:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Rivers-Casino</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e385a3fe108eab9b99117697415c9efc52ac6c5dc5e0b238b80897a0cbce3668</i><br /><br />Threat actor <b>description</b>: <i>Rivers Casino is a casino and hotel, that in addition to gambling, offers promotions, dining and entertainment. This is our new client that seems to be offering soon its internal secrets. We willlet you know soon about the breach more detailed. There will be uploaded about 140Gb.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>SP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10521</link>
<guid>3faf3b08de6c7c130e63c0e38e5553a8</guid>
<pubDate>Thu, 31 Aug 2023 12:59:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomedvc</b> claims attack for <b>SP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a56da8f53dc563acdf907b6901f3f12c80841366840fb269efcfa90c0cf19a14</i><br /><br />Threat actor <b>description</b>: <i>Affected nearly 6tb of data. Because of the size of the data I require a payment to the following address only. We demand 200,000 euro. bc1qqc7nla44te4wxyvf9j7zxtc5q296sxn94k6v00</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomedvc</category>
</item>
<item xmlns:dc='ns:1'>
<title>Powersports-Marketing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10522</link>
<guid>00c9f07b1f0782613ee5d3133d28cc01</guid>
<pubDate>Thu, 31 Aug 2023 12:59:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomedvc</b> claims attack for <b>Powersports-Marketing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9d5fd80c1c7ad065cd46b616068847be24f7572ceca36038ea3c42badc6b432</i><br /><br />Threat actor <b>description</b>: <i>We are in hold of Everything any of their employes ever downloaded or used on their systems. whole cloud has been accessed. We are in hold of 2.1tb of data from their cloud.file tree:download(https://cdn.bunkr.ru/directory_tree-UvBawJCp.txt)</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomedvc</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alpizar-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10515</link>
<guid>11e48f522f94aca7b5a3fdc316b2d737</guid>
<pubDate>Thu, 31 Aug 2023 12:48:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Alpizar-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2268d8d22c5fe5ddc890c1143192058e72b581ae06bcedaabef0b275ad019220</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pifers-Auction--Realty</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10514</link>
<guid>206bb45f944accb7a4cd1f135786c415</guid>
<pubDate>Thu, 31 Aug 2023 11:32:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Pifers-Auction--Realty</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6fca0ec3b5673f6ac4c4549303d01d21c4eca2e4030a730d88cbf2af4e7414cb</i><br /><br />Threat actor <b>description</b>: <i>Pifer's Auction & Realty is a full service auction and real estate firm specializing in land auctions, machinery auctions, and land management.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>millwgs.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10511</link>
<guid>99113167f3b816bdeb56ff1af6cec7af</guid>
<pubDate>Thu, 31 Aug 2023 08:52:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>millwgs.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aaab5ce654f787488044053a83f55cb599efa6c0d1e448a93b9448f89f8868fe</i><br /><br />Threat actor <b>description</b>: <i>Millennium Logistics - Final Mile and White Glove DeliveryLocated in Franklin, MA, Millennium logistics provides nationwide services for Final Mile White Glove Delivery & Asset Recovery.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eckell-Sparks-Attorneys-at-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10510</link>
<guid>bf0377d5a3968bac5aac7a10dfff1b86</guid>
<pubDate>Thu, 31 Aug 2023 08:44:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Eckell-Sparks-Attorneys-at-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bbccf96fee932c771c64a207118cb63aaa42358a569d2202eba63efbed1ea9e5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fenn-Termite-and-Pest-Control</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10509</link>
<guid>e068ea62eb63df3541e34320daa40907</guid>
<pubDate>Thu, 31 Aug 2023 07:05:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Fenn-Termite-and-Pest-Control</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc0188aff04d0394405f60b262d208914231c84a1ab6e9fea3f0b2e4c5a0789c</i><br /><br />Threat actor <b>description</b>: <i>Fenn Termite & Pest Control Is A Full Service Pest Control Company Mission: To deliver the best service possible for a fair price. To be dedicated enough to provide the customer with quality and a job well done, conforming to the customers high expectations. To improve the economic well-being and quality of life of all employees. To always be honest and deliver the best product in our industry, while preserving the integrity of the environment. Description: For over 60 years, the trained professionals at Fenn Termite & Pest Control, have built a reputation throughout Southern California with commercial and residential clients for providing cutting edge and dependable pest control solutions. We are a 3rd generation, family run business with strong ties to our community and a commitment to environmentally safe, practical methods.  https://www.fennpest.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>antioch.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10507</link>
<guid>7c6c1a7bfde175bed616b39247ccace1</guid>
<pubDate>Thu, 31 Aug 2023 05:31:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>antioch.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dca4cbbcaddea8f4fc551dc1b043c8bbef46e3e9df01ace353f143a94bc9987a</i><br /><br />Threat actor <b>description</b>: <i>Antioch University - Los Angeles is ranked #1,033 out of 2,241 schools in the nation that were analyzed for overall quality.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>rydershealth.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10504</link>
<guid>c975028469b2db5ff182d45c92bef0ec</guid>
<pubDate>Thu, 31 Aug 2023 01:02:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>rydershealth.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f51eecbf4571e63669c4d1d5ced5d589b3f8c77f069c78ec2988c0e94a0f0faf</i><br /><br />Threat actor <b>description</b>: <i>Ryders Health Management is now known to everyone, first of all, for its indifferent attitude to the protection of personal data of its clients and employees, as well as corporate information of the company. Absolute indifference of officials is mani...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>losh.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10496</link>
<guid>6c23cf54347d8e2dda52f41a918efb43</guid>
<pubDate>Wed, 30 Aug 2023 23:34:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>losh.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1782227b5f69d07f429c8af571fd19d748b93d9168cdd0f189804bcd428f1834</i><br /><br />Threat actor <b>description</b>: <i>We began in 1990 as Losh Communications installing Business telephones systems for AT&T. We stuck with it as that division of AT&T became Lucent and eventually, Avaya.Over the years, we have branched out to become a leading IT Service provider with...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>greensboro.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10497</link>
<guid>71eee742e4c6e094e6af364597af3f05</guid>
<pubDate>Wed, 30 Aug 2023 23:34:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>greensboro.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>44b8bae28101ea01753e69d30edf136e17fdc2acfba73b018a5e74734536daa6</i><br /><br />Threat actor <b>description</b>: <i>Greensboro College provides a liberal arts education fostering intellectual, social and spiritual development while supporting the individual needs of all students.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>OBrien-Steel-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10484</link>
<guid>3c63ec7be1b6c49e6c308397023fd8cd</guid>
<pubDate>Wed, 30 Aug 2023 17:31:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>OBrien-Steel-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>64e144cb2cd152d58f07231ab43d5fbcf5ec8858f544bd7a05515a331a145d20</i><br /><br />Threat actor <b>description</b>: <i>O’Brien Steel Service is stocked and equipped to service customers of all sizes, ranging from small job shops to the largest OEMs in the USA. More than 70 GB of data will be published soon, including:- Financial documents and reports for 22-23 years;- HR;- Projects;- Employment contracts and documents;- IT documents;- Administrative documents.And also: -Contacts.csv - 5069 lines Clietns data;-Customers.csv - 3596 lines of the Companies data; -Competitors.csv - 3470 lines Suppliers data.Wait for the release.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brooklyn-Premier-Orthopedics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10482</link>
<guid>77983cf4f308d34fe7865a10a25ae39d</guid>
<pubDate>Wed, 30 Aug 2023 14:44:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Brooklyn-Premier-Orthopedics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9837e37854d6b8ac147175e9ad8074afbbd37fa079ff09d84355fc656532b6d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aranui-Cruises</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10480</link>
<guid>4d771504ddcd28037b4199740df767e6</guid>
<pubDate>Wed, 30 Aug 2023 14:42:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Aranui-Cruises</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>915e3940ec007343e0140186d700f823b4487031aac3e2aa247d9544eeef759f</i><br /><br />Threat actor <b>description</b>: <i>Aranui Cruises is the oldest cruise operator in French Polynesia, having been founded 35 years ago. The company has a ship made to order ship "Aranui 5" designed for VIP level cruise holidays. The American office of the company is located at 2028 El Camino Real So Te B, San Mateo, California, 94403, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Skynet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10481</link>
<guid>3bb39baf42957397d3fae8e0e66b6554</guid>
<pubDate>Wed, 30 Aug 2023 14:42:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Skynet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>591cf546606de2cd791b6be45527c31a28fc7362d2a46a9b395e247ded7dc698</i><br /><br />Threat actor <b>description</b>: <i>Skynet (https://www.skynetwisp.com/) provides Internet access services, both for the private segment of the market and for public institutions. The company's main office is located at 6630 Fm 1463 Rd 255 Step 500, Katy, Texas, 77494, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Renton-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10479</link>
<guid>9c0badf6e91e4834393525f7dca1291d</guid>
<pubDate>Wed, 30 Aug 2023 14:34:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Renton-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>83fb35ef177dffaf399b0d446d2ff8d77dda7d7a45a31d07b80d407ee2b43a29</i><br /><br />Threat actor <b>description</b>: <i>Renton School District is a public school district serving Renton, Washington. 200Gb of Renton schools will be shared here soon. Business docs, projects information and personal information (e.g.medical staff). Wait for the release.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Felling-Trailers-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10477</link>
<guid>99bf3d153d4bf67d640051a1af322505</guid>
<pubDate>Wed, 30 Aug 2023 08:43:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lorenz</b> claims attack for <b>Felling-Trailers-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d88544cde4c906022ae88bf9f19c7d59f61681f1623b80ba23c475b5819dc49c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.Felling Trailers, Inc.</i>]]></description>
<category>lorenz</category>
</item>
<item xmlns:dc='ns:1'>
<title>Petkus-Brothers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10476</link>
<guid>13844d01d85a85bed47338e396b2aa3d</guid>
<pubDate>Wed, 30 Aug 2023 05:35:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Petkus-Brothers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29f183887cdb09050c1572a295c645fdb64fe0b2d9b6f8c3baeb3c8ae8296ba8</i><br /><br />Threat actor <b>description</b>: <i>Petkus Brothers committed to provide you the quality products & installation of your entire home remodeling work in Northern California at an affordable price. Petkus Brothers is an outstanding company in the home improvement industry; we build custom sun rooms & patio covers and kitchen & bathroom renovations; our showroom has full size models on display of all our products and we guarantee the "Best Price, Best Value Every Day.https://www.petkusbrothers.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>sherwin-electric.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10470</link>
<guid>4e4551a346eb4ca8e91a4651036c5aa9</guid>
<pubDate>Tue, 29 Aug 2023 22:06:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>sherwin-electric.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4932ca7259031b4b74149436638f810aac013d40fc97a7d4cf97d00c4f8abace</i><br /><br />Threat actor <b>description</b>: <i>Sherwin continues to expand their electrical presence in the Industrial, Commercial, and Solar markets.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>uprepschool.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10469</link>
<guid>421f8eb2f6d635fc5e09d0b16c59e281</guid>
<pubDate>Tue, 29 Aug 2023 22:04:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>uprepschool.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>72606766b60e699ba9ed4d57834e45ac77e6afeadcd9be49409bb0826c6ca786</i><br /><br />Threat actor <b>description</b>: <i>University Prep’s two elementary schools (kindergarten – 5th grade) in Northeast Denver are tuition free public charter schools with a simple and clear mission – prepare every child for a four-year college degree and a life of opportunity.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zurvita</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10468</link>
<guid>432fd02f951f393df1591310e6811118</guid>
<pubDate>Tue, 29 Aug 2023 21:23:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ragroup</b> claims attack for <b>Zurvita</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c48a47db688f89ca2ff66c62cdf9b6f562c7f6ed1fe15925c62a06564e9951e7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ragroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>wkclawfirm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10461</link>
<guid>8a2d334536b2f4146af8cf46acd85110</guid>
<pubDate>Tue, 29 Aug 2023 20:41:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>wkclawfirm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ab86918fd378603cd0abbfe82c3dc13626c100d54fab846e1ba19ea53802ba1</i><br /><br />Threat actor <b>description</b>: <i>Winstein, Kavensky & Cunningham was originally established in 1960 by Stewart Winstein (1914-2010) and Harrison H. Kavensky. We are one of the oldest and most prestigious law firms in the Quad Cities and surrounding communities. For more than 60 year...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>younghomes.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10456</link>
<guid>5ca41a86596a5ed567d15af0be224952</guid>
<pubDate>Tue, 29 Aug 2023 19:06:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>younghomes.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1f1fdc6dc0181752817b02293416d8c4ffa67f15265ca76d1223735bdde83ec7</i><br /><br />Threat actor <b>description</b>: <i>Young Homes is a builder you can trust because its goal has never changed, wavered, or varied. This goal has been, and always will be, home buyer satisfaction.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>mergerecords.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10451</link>
<guid>4b730bb369f87ad369fde0ffbf74a3c2</guid>
<pubDate>Tue, 29 Aug 2023 19:03:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>mergerecords.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b8249490676ecd1a5789363ecd186e7bddedd9f7ca7127929d12c73c00f4c70</i><br /><br />Threat actor <b>description</b>: <i>Merge Records was started in the summer of 1989 by Laura Ballance & Mac McCaughan, the same summer they formed the band Superchunk in Chapel Hill, North Carolina.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>carolfoxassociates.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10449</link>
<guid>f50d8aa7aa4204ac97b2ef3ed37476f6</guid>
<pubDate>Tue, 29 Aug 2023 18:46:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>carolfoxassociates.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a934e4a42511d8a5fcaa986558239725769f606ed2a90b3ef12ab439e94ba216</i><br /><br />Threat actor <b>description</b>: <i>Carol Fox & Associates (CF&A) is an award-winning PR, branding, digital marketing and events agency. Fully integrated to meet the demands of an ever-changing industry, our team is plugged in, switched on and ready to elevate your brand. No project is...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Forsyth-County-GA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10448</link>
<guid>b0eeffad438fd186126c11fecdceab44</guid>
<pubDate>Tue, 29 Aug 2023 16:51:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Forsyth-County-GA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc02c1b3d6fb1014fbabb139330533d8511992330670f56264038a0d614718ea</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>esprigas.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10444</link>
<guid>e32c6c0d76c602ec48a1ec030982eb85</guid>
<pubDate>Tue, 29 Aug 2023 10:44:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>esprigas.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>95495c736753f2e828e174aeea5f6ddca09eea8c8f228558d3f91beb3a7e40da</i><br /><br />Threat actor <b>description</b>: <i>EspriGas is a technology driven beverage, medical, and industrial gas company. It brings a modern approach to the gas industry by utilizing a network business model to deliver products nationally</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Iina-Ba-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10439</link>
<guid>04458ea7b0026a1fac9b420ebeb2efa0</guid>
<pubDate>Mon, 28 Aug 2023 20:39:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Iina-Ba-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52b17591b119c270c58a3acaa436d317b5ad9b3e2397974b587ecd3041a34d4f</i><br /><br />Threat actor <b>description</b>: <i>Iina Ba Inc is a company that operates in the Civil Engineering industry. It employs 21-50 people and has $5M-$10M of revenue.Our mission is to provide innovative solutions to environmental demands, designed through a po...</i><br />Target victim <b>website</b>: <i>https://www.iinaba.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>Asian-Network-Pacific-Home-Care--Hospice</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10435</link>
<guid>caf14d79a71090573d8741986b4ae1a4</guid>
<pubDate>Mon, 28 Aug 2023 16:02:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Asian-Network-Pacific-Home-Care--Hospice</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f62bf7baf5160f80ddc0ca394990705c75a580fccca9d8c8cb74ef151b1ee59b</i><br /><br />Threat actor <b>description</b>: <i>Asian Network Pacific Home Care & Hospice is a company that operates in the Hospital & Health Care industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jasper-High-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10437</link>
<guid>a7fd9fd835f54f0f28003c679fd44b39</guid>
<pubDate>Mon, 28 Aug 2023 16:01:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Jasper-High-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>20dc62676b73f236199d4d2c7e802cd512dd3d197e0defd5d00fa203b945095c</i><br /><br />Threat actor <b>description</b>: <i>Another one school that doesn't care about its students documents. More than 60Gb of data will be released here soon. Many confidential documents of students and employees and even some confidential files. Wait for the release.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Superior-Communications</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10434</link>
<guid>54d4c4f1a954fc25689522435f35fedf</guid>
<pubDate>Mon, 28 Aug 2023 14:40:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Superior-Communications</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce2150b3819ee56b0abb0c605dfad08a19f0b4cc68db8508d4d8922f54414722</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Penny-Publications</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10431</link>
<guid>5cc33dfe7e069a757ca0fcbe6b95c89e</guid>
<pubDate>Mon, 28 Aug 2023 13:02:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Penny-Publications</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e292577789a23446c769fef6c8cc9d0d8ecbbf8bf53622140e417ace0e87424</i><br /><br />Threat actor <b>description</b>: <i>Penny Publications is recognized as North America’s leading puzzle magazine company and is dedicated to providing family-friendly puzzle entertainment of unsurpassed quality. We will make Penny Publications a bit more recognizable for people and upload the data we've taken from this company. 100 Gb will be available for downloading soon. Employee information, confidential documents and financial files can be found in the data as always.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Voss-Enterprises-Divvies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10432</link>
<guid>3181d59d19e76e902666df5c7821259a</guid>
<pubDate>Mon, 28 Aug 2023 13:02:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Voss-Enterprises-Divvies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>13f80822e31874ba313112b1331e2f4da8e051a37b73762ab1c8fb4862b263f7</i><br /><br />Threat actor <b>description</b>: <i>Voss Enterprises (real estate) and Divvies (retail) are two more companies with no hint of a desire to keep their company data safe. We'll post the files of both companies this week.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cutler-Smith</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10433</link>
<guid>5d461a9f589b908d63d225c4859a0f1b</guid>
<pubDate>Mon, 28 Aug 2023 13:02:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Cutler-Smith</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d8723e30fd5645ec5513ec3104ee5a0f2211c70920bcd9de43c9c91818b14bcb</i><br /><br />Threat actor <b>description</b>: <i>Cutler-Smith, P.C. is a uniquely positioned to deliver big law firm results with the attention, service and efficiencies that onlya boutique law firm can provide. They've lost 50Gb of their clients' data that will be provided here in our blog within this week.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Metropolitan-Club-DC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10426</link>
<guid>8553adf92deaf5279bcc6f9813c8fdcc</guid>
<pubDate>Sun, 27 Aug 2023 19:05:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomedvc</b> claims attack for <b>Metropolitan-Club-DC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>76ad938d4382cca4e6dfd3f762d9e288e2480856c3433e52a54ff9e7b006fbe3</i><br /><br />Threat actor <b>description</b>: <i>We were able to dump the entire metroclub.org site. Metroclub is a privte club from DC. There is 2.1TB of data. This screenshot show most of important info but still gathering a lot of data. We have their entire members list and employee data. Source and costumers data.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomedvc</category>
</item>
<item xmlns:dc='ns:1'>
<title>State-Farm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10423</link>
<guid>99e314b1b43706773153e7ef375fc68c</guid>
<pubDate>Sat, 26 Aug 2023 22:08:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomedvc</b> claims attack for <b>State-Farm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7171101e784ef9f9131f7b279b5def42969fb8ac03f74bc3f391c287a8e33a32</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomedvc</category>
</item>
<item xmlns:dc='ns:1'>
<title>Community-Council-of-South-Central-Texas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10422</link>
<guid>67388f1834f7d6243b753ec33584a8df</guid>
<pubDate>Sat, 26 Aug 2023 08:34:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Community-Council-of-South-Central-Texas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>51650691a7fe49e304a5bcda165d2d2bf70ef19050a87f3109e7e6ccebea32d6</i><br /><br />Threat actor <b>description</b>: <i>CCSCT empowers vulnerable families and individuals in greater South Central and West Texas; as well as along the Texas/Mexico Border, to achieve self-sufficiency by eliminating barriers through innovative programs and strong community partnerships. The Community Council of South Central Texas is a private non-profit Community Action Agency that serves 23 counties in South Central Texas. Counties include Atascosa, Bandera, Bee, Comal, Dimmit, Edwards, Frio, Gillespie, Guadalupe, Karnes, Kerr, Kendall, Kinney, LaSalle, Live Oak, Maverick, Medina, McMullen, Real, Uvalde, Val Verde, Wilson and Zavala. Programs operated by the agency include utility assistance, home and rental assistance, case management, disaster relief, assistance to persons with disabilities, weatherization assistance, and Women, Infants and Children (WIC). As the service delivery agency to the impoverished, CCSCT will continue to identify needs, prioritize them, and stimulate, promote, secure, and use all available resources to alleviate povertyhttps://www.ccsct.org/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trimaran-Capital-Partners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10415</link>
<guid>670d3369559cd4f24e79046d6372a0e9</guid>
<pubDate>Fri, 25 Aug 2023 22:45:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Trimaran-Capital-Partners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc89b4e0aacd016e8cb66e856c49f18e77eb1f1a622613b5d39823a5fe249443</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>HFH-Capital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10409</link>
<guid>f653d5976458f0dcce2b3939259acffa</guid>
<pubDate>Fri, 25 Aug 2023 08:30:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>HFH-Capital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b96219571bbeee0263bd7438a87fca0d5bd2ca9b618c9bbfaf712385506136e4</i><br /><br />Threat actor <b>description</b>: <i>Small Business FinancingHFH Capital can advance your business by purchasing up to $5mm of its future sales, today! We'll pay your business up front, then collect a small percentage of future  sales as they occur until a predetermined amount is collected.Sometimes referred to as a business  advance or merchant cash advance, an advance is an amount of money paid  to a business to purchase sales that would normally occur in the future.  A percentage of the future sales are collected by scheduling an ACH debit from your business checking account or directly from your credit  card processing transactions.https://www.hfhcapital.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Prince-Georges-County-Public-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10408</link>
<guid>447d5c2ba3e790ec434c0bee994095ed</guid>
<pubDate>Fri, 25 Aug 2023 07:10:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Prince-Georges-County-Public-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc0216dc92b39a91fa999060b05e42dfbff79311c945f2df5214187cd26d197a</i><br /><br />Threat actor <b>description</b>: <i>Prince George's County Public Schools Prince George's County Public Schools (PGCPS), one of the nation's 20th largest school districts, has 201 schools and centers, more than 133,000 students and nearly 20,000 employees.</i><br />Target victim <b>website</b>: <i>https://www.pgcps.org/</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Storm-Tight-Windows</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10399</link>
<guid>e9bcd1b063077573285ae1a41025f5dc</guid>
<pubDate>Thu, 24 Aug 2023 18:42:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Storm-Tight-Windows</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2352a4de9cb6254a88d376894ea52d9d953344c8480ed6117ec6d1c1e8e5c2dc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Edmonds-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10398</link>
<guid>f6c15590a3a49d1c5ed9649c18433916</guid>
<pubDate>Thu, 24 Aug 2023 18:08:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Edmonds-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c5414a40e5892960731717456718ae91b02be877f59b0a2946153679505e3fd</i><br /><br />Threat actor <b>description</b>: <i>Edmonds School District's 35 schools cover approximately 36 square miles within the communities of Brier, Edmonds, Lynnwood, Mountlake Terrace, Woodway and portions of unincorporated Snohomish County. Edmonds School District's data covers approximately 10GB ( sql file) on our server and seems not to be very interested in saving it. So we are ready to share it with everyone interested. I think you can imagine what data will be released: personal students documents, employees info, financials, accounting and much other. We are working on the release.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ontellus</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10395</link>
<guid>04da717026605472461b05cf41f717ee</guid>
<pubDate>Thu, 24 Aug 2023 12:42:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Ontellus</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26e43567daaaf9184e01b468297d7b367d2bf79c978228dd0a3c618bac4b5376</i><br /><br />Threat actor <b>description</b>: <i>Established in 1975, and rebranded in 2017 Ontellus provides internet-based record retrieving and billing services. Their headquarters are located in Houston, Texas</i><br />Target victim <b>website</b>: <i>https://www.ontellus.com/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>A--</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10393</link>
<guid>f8a85df7f5f429ca5f2ff9a695835da3</guid>
<pubDate>Thu, 24 Aug 2023 11:34:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>A--</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f004b756b996269c9fd940c49d367699faba3c87a4f2094421b820b7d173359a</i><br /><br />Threat actor <b>description</b>: <i>Creating content by distributing print and digital products to all types of information providers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Constellation-Kidney-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10392</link>
<guid>26ed695e9b7b9f6463ef4bc1fd74fc87</guid>
<pubDate>Thu, 24 Aug 2023 10:49:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Constellation-Kidney-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>034c7e4fe7ad1ee4e4f6d9c0f5e0de12dfa26b2ac85b0727a065ded1a96f9669</i><br /><br />Threat actor <b>description</b>: <i>The company is the leading provider of renal Electronic Health Records, medical billing services, and billing software.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Prospect-Medical-Holdings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10391</link>
<guid>5dfd38837dc134b2fc764c102b29fc46</guid>
<pubDate>Thu, 24 Aug 2023 08:38:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Prospect-Medical-Holdings</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e939bb81a854e26c691897561ee9923476903e85790cf655620acfbf298b797e</i><br /><br />Threat actor <b>description</b>: <i>Prospect Medical Holdings</i><br />Target victim <b>website</b>: <i>https://www.pmh.com/</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>imtmro.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10383</link>
<guid>8586b7474b339930b20ae959920a99a4</guid>
<pubDate>Thu, 24 Aug 2023 07:41:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>imtmro.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4405d484574fea4e6abfb95357922993c7037ad1f02bf6762be8141ea65e9400</i><br /><br />Threat actor <b>description</b>: <i>Country: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>KVFCU.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10361</link>
<guid>015389e74278202135dd6ed947ed32da</guid>
<pubDate>Thu, 24 Aug 2023 07:39:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cloak</b> claims attack for <b>KVFCU.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad24523241bb76645baedd8e5375b4fc0e2bcb71e6bae490a699b7be7abf262f</i><br /><br />Threat actor <b>description</b>: <i>Country: USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cloak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hoosick-Falls-Central-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10362</link>
<guid>c8b9abffb45bf79a630fb613dcd23449</guid>
<pubDate>Thu, 24 Aug 2023 07:37:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Hoosick-Falls-Central-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>903fcff9fc5c12a16b0e8797a4fd66716856ef9f88c8462d60a3c9d2bb58f699</i><br /><br />Threat actor <b>description</b>: <i>For the 2023 school year, there are 2 public schools serving 1,055 students in Hoosick Falls Central School District. This district's average testing ranking is 9/10, which is in the top 20% of public schools in New York.Public Schools in Hoosick Falls Central School District have an average math proficiency score of 77% (versus the New York public school average of 56%), and reading proficiency score of 76% (versus the 63% statewide average).https://www.hoosickfallscsd.org/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Law-Offices-of-Steven-H.-Heisler</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10366</link>
<guid>ef3e86e4902558e3779ecc84d72a6d8c</guid>
<pubDate>Thu, 24 Aug 2023 07:35:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>The-Law-Offices-of-Steven-H.-Heisler</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf7fc7765bd85ac0c37974f1cdc71095e8534be276b2bfefc9ccb1ef7681b523</i><br /><br />Threat actor <b>description</b>: <i>Baltimore personal injury lawyer Steve Heisler will aggressively fight for all you deserve. Find out why clients prefer to work with Steve. Free consults. The Law Offices of Steven H. Heisler focus on injury cases, including Worker's Compensation, Social Security Disability, Auto Accidents, Personal Injuries, Product Liability, and more. The law office is located in Baltimore and in the state of Maryland, Steve and the Injury Legal Team represent injury victims in all countieshttps://www.theinjurylawyermd.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jhookers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10351</link>
<guid>b34517c68d949a02746108522f958479</guid>
<pubDate>Wed, 23 Aug 2023 19:18:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomedvc</b> claims attack for <b>Jhookers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c0953f24f6f000471180881b2b2b929fdfc447a1f0da07b8942237364c81357</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomedvc</category>
</item>
<item xmlns:dc='ns:1'>
<title>IMS-Computer-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10350</link>
<guid>20d749bc05f47d2bd3026ce457dcfd8e</guid>
<pubDate>Wed, 23 Aug 2023 16:48:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>IMS-Computer-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2984515a8075326c336a5f338e4511068de8c7f45d0dc3bfdafee1482da93aa3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Transunion</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10347</link>
<guid>a53d1388191884b75c48bebb18709bfb</guid>
<pubDate>Wed, 23 Aug 2023 16:00:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomedvc</b> claims attack for <b>Transunion</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>83ab580eeae7a29d4c9ae2db8bddd51d156901341b21c91e26161e4ea70f8b24</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomedvc</category>
</item>
<item xmlns:dc='ns:1'>
<title>mcnamaradrass.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10341</link>
<guid>859b755563f548d008f936906a959c8f</guid>
<pubDate>Wed, 23 Aug 2023 13:07:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>mcnamaradrass.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf561afabfe3eb97fbdda8171293728250707ddab6cb28f7817564ceddda99ec</i><br /><br />Threat actor <b>description</b>: <i>We were hacked by McNamara & Drass. This company has absolutely no respect for confidential information and is negligent with respect to the legal information of U.S. citizens. The management of this company refused to correct their mistakes and refu...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sirius-Computer-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10337</link>
<guid>e64f346817ce0c93d7166546ac8ce683</guid>
<pubDate>Tue, 22 Aug 2023 16:41:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Sirius-Computer-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34bd9df73ab251f101df3c30966af3a0aa16d7bedcceeedaf5da7a4845f09d2f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Atlantic-Federal-Credit-Union</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10336</link>
<guid>76c6c66b84436d4dea31e13d1a2d826c</guid>
<pubDate>Tue, 22 Aug 2023 14:46:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Atlantic-Federal-Credit-Union</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c99a016325c03623d0d2c064a825a159983cfc1e430c4d5386dad760d314c221</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pierce-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10329</link>
<guid>ce128c3e8f0c0ae4b3e843dc7cbab0f7</guid>
<pubDate>Mon, 21 Aug 2023 23:39:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Pierce-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ecdd8359d02c7f4e113fdef5c69c35740c0b8bc50703d7a4516e31b498a1343</i><br /><br />Threat actor <b>description</b>: <i>Pierce College Pierce College creates quality educational opportunities for a diverse community of learners to thrive in an evolving world.</i><br />Target victim <b>website</b>: <i>https://www.pierce.ctc.edu/</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Davidoff-Hutcher--Citron</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10322</link>
<guid>648f4baa45889f9c5f4f7add35862841</guid>
<pubDate>Mon, 21 Aug 2023 10:39:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Davidoff-Hutcher--Citron</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8592f6b2d609fa8ec64e9d3db9498eae95fb72d2c1e6f84428e895c9277eace1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>stockwellharris.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10320</link>
<guid>7a677bb4477ae2dd371add568dd19e23</guid>
<pubDate>Sun, 20 Aug 2023 21:43:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>stockwellharris.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7dcff8ec7efe0e22b1a2d3caea1b2a52edbe01832cf4c33bb0a035d36399e3e5</i><br /><br />Threat actor <b>description</b>: <i>Since the law company stockwellharris.com refused to correct its mistakes and neglected the security of its clients' data, we publish a large amount of legal data of this company. We recommend all partners and clients of this company to stop cooper...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>hallbergengineering.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10319</link>
<guid>9acf1b76f369030270de8f98f84d6707</guid>
<pubDate>Sun, 20 Aug 2023 13:01:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hallbergengineering.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>205e5cee19b855e62834d262d59f5f2e554b57b80d5b6e9732160d8c671a6431</i><br /><br />Threat actor <b>description</b>: <i>Hallberg Engineering, Inc. (HEI) is a mechanical and electrical consulting engineering firm specializing in the design of mechanical, electrical, and technology systems, and commissioning. Our experienced engineers provide various services includ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>cloudtopoffice.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10318</link>
<guid>2307ac1cfee5db3a5402aac9db25cc5d</guid>
<pubDate>Sun, 20 Aug 2023 08:56:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>cloudtopoffice.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8346385e26abd30e1f417149a97df9ce792813d438202df180194366c867c24</i><br /><br />Threat actor <b>description</b>: <i>CloudTop Office was incorporated in early 2000 under the name Tandem Training and Consulting, and initially, we offered CRM Consulting, Act! training and training for end-user applications (MS Office, Quickbooks, and Crystal Reports). We have been wo...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>equip-reuse.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10317</link>
<guid>9c6947bd95ae487c81d4e19d3ed8cd6f</guid>
<pubDate>Sun, 20 Aug 2023 08:30:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>equip-reuse.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd98a8b98649db77027b93143758699353c2b566552787b2232137fa843eed06</i><br /><br />Threat actor <b>description</b>: <i>ABOUT EQUIPMENT REUSE INTERNATIONALAt Equipment Reuse International, we exclusively sell used and rebuilt Liebherr parts and components. We have a large selection of parts for several categories of machines including material handlers, excavators...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>cochraninc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10316</link>
<guid>f40723ed94042ea9ea36bfb5ad4157b2</guid>
<pubDate>Sun, 20 Aug 2023 08:29:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>cochraninc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dda39dc80af7525bd8c5f4a5fe340fb975b6c5ac1aad0d018b97b173e87e233f</i><br /><br />Threat actor <b>description</b>: <i>About Cochran: Today, under the leadership of Walter’s granddaughter LeeAnn, Cochran is a major force in the electrical, technology, and shore power industries. With revenues exceeding $200M, we’re big enough to offer a broad range of services and ca...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>goldmedalbakery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10312</link>
<guid>db0cf003e7db9592288d809665cfeb2a</guid>
<pubDate>Sat, 19 Aug 2023 16:02:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cuba</b> claims attack for <b>goldmedalbakery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0cf32c9eb8042d0d42cec9cf5cf4bf467097ee7fb4033b9a0b36009205626220</i><br /><br />Threat actor <b>description</b>: <i>Gold Medal Bakery aspires to follow three core values in every aspect of its business.Integrity: Gold Medal has built its reputation on meeting the needs of our customers and the millions of consumers they serve. Thus, integrity is...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cuba</category>
</item>
<item xmlns:dc='ns:1'>
<title>ABS-Auto-Auctions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10303</link>
<guid>d78bded526b07ede88675c6412d63f3d</guid>
<pubDate>Fri, 18 Aug 2023 22:12:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>ABS-Auto-Auctions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>58ef29f743cf88376e7941339e6709cc6ec747840a84e1b8ce31ed2c2b6363bb</i><br /><br />Threat actor <b>description</b>: <i>California, United States</i><br />Target victim <b>website</b>: <i>www.absautoauctions.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Miami-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10305</link>
<guid>da16202114b72b61f71124a219db6e3e</guid>
<pubDate>Fri, 18 Aug 2023 22:11:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Miami-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d366d9e523b520671fe54101567d238a565ae5ee72703fc3c633e540e30b0b42</i><br /><br />Threat actor <b>description</b>: <i>Florida, United States</i><br />Target victim <b>website</b>: <i>www.miamimanagement.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>BTC-Power</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10306</link>
<guid>90c34175923a36ab7a5de4b981c1972f</guid>
<pubDate>Fri, 18 Aug 2023 22:11:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>BTC-Power</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>152d43cac513d14434b3d37dee5c951278b855c8a30c984914bb331ef20db007</i><br /><br />Threat actor <b>description</b>: <i>California, United States</i><br />Target victim <b>website</b>: <i>www.btcpower.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stanford-Transportation-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10307</link>
<guid>f06adf060c098f11e76fa2ff1565ba70</guid>
<pubDate>Fri, 18 Aug 2023 22:10:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Stanford-Transportation-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ecfaa84b0bd5174bc15761b4d35db0325ed1c8dbcd282ad7f7f766eeef9b1b03</i><br /><br />Threat actor <b>description</b>: <i>USA</i><br />Target victim <b>website</b>: <i>www.driveforstanford.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>umpquabank.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10302</link>
<guid>b578f2a52a0229873fefc2a4b06377fa</guid>
<pubDate>Fri, 18 Aug 2023 22:02:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>umpquabank.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea705cb065d7b77944f856aa91d48072b98761bb7b5217106398720f11e575a9</i><br /><br />Threat actor <b>description</b>: <i>Umpqua Bank: Together for better</i><br />Target victim <b>website</b>: <i>https://www.umpquabank.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Legends-Limousine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10300</link>
<guid>f9d396c7f5a391a9251c5fa6d49aa873</guid>
<pubDate>Fri, 18 Aug 2023 20:43:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Legends-Limousine</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c35ccea528ac472c5ec2149594910cf04f65e18d68d86638db0bac6aa8ff79dc</i><br /><br />Threat actor <b>description</b>: <i>New York, United States</i><br />Target victim <b>website</b>: <i>www.legendslimousine.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Oneonline</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10301</link>
<guid>b1f130b49d0fcfa2348098ee4467452f</guid>
<pubDate>Fri, 18 Aug 2023 20:42:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Oneonline</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a1c912da77494848fb885702a01239d959cc8a979df2d26bb52f9046a851405</i><br /><br />Threat actor <b>description</b>: <i>Utah, United States</i><br />Target victim <b>website</b>: <i>www.oneonline.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>neolife.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10297</link>
<guid>ca5fbbbddd0c0ff6c01f782c60c9d1b5</guid>
<pubDate>Fri, 18 Aug 2023 16:04:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>neolife.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>62b4e61e0b1677884824c9ca1c9c8ca1811e21a6238dd4bb349cc32f52f2a30a</i><br /><br />Threat actor <b>description</b>: <i>NeolifeFood & Beverage · California, United States · 135 EmployeesNeoLife International Ltd is a company that operates in the Health, Wellness and Fitness industry. It employs 101-250 people and has $10M-$25M of revenue.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>mitchcointernational.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10296</link>
<guid>6439f1811e3c2d3f8870ea979b91a5a3</guid>
<pubDate>Fri, 18 Aug 2023 11:30:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>mitchcointernational.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ef4552a6ec05c1e80f945e7d1d397ac18eb787ae59ec49bc5d4740922a67083</i><br /><br />Threat actor <b>description</b>: <i>Mitchco International is a privately owned defense contractor focused on providing staffing and food service support to military facilities throughout the United States. Mitchco International based in Louisville, KY, and offer food service support to...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>tedpella.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10295</link>
<guid>3e53ca3d4e69bc938071715257cc62b9</guid>
<pubDate>Fri, 18 Aug 2023 11:29:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>tedpella.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dff19f1a72411780b9ec002999c26c7a643a0b760c37911abb670f552a236589</i><br /><br />Threat actor <b>description</b>: <i>We manufacture and sell instruments and supplies to serve laboratories dedicated to a variety of types of microscopy: Transmission and Scanning Electron Microscopy, Electron Microprobe Analysis, Atomic Force Microscopy, Confocal Laser Microscopy and...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>umchealth.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10292</link>
<guid>dbafb94acd0f5bb51afb63a64a03bf2f</guid>
<pubDate>Thu, 17 Aug 2023 20:33:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>umchealth.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c31ffcf1ffc902e882cc25ab2f5f18d248d9189fa264f83d7335bcbfe8ab72d8</i><br /><br />Threat actor <b>description</b>: <i>At United Medical Centers we continually strive to provide the highest quality, affordable, and accessible healthcare services to residents of Eagle Pass, Del Rio, Brackettville and surrounding communities. With nine (9) locations, we proudly serve t...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>SHO2</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10287</link>
<guid>982025df3dc7f9eae503a74980c29713</guid>
<pubDate>Thu, 17 Aug 2023 18:11:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>SHO2</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a286b7cb2f59068d575dbf7bebca035097e156c5311686b03ad528ff0f31d96</i><br /><br />Threat actor <b>description</b>: <i>SHIELD PACKAGING CO., INC
We have been helping customers get to market since 1956. Our product
 list includes regulatory compliant aerosol formulations for household, 
automotive & industrial applications. We have strong commitment to 
the future of the aerosol and liquid packaging industry and have 
provided for substantial future growth. As a contract packager, we offer
 a full range of packaging services, as our success depends on our 
knowledge and flexibility to adapt to your needs.SITE: https://www.shieldpackaging.comADDRESS
50 OXFORD AVENUE
DUDLEY, MA 01571</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>WCC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10284</link>
<guid>f17a33840b3e520949d36b24ebad7fb0</guid>
<pubDate>Thu, 17 Aug 2023 18:11:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>WCC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e0b40b4a5d027c94aa13a1f733d0dc65d696719d37329e92999043e270f56369</i><br /><br />Threat actor <b>description</b>: <i>Winger Companies
 is a full line Commercial and Industrial contracting company. 
Specializing in Data Technology, Electrical, Fire Protection, HVAC, 
Millwright, Plumbing, Process Piping, Refrigeration and Steel 
Fabrication. Maintenance Services are offered for all trades.SITE: www.wingercompanies.comADDRESS
918 Hayne Street
P.O. Box 637
Ottumwa, IA — 52501
Phone (641) 682-3407
Fax  (641) 682-2421</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>LEHIGHONE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10285</link>
<guid>7e89a8359796a1df17bd75d09abbefed</guid>
<pubDate>Thu, 17 Aug 2023 18:11:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>LEHIGHONE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04f892e5c3433066430b70aabd0d8b389d0f5317b6c72a57a1118c7302e28b19</i><br /><br />Threat actor <b>description</b>: <i>Lehigh Construction Group,
 Inc. was founded in 1984 by Dave Knauss and Tom Glomb as commercial 
general contractors for Buffalo and Western New York businesses.
Over 39 years later we have grown into one of Buffalo’s most trusted
 commercial general contractors, offering a full array of commercial 
construction services.
From small scale building maintenance and repairs to complete 
new-builds & plant additions Lehigh provides expertise in all 
aspects of construction.  Let us be your commercial general contractor 
or construction manager on your next building project.SITE: www.lehighconstructiongroup.comADDRESS
4327 S Taylor Road
Orchard Park, NY 14127</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>SBP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10286</link>
<guid>41869b81c91e34f789fb0175802326d3</guid>
<pubDate>Thu, 17 Aug 2023 18:11:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>SBP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1578561801678404d7a6a230352d7ce9d2815574779e61320992e98fb03edde3</i><br /><br />Threat actor <b>description</b>: <i>Phillips Staffing
Since 1968, we have connected people and companies, with a passion for recruiting and creating great outcomes.
The staffing and recruiting business is made up of equal parts 
“science” and “art.” There is no one universal method or solution that 
works across the board. Every workplace is different. Every job is 
unique.
We are a South Carolina company – founded here, headquartered here, 
and with locations around the state – which not only gives us insight 
into our local economies and markets, but also puts decision-making and 
resource allocation right where it needs to be – close to our clients 
and employees.SITE: www.phillipsstaffing.comADDRESS
PO Box 5664
Greenville, SC 29606
Phone: (864) 242-4144
Toll Free: (800) 277-1018</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>RHA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10279</link>
<guid>4cefe7c7083cf416b7d3cf7bd5cb8153</guid>
<pubDate>Thu, 17 Aug 2023 18:07:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>RHA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f2af7efb2145d38e57d73f77d7b9c742d8a71ed9325d4ad6b4739d7440b1e2a</i><br /><br />Threat actor <b>description</b>: <i>The mission of the Raleigh Housing Authority
 is to provide safe, quality, affordable housing to low and moderate 
income families in the greater Raleigh community, and to promote 
personal responsibility and self-sufficiency of residents while 
maintaining the fiscal integrity of the agency.SITE: www.rhaonline.comADDRESS
900 Haynes St, Raleigh
North Carolina, 27604
United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>ASI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10280</link>
<guid>bbe62ff5da2b206721427d943e8ae991</guid>
<pubDate>Thu, 17 Aug 2023 18:07:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>ASI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a91682050cf9562204ed196a87f7c5e3d5394965041ce786dd71f754509b5edc</i><br /><br />Threat actor <b>description</b>: <i>Andromeda Systems Incorporated
 provides unparalleled expertise and capabilities in the Reliability, 
Maintenance, Supportability, Engineering, and Logistics disciplines. Our
 staff of nationally and internationally recognized leaders are shaping 
industries and developing revolutionary solutions to improve physical 
asset management. Leverage our experience and cutting-edge analytical 
tools to improve asset performance and reduce life-cycle costs.
Our team of engineering, supportability, information technology, and
 maintenance experts, will partner with your organization to develop an 
optimum maintenance and support system that will reduce cost and 
maximize the performance of your plant, facility, fleet, or critical 
infrastructure. We provide a variety of technical services and products 
to help you get the most from your physical assets and fleets at the 
lowest possible cost.SITE: www.androsysinc.comADDRESS
440 Viking Drive, Suite 230
Virginia Beach, VA 23452</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>ESTECH</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10281</link>
<guid>6356d91dc6015575d84dc35e14ef20e3</guid>
<pubDate>Thu, 17 Aug 2023 18:07:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>ESTECH</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>117f2f79d8bbec8bf6d53b9c334dcc0670c25dcc71b192cf5217cebae9d923b3</i><br /><br />Threat actor <b>description</b>: <i>Estech Systems, Inc.(ESI)
 delivers high-performance cloud and on-premises phone systems that are 
easy to use and uniquely integrated. ESI provides end-to-end 
communication solutions that give businesses the power to choose the 
features that they need to meet their goals. ESI is a privately-held 
corporation headquartered in Plano, Texas.
Founded in 1987, the company has sold over 400,000 phone systems and
 deployed more than three million phones nationwide. ESI was the first 
company to build a truly combined telephone and voice mail system, as 
well as the first to build a purely IP-based business communications 
system, and has numerous patents granted or pending on its products’ 
unique designs and capabilities. ESI is highly regarded for supporting 
uniquely integrated, real-world applications with practical and 
effective features.SITE: www.esi-estech.comADDRESS
3701 E. Plano Parkway
Ste. 300 Plano
TX 75074-1819</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>ABTBANK</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10277</link>
<guid>23b1f559d8bd157d0d741c83957ed4f2</guid>
<pubDate>Thu, 17 Aug 2023 18:07:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>ABTBANK</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dffd9ead6894af50eaac36f20104344c77529abe5fa3ff15eb146ed2c89c08b1</i><br /><br />Threat actor <b>description</b>: <i>Adams Bank & Trust Nebraska
Whether you are an individual, business, or public entity, the 
IntraFi Network can give you peace of mind regarding your money’s FDIC 
coverage. With an IntraFi account, you work with a bank you know and 
trust and your information remains secure with AB&T - all while the 
network provides you multi-million-dollar FDIC coverage! There are term 
deposit options AND liquid options giving you access to your funds 
whenever you need them. Also, the funds are reciprocal, benefiting your 
community and other customers of AB&T. Let’s connect to see if an 
IntraFi account is right for you.SITE: www.abtbank.comADDRESS
315 N Spruce St
PO Box 720
Ogallala, NE 69153</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>ARROWAVIATIONCO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10278</link>
<guid>e0e1b6a0eb55ea709950db7c4671ff16</guid>
<pubDate>Thu, 17 Aug 2023 18:07:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>ARROWAVIATIONCO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b93e07cd9c401e7c387e6c0ec2c5e7436249253ca8b8c8a3e90e53475dc2364e</i><br /><br />Threat actor <b>description</b>: <i>Arrow Aviation
 is a trusted resource for helicopter services, parts sales and 
helicopter leasing. From our 125,000 square foot facility in Broussard, 
Louisiana, we provide high quality services at competitive prices, 
supporting all sectors of the helicopter industry.
We offer the full range of aviation services. Our expert technicians
 provide avionic installations, structural repairs, inspections & 
maintenance, engine and component overhauls, hydraulic services, custom 
aircraft painting, and more. Through our partner manufacturing company, 
Helifab, we are able to provide STC kits. As an authorized service 
center for Airbus, Bell, Garmin, Leonardo, Rolls-Royce, and Sikorsky, we
 offer the highest standard of services across a wide range of 
manufacturers and models. As a leader in the helicopter industry since 
1997, we have the aviation solutions you need.SITE: https://www.arrowaviationco.comADDRESS
1318 Smede Highway
Broussard, LA 70518</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>RIMSS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10274</link>
<guid>2779fda014fbadb761f67dd708c1325e</guid>
<pubDate>Thu, 17 Aug 2023 14:26:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>RIMSS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7662f9af0d609448480d61096d13543c279031510a1f7ed261cb9f55fd99b403</i><br /><br />Threat actor <b>description</b>: <i>RIMSS provides dealer support services to agricultural, truck, construction, and bus dealerships throughout the U.S. RIMSS is one of that companies who doesn't care when their corporate information is open to public. Why shouldn't we share it with people who are interested in such data? Wait for upload.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>SFJAZZ.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10271</link>
<guid>1b5959f90b8e4966b8ea257c4352ebe9</guid>
<pubDate>Thu, 17 Aug 2023 13:02:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>SFJAZZ.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b082df719673fdac6a1d49558170e6a252df9e0417f8b174eb7d31b4b87926e5</i><br /><br />Threat actor <b>description</b>: <i>SFJAZZ CenterMedia & Internet · California, United States · 99 EmployeesFounded in 1983, SFJAZZ is the largest nonprofit presenter of jazz and education programs in the western United States. SFJAZZ presents over 100 concerts a year to over 100...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>mybps.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10272</link>
<guid>cae7115f44837c806c9b23ed00a1a28a</guid>
<pubDate>Thu, 17 Aug 2023 13:01:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>mybps.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0910252c085be11b26e89895cb93b2468265f5ab2a556651327785e7f7302fd4</i><br /><br />Threat actor <b>description</b>: <i>BPS Tax & Accounting Services - Business InformationAccounting Services · Georgia, United States ·</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>kriegerklatt.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10273</link>
<guid>995d8b30b557a46be7d27e26b689ad55</guid>
<pubDate>Thu, 17 Aug 2023 13:00:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>kriegerklatt.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3feefb8991852979f95f2e862cc924a2b229d02084b4c0fec437ca62248ce0f5</i><br /><br />Threat actor <b>description</b>: <i>Krieger Klatt Architects - Business InformationArchitecture, Engineering & Design · Michigan, United States ·</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>ALLIANCE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10265</link>
<guid>88591b4d3219675bdeb33584b755f680</guid>
<pubDate>Thu, 17 Aug 2023 12:59:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>ALLIANCE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c4c81d96925841b67e82f45cb0297283ac33c7d07c7ba8245110a4d8ebc1a710</i><br /><br />Threat actor <b>description</b>: <i>Alliance Solutions Group is a family of highly specialized, relationship-oriented staffing and recruitment companies that deliver personalized staffing solutions to a wide range of niche industries. Our goal is to make a difference in the lives of our clients and candidates by building the foundation that helps them thrive. To our clients: We know that business success is highly reliant on having the right people in the right positions. We employ subject-matter experts with deep experience not only in the realm of staffing but also in the specific industries we serve, ensuring that our clients get the best talent for their niche needs as soon as possible. To our candidates: We know your job search is about more than filling a line on your resume; it’s about finding a fulfilling career. We will partner with you to find out what motivates you, what interests you and what value you bring to an organization, then we’ll find an ideal match between your capabilities and your ambitions so you can grow and flourish professionally.SITE: www.alliancesolutionsgrp.com Address  6161 Oak Tree Blvd #300 Independence, OH 44131</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>SYNQUESTLABS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10268</link>
<guid>b433da1b32b5ca96c0ba7fcb9edba97d</guid>
<pubDate>Thu, 17 Aug 2023 12:58:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>SYNQUESTLABS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b98fcb45dc754fce9b0b9f53f3ef5469cb0263409389a4a43e0b3c32ac63932</i><br /><br />Threat actor <b>description</b>: <i>SynQuest specializes in fluorinated organic and inorganic chemicals, providing a creative and innovative range of building blocks, reagents and compressed and liquefied gases. We offer chemical services designed to expedite your research from conception to pilot quantities. We have 5200 in chemicals in stock and can custom manufacture to your specifications. SynQuest maintains focus on fluorine chemistry, as well as extending our range of reagents with new materials requested by our customers and from our internal R&D programs for the development of new products. Since the acquisition of SynQuest by Central Glass (Japan) in 2002, our two companies have worked together, closely taking advantage of the different strengths to be found in each organization. Central Glass Group can offer customers a seamless transition from small scale laboratory research and pilot scale at Synquest, through to full commercialization at Central Glass Germany and Japan. SynQuest is a bulk stocking location of Central Glass products, particularly Trifluoromethanesulfonic acid and Trifluoromethanesulfonic anhydride.SITE: https://www.synquestlabs.com Address  SynQuest Laboratories, Inc. 13201 Rachael Blvd, Rt 2054 Alachua FL 32615 USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>TWINTOWER</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10269</link>
<guid>0b518a250c90421f0a3b4f32e8312e3d</guid>
<pubDate>Thu, 17 Aug 2023 12:57:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>TWINTOWER</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>acd99f67be91fa5f560f93a46e80f0f6b3d90dcf25ae45cd05a890206893f5f5</i><br /><br />Threat actor <b>description</b>: <i>Since its inception in 1993 when it was located in New York City, Twin Towers Trading has been setting the standard in the field of live demonstrations. Whether on television or in retail environments, TTT has garnered a well-deserved reputation for presenting unique products with dynamic and engaging presentations referred to as “retailtainment.” Millions of people are enthralled yearly, and today, in addition to its corporate headquarters in Manalapan, New Jersey, TTT’s offices in Sarasota, Las Vegas, Bentonville and Toronto, and overseas in London, Frankfurt, Paris, Madrid, Prague, Warsaw, Mexico City, Sydney, Auckland and Johannesburg, are dedicated to providing unparalleled customer service to its vast customer base.SITE: www.twintowerstrading.com Address  7168 15th St E, Sarasota Florida, 34243, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Camino-Nuevo-CharterAcademy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10270</link>
<guid>73dd2e5d59ee0b29b52058d4393b170f</guid>
<pubDate>Thu, 17 Aug 2023 12:57:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Camino-Nuevo-CharterAcademy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81f583bc99b0e73753b8473a8d7a9ad294fbccb77b682f0f4d99ae7e9db30dc3</i><br /><br />Threat actor <b>description</b>: <i>Camino Nuevo Charter Academy educates students in a college preparatory program. We will be uploading their 75GB data shortly. Youwill find some personal information there: ssns, passports, and other business documents. Please expect it soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Smart-swgcrc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10263</link>
<guid>83f344600d15cbf1ed5cb005db32f994</guid>
<pubDate>Thu, 17 Aug 2023 11:31:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>Smart-swgcrc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e55241d343c23af350687cb0ca02aab63ddc144e8b560c64196a31f6f0733ce</i><br /><br />Threat actor <b>description</b>: <i>Smart-swgcrc.orgColleges & Universities · Mississippi, United States ·</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Clifton-Public-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10264</link>
<guid>5b5abc705cc52b743cc9d6ad5fffdfa4</guid>
<pubDate>Thu, 17 Aug 2023 11:30:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-Clifton-Public-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ee05b28f3b01f454118fd9018e4a7fd05c21aee3390deebf7b9c4f722d9f4ba</i><br /><br />Threat actor <b>description</b>: <i>The Clifton Public Schools is a comprehensive community public school district that serves students in pre-kindergarten through twelfth grade. The leadership of this district has priced their school information too cheaply, which is the reason their internal information is here. As always, 60 GB of school documents with detailed personal information will be posted here. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dillon-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10254</link>
<guid>805b74daca86ea2e20ca9c166ee52f9e</guid>
<pubDate>Wed, 16 Aug 2023 20:54:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>metaencryptor</b> claims attack for <b>Dillon-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6d7b2206cf3fd1ca362afd4995c8837b34a97d667a34dd0a68c964eceeb1b88</i><br /><br />Threat actor <b>description</b>: <i>Established in 1914, Dillon Supply distributes industrial products. They are heaquartered in Raleigh, North Carolina. Parent company Descours & Cabaud. D&C is a 200-year old company that is the European leader in MRO, Industrial and Construction Supply with over 650 locations worldwide. Sales: $313,865,000 Year 2021</i><br />Target victim <b>website</b>: <i>https://dillonsupply.com</i>]]></description>
<category>metaencryptor</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cequint</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10250</link>
<guid>183f50a7700982a3ed18ff6d7a5777bf</guid>
<pubDate>Wed, 16 Aug 2023 18:58:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Cequint</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a9aa5a0228bab21b59ac2f4c7d91a481e4a3935607ed33d4b2f04f0ef539357</i><br /><br />Threat actor <b>description</b>: <i>Cequint Inc. provides caller identification (ID) solutions for mobile devices. 880 GB of data is what we got from their network. Alarge number of different documents. The most interesting in this case are the source codes and information about the company's projects. In addition, as you realize, there are a lot of personaland financial documents. Please wait for the release.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tally-Energy-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10249</link>
<guid>28fda3e1d182e68d525267166df815af</guid>
<pubDate>Wed, 16 Aug 2023 17:31:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Tally-Energy-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>656bf0064ff5e204bab9b9e8375ff7bece0aea51a7f63d8fac28e444dbd417e0</i><br /><br />Threat actor <b>description</b>: <i>Tally Energy Services is an integrated oilfield services company committed to helping our customers “make better wells.” We wantedto help these folks make their cyber defenses a little better, but we failed. Soon you're going to see 130GB of their data here. As always, there's a bunch of personal employee records with medical information and emergency contacts. Financial and incident reports are also prominently displayed.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>MBOAMERICA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10247</link>
<guid>bcd0049c35799cdf57d06eaf2eb3cff6</guid>
<pubDate>Wed, 16 Aug 2023 15:58:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MBOAMERICA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df98cbc92113267ccf19c2334aea2e8120ad732af44963269d5b5fe29b5650fd</i><br /><br />Threat actor <b>description</b>: <i>Home - MBO America</i><br />Target victim <b>website</b>: <i>https://www.MBOAMERICA.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ToyotaLift-Northeast</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10241</link>
<guid>1379719828be9ee6b08ca64edb818e2b</guid>
<pubDate>Wed, 16 Aug 2023 06:58:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>ToyotaLift-Northeast</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2db6c447e9845da67d3672b1205b01fe6591fd0efadfd78fe6e6dcf71c010329</i><br /><br />Threat actor <b>description</b>: <i>Offering forklifts, aerial work platforms, lift trucks, & material handling equipment by Toyota industrial equipment, Raymond, Skyjack, Genie, JLG, Clark. ToyotaLift Northeast is the best place to find high-quality new and used lift trucks. We are a full service material handling equipment dealership at all seven of our locations (PA, NJ, DE, MD and NY) offering forklift sales, service, parts, rental, OSHA forklift training and safety education. Our goal is to provide services that matches the high quality standards of the Toyota forklift products; services that will be unmatched in the greater Philadelphia, New Jersey, New York, Delaware and Maryland areaswww.toyotaliftne.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Recaro</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10238</link>
<guid>db261d4f615f0e982983be499e57ccda</guid>
<pubDate>Tue, 15 Aug 2023 18:45:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Recaro</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>67f86509589a7bb37c78d2e5165be4095ad94329697912c52e287bc4bd7d475b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Keystone-Insurance-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10234</link>
<guid>8eb4b4c01bf3375828c5494c2f6e7685</guid>
<pubDate>Tue, 15 Aug 2023 04:09:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Keystone-Insurance-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3609cebbc8ca32ab4b3ab92b6f750c7223bb5a1a9860b8fc4d4b1da0b6663be9</i><br /><br />Threat actor <b>description</b>: <i>An independent insurance agency in Orem, Utah & an authorized Bear River Mutual® Insurance agency. Let us customize rates & policies based on your needs. We opened a 2nd office in Payson UT! Keystone Insurance Services is a locally-owned and operated insurance agency serving businesses and residents in Utah. Based out of Provo, their agents are able to provide their clients with comprehensive insurance policies for a variety of concerns, such as home, life, auto, renters, earthquake, dental, and more. They carry Bear River Mutual®, Travelers®, Progressive®, Safeco®, and morehttps://keystoneinsurance.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Freeport-McMoran---NYSE-FCX</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10231</link>
<guid>d36cad380b069785900bcfd258bdecea</guid>
<pubDate>Mon, 14 Aug 2023 22:45:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Freeport-McMoran---NYSE-FCX</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>64831f52e19861c4f62fd2d972ee5324dcffc61a866e3126d11bebf260207d6f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>jhillburn.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10230</link>
<guid>a952ddeda0b7e2c20744e52e728e5594</guid>
<pubDate>Mon, 14 Aug 2023 21:59:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>jhillburn.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b3f8840af95de5bba2f747beed8ce29f8cda266675387ddc57de857fda1809ed</i><br /><br />Threat actor <b>description</b>: <i>J.Hilburn started with one mission: to guarantee fit and eliminate unnecessary markups in menswear.We obsessively re-engineered menswear to provide men with a custom-made wardrobe that fits - fits his body, fits his personality, and fits his life...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>John-L-Lowery--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10227</link>
<guid>c0a0756dd0a93eb7c840fdeb3c65808e</guid>
<pubDate>Mon, 14 Aug 2023 16:04:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>John-L-Lowery--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc9b2d51734a8005d1cc2d4ee172b4a968edb0bb7cc746f7ebc515e8318a040b</i><br /><br />Threat actor <b>description</b>: <i>John L. Lowery & Associates, Inc. was organized in 1964 to provide versatile and comprehensive engineering and technical services for the petrochemical industry.  We have grown and now employ all levels of professional a...</i><br />Target victim <b>website</b>: <i>https://www.johnllowery.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>leecorpinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10226</link>
<guid>edfccb5cf44f7c2c385f8d4470117a0d</guid>
<pubDate>Mon, 14 Aug 2023 15:59:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>leecorpinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b1b10602dd0ce2cadd8ea9132c2590daecd184da7823e9e8d46e300b2f586f9</i><br /><br />Threat actor <b>description</b>: <i>We are dedicated to helping you realize your Florida Lifestyle dream. Since 1983, our family-owned business has been busy helping people find the perfect fit in South Florida Manufactured Housing. Download many private data.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>econsult.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10225</link>
<guid>dfb8e1450abdf50cc0f260e0e7a62296</guid>
<pubDate>Mon, 14 Aug 2023 14:25:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>econsult.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>58b6284f0332fb4e0142c8abd8b9f0b087ef1c2239133ec7b8c5e9fafd6c6132</i><br /><br />Threat actor <b>description</b>: <i>Law Firms & Legal Services · Pennsylvania, United States ·</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Saint-Xavier-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10224</link>
<guid>8ee30f15c1c633d3e1c8a9aae5cfda35</guid>
<pubDate>Mon, 14 Aug 2023 12:54:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Saint-Xavier-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3f521edbcbb1cb5a9610c3ec4628346ded3afef27c51df06573e30c76a7c14b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Borets-Levare.com-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10222</link>
<guid>3f4bd1f117b18afa131c48de15486652</guid>
<pubDate>Mon, 14 Aug 2023 06:03:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Borets-Levare.com-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8fac6e184961e4b071bd75448d531684e4f120614ef16129114e356675fe7d6f</i><br /><br />Threat actor <b>description</b>: <i>Borets (Levare.com) is Headquartered in Houston, Texas, with an international headquarters in Dubai, Borets is a global provider specializing in the engineering, manufacture, sales and service of Electric Submersible Pump systems.  Uploaded Data Size: 1TB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Armortex</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10210</link>
<guid>7570284063f2de77ff3145e5f321f2c5</guid>
<pubDate>Sat, 12 Aug 2023 06:59:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Armortex</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4c4162a760b29668fe3b8965c30aec68b2e58fb8ec11fad2fa8924bc09b9642a</i><br /><br />Threat actor <b>description</b>: <i>Armortex has been manufacturing bullet and blast resistant and physical security products in its state-of-the-art facility in Schertz, TX, since 1980.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>arganoInterRel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10208</link>
<guid>acb55f9af76808c5fd5522dcdb519fde</guid>
<pubDate>Sat, 12 Aug 2023 04:42:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>arganoInterRel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ffe3a92a49f01ef2e1dccd4e0cf51426e1fe6a015def8a1b7966dd938c570b5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rite-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10207</link>
<guid>8171ac2c5544a5cb54ac0f38bf477af4</guid>
<pubDate>Fri, 11 Aug 2023 12:58:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Rite-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9bebf1116075d4c4c20981161cd9cb78bded09cae5741444a60d6b5c8aee23bd</i><br /><br />Threat actor <b>description</b>: <i>Rite Technology company offers products including copiers, printers, HP products and Sharp Aquos white boards. We will share a zipwith their data of about 15 GB containing good HR data with passport and ssns information of employees. There are also interesting accidents information and business documentation.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>EAI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10204</link>
<guid>51ef70624ca791283ec434a52da0d4e2</guid>
<pubDate>Thu, 10 Aug 2023 22:08:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>EAI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2a9af3cc0b6d8a4b71de6e1f9fe1bb048481c2727035916fcbb4a62b9453192</i><br /><br />Threat actor <b>description</b>: <i>USA</i><br />Target victim <b>website</b>: <i>www.eaiweb.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Belt-Railway-Company-of-Chicago</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10201</link>
<guid>7fd3b80fb1884e2927df46a7139bb8bf</guid>
<pubDate>Thu, 10 Aug 2023 15:59:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-Belt-Railway-Company-of-Chicago</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>27e9ea59d2cb0d4040ae9c9ec539f813e5f374eb34695ce1e9361368aa088c44</i><br /><br />Threat actor <b>description</b>: <i>The Belt Railway Company of Chicago has a strong safety foundation and history, and employees continuously strive for zero incidents. But there was an incident that caused 85 GB of their data appearing on our server. BRC management decided to stay silent with us so we will upload all their documents soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Optimum-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10199</link>
<guid>0237a65a5396a6e4a6da6e1308ccc4e0</guid>
<pubDate>Thu, 10 Aug 2023 13:27:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Optimum-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5880eeb3fca639cf908473f0fa625872daa5c636239c9fa5bfe31cd8d91242e2</i><br /><br />Threat actor <b>description</b>: <i>Optimum Technology is dedicated to developing solutions that helpkeep law enforcement and communities safe. They haven't developed any solutions for cyber security yet so we will share 77Gb of their data soon. SQLs, personal docs, and other business information. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Boson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10200</link>
<guid>c1c6fff1643a3af5bd167488ff19012d</guid>
<pubDate>Thu, 10 Aug 2023 13:27:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Boson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>292d4f04add168706c30d8833d965359594d88f317950f2a949050f3173fd3b2</i><br /><br />Threat actor <b>description</b>: <i>Boson offers IT learning software to individuals, businesses, academic institutions and government entities around the world. We gained access to their network found some files there. We will upload the soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stockdale-Podiatry</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10198</link>
<guid>ebc52c59616af7800f2beee546111646</guid>
<pubDate>Thu, 10 Aug 2023 09:18:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Stockdale-Podiatry</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>edc5d598468ad27e1a6b02626d0ac1616a8d0058f55caff0d30d39c9fa9acb4e</i><br /><br />Threat actor <b>description</b>: <i>It’s our pleasure to welcome you to the new online home of Stockdale Podiatry Group representing our offices located in Bakersfield CA, Delano CA, Visalia CA, and Porterville CA. It is our sincere hope that you find this website to be informative and helpful. https://www.wetreatyourfeet.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>oneatlas.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10197</link>
<guid>ea67d66c5b01e5aa93fd5407f041b53d</guid>
<pubDate>Wed, 09 Aug 2023 22:59:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>oneatlas.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45177260ddb607733bb7af1a8c4a079767a8a4b3e06d5780dd51548fa17253de</i><br /><br />Threat actor <b>description</b>: <i>40 GB DATAAtlas provides professional testing, inspection, engineering, environmental and consulting services from more than 100 locations nationwide. We deliver solutions to both public and private sector clients in the transportation, commercia...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lower-Yukon-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10196</link>
<guid>e23330785f499c128030ab1b7281f37a</guid>
<pubDate>Wed, 09 Aug 2023 18:04:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Lower-Yukon-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e01b6a351276a2847023b8af085d4f6963854005e0623a6a79c75e0224a45782</i><br /><br />Threat actor <b>description</b>: <i>The ten villages that comprise the Lower Yukon School District are spread across 22,000 square miles. The Yukon River, one of the largest rivers in North America, winds through our yards on its way to the Bering Sea.The ...</i><br />Target victim <b>website</b>: <i>https://www.lysd.org</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>el-cerrito.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10188</link>
<guid>76309eaf4f00ff4400a28da671b8ff91</guid>
<pubDate>Wed, 09 Aug 2023 14:57:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>el-cerrito.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e283dc4f1f3d65452414d2338d72236359b81a3599bb685e19556f2ae2e94e5c</i><br /><br />Threat actor <b>description</b>: <i>El Cerrito is a city in Contra Costa County, California, United States, and forms part of the San Francisco Bay Area.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>TIMECO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10187</link>
<guid>18df51b97ccd68128e994804f3eccc87</guid>
<pubDate>Wed, 09 Aug 2023 14:54:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>TIMECO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c9d1876227475d4d5172d8b3c2470c597fa90008034a332e19a52842ed084e6</i><br /><br />Threat actor <b>description</b>: <i>Thousands of business owners use TIMECO to maximize their billable hours, eliminate time theft, decrease operating costs, and process payroll in minutes. As we've managed to penetrate to the network of this company, some of that businesses are at risk now. Currently, we working on gaining accesses to them.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>asfcustomers.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10185</link>
<guid>00db544eb12c05386ea51a6bff8803e7</guid>
<pubDate>Wed, 09 Aug 2023 14:37:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>asfcustomers.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ca294b2f377df1abe4f8278b5eccfc4a39c5256b9e028698e2cf4d0f3b3417d</i><br /><br />Threat actor <b>description</b>: <i>ASF is an indirect automobile financing source for a select number of vehicle dealers located in the Hampton Roads area of Virginia.Founded in 1998, we are a second generation controlled family operation that actually takes the time to listen to th...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>unitycouncil.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10178</link>
<guid>728678f9db419eeaa3476663764e1456</guid>
<pubDate>Wed, 09 Aug 2023 08:58:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>unitycouncil.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b59072d129879be44ee4779360bf67c3a5d69a3b207305eade1720f578b2084</i><br /><br />Threat actor <b>description</b>: <i>The Unity Council is a non-profit Social Equity Development Corporation with over 50 years of history in the Fruitvale neighborhood of Oakland. Our mission is to promote social equity and improve quality of life by building vibrant communities where...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>independenceia.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10177</link>
<guid>373f32fe149adc95e1dae88d8993a678</guid>
<pubDate>Wed, 09 Aug 2023 08:41:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>independenceia.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d6f3ac67d43f544c26d10213b00824d349d003af0252b2646b1e7e89f9221d09</i><br /><br />Threat actor <b>description</b>: <i>Independence Public Library</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ramtha</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10176</link>
<guid>1166cfff15f5aaabfc0f3803975991ae</guid>
<pubDate>Wed, 09 Aug 2023 06:40:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Ramtha</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aee93186084fd31ac05abca2cbe3c3c812ad30c252f7c04606136541bede030c</i><br /><br />Threat actor <b>description</b>: <i>Ramtha The teachings of Ramtha are a unique science.</i><br />Target victim <b>website</b>: <i>https://www.ramtha.com/</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Magic-Micro-Computers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10173</link>
<guid>7866731eed67dc3be9693b33f50fdb48</guid>
<pubDate>Tue, 08 Aug 2023 12:53:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Magic-Micro-Computers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>687963f4dc256b9f12afb1d3a1a4a105bd8d3eb4ef27fabe1636a1a5713c6a08</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Emerson-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10172</link>
<guid>e447193f2b83d789c98a82a7ef958736</guid>
<pubDate>Tue, 08 Aug 2023 08:47:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Emerson-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>386d43f64b70a03802d86a333cee59cee6b3a61de4b349aaaec252d6e9733b4f</i><br /><br />Threat actor <b>description</b>: <i>The Emerson School District is a comprehensive community public school district that serves students in pre-kindergarten through twelfth grade from Emerson, in Bergen County, New Jersey, United States. There are currently about 1,200 students enrolled in the school district.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>G-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10169</link>
<guid>ddd808772c035aed516d42ad3559be5f</guid>
<pubDate>Mon, 07 Aug 2023 17:55:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>G-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db45dd77d00f12a373adb2dc1db49bf17a011bab97fb5adc380e780740ab593e</i><br /><br />Threat actor <b>description</b>: <i>Company that operates in the Accounting industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>varian.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10161</link>
<guid>b569502f473b890f9fcfc45b8a227baa</guid>
<pubDate>Mon, 07 Aug 2023 08:49:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>varian.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>09bc021dd13a84fbe1d56d3801007613ae91eb6ea7103557fa61d18f11cf073d</i><br /><br />Threat actor <b>description</b>: <i>An American 3 billion dollar revenue Siemens Healthineers company! Varian Medical Systems, Inc. designs, manufactures, sells, and services medical devices and software products for treating cancer and other medical conditions worldwide. It operates t...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Oregon-Sports-Medicine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10158</link>
<guid>a5c7b30fb632c92feb59154517223dc9</guid>
<pubDate>Sun, 06 Aug 2023 06:58:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Oregon-Sports-Medicine</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>556ad965648e1164949e5d6ac45b8bd02fe6fc2e1acbe6afbb092e3a62ef6d06</i><br /><br />Threat actor <b>description</b>: <i>The goal of the skilled orthopedic team at Sports Medicine Oregon in Tigard and Wilsonville, Oregon, is to restore your active lifestyle. Serving all ages and levels of athletes, from the weekend warrior to the professional player, individuals receive the highest quality orthopedic care available. The practice has served the Northwest communities for more than 24 years, and Sports Medicine Oregon has been the go-to medical team for the Timbers even before they were a Major League Soccer team. The doctors take pride in providing comprehensive care at the offices, which feature on-site X-rays, outpatient physical therapy, and an adjoining surgery center. The practice specializes in sports injuries, including Achilles tendon injuries along with hip, knee, elbow, shoulder, foot, and hand injuries. Trust the practice with your ACL reconstruction, rotator cuff repair, or treatment for arthritis, hammertoe and foot fractures. Even if your injury isn’t directly related to sports, the team can help. The thorough, compassionate care provided by the specially-trained physicians is second to none. Make an appointment for a consultation today by calling and speaking with a friendly staff member or use the online tool to schedule.https://www.sportsmedicineoregon.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>premierbpo.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10156</link>
<guid>f376b8ae6217d18ca5ebcc8b402b63a1</guid>
<pubDate>Sun, 06 Aug 2023 06:46:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>premierbpo.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f3cc3bd6e6c4e90100c2719275e61a209b59b5c15b35fe910929ecce7e859db</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>SatCom-Marketing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10155</link>
<guid>17737832ac17be5216f187a82c20936e</guid>
<pubDate>Sun, 06 Aug 2023 04:41:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>SatCom-Marketing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a4c196219c4f2dbca74285201ce49bd1ac4bf73c6299fb94c927ce75994f7ce</i><br /><br />Threat actor <b>description</b>: <i>SatCom Marketing, LLC SatCom Marketing built its reputation as a leading teleservices provider to the cable/broadband industry. SatCom specializes in outbound sales, inbound sales, customer service calls, survey work and lead generation for business and consumer markets. We have deep experience in marketing and selling voice, video and data products. In addition, we have a wealth of experience in upselling ancillary products like internet speed upgrades, DVR service, digital tiers and premium channels. Our mission is to deliver quality sales and meaningful customer interactions for our clients to help them meet their business goals and ROI objectives. SatCom is a sales organization, focused on delivering quality sales and the highest close rates in the industry. We believe in a consultative sales approach which means tailoring our presentations to the needs of the customer. SatCom was founded with the idea that quality is the cornerstone of our business.http://www.satcommarketing.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>haynesintl.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10151</link>
<guid>6375f34725de10852675ac6ee7dc9e40</guid>
<pubDate>Sat, 05 Aug 2023 11:58:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>haynesintl.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>72aaabd5bc9495033b272cf1b3640199f470f5290c68f25f2749c3c367a1f89c</i><br /><br />Threat actor <b>description</b>: <i>haynesintl.comHaynes International, Inc., headquartered in Kokomo, Indiana, is one of the largest producers of corrosion-resistant and high-temperature alloys. In addition to Kokomo, Haynes has manufacturing facilities in Arcadia, Louisiana, and Mo...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Henlaw</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10150</link>
<guid>20bcff97cc5fb24cbe58ebb037401bd9</guid>
<pubDate>Sat, 05 Aug 2023 10:42:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Henlaw</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2de87cc5fd0c94b89632f50969a3b831cb28cb44e375ff0886a3342466f13b0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>mipe.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10145</link>
<guid>7520fa31d14f45add6d61e52df5a03ff</guid>
<pubDate>Fri, 04 Aug 2023 21:02:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>mipe.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c25f01a0bf792ab6b7d4fc6f20c1fdd17506c279f49a13a68b989649483a91cd</i><br /><br />Threat actor <b>description</b>: <i>Mission Petroleum Carriers, Inc is a bulk commodity transport company operating throughout Texas and surrounding states. Mission’s primary focus is the gathering and transportation of crude oil. Based in San Antonio, Texas, Mission has been providing...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>armortex.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10146</link>
<guid>f52a7b2610fb4d3f74b4106fb80b233d</guid>
<pubDate>Fri, 04 Aug 2023 21:02:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>armortex.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ef0945ebf07f3fd56453679489a6cabdfb2c8af937afe681d047c2a70e7e39ba</i><br /><br />Threat actor <b>description</b>: <i>Armortex® has been manufacturing Bullet, Blast and Forced Entry Resistant products for more than thirty years. Our product line includes Armortex® brand fiberglass composite panels, glass, and containment glazing, fixed windows and transaction window...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>iqcontrols.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10147</link>
<guid>f5c59267dae7d123f54b741a76f28f84</guid>
<pubDate>Fri, 04 Aug 2023 21:01:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>iqcontrols.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7934065fc2a46dc1af7a434546ac1d0f58faa2bc2ca1b18a0b18e01c7d459f73</i><br /><br />Threat actor <b>description</b>: <i>We specialize in designing, building and installing electrical control systems, PLC programming and HMI programming.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>scottevest.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10148</link>
<guid>ed45e77e699645c84f3f27b7b5ad1e2d</guid>
<pubDate>Fri, 04 Aug 2023 21:00:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>scottevest.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>05fa0f4b699fc555690b8e153fb9e759781148d17c809d1489edffa0254cab65</i><br /><br />Threat actor <b>description</b>: <i>SCOTTeVEST is a clothing company based in Ketchum, Idaho which specializes in garments with conduit systems and specialized pockets and compartments for holding mobile phones, tablet computers and other portable electronic devices.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>atser.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10144</link>
<guid>aa475604668730af60a0a87cc92604da</guid>
<pubDate>Fri, 04 Aug 2023 20:59:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>atser.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a5a21db8a8269b96d1a464d47b2deed981fd6b76ce093240070bba1f4a5183f</i><br /><br />Threat actor <b>description</b>: <i>In 1996, ATSER’s Team led in the development and deployment of a Material Acceptance Testing Systems (MATS). ATSER® pioneered the development of this type of software for the transportation industry and for its use in alternative delivery programs</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>tetco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10142</link>
<guid>4eb7d41ae6005f60fe401e56277ebd4e</guid>
<pubDate>Fri, 04 Aug 2023 20:00:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>tetco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0791b32717f101a0c4fbc2eaa124f2b4e74a2f9106914bb1c4fbb535812985ee</i><br /><br />Threat actor <b>description</b>: <i>TETCO, Inc. is a San Antonio-based company, owned and operated by the Tom E. Turner family for more than 60 years. Food service franchises, petrochemical distribution, and heavy truck and trailer repairs are the company’s primary revenue sources, wit...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Koury-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10137</link>
<guid>715e8ba46f8bc29c24f3fbfdb8d96d71</guid>
<pubDate>Fri, 04 Aug 2023 15:02:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Koury-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9d2285024cb948b19ee267856ccc2c50af549f1e710c56cf1c6216cbcdf5902</i><br /><br />Threat actor <b>description</b>: <i>Koury Engineering provides geotechnical engineering, material testing, and inspection services for residential and commercial construction projects throughout Southern California. More that 80GB of confidential contracts, agreements and NDAs, complete employeedata, projects information and much other documents will be uploaded later. All questions to messages section please.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>SBS-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10136</link>
<guid>291dbc18539ba7e19b8abb7d85aa204e</guid>
<pubDate>Fri, 04 Aug 2023 14:37:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>SBS-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1af205ce1beb563ac82d0e348e55faa435c4c7a779666fa45ef6e934ff649b42</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Studio-Domaine-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10135</link>
<guid>36bedb6eb7152f39b16328448942822b</guid>
<pubDate>Fri, 04 Aug 2023 11:02:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>Studio-Domaine-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c19cf593d5d8823781a06972ac22f91dd01a0c2f61bd80ccbf7ad2ead9a7ad25</i><br /><br />Threat actor <b>description</b>: <i>Studio Domaine is an innovative design firm dedicated to creating personalized interiors for residential and model homes. Our custom design services span broad styles and sensibilities providing our clients with their own "signature" style. What began in 1989 as Barbara's Interiors has now...</i><br />Target victim <b>website</b>: <i>https://www.studiodomaine.com/</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Abatti-Companies---Press-Release</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10131</link>
<guid>50d2e70cdf7dd05be85e1b8df3f8ced4</guid>
<pubDate>Fri, 04 Aug 2023 06:49:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Abatti-Companies---Press-Release</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>115b438fe5e83a5c0aee48bec9b416464e36ba4f80ca4178a143b13fbc35047f</i><br /><br />Threat actor <b>description</b>: <i>Abatti Companies is a vertically integrated group of companies that handles all facets of farm products from field to market. In 1981 Alex Abatti Jr. started as a custom harvest operator that later began farming to become one of the largest farmers in the Imperial Valley, California.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>Spokane-Spinal-Sports-Care-Clinic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10130</link>
<guid>d733a2026011136dc23a005c530aa62f</guid>
<pubDate>Thu, 03 Aug 2023 22:29:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Spokane-Spinal-Sports-Care-Clinic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>09b82590b586ac90cc3ea50b39120e719dbdd2438f4240c517a628638d50889a</i><br /><br />Threat actor <b>description</b>: <i>Spinal & Sports Care Clinic is a medical group practice located in Spokane Valley, WA that specializes in Massage Therapy and Chiropractic.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>pointpleasant.k12.nj.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10121</link>
<guid>17df67628bb89193838f83015a3e7d30</guid>
<pubDate>Thu, 03 Aug 2023 16:06:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>pointpleasant.k12.nj.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>70bc70e10831588b59a7becbcebbe95b6d262d6738bfc0cca95050dedf094467</i><br /><br />Threat actor <b>description</b>: <i>Point Pleasant Borough School District</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Roman-Catholic-Diocese-of-Albany</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10122</link>
<guid>b282d1735283e8eea45bce393cefe265</guid>
<pubDate>Thu, 03 Aug 2023 16:05:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>Roman-Catholic-Diocese-of-Albany</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ef7608981663fbcea3d5470af7356d9cb05b57163ed8f2d8349837d936255539</i><br /><br />Threat actor <b>description</b>: <i>The Roman Catholic Diocese of Albany covers 14 counties in Eastern New York including the south west corner of a 15th county. Its Mother Church is the Cathedral of the Immaculate Conception in the city of Albany.</i><br />Target victim <b>website</b>: <i>https://www.rcda.org/</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Venture-General-Agency</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10120</link>
<guid>4317fd49a21384c85f6b405cba038e21</guid>
<pubDate>Thu, 03 Aug 2023 14:54:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Venture-General-Agency</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8d1e05b20c78c665c58b55111aba804836cbf9c5c4f61eacb19032e2f46020b</i><br /><br />Threat actor <b>description</b>: <i>Venture General Agency, LLC (VGA) is a family run Texas based Managing General Agency. These guys are not very talkative. All the data we have from this company will be released here next week. Personal docs and customer information, contracts and payments details - everything will be shared. If you are interested in something specific, let us know in messages section.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Datawatch-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10116</link>
<guid>c45ae64fa263499a6f605b9ee351c7d2</guid>
<pubDate>Thu, 03 Aug 2023 11:06:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Datawatch-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6af003f277b150419f32c70478d4ee67bdb67b189c4176fef9b12eff3987abdf</i><br /><br />Threat actor <b>description</b>: <i>Datawatch Systems experts work in partnership with you to design,install, and operate a security system to safeguard your facility. It's frustrating when one tries to save someone's property andbecome a victim for himself. We took from these experts 100  GB of data containing confidential agreements and contracts, personal documents, customers data and their projects details. Watch your data! Uploading is coming.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>RevZero-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10112</link>
<guid>712a67567ec10c52c2b966224cf94d1e</guid>
<pubDate>Thu, 03 Aug 2023 08:57:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>RevZero-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aca792f1298a77d689793589b61afd2912bcc507533d84d4dea212c5e485a58c</i><br /><br />Threat actor <b>description</b>: <i>We focus on medical device contract manufacturing, 5-axis milling & medical device machining as per the client’s needs and requirements. Visit our website now! RevZero, Inc. is an Agile Medical Device Manufucatring company. Capabilities include Swiss screw, wire EDM, EDM hole drilling, CNCl milling and turning, and cleaning and citric passivation for rapid prototyping and volume manufacturing requirementshttps://www.revzeroinc.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rossman-Realty-Group-inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10113</link>
<guid>e52ff15f1c6cff78c4e54fd19026256d</guid>
<pubDate>Thu, 03 Aug 2023 08:56:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Rossman-Realty-Group-inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>65e5646f1ff24c12ff932a58ee36df6094fb13981b24f94b09906ffabcb2641a</i><br /><br />Threat actor <b>description</b>: <i>See all the Southwest FL Homes and Condos for Sale or Rent - up to 72 hours before they appear on Zillow! We also offer property management services! Rossman Realty Group, Inc has a large inventory of Fannie Mae listings and the expertise to help you acquire one! Whether you are searching for your first home, your dream or vacation home, REO or foreclosure, investment property, commercial property, full time annual or seasonal vacation rentals, Gulf Access homes or vacant lots, you have found the right place!https://www.rossmanrentals.com/https://www.rossmanhomes.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>riggsabney</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10111</link>
<guid>70bb83c9272e6c4bc6e83e0a55c7c9c3</guid>
<pubDate>Thu, 03 Aug 2023 08:52:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>riggsabney</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c6535ee7eab434d2306469b36ffd44efc8edc4bc077e4d558e6ec0fe47774802</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tempur-Sealy-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10110</link>
<guid>47a85128570a3482beea9592a3cc7ffb</guid>
<pubDate>Thu, 03 Aug 2023 01:23:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Tempur-Sealy-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d264cdd5eff840af5e4ba46e463ee5abc0b7750ec86d2b468c3191808d18fd80</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>TGRWA-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10104</link>
<guid>abf0931987f2f8eb7a8d26f2c21fe172</guid>
<pubDate>Wed, 02 Aug 2023 13:54:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>TGRWA-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e63ddd39b504252fdb569eb77aceef43f9e4e78cbc0a6726ee2663fb5333852c</i><br /><br />Threat actor <b>description</b>: <i>TGRWA is a structural engineering firm that specializes in new construction, renovation, and investigation services. All the information of employees, projects, financials, and business processesinformation will be released soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Guido</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10105</link>
<guid>4c0a7bdd46ceb88d497eec5de360328e</guid>
<pubDate>Wed, 02 Aug 2023 13:54:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Guido</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>daddd0de8a3bfc6557f90975b6637c19567e895167c7f9697a59396291a55227</i><br /><br />Threat actor <b>description</b>: <i>Guido Companies is a privately held Commercial Construction and Building Materials firm. We hold 115 GB of their corporate data including HR, accounting, financials and so on and so forth. Feel free to check soon!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bickel--Brewer---Press-Release</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10103</link>
<guid>f53eb4122d5e2ce81a12093f8f9ce922</guid>
<pubDate>Wed, 02 Aug 2023 12:51:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Bickel--Brewer---Press-Release</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e34bed8977fe23cfe97c6267cf808d2823357219b7e67402264feabfcfff6f2a</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1984, Bickel & Brewer has earned a reputation as one of the most successful law firms in the United States practicing exclusively in the field of complex commercial litigation and dispute resolution.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>SHERMAN.EDU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10102</link>
<guid>696b0709b9a2d7d9e2c25b71476ec255</guid>
<pubDate>Wed, 02 Aug 2023 11:06:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SHERMAN.EDU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8257e006969b4773d0ce849b348faddb0cc08297078258d160fd9d90a54bd132</i><br /><br />Threat actor <b>description</b>: <i>Chiropractic School - Sherman College of Chiropractic - Spartanburg, SC</i><br />Target victim <b>website</b>: <i>https://www.SHERMAN.EDU</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>COSI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10101</link>
<guid>6dfc35c47756e962ef055d1049f1f8ec</guid>
<pubDate>Wed, 02 Aug 2023 10:54:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>COSI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f2575e9df0b1a83f98228452f73fbd3e242e1dc03712c9b25d305ac86ddd4008</i><br /><br />Threat actor <b>description</b>: <i>COSI, Columbus, Ohio's dynamic Center of Science and Industry, inspires the scientists, dreamers, and innovators of tomorrow. We've taken about 75GBs of data from this organization. You will find there their projects information, lots of accounting and financial documents, contracts (some of them are confidential), clients contacts, donations information an so on. There are also databases containing clients, partners and employee data, transactions and correspondence. Wait for the release.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>ohiohistory.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10100</link>
<guid>ac2d43ef3f26cc74de242202e822ecb0</guid>
<pubDate>Wed, 02 Aug 2023 08:39:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ohiohistory.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46db32bdd80020c70465061599859beeda9e26cbf17c0e006f27c05d52cb807d</i><br /><br />Threat actor <b>description</b>: <i>The Ohio History Fund was created to support the preservation and sharing of Ohio's heritage by funding local, regional, and statewide projects, programs, and events related to the broad sweep of the state's history and pre-history.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>unicorpusa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10099</link>
<guid>995ca733e3657ff9f5f3c823d73371e1</guid>
<pubDate>Wed, 02 Aug 2023 06:43:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>unicorpusa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fcd9a9668f6cfc9b99977d1ce08106de5e35c25bf722f85cebd88970c0daee26</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Garage-Living-The-Dispenser-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10094</link>
<guid>018a1b6ccd2ec81361657e259155895a</guid>
<pubDate>Tue, 01 Aug 2023 20:34:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Garage-Living-The-Dispenser-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e1adbb65abc3993b7051efe4332f32b317850014e5facd2ab93ca4dcb3df6de</i><br /><br />Threat actor <b>description</b>: <i>Ontario, Canada</i><br />Target victim <b>website</b>: <i>www.garageliving.com, www.dispenser.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Birch-Horton-Bittner--Cherot</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10096</link>
<guid>ee4117572afbc0cf760f70714af0ec52</guid>
<pubDate>Tue, 01 Aug 2023 20:34:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Birch-Horton-Bittner--Cherot</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbb61f946a48d34c5cf716be8b4bb6a826806df58cdef86dc8bc6f2a6bcd517e</i><br /><br />Threat actor <b>description</b>: <i>Alaska, United States</i><br />Target victim <b>website</b>: <i>www.birchhorton.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>DAL-TECH-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10097</link>
<guid>23b702c4c421ddb2d023fee968c0d839</guid>
<pubDate>Tue, 01 Aug 2023 20:34:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>DAL-TECH-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1af1f705f54571e71ec151e741b8ed33170c0caf8f9f12416fa1159f4b3678d</i><br /><br />Threat actor <b>description</b>: <i>Texas, United States</i><br />Target victim <b>website</b>: <i>www.dal-tech.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Coral-Resort</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10098</link>
<guid>c876914f82ce54cb533b186afd41166e</guid>
<pubDate>Tue, 01 Aug 2023 20:34:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Coral-Resort</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a053aba52a22add02476a742d8693dd7323e5596d5ca4dbc090fd877fe15e18</i><br /><br />Threat actor <b>description</b>: <i>Florida, United States</i><br />Target victim <b>website</b>: <i>www.coralresort.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Parathon-by-JDA-eHealth-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10089</link>
<guid>69f8ea31de0c00502b2ae571fbab1f95</guid>
<pubDate>Tue, 01 Aug 2023 17:58:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Parathon-by-JDA-eHealth-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>456af79b8f37082db9180701789d673a0945b3d0386a533b9ba79a75e45ca26c</i><br /><br />Threat actor <b>description</b>: <i>Parathon is a full-scale healthcare Revenue Cycle Management dataintegrator. We're almost ready to share the  560GB of data we'vetaken from their network . Contracts, employee personal information, and confidential documents will be posted shortly.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>KIMCO-Staffing-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10088</link>
<guid>42edd1ec1dc5f5c1f11fd74a959e96c9</guid>
<pubDate>Tue, 01 Aug 2023 14:43:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>KIMCO-Staffing-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a989ea53c6fe1f15ee4300ad5d79468e2b39475d942f8d5ea47c48a7315fac2f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pea-River-Electric-Cooperative</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10087</link>
<guid>afc2637129ad904485e07d2c0e6b0688</guid>
<pubDate>Tue, 01 Aug 2023 12:50:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>Pea-River-Electric-Cooperative</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b098ae856daeb07dcbc1023a0e48ea2b7f9db4033721c1acec418d3b5af661f4</i><br /><br />Threat actor <b>description</b>: <i>Pea River Electric Cooperative is a service-oriented, distribution electric utility that is owned by the members it serves. Pea River Electric provides electric service to members in portions of Barbour, Dale, Henry and Coffee counties in Alabama. The headquarters office is located at 1311 W. Roy...</i><br />Target victim <b>website</b>: <i>www.peariver.com</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jacklett-Construction-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10083</link>
<guid>c5f79d384b8024d5adddb872f9651f38</guid>
<pubDate>Tue, 01 Aug 2023 08:38:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Jacklett-Construction-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e4472c53e248f129aee7679d4e2f988a8f63e09ae6ebaeb5db2af030e0b28241</i><br /><br />Threat actor <b>description</b>: <i>The team at Jacklett Construction has experience in both residential and commercial site development.  Your project is never just another job.  We strive to produce a quality product while developing long term relationships with our clients.  Jacklett Construction relies on decades of experience and utilizes the latest technology to deliver a product that exceeds expectations.https://jacklett.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>persingerlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10082</link>
<guid>9b22a40256b079f338827b0ff1f4792b</guid>
<pubDate>Tue, 01 Aug 2023 04:37:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>persingerlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a70a2a66a7e21e53fed6952d2d640e8fa36be7cfc16fc2c857b2e68cd6cbe23a</i><br /><br />Threat actor <b>description</b>: <i>Persinger & Persinger, L.C. is a law firm in Charleston, WV with 1 attorneys selected to the Super Lawyers or Rising Stars lists.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>nbcc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10080</link>
<guid>ebd774c929a7f6c7e5df19e355f61e23</guid>
<pubDate>Mon, 31 Jul 2023 19:58:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>nbcc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>504207d0fa1c4de88c493621122851e3d64c48705eddb3ebbce23d607b6f10b3</i><br /><br />Threat actor <b>description</b>: <i>-personal data-nda220GBNational Board for Certified Counselors is dedicated to research and commentary on empirical, theoretical and innovative topics in the field of professional counseling and related areas</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Announcement-Batesville-Tool--Die-Inc-will-be-leaked-in-3-Days</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10077</link>
<guid>70803c1acb1ee113c07ec6bddc4929bd</guid>
<pubDate>Mon, 31 Jul 2023 16:44:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ragnarlocker</b> claims attack for <b>Announcement-Batesville-Tool--Die-Inc-will-be-leaked-in-3-Days</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8885950d10e96e920ac9e20af79496bbcfd26855dc11065cb9d4566946896cbb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ragnarlocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Retail-Information-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10072</link>
<guid>cc2b1ba0368ccd98d5bed7e2e97b4bb0</guid>
<pubDate>Mon, 31 Jul 2023 10:55:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Retail-Information-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b1708138122be701089ca843364731c82aea987b7236629bfed16fe912c46e6</i><br /><br />Threat actor <b>description</b>: <i>Retail Information Systems provides cost-effective, highly configurable and scalable point of sale and inventory control software solutions to retailers worldwide.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>St-Landry-Parish-School-Board-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10068</link>
<guid>a4982cba8b4cbeb32a439f0367273fc8</guid>
<pubDate>Mon, 31 Jul 2023 06:02:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>St-Landry-Parish-School-Board-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a00abf439be3372916830f26c95b4c9c915db7c41b56a2251dfb3d1c733699fd</i><br /><br />Threat actor <b>description</b>: <i>St Landry Parish School Board is a school district based in Opelusas, Louisiana. The area includes primary, secondary and secondary schools. At the moment, more than 14,000 students are studying in them.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Contec-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10066</link>
<guid>955fd82131e15e7b5199cbc8f983306a</guid>
<pubDate>Sun, 30 Jul 2023 20:45:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>mallox</b> claims attack for <b>Contec-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>15c7f4f25f4d7149867e0868ac4a480ffee5eb755997da837bfb396758a2c32a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>mallox</category>
</item>
<item xmlns:dc='ns:1'>
<title>All-States-Ag-Parts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10057</link>
<guid>27bc42aaeb1540e87949a69ebeb4eb4c</guid>
<pubDate>Sun, 30 Jul 2023 18:18:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>All-States-Ag-Parts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9aaa43eb6307c84390fe6b4ea9ebe017cf72a328c27f4deb2d79c5a4c83c8037</i><br /><br />Threat actor <b>description</b>: <i>All States Ag Parts is the largest supplier of used, new and remanufactured tractor and combine parts in North America. We carry parts for all makes and models, including John Deere, Case IH, New Holland, Ford, International, Allis Chalmers, Caterpillar, Gehl, Massey Ferguson, Kubota, Lexion, Minneapolis Moline, Oliver, Steiger, Versatile, White and many more. We also carry industrial parts for Bobcat, Deere, Caterpillar, Gehl, Mustang, New Holland and others. All States Ag Parts also supplies parts for skid steers, planters, drills, hay balers, swathers, construction equipment and other ag equipment.SITE: https://www.tractorpartsasap.com Address  10 Ellefson Dr De Soto, IA 50069 support@tractorpartsasap.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>decimal-point-analytics-pvt</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10051</link>
<guid>a536fb5480db8bdbb84daffe345c675b</guid>
<pubDate>Sun, 30 Jul 2023 08:40:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ragroup</b> claims attack for <b>decimal-point-analytics-pvt</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6537e56ee4bc9b712e88bce6ca03f64b7ceb51d10d7cfa58cbd258e402b8f48a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ragroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Muncy-Homes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10049</link>
<guid>1759e864edd6cb2200926b3a2f729dac</guid>
<pubDate>Sat, 29 Jul 2023 19:25:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>Muncy-Homes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>92ea2cf184ab85fd93c9b24218a21eef090bf69e785985e28232d2821b9c38da</i><br /><br />Threat actor <b>description</b>: <i>Muncy Homes was founded in 1973 in the stable and skilled labor environment of North Central Pennsylvania. We are recognized as an industry leader of quality modular housing at competitive pricing and sales of over 500 houses annually. Our products are marketed through an independent builder...</i><br />Target victim <b>website</b>: <i>www.muncyhomes.com</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Modern-Eyez</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10048</link>
<guid>d843407a1a701630bb297c1148229eff</guid>
<pubDate>Sat, 29 Jul 2023 19:23:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>Modern-Eyez</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc08a120eed78299deab8eea71694702144582fe9206cd11e56a89ededf06444</i><br /><br />Threat actor <b>description</b>: <i>Since 2003, Modern Eyez has been the leader and preferred provider of quality vision care products and personalized optometric services to our patients in Rio Rancho and the surrounding areas. Our experienced doctors and staff offer comprehensive vision examinations and specialize in the diagnosis...</i><br />Target victim <b>website</b>: <i>www.visionsource-moderneyez.com</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>One-Health-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10046</link>
<guid>827a9e878169d065f4a9a6c451ba0207</guid>
<pubDate>Sat, 29 Jul 2023 18:45:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>One-Health-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>72ed9b100c1534e602f72c89a3cd66420482828071e40a01b590a70aca9a71bd</i><br /><br />Threat actor <b>description</b>: <i>ONE HEALTH is a pioneering healthcare platform that is the result of a unique partnership between a group of visionaries from the healthcare and technology industry, spearheaded by professionals from around the world and built by thousands of individuals who sharethe belief that healthcare is truly...</i><br />Target victim <b>website</b>: <i>https://www.onehealthsolutions.com/</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Village-Church-of-Barrington</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10045</link>
<guid>997e65474a248252883b485717f7d098</guid>
<pubDate>Sat, 29 Jul 2023 16:42:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>Village-Church-of-Barrington</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>acb0ac08290065bac2203298dc68f75f078e8c8ebb7eccadda8d1c75fdfd59cf</i><br /><br />Threat actor <b>description</b>: <i>The Village Church is an religious institution founded in 1977 and is based in Mound, Texas . The village was founded to bring glory to God by making disciples through gospel-centered worship, gospel-centered community, gospel-centered service and gospel-centered multiplication.We will...</i><br />Target victim <b>website</b>: <i>https://www.vcbweb.org/</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alinabal</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10043</link>
<guid>d30cfe3deca3ec4de141fcf9c31097a3</guid>
<pubDate>Sat, 29 Jul 2023 00:13:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Alinabal</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>41e7cd39af18b6df54639c52467a91898058549fdaae25f00d3383309bdd78c0</i><br /><br />Threat actor <b>description</b>: <i>Alinabal is a broadly diversified manufacturer with history reaching as far back as 1913 when it supplied laminated materials for the Model T Ford. Today, through its four distinct business units, Alinabal is a leading manufacturer of a diverse span of products from precision stampings and</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Frost--Sullivan</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10041</link>
<guid>6d38b80c1da3bd9d8717ce47fea2acd7</guid>
<pubDate>Fri, 28 Jul 2023 19:56:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Frost--Sullivan</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c6a01e2e5fe73b50026db155bf28122e4523792d8521491ec9575e3b2386591</i><br /><br />Threat actor <b>description</b>: <i>Frost & Sullivan, the Growth Consulting Company, partners with clients to accelerate their growth. Planning is always not an easy process and sometimes leads to a failure. These guys underestimated their data and we suppose their clients won't be happy seeing news of this leak. Tons of contracts with big names of international businesses, personal documents including top management and more. >90GBs of data will be available soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>CMC-Marine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10040</link>
<guid>f250daff6a09865ff432821b2adac54f</guid>
<pubDate>Fri, 28 Jul 2023 17:00:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>CMC-Marine</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2fc737ce83d69125accf5d9d0e97930071227cfa7eb9e27714e030bedf160ca3</i><br /><br />Threat actor <b>description</b>: <i>CMC Marine was founded in 2005 with the aim to offer a new generation of control and stabilizing systems meticulously designed.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Regional-Family-Medicine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10036</link>
<guid>7c127e0c66f06e58c7c7310a7c6fa488</guid>
<pubDate>Fri, 28 Jul 2023 12:51:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>Regional-Family-Medicine</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5ba1075931fa2e06a95f7a7a56a1cae5f7d184d1f61d11c793f0676383e49911</i><br /><br />Threat actor <b>description</b>: <i>Regional Family Medicine is a primary care group comprised of two separate clinic locations, eight primary care physicians, four advanced practice nurses, and over fifty other nurses, technicians and support staff. There is some data on medical staff, ss numbers, medical reports, bank statements, invoices, some confidential docs, incidents. +5gb SQL.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>McAlester-Regional-Health-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10035</link>
<guid>329d1ea6acb272924f991d523b2d2b80</guid>
<pubDate>Fri, 28 Jul 2023 10:41:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>McAlester-Regional-Health-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>906e776236e94fc2dc56cd5c2d391307031b3a3e08af1cbd251a9dfb4e344a9d</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1978, McAlester Regional Health Center is devoted to a continuum of care offering a variety of health care services to the citizens of Southeast Oklahoma. Another one medical center doesn't care about their patients' data. 126gb of this organization data includes medical information, personal documents, financial and accounting data and lots of HR documentation. 40gb of DNA tests of patients is  a bonus! Stay tuned.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>Handi-Quilter</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10030</link>
<guid>08d562c1eedd30b15b51e35d8486d14c</guid>
<pubDate>Thu, 27 Jul 2023 16:54:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Handi-Quilter</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6d3c9371af4bc02f17249c62ca80e5ebf5413982c6304f0b37706a8842a74d0</i><br /><br />Threat actor <b>description</b>: <i>Handi Quilter is the worldwide leader and quilters’ choice for longarm machines for both stand-up and sit-down quilting. More than100GB of this company data will be available for downloading soon. They are not of those who want to keep their data confidentially, so we will share their business information with you. Source codes, contracts, financials... Wait for the release.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Morehead-State-University-MSU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10031</link>
<guid>d2cb583f4b5bdc51b965ae555ee6bca5</guid>
<pubDate>Thu, 27 Jul 2023 16:54:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Morehead-State-University-MSU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c40bef61cb86b73f19654f610594acb258d6b21d6ef8c94b714770c3f7129733</i><br /><br />Threat actor <b>description</b>: <i>Morehead State University is a comprehensive public university with undergraduate and graduate programs, emerging doctoral programs, and an emphasis on regional engagement. This university underwent our attack and lost a lot of data. President Jay Morgan said "no personal data has been compromised" (https://www.wmky.org/news/2023-07-13/morehead-state-university-hit-by-cyber-attack). But that was only a matter of time. Since we haven't been contacted from their part, we will upload every file of this university we have. Complete personal information of students and employees, finance and marketing data will be available soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Offutt-Nord</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=10029</link>
<guid>6072cd1424d62d9c33c6a7a82cacd40e</guid>
<pubDate>Thu, 27 Jul 2023 13:56:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Offutt-Nord</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5c9de53fdaa475996a630cf1351a3d76af5b4e4b88547e957ae4a49bb995c9b</i><br /><br />Threat actor <b>description</b>: <i>Offutt Nord is a group of insurance attorneys that represent clients involved in general civil litigation statewide in many statesand regions. Their clients' information will be released soon here as always. There are about 70GB of personal documents, judicial processes and much other.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>MACOM.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9982</link>
<guid>1b932eaf9f7c0cb84f471a560097ddb8</guid>
<pubDate>Wed, 26 Jul 2023 20:57:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MACOM.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6aa30dec176832995fd2929710f4aa4c01eadeb8abafa9b0067f5f189e3ba5ce</i><br /><br />Threat actor <b>description</b>: <i>Home</i><br />Target victim <b>website</b>: <i>https://www.MACOM.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>VIRGINPULSE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9977</link>
<guid>e3a72c791a69f87b05ea7742e04430ed</guid>
<pubDate>Wed, 26 Jul 2023 20:57:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>VIRGINPULSE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9fc6afcdea76420fd356815c33d7051acf9822e34a737c3adacb79d8b65e9625</i><br /><br />Threat actor <b>description</b>: <i>Virgin Pulse - Changing Lives for Good - Virgin Pulse</i><br />Target victim <b>website</b>: <i>https://www.VIRGINPULSE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>QUARK.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9975</link>
<guid>0197fcd95060131d9bc5e564f842ed53</guid>
<pubDate>Wed, 26 Jul 2023 20:57:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>QUARK.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7722c2f38c7ec4922c3a09de0d77ede03ea6eb57f0103053cb07381b8210260</i><br /><br />Threat actor <b>description</b>: <i>Quark Software, Inc. - Modern Content Lifecycle Management</i><br />Target victim <b>website</b>: <i>https://www.QUARK.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ACLARA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9976</link>
<guid>4800deb3f3be382f97782401f775184a</guid>
<pubDate>Wed, 26 Jul 2023 20:57:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ACLARA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e21f69a0ad34d8807b56f09351fc475e33830233abba5acf76f0985ab9464593</i><br /><br />Threat actor <b>description</b>: <i>Aclara Technologies LLC</i><br />Target victim <b>website</b>: <i>https://www.ACLARA.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ALOHACARE.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9972</link>
<guid>35675fd71a153bf3baab29b904e525c8</guid>
<pubDate>Wed, 26 Jul 2023 20:57:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ALOHACARE.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>104df8be14bbbed4fbe3143a999bdaa1bbbc90a8ff09c23184f65ff29d0794b9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.ALOHACARE.ORG</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>INFORMATICA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9973</link>
<guid>45b4f8abe6c172cab391e43e1e0e6611</guid>
<pubDate>Wed, 26 Jul 2023 20:57:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>INFORMATICA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1483f0363d5a3023c99a93c138533e017f09e6d8d17c1610cec5f03ead62bb71</i><br /><br />Threat actor <b>description</b>: <i>Enterprise Cloud Data Management - Informatica</i><br />Target victim <b>website</b>: <i>https://www.INFORMATICA.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ALOGENT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9970</link>
<guid>3384ace9a48c23d689f347236c7ab49a</guid>
<pubDate>Wed, 26 Jul 2023 20:57:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ALOGENT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>923d8be9e8b86ff150501ad8135afd9f0028fa9222cd26f9bb3e59b4ebd771ca</i><br /><br />Threat actor <b>description</b>: <i>Alogent: Digital Banking, Enterprise Check Processing Software, & Process Automation Solutions for Banks & Credit Unions</i><br />Target victim <b>website</b>: <i>https://www.ALOGENT.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>KELLYSERVICES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9967</link>
<guid>554644c0cc70e64757bfdfe8512f90c6</guid>
<pubDate>Wed, 26 Jul 2023 20:57:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>KELLYSERVICES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>faaf0bb97123e0de644fc5e852569cf32e4e9e03cf8948daf9b84c36db6f7a94</i><br /><br />Threat actor <b>description</b>: <i>Staffing Agencies - Workforce & Staffing Solutions by Kelly Services</i><br />Target victim <b>website</b>: <i>https://www.KELLYSERVICES.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>AMERISAVE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9968</link>
<guid>8808eda0dd3dec4e4df50499f2fc75e8</guid>
<pubDate>Wed, 26 Jul 2023 20:57:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>AMERISAVE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea80767a488189b9630d2e52f1eec91ff946c8ab9ec6a98ece40267708bee830</i><br /><br />Threat actor <b>description</b>: <i>Low Mortgage Rates & Quick Approvals - AmeriSave</i><br />Target victim <b>website</b>: <i>https://www.AMERISAVE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CONVERGEONE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9969</link>
<guid>2ef3dce7c059b268cf8b9e0707ee5594</guid>
<pubDate>Wed, 26 Jul 2023 20:57:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CONVERGEONE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c2a787155ce92af546110cf2b971acd1b1e1790708f00ebf380ee2432917e8c9</i><br /><br />Threat actor <b>description</b>: <i>Connected Customer Experiences - ConvergeOne</i><br />Target victim <b>website</b>: <i>https://www.CONVERGEONE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HUBBELL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9966</link>
<guid>cdf6581cb7aca4b7e19ef136c6e601a5</guid>
<pubDate>Wed, 26 Jul 2023 20:57:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HUBBELL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4bc813f2716c5c870cc1608ee2de9df4e280161c06ac6c5cbd09670038b43a13</i><br /><br />Threat actor <b>description</b>: <i>Hubbell - Homepage</i><br />Target victim <b>website</b>: <i>https://www.HUBBELL.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SALELYTICS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9963</link>
<guid>fcc7fbed7c7c66964a52463e7498ad91</guid>
<pubDate>Wed, 26 Jul 2023 20:57:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SALELYTICS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>086504499c9ffde357edb4333abcc2a56aa1aaba07a16c2c0889dcef93b994eb</i><br /><br />Threat actor <b>description</b>: <i>Salelytics - Inside Sales and Account Management</i><br />Target victim <b>website</b>: <i>https://www.SALELYTICS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TRICOPRODUCTS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9959</link>
<guid>05ec04f7fb3bc3281f1db83bfc1a2490</guid>
<pubDate>Wed, 26 Jul 2023 20:57:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TRICOPRODUCTS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18b336c48bb965b306c6d3e769e7d6db6018e4596e0212312fe6dfd3083a2a39</i><br /><br />Threat actor <b>description</b>: <i>TRICO® Windshield Wipers - Find Your Vehicle's Wiper Blade Size</i><br />Target victim <b>website</b>: <i>https://www.TRICOPRODUCTS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MECHANICSBANK.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9960</link>
<guid>948f847055c6bf156997ce9fb59919be</guid>
<pubDate>Wed, 26 Jul 2023 20:57:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MECHANICSBANK.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>98b784a2550d53b89fe92a0adde3306da35ec8cf1c841ae855c8315a60e0f80f</i><br /><br />Threat actor <b>description</b>: <i>Mechanics Bank - Mechanics Bank</i><br />Target victim <b>website</b>: <i>https://www.MECHANICSBANK.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ENTERPRISEBANKING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9961</link>
<guid>f2876df2ad8d7e06cf5e558f74049bdd</guid>
<pubDate>Wed, 26 Jul 2023 20:57:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ENTERPRISEBANKING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>69ab57088b28273542eb3e6f9a16053bdb35e2adb59e31057669d15eb6219194</i><br /><br />Threat actor <b>description</b>: <i>Enterprise Bank</i><br />Target victim <b>website</b>: <i>https://www.ENTERPRISEBANKING.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>JONESLANGLASALLE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9958</link>
<guid>56786bbe51b83ae53c89e68efb23425a</guid>
<pubDate>Wed, 26 Jul 2023 20:57:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>JONESLANGLASALLE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf6483fe637347466a3d8d17ccbc0bdca1c325b0a9179c7b7ec87c37c1b595bd</i><br /><br />Threat actor <b>description</b>: <i>Conseil en immobilier d'entreprise - Investissements et services - JLL France</i><br />Target victim <b>website</b>: <i>https://www.JONESLANGLASALLE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CHUCKECHEESE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9954</link>
<guid>356dc40642abeb3a437e7e06f178701c</guid>
<pubDate>Wed, 26 Jul 2023 20:57:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CHUCKECHEESE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>69e62c411941a48c9ce1a97c21aa641d4580d67058b149dc924d04954a496a96</i><br /><br />Threat actor <b>description</b>: <i>Chuck E. Cheese: Kids Birthday Parties, Pizza & Arcade Games</i><br />Target victim <b>website</b>: <i>https://www.CHUCKECHEESE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SIU.EDU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9952</link>
<guid>74765968c67007219b197f4d9aafb4e2</guid>
<pubDate>Wed, 26 Jul 2023 20:57:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SIU.EDU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e5682ad565e3c2ea1681d94afea16843d5a1bdbcffbe81b320bd5c5dacfd2558</i><br /><br />Threat actor <b>description</b>: <i>Southern Illinois University</i><br />Target victim <b>website</b>: <i>https://www.SIU.EDU</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DELOITTE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9953</link>
<guid>300ecf93b7224cf439b6de6ee1d6c200</guid>
<pubDate>Wed, 26 Jul 2023 20:57:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DELOITTE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>92ae26ee95a0d4a628e6cc2fdf8caeaf7d2e1e7cc1cbf2677c24aceccffcffed</i><br /><br />Threat actor <b>description</b>: <i>Deloitte France - Audit, Consulting, Financial Advisory, Risk Advisory, Juridique & Fiscal, Expertise comptable</i><br />Target victim <b>website</b>: <i>https://www.DELOITTE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PLANETHOMELENDING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9948</link>
<guid>0bdf2c1f053650715e1f0c725d754b96</guid>
<pubDate>Wed, 26 Jul 2023 20:57:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PLANETHOMELENDING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06bacca5c2d52ee4391f5afe7f1db7fcdfa93393d4501702f5906ceb4b0f713e</i><br /><br />Threat actor <b>description</b>: <i>Planet Home Lending - We'll Get You Home.</i><br />Target victim <b>website</b>: <i>https://www.PLANETHOMELENDING.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>THEVITALITYGROUP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9945</link>
<guid>115c343463041f8763d7552fdce43c9f</guid>
<pubDate>Wed, 26 Jul 2023 20:57:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>THEVITALITYGROUP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>345d5a3f2f66f7baa7a66d19825b6469a829ecd20c1e9f0f7bd956e4cd39ed40</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.THEVITALITYGROUP.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GNC.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9942</link>
<guid>154aa6866aefb6f8d0b722621fa71e83</guid>
<pubDate>Wed, 26 Jul 2023 20:57:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GNC.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f876cf5c922ea3eb02a75097d69ad939d02e9211895dc2cccaaf2a45469afd5b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.GNC.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GENESISENERGY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9943</link>
<guid>5837e05c0213dc1617e409543331442c</guid>
<pubDate>Wed, 26 Jul 2023 20:57:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GENESISENERGY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab1ca128b94a610970ea80fa313a61656bcfe389c4e374e6740200b322280e09</i><br /><br />Threat actor <b>description</b>: <i>A Midstream Services Provider. - Genesis Energy, LP</i><br />Target victim <b>website</b>: <i>https://www.GENESISENERGY.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>EMSBILLING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9940</link>
<guid>9d12d071c18b535cda26f47f20e5c7ae</guid>
<pubDate>Wed, 26 Jul 2023 20:57:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>EMSBILLING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f3c57a24af95c9ce8f55cce97a0a445bbcc074146887db2569701f31239bc8ab</i><br /><br />Threat actor <b>description</b>: <i>Just a moment...</i><br />Target victim <b>website</b>: <i>https://www.EMSBILLING.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GENSLER.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9933</link>
<guid>310b60949d2b6096903d7e8a539b20f5</guid>
<pubDate>Wed, 26 Jul 2023 20:57:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GENSLER.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d8c9a19c9a4f626b7d928563246639ca23ca2a6b111e1facb87dc3755687655</i><br /><br />Threat actor <b>description</b>: <i>Gensler - Creating a Better World Through the Power of Design</i><br />Target victim <b>website</b>: <i>https://www.GENSLER.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GOALSOLUTIONS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9934</link>
<guid>450e92aa762ce31e6f6f5e4402facc73</guid>
<pubDate>Wed, 26 Jul 2023 20:57:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GOALSOLUTIONS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91101339e7c525f397b9b9f7e7ca950b69bea0599e6a1c93e5d5a2d1d1f23978</i><br /><br />Threat actor <b>description</b>: <i>Loan Servicing and Asset Management - Goal Solutions</i><br />Target victim <b>website</b>: <i>https://www.GOALSOLUTIONS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MCW.EDU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9935</link>
<guid>5d293363c4be77f134214bec786e2feb</guid>
<pubDate>Wed, 26 Jul 2023 20:57:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MCW.EDU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2dcfc99db82aa44497177bbdf211925b63b876d445f2bfcb6f6a844d727323ef</i><br /><br />Threat actor <b>description</b>: <i>Home - Medical College of Wisconsin</i><br />Target victim <b>website</b>: <i>https://www.MCW.EDU</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CHEVRONFCU.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9930</link>
<guid>2c8eff687fe094e24be91e72a45ff884</guid>
<pubDate>Wed, 26 Jul 2023 20:57:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CHEVRONFCU.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33b2f4c67781c524f259185b043450204bbda3ec41d91ceb40ce512e39dd772a</i><br /><br />Threat actor <b>description</b>: <i>Chevron Federal Credit Union</i><br />Target victim <b>website</b>: <i>https://www.CHEVRONFCU.ORG</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>FANUCAMERICA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9931</link>
<guid>6591d327f6f731e589b0e869adadf940</guid>
<pubDate>Wed, 26 Jul 2023 20:57:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>FANUCAMERICA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>876bc863566996a1aceea8fee126ccb8774abbb9167b0c27b2ce6c3bb7523378</i><br /><br />Threat actor <b>description</b>: <i>FANUC America - Automation Solutions that Redefine Productivity</i><br />Target victim <b>website</b>: <i>https://www.FANUCAMERICA.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MESVISION.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9925</link>
<guid>a1cb608a30fc2883eed0831dcf25f260</guid>
<pubDate>Wed, 26 Jul 2023 20:57:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MESVISION.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7590f83c49104f93506900026cb02948ddc132ab5c7834bdcf3069da0a811570</i><br /><br />Threat actor <b>description</b>: <i>MESVision Members</i><br />Target victim <b>website</b>: <i>https://www.MESVISION.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CAP.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9927</link>
<guid>f6e06644c3fb17c52be6bd0421b599b9</guid>
<pubDate>Wed, 26 Jul 2023 20:57:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CAP.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dab452ea8fe3fe0925d51f597c97743a534ac54c463a30dbe572a5dd5113c625</i><br /><br />Threat actor <b>description</b>: <i>Homepage - College of American Pathologists</i><br />Target victim <b>website</b>: <i>https://www.CAP.ORG</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HALLMARKCHANNEL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9923</link>
<guid>d9812f756d0df06c7381945d2e2c7d4b</guid>
<pubDate>Wed, 26 Jul 2023 20:57:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HALLMARKCHANNEL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8fad710dcc4701ec8fe2c2f83cd0cf5234546092be63d61e33f587acf96da7d2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.HALLMARKCHANNEL.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PBINFO.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9924</link>
<guid>ca886eb9edb61a42256192745c72cd79</guid>
<pubDate>Wed, 26 Jul 2023 20:57:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PBINFO.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7336b1268a75b9c4522db06cc6773903cb8b868ad7a8ef2c0ad58d52115ebb3</i><br /><br />Threat actor <b>description</b>: <i>Locate Missing Participants - Death Audit - PBI Research Services</i><br />Target victim <b>website</b>: <i>https://www.PBINFO.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ARROW.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9921</link>
<guid>79a9887268cef1276b3c9e33cc29580f</guid>
<pubDate>Wed, 26 Jul 2023 20:57:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ARROW.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbaeb761e13a5918870ec23d9230e2efdc92851d63d56cf0de8b93972dfd5652</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.ARROW.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MAXIMUS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9922</link>
<guid>7a06ad497a8fb70ea0a3cf08543fb1e4</guid>
<pubDate>Wed, 26 Jul 2023 20:57:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MAXIMUS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6cafcfaeda66c5448ebb82346af4e40c7226e6051ccdb592fdc4793a99b75a6</i><br /><br />Threat actor <b>description</b>: <i>Moving people forward - Maximus</i><br />Target victim <b>website</b>: <i>https://www.MAXIMUS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HILLROM.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9918</link>
<guid>097fdff1eefae7180f5ec716a83dd3a3</guid>
<pubDate>Wed, 26 Jul 2023 20:57:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HILLROM.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3562774f0c7de90c85932e288743d98bf147ab34a14d46affcf9dc799837a810</i><br /><br />Threat actor <b>description</b>: <i>Advancing Connected Care - Hillrom</i><br />Target victim <b>website</b>: <i>https://www.HILLROM.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ENCOREANYWHERE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9916</link>
<guid>853573b5a907ed8b2f4fec25a92406a2</guid>
<pubDate>Wed, 26 Jul 2023 20:57:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ENCOREANYWHERE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba8e1ea9d26a72f68a8511e797f74132203ef7ae27fca035f05bfc1f1884aaf8</i><br /><br />Threat actor <b>description</b>: <i>Welcome to EncoreAnywhere</i><br />Target victim <b>website</b>: <i>https://www.ENCOREANYWHERE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>AGILYSYSAP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9913</link>
<guid>0e999d31b23f3f89049b91cc014296c8</guid>
<pubDate>Wed, 26 Jul 2023 20:57:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>AGILYSYSAP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f189dd9353129b9e442d88eed4bb1f37dbf51cd8fa1aec1b3bd0537b73039b90</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.AGILYSYSAP.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ORAU.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9914</link>
<guid>8ccf1fb8b09a8212bafea305cf5d5e9f</guid>
<pubDate>Wed, 26 Jul 2023 20:57:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ORAU.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ff4f9b160b03c58060553fab19b1f819fcde22f5fb7bbd41659de8ab3d7e8cb</i><br /><br />Threat actor <b>description</b>: <i>Oak Ridge Associated Universities - ORAU</i><br />Target victim <b>website</b>: <i>https://www.ORAU.ORG</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kovair-Software</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9808</link>
<guid>f5b2aa928f940f3f09a0d14f45a27875</guid>
<pubDate>Wed, 26 Jul 2023 08:37:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Kovair-Software</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>907da13093ca95b3f4828efe54aade395a1a05b6ad182eaabc90d2cba85ed5f3</i><br /><br />Threat actor <b>description</b>: <i>200 GB of internal files (Kovair.com) were stolen from the company’s servers. The files contain:– Project Source Codes– Personal data of employees– Various internal work documents To fully restore the system and delete these files, company representatives must contact by August 3, 2023.Otherwise, all this data will be published here and other forums,in the same […]</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Miranda-Brokerage</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9799</link>
<guid>c15203a83f778ce8934d0efaf2d5c6f3</guid>
<pubDate>Tue, 25 Jul 2023 18:00:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Miranda-Brokerage</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc77cca9a67f4b8a17ddb90f1d8c134fc04c3082f59b18cc04ae9e3926c94130</i><br /><br />Threat actor <b>description</b>: <i>We are a dedicated US Customs Broker that provides our clients with an effective and personalized customer service because we clearly understand that service is the product that we offer which is based on compliance, technology and personalized service.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kersey--Co</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9801</link>
<guid>b7b58836dc941cc4ba33d16dab6e3059</guid>
<pubDate>Tue, 25 Jul 2023 18:00:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Kersey--Co</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>88d75e4f2cd982bf757b0e961e74844a6e12a75d0c39a0c4b52a3e29004410cc</i><br /><br />Threat actor <b>description</b>: <i>Government Kersey</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Becht-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9791</link>
<guid>44089d5f715bc4112ad95576555d0f4e</guid>
<pubDate>Tue, 25 Jul 2023 14:58:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Becht-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>73368bea75d7c65d88ce84b06ddc5a4d0105936d0f3c335f7fe1a2229540b9f6</i><br /><br />Threat actor <b>description</b>: <i>Becht provides technically excellent engineering solutions, plantservices, and software tools to our worldwide clients. This is the company a client will go to when they see their data in open access. All the information of employees, projects, financials, and business processes information will be released soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>ridgeviewindustries.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9789</link>
<guid>0cc918dec28dbd91f6006a2ce8101e2e</guid>
<pubDate>Tue, 25 Jul 2023 07:57:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ridgeviewindustries.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd593223b3b5079319a4c51865512a4fe6b1ef64b17c9dd77f5f10448536b845</i><br /><br />Threat actor <b>description</b>: <i>World-class manufacturer of metal stampings and assemblies, producing an expanding range of components for the global automotive industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>NEBRASKALAND</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9787</link>
<guid>24ac838a6b14395dda537b1c38cde219</guid>
<pubDate>Tue, 25 Jul 2023 05:54:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>NEBRASKALAND</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>141ffbd7875fcd70183aa865b4bcb65cc7d54ad95cedca85467276a9b1e1ffe3</i><br /><br />Threat actor <b>description</b>: <i>Nebraskaland, Inc. distributes and sells seafood and meat products to customers in New York metro area. It provides boxed beef, chicken, pork, lamb, veal, and various meats, as well as a range of frozen and processed foods</i><br />Target victim <b>website</b>: <i>www.nebraskaland.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Republic.bz</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9786</link>
<guid>b4d8c3b407f932ae5dde930628585e1d</guid>
<pubDate>Tue, 25 Jul 2023 04:38:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Republic.bz</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1cb5dbf399c81da4a6bad9d4979cc0bafbe47ad2f7aa6cf15d5e4f7043938aae</i><br /><br />Threat actor <b>description</b>: <i>!!!!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>El-Milagro</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9777</link>
<guid>3f504658ddff2e41061b89bdc726a160</guid>
<pubDate>Mon, 24 Jul 2023 17:57:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>El-Milagro</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>31340dcbaea2aefe7a97bbb4e051cfbf17621e935b137af68da53fd297e73219</i><br /><br />Threat actor <b>description</b>: <i>El Milagro is a small (>150m rev) family-owned tortilla company that started in 1950 in the bustling city of Chicago, Illinois. There is a good volume of detailed personal information in the pack(interested are very welcomed in messages). Accounting and financial data are represented pretty well too. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>SBM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9778</link>
<guid>f52b43f6e0e444510cf55c5869d8d06b</guid>
<pubDate>Mon, 24 Jul 2023 17:57:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>SBM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c75226360f700787e6a5da3f68d01ed66b2c719a4dfa301fde74a0ea18e9c9f7</i><br /><br />Threat actor <b>description</b>: <i>SBM is a soft service provider focused on developing empowered associates, standardized processes, management systems, and reporting tools that make your life easier. The management of this company hasn't been not very focused on developing communication with us, so we decided to report about the leak everyone who might be interested. Their data of more than 100GB size will be uploaded here withing this week. Passports, ndas, contracts, confidential agreements are about to be uploaded. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Charles--Colvard-Ltd.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9776</link>
<guid>5616060fb8ae85d93f334e7267307664</guid>
<pubDate>Mon, 24 Jul 2023 16:58:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Charles--Colvard-Ltd.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b135b09ef0fb28f6c8c543d3fea5824e2fd5965afcdcc1257c02c93dc0d007b1</i><br /><br />Threat actor <b>description</b>: <i>Charles & Colvard, manufactures, markets, and distributes moissanite jewels and finished jewelry featuring moissanite worldwide. We are going to distribute all the date we have from them. Their brilliants will be available for downloading here in our blog soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>dynamite</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9775</link>
<guid>a4ab582234ddd121e3b6857229e7d274</guid>
<pubDate>Mon, 24 Jul 2023 14:47:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>dynamite</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dda73f4ebd17a95ba17e6fc98caba8399d0e05ed184e58f796a4acaa6a042fd3</i><br /><br />Threat actor <b>description</b>: <i>DYNAMITE was founded in 2004 and is home to many best-selling properties, including The Boys, The Shadow, Warlord of Mars, Game of Thrones, SEAL Team Six and more! Dynamite owns and controls an extensive library with over 3,000 characters (which includes Warren, Harris Comics, Charlton, and Chaos Comics properties), such as Vampirella, Pantha, Evil Ernie, and Peter Cannon: Thunderbolt</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>Collins-Aerospace-An-RTX-Business</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9774</link>
<guid>d2361d07d9f4dd38dd802a5e917176a3</guid>
<pubDate>Mon, 24 Jul 2023 08:56:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Collins-Aerospace-An-RTX-Business</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b3cd7049a70358903d01b4c91d4bd37bb094f10f2b5b60fc8c7bb65a738ec13</i><br /><br />Threat actor <b>description</b>: <i>Collins Aerospace Systems, a unit of Raytheon Technologies is a provider in technology and solutions for the global aerospace and defense industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>ebpsupply.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9773</link>
<guid>e7acfd79777f2e49cfd3c2e803c44a3b</guid>
<pubDate>Mon, 24 Jul 2023 08:42:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ebpsupply.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2740236af39cdfaf26fe163dd4a9d067b4b19b745740ce67746af75ca4fa4e35</i><br /><br />Threat actor <b>description</b>: <i>Imperial Dade is the leading independently owned and operated distributor of food packaging supplies, commercial cleaning supplies</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Exbon-Development-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9768</link>
<guid>c400db3363b99ee026bc9ed0741b79df</guid>
<pubDate>Sun, 23 Jul 2023 18:44:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Exbon-Development-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ff48777e92ba85cc98d5e19c5c62ba9ca3991b9d4051f4c06f40c4e84261f35</i><br /><br />Threat actor <b>description</b>: <i>Exbon Development, Inc. has been recognized as one of the nation's top builders and developers that provide full construction services to Federal, State and Municipal government entities as well as commercial clients since its foundation in 2004. We have earned our way to the top of the industry by keeping promises to our clients and staying absolutely true to the principles that our founder established from the beginning. With an approach that emphasizes teamwork and pursuit of excellence in every project, Exbon Development, Inc. provides premier construction services across a diverse spectrum of trades and specialties including planning, program management, preconstruction, general contracting, construction management (CM), design-build and turn-key development. Exbon takes great pride in having successfully catered to the region's most distinguished and demanding clientele and knowing that such accomplishments set us apart from the rest. We are very fortunate to have backlogs of projects on hand and more are planned for the coming years. Every qualified candidate is encouraged to apply and have an opportunity to grow with us</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jackson-Township-Police-Department-and-Administration.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9767</link>
<guid>e720a515b9da87288d569caa68f42bc1</guid>
<pubDate>Sun, 23 Jul 2023 12:54:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>donutleaks</b> claims attack for <b>Jackson-Township-Police-Department-and-Administration.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da9c428caec888ae9737c661a491808621e49a6872f3eba3f4167075b0aaefe0</i><br /><br />Threat actor <b>description</b>: <i>We are prepare some announce. The data of Police Department and FBI Supervisor will be released if you will keep acting in the same way as you did early. First data package will containe 500gb dumps which was taken by Cellebrite - there the data from phones of suspects and…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>donutleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>championgse.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9766</link>
<guid>86636b6605b2bcb9a738d0e9bbce3c43</guid>
<pubDate>Sun, 23 Jul 2023 11:56:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>championgse.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b9f7696a08b825d024fd5b1a6aee6cc4087ca6f17755d1169e96348af0cdee0c</i><br /><br />Threat actor <b>description</b>: <i>14 GB DATA contains blueprints, documentation, and classified military information.Champion GSE is a leading designer and manufacturer of turbofan engine stands, containers and affiliated ground support equipment (GSE). Our innovative Stronghol...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>THE-COLLINS-LAW-FIRM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9763</link>
<guid>0ffd15f002b98f6bd62346b947b8d15a</guid>
<pubDate>Sun, 23 Jul 2023 08:40:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>THE-COLLINS-LAW-FIRM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f5deae09b45bbfcda85897da4585bed827b9e8455c01f397b9bee2c8aa02ae91</i><br /><br />Threat actor <b>description</b>: <i>Top-Rated Naperville Personal Injury, Environmental, and Business Attorneys With the Courage to Take on Powerful Interests for You  When someone causes harm to you and your family, you need aggressive, knowledgeable lawyers in your corner. At The Collins Law Firm, we pride ourselves in our ability to take the fight to powerful interests that take advantage of you. It is our privilege as Naperville personal injury lawyers to represent the injured and deliver the justice each of our clients deserves.  Whether at our law firm in Naperville, Illinois, or in trial courts throughout the state and country, our attorneys can provide you with the aggressive legal representation you need. Contact us and arrange a free consultation if you are suffering due to:      Environmental contamination that is making you and your family sick, or damaging your property value     The wrongful death of a loved one     Injuries sustained due to a car accident, medical malpractice, defective product or other negligent conduct     The breach of a business contract</i><br />Target victim <b>website</b>: <i>https://www.collinslaw.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sun-Pain-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9761</link>
<guid>4b3acf483fac3b2baaad311f1cef9674</guid>
<pubDate>Sun, 23 Jul 2023 08:02:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Sun-Pain-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>21c1c986c28f9081e5da3b5486ecdc221465c0e1da6ade46cb7e0d42c8f6171a</i><br /><br />Threat actor <b>description</b>: <i>Sun Pain Management and Spine Specialists treats clinic, whose head office is located at 5501 N 19th Ave Ste 103, Phoenix, Arizona, 85015, United States offers a wide range of procedures for patients suffering from chronic pain. In total, there are five centers of this clinic in the United States.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cafe-Britt</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9762</link>
<guid>5fcc629edc0cfa360016263112fe8058</guid>
<pubDate>Sun, 23 Jul 2023 08:01:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Cafe-Britt</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0333e919e8feaabf02c5baa6874eee3e6e818c4848893741f478c2e885d3ef93</i><br /><br />Threat actor <b>description</b>: <i>Cafe Britt is a company engaged in processing beans and making coffee in Costa Rica with subsequent export to global markets. The company's product line also includes other products, such as coffee, chocolate and cookies, etc. The head office is located at 2960 NW 72nd Ave, Miami, Florida, 33122, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Siden--Associates-Press-Release</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9757</link>
<guid>36a773b0b5996caee2eabbb5caa78023</guid>
<pubDate>Sat, 22 Jul 2023 14:55:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Siden--Associates-Press-Release</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a450d0b65a1f8cea32ebbb325cf4c528bf38f9a8187ccd0b1f5772ec8a9a849</i><br /><br />Threat actor <b>description</b>: <i>Siden & Associates, P.C. provides legal services to clients throughout the greater Boston and New England areas. Our clients range from large and medium sized corporations to small and developing businesses.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>Samson-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9755</link>
<guid>c4fac8fb3c9e17a2f4553a001f631975</guid>
<pubDate>Sat, 22 Jul 2023 12:54:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Samson-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56889457eb9121fd3f719af99f8a06f0e4359e3e7d345eff45d5b5cddd2baf23</i><br /><br />Threat actor <b>description</b>: <i>Anchorage, Alaska, US</i><br />Target victim <b>website</b>: <i>www.sei-ak.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bartlett</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9753</link>
<guid>07577d9f755d42cec7545e889b7261a3</guid>
<pubDate>Sat, 22 Jul 2023 10:23:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Bartlett</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9371997855613e408b3de2b08012a531b7121b20933ead53edbc5d6368ca45ec</i><br /><br />Threat actor <b>description</b>: <i>Bartlett Dairy - Business InformationGrocery Retail · New York, United States · 105 EmployeesHeadquarters  90-04 161st St Ste 609jamaica, Jamaica, New York, 11432, United States Phone Number (718) 658-2299 Website www.bartlettny.com Revenue $135MFounded in 1963 Bartlett Dairy is a full service business oriented dairy. They offer 880 perishable products mainly oriented to help restaurants and commercial kitchen operations and have their own fleet of trucks for deliveries.Bartlett now continues to grow at a rate that exceeds the distribution industry standard.Serving the tri-state area of New York, New Jersey and Connecticut from Montauk, Long Island to New Haven, Bartlett specializes in food service accounts such as schools, hospitals, hotels and restaurants in addition to supermarkets, mom-and-pop groceries and other retail accounts.Who We Are - The Finest Milk AvailableMilk and milk products are still our primary business. Most of the raw milk used by Bartlett Dairy comes from dairy farms in Pennsylvania and the Catskill region of New York and contain no antibiotics or synthetic hormones (rBST).</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hirsch-Bedner-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9750</link>
<guid>e369628fed6bf2eebe51b12efe570e6b</guid>
<pubDate>Fri, 21 Jul 2023 08:45:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Hirsch-Bedner-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6d729f6055a28bd570ff1b6bff0080bb3ab93329ebbbf3c14ebecbe1334c0ef</i><br /><br />Threat actor <b>description</b>: <i>Hirsch Bedner Associates (HBA), founded in 1965 and headquartered in Santa Monica, California, is a hospitality design firm specializing in interior design</i><br />Target victim <b>website</b>: <i>https://hba.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>CORDELL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9749</link>
<guid>ccc58dde99ac1c9f32531179b859bf46</guid>
<pubDate>Fri, 21 Jul 2023 07:54:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>CORDELL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>35aae950a2725c7b8875b1452994f4a74832b50ab28d5a9a7b422203e1244c83</i><br /><br />Threat actor <b>description</b>: <i>The Cordell Difference Men hire Cordell &amp; Cordell because the firm’s entire focus is on aggressively championing the rights of men and fathers through divorce. Our attorneys understand how the deck is often stacked against guys in family law and are committed to leveling the playing field by providing the legal guidance and resources needed to give them the best chance at success.</i><br />Target victim <b>website</b>: <i>https://cordellcordell.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bright-Future-Electric-LLC-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9747</link>
<guid>48259990138bc03361556fb3f94c5d45</guid>
<pubDate>Thu, 20 Jul 2023 19:00:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Bright-Future-Electric-LLC-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b43780fb3f52d4fc80cdcea2d301d02f355f4759e23ba8457d7c2ba8195e442c</i><br /><br />Threat actor <b>description</b>: <i>Bright Future Electric is a full service electrical contractor serving clients throughout the Southeast. We are going to shed somelight on their 50 Gb of data and show you a massive amount of financial docs with customers information. Besides that you can find there employee information and other operational documents. Coming soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tampa-General-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9745</link>
<guid>b430bedaf544d495473ae9767afc7111</guid>
<pubDate>Thu, 20 Jul 2023 17:15:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>Tampa-General-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30a637354a0f87c01d91968284f7cfd372e8c9954f166e383621deed93bb91bc</i><br /><br />Threat actor <b>description</b>: <i>Tampa General Hospital is a private not-for-profit hospital and one of the most comprehensive medical facilities in West Central Florida serving a dozen counties with a population in excess of 4 million. As one of the largest hospitals in Florida, Tampa General is licensed for 1,040...</i><br />Target victim <b>website</b>: <i>https://www.tgh.org/</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Campbell-Killin-Brittan--Ray-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9743</link>
<guid>9e69af6c3c1ceeff3c2dced65ed63eee</guid>
<pubDate>Thu, 20 Jul 2023 16:01:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Campbell-Killin-Brittan--Ray-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b45caaca358cdeae701eaba39a77508aea9a465711e8bc5fc69af4cb6443860</i><br /><br />Threat actor <b>description</b>: <i>We are a commercial law firm founded in 1995 by accomplished attorneys with core beliefs concentrated on providing quality, prompt, precise, reliable, consistent, and affordable service to individuals, businesses, and non-profits, regardless of size or stature, on a diverse array of matters throughout Colorado and the United States.  We regard service over profit and adhere to founding principles that emphasize fair, ethical, and honest billing practices that avoid excessive and unnecessary fees, formalities, staffing, and overhead. As a result, we have earned and maintained a variety of clients across multiple practice areas including many matters which are uncommon for a firm of our size. We maintain our focus and performance by concentrating on practice areas with related disciplines where our collective skills and experience are combined to efficiently achieve client objectives. We also maintain perspective through a tradition of charitable and pro-bono services, acknowledging that some essential legal services should be provided regardless of compensation.  CKBR’s core beliefs have attracted a skilled and enthusiastic team who take pride in their work, their business, and their reputation. In every instance, we pursue the most practical approach in the most efficient manner possible, and we pride ourselves in providing quality work with personal attention under the highest ethical and personal standards. We invite you to evaluate our efficient and affordable service model based on our representative clients, representative transactions, and attorney biographies we have placed on this website. Please contact us if you would like to discuss how we might assist you.</i><br />Target victim <b>website</b>: <i>https://www.ckbrlaw.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Entegra</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9742</link>
<guid>02aff7969b61d33fe215dba6bf0056c8</guid>
<pubDate>Thu, 20 Jul 2023 12:56:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Entegra</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1110439256e04e349a5ce44b93f088cfba91eb96ab864d333fbf21fb1a1f9e3</i><br /><br />Threat actor <b>description</b>: <i>Decades of Mechanical and Electrical Engineering, Design and Testing. Innovative smart pigging tools. An evolutionary Data Science practice. ENTEGRA’s technologies meet the real demands of pipeline operators around the world. It’s not just about getting ILI tools launched and through the pipeline. It’s about being able to accurately deliver state-of-the-art UHR imaging of the pipe 100% of the time. It’s about pipeline integrity. </i><br />Target victim <b>website</b>: <i>https://www.entegrasolutions.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Meteorological-Society</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9738</link>
<guid>656c8f81486b1e4fe59bf39ce9ff7b33</guid>
<pubDate>Thu, 20 Jul 2023 12:50:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>American-Meteorological-Society</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c01ac2eecd55c1848f1ae1d3df817c7013b6e2ac9bb31515efebe933057887a2</i><br /><br />Threat actor <b>description</b>: <i>The American Meteorological Society, founded in 1919, is a global community committed to advancing weather, water, and climate science and service.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>ScanSource</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9741</link>
<guid>69db61ce36a56178711fec066e07aeb6</guid>
<pubDate>Thu, 20 Jul 2023 12:50:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>ScanSource</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5d44413316eac6a19624c244cfd9d0988171143e39f8d81388df2af87f39aae9</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1992, ScanSource, Inc is an international distributor of technology products and solutions, focusing on point-of-sale (POS), payments, barcode, physical security, unified communications and collaboration, cloud and telecom services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Italkraft</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9727</link>
<guid>73a1c863a54653d5e184b790fee14754</guid>
<pubDate>Thu, 20 Jul 2023 12:48:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>Italkraft</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>86b4a0035dfe24b131f15610969147fe2235ccd345bb8838cf769824948a5444</i><br /><br />Threat actor <b>description</b>: <i>Headquartered in Miami, Florida, we provide our customers with Italian Design kitchen, bathroom and closet cabinetry of the highest standard and style.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Michigan-Production-Machining</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9728</link>
<guid>1e65040d77567934e4ffed55c656a3cc</guid>
<pubDate>Thu, 20 Jul 2023 12:48:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>Michigan-Production-Machining</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9d73b4f0a786a48aefee22e1d25048013d195dfc685173ceffb8aafa48522e0a</i><br /><br />Threat actor <b>description</b>: <i>Michigan Production Machining, Inc. manufactures induction heat treating supplies. The company offers precision machined ferrous and non-ferrous forgings and castings to the automotive industry. Michigan Production Machining operates in the United States.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Reyes-Automotive-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9731</link>
<guid>535b8a7c260ccef00aa9ac0ecde6067f</guid>
<pubDate>Thu, 20 Jul 2023 12:46:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>Reyes-Automotive-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>02e4327e3fe8281b78a52a45689903ef88abbd97d35c864b2ac42837db0ab0b3</i><br /><br />Threat actor <b>description</b>: <i>Reyes Automotive Group is a minority owned Joint Venture (or JV) that is comprised of two companies with a combined 120 years of manufacturing experience.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wasserstrom</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9734</link>
<guid>e242660df1b69b74dcc7fde711f924ff</guid>
<pubDate>Thu, 20 Jul 2023 12:46:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>Wasserstrom</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a18641e2dcf17505c4685079085fda92b95903732c839a6279db9103768c7673</i><br /><br />Threat actor <b>description</b>: <i>The Wasserstrom Company, headquartered in Columbus, Ohio and founded in 1902, is a restaurant supplier and distributor of foodservice supplies and equipment. They sell products, such as kitchen supplies and catering supplies, from industry manufacturers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Americold</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9735</link>
<guid>fecbfa88f364df34c32702b62f11a7d9</guid>
<pubDate>Thu, 20 Jul 2023 12:46:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cactus</b> claims attack for <b>Americold</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5ad6ca0942f43a289f49937f717afc31770bf3c7a030027f12525db6a219d0b7</i><br /><br />Threat actor <b>description</b>: <i>AmeriCold Logistics LLC is a major temperature controlled warehousing and transportation company based in Atlanta, Georgia, United States. It is in the business of modern commercialized temperature-controlled warehousing for the storage of perishable goods.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cactus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Magnolia-Steel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9722</link>
<guid>11953163dd7fb12669b41a48f78a29b6</guid>
<pubDate>Thu, 20 Jul 2023 08:20:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Magnolia-Steel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b5526e9e11e4c6429970eb307d728027e34832cc47ab47bf5b8beb560f4eec74</i><br /><br />Threat actor <b>description</b>: <i>Company fabricates reinforcement steel for concrete construction of bridges, roads, and buildings.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-Braunfels-Cardiology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9720</link>
<guid>aedf8c04c36592dbe313d5938e1cd45e</guid>
<pubDate>Thu, 20 Jul 2023 08:19:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>New-Braunfels-Cardiology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>23af463bbd2e3a5fc4e7ce20d60cc63d47633cabfe20148295674fe421e44f9c</i><br /><br />Threat actor <b>description</b>: <i>Company a part of New Braunfels community, it provides it's patients with Cardiovascular care.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kensington-Publishing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9715</link>
<guid>72e0ac3a885b78926065a979b6a46206</guid>
<pubDate>Wed, 19 Jul 2023 18:01:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Kensington-Publishing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>88e8fd6e7e39da6ada19724d0259952ed82c9504584e5e07423a41daf98d5fe2</i><br /><br />Threat actor <b>description</b>: <i>New York, United States</i><br />Target victim <b>website</b>: <i>www.kensingtonbooks.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fernmoor-Homes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9716</link>
<guid>5c5bc7df3d37b2a7ea29e1b47b2bd4ab</guid>
<pubDate>Wed, 19 Jul 2023 18:01:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Fernmoor-Homes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8fefb7d9bf0c7a3725acb7946b96cecf48e6472ac42420391d9a609058217ed9</i><br /><br />Threat actor <b>description</b>: <i>New Jersey, United States</i><br />Target victim <b>website</b>: <i>www.fernmoorhomes.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>ECS-Technology-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9717</link>
<guid>cb57cdb7cc459dc6fbbc33f91485b5e2</guid>
<pubDate>Wed, 19 Jul 2023 18:01:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>ECS-Technology-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e259fc5859f8ac08ef73b5b83076ec6bb535438dbf83c93f18a387d7d3f2af3a</i><br /><br />Threat actor <b>description</b>: <i>Texas, United States</i><br />Target victim <b>website</b>: <i>www.ecstechgroup.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Woodbine-Hospitality</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9712</link>
<guid>c55d22f5c88cc6f04c0bb2e0025dd70b</guid>
<pubDate>Wed, 19 Jul 2023 17:06:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Woodbine-Hospitality</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c1d7d61c29d9c95ee0836a3076e7775210e54d5e59f40299198e0c40488910a</i><br /><br />Threat actor <b>description</b>: <i>New York, United States</i><br />Target victim <b>website</b>: <i>www.woodbinehospitality.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sea-Force-IX</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9713</link>
<guid>d5776aeecb3c45ab15adce6f5cb355f3</guid>
<pubDate>Wed, 19 Jul 2023 17:06:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Sea-Force-IX</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e17c3a9f1a8a74fe0e9dbf2ecd13f04a761795c8969cb9e0d3dd351f5b621c2</i><br /><br />Threat actor <b>description</b>: <i>Florida, United States</i><br />Target victim <b>website</b>: <i>www.seaforceboats.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Centennial-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9714</link>
<guid>b8f3ddac6bf90e1b80cb961f2be0db5c</guid>
<pubDate>Wed, 19 Jul 2023 17:06:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Centennial-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>07633c7c1966178399262a8de3c155bc7c3127c2376b808bff53904e71e9f77c</i><br /><br />Threat actor <b>description</b>: <i>Florida, United States</i><br />Target victim <b>website</b>: <i>www.centennialinvestments.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cumberland-Pharmaceuticals-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9710</link>
<guid>f30a31bcad7560324b3249ba66ccf7aa</guid>
<pubDate>Wed, 19 Jul 2023 15:59:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Cumberland-Pharmaceuticals-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>776d492d35c628e98e608371dd3e37637831b8670c58dd75db3f33ae49ce7141</i><br /><br />Threat actor <b>description</b>: <i>Cumberland Pharmaceuticals is a specialty pharmaceutical company whose mission is to acquire currently marketed and late-stage development pharmaceutical products and grow them through marketing to targeted, underserved physician segments. Cumberland is dedicated to providing high quality products which address unmet medical needs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Braintree-Public-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9708</link>
<guid>8f822ac814829da24a7065b8131bdf47</guid>
<pubDate>Wed, 19 Jul 2023 14:46:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Braintree-Public-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6be4d7051439bbf9896b7b46e42de637db769f263d81a387df9e55f6af07a70e</i><br /><br />Threat actor <b>description</b>: <i>Braintree Public Schools is an independent public school district which serves the kindergarten through high school educational needs of the city of Braintree, Massachusetts and the surrounding areas. </i><br />Target victim <b>website</b>: <i>http://www.braintreema.gov</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lumberton-Independent-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9706</link>
<guid>daf642455364613e2120c636b5a1f9c7</guid>
<pubDate>Wed, 19 Jul 2023 11:06:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Lumberton-Independent-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>addc7a04b1709bac579557c1fabfda22a0932e46938db1f0d1857613ce838647</i><br /><br />Threat actor <b>description</b>: <i>Lumberton Independent School District Lumberton Independent School District is a public school district based in Lumberton, Texas. In addition to Lumberton, the district serves the city of Rose Hill Acres.</i><br />Target victim <b>website</b>: <i>https:/www.lumbertonisd.org/</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>DMA.US</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9705</link>
<guid>14553eed6ae802daf3f8e8c10b1961f0</guid>
<pubDate>Wed, 19 Jul 2023 01:18:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DMA.US</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>84187cce506b6a8e7680820c0d92b2fe9a2a3bec8c97db181403b8882faea7ef</i><br /><br />Threat actor <b>description</b>: <i>Attention Required! - Cloudflare</i><br />Target victim <b>website</b>: <i>https://www.DMA.US</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Este-Lauder-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9701</link>
<guid>cd163419a5f4df0ba7e252841f95fcc1</guid>
<pubDate>Tue, 18 Jul 2023 22:45:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>The-Este-Lauder-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>28c785c122752ba5285a2a01dd3e0433cd75788e95a4e0b76d19fb7b8da1d324</i><br /><br />Threat actor <b>description</b>: <i>The Estée Lauder Companies Inc. is an American multinational cosmetics company, a manufacturer and marketer of makeup, skincare, fragrance and hair care products, based in Midtown Manhattan, New York City. It is the second largest cosmetics company in the world after L'Oréal.</i><br />Target victim <b>website</b>: <i>https://estee.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>VENTIVTECH.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9693</link>
<guid>964d180ea80d672a811ed3b56da0b05e</guid>
<pubDate>Tue, 18 Jul 2023 16:42:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>VENTIVTECH.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06ec6118f1033617aa0c1597ca2eaaa280c05408324ba32356a1a5548053cc2d</i><br /><br />Threat actor <b>description</b>: <i>Risk Management Software & Claims Management Software</i><br />Target victim <b>website</b>: <i>https://www.VENTIVTECH.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ESTEELAUDER.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9691</link>
<guid>5d3145e1226fd39ee3b3039bfa90c95d</guid>
<pubDate>Tue, 18 Jul 2023 16:42:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ESTEELAUDER.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>49eba062b0a0098d63aac9a968385001da79c3466b86855833dea3b7d93090cb</i><br /><br />Threat actor <b>description</b>: <i>Estée Lauder | Beauty Products, Skin Care & Makeup</i><br />Target victim <b>website</b>: <i>https://www.ESTEELAUDER.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BLUEFIN.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9692</link>
<guid>f044bd02e4fe1aa3315ace7645f8597a</guid>
<pubDate>Tue, 18 Jul 2023 16:42:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BLUEFIN.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>62f61c88af360675934674293ffea9bbc9654e50d3884bf6978343e5258b27d6</i><br /><br />Threat actor <b>description</b>: <i>Bluefin: Payment & Sensitive Data Security Solutions</i><br />Target victim <b>website</b>: <i>https://www.BLUEFIN.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ITT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9688</link>
<guid>80b0c85e6c57765e36477a986b101ede</guid>
<pubDate>Tue, 18 Jul 2023 16:42:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ITT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>62437f99e17197433c3d1db4b90dd34bb4a8b5635ae2bf95aa9529c8da4f380a</i><br /><br />Threat actor <b>description</b>: <i>    Home - ITT Inc.  </i><br />Target victim <b>website</b>: <i>https://www.ITT.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ALLEGIANTAIR.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9689</link>
<guid>94e70705efae423efda1088614128d0b</guid>
<pubDate>Tue, 18 Jul 2023 16:42:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ALLEGIANTAIR.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>10b03f10ebf1b498f0788bf0aa6bfb8c20cced493350bb1f805269464594970d</i><br /><br />Threat actor <b>description</b>: <i>Attention Required! - Cloudflare</i><br />Target victim <b>website</b>: <i>https://www.ALLEGIANTAIR.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SMC3.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9687</link>
<guid>219ece62fae865562d4510ea501cf349</guid>
<pubDate>Tue, 18 Jul 2023 16:42:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SMC3.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>14b318de5d310e878a4f7afb0fa240d3e518abe328d7ce499393d3ff5f5805ad</i><br /><br />Threat actor <b>description</b>: <i>LTL Transportation Pricing Data - Technology Solutions from SMC³</i><br />Target victim <b>website</b>: <i>https://www.SMC3.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>AA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9684</link>
<guid>03287fcce194dbd958c2ec5b33705912</guid>
<pubDate>Tue, 18 Jul 2023 16:42:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>AA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>856a98b7f90e77a638a9d5fbcf3e026719c394e0d56208fd42cf90f008573ac4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.AA.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>JONASFITNESS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9685</link>
<guid>274e6fcf4a583de4a81c6376f17673e7</guid>
<pubDate>Tue, 18 Jul 2023 16:42:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>JONASFITNESS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24030ec26af782a16099962b19b1da840b3e26a52a0463d5c0469918c88d239b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.JONASFITNESS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tampa-general-hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9697</link>
<guid>cd3e48b4bce1f295bd8ed1eb90eb0d85</guid>
<pubDate>Tue, 18 Jul 2023 16:07:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Tampa-general-hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fb0b9c358782f4eb1d37438a135e5b6fb3db91f31e5f16521730a21278c1690b</i><br /><br />Threat actor <b>description</b>: <i>Tampa General Hospital is a private not-for-profit hospital and one of the most comprehensive medical facilities in West Central Florida serving a dozen counties with a population in excess of 4 million. As one of the largest hospitals in Florida, Tampa General is licensed for</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Health-Springs-Medical-Center-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9695</link>
<guid>764f9642ebf04622c53ebc366a68c0a7</guid>
<pubDate>Tue, 18 Jul 2023 15:02:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Health-Springs-Medical-Center-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd2613d865d47217f6972be7b06f53539c28dbe191857a76088d624b799d2a38</i><br /><br />Threat actor <b>description</b>: <i>Health Springs Medical Center is a clinic located at 209 S COLLEGE ST HEATH SPRINGS. Currently, 8 doctors of the Health Springs Medical Center work in 6 specialized fields of medicine, as well as students are trained</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nini-Collection-Ltd--Ninis-Jewels</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9696</link>
<guid>7610db9e380ba9775b3c215346184a87</guid>
<pubDate>Tue, 18 Jul 2023 15:02:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Nini-Collection-Ltd--Ninis-Jewels</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>62b86496a238a913e3ea19a4e34d5dacf62c62da646683ef066b5bcba994f9d0</i><br /><br />Threat actor <b>description</b>: <i>Nini Collection Ltd is a company that operates in the Luxury Goods & Jewelry industry. It employs 6-10 people and has $1M-$5M of revenue. The company is headquartered in Westheimer Rd Ste 330, Houston, Texas, 77056, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>dixiesfed.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9677</link>
<guid>8e5d5b79456a8e2bc09e54e9e518a5f1</guid>
<pubDate>Tue, 18 Jul 2023 09:57:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>dixiesfed.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>028428c7a46e73c97feefd424db7f03c443fbf592dd19f809e580f4cfc93e76f</i><br /><br />Threat actor <b>description</b>: <i>Home CU Banking at www.dixiefed.com. Our online banking is available 24/7/365. If you have not already enrolled in Home CU, you can enroll at any time. This service allows you to view your account balances, make transfers, view transactions and pay b...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>CashCall-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9674</link>
<guid>f8ff8b2090632d9143be6107d37c6c52</guid>
<pubDate>Tue, 18 Jul 2023 05:55:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>CashCall-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>188f6c5fe0b4585e0f31978b08ca55dd80a1d6646b9d3ad296b092f20cc0a56b</i><br /><br />Threat actor <b>description</b>: <i>CashCall - Personal Loans Founded in 2003 and headquartered in Orange, California, CashCall Inc. is among the nation's premier lenders. The company employs leading experts with an unparalleled drive and dedication to exceptional customer service. CashCall is driven to remain at the forefront of innovative technology that streamlines loan operations. This combined with their dynamic team of experts makes the loan process for customers simple, fast, and hassle-free. Cashcall personal loans division offers unsecured loans to qualified borrowers who typically use the loans for one-time purchases and debt consolidation. These loans are processed entirely over the internet, phone, and fax. Funds are wired into the borrower's checking account in as little as 4 hours.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Seasia-Infotech</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9671</link>
<guid>4572101f572c37f203cd8690fe6e4eeb</guid>
<pubDate>Tue, 18 Jul 2023 01:04:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Seasia-Infotech</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cba3c2568782f205c4d06fee89261a5fb38bf969bb429ab0838288e1a78fd18a</i><br /><br />Threat actor <b>description</b>: <i>Seasia has established itself as an industry-leader when it comes to offering efficient, tailor-made, and comprehensive digital transformation services. From enterprise development and application development to marketing and outsourcing technologies, we work with the aim of creating value for our prospects across the globe.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wasserstrom</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9673</link>
<guid>41f6e8b589d6d47cc56937ff17c493f5</guid>
<pubDate>Tue, 18 Jul 2023 01:04:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Wasserstrom</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>73647eed161f0f003982d6d14ae75b24937ee230155da526245e5fbdd9a79b6e</i><br /><br />Threat actor <b>description</b>: <i>The Wasserstrom Company, which began as a local, family-run business, has steadily grown to become one of the largest restaurant suppliers and distributors of foodservice products. With more than a century of experience and a team of over 1200 dedicated associates, Wasserstrom remains a family-owned</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cavanaugh-Biggs--Lemon-P.A.-Attorneys-at-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9667</link>
<guid>5d97f4dd7c44b2905c799db681b80ce0</guid>
<pubDate>Mon, 17 Jul 2023 16:51:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Cavanaugh-Biggs--Lemon-P.A.-Attorneys-at-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe4f87b6d321147c7032b61b7230177c5ce0a8c7557f07ec86190a7ca6e1f4f3</i><br /><br />Threat actor <b>description</b>: <i>Cavanaugh, Biggs &amp; Lemon offers a broad spectrum of legal services. From Appellate and Administrative Litigation to Worker's Compensation, we are here to serve our clients with legal counsel.  Our clients Alegria Living &amp; Healthcare, Inc. Animal Clinic of North Topeka, P.A. Brier Payne Meade Insurance, Inc. Capitol Federal Savings Cavanaugh &amp; Porter, P.A. Century/United Companies, Inc. Cook, Flatt &amp; Strobel Engineers, P.A. Davin Electric, Inc. Family Pet Hospital, P.A. Fraternal Order of Police Legal Defense Plan Feuerborn Family Funeral Service, Inc. Gage Center Dental Group, P.A. Gray Insurance Highway Oil, Inc. Kansas National Education Association Kendall Construction, Inc. Kevin Brennan Family Funeral Home Kid Stuff Marketing, Inc. Lawrence Police Officers Association Linn Willow Creek Dairy LLC Luxury Lawn and Landscape, Inc. Medicalodges, Inc. Midland Contractors, Inc. Midwest Radiology Institute, P.A. Mystere Living &amp; Healthcare, Inc. Oskaloosa Animal Clinic, P.A. Pheasant Run Ranch, LLC. Phoenix Home Care, Inc. Phoenix Home Care Illinois, Inc. Phoenix Healthcare Holdings, Inc. Plumbing by Carlson, Inc. Professional Law Enforcement Association Strathman Sales Company, Inc. United Fire Group West Ridge Animal Hospital, P.A.</i><br />Target victim <b>website</b>: <i>https://www.cavlem.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>RCI.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9657</link>
<guid>c4bf1e24f3e6f92ca9dfd9a7a1a1049c</guid>
<pubDate>Mon, 17 Jul 2023 13:22:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>RCI.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6621bd088c0daa253472faeb1b35704cda30739a86ae111d74911d80fac91800</i><br /><br />Threat actor <b>description</b>: <i>RCI – Nous animons votre réseau de voyages - RCI.com</i><br />Target victim <b>website</b>: <i>https://www.RCI.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southwest-Healthcare-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9663</link>
<guid>f03704cb51f02f80b09bffba15751691</guid>
<pubDate>Mon, 17 Jul 2023 13:22:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>donutleaks</b> claims attack for <b>Southwest-Healthcare-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>429e9bb46abad82cbe6b582368e02a721c0f8b1867b3937af785ee8c96b031b4</i><br /><br />Threat actor <b>description</b>: <i>Southwest Healthcare Services is a non-profit organization dedicated to providing quality healthcare in southwest North Dakota and northwest South Dakota. https://swhealthcare.net/ Full Data Download…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>donutleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>COMPUCOM.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9659</link>
<guid>969ebecd17b888ab767fff8d3d894c2d</guid>
<pubDate>Mon, 17 Jul 2023 13:21:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>COMPUCOM.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5addcc3bb77bf3b9548848b16638ef55410bd707dd38d81821f2552ae690caab</i><br /><br />Threat actor <b>description</b>: <i>Your Single Source for Managed IT Services Supporting Enterprises</i><br />Target victim <b>website</b>: <i>https://www.COMPUCOM.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CFINS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9660</link>
<guid>24aa17e766d29a6954b3deacca4e1bdd</guid>
<pubDate>Mon, 17 Jul 2023 13:20:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CFINS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36248f37507fcc9af8a96a19c9790003a3c18d3af9cee6ec39c2a51a7221634a</i><br /><br />Threat actor <b>description</b>: <i>Crum & Forster Insurance - Crum & Forster</i><br />Target victim <b>website</b>: <i>https://www.CFINS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TJX.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9656</link>
<guid>ab49b208848abe14418090d95df0d590</guid>
<pubDate>Mon, 17 Jul 2023 13:18:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TJX.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8009d814fd164aa0267b4ff446c20593e9c5361e3e8281099b4cdfe8ba2b2d7d</i><br /><br />Threat actor <b>description</b>: <i>Welcome to The TJX Companies Inc.</i><br />Target victim <b>website</b>: <i>https://www.TJX.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Venture-Drilling-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9653</link>
<guid>b7de93193532732fef1ae59243831bf7</guid>
<pubDate>Mon, 17 Jul 2023 12:51:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Venture-Drilling-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>167f7b403c5070b60cf910e33eb05884c932e88c23c8adebfba48e9fdab566a3</i><br /><br />Threat actor <b>description</b>: <i>Venture drilling supply is the largest water well, mining, and geothermal distributor and service provider in the nation. Our commitment is to keep you drilling. Venture Drilling Supply provides professional sales, distribution, and service throughout Texas, Oklahoma, Arkansas, Missouri and Kansas for the drilling industry's'​ top manufacturers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stephen-F.-Austin-State-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9649</link>
<guid>7c2c48a32443ad8f805e48520f3b26a4</guid>
<pubDate>Sun, 16 Jul 2023 20:47:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Stephen-F.-Austin-State-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe61618501b14cd0ddb540e0f07103f4e2bfca90a485ed2363b808013e9869d5</i><br /><br />Threat actor <b>description</b>: <i>Stephen F. Austin State University Stephen F. Austin State University is a public university in Nacogdoches, Texas.    More</i><br />Target victim <b>website</b>: <i>https:/www.sfasu.edu/</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Propper-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9643</link>
<guid>de66dbc30377a1f7908db45298324aa3</guid>
<pubDate>Sat, 15 Jul 2023 21:59:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>moneymessage</b> claims attack for <b>Propper-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b74e0c6468844db14a4b2eb56c615fac9881cd952147263e0164e07cc6996de0</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1967, Propper is a manufacturer of clothing and gear for tactical, law enforcement, public safety, and military applications The company is headquartered in St. Louis, Missouri.</i><br />Target victim <b>website</b>: <i>www.propper.com</i>]]></description>
<category>moneymessage</category>
</item>
<item xmlns:dc='ns:1'>
<title>greatlakesmbpm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9635</link>
<guid>b742027da6f65c2b92a85d76e41464e4</guid>
<pubDate>Sat, 15 Jul 2023 14:58:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>greatlakesmbpm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63c669a797703306ba6f81b2aa11440d9aaf7e4e0276126f3f8cd9c9221fe2f9</i><br /><br />Threat actor <b>description</b>: <i>Great Lakes offers compliant medical billing service with practice management system.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>co.langlade.wi.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9639</link>
<guid>2686b822a1b95a0940e608accafd292a</guid>
<pubDate>Sat, 15 Jul 2023 14:56:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>co.langlade.wi.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ca290ea50216593e115810e242c0acae854c6680fc22091239af0c41a135dd7</i><br /><br />Threat actor <b>description</b>: <i>Langlade County is a county located in the U.S. state of Wisconsin. As of the 2020 census, the population was 19,491. Its county seat is Antigo</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Highland-Health-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9633</link>
<guid>8ea284a28ff5a7e227709c23200d5e11</guid>
<pubDate>Sat, 15 Jul 2023 14:41:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Highland-Health-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f3e15148e580c2aea1b344c09359169b3d7f3488828f1665a73ffd83e967115</i><br /><br />Threat actor <b>description</b>: <i>Psychiatry, Primary Care, Pharmacy</i><br />Target victim <b>website</b>: <i>https://hhsal.org</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>GRACE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9626</link>
<guid>649d45bf179296e31731adfd4df25588</guid>
<pubDate>Fri, 14 Jul 2023 16:02:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GRACE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e9b0af53b1185f0683771e6f290193664d0758df0f2417039989988c56901cc</i><br /><br />Threat actor <b>description</b>: <i>Home</i><br />Target victim <b>website</b>: <i>https://www.GRACE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PRGX.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9627</link>
<guid>2e976ab88a42d723d9f2ee6027b707f5</guid>
<pubDate>Fri, 14 Jul 2023 16:02:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PRGX.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7add9a861b812bd2115d6e5c5ba981b8e1708127479854445c37cb8da98849b0</i><br /><br />Threat actor <b>description</b>: <i>Home - Putting S2P Analytics at the Heart of Business Health</i><br />Target victim <b>website</b>: <i>https://www.PRGX.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HESS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9628</link>
<guid>f5bf0ba0a17ef18f9607774722f5698c</guid>
<pubDate>Fri, 14 Jul 2023 16:01:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HESS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>643bc3bb84dd7bff32538a0f0cf3198b67c624f4b81e2d3b2ca936672ceed63c</i><br /><br />Threat actor <b>description</b>: <i>Hess Corporation - A Leading Independent Energy Company</i><br />Target victim <b>website</b>: <i>https://www.HESS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ARIETISHEALTH.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9620</link>
<guid>735a8b95123648555736192cd3978bc1</guid>
<pubDate>Fri, 14 Jul 2023 15:09:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ARIETISHEALTH.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9615723f926aa1ef68d4e94d88b46c1d08e2916addac1c25dbabfba6c0ef602</i><br /><br />Threat actor <b>description</b>: <i>Arietis Health - Healthcare Revenue Cycle Management</i><br />Target victim <b>website</b>: <i>https://www.ARIETISHEALTH.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SCHNABEL-ENG.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9621</link>
<guid>9f975093da0252e2c0ae181d74c90dc6</guid>
<pubDate>Fri, 14 Jul 2023 15:09:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SCHNABEL-ENG.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5ddcd8e7bcb55ff90ed30ae1013be2439b81bd2201db05360b22d3c0e1f8ee45</i><br /><br />Threat actor <b>description</b>: <i>Home - Schnabel Engineering</i><br />Target victim <b>website</b>: <i>https://www.SCHNABEL-ENG.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MYCWT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9622</link>
<guid>97c8dd44858d3568fdf9537c4b8743b2</guid>
<pubDate>Fri, 14 Jul 2023 15:09:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MYCWT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a194789155763a89d764e9b43493cefda8f0a1c53eb24063dc8fb3c2e3aabb68</i><br /><br />Threat actor <b>description</b>: <i>Your Business Travel & Meetings Management Company -  CWT</i><br />Target victim <b>website</b>: <i>https://www.MYCWT.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PINNACLETPA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9619</link>
<guid>e4f67a0e4293245fba713c412fc63e28</guid>
<pubDate>Fri, 14 Jul 2023 15:09:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PINNACLETPA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e25eaaacb6ab0405630ca7c499398691ac747a5449d308cb8e9b437099ad83aa</i><br /><br />Threat actor <b>description</b>: <i>Home - Pinnacle Claims Management</i><br />Target victim <b>website</b>: <i>https://www.PINNACLETPA.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CPA-Advisors-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9615</link>
<guid>db7594703df912c1308b49012bbf81ea</guid>
<pubDate>Fri, 14 Jul 2023 06:50:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>CPA-Advisors-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>813d8fd2198fb9883623ca8a4c6e6c228e4b7968dc41e2c98cecbc0c2c4d653a</i><br /><br />Threat actor <b>description</b>: <i>Our accounting firm was formed with a single principle in mind: to provide the highest level of personalized client service possible. Simply put, we care about each and every one of our clients.  If you would like to develop a relationship with an accountant that will know your name, get to know ours.Our full-service accounting firm is well established and is ready to serve you. Since our inception, we have grown continuously by providing a wide-array of professional services. Let us know how we can serve you. We’re here to help.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gerber-ChildrenswearLLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9610</link>
<guid>5943a6c821a417791dffc82b4b6268a8</guid>
<pubDate>Thu, 13 Jul 2023 18:02:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Gerber-ChildrenswearLLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1eb64d9594b0f29c193ce6e1df3b6292da9dddbdcea980b31fb2ebb3c2e72490</i><br /><br />Threat actor <b>description</b>: <i>Gerber Childrenswear LLC is a leading marketer of infant and toddler apparel and related products in the marketplace. Almost 0.5TBof data will be uploaded to our blog soon. So detailed business information is there: patents, trademarks, contracts with other business giants. Much to look through.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>UFCU.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9607</link>
<guid>b0da9d8dd88178e3bb138e08742eb2e2</guid>
<pubDate>Thu, 13 Jul 2023 15:03:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>UFCU.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe1f2d1f5355e87be777b25d324dd9f5b01c49dc1bec874087a60bc80b43bacc</i><br /><br />Threat actor <b>description</b>: <i>UFCU Checking, Savings, Credit Cards, Auto Loans, Mortgages, and More</i><br />Target victim <b>website</b>: <i>https://www.UFCU.ORG</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ROCHESTER.EDU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9605</link>
<guid>217dade2ab7db91d12f1bca7b0cd4c82</guid>
<pubDate>Thu, 13 Jul 2023 15:03:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ROCHESTER.EDU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a39f4cc0687d02763e231e5ba0073065e0dd979b6294fc9cf1715e8bbff113d</i><br /><br />Threat actor <b>description</b>: <i>University of Rochester</i><br />Target victim <b>website</b>: <i>https://www.ROCHESTER.EDU</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Blackjewel-L.L.C.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9609</link>
<guid>70e9dbe24ba303f2d25ac34d3ae945c5</guid>
<pubDate>Thu, 13 Jul 2023 14:02:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>Blackjewel-L.L.C.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>13941b91aae4a269ede2f50bfd057d7b2a04d74e5674e6178298135d4a181681</i><br /><br />Threat actor <b>description</b>: <i>We give you a unique chance to see the corporation Blackjewel LLC from the inside. This is the third large US coal company so it will be interesting.To your attention more than 500gb of documents, databases, Accounting, Audit, data of all branches...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>SHUTTERFLY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9599</link>
<guid>141aa4fef48df77f954d60a373a3c322</guid>
<pubDate>Thu, 13 Jul 2023 12:44:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SHUTTERFLY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18f580df4f5799a4c84ad2a87c835169068979907fe42b78fb6c066d849aa048</i><br /><br />Threat actor <b>description</b>: <i>Shutterfly: Photo Books, Cards, Prints, Wall Art, Gifts, Wedding</i><br />Target victim <b>website</b>: <i>https://www.SHUTTERFLY.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DISCOVERY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9600</link>
<guid>7551617774bcd665e4abe990db4f6f83</guid>
<pubDate>Thu, 13 Jul 2023 12:43:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DISCOVERY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>58fbc7a9329d6c84a422d77231d6bab957e18bdac76678a4cb4055b1a54f860e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.DISCOVERY.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ASPENTECH.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9601</link>
<guid>a01f3ca6e3e4ece8e1a30696f52844bc</guid>
<pubDate>Thu, 13 Jul 2023 12:43:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ASPENTECH.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b888f31ec5ec7b86b8c037272412db0a967b08d50134efd049730239f8f2818</i><br /><br />Threat actor <b>description</b>: <i>AspenTech - Asset Optimization Software - Asset Performance Management, Process Engineering for Chemicals, Energy and Engineering & Construction</i><br />Target victim <b>website</b>: <i>https://www.ASPENTECH.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MOTHERSON.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9602</link>
<guid>6ffad86b9a8dd4a3e98df1b0830d1c8c</guid>
<pubDate>Thu, 13 Jul 2023 12:42:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MOTHERSON.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>43c4fd224aa28a86e6414cd19b6b232e77c4343dcdace7559ed28d3950132bff</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.MOTHERSON.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PAYCOM.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9603</link>
<guid>9a555403384fc12f931656dea910e334</guid>
<pubDate>Thu, 13 Jul 2023 12:42:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PAYCOM.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2de192190c8673813fb5980b3dbe7b76916ef217518cabdd65befd33d1fcaab0</i><br /><br />Threat actor <b>description</b>: <i>Online Payroll Services - HR Payroll Software - Paycom</i><br />Target victim <b>website</b>: <i>https://www.PAYCOM.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Traffic-Tech</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9595</link>
<guid>2990cb071c6413d6cde1512f6474506a</guid>
<pubDate>Thu, 13 Jul 2023 06:01:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>The-Traffic-Tech</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>843b1c4f68ed819ccb95eb6bfca3350808b948e066b3a5cf759270f05d073e58</i><br /><br />Threat actor <b>description</b>: <i>The Traffic Tech Gull is an award winning ISO certified total solutions provider of integrated systems in traffic management. intelligent transportation, parking management, security, communications and truck weigh stations. Founded in 2000, Traffic Tech Experience in Tratic Engineering, integrating systems to meet customized needs using the most advanced technologies available in the market, Over the past twenty (20) years, Taffic Tech has developed com engineering, system integration, contracting and service capabilities, that helped earn Trafic Tech a leading role in the balds of specialization throughout the Gulf regions. Our scope includes design, system integration equipment supply installation, commissioning, operation, and after-sales service.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>GRIPA.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9580</link>
<guid>0cdbb4e65815fbaf79689b15482e7575</guid>
<pubDate>Wed, 12 Jul 2023 21:28:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GRIPA.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fefd69ec296f1044b02bef930c3c1f5e57fe54f4b57427430d95bac353d78070</i><br /><br />Threat actor <b>description</b>: <i>Greater Rochester Independent Practice Association – GRIPA</i><br />Target victim <b>website</b>: <i>https://www.GRIPA.ORG</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SLB.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9581</link>
<guid>123650dd0560587918b3d771cf0c0171</guid>
<pubDate>Wed, 12 Jul 2023 21:28:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SLB.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9de0974202469c83550966e792781d4c3406912def7391462778d149d9107c72</i><br /><br />Threat actor <b>description</b>: <i>SLB, a global technology company - SLB</i><br />Target victim <b>website</b>: <i>https://www.SLB.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>AMCTHEATRES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9582</link>
<guid>e20b21ae6508f22fc189c60a0880d0b8</guid>
<pubDate>Wed, 12 Jul 2023 21:28:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>AMCTHEATRES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>15a82d9d0b6a52ad5b9ecf429871407c0f37d01749d54048efc5507544b7df9c</i><br /><br />Threat actor <b>description</b>: <i>AMC Theatres - movie times, movie trailers, buy tickets and gift cards.</i><br />Target victim <b>website</b>: <i>https://www.AMCTHEATRES.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>AINT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9583</link>
<guid>88ed1c065719496c24b45a72994a3283</guid>
<pubDate>Wed, 12 Jul 2023 21:27:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>AINT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8e7b4062a75304077a4bcaa68f1568245f9898483ec49ba575db8e898ac80993</i><br /><br />Threat actor <b>description</b>: <i>        Advanced Integration Technology    </i><br />Target victim <b>website</b>: <i>https://www.AINT.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>JACKENTERTAINMENT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9584</link>
<guid>130214d369d555e15e6b1621771809ad</guid>
<pubDate>Wed, 12 Jul 2023 21:27:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>JACKENTERTAINMENT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ef06f55ac9df28adcb3a7d8ce92143fa57610bb39cc40c4e24e99881e2eccf07</i><br /><br />Threat actor <b>description</b>: <i>JACK Entertainment - Gaming, Hospitality & Entertainment</i><br />Target victim <b>website</b>: <i>https://www.JACKENTERTAINMENT.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>NASCO.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9585</link>
<guid>da52dbdb51e5c9b3fcacdc228065d5e0</guid>
<pubDate>Wed, 12 Jul 2023 21:26:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NASCO.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3b0b11b39674671b8db043131bffc9d9fd1e3f79785153bd184d04992784f4b</i><br /><br />Threat actor <b>description</b>: <i>NASCO – NASCO is a healthcare company dedicated to co-creating digital health solutions for Blue Cross and Blue Shield companies.</i><br />Target victim <b>website</b>: <i>https://www.NASCO.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TGIDIRECT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9586</link>
<guid>07dd4d5a72f5740ef0f035f201951476</guid>
<pubDate>Wed, 12 Jul 2023 21:26:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TGIDIRECT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8d4954668f7edf384094bbe2582a7ad3bc511f5ecfd32ca4fa5947278c351ed7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.TGIDIRECT.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HONEYWELL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9587</link>
<guid>68bc9477d0f2c908eed9498bf926d89e</guid>
<pubDate>Wed, 12 Jul 2023 21:25:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HONEYWELL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f8bfd431e04eb8d7b0eeca3a0b4116b98cfac640a1481d0a497282293f592f2</i><br /><br />Threat actor <b>description</b>: <i>Honeywell - The Future Is What We Make It</i><br />Target victim <b>website</b>: <i>https://www.HONEYWELL.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CLEARESULT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9588</link>
<guid>0a66e17d3ccde15bdecb253e7e293294</guid>
<pubDate>Wed, 12 Jul 2023 21:25:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CLEARESULT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>75ba52aafdb3ff2e06ada6a97246340aca16d72705d606503194174bcff9d2a9</i><br /><br />Threat actor <b>description</b>: <i>CLEAResult - Energy efficiency, transition and decarbonization solutions</i><br />Target victim <b>website</b>: <i>https://www.CLEARESULT.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>RADIUSGS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9579</link>
<guid>aa677d660eefd1fe0d323c1dc9bfa869</guid>
<pubDate>Wed, 12 Jul 2023 21:24:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>RADIUSGS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c29cfd395b82e72bce8f1d8896efe1d1e4df563455b71ed2360c9f0fe261e789</i><br /><br />Threat actor <b>description</b>: <i>Omnichannel Customer Experience Outsourcing - Radius</i><br />Target victim <b>website</b>: <i>https://www.RADIUSGS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Henock-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9574</link>
<guid>dd542bb339e57d2bcf9bdbbf870ac74f</guid>
<pubDate>Wed, 12 Jul 2023 19:02:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Henock-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cdda03a0a32bae7fe9e405d410ebc9782a60d5a22af34c7834f7a1df46969acf</i><br /><br />Threat actor <b>description</b>: <i>A company that operates in the Construction industry. It employs 6-10 people and has $1M-$5M of revenue.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mission-Parks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9576</link>
<guid>f96f9be4a7f4fa8ad6803378e0529ebc</guid>
<pubDate>Wed, 12 Jul 2023 19:02:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Mission-Parks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bed4b9dc2bfef08a4881cfe841155ec399a7dd9236e1a8158e6364b2ed5f7c91</i><br /><br />Threat actor <b>description</b>: <i>A company that operates in the Individual & Family Services industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Amber-Court-2020-was-hacking.-A-lot-of-customers-personal-information-was-stolen.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9570</link>
<guid>968b15768f3d19770471e9436d97913c</guid>
<pubDate>Wed, 12 Jul 2023 13:57:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Amber-Court-2020-was-hacking.-A-lot-of-customers-personal-information-was-stolen.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b5faba39ce2cbb8d5694d939230ce26efe3dcb8b63a56c830c30ff00ad693ee3</i><br /><br />Threat actor <b>description</b>: <i>Who is Amber Court 2020  Since 1968, under the loving care and guidance of Alfred and Judith Schonberger, they set the standard for quality care and lifestyle for seniors, in a residential setting. This holistic approach for an individual’s well-being, physically, mentally and emotionally, is at the heart of the Amber Court Family experience.  Headquarters: 1155 E Jersey St, Elizabeth, New Jersey, 07201, United States Phone Number: (908) 352-9200 Website: www.ambercourtal.com Facebook: http://www.facebook.com/ambercourtal</i><br />Target victim <b>website</b>: <i>www.ambercourtal.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Schmidt-Salzman--Moran-Ltd</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9565</link>
<guid>84453be26be0a83edcbce02c1a0dbfe5</guid>
<pubDate>Wed, 12 Jul 2023 12:59:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Schmidt-Salzman--Moran-Ltd</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d535e4225a9f82b66738077d709aa8a09677763bf6e9aadf4253a77d7e33e933</i><br /><br />Threat actor <b>description</b>: <i>With 35 years of practice in real estate taxation, Schmidt Salzman & Moran, Ltd. aggressively pursues the lowest possible real estate taxes for its clients’ commercial, industrial and multi-unit residential properties. This company has not given us even the lowest price for their customers' personal information. If they don't need it, we are sure there are many of you who are interested.More that 70GB will be uploaded soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wright-Moore-DeHart-Dupuis--Hutchinson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9564</link>
<guid>a3b36cb25e2e0b93b5f334ffb4e4064e</guid>
<pubDate>Wed, 12 Jul 2023 10:46:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Wright-Moore-DeHart-Dupuis--Hutchinson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8cccd4e16335b5d19590d8bea57be3a7e10363fe9e53c54e59bce2766dfd40e3</i><br /><br />Threat actor <b>description</b>: <i>For years, the accounting firm of Wright, Moore, DeHart, Dupuis &amp; Hutchinson (WMDDH) has been providing quality, personalized financial guidance to individuals and businesses. WMDDH's expertise ranges from basic tax management and accounting services to more in-depth services such as audits, financial statements, litigation support, management advisory and consulting services. WMDDH has an extensive background dealing with the oil and gas industry, and we service clients ranging from small companies to multi-national operations. WMDDH takes the approach that we are your partner in business. By combining our expertise, experience and the team mentality of our staff, we assure that every client receives the close analysis and attention they deserve. Our dedication to high standards, hiring of seasoned professionals, and work ethic has provided that level of service for our clients across the country. We take pride in building long-term relationships with our clients and are committed to providing the highest level of personalized service in the industry.</i><br />Target victim <b>website</b>: <i>https://www.wmddh.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Murfreesboro-Medical-Clinic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9557</link>
<guid>e046cbb371a979a6893456eee7f00703</guid>
<pubDate>Tue, 11 Jul 2023 15:59:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Murfreesboro-Medical-Clinic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1cef1df57346f64b909ea0367e073633998bda2c1f71394b6144648af8a0e897</i><br /><br />Threat actor <b>description</b>: <i>Murfreesboro Medical Clinic & SurgiCenter (MMC) is a physician-owned, multispecialty clinic and an Accredited Surgery Center located in Rutherford County.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>CONSOLENERGY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9555</link>
<guid>8ff3fdef6f5144f50eb2a83cd34baa5d</guid>
<pubDate>Tue, 11 Jul 2023 15:17:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CONSOLENERGY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>125b86a0ae303786ff848c872d44e2f1b4e634d94eb7988067090d054a5c3a9c</i><br /><br />Threat actor <b>description</b>: <i>Home - CONSOL Energy Inc.</i><br />Target victim <b>website</b>: <i>https://www.CONSOLENERGY.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>A123-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9556</link>
<guid>177da57035b03c2eb2cbe9b872348d15</guid>
<pubDate>Tue, 11 Jul 2023 14:58:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>A123-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60c0a5a0b6dcbd45f1dbdf4321f0c446d56682f42ad4e4a08b6b653ea814bf17</i><br /><br />Threat actor <b>description</b>: <i>A123 Systems, Inc. (Nasdaq:AONE) develops and manufactures advanced lithium ion batteries and battery systems for the transportation, electric grid services and commercial markets. We have more than 350GB of data from this company and will upload everything soon. You will find tons of confidential business information thereas well as detailed info of staff. Another stocks falling is coming.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>SCCU.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9552</link>
<guid>019fa4fdf1c04cf73ba25aa2223769cd</guid>
<pubDate>Tue, 11 Jul 2023 14:53:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SCCU.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba28e9e5876e04d927c22585a9614ed765963b84af6b96664dbf558397d22adf</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.SCCU.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>AGILYSYS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9553</link>
<guid>de535e267c10a7c88f2ed4283e8484da</guid>
<pubDate>Tue, 11 Jul 2023 14:53:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>AGILYSYS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c7eb876c1c4a97160c1188a63cc590346c1863006cad1a51cc6a409f8b34b80</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.AGILYSYS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PIONEERELECTRONICS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9549</link>
<guid>6a21bd02b3d17059c61bcb2eeb48b8cd</guid>
<pubDate>Tue, 11 Jul 2023 14:53:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PIONEERELECTRONICS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f2e3c1728c1d6ee0ca261a6a0d0a060b4deed47805f896bb7f9d3e172d76888</i><br /><br />Threat actor <b>description</b>: <i>Pioneer USA, Car Stereo, Speakers, Home Theater, Navigation, DJ - Pioneer Electronics USA</i><br />Target victim <b>website</b>: <i>https://www.PIONEERELECTRONICS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>RITEAID.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9550</link>
<guid>32b9e74c8f60958158eba8d1fa372971</guid>
<pubDate>Tue, 11 Jul 2023 14:53:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>RITEAID.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b897588616d25ad762daf809d91ba385c365b6ecc0e107cc908f9981e6d7b31</i><br /><br />Threat actor <b>description</b>: <i>Online Pharmacy and Store - Rite Aid</i><br />Target victim <b>website</b>: <i>https://www.RITEAID.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>EMERSON.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9546</link>
<guid>4845b84d63ea5fa8df6268b8d1616a8f</guid>
<pubDate>Tue, 11 Jul 2023 14:53:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>EMERSON.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2d56f5c38d86e31619fa3efda738f2268183059824f434cb229842a6fd8a80db</i><br /><br />Threat actor <b>description</b>: <i>Emerson Global - Emerson</i><br />Target victim <b>website</b>: <i>https://www.EMERSON.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>panoramaeyecare.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9544</link>
<guid>b2303e95600891090f6519df2b23eb09</guid>
<pubDate>Tue, 11 Jul 2023 10:01:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>panoramaeyecare.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>01e089a103490df855906396cf8fea8ff5b09ad5bac9b4a00ca199ad4a5f3d5e</i><br /><br />Threat actor <b>description</b>: <i>Downloaded 798gb of data from all these companies:eyecenternoco.com ;denvereyesurgeons.com ;cheyenneeyeclinic.com ;2020visioncenter.com.  Panorama Eyecare is a physician-led management services organization designed to support its partner...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kansas-medical-center-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9536</link>
<guid>649adc59afdef2a8b9e943f94a04b02f</guid>
<pubDate>Tue, 11 Jul 2023 08:49:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Kansas-medical-center-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53d2a6a6ad85b4e41af7dce6caa6496afb7acab210afdee9d38c2a8e7c6caaa5</i><br /><br />Threat actor <b>description</b>: <i>Kansas Medical Center is a fully physician owned hospital. In addition to our owners, we have many doctors on staff that cover a wide array of specialties.Through the dedicated service of physicians and staff practicing in a state of the art facility with the most advanced integrated equipment and information technology, the Kansas Medical Center brings comprehensive health care of the highest caliber to patients in Andover, and the communities throughout Kansas.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Danbury-Public-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9537</link>
<guid>19702ce80aa823cd508f85c0034a7e97</guid>
<pubDate>Tue, 11 Jul 2023 08:49:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Danbury-Public-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be56ab566c9e21a4b5e2bbcdc174fb3b6e6ad869fa8cdd9a6231c6d5589eafeb</i><br /><br />Threat actor <b>description</b>: <i>Danbury Public Schools is one of the fastest-growing school districts in Connecticut. Our teachers and staff educate more than 12,000 students, preparing them to succeed in higher education, work, and life. Our students and faculty members represent a rich blend of diversity and dozens of heritages.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Motor-Components-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9540</link>
<guid>d1d6a7eae40b025e869ac0853049efc2</guid>
<pubDate>Tue, 11 Jul 2023 08:48:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Motor-Components-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8a22c106bdbb8e4b20b6c3e9f69983fef2a6bcce0723f8e5f0d6d6b0bf729abb</i><br /><br />Threat actor <b>description</b>: <i>We attacked this company 06.07.2023www.facet-purolator.comCompany internal documentsContact list with information about partners and clientsEmployee Data BaseChecks, invoicesFinancial indicators and balance sheetOfficial letters, faxesShipment information in different countriesConfidential data about employees and their salariesIT infrastructure with detailed network map and access</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>gis4.addison-il</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9535</link>
<guid>ba825ea8a40c385c33407ebe566fa1bc</guid>
<pubDate>Tue, 11 Jul 2023 08:39:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cuba</b> claims attack for <b>gis4.addison-il</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee5addf9bf97e1059263262e9eb85e27427c582f4a5032d840e74637c0195af2</i><br /><br />Threat actor <b>description</b>: <i>More than 36,000 people call the Village of Addison home.  Whether you are new to our community, or have lived here for years, we want you to get acquainted with our community. We also want to make it easy for you to stay...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cuba</category>
</item>
<item xmlns:dc='ns:1'>
<title>Customer-Elation---Business-Information</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9534</link>
<guid>93d9033636450402d67cd55e60b3f926</guid>
<pubDate>Mon, 10 Jul 2023 22:46:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Customer-Elation---Business-Information</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1643448a3dd018e9fa2c1099eea6ecc44a33e407f908ce68dafb20e90d5af0be</i><br /><br />Threat actor <b>description</b>: <i>Customer Elation provides call center services to clients who want the capabilities of a large call center with the attention and care of a small business.</i><br />Target victim <b>website</b>: <i>https://www.customerelation.com/</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>RICOHACUMEN.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9524</link>
<guid>84a529a92de322be42dd3365afd54f91</guid>
<pubDate>Mon, 10 Jul 2023 19:49:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>RICOHACUMEN.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd36b71e3ffb484916ab092a99f9146f0fabc9f428608273074dccbd9e45e79d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.RICOHACUMEN.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>UMASSMED.EDU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9527</link>
<guid>52569c045dc348f12dfc4c85000ad832</guid>
<pubDate>Mon, 10 Jul 2023 19:48:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>UMASSMED.EDU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6cdc716a2c35780ffbfa95662efa98dc9964976c86d3b70a4d7353f90956d915</i><br /><br />Threat actor <b>description</b>: <i>UMass Chan Medical School </i><br />Target victim <b>website</b>: <i>https://www.UMASSMED.EDU</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>JHU.EDU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9529</link>
<guid>d58f36f7679f85784d8b010ff248f898</guid>
<pubDate>Mon, 10 Jul 2023 19:47:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>JHU.EDU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b89c477ba9ff4551ed271953440010a31e4ac7102e769588835049fcd6096a3c</i><br /><br />Threat actor <b>description</b>: <i>Home - Johns Hopkins University</i><br />Target victim <b>website</b>: <i>https://www.JHU.EDU</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>FMFCU.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9530</link>
<guid>960fe54b16d890a75e845fcd23afc32d</guid>
<pubDate>Mon, 10 Jul 2023 19:46:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>FMFCU.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>75b37a3de7259b4b432622c4f4a8df96033fa5293ac7aba32ccea98915b2c830</i><br /><br />Threat actor <b>description</b>: <i>Franklin Mint Federal Credit Union</i><br />Target victim <b>website</b>: <i>https://www.FMFCU.ORG</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>JPRMP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9531</link>
<guid>576e5effaa235485db53702d723976d7</guid>
<pubDate>Mon, 10 Jul 2023 19:46:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>JPRMP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>990a318dc953c1f21a42b49fa5c579fc7b52bd39e1111be1d231650436a3e0d4</i><br /><br />Threat actor <b>description</b>: <i>JP RMP - Medical Billing and Bad Debt Collection Services</i><br />Target victim <b>website</b>: <i>https://www.JPRMP.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>WESTAT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9532</link>
<guid>a133710cb2bedc27da8daaadb931553b</guid>
<pubDate>Mon, 10 Jul 2023 19:45:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>WESTAT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>778c72b34922a2b0e7f02a82ca2c446d0fe37a7c322fa36b9f147849d06ec064</i><br /><br />Threat actor <b>description</b>: <i>Homepage - Westat</i><br />Target victim <b>website</b>: <i>https://www.WESTAT.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>RADISSONHOTELSAMERICAS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9533</link>
<guid>10eb6500bd1e4a3704818012a1593cc3</guid>
<pubDate>Mon, 10 Jul 2023 19:45:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>RADISSONHOTELSAMERICAS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>933b88665a03f5147c1f5f7915bcac55b2556d17e6a24ff576bb2cf2b2517b04</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.RADISSONHOTELSAMERICAS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hamre-Schumann-Mueller--Larson-HSML</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9523</link>
<guid>db079083386e2e0885f278fbd1d8a476</guid>
<pubDate>Mon, 10 Jul 2023 17:58:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Hamre-Schumann-Mueller--Larson-HSML</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a2d344b57b9cfddc6ef52e73a0effce1c2f4ca85941286398836a1a038c32ae</i><br /><br />Threat actor <b>description</b>: <i>HSML serves the intellectual property needs of a wide range of businesses and individuals from around the world. Their file base includes confidential documents, contracts, clients' personal information, and anything else you might need. 102 GB of their documents will soon be uploaded.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Green-Diamond</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9521</link>
<guid>97f832f6f334d64de3e89769806e56b8</guid>
<pubDate>Mon, 10 Jul 2023 16:02:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Green-Diamond</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5655da9a3846b4d7285e22133f1bcad4a1f20f0acf777163479ab20aac68aa99</i><br /><br />Threat actor <b>description</b>: <i>Green Diamond is a fifth-generation, family-owned forest productscompany that owns and manages working forests in nine states throughout the western and southern U.S. Working the forest for so long seems to have taken away the management of this company of their ability to communicate with people. They didn't utter a word for about two weeks after the hack.We found some interesting data on their network and are posting over 30GB of their business information, including personal information, here. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>leeindustries.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9519</link>
<guid>68fc266c3090819707d3c4c6cdcc1ed5</guid>
<pubDate>Mon, 10 Jul 2023 01:33:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>leeindustries.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d69d2df44979dfc28c49088f39d21e9c21a93819890c17f8668d38c77e28af2</i><br /><br />Threat actor <b>description</b>: <i>Since its inception, the mission of LEE Industries has been to create innovatively styled, high-quality home furnishings while adhering to a set of values that focus on their customers, the community and the environment.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>JANUS-Research-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9342</link>
<guid>dcf3219715a7c9cd9286f19db46f2384</guid>
<pubDate>Sun, 09 Jul 2023 08:25:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>donutleaks</b> claims attack for <b>JANUS-Research-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>55d368a6ea3dd94e0e063854e96e5b4823906d8f5f9c199eb31214e65d0b4902</i><br /><br />Threat actor <b>description</b>: <i>https://www.janusresearch.com JANUS is a technology innovator and engineering and technical services large business. Founded in 1997 as a virtual training and mission support services company, we have grown over time by forging a reputation for technical excellence, innovation, cost-schedule performance, and customer service. Today, JANUS’ centers of…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>donutleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Montgomery-General-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9337</link>
<guid>305fa4e2c0e76dd586553d64c975a626</guid>
<pubDate>Sun, 09 Jul 2023 08:24:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>donutleaks</b> claims attack for <b>Montgomery-General-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8f4b71e5fbda5c8b770aff6c03de9ec86544574f815b8e6503117c2b37c7e0a</i><br /><br />Threat actor <b>description</b>: <i>Montgomery General HospitalIt provides the patient the opportunity to access their health information securely, confidentially and at their convenience.Montgomery General HospitalMontgomery General Hospitalhttps://mghwv.com/Here at Montgomery General Hospital, we understand that healthcare is evolving. The advances in medicine and strides in technology are providing local communities access…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>donutleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nabtesco-Motion-Control</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9338</link>
<guid>7b3403f79b478699224bb449509694cf</guid>
<pubDate>Sun, 09 Jul 2023 08:23:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>donutleaks</b> claims attack for <b>Nabtesco-Motion-Control</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b8925bb8ba2716aca802455da39907bab006f850ab2018fdbf82f680f30ef4a</i><br /><br />Threat actor <b>description</b>: <i>High Precision Cycloidal Gear Manufacturer - NabtescoNabtesco manufactures cycloidal gearboxs and provides high performance reduction gears, hollow shaft gear heads and single axis servo-actuators and controllers.Nabtescohttps://www.nabtescomotioncontrol.com/ Nabtesco is the largest precision Cycloidal gearbox manufacturer in the world and leads the precision gear industry by providing High…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>donutleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>UnitedLex.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9339</link>
<guid>b8ce47761ed7b3b6f48b583350b7f9e4</guid>
<pubDate>Sun, 09 Jul 2023 08:23:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>donutleaks</b> claims attack for <b>UnitedLex.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5d796e9795c0e06b8594d45373eade768dd96152db98f6f74b3d19eb5fd44661</i><br /><br />Threat actor <b>description</b>: <i>Moving legal to the future. From routine litigation and IP matters to operational redesign, our modern solutions are built to scale, remove friction, and create competitive advantage. Get in Touch Litigation & Investigations Multi-platform by design, our comprehensive litigation support and investigations services are designed to take on the most…</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>donutleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-Century-Advisors-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9331</link>
<guid>bd9d03102a312711b0a71ecb44581d9d</guid>
<pubDate>Fri, 07 Jul 2023 20:50:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>New-Century-Advisors-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bacc13d25b19934e32d45bd6e6e3620a30e4e1725a9a9ced4a291bd37fccd536</i><br /><br />Threat actor <b>description</b>: <i>Since its founding in 2002, New Century Advisors has partnered with its clients to develop and execute customized strategies to meet their unique needs including core, inflation-linked, short duration, multi asset and equity strategies.New Century Advisors prides itself in seeking to deliver superior risk-adjusted returns with a high touch client service approach. New Century Advisors' clients represent prestigious public funds, corporations, endowments, foundations, healthcare systems and insurance companies.New Century Advisors is entirely employee owned and its principals have worked together for over 10 years</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>ROBERT-L-BAYLESS-PRODUCER-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9329</link>
<guid>c115ba9e04ab27fbbb664f932112246d</guid>
<pubDate>Fri, 07 Jul 2023 20:44:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>ROBERT-L-BAYLESS-PRODUCER-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>110d834bc22e4d3110e7b2167403f09b44e769f5c080a695c917d7993a487ebe</i><br /><br />Threat actor <b>description</b>: <i>Robert L. Bayless, Producer LLC is a privately owned oil and natural gas company engaged in exploration and production activities in the southern and central Rocky Mountain Region with offices in Denver, Colorado and Farmington, New Mexico</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Industrial-Heat-Transfer-iht-inc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9328</link>
<guid>fdb55ce855129e05da8374059cc82728</guid>
<pubDate>Fri, 07 Jul 2023 20:05:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rancoz</b> claims attack for <b>Industrial-Heat-Transfer-iht-inc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>513fc3d119d5c97f1008cee464be6a72b2d992870ce36bdcf4e0bb322e323911</i><br /><br />Threat actor <b>description</b>: <i>Custom Heat Exchanger Manufacturer</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rancoz</category>
</item>
<item xmlns:dc='ns:1'>
<title>CROWE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9326</link>
<guid>45ececbb4fa848ad3a87f3ee17919755</guid>
<pubDate>Fri, 07 Jul 2023 16:25:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CROWE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d72787ca2774b0deb2142f208a18ebd109f5e0d9c77aa5f640f2c65226515661</i><br /><br />Threat actor <b>description</b>: <i>Accounting, Consulting & Technology - Crowe LLP</i><br />Target victim <b>website</b>: <i>https://www.CROWE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>AUTOZONE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9327</link>
<guid>7392ea4ca76ad2fb4c9c3b6a5c6e31e3</guid>
<pubDate>Fri, 07 Jul 2023 16:25:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>AUTOZONE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea96eb08c5d30e60ec0f09e908132d8bcbe5cbbeeb04e5ca2046e1d669686481</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.AUTOZONE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>AMERICANNATIONAL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9318</link>
<guid>0589dd536fd043ff3865f8223fef3030</guid>
<pubDate>Fri, 07 Jul 2023 16:24:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>AMERICANNATIONAL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>801355f47b77b067d5b2b1754868c3997a2d831f843ea24e5637035d79ebd451</i><br /><br />Threat actor <b>description</b>: <i>American National Insurance</i><br />Target victim <b>website</b>: <i>https://www.AMERICANNATIONAL.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>USG.EDU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9319</link>
<guid>29000b029c61328a948b1c7afa01cea3</guid>
<pubDate>Fri, 07 Jul 2023 16:24:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>USG.EDU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>07f0ce05303684c1ad7439e63ea5ec0e3b8825a465606d6893a534df781c4794</i><br /><br />Threat actor <b>description</b>: <i>University System of Georgia</i><br />Target victim <b>website</b>: <i>https://www.USG.EDU</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CYTOMX.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9320</link>
<guid>827d73770aaf3ea56e4ddbd99f0141f7</guid>
<pubDate>Fri, 07 Jul 2023 16:23:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CYTOMX.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>84be0363d03676dc42dcf602134fc2396e1e1e1759cd8b3a9ac523be44ca037c</i><br /><br />Threat actor <b>description</b>: <i>Home - CytomX</i><br />Target victim <b>website</b>: <i>https://www.CYTOMX.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MARYKAY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9321</link>
<guid>7b780be82755701ccc69c82a3e656375</guid>
<pubDate>Fri, 07 Jul 2023 16:23:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MARYKAY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53433c057c08bb9d715673db2ce5473acabfd71fb41920b877f091087330031c</i><br /><br />Threat actor <b>description</b>: <i>Mary Kay - Official Site</i><br />Target victim <b>website</b>: <i>https://www.MARYKAY.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>FISCDP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9322</link>
<guid>28d6abf291fdd1f27f7c5f75efc4ffb9</guid>
<pubDate>Fri, 07 Jul 2023 16:22:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>FISCDP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>504dc67be2247f2a1aa0969e81e78e467e0df8a48d3ca11bae803c34638f4e7a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.FISCDP.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>KERNAGENCY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9323</link>
<guid>f42fff7bf91c9292a6a6dd4ee86eee6c</guid>
<pubDate>Fri, 07 Jul 2023 16:22:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>KERNAGENCY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6bba0539390979805ed77e3c3fa749a697c3dede2de89310f04a072908ccb11d</i><br /><br />Threat actor <b>description</b>: <i>KERN - an Omnicom Agency</i><br />Target victim <b>website</b>: <i>https://www.KERNAGENCY.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>UOFLHEALTH.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9324</link>
<guid>b49b0133825194a67e0660a5557deb0a</guid>
<pubDate>Fri, 07 Jul 2023 16:21:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>UOFLHEALTH.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42648da43a52cad8e7c7143a3da9168fcdf64337b82d9731ee60a071346599f9</i><br /><br />Threat actor <b>description</b>: <i>UofL Health - Louisville Hospital and Health Care System Serving Kentucky and Indiana</i><br />Target victim <b>website</b>: <i>https://www.UOFLHEALTH.ORG</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TDAMERITRADE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9316</link>
<guid>95cc848bdbf89f5187fbfa8aa2ba1a5e</guid>
<pubDate>Fri, 07 Jul 2023 13:59:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TDAMERITRADE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>58ab18039122a6412f40cc064b445b5a7635a435052d6ed6e2b5e499463b4ed5</i><br /><br />Threat actor <b>description</b>: <i>Online Stock Trading, Investing, Brokerage - TD Ameritrade</i><br />Target victim <b>website</b>: <i>https://www.TDAMERITRADE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lazer-Tow</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9311</link>
<guid>37f76c6fe3ab45e0cd7ecb176b5a046d</guid>
<pubDate>Fri, 07 Jul 2023 00:01:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Lazer-Tow</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7e1578f8a7797a3fcba8bcc3c15319d5e7afaffc597c8633871bda31ddc9b72</i><br /><br />Threat actor <b>description</b>: <i>Missouri, United States</i><br />Target victim <b>website</b>: <i>www.lazertow.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Star-Island-Resort</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9312</link>
<guid>b6dfd41875bc090bd31d0b1740eb5b1b</guid>
<pubDate>Fri, 07 Jul 2023 00:01:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Star-Island-Resort</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0fbcc974eea84e4628dda03d11f04e36e956fed884ba4406a145a469a2e7d47e</i><br /><br />Threat actor <b>description</b>: <i>Florida, United States</i><br />Target victim <b>website</b>: <i>www.star-island.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Indiana-Dimension</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9313</link>
<guid>b4e267d84075f66ebd967d95331fcc03</guid>
<pubDate>Fri, 07 Jul 2023 00:01:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Indiana-Dimension</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6acc9569d3062255d11dda0902d5f10ca544f85ee8d01afa0d7af18fa49da84</i><br /><br />Threat actor <b>description</b>: <i>Indiana, United States</i><br />Target victim <b>website</b>: <i>www.indianadimension.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>ENERGYTRANSFER.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9304</link>
<guid>05425f51eaeab268c26a5d42f2ccedaf</guid>
<pubDate>Thu, 06 Jul 2023 23:24:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ENERGYTRANSFER.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24b187e57c5af9a0cfb6f85e71db324741fac6d53352b1747482dd2e5c39550a</i><br /><br />Threat actor <b>description</b>: <i>Energy Transfer</i><br />Target victim <b>website</b>: <i>https://www.ENERGYTRANSFER.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PAYCOR.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9305</link>
<guid>e561611fa0ccf4a2c8867a82f8382816</guid>
<pubDate>Thu, 06 Jul 2023 23:23:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PAYCOR.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>16ad56aa36866362172442f53dd12983d0fed792021e856853287389473cbd85</i><br /><br />Threat actor <b>description</b>: <i>HCM Solutions for Leaders and HR Teams</i><br />Target victim <b>website</b>: <i>https://www.PAYCOR.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>NETSCOUT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9306</link>
<guid>3b922393a3cb462762ff5dd2bec1b20f</guid>
<pubDate>Thu, 06 Jul 2023 23:23:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NETSCOUT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb780f1f8ef49cc3b5e881aef7152d99c707fdd4704cfb5f88c898deee2a6984</i><br /><br />Threat actor <b>description</b>: <i>Network, Security & Application Performance Monitoring Platform - NETSCOUT</i><br />Target victim <b>website</b>: <i>https://www.NETSCOUT.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CADENCEBANK.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9308</link>
<guid>52dfa8e7d62825d70fcd34c15910558c</guid>
<pubDate>Thu, 06 Jul 2023 23:22:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CADENCEBANK.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2e98661cb78759ce87e2e2b5884ad56d3539621b373a7fae84c6335d51ac15c</i><br /><br />Threat actor <b>description</b>: <i>Cadence Bank - Home</i><br />Target victim <b>website</b>: <i>https://www.CADENCEBANK.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BANKWITHUNITED.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9309</link>
<guid>59b5a32ef22091b6057d844141c0bafd</guid>
<pubDate>Thu, 06 Jul 2023 23:21:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BANKWITHUNITED.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d32fa2692fc150f15bdfd9760209b7672c7c3b06dd5785b23d62a98e952ca882</i><br /><br />Threat actor <b>description</b>: <i>United Bank - Personal Banking, Business Banking, Investments</i><br />Target victim <b>website</b>: <i>https://www.BANKWITHUNITED.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>NEWERATECH.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9310</link>
<guid>c0fda89ebd645bd7cea60fcbb5960309</guid>
<pubDate>Thu, 06 Jul 2023 23:21:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NEWERATECH.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa603f9b47e60cc82eb8f2e6a3a2065c56cfa95aa3099b36b7a92b9ef501b9dc</i><br /><br />Threat actor <b>description</b>: <i>Page not found - New Era Technology</i><br />Target victim <b>website</b>: <i>https://www.NEWERATECH.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>NST-Attorneys-at-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9301</link>
<guid>42ba513c42a0fd6558aa44b1de658140</guid>
<pubDate>Thu, 06 Jul 2023 22:03:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>NST-Attorneys-at-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>399b6f643d2d90590aeaaef688f3d3b5e28d2385d51643d489f1ccb5a56dabeb</i><br /><br />Threat actor <b>description</b>: <i>Tennessee, United States</i><br />Target victim <b>website</b>: <i>www.nstlaw.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Uniquify</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9302</link>
<guid>a88aeeec495b4cbe092b4bcfd15b9d9c</guid>
<pubDate>Thu, 06 Jul 2023 22:03:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Uniquify</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a4608c6dc2bc82773dced52fbdb280efd93ad4f45dc81f2d7e913ba4803532b</i><br /><br />Threat actor <b>description</b>: <i>California, United States</i><br />Target victim <b>website</b>: <i>www.uniquify.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Geneva-Software</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9298</link>
<guid>0f1436a95643b9b2290678e35a58d859</guid>
<pubDate>Thu, 06 Jul 2023 21:14:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Geneva-Software</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>64ad381cc7c7c11988d643ef4e9c6a09978a05de79ebfd3ccebbcf81bb154b23</i><br /><br />Threat actor <b>description</b>: <i>Virginia, United States</i><br />Target victim <b>website</b>: <i>www.genevasi.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Betty-Lous</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9300</link>
<guid>fa28c6cdf8dd6f41a657c3d7caa5c709</guid>
<pubDate>Thu, 06 Jul 2023 21:14:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Betty-Lous</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>64d1fdcfa2daceea3d745deb01907e68ec6378abffe8354c42e218a9bccc8dc5</i><br /><br />Threat actor <b>description</b>: <i>Oregon, United States</i><br />Target victim <b>website</b>: <i>www.bettylousinc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Capacity-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9296</link>
<guid>d062f3e278a1fbba2303ff5a22e8c75e</guid>
<pubDate>Thu, 06 Jul 2023 21:02:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Capacity-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0086a1b31be1464e33bf911a647443c3c7a69c3f926d4890c63b93a58ee3df6</i><br /><br />Threat actor <b>description</b>: <i>New Jersey, United States</i><br />Target victim <b>website</b>: <i>www.capacityllc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Safety-Network</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9297</link>
<guid>af922fd52975aee0083fb8e0ba9c1d64</guid>
<pubDate>Thu, 06 Jul 2023 21:02:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Safety-Network</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac2c0636199cd50edc85188ad1163fe34ce9036152ed48f02870394151193f08</i><br /><br />Threat actor <b>description</b>: <i>California, United States</i><br />Target victim <b>website</b>: <i>www.safetynetworkinc.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carvin-Software</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9294</link>
<guid>c87579e7369697e409f6d7767838ced5</guid>
<pubDate>Thu, 06 Jul 2023 18:57:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Carvin-Software</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8328db3c1d3092a187c970c9b415bc481a9db824172d4fada3d5300bd93ecd65</i><br /><br />Threat actor <b>description</b>: <i>Staffing IT company, that stored personal data of employees and clients of over 50 different staffing companies in it's network.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ella-Insurance-Brokerage</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9295</link>
<guid>0fe9736d2d0d132d43d9fe500a0557bf</guid>
<pubDate>Thu, 06 Jul 2023 18:56:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Ella-Insurance-Brokerage</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b014719285c80b4dc77793baa6819399f17acc3ff34715d96dc1acaddfe38bd6</i><br /><br />Threat actor <b>description</b>: <i>Ella Insurance Brokerage, Inc. is a leader in providing quality protection for hundreds of individuals, families and businesses throughout our servicing area. Offers world-class protection for your car, home and business.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>betalandservices.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9288</link>
<guid>52aa16fc56779ac9b2ae91a8b47927ba</guid>
<pubDate>Thu, 06 Jul 2023 15:56:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>betalandservices.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8a58fce2dd74a460ae0997fa02285e66742c9e46c63dcbcf73d44329dd53e823</i><br /><br />Threat actor <b>description</b>: <i>The BETA Way is the summation of decades of combined experience from landmen, attorneys, and developers. More than just a detailed methodology for providing the highest quality land services, it is the philosophical — and physical — manifestation of...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>chasc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9289</link>
<guid>216f44e2d28d4e175a194492bde9148f</guid>
<pubDate>Thu, 06 Jul 2023 15:56:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>chasc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>603396d533210c11c210d3d3a9c1c6512df83c12ecbadbf337a82b56be41f812</i><br /><br />Threat actor <b>description</b>: <i>The Columbia Housing Authority provides affordable housing and workforce housing for low to moderate income families and veterans in Columbia, SCchasc.org\administrator:CH$Admin1</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pinnergy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9287</link>
<guid>903cc7be42d6fae3ae8c8be791ceeb74</guid>
<pubDate>Thu, 06 Jul 2023 13:53:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Pinnergy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>98ce9b9a03d12a1fdbee6a43d78587eda63870a3d1ceb32729f9014482f9d403</i><br /><br />Threat actor <b>description</b>: <i>Pinnergy is a diversified energy services company with a broad and comprehensive service offering for customers throughout Texas, Louisiana and New Mexico. We're almost ready to share the 55 GB of data we've taken from their network with them. Contracts, projects, employee personal information, and confidential documents will be posted shortly.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>TRANSPERFECT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9281</link>
<guid>85554f207d7a7d8f7817ae532f0dd828</guid>
<pubDate>Wed, 05 Jul 2023 23:11:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TRANSPERFECT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a61e471fe51b3a4cc3e389a5e05647db3e3a72612dc7052e54dc2f877c1d95a</i><br /><br />Threat actor <b>description</b>: <i>Language & Technology Solutions for Business - TransPerfect</i><br />Target victim <b>website</b>: <i>https://www.TRANSPERFECT.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>QUORUMFCU.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9282</link>
<guid>c4c32f6c24ee9c91d8debbd72cce2a22</guid>
<pubDate>Wed, 05 Jul 2023 23:10:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>QUORUMFCU.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>609557fadf2c33d67f7c12bb5a5831916ae77df19eea754fdb8027e18b851a28</i><br /><br />Threat actor <b>description</b>: <i>High-yield Savings, Mortgage Experts, Mobile Banking</i><br />Target victim <b>website</b>: <i>https://www.QUORUMFCU.ORG</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MERATIVE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9283</link>
<guid>1147dc16a8e1b44eead07282cad093f8</guid>
<pubDate>Wed, 05 Jul 2023 23:10:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MERATIVE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2d79a556b23ec42aa3e1195252149a78a9e007b1a8fb5b2bf8e4f1fa9f6c9300</i><br /><br />Threat actor <b>description</b>: <i>Healthcare Data, Technology and Analytics - Merative</i><br />Target victim <b>website</b>: <i>https://www.MERATIVE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>NORGREN.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9273</link>
<guid>499864301513d8852b624ca93a960bcc</guid>
<pubDate>Wed, 05 Jul 2023 23:09:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NORGREN.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc816bb45035cfb8887b2b3e961839d595120c19df5d780a221d4b1ce5101e43</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.NORGREN.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CIENA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9274</link>
<guid>b0cf188d74589db9b23d5d277238a929</guid>
<pubDate>Wed, 05 Jul 2023 23:09:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CIENA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>17c80d7914ab60012ecccd6979b6fa7738be7e5d51dbf1c330ac54bfa8bb24a0</i><br /><br />Threat actor <b>description</b>: <i>Ciena - A networking systems, services, and software company - Ciena</i><br />Target victim <b>website</b>: <i>https://www.CIENA.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>UNITEDREGIONAL.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9276</link>
<guid>f8895f0da0edf4dada68d801c5f92d80</guid>
<pubDate>Wed, 05 Jul 2023 23:08:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>UNITEDREGIONAL.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b491e810b3ab2e1f02db51c97f0ad4e4ad7625d2b47be54b736c753669953c7a</i><br /><br />Threat actor <b>description</b>: <i>Home - United Regional Health Care System</i><br />Target victim <b>website</b>: <i>https://www.UNITEDREGIONAL.ORG</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TDECU.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9277</link>
<guid>90b9ec1e25ed6705ac341eb17690d55c</guid>
<pubDate>Wed, 05 Jul 2023 23:08:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TDECU.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ecb895ccac837a27c9c9f31fc54fd860ad8a3554475e85f7d5cff14901d73380</i><br /><br />Threat actor <b>description</b>: <i>TDECU - Your Texas Credit Union With Digital Banking</i><br />Target victim <b>website</b>: <i>https://www.TDECU.ORG</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BRADYID.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9278</link>
<guid>a55472983efa2e239b315de91576d1d3</guid>
<pubDate>Wed, 05 Jul 2023 23:07:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BRADYID.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19ea68e4c646fdec9550d1de393fd9629d590dc5ea75cf3c1999e15cb0739ada</i><br /><br />Threat actor <b>description</b>: <i>BradyID.com - Shop Industrial Printers, Labels, Lockout & More</i><br />Target victim <b>website</b>: <i>https://www.BRADYID.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ZooTampa-at-Lowry-Park</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9271</link>
<guid>146f7dd4c91bc9d80cf4458ad6d6cd1b</guid>
<pubDate>Wed, 05 Jul 2023 20:00:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>ZooTampa-at-Lowry-Park</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>39ca9fc672b67a790f4bf30567c3e7709df23331851381836d2f2c889485a05c</i><br /><br />Threat actor <b>description</b>: <i>Voted Tampa’s Best Family Attraction and 11-time winner of TripAdvisor Travelers’ Choice Award, ZooTampa offers unforgettable adventures for all ages. Enjoy an amazing, lush tropical setting with naturalistic habitats that provide up-close connections with animals from around the world.</i><br />Target victim <b>website</b>: <i>http://zootampa.org</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Avalign-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9270</link>
<guid>250473494b245120a7eaf8b2e6b1f17c</guid>
<pubDate>Wed, 05 Jul 2023 17:59:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Avalign-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9b25bd54394fd683d5e23d13e6d801378071c7f8da617931af8549a9db4bce5c</i><br /><br />Threat actor <b>description</b>: <i>valign designs, manufactures, and delivers the highest quality, precision-machined tools and implants for a wide variety of surgical and medical specialties around the world. From proprietary implant coatings to German-made instruments, Avalign is a leading full-service manufacturer known for consistent and sophisticated production and supply chain management.</i><br />Target victim <b>website</b>: <i>https://www.avalign.com/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>Murphy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9268</link>
<guid>9cac2ca53c5fe723c249d012d6091c50</guid>
<pubDate>Wed, 05 Jul 2023 12:49:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Murphy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2191492698b330c9307a3c81a13c726a004a2ff8c1d3b8630a8d0cb5d4d5193e</i><br /><br />Threat actor <b>description</b>: <i>Murphy is a family owned and operated business that manufactures and supplies a variety of engineered wood products such as softwood plywood, veneered hardwoods and panels. We did some work on their network and will show you what we got from there. Several dozen gigabytes of personal information, projects, contracts, personnel information, incidents. They don't seem very talkative for a company with a completely dead website. We'll put it all out there soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hoosier-Equipment-company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9262</link>
<guid>0801b20e08c3242125d512808cd74302</guid>
<pubDate>Tue, 04 Jul 2023 22:02:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusalocker</b> claims attack for <b>Hoosier-Equipment-company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>116c310f9ee45dd0aacff0e4ee6895ddf903c6918245292d474c732a37feff1b</i><br /><br />Threat actor <b>description</b>: <i>DescriptionClient Case – agreement – email(.msg)- and other documents Price: 60000$</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusalocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jefferson-County-Health-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9258</link>
<guid>1868f17c2c15b5eafdc3cce2f5ac97d5</guid>
<pubDate>Mon, 03 Jul 2023 16:01:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>Jefferson-County-Health-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be4fb2ca9a3d53cb2e463f4dcf2f166becc48bfa9ce211c4da814e4178797edb</i><br /><br />Threat actor <b>description</b>: <i>Jefferson County Hospital, Waurika, Oklahoma, is a 25-bed critical access facility providing medical services to residents of Jefferson County and surrounding communities. 1.1 TB from the medical facility: medical records, test results, and personal information of employees and patients. Accounting and financial information is abundant. This data will be uploaded during upcoming summer release.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>snjb.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9257</link>
<guid>c8461bf13fca8a2b9912ab2eb1668e4b</guid>
<pubDate>Mon, 03 Jul 2023 14:55:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>snjb.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba3678429592ad6d9ffa027a663fde7193eb0736852c1616318bf51b63c2af3a</i><br /><br />Threat actor <b>description</b>: <i>The Jordan Bridge, officially the South Norfolk Jordan Bridge, is a fixed toll bridge that carries State Route 337 across the southern branch of the Elizabeth River between the city of Portsmouth and the city of Chesapeake on South Hampton Roads, Vir...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Townsquare-Media-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9256</link>
<guid>e82a0d322fa2653ba0ce48474cbe03a6</guid>
<pubDate>Mon, 03 Jul 2023 14:53:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Townsquare-Media-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed69f9a8ee29f4f1065fbdf2c34d2ff49bb6d95048d4a66d473a494b857be57f</i><br /><br />Threat actor <b>description</b>: <i>Townsquare Media, Inc. is a community-focused digital media, digital marketing solutions and radio company. It owns and operates radio stations, digital and social properties and live events in small and mid-sized markets across the United States.</i><br />Target victim <b>website</b>: <i>townsquaremedia.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Duncan-Disability-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9253</link>
<guid>4e8eaf897c638d519710b1691121f8cb</guid>
<pubDate>Mon, 03 Jul 2023 10:31:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Duncan-Disability-Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eca8ef7cdb587ea15a4be6f440f63f1294a2f0ade51111a1c4280f5d21fab229</i><br /><br />Threat actor <b>description</b>: <i>Over 1TB of information was downloaded  from your servers.</i><br />Target victim <b>website</b>: <i>https://www.duncandisability.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hollywood-Forever</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9252</link>
<guid>613690cd913c7e69998dd12df14a96fa</guid>
<pubDate>Mon, 03 Jul 2023 10:06:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Hollywood-Forever</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>563ea56f2bbabcea89148a7a4083843f638cc1c44ca4042ecc0a65cf1bebe2ec</i><br /><br />Threat actor <b>description</b>: <i>Hollywood Forever Hollywood Forever is a full-service funeral home, crematory, cemetery, and cultural events center in the heart of Hollywood.    More</i><br />Target victim <b>website</b>: <i>https://www.hollywoodforever.com/</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Blount-Fine-Foods</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9239</link>
<guid>5aa3405a3f865c10f420a4a7b55cbff3</guid>
<pubDate>Sat, 01 Jul 2023 14:15:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Blount-Fine-Foods</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87fe7c975efe91c365a8a4a294fa825f221dc98f50f06e760c1cec8169ff6c71</i><br /><br />Threat actor <b>description</b>: <i>Blount Fine FoodsFood & Beverage · Massachusetts, United States · 902 EmployeesHeadquarters: 630 Currant Rd, Fall River, Massachusetts, 02720, United States Phone Number: (774) 888-1300 Website: www.blountfinefoods.com Revenue: $365.3MBlount Fine Foods, formerly Blount Seafood, is a prepared foods and soup manufacturer that produces wholesale frozen and fresh soups under the Blount brand as well as Panera Bread and Legal Sea Foods. Blount Fine Foods is headquartered in Fall River, Massachusetts.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ashley-HomeStore</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9240</link>
<guid>29a6aa8af3c942a277478a90aa4cae21</guid>
<pubDate>Sat, 01 Jul 2023 14:00:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>mallox</b> claims attack for <b>Ashley-HomeStore</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fca57e5a860a7bb04038d393e6e61c5adac7cfdf202de786687eeb13e07bf784</i><br /><br />Threat actor <b>description</b>: <i>INFO: https://www.zoominfo.com/c/ashley-homestore-ltd/7786767  DATA: https://anonfiles.com/9447C8z8z7/Ashley_7z PASSWORD: 597+9Tk?2gtW&&_6SW5#7<);D&81Q5)c​ </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>mallox</category>
</item>
<item xmlns:dc='ns:1'>
<title>ENCORECAPITAL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9232</link>
<guid>2a51262b66cced52912358502a37a010</guid>
<pubDate>Fri, 30 Jun 2023 09:47:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ENCORECAPITAL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c6a5a87f872a3a6006d0eb23f2e6548126c6d4acae169a4752c8a415f7349d92</i><br /><br />Threat actor <b>description</b>: <i>Encore Capital Group</i><br />Target victim <b>website</b>: <i>https://www.ENCORECAPITAL.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TRELLISWARE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9231</link>
<guid>bc2ba6bff2342259d8fb150b02dc1565</guid>
<pubDate>Fri, 30 Jun 2023 09:47:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TRELLISWARE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>95cb6748e55d5f2afddfa5fd98d297155c6e45b02dcc745f0e0d65c58a0db3ab</i><br /><br />Threat actor <b>description</b>: <i>TrellisWare Technologies, Inc.</i><br />Target victim <b>website</b>: <i>https://www.TRELLISWARE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>IRONBOW.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9226</link>
<guid>1d7c2aae840867027b7edd17b6aaa0e9</guid>
<pubDate>Fri, 30 Jun 2023 09:47:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>IRONBOW.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>03b4e79548c8bfa46feacca83c39d405f94cbd3960fbe21289c948b73c163dfc</i><br /><br />Threat actor <b>description</b>: <i>Iron Bow Technologies: An Award Winning IT Solutions Company</i><br />Target victim <b>website</b>: <i>https://www.IRONBOW.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>FISGLOBAL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9228</link>
<guid>1b38735595369838f208dd2b25315195</guid>
<pubDate>Fri, 30 Jun 2023 09:47:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>FISGLOBAL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6d56ace5e55cffd7c8b69b3f61875e53a891761726ea1e0c29858b767bd31d9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.FISGLOBAL.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HORNBECKOFFSHORE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9229</link>
<guid>471684d6c43cfc529b30d600113dae63</guid>
<pubDate>Fri, 30 Jun 2023 09:47:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HORNBECKOFFSHORE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>095b34f560f2617e7781a9d0b37615918c0fa537a2a0921f5fbce73dafcabd7c</i><br /><br />Threat actor <b>description</b>: <i>Hornbeck Offshore Services</i><br />Target victim <b>website</b>: <i>https://www.HORNBECKOFFSHORE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>VERICAST.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9225</link>
<guid>b8a6550662b363eb34145965d64d0cfb</guid>
<pubDate>Fri, 30 Jun 2023 09:47:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>VERICAST.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1b805d8925380c63df6cd6b314d4b4507cc8b095507692c7dccea243fa0f8e8</i><br /><br />Threat actor <b>description</b>: <i>Home - Vericast</i><br />Target victim <b>website</b>: <i>https://www.VERICAST.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CITYNATIONAL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9221</link>
<guid>bc45ee46080d94757d84677cd9fb7395</guid>
<pubDate>Fri, 30 Jun 2023 09:47:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CITYNATIONAL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f80b2ac5cb45c5c4b8ebeb04bd702309bac13bd84d7145fe5dac7ea01f8bb48</i><br /><br />Threat actor <b>description</b>: <i>      City National Bank of Florida    </i><br />Target victim <b>website</b>: <i>https://www.CITYNATIONAL.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HARRINGTONCOMPANY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9222</link>
<guid>497d0b20f66cebdedc7935e3ffd46efa</guid>
<pubDate>Fri, 30 Jun 2023 09:47:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HARRINGTONCOMPANY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a36aa50d48d1733824be57fb3b250626ef842eb29cfb5f78b740bfd48a52126a</i><br /><br />Threat actor <b>description</b>: <i>The Harrington Company Home Page</i><br />Target victim <b>website</b>: <i>https://www.HARRINGTONCOMPANY.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SOVOS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9223</link>
<guid>e71ad22eed10d8f6f8242f67695b215f</guid>
<pubDate>Fri, 30 Jun 2023 09:47:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SOVOS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d0c8203b950a5853b1052ae24afa0c5e8f687d18eb3e1e08c4c5a74203a10af5</i><br /><br />Threat actor <b>description</b>: <i>Tax Compliance & Regulatory Reporting Software - Sovos</i><br />Target victim <b>website</b>: <i>https://www.SOVOS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hospitality-StaffingSolutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9215</link>
<guid>5a44a53b7d26bb1e54c05222f186dcfb</guid>
<pubDate>Thu, 29 Jun 2023 15:53:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Hospitality-StaffingSolutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b71b60a74bac5028801c283fbb484937827087c448d3b1996fa56d9c3d3e592b</i><br /><br />Threat actor <b>description</b>: <i>Hospitality Staffing Solutions is a trusted partner of industry leaders across the country. Whether you're looking for a job in the hospitality industry or need services to grow your business, the HSS team is here to help. If you're a threat actor scouring thedark web for personal documents and business secrets, HSS is ready to help as well. These guys said they don't want their 1.31 TBof data, so we're ready to share it with you. Detailed employee and customer data will be uploaded to our blog soon. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nycon</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9217</link>
<guid>f4db8537e9d75da46c4efc36a2d70956</guid>
<pubDate>Thu, 29 Jun 2023 15:53:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Nycon</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca9c097adcfc5da8a2d90d9ed3be91975b4192e2db933e10437f0015ae59ab6f</i><br /><br />Threat actor <b>description</b>: <i>Company Nycon has been in the business of advancing concrete for over 30 years. Their products provide a variety of solutions for customers varied needs, including crack control, corrosion resistance, flexural strength, and durability.  SSNs, home addresses, mail addresses, other companies private information and much more will be shared with our visitors here soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>KLGATES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9213</link>
<guid>4c56392b1bd5e94efe423ed048c7b91a</guid>
<pubDate>Thu, 29 Jun 2023 11:47:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>KLGATES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>50f2744453ade3f326af7705d379299fd69e163ca6219720c2f642eca5320914</i><br /><br />Threat actor <b>description</b>: <i>Homepage - K&L Gates</i><br />Target victim <b>website</b>: <i>https://www.KLGATES.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Western-National-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9212</link>
<guid>8386fa112ba70c3f60b6907d3812bb9e</guid>
<pubDate>Thu, 29 Jun 2023 01:36:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Western-National-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af085abfc407116361952fb0c9cb0c3510ddf0141cb5d29758250bae79b61bc0</i><br /><br />Threat actor <b>description</b>: <i>Western National Group Experts in the Western US multifamily real estate industry, Western National Group is an outstanding curator of investment opportunities, a team of industry-leading builders, and an accredited property management company.    More</i><br />Target victim <b>website</b>: <i>https://www.wng.com/</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>ISPE-Connecting-Pharmaceutical-Knowledge</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9211</link>
<guid>bd6226970e9ffbc8305184d53e5dcd99</guid>
<pubDate>Wed, 28 Jun 2023 19:51:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>ISPE-Connecting-Pharmaceutical-Knowledge</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f8b55e74e1d4db77fcbdade7e75039981ab82a986f7fd245e8029e1764452f5a</i><br /><br />Threat actor <b>description</b>: <i>ISPE, the International Society for Pharmaceutical Engineering, is the world's largest not-for-profit association serving its Members through leading scientific, technical and regulatory advancement throughout the entire pharmaceutical lifecycle. The 20,000 Members of ISPE are building solutions in the development and manufacture of safe and effective pharmaceutical and biologic medicines and medical delivery devices in more than 90 countries around the world. Founded in 1980, ISPE has its worldwide headquarters in Bethesda, Maryland, USA and the Operations and Training Center in Tampa, Florida, USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>CentroMed</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9209</link>
<guid>51594de14eeb96bc7fe59cf5cad96706</guid>
<pubDate>Wed, 28 Jun 2023 15:52:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>CentroMed</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6dbfc25eeb9f32bc7670308946b9cd1af62c58b731fb5a98d0672a9242a04e72</i><br /><br />Threat actor <b>description</b>: <i>El Centro del Barrio (CDB), which started doing business as CentroMed in 2001, was founded in 1971 and ran one counseling program for children and adolescents. They lost 25 GB of their data, which contains several thousand ssns and other medical and health information. Accounting, financial, human resources data is also represented.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stoughton-Trailers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9208</link>
<guid>fc3dee15d074d783730c00430d839765</guid>
<pubDate>Wed, 28 Jun 2023 13:49:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Stoughton-Trailers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b6f4fb531fde33f8f7dc8f1607cc7bc9d85c7e706d593db18a9ffd40accc9ce</i><br /><br />Threat actor <b>description</b>: <i>Stoughton Trailers is a supplier of semi-truck trailers. This company designs, manufactures and markets a wide range of dependablesemi-truck trailers. We've gone through their not very dependable network and will show you what they hold inside their trailers.All corporate papers including personal will be unloaded here soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>DARLINGCONSULTING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9201</link>
<guid>ebf99bb5df6533b6dd9180a59034698d</guid>
<pubDate>Wed, 28 Jun 2023 11:09:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DARLINGCONSULTING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>034002bf686e3706bfb1e7740ff2aeb4aae4d25431a8b5d34b2fff03057fb81a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.DARLINGCONSULTING.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Coachella-Valley-Collection-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9204</link>
<guid>b0bb808a5994aefa4f47d7ec6e58c984</guid>
<pubDate>Wed, 28 Jun 2023 09:50:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Coachella-Valley-Collection-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97700529afc63144b266f2820dc32a8ce6d201b4e4ce7ac3a50d081f93a8072e</i><br /><br />Threat actor <b>description</b>: <i>Coachella Valley Collection Service provides debt collection services, including “medical, retail, commercial, judgment, and check debt collection.” In addition, CVCS “provides acknowledgement report, debtor activity report, monthly remittance statement, actuary report, and closure report” services</i><br />Target victim <b>website</b>: <i>https://www.cvcollection.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>PORTERROOFING</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9205</link>
<guid>d10f24cc96c40a85ed11ce68142e80df</guid>
<pubDate>Wed, 28 Jun 2023 09:50:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>PORTERROOFING</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>349c925cf39b612486fc5de8addc4407d28ad4b45aed019c8db4fdef5d99c018</i><br /><br />Threat actor <b>description</b>: <i>"Porter Roofing has blueprinted an innovative culture throughout our company, placing special emphasis on the welfare and safety of everyone involved with any roofing project we undertake. We have provided OSHA’s 40-hour safety program and CPR training for all of our key employees so that every crew is staffed with at least one safety team leader. Although our safety program exceeds roofing industry standards, we continually seek ways to implement new ideas and procedures.As our reputation continues to grow on a national scale, we realize that it is based on our past roofing projects. Therefore, we raise the bar for exceptional performance, job by job, year by year. We pledge our full support toward the successful completion of our clients’ roofing projects, and we will perform our services in your best interest with a great effort to maintain your trust and good will."http://www.porter-roofing.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>CON-STRUCT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9203</link>
<guid>d97d404b6119214e4a7018391195240a</guid>
<pubDate>Wed, 28 Jun 2023 09:49:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>CON-STRUCT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>258612b062ea71ce5822cfa691bcb6197fba8b2390e2bf093ab23646bb126dee</i><br /><br />Threat actor <b>description</b>: <i>Con-struct, Inc. proudly serves all heavy construction needs in Central Iowa, including Ames, Story County, Marshall County, and surrounding areas.https://constructiowa.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>GraphTec</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9194</link>
<guid>e2c9cd9303b5c85296b84213935f37fd</guid>
<pubDate>Wed, 28 Jun 2023 07:53:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>GraphTec</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a2e7e6a8fb300d81410a6b7884eb3d56289f2caad9a2821f2b788986e4f27c7e</i><br /><br />Threat actor <b>description</b>: <i>With GraphTec, our quality is our signature. Our professional craftsmen and management teams have worked with numerous graphic designers, architects, and general contractors all across the United States. Precise planning and detailed analysis on our part help insure that all your project objectives are achieved in a timely and quality fashion. Understanding the meaning of the word integrity is a priority at GraphTec. Results are produced, not reasons for the lack there of. Over the years, GraphTec has earned a reputation for delivering high-end, custom architectural and environmental signage both on time, and at competitive prices with a quality above industry standards. With our experience, adaptability, responsiveness, and our pro-active “hands on” project management approach, GraphTec will be of invaluable help on your next project.SITE: www.graphtecinc.com Address  6209 Windfern Rd. Houston Tx 77040 713-690-9999 PHONE 713-690-7676 FAX</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>MODERNIND2</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9195</link>
<guid>25824988925b5fd75ef84e8202957b74</guid>
<pubDate>Wed, 28 Jun 2023 07:52:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>MODERNIND2</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc28645f49af0d5c4fe6a2211bf8b9ec198630d5c977f6495293258e0b62b32e</i><br /><br />Threat actor <b>description</b>: <i>Modern Industries is a second generation family owned business established in 1946 by a returning WWII veteran who was driven to build a company that would have a positive impact on all those involved with his endeavor. The underlying characteristics of Modern’s founder, Herb Sweny, were the foundation of his new venture and help define who we are today: Tough, Fair and Honest business practices Strong Work Ethic Focus on Improvement Adaptability Do the Right Thing and Do the Thing Right We make the parts that industry needs to build their products, with Precision Machining Services. We make metals tougher & stronger through Thermal Processing. We help you assure product quality with Materials Testing Services. We make machine operators more efficient with Quick Change Modular Workholding and Toolholding Devices. We make industrial equipment operate effectively and last longer with customized Motion Control Devices.SITE: https://modernind.com Address  613 West 11th Street Erie, Pa 16501 (814) 455-8061</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Texas-Heat-Treating</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8574</link>
<guid>e345fac6bc5c868f0222430c733fa26e</guid>
<pubDate>Wed, 28 Jun 2023 00:57:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Texas-Heat-Treating</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>420379358d3c70c528ca9b8c4ac046b1850d736931004c917498cb6b0f91dab0</i><br /><br />Threat actor <b>description</b>: <i>Texas, United States</i><br />Target victim <b>website</b>: <i>www.texasheattreating.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Intoximeters</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8575</link>
<guid>2e9fcd6fd4b51d718872c02272648444</guid>
<pubDate>Wed, 28 Jun 2023 00:57:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Intoximeters</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>815e0f97184c615666a25955c483d2d5f9dbd0710b548e4391b83c0d59cc6e89</i><br /><br />Threat actor <b>description</b>: <i>Missouri, United States</i><br />Target victim <b>website</b>: <i>www.intox.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>COGNIZANT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9190</link>
<guid>4ef30115b941a1bcd71ffebb50c69ece</guid>
<pubDate>Tue, 27 Jun 2023 16:52:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>COGNIZANT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19e7947eba5de5576074c44461121205c202ef1dd489e484987e8d5c7453ce47</i><br /><br />Threat actor <b>description</b>: <i>Intuition engineered—human insight, superhuman speed - Cognizant UK & Ireland</i><br />Target victim <b>website</b>: <i>https://www.COGNIZANT.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DELTADENTAL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9191</link>
<guid>dfc7defac6624a80f02b02e22b14e8fd</guid>
<pubDate>Tue, 27 Jun 2023 16:52:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DELTADENTAL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aadb8c31b63d2e1e2ea67d2d04dedcb66459b8a0490664fb9bdfd2e6ee7d4830</i><br /><br />Threat actor <b>description</b>: <i>Affordable Dental Insurance Plans - Delta Dental</i><br />Target victim <b>website</b>: <i>https://www.DELTADENTAL.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CPIAI.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9192</link>
<guid>0ae775a8cb3b499ad1fca944e6f5c836</guid>
<pubDate>Tue, 27 Jun 2023 16:52:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CPIAI.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24fdde6c155af3a2691d7f8fa2ed7ef318168917d5c405b4d0ea52789545bcc0</i><br /><br />Threat actor <b>description</b>: <i>CPIAI -Huntsville TX - Insurance - CP Insurance - United States</i><br />Target victim <b>website</b>: <i>https://www.CPIAI.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CARESOURCE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9187</link>
<guid>a10463df69e52e78372b724471434ec9</guid>
<pubDate>Tue, 27 Jun 2023 16:52:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CARESOURCE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d3beff57bbdb9f73802d74287ccb94c40e175d0a8f07f7a65317c2636ab73ae</i><br /><br />Threat actor <b>description</b>: <i>CareSource - Health Care with Heart</i><br />Target victim <b>website</b>: <i>https://www.CARESOURCE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>STARMOUNTLIFE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9185</link>
<guid>51681a7c14879f9eca39669df858f75b</guid>
<pubDate>Tue, 27 Jun 2023 16:52:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>STARMOUNTLIFE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b5800f889d1afd45476b15ad10e437f06eeb3d8518973b1701191a7c829407a5</i><br /><br />Threat actor <b>description</b>: <i>Starmount Life Insurance Company</i><br />Target victim <b>website</b>: <i>https://www.STARMOUNTLIFE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>JACKSON.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9186</link>
<guid>d0379e4d73faa565d3e7f22b307c80f7</guid>
<pubDate>Tue, 27 Jun 2023 16:52:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>JACKSON.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1786b3435a60a521d2e23aa33d4a39f94fb1067db4805cd78514fef6a800120c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.JACKSON.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PROSKAUER.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9182</link>
<guid>3d57fe6de705fec3cecae336ae23a03a</guid>
<pubDate>Tue, 27 Jun 2023 16:52:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PROSKAUER.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6044b2e76091cab1625e77088651f97d20d4ac1d87f3291fa94d508bb2dc172e</i><br /><br />Threat actor <b>description</b>: <i>It’s our business to understand yours - Proskauer Rose LLP</i><br />Target victim <b>website</b>: <i>https://www.PROSKAUER.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>KIRKLAND.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9183</link>
<guid>6f0ca67289d79eb35d19decbc0a08453</guid>
<pubDate>Tue, 27 Jun 2023 16:52:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>KIRKLAND.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd3339e593ad6dd8976e5718b8ee69e54afd4652d93159bdcb4a2605bd2d838b</i><br /><br />Threat actor <b>description</b>: <i>Home - Kirkland & Ellis LLP</i><br />Target victim <b>website</b>: <i>https://www.KIRKLAND.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ITW-Food-Equipment-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8570</link>
<guid>38220e6a22eec2e5e3d21001f7d859df</guid>
<pubDate>Tue, 27 Jun 2023 09:57:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>ITW-Food-Equipment-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b7c2444cc38b24aa577668210189ef47818ae0e9e97b2b0ee335cc3234df128</i><br /><br />Threat actor <b>description</b>: <i>ALL DATA PUBLISHED AND AVAILABLE FOR DOWNLOADING!!!</i><br />Target victim <b>website</b>: <i>https://www.itwfoodequipment.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>COMPASS-INFRASTRUCTURE-GROUP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8569</link>
<guid>8cd7775f9129da8b5bf787a063d8426e</guid>
<pubDate>Tue, 27 Jun 2023 08:06:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>mallox</b> claims attack for <b>COMPASS-INFRASTRUCTURE-GROUP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca07c671d7f7a74fdcd47e3e8727d7c7ad26393a84a841a02478b145e38eef42</i><br /><br />Threat actor <b>description</b>: <i>DATA: COMPASS.7z.001  https://anonfiles.com/34xeP5y9z4/COMPASS_7z_001COMPASS.7z.002  https://anonfiles.com/lav9P7ycz1/COMPASS_7z_002COMPASS.7z.003  https://anonfiles.com/Ebu4P0yaz2/COMPASS_7z_003 PASSWORD: he?A!xl_<90!T9O>5a3KC5;h^*$7pjpZ​ </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>mallox</category>
</item>
<item xmlns:dc='ns:1'>
<title>ABBVIE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8560</link>
<guid>bc05ca60f2f0d67d0525f41d1d8f8717</guid>
<pubDate>Mon, 26 Jun 2023 22:24:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ABBVIE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a7704b255052ef2a13fbb3f187e703b4dcf674a84bab9f77510b7ce39ba15d8</i><br /><br />Threat actor <b>description</b>: <i>Pharmaceutical Research & Development - AbbVie</i><br />Target victim <b>website</b>: <i>https://www.ABBVIE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>UCLA.EDU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8561</link>
<guid>7d92c08873b4979b544e7fb64fdb1c6c</guid>
<pubDate>Mon, 26 Jun 2023 22:24:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>UCLA.EDU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1389fd3067a24a8da1b7c3aab1e267b10ea3210e8418ad8b3ac12c00bf181b7e</i><br /><br />Threat actor <b>description</b>: <i> UCLA</i><br />Target victim <b>website</b>: <i>https://www.UCLA.EDU</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Greenfiber</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8559</link>
<guid>c0ad6deb373037e7f63f219c850e3396</guid>
<pubDate>Mon, 26 Jun 2023 20:59:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Greenfiber</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>11b579307b852d3cfa1fd33f6486093b1c7f825c01038a13e200fb4a61c79346</i><br /><br />Threat actor <b>description</b>: <i>All data published and available for downloading! Enjoy!  Greenfiber is a national manufacturer of cellulose insulation. Providing energy saving and cost effective insulation choices for the US and Canada. Greenfiber has the industry's leading cellulose insulation products</i><br />Target victim <b>website</b>: <i>greenfiber.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chariton-Valley</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8558</link>
<guid>a9cf46a38a9b05e959f33215e5cdc38a</guid>
<pubDate>Mon, 26 Jun 2023 18:00:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Chariton-Valley</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2fc36e44cf5662e38fd41f5669cff11152ba640d881652179a18b46ae07ea142</i><br /><br />Threat actor <b>description</b>: <i>Chariton Valley provides state-of-the-art telecommunications services to businesses and residents. Chariton Valley has a leading position in the state and in many other countries, offering a fiber-optic network to the premises of its subscribers. We can say that among our customers, this company is also leading the way. 3 TB of data and DB were taken from their servers. We will upload everything in the next few days.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Reeds-Spring-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8555</link>
<guid>fdad3b5b2200b598dfde9517e5b426a8</guid>
<pubDate>Mon, 26 Jun 2023 14:57:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>Reeds-Spring-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12f36c3d436423f412445162cbf80a5eab810bee01f5fe5c5fc6ff696b8d1e75</i><br /><br />Threat actor <b>description</b>: <i>Gibson Technical Center is a career and technical education school that is part of the Reeds Spring School District. 155GB have been stolen from their network. You can find there: HR, detailed finance and accounting, employee information and contracts, confidential students information including medical documents, databases with complete students information. The data will be uploaded during upcoming summer leaks.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>Real-Estate-Systems-Integrator</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8538</link>
<guid>a378383b89e6719e15cd1aa45478627c</guid>
<pubDate>Sun, 25 Jun 2023 14:00:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Real-Estate-Systems-Integrator</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fb408a2d655812e62a4e63d95cb0b81e281c70b082e624882b001430063f31f3</i><br /><br />Threat actor <b>description</b>: <i>RESI was established in 1994 with the purpose of providing REALTORS® with the technology necessary to enhance productivity and broaden their reach. The main office of the company is located at: 560 Lincoln Rd Ste 203, Miami Beach, Florida, 33139, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alliance-Sports-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8531</link>
<guid>749a8e6c231831ef7756db230b4359c8</guid>
<pubDate>Sat, 24 Jun 2023 20:43:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Alliance-Sports-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0444c38f0d5e4eff68aa323075645a6242e7768fadb57304232134bdd6698060</i><br /><br />Threat actor <b>description</b>: <i>Alliance Sports Group is a designer, manufacturer and distributor of innovative, high-quality products that consumers love. We congratulate them - they have become the pioneer of our blog! We're ready to show you their accounting, finance, legal, insurance, HR, users, operations and so on and so on - you can see the brilliant data they haven't managed to keep secure.We have made the process of uploading company data as simple as possible for our users. All you need is any torrent client (like Vuze, Utorrent, qBittorrent or Transmission to use magnet links). You will find the torrentfile above.1. Open uTorrent, or any another torrent client. 2. Add torrent file or paste the magnet URL to upload the data safely. 3. Archives passwords: 1) Password01$ 2) Password02$MAGNET URL:magnet:?xt=urn:btih:38C667630017A7E8C91BC990F621D5AB03F8431B&dn=alliance&tr=udp://tracker.openbittorrent.com:80/announce&tr=udp://tracker.opentrackr.org:1337/announce</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>BridgeValleyCommunity-Technical-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8532</link>
<guid>a383d162a97be62a400e00c320eae9c7</guid>
<pubDate>Sat, 24 Jun 2023 20:43:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>BridgeValleyCommunity-Technical-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>edd1780849b9106185c3a2a30b4a919e98025de6b7a011b0dcbfe274e3859c9b</i><br /><br />Threat actor <b>description</b>: <i>This college is a place of opportunity for a diverse learner population provides access to quality education as well as to its students personal information. BridgeValley offers leading-edge technology, innovative ideas,students' private information, financial documents andmuch more.We have made the process of uploading company data as simple as possible for our users. All you need is any torrent client (like Vuze, Utorrent, qBittorrent or Transmission to use magnet links). You will find the torrentfile above. 1. Open uTorrent, or any another torrent client.2. Add torrent file or paste the magnet URL to upload the data safely. 3. Archive password: guccigangMAGNET URL: magnet:?xt=urn:btih:0CCED5C106C6D50E96F9EC7A439C875FF488578F&dn=bridgevalley&tr=udp://tracker.openbittorrent.com:80/announce&tr=udp://tracker.opentrackr.org:1337/announce</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Computer-Information-Concepts-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8536</link>
<guid>2c2dc47463ad7f389023f2b0fe1058cf</guid>
<pubDate>Sat, 24 Jun 2023 20:43:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Computer-Information-Concepts-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e8190fa52ab1de9e06e45ab7f9d30aa031d47316ce5e92959dfd1994097677e</i><br /><br />Threat actor <b>description</b>: <i>Computer Information Concepts Inc provides information technology services. This guys are so strong so they refused to receive our help and are trying to recover by themselves. We would like to wish them all the best. While their website is completely dead, we decided to assist them a bit and to upload their data here.We have made the process of uploading company data as simple as possible for our users. All you need is any torrent client (like Vuze, Utorrent, qBittorrent or Transmission to use magnet links). You will find the torrentfile above.1. Open uTorrent, or any another torrent client.2. Add torrent file or paste the magnet URL to upload the data safely.3. Archives have no password.MAGNET URL: magnet:?xt=urn:btih:55FCCCA83419075D403A3B88FB49C7CE3AF2C59C&dn=mcleodusa&tr=udp://tracker.openbittorrent.com:80/announce&tr=udp://tracker.opentrackr.org:1337/announce&tr=wss://litetracker.world</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jacobs-Farm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8537</link>
<guid>5c843bd82838f70b8321b95e2f1a84ef</guid>
<pubDate>Sat, 24 Jun 2023 20:40:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomexx</b> claims attack for <b>Jacobs-Farm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>281327246df2a3b7a72fb525b7a162210ffea64b27a22485165739b9fb5709fa</i><br /><br />Threat actor <b>description</b>: <i>Jacobs Farm was founded in 1980 as a small organic family farm dedicated to growing fresh, high quality, delicious food without damaging the environment.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomexx</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-City-of-Nassau-Bay</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8530</link>
<guid>fa385fb5a8e79b41a0d37b12c9f95996</guid>
<pubDate>Sat, 24 Jun 2023 19:41:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-City-of-Nassau-Bay</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ac3c2ec68d61c90cd036a986398566a85231e7f2850eef02180aece0385304c</i><br /><br />Threat actor <b>description</b>: <i>The City of Nassau Bay is an incomparable community at the leading edge of technology. But being on the edge is dangerous sometimes. As the city government says theydon't have evidences that the personal information hasbeen compromised. We are willing to provide some evidence of personal files in 45GB data we have for them to be sure. We have made the process of uploading company data as simple as possible for our users. All you need is any torrent client (like Vuze, Utorrent, qBittorrent or Transmission to use magnet links). You will find the torrentfile above.1. Open uTorrent, or any another torrent client.2. Add torrent file or paste the magnet URL to upload the data safely.3. Archives have no password.MAGNET URL: magnet:?xt=urn:btih</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>-H</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8513</link>
<guid>a883bbca3f8bc8814ff676cb0e91829a</guid>
<pubDate>Fri, 23 Jun 2023 17:53:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>-H</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>abb53e1ace0bd0e305397ee157932b7cd80a0ddf8c577e147fee90ae80489132</i><br /><br />Threat actor <b>description</b>: <i>Company is one of the oldest and most storied names in the musical products industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Crane-Rental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8512</link>
<guid>e092aed5316b555a770029849e06a7de</guid>
<pubDate>Fri, 23 Jun 2023 16:48:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>American-Crane-Rental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>664ce198e3ee3bfe2a81e76a2b04a3d9909bd0e00f54a7538ec7a46e6f1f04c6</i><br /><br />Threat actor <b>description</b>: <i>Company operates in truck & crane rental Industry, 15 ton to 350 ton hydraulic cranes bare boom truck rental, standard mount to swing cabs machinery relocation, and other transportation vehicles.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Akron-Summit-County-Public-Library</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8510</link>
<guid>fcbfab2f4cda26061ed9e3ee96a4fd61</guid>
<pubDate>Fri, 23 Jun 2023 15:49:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-Akron-Summit-County-Public-Library</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c655479aefc7517841da2dc75a27b613544d977dc1710a2e105830c7178a78c</i><br /><br />Threat actor <b>description</b>: <i>The Akron-Summit County Public Library is an organization dedicated to providing reading, learning and other opportunities and programs for members of the community. Soon there will be another opportunity for customers of this library and others who are interested: you will be able to review any staff document for free. Keep in mind that your documents may be there, too. This informationand the rest of the internal library will be available here shortly.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Galveston-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8509</link>
<guid>e80ba3de4e2f156e3bdf5b3596b36ca4</guid>
<pubDate>Fri, 23 Jun 2023 14:59:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Galveston-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>780020a3d2b8291219d4c74995fa73edef10fcbd749e0ba14b26cb4dbddb9fb8</i><br /><br />Threat actor <b>description</b>: <i>Galveston College provides residents of Galveston Island and the surrounding region with academic, workforce development, continuing education and community service programs. We decided to check and show you if you can protect yourself from cyber attacks on the island and realized you can't. Soon you'll see the results of our work with this client here. Much student detailed personal info. 99GB.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>ANDESASERVICES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8508</link>
<guid>3091d86c09a002e144f4ec506eada3d7</guid>
<pubDate>Fri, 23 Jun 2023 11:37:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ANDESASERVICES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e4666c93bde5ebe6468fe7a24c6fb99ac4c112cebdb28f01f9922aefd28f8cb</i><br /><br />Threat actor <b>description</b>: <i>Policy Lifecycle Solutions Provider for Life Insurance & Annuities Industry - Andesa</i><br />Target victim <b>website</b>: <i>https://www.ANDESASERVICES.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MM-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8503</link>
<guid>9800aa6dd63426e5155b76b184510f46</guid>
<pubDate>Fri, 23 Jun 2023 10:16:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>MM-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eb1091aadb97e98be375dc66c788e15799fe430aaf13f3828d3aeecf95d57b3a</i><br /><br />Threat actor <b>description</b>: <i>M&M Industries, Inc. is a US-based plastic pail manufacturer which was established in 1986 by Glenn Morris, Sr. Mr. Morris began in 1963 packaging over-the-counter remedies. An inventor who has 44 patents for his ingenious ideas, he saw the need for a “child-resistant” cap to assure safety for prescription products, and developed one. Today the company is owned and operated by his son, Glenn Morris. M&M Industries has two manufacturing plants in Chattanooga, TN in addition to plants in Phoenix, AZ and Lordstown, OH. We have the capability to print using dry offset printing, in-mould labeling or heat transfer labeling. M&M employs individuals committed to excellence and quality. We believe in customer service and personal attention. M&M Industries is a manufacturer of containers for hazardous and non-hazardous solids and liquids. The containers we manufacture are ideal for biohazard waste, hazardous chemicals, solid waste and solid chemicals. Most containers are U.N. Certified and are made with FDA grade materials.SITE: https://www.ultimatepail.com Address  316 CORPORATE PLACE CHATTANOOGA, TN 37419</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hill-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8502</link>
<guid>37ecd27608480aa3569a511a638ca74f</guid>
<pubDate>Thu, 22 Jun 2023 22:02:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Hill-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1896870c1fef45b39a0a8c185e52112f8efe813cd5c4087867f471d1f0d7a16b</i><br /><br />Threat actor <b>description</b>: <i>Pennsylvania, USA</i><br />Target victim <b>website</b>: <i>www.hillintl.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Refractron</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8498</link>
<guid>a2eab75e37ee14b3ed50bb2b74036617</guid>
<pubDate>Thu, 22 Jun 2023 17:55:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Refractron</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4345ebe5ed86bd5c2616ffc36a432ed06bc98fc1b6972f3557f31ebe66093c49</i><br /><br />Threat actor <b>description</b>: <i>Refractron has created resilient, innovative ceramic-based solutions since 1984, offering responsive customer service and accountability to maintain each client relationship with the best care possible. Their cyber security systems are not so resilient and innovative and that unfortunate fact caused their data will be uploaded to our blog these days.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>GCE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8497</link>
<guid>4ef42b32bccc9485b10b8183507e5d82</guid>
<pubDate>Thu, 22 Jun 2023 16:54:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>GCE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ebd2fdbbdbb600578c6ad45eef94de614ee25c8afc267f9ec662cfa48189fec9</i><br /><br />Threat actor <b>description</b>: <i>GC&E provides Information Technology (IT), security, and telecommunications solutions. GC&E also provides consultation, design, and implementation. Markets served are federal, state and local, K-12 and higher education, healthcare and commercial markets. We are going to show you how this company looks inside soon. Think twice before consulting with these professionals about cyber security.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Craig--Associates-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8493</link>
<guid>a267f936e54d7c10a2bb70dbe6ad7a89</guid>
<pubDate>Wed, 21 Jun 2023 15:54:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Craig--Associates-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f2038c61d65d6519b3738c62a6137adaf1df36ff7baa27866638536ddc1c39d6</i><br /><br />Threat actor <b>description</b>: <i>Craig & Associates, LLC was incorporated August 1, 1980.  We have been serving individuals and businesses for over 40 years and offer a variety of services: income tax preparation, strategic tax planning, financial planning, estate planning, retirement planning, insurance planning, investment review, auditing & accounting services, recordkeeping & reports, payroll & sales tax services, pension & profit sharing plan services and incorporations & partnerships. We work with several types of businesses including Corporations, S-Corporations, Partnerships, Condominium Associations, Municipalities and Not-for-Profit Organizations. </i><br />Target victim <b>website</b>: <i>http://www.craigcpa.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Main-Street-Title-and-Settlement-Services-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8490</link>
<guid>aaea265a9054b3b8c5df99c64685ec2e</guid>
<pubDate>Wed, 21 Jun 2023 14:32:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Main-Street-Title-and-Settlement-Services-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d97234d21ff80aa900daa2f00cb554621c521c0240de790e35d7914ec5099950</i><br /><br />Threat actor <b>description</b>: <i>MAIN STREET TITLE BEGAN IN 1988 WITH DOMINICK DECARLO AND 3 EMPLOYEES ON MAIN STREET IN HACKENSACK. Rates were high and searches were done manually at the courthouse. Every file was handled with care and individual attention to detail to ensure a smooth closing.  As the years progressed, our client base grew as well as our team. Processes were streamlined and our services expanded to include settlement, thus creating Main Street Title and Settlement in 2007.  With over 50 employees and growing, Main Street Title and Settlement has become one of the leading title insurance and settlement agencies in the New Jersey / New York Tristate Area. We continue to expand our service offerings and tools to be the best partners to our clients, near and far.  The Team at Main Street prides itself on service, integrity, education and innovation, stemming from the foundation Mr. DeCarlo set forth since the beginning. Today, our Executive Team continues to lead the agency in providing quality customer service to each and every client. In addition, they play an active role within the community, including involvement in fund-raisers for many local and regional charitable organizations.</i><br />Target victim <b>website</b>: <i>https://www.mainsttitle.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dancie-Perugini-Ware-Public-Relations</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8489</link>
<guid>41ccc97e4f1b5de999aa6468ff787d89</guid>
<pubDate>Wed, 21 Jun 2023 13:55:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Dancie-Perugini-Ware-Public-Relations</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2586349463537cc9ea90cbb1bdc682d6716418a42f3607a6379b75e0fcae32fb</i><br /><br />Threat actor <b>description</b>: <i>Texas, United States</i><br />Target victim <b>website</b>: <i>www.dpwpr.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Summit-Hut</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8486</link>
<guid>35c1f9c50543aeedf1a3167bcb9d2756</guid>
<pubDate>Wed, 21 Jun 2023 13:55:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Summit-Hut</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>743708543149f2193f86daae7834376a9755270eea2a5efb7054a17670aee75b</i><br /><br />Threat actor <b>description</b>: <i>Arizona, United States</i><br />Target victim <b>website</b>: <i>www.summithut.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Yokohama-oht-atgtire</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8487</link>
<guid>18c7c32f90d25fbe5c1b9ac0e8d5e475</guid>
<pubDate>Wed, 21 Jun 2023 13:53:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Yokohama-oht-atgtire</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25cd4a9eb3f96e39728890f5056163551b26c9a6095cf8523cfd22091d952ff9</i><br /><br />Threat actor <b>description</b>: <i>Yokohama Off-Highway Tires America Inc is a company that operatesin the Automotive industry. A well-known name in tire business is going to share it's secrets in our blog. The data we took from them is of 1.3TB size will be available for you soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kansas-Joint--Spine-Specialists</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8485</link>
<guid>6804c9bca0a615bdb9374d00a9fcba59</guid>
<pubDate>Wed, 21 Jun 2023 13:47:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Kansas-Joint--Spine-Specialists</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a4366c47afdb9ff36fbf6614a50bbac63f611904341c6820d982710bfd0e6272</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1976, Kansas Joint & Spine Specialists, formerly Orthopaedic & Sports Medicine at Cypress, has been committed to delivering the exceptional bone, joint, and muscle care patients need to make today theirs. Our orthopaedic surgeons, doctors, and medical staff are dedicated to improving the lives of residents in Wichita, Scott City, El Dorado, Anthony, and the surrounding areas in Kansas as well as treating each patient with courtesy, respect, and compassion.</i><br />Target victim <b>website</b>: <i>https://www.kansasjointandspine.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Barentz-North-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8478</link>
<guid>d828725179d622a56f951e527a966ed7</guid>
<pubDate>Wed, 21 Jun 2023 13:00:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Barentz-North-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6321ab2118fde414a36755ab95e8423008870ec7b2e31aba6dfe4b0d560eb3c0</i><br /><br />Threat actor <b>description</b>: <i>Ohio, United States</i><br />Target victim <b>website</b>: <i>www.barentz-na.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>PWI-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8479</link>
<guid>ee80e0a74aac64251238cecee2b066ca</guid>
<pubDate>Wed, 21 Jun 2023 13:00:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>PWI-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>16bdc9c82b6d220bf1739a6b4bd4a3dbb00ff181fc93c24f2d5658078d1b3bc1</i><br /><br />Threat actor <b>description</b>: <i>New Jersey, United States</i><br />Target victim <b>website</b>: <i>www.pwius.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Allpro-Consulting-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8482</link>
<guid>cc3f5463bc4d26bc38eadc8bcffbc654</guid>
<pubDate>Wed, 21 Jun 2023 13:00:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Allpro-Consulting-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d31693d1506ec77d689bf493021c9c98b2e373a32c6f0d8d3f5627965982d67b</i><br /><br />Threat actor <b>description</b>: <i>Texas, United States</i><br />Target victim <b>website</b>: <i>www.allprocgi.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eastside-Union-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8484</link>
<guid>d7c18718502a444a1a88227b0915de84</guid>
<pubDate>Wed, 21 Jun 2023 13:00:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>Eastside-Union-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a172ddf3ca0dabaaf068fe2b88d53d16e67fac5cd2f2081ed7859aa6197c0e02</i><br /><br />Threat actor <b>description</b>: <i>Eastside Union School District seeks to provide an inclusive, challenging and innovative education in a safe, positive and rigorous learning environment with dynamic and responsive staff. The size of files we've taken - 18Gb. Accounting, personal information and so on. Everything will be uploaded during upcoming release.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>Medical-University-of-the-Americas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8474</link>
<guid>cb7c403aa312160380010ee3dd4bfc53</guid>
<pubDate>Wed, 21 Jun 2023 12:18:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Medical-University-of-the-Americas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4c206ee28dac60bbe7907b16fb8360ec5ec6bedb9eb5ac700ab36375aa39ec0b</i><br /><br />Threat actor <b>description</b>: <i>Newly Reduced Tuition Makes MUA Accessible and Affordable. It is a great time to get started on your medical education! At MUA we recently lowered our tuition, which made us MUA the most affordable Caribbean medical school that is approved to participate in U.S. Federal</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>EDG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8468</link>
<guid>e8e5f71237c3b05761cda9e029a5b3d2</guid>
<pubDate>Wed, 21 Jun 2023 10:39:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>EDG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba91c149a0453302239d47437c604ecc0e124e7f88a63d759e6dc18896f29655</i><br /><br />Threat actor <b>description</b>: <i>FOCUSING ON QUALITY WORK AND CUSTOMIZED SOLUTIONS TODAY, CREATING PARTNERSHIPS FOR TOMORROW.</i><br />Target victim <b>website</b>: <i>https://www.edg.net/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Sullivan-Group-of-Court-Reporters</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8466</link>
<guid>b5200c6107fc3d41d19a2b66835c3974</guid>
<pubDate>Wed, 21 Jun 2023 08:47:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>The-Sullivan-Group-of-Court-Reporters</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1395c65e7f85066b10b25184cedd4ffecf6a1029fd88561bd9a6218941dd42c2</i><br /><br />Threat actor <b>description</b>: <i>The company that has experience in every type of litigation.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Beverly-Hills-Plastic-Surgery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8465</link>
<guid>3a077e8acfc4a2b463c47f2125fdfac5</guid>
<pubDate>Wed, 21 Jun 2023 06:51:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Beverly-Hills-Plastic-Surgery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2cf8ab78724d9d5f1cfbca2f7fd3ce673bf209e1c834fccf5f099fc5256af702</i><br /><br />Threat actor <b>description</b>: <i>Breast augmentation, rhinoplasty, and liposuction are some of the most sought-after cosmetic surgery procedures at Beverly Hills Plastic Surgery. Dr. David Kim and Dr. Eugene Kim have developed an impeccable reputation for their stunning, natural-looking results and high patient satisfaction. They pride themselves on providing honest advice and the highest standard of care, from your initial plastic surgery consultation to your post-operative appointments.  Our plastic surgeons have been serving the Los Angeles and Beverly Hills area for many years and take great pride in the work they do. Both of our surgeons are board certified by the American Board of Plastic Surgery. This is the only plastic surgery board recognized by the American Board of Medical Specialties.</i><br />Target victim <b>website</b>: <i>https://www.beverlyhillsplasticsurgery.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Praxis-Energy-Agents</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8460</link>
<guid>c2839bed26321da8b466c80a032e4714</guid>
<pubDate>Tue, 20 Jun 2023 19:08:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Praxis-Energy-Agents</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25a861db15a4dbea584865bc8c11f66feebf5f532f65a89949b3a4722b31bdf0</i><br /><br />Threat actor <b>description</b>: <i>Praxis Energy Agents is an international bunkering trading company founded in Greece in 1993 and currently operating through four offices in Singapore, Dubai, Hamburg and New York.  The company's head office is located at 2603 Augusta Dr Ste 1260, Houston, Texas, 77057, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Strait--Lamp-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8458</link>
<guid>ca7e09eacf1ae34bc819d495c5adfed9</guid>
<pubDate>Tue, 20 Jun 2023 15:17:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Strait--Lamp-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>37e3f09ba3784bc3b0ac33cb7841c4d968382e0dde7d3da8d87ea467fee22d7d</i><br /><br />Threat actor <b>description</b>: <i>The Strait & Lamp Group is a leading supplier to the central Ohio building industry focused on providing individual attention to homebuilders, contractors and remodeling professionals.</i><br />Target victim <b>website</b>: <i>straitandlamp.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>MORSEMOVING</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8457</link>
<guid>9ed27554c893b5bad850a422c3538c15</guid>
<pubDate>Tue, 20 Jun 2023 13:58:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>MORSEMOVING</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a471637adbe012d067d6c91ae77ecaff56e4cdd946f584a937aaa5c296232385</i><br /><br />Threat actor <b>description</b>: <i>Herb and Vi Morse founded Morse Moving in 1954. From their 11 children and 42 grandchildren, twenty-six work full-time in the business today, ensuring you the finest relocation possible in the industry. Morse Moving has eight brothers and three sisters who began working in the business while very young; gaining valuable experience in packing, loading and driving moving vans. Today 3 work as van operators, two of which were named in the Allied’s top ELITE-FLEET, training our upcoming drivers. This ensures our service providers receive the highest level of training! Morse Moving has developed a team of drivers with an average of 14 years experience in moving families and corporations. This allows us to relocate you or your employees across town or around the world. We have “Certified Moving Consultants” and “Certified Relocation Professionals”, with years of experience. They have received several national awards for being the BEST in the relocation industry. They are Allied Quality Award winners and are proud to be the winner of the Allied 2016 Quality Hauling Agent Award.SITE: www.morsemoving.com Address  10049 Harrison Rd Ste 500 Romulus, Michigan, 48174 United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Promotion-Fulfillment-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8455</link>
<guid>9969e5817467c11ff15639d0ed517c7a</guid>
<pubDate>Tue, 20 Jun 2023 11:04:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>Promotion-Fulfillment-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>425f89a4ff5a67731235a2b474ce39460c9223078c44635ecc73f250269cc47c</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1974, Promotion Fulfillment Center provides product fulfillment and promotional services. They offer rebates, sweepstakes/contests, loyalty programs and more. The company is headquartered in Camanche, Iowa.</i><br />Target victim <b>website</b>: <i>https://www.pfcfulfills.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>University-of-Hawaii</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8456</link>
<guid>706bf9581a8f1747195e5c190835a9bc</guid>
<pubDate>Tue, 20 Jun 2023 11:03:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>University-of-Hawaii</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f483af68043e2bb77e6256e489d3500fa4fe6d7b84652522e01b84e28f35a81</i><br /><br />Threat actor <b>description</b>: <i>University of Hawaii, founded in 1907 and headquartered in Honolulu, Hawaii, offers degrees in both undergraduate and graduate-level curriculum. The University programs include undergraduate and graduate degree programs ...</i><br />Target victim <b>website</b>: <i>https://www.hawaii.edu</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>valleyoaks.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8454</link>
<guid>0d82627e10660af39ea7eb69c3568955</guid>
<pubDate>Tue, 20 Jun 2023 10:57:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>valleyoaks.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a7644a51e59e440806ea8fa7f916308b36ea00ecfb7e0cea458199e96724397</i><br /><br />Threat actor <b>description</b>: <i>valleyoaks.orgValley Oaks Health is a large community mental health center serving Lafayette, Indiana and the surrounding counties. As we work in earnest to meet the mental health needs of our communities, your skills are required! We currently hav...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>bbrook.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8452</link>
<guid>a1ada9947e0d683b4625f94c74104d73</guid>
<pubDate>Tue, 20 Jun 2023 09:59:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>bbrook.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f4b15a0493b7bbc0be4af5400560ce3adb746d15660097cd05cc19238b7438f5</i><br /><br />Threat actor <b>description</b>: <i>Bound Brook School Districtadministrator@vsphere.local f0Rm#l@C$bb-vcenter7.bbrook.edu</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Akin-Law-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8451</link>
<guid>8e0ce414531179ae9b7f60e20351ee8b</guid>
<pubDate>Tue, 20 Jun 2023 06:54:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>The-Akin-Law-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fdd98a3bcf4bfddeaf2eec77c5d283e0c144f1cda507ec88fa3997afc30a14df</i><br /><br />Threat actor <b>description</b>: <i>The Akin Law Firm provides services for virtually every legal need that your business may encounter. Our practice areas include: • Entity structuring and formation • Contract negotiation and preparation • Real estate transactions • Financing, including debt and equity • Employment and contractor matters • Trademarks and copyrights • Intellectual property transactions and licensing • Acquisitions • Business sales • Business litigation including trials, mediations, arbitrations, and appealshttp://theakinfirm.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>EMSSHI.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8446</link>
<guid>eec96a7f788e88184c0e713456026f3f</guid>
<pubDate>Tue, 20 Jun 2023 04:42:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>EMSSHI.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c78edf2ba676587c3de9eebd8a7139c409018c4eaeca688d83e1279fee1af83b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.EMSSHI.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BAESMAN.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8447</link>
<guid>67b4e63655366f054314061dadd539a0</guid>
<pubDate>Tue, 20 Jun 2023 04:41:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BAESMAN.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>11f4a7085fd7c95b7ef20d56d2069be77baac1247a8514817326a2d13e49cd39</i><br /><br />Threat actor <b>description</b>: <i>CRM, Customer Loyalty, Marketing, Print & Fulfillment - Baesman</i><br />Target victim <b>website</b>: <i>https://www.BAESMAN.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>STOCKMANBANK.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8448</link>
<guid>44590aa922914066f965ae67be0222d2</guid>
<pubDate>Tue, 20 Jun 2023 04:41:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>STOCKMANBANK.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>307fd98e0f6f223004114d31165b1088a49212240f63d7dd9423b88f796c903f</i><br /><br />Threat actor <b>description</b>: <i>Banking, Wealth Management and Insurance - Stockman Bank</i><br />Target victim <b>website</b>: <i>https://www.STOCKMANBANK.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>NORTONLIFELOCK.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8449</link>
<guid>deee9fe5195586bf4545518a76aff2f7</guid>
<pubDate>Tue, 20 Jun 2023 04:40:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NORTONLIFELOCK.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>35043d575d6938358eb6e3042965a42239817bacd5d4c9189fadf50316645a17</i><br /><br />Threat actor <b>description</b>: <i>Un leader mondial de la cybersécurité grand public - NortonLifeLock</i><br />Target victim <b>website</b>: <i>https://www.NORTONLIFELOCK.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mammoth-Energy-NASDAQ-TUSK</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8442</link>
<guid>915e3742d51cb477268ba29275c3ce09</guid>
<pubDate>Mon, 19 Jun 2023 21:53:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Mammoth-Energy-NASDAQ-TUSK</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19c98cea646b805a3bd72b1b0a366e54b724c8df89bc5c4226136e6a57b623a5</i><br /><br />Threat actor <b>description</b>: <i>Energy At Mammoth Energy Services, our employees are our most valuable asset, and we are committed to providing an environment that promotes safety, health and wellbeing.</i><br />Target victim <b>website</b>: <i>https://mammothenergy.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>CREELIGHTING.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8438</link>
<guid>63ceea56ae1563b4477506246829b386</guid>
<pubDate>Mon, 19 Jun 2023 15:42:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CREELIGHTING.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d844a7c0f46af95a69b42a2f9606b583e0b404b7f71401e14f2400b60021902e</i><br /><br />Threat actor <b>description</b>: <i>Home - Cree Lighting</i><br />Target victim <b>website</b>: <i>https://www.CREELIGHTING.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SKILLSOFT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8439</link>
<guid>c480540d4e8c0cf7ad03ba949e3a5280</guid>
<pubDate>Mon, 19 Jun 2023 15:41:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SKILLSOFT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e027906b4df2117c1196e1337bd5a992b345b7b77e3d345d5525e72b624eec4e</i><br /><br />Threat actor <b>description</b>: <i>Skillsoft - Online Courses and Training - Free Access</i><br />Target victim <b>website</b>: <i>https://www.SKILLSOFT.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SCU.EDU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8440</link>
<guid>eba55fca4575e35eec8587f10ba60a43</guid>
<pubDate>Mon, 19 Jun 2023 15:41:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SCU.EDU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8813a3cfd99df58711686b6fe8edfc50aeb572b88b80dcc3340a2a1c6ebaea27</i><br /><br />Threat actor <b>description</b>: <i>Home - Santa Clara University</i><br />Target victim <b>website</b>: <i>https://www.SCU.EDU</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TELOS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8441</link>
<guid>43a2348027cdb8d216f4fb15fd9e1e4f</guid>
<pubDate>Mon, 19 Jun 2023 15:40:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TELOS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8968d46f5035b946ec7c812d80261df0820b0208ebff5b3fb09b70dc30b40524</i><br /><br />Threat actor <b>description</b>: <i>Telos Corporation - Solutions that Empower and Protect the Enterprise</i><br />Target victim <b>website</b>: <i>https://www.TELOS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GESA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8436</link>
<guid>ca3a9be77f7e88708afb20c8cdf44b60</guid>
<pubDate>Mon, 19 Jun 2023 15:39:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GESA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>044b2b4cd664e57681133da498c0bf110c0bbcfbcd26b71b4480e649cd977ddd</i><br /><br />Threat actor <b>description</b>: <i>Washington Credit Union - Loans - Savings Accounts - Gesa</i><br />Target victim <b>website</b>: <i>https://www.GESA.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Onsupport-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8432</link>
<guid>117ffc1acd844e431a4b73f0867adae5</guid>
<pubDate>Mon, 19 Jun 2023 13:56:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Onsupport-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b330180c3f5b90b6e09f224668997d35a40bbebe4327e238f5862098a296504</i><br /><br />Threat actor <b>description</b>: <i>Onsupport CorporationProviding IT solutions since 1992, we strategize with clients to define the earth needs and give them a competitive edge in their industry. Free consultations. On support help small and mid-sized companies manage technology. On support provides: Managed Network Services, Hosting Services, and Application/Web Development Services. Whether On support is managing your network, or you are utilizing On support's hosted virtual network, On support allows you focus on what you do best - running your company. On support is made up of a top-notch team of industry professionals serving Central Texas forever 19 years.onsupport.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Texas-Hotel-and-Lodging-Association</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8433</link>
<guid>30aaa42805c04522a16e12d7e5b87437</guid>
<pubDate>Mon, 19 Jun 2023 13:55:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Texas-Hotel-and-Lodging-Association</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c0afd1e5ea8f6166b8ddc6d30e6ca2209712d2eadfc100633a0dfd0f91d5210</i><br /><br />Threat actor <b>description</b>: <i>Texas Hotel & Lodging AssociationTHLA is a nonprofit hotel trade association representing every aspect of the lodging industry across Texas. Learn about the benefits of being a member today! Representing over 5,000 members from the largest convention center hotels to the smallest B&Bs, the Texas Hotel & Lodging Association is the largest state lodging association in the nation. Advocating for and serving the Texas lodging industry since 1903. Governmental affairs representation, legal services lodging properties, website listings, endorsed vendor programs, and more. https://texaslodging.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>TARLE-LAW-P.C.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8434</link>
<guid>1906f3350e1fa43adced642ff351c943</guid>
<pubDate>Mon, 19 Jun 2023 13:55:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>TARLE-LAW-P.C.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b7a5b740ce62ed4b12d471c8bcee48c7066e358dfd4dfe5e0afb530e6e0d97a</i><br /><br />Threat actor <b>description</b>: <i>Tarle Law is widely sought throughout CA and TX in a diverse range of industries, including construction defect, insurance defense and more. Tarle Law provides experienced litigation representation throughout Southern California and Central Texas.https://www.tarlelaw.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>PrintGlobe-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8430</link>
<guid>bc6fe82635b1429d3e886eec0fc34f49</guid>
<pubDate>Mon, 19 Jun 2023 13:54:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>PrintGlobe-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18c3608acf4d0f04868201027d0d4f2f8fb537db80e713f1511fe64446a2992b</i><br /><br />Threat actor <b>description</b>: <i>Custom Printed Personalized Promotional Items and Products by PrintGlobe. Since 1995 PrintGlobe has been Your One Stop Shop for Wholesale, Custom Merchandise such as Promotional Items, Personalized Products and more. We are a Full Service Supplier of all Things Custom Printed. Learn More Today. PrintGlobe was founded in Austin, Texas in April 1995 as a small graphic design and printing company. www.printglobe.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>BLUESAGE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8431</link>
<guid>f69543a0f1b1c844dbd3eeee30ea0404</guid>
<pubDate>Mon, 19 Jun 2023 13:54:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>BLUESAGE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>038b8b23c0d048ba3d229468e8f30a355819375ae3609a906ef80a2ca33c1fba</i><br /><br />Threat actor <b>description</b>: <i>The "Blue Sage" is an indigenous Texas wildflower that is a hardy and upright plant able to survive in drought conditions. Like our namesake, we are set up to thrive in all varieties of investing environments. We are by nature generalists and seek to invest across a diverse range of industries.https://www.bluesage.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ascendum-Machinery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8428</link>
<guid>138aab288c363726990120413c62acee</guid>
<pubDate>Mon, 19 Jun 2023 12:53:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Ascendum-Machinery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>13ac73e6d3d9fc37e3ebb29a3d0248ee871fa4ecda1e100a3f0d8f16f2372a77</i><br /><br />Threat actor <b>description</b>: <i>All data available for downloading! Enjoy. Ascendum is the Volvo Construction Equipment dealer. Ascendum is one of the leading construction equipment dealers in the United States. </i><br />Target victim <b>website</b>: <i>https://ascendummachinery.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>FHR-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8427</link>
<guid>b49fdab097253cac48e3dc628a49da5e</guid>
<pubDate>Mon, 19 Jun 2023 08:44:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>FHR-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25e476c0919a9a6aa76098c08a35108f95d434f958ef1af76210a5d77ad4d485</i><br /><br />Threat actor <b>description</b>: <i>FHR Electric offers cost-effective electrical repair services in Scottsdale, Arizona. The main office of the company is located at 7720 E Gelding Dr. Scottsdale AZ 85260</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Reddit-Files</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8419</link>
<guid>3016a447172f3045b65f5fc83e04b554</guid>
<pubDate>Sat, 17 Jun 2023 22:13:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>The-Reddit-Files</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e75dae3f2bba1054ba67a14380646b41b3e97b982f45c633ff9f44083517450c</i><br /><br />Threat actor <b>description</b>: <i>Reddit is an American social news aggregation, content rating, and discussion website. Registered users submit content to the site such as links, text posts, images, and videos, which are then voted up or down by other members. Posts are organized by subject into user-created boards called "communities" or "subreddits".</i><br />Target victim <b>website</b>: <i>https://reddit.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bauer-Built</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8416</link>
<guid>b93e78c67fd4ae3ee626d8ec0c412dec</guid>
<pubDate>Sat, 17 Jun 2023 03:52:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Bauer-Built</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7182351e4019cc06d6615378c978340a1b0bb2028cb7c9edac011a4d92acd85</i><br /><br />Threat actor <b>description</b>: <i>All Data.</i><br />Target victim <b>website</b>: <i>https://www.bauerbuilt.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Creative-Liquid-Coatings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8414</link>
<guid>682e0e796084e163c5ca053dd8573b0c</guid>
<pubDate>Fri, 16 Jun 2023 23:56:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Creative-Liquid-Coatings</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34b4329f0f17c080f996da3276845599c3625a39283cb00c758cbed49d04e597</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1994, Creative Liquid Coatings operates as a full service supplier that streamlines the entire process beginning with product design, mold flow analysis, and feasibility studies, to advanced error proofing technology, assembly, and fully integrated secondary operations. The company has 3 plants located in the state and serves industries such as automotive, heavy truck, marine, powerspor ts, and structural medical furniture The company is headquartered in Kendallville, Indiana.   Headquarters 2620 Marion Dr, Kendallville, Indiana, 46755, United States  Phone Number (260) 349-1862  Website www.creativeliquidcoatings.com  Revenue $145.6M  -------------------------------------------------  Angle Advisors has announced that Creative Liquid Coatings Inc. (CLC) has acquired the assets of CK Technologies (CKT) from Cascade Engineering. Angle Advisors acted as the exclusive investment banking advisor to Cascade and CKT in completing this transaction.   CKT is one of few suppliers in North America for very-large, injection molded plastic panels and parts for commercial trucks and buses. Operating facilities in Ohio, North Carolina, and Texas, CKT provides vertically integrated services utilizing 16 injection molding presses, automated paint finishing lines, and advanced assembly capabilities.  Headquarters 1701 Magda Dr, Montpelier, Ohio, 43543, United States  Phone Number (419) 485-1110  Website www.cktech.biz  Revenue $114.2M  -------------------------------------------------  On July 30, Creative Liquid Coatings (CLC) acquired the major assets of McKechnie Vehicle Components (MVC) located in Nicholasville, Ky. and at 12117 C.R .Koon Highway in Newberry.  This transaction will expand CLC’s current footprint beyond Indiana and allow them to service customers across the United States. In addition, over 230 jobs have been saved and the future of these locations has been secured.  Headquarters 27087 Gratiot Ave Fl 2, Roseville, Michigan, 48066, United States  Phone Number (586) 491-2600  Website www.mvcusa.com  Revenue $116M  ------------------------------------------------- </i><br />Target victim <b>website</b>: <i>https://www.creativeliquidcoatings.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>PALIG.COM-PANAMERICAN</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8411</link>
<guid>a3de03cb426b5e36f5c7167b21395323</guid>
<pubDate>Fri, 16 Jun 2023 23:04:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PALIG.COM-PANAMERICAN</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>422c609091c1674eb1a927870d3e263cd7bdf69dc372ee9e77fdd60c70afd9a2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.PALIG.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>NUANCE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8412</link>
<guid>831b342d8a83408e5960e9b0c5f31f0c</guid>
<pubDate>Fri, 16 Jun 2023 23:03:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NUANCE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c17bd900946af8834fb0e9cf1a7eda8b152b58ade30325855cf4ad93143c428e</i><br /><br />Threat actor <b>description</b>: <i>Nuance - Conversational AI for Healthcare and Customer Engagement - Nuance</i><br />Target victim <b>website</b>: <i>https://www.NUANCE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BOSTONGLOBE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8406</link>
<guid>fca758e52635df5a640f7063ddb9cdcb</guid>
<pubDate>Fri, 16 Jun 2023 14:37:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BOSTONGLOBE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>40a01507fc8e31c6bd4de45d4e48a386a443ca06206bfbd37e0c5a2fa6ee4073</i><br /><br />Threat actor <b>description</b>: <i>The Boston Globe</i><br />Target victim <b>website</b>: <i>https://www.BOSTONGLOBE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ICSYSTEM.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8408</link>
<guid>257deb66f5366aab34a23d5fd0571da4</guid>
<pubDate>Fri, 16 Jun 2023 14:36:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ICSYSTEM.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>13e7c508bc6528b11e48440f292ace9e91a5df444fb9260f5e9f00d9ebb72f38</i><br /><br />Threat actor <b>description</b>: <i>Debt Collection Services & Solutions - IC System</i><br />Target victim <b>website</b>: <i>https://www.ICSYSTEM.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>UMSYSTEM.EDU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8409</link>
<guid>b18e8fb514012229891cf024b6436526</guid>
<pubDate>Fri, 16 Jun 2023 14:35:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>UMSYSTEM.EDU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a726433ddb04f33227bc88a58647ad67f10850fcd0a962317862eed94f85d89d</i><br /><br />Threat actor <b>description</b>: <i>University of Missouri System</i><br />Target victim <b>website</b>: <i>https://www.UMSYSTEM.EDU</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>COLUMBIABANK.COM-UMPQUABANK.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8410</link>
<guid>836a0dcbf5d22652569dc3a708274c16</guid>
<pubDate>Fri, 16 Jun 2023 14:35:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>COLUMBIABANK.COM-UMPQUABANK.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b9cb407f7db619081cc8fceb0166732ee9d064db094b94c82957353fb1d6e65</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.COLUMBIABANK.COM (UMPQUABANK.COM)</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kisco-Senior-Living</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8399</link>
<guid>56d33021e640f5d64a611a71b5dc30a3</guid>
<pubDate>Fri, 16 Jun 2023 04:53:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Kisco-Senior-Living</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>599b484c7c3020fd087aae013b38a71ac999d64492797ddd40c428386fd88c8d</i><br /><br />Threat actor <b>description</b>: <i>Kisco Senior Living was founded in 1990. This company provides elderly care services in the form of assisted and independent community living.</i><br />Target victim <b>website</b>: <i>https://www.kiscoseniorliving.com/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>Multistack</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8398</link>
<guid>2e64da0bae6a7533021c760d4ba5d621</guid>
<pubDate>Fri, 16 Jun 2023 04:37:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Multistack</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e266bc8be28debd6c7b53ac25a44f018ec046fd899fba8f74b7eb1b309f86e85</i><br /><br />Threat actor <b>description</b>: <i>At Multistack, we recognize and respect the importance of providing HVAC solutions that promote energy and water efficiency, utilize the best refrigerant choices available, and embrace the transition from fossil fuels to electrification.Water and air-cooled MagLev® chiller platforms achieve superb efficiency across their full range of operation. Our unique MagLev chiller design and unrivalled Transitional Efficiency? chiller control algorithms deliver outstanding part-load performance at all condenser-water or ambient temperature conditions.  MagLev also offers refrigerant choices recognized worldwide safer for the environment: R1234ze, R-513, and R515B.Our modular product’s design allows you the freedom to use just enough energy to meet your current needs, while offering you the flexibility of incorporating additional modules as your operations grow. Minimizing embodied energy is an important design focus and we pride ourselves that our modular chillers deliver the industry’s highest cooling and heating output per pound. If you’re looking to cool and heat your building with as little environmental impact as possible, look no further than Multistack!</i><br />Target victim <b>website</b>: <i>https://www.multistack.com/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>EASTWESTBANK.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8394</link>
<guid>664c7298d2b73b3c7fe2d1e8d1781c06</guid>
<pubDate>Thu, 15 Jun 2023 21:10:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>EASTWESTBANK.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eb47dfca6541c8384c2a3a3a4c42442d06fbd4a6298a34a4f0be572687dc0efc</i><br /><br />Threat actor <b>description</b>: <i>Personal and Commercial Banking, Home Loans, Wealth Strategies - East West Bank</i><br />Target victim <b>website</b>: <i>https://www.EASTWESTBANK.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>POWERFI.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8395</link>
<guid>67b878df6cd42d142f2924f3ace85c78</guid>
<pubDate>Thu, 15 Jun 2023 21:10:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>POWERFI.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d831ca09ffbfee67ad94ada59763693ce541e8eb366d84ca8d91cbd4a5865d51</i><br /><br />Threat actor <b>description</b>: <i>Power Financial Credit Union - South Florida Credit Union - Loans</i><br />Target victim <b>website</b>: <i>https://www.POWERFI.ORG</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BARHARBOR.BANK</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8389</link>
<guid>60a6c4002cc7b29142def8871531281a</guid>
<pubDate>Thu, 15 Jun 2023 21:09:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BARHARBOR.BANK</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c693ea8a6b2ea66d16451a11d2b94500f7133cc548414bf1c65d441f1598be5</i><br /><br />Threat actor <b>description</b>: <i>Personal Homepage › Bar Harbor Bank & Trust</i><br />Target victim <b>website</b>: <i>https://www.BARHARBOR.BANK</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>APLUSFCU.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8390</link>
<guid>3dcf44c3136a27a28b3bb27586fd5fc5</guid>
<pubDate>Thu, 15 Jun 2023 21:09:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>APLUSFCU.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b351deb8699bfbd73aef8b93795989cb83070a8d8f1a4f694e3935e64a4734c0</i><br /><br />Threat actor <b>description</b>: <i>A+ Federal Credit Union - Award-Winning Texas Credit Union</i><br />Target victim <b>website</b>: <i>https://www.APLUSFCU.ORG</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BRAULT.US</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8391</link>
<guid>77b830096c1888016b4d7a730bbe9731</guid>
<pubDate>Thu, 15 Jun 2023 21:08:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BRAULT.US</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ab51cb45f85690af3c77a3a578a74b5a7dfb8101894d3984d41e54510e07a52</i><br /><br />Threat actor <b>description</b>: <i>Brault - End-to-End RCM & Practice Management</i><br />Target victim <b>website</b>: <i>https://www.BRAULT.US</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CARESERVICESLLC.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8388</link>
<guid>c42af2fa7356818e0389593714f59b52</guid>
<pubDate>Thu, 15 Jun 2023 16:37:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CARESERVICESLLC.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>23c9a2ff3d0c675d0ae08be9066e623820013a8fe034a7d7748d68d042815b80</i><br /><br />Threat actor <b>description</b>: <i>Care Services, LLC – Nationwide Coverage. Local Delivery.</i><br />Target victim <b>website</b>: <i>https://www.CARESERVICESLLC.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ENZO.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8380</link>
<guid>585eb4127afd003bd784f6e8dc132be2</guid>
<pubDate>Thu, 15 Jun 2023 16:24:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ENZO.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9227298ab6b68f0cc45ea75fc9ff8237212cb2fbc366a779b3e1a63ac62fbd4b</i><br /><br />Threat actor <b>description</b>: <i>Home - Enzo Biochem</i><br />Target victim <b>website</b>: <i>https://www.ENZO.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>316FIDUCIARIES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8381</link>
<guid>8606bdb6f1fa707fc6ca309943eea443</guid>
<pubDate>Thu, 15 Jun 2023 16:24:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>316FIDUCIARIES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ffab29d2e5ead13df6ef0fc614d3e6a9e8e1b2cd456c5a2538330bf5a60dc995</i><br /><br />Threat actor <b>description</b>: <i>Your Expert Plan Administration Fiduciary</i><br />Target victim <b>website</b>: <i>https://www.316FIDUCIARIES.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DELAWARELIFE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8382</link>
<guid>b3592b0702998592368d3b4d4c45873a</guid>
<pubDate>Thu, 15 Jun 2023 16:24:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DELAWARELIFE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e82da6560b984317d6bc9aa5199711dbdeb11687e82e5362cbf227a13beac884</i><br /><br />Threat actor <b>description</b>: <i>Delaware Life - Delaware Life - Home</i><br />Target victim <b>website</b>: <i>https://www.DELAWARELIFE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CUANSWERS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8384</link>
<guid>7dab099bfda35ad14715763b75487b47</guid>
<pubDate>Thu, 15 Jun 2023 16:23:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CUANSWERS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>28372ad31b5e9bda3382cbc1c2fbd8d539bcd2c7ed9a80314ac30ffa597ac108</i><br /><br />Threat actor <b>description</b>: <i>Home - CU*Answers</i><br />Target victim <b>website</b>: <i>https://www.CUANSWERS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HEALTHEQUITY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8386</link>
<guid>516341c3e8f4543c8d465b0c514a6f92</guid>
<pubDate>Thu, 15 Jun 2023 16:22:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HEALTHEQUITY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b3e8f8a2b26a6075cf7954f9c0301e6932417fddc3575a7b909623650169ad97</i><br /><br />Threat actor <b>description</b>: <i>HealthEquity - Industry's #1 HSA Administrator</i><br />Target victim <b>website</b>: <i>https://www.HEALTHEQUITY.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DANIEL-C.-HARRIS-O.D</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8376</link>
<guid>c11cb55c3d8dcc03a7ab7ab722703e0a</guid>
<pubDate>Thu, 15 Jun 2023 13:56:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>DANIEL-C.-HARRIS-O.D</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c22ceb1ba5418370653b8a794e04dfe51b1e100db613482d26e688a89cb71e5c</i><br /><br />Threat actor <b>description</b>: <i>Dr. Tim Harris received his Doctor of Optometry degree from Ferris State University College of Optometry in 1991. During his four-year optometry curriculum, he performed clinical rotations at the Duane Waters Correctional Facility and the Battle Creek Veterans Administration Hospital, where his training focused on diagnosis and treatment of ocular disease. His specialty areas include diagnosis and treatment of glaucoma, dry eye, contact lenses and family vision care.https://harriseyecareofdavison.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stone-Fox-Ventures</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8378</link>
<guid>c5f7756d9f92a8954884ec415f79d120</guid>
<pubDate>Thu, 15 Jun 2023 13:55:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Stone-Fox-Ventures</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a15a29a7248d62760a05f1cb664065c092c350a800496fd39ff3ce0b8bd94fa6</i><br /><br />Threat actor <b>description</b>: <i>StoneFox Ventures is a boutique private investment company that acquires, structures, manages and develops mid-level manufacturing, distribution and service companies. With a dual focus on modernization investments and acquisition and growth strategies, SFV recognizes the best opportunity for shareholders to generate significant returns.https://stonefoxventures.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>San-Luis-Obispo-County-Office-of-Education</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8375</link>
<guid>ea20aed6df7caa746052d227d194a395</guid>
<pubDate>Thu, 15 Jun 2023 13:54:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>San-Luis-Obispo-County-Office-of-Education</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cae33e3285d377857e5a3456eb36fab3bb4814d87509d1622daa691189cff710</i><br /><br />Threat actor <b>description</b>: <i>The San Luis Obispo County Office of Education promotes student success by supporting local school districts, providing specialized student services, and providing districtwide leadership and advocacy for all children.https://www.slocoe.org/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Law-Offices-of-Sergio-J.-Siderman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8373</link>
<guid>73f9ddba165b5c59c61dd64960ba8b2d</guid>
<pubDate>Thu, 15 Jun 2023 12:56:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Law-Offices-of-Sergio-J.-Siderman</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3747e2b24b4a8440de1bfcc5d6ecf43569c7657da0c9d73e8ea0caa336e1cef5</i><br /><br />Threat actor <b>description</b>: <i>This Law Office of Sergio G. has  become our goal. They receive the highest quality legal representation  for those who wish to obtain citizenship in connection with the content.  Their team of immigration attorneys get the Citizen's Vision ("Green  Card"), resolve issues with the Department of Homeland Security, and  have access to the services you need to make your dream goals come true.https://sidermanlaw.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>ste-usa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8368</link>
<guid>83004190b1793d7aa15f8d0d49a13eba</guid>
<pubDate>Thu, 15 Jun 2023 08:54:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ste-usa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0cfda4cf8e83664228d93473aeedf88fafc6ddbb794f9f5a4ebf9b4354c67837</i><br /><br />Threat actor <b>description</b>: <i>HISTORYOver fifty years ago, STE set out to deliver a higher standard of engineering and manufacturing excellence in the liquid tank industry. From humble beginnings in a garage in South Central Wisconsin, to today in a factory based in Beloit, Wis...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>flybtr.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8367</link>
<guid>51fda174c360f4ea5d21de87c4c9a792</guid>
<pubDate>Thu, 15 Jun 2023 08:45:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>flybtr.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8178b114a269280cc9bceaf6aa352e05854889431fd45ca53d99a9a3460b54fc</i><br /><br />Threat actor <b>description</b>: <i>BTR's HistoryIn the summer of 1939, East Baton Rouge Parish began studying sites for a new airport that could accommodate longer runways to replace the downtown airport on Goodwood Boulevard. The site of the current Baton Rouge Metro Airport was ch...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Salem-Community-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8366</link>
<guid>5e083bd37263c80781fff960e8f5e655</guid>
<pubDate>Thu, 15 Jun 2023 07:57:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Salem-Community-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1c2a88aa31905ec59ff759f6f277b727a4d8708d6bcacab3c114fa52680095e</i><br /><br />Threat actor <b>description</b>: <i>Salem Community Schools is a public school district located in SALEM, IN. It has 1,762 students in grades PK, K-12 with a student-teacher ratio of 15 to 1.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>NEBRASKALAND</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8363</link>
<guid>e6ed5dacbfe60a3ea12e24759d7d5647</guid>
<pubDate>Wed, 14 Jun 2023 22:53:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>NEBRASKALAND</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e0b1b1d46ea1ad7f56baa1bed19725af4c84a0053893eb892b661ccdacbe19e0</i><br /><br />Threat actor <b>description</b>: <i>Nebraskaland, Inc. distributes and sells seafood and meat products to customers in New York metro area. It provides boxed beef, chicken, pork, lamb, veal, and various meats, as well as a range of frozen and processed foods.</i><br />Target victim <b>website</b>: <i>https://www.nebraskaland.com/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Texwipe</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8364</link>
<guid>af3b6a54e9e9338abc54258e3406e485</guid>
<pubDate>Wed, 14 Jun 2023 22:53:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>The-Texwipe</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d14e2e7e3c51cf52a863197219e939d8e33e94c8270ca2c94bde148395307e36</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1964, Texwipe is a company that specializes in manufacturing cleanroom products. The company is headquartered in Kernersville, North Carolina.</i><br />Target victim <b>website</b>: <i>https://www.texwipe.com/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>YAMAHA-CORPORATION-OF-AMERICA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8362</link>
<guid>d27b95cac4c27feb850aaa4070cc4675</guid>
<pubDate>Wed, 14 Jun 2023 22:36:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>YAMAHA-CORPORATION-OF-AMERICA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>247ce137498e17d41cbed0459af76cc7d14a6cbe362b87f56e18f456b92fdd3a</i><br /><br />Threat actor <b>description</b>: <i>Yamaha Corporation of America manufactures a complete line of musical instruments, professional audio products, customer-driven support products and computer based products targeted to both the amateur and professional markets.</i><br />Target victim <b>website</b>: <i>https://usa.yamaha.com</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>Venture-Logistics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8360</link>
<guid>b0bf8b3daf61246d13276dc8dcdfb87d</guid>
<pubDate>Wed, 14 Jun 2023 20:46:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Venture-Logistics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1fec0e88adafc023a374565d0b2d3c8efc377aef22af1d8c350bc2066b974081</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://venturelogistics.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>uga.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8348</link>
<guid>fd3ae753500ad06fd8fa224f28bcac59</guid>
<pubDate>Wed, 14 Jun 2023 20:22:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>uga.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc170d4b137eb6a3f947f58d0523cf0fc06bc8ede779d07fafd678d0f5211212</i><br /><br />Threat actor <b>description</b>: <i>UGA</i><br />Target victim <b>website</b>: <i>https://www.uga.edu</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>leggett.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8349</link>
<guid>e85cc63b4f0f312f11e073fc68ccffd5</guid>
<pubDate>Wed, 14 Jun 2023 20:21:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>leggett.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>305f341b21857e8ab523e062ca68e49aa7116b01094696cd662c0fa322128044</i><br /><br />Threat actor <b>description</b>: <i>Leggett & Platt®</i><br />Target victim <b>website</b>: <i>https://www.leggett.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>bankers-bank.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8350</link>
<guid>29d74915e1b323676bfc28f91b3c4802</guid>
<pubDate>Wed, 14 Jun 2023 20:21:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>bankers-bank.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>43655c8c4bc3440c34e795d6ff17535eceae33e3923071f2f04c251232e39cc0</i><br /><br />Threat actor <b>description</b>: <i>Sucuri WebSite Firewall - Access Denied</i><br />Target victim <b>website</b>: <i>https://www.bankers-bank.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>uhcsr.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8353</link>
<guid>10c72a9d42dd07a028ee910f7854da5d</guid>
<pubDate>Wed, 14 Jun 2023 20:20:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>uhcsr.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a95755bfc924fc0fe52f7d6c121144c5d41ab04518c18ff95ece4acae5e052b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.uhcsr.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>studentclearinghouse.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8355</link>
<guid>2c3279b0b059b2665593834a264d7de6</guid>
<pubDate>Wed, 14 Jun 2023 20:19:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>studentclearinghouse.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ded154a0664f337e0330784b020768e5da575b87049811f2101ae4ca17ed847</i><br /><br />Threat actor <b>description</b>: <i>National Student Clearinghouse</i><br />Target victim <b>website</b>: <i>https://www.studentclearinghouse.org</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>putnam.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8356</link>
<guid>b45f8e4366b41a30994d6b5b3bb2d51b</guid>
<pubDate>Wed, 14 Jun 2023 20:18:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>putnam.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5fc9e59fbcf33da072c0a377bc11153039e6c4e9d9d91c415354db6c8d9f00fc</i><br /><br />Threat actor <b>description</b>: <i>Putnam Investments – ETFs, Mutual Funds, Institutional, and 529</i><br />Target victim <b>website</b>: <i>https://www.putnam.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>datasite.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8357</link>
<guid>b1c1c47f20cf1d3253555b8cf83949c0</guid>
<pubDate>Wed, 14 Jun 2023 20:18:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>datasite.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df687b6c7b469fd8f385badb43723a59da2e337ba032613bd9f17a5667234bb2</i><br /><br />Threat actor <b>description</b>: <i>Premier Virtual Data Rooms for M&A Dealmaking - Datasite</i><br />Target victim <b>website</b>: <i>https://www.datasite.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>1stsource.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8358</link>
<guid>ee715daa76f1b51d80343f45547be570</guid>
<pubDate>Wed, 14 Jun 2023 20:17:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>1stsource.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e5ab0995f7482a5eb0425fa28578b5acae6a974eaf09007a895ceb77b2ecd4c</i><br /><br />Threat actor <b>description</b>: <i>Your 1st Source for Personal and Business Banking - 1st Source</i><br />Target victim <b>website</b>: <i>https://www.1stsource.com</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Air-Comfort-aircomfort.ac</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8347</link>
<guid>a9cc6694dc40736d7a2ec018ea566113</guid>
<pubDate>Wed, 14 Jun 2023 20:01:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rancoz</b> claims attack for <b>Air-Comfort-aircomfort.ac</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2bd5bb1b8195a98ecd21b52f0eb786d1500cd2e998926c80fb9681c0eaea3cc8</i><br /><br />Threat actor <b>description</b>: <i>Construction industry</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rancoz</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jalux-Americas-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8343</link>
<guid>ac9815bef801f58de83804bce86984ad</guid>
<pubDate>Wed, 14 Jun 2023 18:01:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusalocker</b> claims attack for <b>Jalux-Americas-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96b114d8d620702fcf4893ccc80c84f3ae327f21ff50e9377b174d2f565fdb69</i><br /><br />Threat actor <b>description</b>: <i>DescriptionClient Case – agreement – email(.msg) – and other documents Price: 160000$The company failed to take care of the data leak and therefore ,many contracts and other documents have been leaked to the Internet.We are also going to provide any documents related to the aforementioned company if any law enforcement agency should request it</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusalocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>arborsct.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8344</link>
<guid>42a85a0102b0a64d8737ffd2e00a57f4</guid>
<pubDate>Wed, 14 Jun 2023 18:00:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusalocker</b> claims attack for <b>arborsct.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81e0cae80c5cb6ecd671d14a58edff28de5da6f6ec38f975e2dce47d7c5a5d60</i><br /><br />Threat actor <b>description</b>: <i>DescriptionClient Case – agreement – email(.msg)- and other documents Price: 60000$ One copy will be sold, confidential informationThe company did not take care of the data leak, and therefore we will sell many contracts, customer data, financial component and other documentsin one lot for $ 60,000 for verification in the darknet or bank</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusalocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Marchant-Schmidt</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8342</link>
<guid>363ce3cd61389226b4a55b2aee2dacd7</guid>
<pubDate>Wed, 14 Jun 2023 17:55:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Marchant-Schmidt</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d806400b1286ef571a662e8388a856a31c28f4c57225423ac897e77c7e5354b</i><br /><br />Threat actor <b>description</b>: <i>Marchant SchmidtIndustrial Machinery & Equipment · Wisconsin, United States · 80 EmployeesHeadquarters 24 W Larsen Dr, Fond du Lac, Wisconsin, 54937, United States Phone Number (920) 921-4760 Website www.marchantschmidt.com Revenue $35.5MMarchant Schmidt is a global leader in the manufacture of Industrial Food Cutting Solutions. The company was established in 1963 and is headquartered out of Wisconsin.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-Horizons-Medical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8341</link>
<guid>e70981fd305170c41a5632b2a24bbcaa</guid>
<pubDate>Wed, 14 Jun 2023 17:54:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>New-Horizons-Medical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c09ada3fb9f9625ac1fc2a49c815c193a017756168121b049b2e4d65bb1e5076</i><br /><br />Threat actor <b>description</b>: <i>New Horizons Medical, PC founded in 2009, is a private physician group dedicated to providing the safe prescription of buprenorphine (Suboxone) to patients engaged in serious recovery efforts from opiate dependence.</i><br />Target victim <b>website</b>: <i>https://www.newhorizonsmedical.org/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>primeretailservices.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8339</link>
<guid>433371e69eb202f8e7bc8ec2c8d48021</guid>
<pubDate>Wed, 14 Jun 2023 13:52:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>primeretailservices.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c393c61c735867feef0733d214610ec7fb76428afedaea81f572746296c09326</i><br /><br />Threat actor <b>description</b>: <i>Prime Retail Services began providing retail fixture installations and décor in 2003 and gradually expanded its portfolio to include retail construction. In our years of experience, we’ve worked with all kinds of retailers–large, small, super stores,...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>prioritydispatch.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8337</link>
<guid>4c12343400ce0c1454ad4bc3860602b9</guid>
<pubDate>Wed, 14 Jun 2023 08:55:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>prioritydispatch.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c554d9b3ee5769a5693db0b331a3a5105aad225d6d8cba13d032111e007dc7fc</i><br /><br />Threat actor <b>description</b>: <i>Priority Dispatch supports emergency dispatch centers around the world with the technology, tools, and training required to meet the needs of all types of dispatch environments. Databases that include complete information about requests, clients, the...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bunker-Hill-Community-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8336</link>
<guid>32b683d9d8e73d3eeb6bf08fe0817402</guid>
<pubDate>Wed, 14 Jun 2023 00:05:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Bunker-Hill-Community-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad05f2e142f6faa938c450fb8001584e51467582c9bfb45ec5f28c4ad79c3c5c</i><br /><br />Threat actor <b>description</b>: <i>Bunker Hill Community College (BHCC), located in Boston, Massachusetts, is the largest community college in Massachusetts, with 13,000 students enrolled per semester.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hemenway-Financial-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8331</link>
<guid>076ccd93ad68be51f23707988e934906</guid>
<pubDate>Tue, 13 Jun 2023 23:03:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Hemenway-Financial-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>14fed0f7edb17c4e45a5da5b0d128bdbc7e5c302afa1ac0ad8e994f6f7d0ee15</i><br /><br />Threat actor <b>description</b>: <i>Since 1986, Hemenway Associates, Inc. has provided a comprehensive offering of wealth management, tax, and accounting services to clients throughout Omaha, Nebraska and its surrounding cities. Our firm was founded by Joseph Hemenway with the desire to serve the extensive tax and accounting needs of</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>MCNA-Dental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8332</link>
<guid>2b515e2bdd63b7f034269ad747c93a42</guid>
<pubDate>Tue, 13 Jun 2023 23:02:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>MCNA-Dental</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ff9e15304e7349449640c0d22ae58112a3c779899d36f6a130e6458ea7b2e10</i><br /><br />Threat actor <b>description</b>: <i>MCNA is dedicated to promoting high-quality and cost-effective oral health by increasing access to dental care for the public. Our network of dentists and oral health specialists is comprised of fully credentialed independent providers dedicated to superb clinical outcomes..</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>TF-AMD-Microelectronics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8333</link>
<guid>b8ffa41d4e492f0fad2f13e29e1762eb</guid>
<pubDate>Tue, 13 Jun 2023 23:02:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>TF-AMD-Microelectronics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2027495efd909ef4bc921989fd4b59280c5ddf7a941a7a6a4bda0138e764aaf5</i><br /><br />Threat actor <b>description</b>: <i>Die Prep Services Final Test Wafer Sort Flip Chip TF AMD Penang is Flip Chip power house that offers various packages of Assembly and Test including FCBGA, FCPGA & FCLGA. We are advanced technology factory with world class team, advanced infrastructure and automation capabilities.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jeff-Wyler-Automotive-Family-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8326</link>
<guid>19e21d13715b9720d8c00977145f1dd8</guid>
<pubDate>Tue, 13 Jun 2023 15:56:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Jeff-Wyler-Automotive-Family-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>970679e1967624d9cbe1129945ad4cdfd4cbe7cfbe43a4fa7dec944574cb77cb</i><br /><br />Threat actor <b>description</b>: <i>When you're looking for a new car or need to have your car serviced, come visit Jeff Wyler, one of the top rated car dealers in Ohio, Kentucky, and Indiana.  Whether you are looking to buy a new or used vehicle in Cincinnati, Dayton, Columbus or Louisville, need to have service completed on your vehicle, need auto parts and accessories, or body work that needs attention... You can trust your decision when you choose any one of our Jeff Wyler Dealerships. Our dealership reviews and testimonials attest to our long standing reputation, and we invite you to join the Jeff Wyler Family dealerships.https://wyler.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>gslelectric.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8324</link>
<guid>e5fc3b8d9510b02e42361c337597d9fa</guid>
<pubDate>Tue, 13 Jun 2023 12:51:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>gslelectric.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c94b2dd2ed990c3d4e006411ace418d098d32576fee9caa81dd7518561949a1</i><br /><br />Threat actor <b>description</b>: <i>GSL performs on a diverse range of project types for both public and private clients—including commercial, industrial, institutional, manufacturing, site utility, and power line-substation projects. GSL Electric’s expertise in pre-construction, value...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>rammutual.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8325</link>
<guid>4be49c79f233b4f4070794825c323733</guid>
<pubDate>Tue, 13 Jun 2023 12:51:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>rammutual.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff1d4a9a2081d555eae4db1178c9524b5ec48be3a1e39999b269d6337d0b3a47</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1931 by a group of Minnesota township mutuals, RAM Mutual Insurance Company is proud to be the leading reinsurer to the Minnesota township mutual industry. Offering a full line of personal and commercial lines products.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>eriematerials.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8323</link>
<guid>d882050bb9eeba930974f596931be527</guid>
<pubDate>Tue, 13 Jun 2023 11:57:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>eriematerials.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c631b9d8999b4c7e11a49aef3878f6f9026c549c442e883d0ec6d0cf2fe95e56</i><br /><br />Threat actor <b>description</b>: <i>Established in 1973, Erie Materials distributes building materials, such as roofing, siding, windows, doors, decking, manufactured stone veneer and gutters, for residential and commercial exteriors. It serves professional contractors and architects.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>ai-thermal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8318</link>
<guid>3fe230348e9a12c13120749e3f9fa4cd</guid>
<pubDate>Mon, 12 Jun 2023 19:56:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ai-thermal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8335f7e16340b4263b0c70c1cfa4b8af558b22f131b9e0f36f922c3d410174e2</i><br /><br />Threat actor <b>description</b>: <i>Air International was founded in Australia in 1967 by Owen John, after he built an air conditioner for his own Jaguar and discovered the demand for it among other luxury car owners.Since then, we have grown all over the world. We run lean manufactu...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>CASTEC-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8315</link>
<guid>68881d2246abebc3aa474b51ecd7773e</guid>
<pubDate>Mon, 12 Jun 2023 15:37:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>noescape</b> claims attack for <b>CASTEC-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e80739302c35c87cd954c9b1a751b9052721fd0cd893679df2b09fbad0b83e69</i><br /><br />Threat actor <b>description</b>: <i>If the company is not going to cooperate, then soon everyone will be able to see valuable company data in the data leak, such as tax documents and much more.</i><br />Target victim <b>website</b>: <i>https://www.castec.com</i>]]></description>
<category>noescape</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stant</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8312</link>
<guid>e046ede63264b10130007afca077877f</guid>
<pubDate>Mon, 12 Jun 2023 15:07:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>Stant</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>98057e7ea99b37b8f733600e858cc33ea4d017610f6324084e21eb310d849b90</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1898 and headquartered in Connersville, Indiana, Stant Corporation is a global supplier of vapor management systems, fuel delivery systems, thermal management systems and engineering services.</i><br />Target victim <b>website</b>: <i>https://www.stant.com</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>MARJAM-Supply-company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8313</link>
<guid>bf2fe6582ed9ead9161a3d6f6b1d6858</guid>
<pubDate>Mon, 12 Jun 2023 15:06:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blacksuit</b> claims attack for <b>MARJAM-Supply-company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0686172659d0064ce328ea30f09e4d08eda36fb5ff20715ba89c5471947c08c8</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1979, Marjam Supply started with the purchase of a warehouse in Greenpoint, Brooklyn and a few thousand dollars in assets.</i><br />Target victim <b>website</b>: <i>https://marjam.com/</i>]]></description>
<category>blacksuit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hill-AeroSystems-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8310</link>
<guid>85ef8e895264ae2dcab7bcd0f04d9bea</guid>
<pubDate>Mon, 12 Jun 2023 13:53:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Hill-AeroSystems-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a318bf77f11b2e31bcd9680b211a541e5fc101fe59182577d9d6117e1b2a3ec</i><br /><br />Threat actor <b>description</b>: <i>Hill AeroSystems Inc. has been in business since 1970. We are a dedicated Aerospace parts and assemblies producer, offering an extremely diverse manufacturing facility, combining state of the art equipment, in addition to many older manufacturing methodologies supporting aging aircraft fleets. Hill AeroSystems has a strong history of committed support of both in and out of production airframes, both Military and Commercial. Hill specializes in difficult to produce assemblies with specific focus on adding value for our customers with a true commitment to teaming.SITE: www.hillaerosystems.com Address  Hill AeroSystems Inc 911 Battersby Ave. Enumclaw, WA 98022</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Regal-West-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8311</link>
<guid>1f5f6ad95cc908a20bb7e30ee28a5958</guid>
<pubDate>Mon, 12 Jun 2023 13:52:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Regal-West-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f8cc42ce0276df3262c0ade5603faf1720b457cf08545d41b8de6eb2942712b</i><br /><br />Threat actor <b>description</b>: <i>Regal West Corporation provides asset-based third party logistics services. The company provides distribution, warehousing, cross docking, transportation, retail compliance and consolidation, reverse logistics, and product recall services.SITE: www.regallogistics.com Address  6500 26th St E, Fife Washington, 98424 United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Paris-High-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8309</link>
<guid>1aa7a8773e6a7fdacbcedf9999009a38</guid>
<pubDate>Mon, 12 Jun 2023 06:58:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Paris-High-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f0bb51a37df50adc5a851e4df345028b4ef93230d0a4dda8edbec2f0a6ad3d80</i><br /><br />Threat actor <b>description</b>: <i>Paris High School Paris High School is a learning community dedicated to developing well-rounded, productive, engaged citizens in a safe and supportive environment.    More</i><br />Target victim <b>website</b>: <i>https://www.pchs.k12.il.us/</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Northeastern-State-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8308</link>
<guid>79e3eb7e992b7f766bdd77cc502ff082</guid>
<pubDate>Mon, 12 Jun 2023 05:00:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Northeastern-State-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3dc63508e94a1314ed26edef9b52e74c05e127c639175973306ebe5a3ad7e7b4</i><br /><br />Threat actor <b>description</b>: <i>Northeastern State University Northeastern State University is a public university with its main campus in Tahlequah, Oklahoma.    More</i><br />Target victim <b>website</b>: <i>https://www.nsuok.edu/</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ueno-Periodontics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8306</link>
<guid>7fc9fd4c6654dea5be92c8ffd53bea1e</guid>
<pubDate>Sun, 11 Jun 2023 23:53:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Ueno-Periodontics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1e91b8f1fbc3419d549121451686a30868ddfa3b461fd453e29a80e27a1e0d8</i><br /><br />Threat actor <b>description</b>: <i>Ueno Periodontics is a dental office that offers high-tech and high-care services, such as gum disease treatment, gum surgery, tooth extraction, dental implants, IV sedation and other periodontal procedures  Phone Number (408) 215-1460</i><br />Target victim <b>website</b>: <i>https://www.uenodentalcenter.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tachi-S-Engineering-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8298</link>
<guid>f7b6bc883be91f56eb248d72de4d2847</guid>
<pubDate>Sun, 11 Jun 2023 11:03:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Tachi-S-Engineering-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>799db2e4376a5b1910c68f999349c93603b5fcf36b70812f7db068c0228459bc</i><br /><br />Threat actor <b>description</b>: <i>Global Seat System CreatorAt Tachi-S, we help automotive manufacturers launch their cars, trucks and SUVs by designing, developing, testing and manufacturing high-quality automotive seats that are functional, safe, stylish and most importantly comfortable.Each year, Tachi-S delivers over 3 million complete automotive seats and over 4 million seat components to the global automotive market. Our success is based on being responsive, flexible and easy to work with to help assure that every automotive seating program is completed on-time, on-budget and delivered with high quality. That’s how we do business…and that’s why we have been a continuously selected company in the automotive industry.</i><br />Target victim <b>website</b>: <i>http://www.tachi-s.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>HCI.EDU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8292</link>
<guid>d6b5b6924f7f8118104cd3e3921deeac</guid>
<pubDate>Sat, 10 Jun 2023 21:55:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HCI.EDU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e3f1e1287842bd3725542f3a53b5561afb14b103213af52291b1a0eb6dcfdb1</i><br /><br />Threat actor <b>description</b>: <i>HCI College - Transform Your Story</i><br />Target victim <b>website</b>: <i>https://www.HCI.EDU</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>360EQUIPMENTFINANCE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8287</link>
<guid>6120d42c7249acb7b2cfcf020bf7ab75</guid>
<pubDate>Sat, 10 Jun 2023 21:54:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>360EQUIPMENTFINANCE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba2552d8d7683855e42a2ad112e3713bc78cddca13a2cc0020c5fd7d2db2e529</i><br /><br />Threat actor <b>description</b>: <i>360 Equipment Finance in Austin, Texas</i><br />Target victim <b>website</b>: <i>https://www.360EQUIPMENTFINANCE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PRECISIONMEDICALBILLING.NET</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8288</link>
<guid>e7532dbeff7ef901f2e70daacb3f452d</guid>
<pubDate>Sat, 10 Jun 2023 21:54:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PRECISIONMEDICALBILLING.NET</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1efbfc7cdce657df0c61aa918d8845d1b8f54f898730b4b168d94191a01b3e6b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.PRECISIONMEDICALBILLING.NET</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MegaCorp-One</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8285</link>
<guid>af94ed0d6f5acc95f97170e3685f16c0</guid>
<pubDate>Sat, 10 Jun 2023 16:58:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>la_piovra</b> claims attack for <b>MegaCorp-One</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aef5f9d13a748dcb3ce02d4797b161f5fc4cb40e43e0bf54b39cfe928c146918</i><br /><br />Threat actor <b>description</b>: <i>In case you were wondering how we did it, your entire website code is on github!!!!  A look on the code, a vuln here and there, and voila, all your files are now encrypted. We will start releasing other proprietary data that we copied. You have 2 days to pay!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>la_piovra</category>
</item>
<item xmlns:dc='ns:1'>
<title>wsisd.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8278</link>
<guid>0a3b5a7a477d359746061d41c3a04fd6</guid>
<pubDate>Fri, 09 Jun 2023 17:55:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>wsisd.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca9f96a01c8e45de76f28be41b263ec4261fb8e99ec44a2a544b9046e900f5e9</i><br /><br />Threat actor <b>description</b>: <i>White Settlement Independent School District</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Caruso</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8280</link>
<guid>77932c2c6056e219e26efd74accb7985</guid>
<pubDate>Fri, 09 Jun 2023 17:54:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Caruso</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7cf5f35e9ec3345e05d3f5ae1f7cd13cd5597ebbf8e1b91113c1d43b7d7084cf</i><br /><br />Threat actor <b>description</b>: <i>Caruso is a real estate development and hospitality company headquartered in LA. We almost ready to share their internal documentsthat include full employee data, very detailed accounting information, contracts, confidential documents and even funny incidentswith guests.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Columbus-Regional-Healthcare-System-US</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8275</link>
<guid>1543ceff58b1606182e9b7cf357712b3</guid>
<pubDate>Fri, 09 Jun 2023 16:53:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>daixin</b> claims attack for <b>Columbus-Regional-Healthcare-System-US</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eefa4bcd9f2553ff7b7e714e31c5db645009b2afeb6e77224184932b4514ab10</i><br /><br />Threat actor <b>description</b>: <i>Columbus Regional Healthcare System has one of the highest volume
      and most experienced robotic surgical programs in Southeastern  North Carolina.</i><br />Target victim <b>website</b>: <i> https://crhealthcare.org/</i>]]></description>
<category>daixin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Silicon-Valley-Mechanical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8272</link>
<guid>f4beeba0dd6c190c6ac02f85e7b3691c</guid>
<pubDate>Fri, 09 Jun 2023 13:53:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Silicon-Valley-Mechanical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b24c03789a85144570f7866b53e67435e875a9579ef34c1a1d4b88d11b9e142</i><br /><br />Threat actor <b>description</b>: <i>Locally based San Jose firm, Silicon Valley Mechanical, is a full service mechanical contractor, specializing in design-build commercial HVAC, plumbing, and service / maintenance, including 24-hour emergency services. Our commitment to being industry experts, providing quality service, continuous improvement, and a collaborative culture has afforded us the ability to design and execute all our projects with the utmost success and quality.  With our 130,000 SF office and fabrication facility, our project teams are able to design, manufacture, and stage ductwork, piping, and pre-skidded equipment ready for delivery and installation. We are committed to excellence and constantly increasing efficiency by detailing and fabricating utilizing the latest 3D design and manufacturing technology; in turn allowing your project(s) to be completed within your schedule and budget.</i><br />Target victim <b>website</b>: <i>https://svminc.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Adams-County-Communication-Center-orADCOM911</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8273</link>
<guid>8462a7c229aea03dde69da754c3bbcc4</guid>
<pubDate>Fri, 09 Jun 2023 13:53:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-Adams-County-Communication-Center-orADCOM911</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>76b3ed38587b0f483b0613bbd3ef1053f7c37db8497fe52210796154dd41ef21</i><br /><br />Threat actor <b>description</b>: <i>The Adams County Communication Center, also known as ADCOM911, isa Dispatch Center located in Adams County, Colorado. To provide high-quality communication, dispatch, and data services to any who call on ADCOM for help. We are grateful to ADCOM for their high-quality services and for 40GB of their data and DBs with detailed information. Soon we will provide access to their data to any who is interested in. This organization has one of the best data services!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>PENNCREST-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8270</link>
<guid>1b486d7a5189ebe8d8c46afc64b0d1b4</guid>
<pubDate>Fri, 09 Jun 2023 11:58:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>PENNCREST-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b55b60fc6d16059e85ba47da5c67c002c0799004483de22b9a51cc818d48158f</i><br /><br />Threat actor <b>description</b>: <i>PENNCREST School District provides resources and opportunities that challenge students, assess their educational progress, provide a system of support and empower all to become confident lifelong learners. This organization like many other does not hold student information in safe. We are going to upload everything we got from them here soon. Personal information of students and employees as well as schools' financial data are pretty detailed. Everything is of 164GB.Stay in touch!</i><br />Target victim <b>website</b>: <i>http://www.penncrest.org</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kramer-Enterprises</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8268</link>
<guid>46a4378f835dc8040c8057beb6a2da52</guid>
<pubDate>Fri, 09 Jun 2023 07:56:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Kramer-Enterprises</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9984a55b125e6c6152d27301c39f48aea2f684c8d58cf89ba3aad04f01a9baf4</i><br /><br />Threat actor <b>description</b>: <i>Kramer Enterprises was founded in 1999, provides services in Southern Wisconsin for the construction of flat surfaces and specializes in stamped and colored decorative concrete. The company's clients include Fort Atkinson, Jefferson, Whitewater, Watertown, Janesville, Cambridge and surrounding areas.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aeliusmd-Medical-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8266</link>
<guid>0a93091da5efb0d9d5649e7f6b2ad9d7</guid>
<pubDate>Thu, 08 Jun 2023 20:53:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Aeliusmd-Medical-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>37ccc582532047bb4f46432848f5036652735360852c1e235b184842e76d6f51</i><br /><br />Threat actor <b>description</b>: <i>AeliusMD offers the tools to assist companies and individuals to meet their needs for occupational and environmental health and wellness over a broad time spectrum.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clarity-Water-Technologies-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8262</link>
<guid>35bf98501edec1431e0c2fabe948da66</guid>
<pubDate>Thu, 08 Jun 2023 10:00:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Clarity-Water-Technologies-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>67fa488e79549b2e47af44df9df37f4ca57e5500c822b84f403c9e79d2989bab</i><br /><br />Threat actor <b>description</b>: <i>Clarity Water Technologies specializes in comprehensive industrial and commercial water treatment that includes expert consulting and cutting-edge chemistry, as well as a full service team to support facility needs .   Some of the data take            ...</i><br />Target victim <b>website</b>: <i>https://claritywatertech.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>RoadSafe-Traffic-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8261</link>
<guid>60cb558c40e4f18479664069d9642d5a</guid>
<pubDate>Wed, 07 Jun 2023 21:53:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>RoadSafe-Traffic-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>feec011475ee126921f02e6d5c7fa1411e845880e4bf367c7c589fed8f0d04f6</i><br /><br />Threat actor <b>description</b>: <i>RoadSafe Traffic Systems, Inc. is one of the nation’s largest provider of traffic control and pavement marking services. We also distribute high-quality, innovative and durable traffic safety products and personal protective equipment. Our slogan, “Life on the Road,” is about our dedication to work zone safety and our goal is to protect the motoring public, pedestrians and workers. Contact us today for help with your next project. RoadSafe Traffic Systems is the nation’s leading provider of comprehensive roadway safety services and products nationally. RoadSafe’s highly skilled and dependable workforce strives to deliver quality products and services safely, on time and profitably to cultivate and sustain long-lasting customer relationships and to create value for its employees and stakeholders.SITE: www.roadsafetraffic.com Address  N Dyer Rd & E Mallon Ave Spokane Valley, WA 99212 Cristina Acosta 971-413-4106</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>AWM-Global-Advisors</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8258</link>
<guid>10fe8dc69a0964edc16fed1a1bd55716</guid>
<pubDate>Wed, 07 Jun 2023 15:56:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>AWM-Global-Advisors</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff3028b88c3b1633bb8cc45000ded569dfdaf929f26365b316f229d87dac8e20</i><br /><br />Threat actor <b>description</b>: <i>AWM offers security backed loans and margin account lending at very competitive rates.   You'll soon see for yourself how much these guys care about the privacy of their customers and employees.</i><br />Target victim <b>website</b>: <i>https://awmga.com/</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>worldlearning.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8256</link>
<guid>ce2b9a26bddc32cba5af69372ee14c00</guid>
<pubDate>Wed, 07 Jun 2023 15:50:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>worldlearning.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29a119ca1b172bf90edb8cac8fa291e913d8559e677af092d860353e92ee322f</i><br /><br />Threat actor <b>description</b>: <i>World Learning is international organization that focuses on international development, education, and exchange programs. Based in Brattleboro, Vermont, World Learning "unlocks the potential of people to address critical global issues" through its co...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>COOPERATIVETECH</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8254</link>
<guid>122e27d57ae8ecb37f3f1da67abb33cb</guid>
<pubDate>Wed, 07 Jun 2023 13:51:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>darkrace</b> claims attack for <b>COOPERATIVETECH</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>675eebadb2c990e0b9f6281996e0f8baad6b5885e6bb4d9b7e55fc13ab539d26</i><br /><br />Threat actor <b>description</b>: <i>Cooperative Technologies delivers proven, industry specific standards-based software that helps organizations cut operational overhead costs and improve customer service. Platform-independent customizable software solutions keep carriers in charge of their funds, reducing risk while staying on top of industry trends. Insurance and financial carriers depend upon our list bill reconciliation and 1035 exchange solutions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>darkrace</category>
</item>
<item xmlns:dc='ns:1'>
<title>newhorizonsmedical.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8253</link>
<guid>33beffd09a1b020d1187c6b4b264014a</guid>
<pubDate>Wed, 07 Jun 2023 11:52:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>newhorizonsmedical.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cf301f66857521e6d020c0473e75c16afbf62a8521c7895ab726b6eb0d2d5aab</i><br /><br />Threat actor <b>description</b>: <i>The mission of New Horizons Medical is to provide patients with compassionate, comprehensive, and evidence-based treatments for substance use disorders and psychiatric diagnoses. Each and every patient is treated as an individual with distinctive req...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>aluminumsandcastingsfoundry.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8252</link>
<guid>88b057334964aecf7cc034c38011add0</guid>
<pubDate>Wed, 07 Jun 2023 10:53:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>aluminumsandcastingsfoundry.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b60a44b0921becf7be4bfeacc478eb30698285a0e8d35c11fbc92c88efd1593a</i><br /><br />Threat actor <b>description</b>: <i>With satisfied customers all over North America, Mahoney Foundries supplies raw, fully machined, aluminum and brass castings for many applications. Since opening our doors in 1972, we've acquired a reputation for unrivalled service, quality, integrit...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>realcomp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8251</link>
<guid>c8ecfaea0b7e3aa83b017a786d53b9e8</guid>
<pubDate>Wed, 07 Jun 2023 04:53:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>realcomp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e222ff3a6d0d61c47dfacf8ec2aedac714a76479c9359dbda686b6563b1c3c40</i><br /><br />Threat actor <b>description</b>: <i>Realcomp II Ltd. is proud to be Michigan’s largest Multiple Listing Service delivering cutting-edge, real-time MLS data services, support, & training to the real estate industry.Our Mission Statement:Driven by integrity, Realcomp delivers great...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>billhurst.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8250</link>
<guid>b0d336331ae52d66769bb655c37032c6</guid>
<pubDate>Wed, 07 Jun 2023 04:40:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>billhurst.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ced347b8b6a9fcc7698754ccf008f5b996c2da570a68836593f3e8f9ea57b4bf</i><br /><br />Threat actor <b>description</b>: <i>William Hurst Of Counsel Bill has represented thousands of injured Hoosiers in his 40+ year career and recovered millions for his personal injury clients.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>newarka.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8249</link>
<guid>4f6312fa44a894eab0d022fce42592bf</guid>
<pubDate>Wed, 07 Jun 2023 02:52:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>newarka.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e4cfbc14877936bd06fbb50d5ce157bcbe1f6b71b61ff0aac66ec8455fb2b559</i><br /><br />Threat actor <b>description</b>: <i>Newark Academy is a private day school for grades 6 through 12, offering both the IB program and AP courses</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>PONDCO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8248</link>
<guid>51d1cd3a02276948f566e6ea0a7d78cb</guid>
<pubDate>Tue, 06 Jun 2023 22:42:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>PONDCO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>31d29501fb894f4d84adbc14f67fd7e664b01f63db99ac7f436bacd2bb88306c</i><br /><br />Threat actor <b>description</b>: <i>Pond is a progressive, full-service architecture, engineering, planning and construction management firm, providing quality services to government, corporate and private sector clients throughout the world. We help clients achieve their missions by being Responsive People and Real Partners.</i><br />Target victim <b>website</b>: <i>https://www.pondco.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>pittsburg.k12.ca.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8246</link>
<guid>d40d35b3063c11244fbf38e9b55074be</guid>
<pubDate>Tue, 06 Jun 2023 21:53:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>pittsburg.k12.ca.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b0811109fa67a1a63d3f09ec1fbbf4bf7bf2325c961ceca030cb7844b083b330</i><br /><br />Threat actor <b>description</b>: <i>Pittsburg Unified School District is a public school district based in Contra Costa County, California, United States.usd250.k12.ks.us\sql_admin:PeekABoo</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Public-Health-Management-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8243</link>
<guid>cacad2aec9f4371413f91805dcea928e</guid>
<pubDate>Tue, 06 Jun 2023 21:00:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trigona</b> claims attack for <b>Public-Health-Management-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>904d0a1329ab62f64222a304ae1f6c579f2b3a12e8d9deefbb5772548f769674</i><br /><br />Threat actor <b>description</b>: <i>Public Health Management Corporation (PHMC) is a non-profit organisation providing public health services in Philadelphia, Pennsylvania. It was established in 1972 and has since served as a leading provider of comprehensive health and human services to individuals, families, and communities in the area.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>trigona</category>
</item>
<item xmlns:dc='ns:1'>
<title>birdair.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8241</link>
<guid>1e00746ce7635c403c2d4f9767893f00</guid>
<pubDate>Tue, 06 Jun 2023 20:56:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>birdair.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8481653bedf57c8638f4c22db88df877a526b4cfedee46588c6b7f210a0a940</i><br /><br />Threat actor <b>description</b>: <i>Birdair is the leading specialty contractor for custom tensile fabric structures throughout the world.With more than 65 years of experience, Birdair has worked with owners, architects, engineers and contractors to design and build custom tensile...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>fredfeet.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8238</link>
<guid>b060700f0a542a147685180b143ad61e</guid>
<pubDate>Tue, 06 Jun 2023 17:53:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>fredfeet.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8c447557c7ee282c1b92deb718926b0f1587f0b973622752feb24f72ceb6fb83</i><br /><br />Threat actor <b>description</b>: <i>Fredericksburg Foot & Ankle Center are board-certified podiatrists in Fredericksburg, VA. Our doctors diagnose & treat all sports injuries & trauma injuries</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Asakura-Robinson</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8236</link>
<guid>c81e155d85dae5430a8cee6f2242e82c</guid>
<pubDate>Tue, 06 Jun 2023 16:53:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Asakura-Robinson</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38013dcd6d8577c148b403d899af4be62063f2f502990224781f3afcdbf8d4b4</i><br /><br />Threat actor <b>description</b>: <i>Asakura Robinson is a planning, urban design, and landscape architecture firm which strengthens environments and positively impacts communities through innovation, engagement, stewardship, and anintegrated design process. If their IT guy keep on stalling, youwill see their internal secrets soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>WTI---Western-Telematic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8237</link>
<guid>7dd2ae7db7d18ee7c9425e38df1af5e2</guid>
<pubDate>Tue, 06 Jun 2023 16:53:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>WTI---Western-Telematic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>84a231eead304d3171cafba64716fd27400baa6bcac7f357bb997574abc9cdb8</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1964 by an engineer with a vision, WTI started with a desire to improve computer transmissions over phone lines and help corporations solve problems for the most advanced computing systems in the world. WTI has been at the forefront of the data communications and computer networking industries ever since the Carterfone decision. We will show you their Accounting, CEO docs, HR,Insurance, IT, NDAs, Product Testing, SALES and much more other information. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>icae.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8230</link>
<guid>bd4a6d0563e0604510989eb8f9ff71f5</guid>
<pubDate>Tue, 06 Jun 2023 12:55:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>icae.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>25b6acb1bb1061ecb8f213111f862fc448a4a6bccfc3df9d73ecdd6d081114b4</i><br /><br />Threat actor <b>description</b>: <i>This organization primarily operates in the Computer Related Consulting Services business industry within the Business Services sector.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>PICPLUS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8221</link>
<guid>d4ca950da1d6fd954520c45ab19fef1c</guid>
<pubDate>Tue, 06 Jun 2023 09:54:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>darkrace</b> claims attack for <b>PICPLUS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8907730419c8534c7f3769d119861b0c36cc09887cdc98d2ed2fec1260102574</i><br /><br />Threat actor <b>description</b>: <i>Pictures Plus and O'Roke Photography have over 50 years of combined experience providing School, Sports, Event & Portrait photography services in the Quad-State area. We are members of the PSPA (Professional School Photographers Association) as well as PMA (Photo Marketing Associates) and have a long history of community involvement and support.  We have designed a hassle-free picture day, providing multiple photography stations to make your day run faster. We are staffed with trained and qualified personnel to ensure accuracy, quality and efficiency leading up to and on picture day. Our Customer Service cares about each and every customer. We stand by our friendly, home-town service and 100% Satisfaction Guarantee.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>darkrace</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stylish-Fabric-stylishfabric.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8219</link>
<guid>9d00670c8e26b15fdd085a04a256683c</guid>
<pubDate>Mon, 05 Jun 2023 21:51:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Stylish-Fabric-stylishfabric.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>668169e38944d5b94b1cce2bd4ddb99d5d424f9961da6d0a59b2d6f434da0f7f</i><br /><br />Threat actor <b>description</b>: <i>Stylish fabric online store is the source of the largest selection apparel and home decor fabrics. We stock lace fabrics, upholstery fabrics, drapery fabrics and offer discount and wholesale fabric prices</i><br />Target victim <b>website</b>: <i>https://www.stylishfabric.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>adstradata.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8216</link>
<guid>47f91db40efc6a22350eca5c953c4742</guid>
<pubDate>Mon, 05 Jun 2023 19:53:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>adstradata.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bd53c5205979d12f4da795936dc0c9aa0725aef551320f231c5dcda22a42a116</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1978 and headquartered in Princeton, New Jersey, Adstra is a technology solution company specializing in privacy risks and data management.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Robison-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8212</link>
<guid>9f655cc8884fda7ad6d8a6fb15cc001e</guid>
<pubDate>Mon, 05 Jun 2023 15:52:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Robison-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>308080fad2907127018174b94dfac5ea64df50b6a6074e6cb6f0cbd1e9c7246e</i><br /><br />Threat actor <b>description</b>: <i>All data here. Enjoy.  Robison Engineering is a full service MEP design firm specializing in hotels and multi-unit residential facilities.  In support of this specialty, we have a division focused on restaurants, fast food, retail, and general TI design.  These specialties are a natural fit since most hotels and multi-unit residential projects include food, retail, and general TI on the main level.</i><br />Target victim <b>website</b>: <i>http://robisonengineering.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>DK-Group-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8213</link>
<guid>0b3f44d9054402de39441e165a4bdfe0</guid>
<pubDate>Mon, 05 Jun 2023 15:52:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>DK-Group-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77593f282809544a5e3d78c4eb376d1c36d74f774af59691e9984b88b1bc9c8b</i><br /><br />Threat actor <b>description</b>: <i>D&K Group, Inc. is a leading US manufacturer of quality print finishing solutions. All D&K products are made in the USA including thermal extrusion and pressure sensitive (cold) laminating films and adhesives, wide format and desktop laminators, automated one or two sided high-speed laminating systems, and much more.</i><br />Target victim <b>website</b>: <i>https://dkgroup.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Malt-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8210</link>
<guid>2c463dfdde588f3bfc60d53118c10d6b</guid>
<pubDate>Mon, 05 Jun 2023 14:49:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Malt-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>581c8bfd4a8ce6a09fb175ffb6e88647171e8406dca1a63684a3f2bbc6567e06</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1957, Malt Products Corporation is a family-owned business that produces and provides minimally processed, nutritious sweeteners for leading food and beverage manufacturers. We hold their accounting, financial and operational documentation, lots of passports, driver licenses and other personal information that we're happy to share with you shortly. Stay tuned.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Beacon-ABA-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8209</link>
<guid>77ae1a5da3b68dc65a9d1648242a29a7</guid>
<pubDate>Mon, 05 Jun 2023 13:48:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>Beacon-ABA-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>13d64f71f77621abfe5c663fcba185ff4682b0f8fca79377262b34626a311b97</i><br /><br />Threat actor <b>description</b>: <i>Beacon ABA Services, Inc. is a private group practice of behavior analysts and behavioral therapists organized to provide intensive behavioral services to individuals with developmental disabilities. The company lost it's data of 80GB. We have their detailed finance and accounting information. Numerous contracts, client data, full employees information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>etships.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8208</link>
<guid>342c472b95d00421be10e9512b532866</guid>
<pubDate>Mon, 05 Jun 2023 12:45:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>etships.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1fede7155449da6c7ea5c9b3c78d4632942b58c9a9bd34a4ac4cf576a60cf97b</i><br /><br />Threat actor <b>description</b>: <i>Specializing in expedite, rush-critical, and time-sensitive freight, our fleet of tractors, straight trucks, and sprinters are always on standby.Specializing in expedite, rush-critical, and time-sensitive freight, our fleet of tractors, straight...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mount-Desert-Island-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8201</link>
<guid>c61aed648da48aa3893fb3eaadd88a7f</guid>
<pubDate>Mon, 05 Jun 2023 01:55:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Mount-Desert-Island-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>668fb1f5d98b03bc203b7e9e7d64ada736a7158562597483701d8bcb7e7952f3</i><br /><br />Threat actor <b>description</b>: <i>Mount Desert Island Hospital serves a close-knit island and surrounding communities through a 25-bed critical access facility in Bar Harbor and a network of area health centers—all designed to provide comprehensive healthcare for residents and visitors.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ascentia-Group-Pty-Ltd</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8198</link>
<guid>28f248e9279ac845995c4e9f8af35c2b</guid>
<pubDate>Sun, 04 Jun 2023 22:58:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Ascentia-Group-Pty-Ltd</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b62cfd1039be029b00870cd92ca18d613ff7e3b8f97f70063291486a3b5fe63</i><br /><br />Threat actor <b>description</b>: <i>Ascentia is a independent Civil Engineering Contracting company that services the Defence, Civil Infrastructure Construction and the Oil & Gas Industries.   The data taken from the company's servers is shown below.</i><br />Target victim <b>website</b>: <i>https://ascentia.us</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>uhsp.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8196</link>
<guid>cc02d42b8939768b8a4f1e4d826faa79</guid>
<pubDate>Sun, 04 Jun 2023 16:44:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>uhsp.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b3a46957e9535ba8f0b8c4f12db4637ffefadad9213740c191fc2231d4c1d76e</i><br /><br />Threat actor <b>description</b>: <i>UHSP is the nation's third leading private college of pharmacy for NIH grants. 96%. RECEIVE FINANCIAL AID</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Conley--Wirick-P.A.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8195</link>
<guid>3c88c1db16b9523b4dcdcd572aa1e16a</guid>
<pubDate>Sun, 04 Jun 2023 12:57:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Conley--Wirick-P.A.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>51eb1121792ac5b5c99eab326f7dfd4be348a1c05e611adcce67e20c7672f549</i><br /><br />Threat actor <b>description</b>: <i>Conley & Wirick, P.A. has served the communities of Bath and Midcoast Maine for more than forty years, and today our attorneys are still committed to serving the people of our community and solving their problems.  Lawyers always like to th            ...</i><br />Target victim <b>website</b>: <i>https://conleywirick.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Share-and-Harris</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8194</link>
<guid>90b8e8eca90756905bf80c293ae6a50a</guid>
<pubDate>Sun, 04 Jun 2023 07:56:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>mallox</b> claims attack for <b>Share-and-Harris</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47b7e698192e37f81da2076adda2425e382406f34bf0bf1d93c5802eca2cb17c</i><br /><br />Threat actor <b>description</b>: <i>INFO: https://www.zoominfo.com/c/share-harris-llc/410899856  DATA: https://anonfiles.com/D8nfa0v0zd/ShareHarris_rar PASSWORD:  (Oa+VB;~5k5S1W,LW8!P#6d31v8IZ%Jk </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>mallox</category>
</item>
<item xmlns:dc='ns:1'>
<title>goldcreekfoods</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8186</link>
<guid>2051bd70fc110a2208bdbd4a743e7f79</guid>
<pubDate>Sat, 03 Jun 2023 07:56:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusalocker</b> claims attack for <b>goldcreekfoods</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>987ef6788d19eb4c0ad8f2a19fb81c37ca1fdf039383be6ba334d47639e193d2</i><br /><br />Threat actor <b>description</b>: <i>DescriptionClient Case – agreement – email(.msg) – and other documents Price: 160000$ Three copies will be sold, confidential informationThe company failed to take care of the data leak and therefore ,many contracts and other documents have been leaked to the Internet.We are also going to provide any documents related to the aforementioned company if any… Continue reading goldcreekfoods</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusalocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>hwrpc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8188</link>
<guid>62161512d8b1b5db826778917e974b21</guid>
<pubDate>Sat, 03 Jun 2023 07:55:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusalocker</b> claims attack for <b>hwrpc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>066a98c940b58326dc348b063a898111cc1243f0082b303976b0c9ba9b773678</i><br /><br />Threat actor <b>description</b>: <i>DescriptionClient Case – agreement – email(.msg)- and other documents Price: 160000$ Three copies will be sold, confidential informationThe company failed to take care of the data leak and therefore ,many contracts and other documents have been leaked to the Internet.Other: many death certificates, contracts, agreements and other bank checks, we will sell everything in one… Continue reading hwrpc.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusalocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>tristatefabricatorsinc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8179</link>
<guid>b45232282ea62bfccffbd5350317e7e2</guid>
<pubDate>Sat, 03 Jun 2023 07:54:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusalocker</b> claims attack for <b>tristatefabricatorsinc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cbbc332cd481a5e14859f98c1a9af35342c9fcf7a752b378f9af0b80e80bb4d3</i><br /><br />Threat actor <b>description</b>: <i>The whole server with data, with drawings, clients and .msg letters is on sale. Includes access to file server</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusalocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tension-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8183</link>
<guid>83462e22a65e7e34975bbf2b639333ec</guid>
<pubDate>Sat, 03 Jun 2023 07:51:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Tension-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cf628a7f86c919e00d2bcc6a6a3928b5c114ff3bf1b2865cffcb4a482616c1af</i><br /><br />Threat actor <b>description</b>: <i>The Tension Corporation is a privately held and operated company based in Kansas City, Missouri, it is a global leader in envelope, printed product, packaging and packaging automation solutions. Tension manufactures billions of envelopes annually and their envelope and printed products division serve a variety of industries, including third-party billing, financial, insurance and direct marketing.  After a long negotiation process management of Tension Corporation offered only $55,000 to protect their sensitive data with total volume over 200gb which contains employee's personal data, company's financial data, plant's data, billing and engineering data, SQL-core and more. The price which has been asked for to protect their data was right for them, since Tension Corporation had such amount of money at their accounts. </i><br />Target victim <b>website</b>: <i>https://www.tension.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Young-Homes-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8176</link>
<guid>a894b83c9b7a00dba6c52cecf7a31fbb</guid>
<pubDate>Sat, 03 Jun 2023 03:56:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>mallox</b> claims attack for <b>Young-Homes-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>438b106daad07577fb9de58210fb18f64377aff4b453df7c569a28d197fb0587</i><br /><br />Threat actor <b>description</b>: <i>INFO: https://www.zoominfo.com/c/young-homes-inc/134103843  DATA: https://anonfiles.com/8d12Yfudzf/Yhomes_rar PASSWORD: Vzha#FhkRRm=-h&Xw07lmVXPUe5H,K;# </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>mallox</category>
</item>
<item xmlns:dc='ns:1'>
<title>ServiceKing--CrashChampions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8172</link>
<guid>86f2fbb60fb7b50c94009182fb4edcdd</guid>
<pubDate>Fri, 02 Jun 2023 22:36:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>ServiceKing--CrashChampions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>10541aed2e6bfd89720d7c577ed5af5041edcc9ffd0e7f5f1bad73e4eaf81d5e</i><br /><br />Threat actor <b>description</b>: <i>Service King Collision Repair is a national automotive collision repair company. It was founded in 1976 by Eddie Lennox in Dallas, Texas. Service King is one of largest providers of collision repair services in Texas and the United States.   Number of locations 335 locations Industry	Auto repair service  Crash Champions is Merging with Service King July 21, 2022 After months of speculation about the future of Service King, a blockbuster merger was announced to Service King managers last Friday. The two consolidators will merge and create a 550+ shop operation with upwards of $2 billion in annualized sales.  Service King is now Crash Champions. In a move that joins two iconic collision repair brands, Service King Collision has officially joined the Crash Champions collision  ********************</i><br />Target victim <b>website</b>: <i>https://serviceking.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>packageconcepts.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8171</link>
<guid>594ca7adb3277c51a998252e2d4c906e</guid>
<pubDate>Fri, 02 Jun 2023 19:59:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>packageconcepts.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>83d73ef78c93be24aa411ff50d027c862e6a3a4a29ac23d15a2a291a185bc78e</i><br /><br />Threat actor <b>description</b>: <i>Package Concepts and Materials, Inc. opened for business in 1980 with the goal of bringing a new standard of innovation and excellence to the food packaging industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>harwoodlloyd.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8170</link>
<guid>c37f9e1283cbd4a6edfd778fc8b1c652</guid>
<pubDate>Fri, 02 Jun 2023 18:35:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>harwoodlloyd.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b263c0daa7a89ab35bff7d0176733b0eb572c1275425b0c24445b15f528f5ca</i><br /><br />Threat actor <b>description</b>: <i>Harwood Lloyd, LLC is a full-service law firm that proudly serves international, national, regional, and individual clients, offering the personal attention and service of a boutique with the experience and quality of a large national firm.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>shakeys.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8169</link>
<guid>1a32df83ac6be75b6907fe885465b7a9</guid>
<pubDate>Fri, 02 Jun 2023 16:41:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>shakeys.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>71f9277edbea07ac9965ef9c9e2016d8c1ca7e3346de75738411882bf8a85b1c</i><br /><br />Threat actor <b>description</b>: <i>Shakey's USA is a restaurant chain of pizza parlors headquartered in Alhambra, California. They have been established since 1954 and have been providing the same pizza recipes over all the years.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>JPW-Industries-jpwindustries.com--Baileigh-Industrial-baileigh.com--With-SpaceX-Data</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8167</link>
<guid>feb93033a7ab04ea442b08103ec019a4</guid>
<pubDate>Fri, 02 Jun 2023 10:40:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>JPW-Industries-jpwindustries.com--Baileigh-Industrial-baileigh.com--With-SpaceX-Data</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a7d96ff1ec066094f9655c7338b58713b28bce496c3b2af9ccd6ee6962e6b83</i><br /><br />Threat actor <b>description</b>: <i>JPW Industries produces and sells tools and equipment for metalworking, woodworking, and welding.   Baileigh Industrial is a company that specializes in manufacturing and distributing metalworking and woodworking equipment.</i><br />Target victim <b>website</b>: <i>jpwindustries.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Buffalo-Niagara-Association</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8158</link>
<guid>7ae26cbe9586dea7d1f0fa372aa86811</guid>
<pubDate>Fri, 02 Jun 2023 01:56:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Buffalo-Niagara-Association</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e760ad8dc8468d432fb722ea25a513f3fd103f5e5832b4227497e628b26cdd1a</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.bnar.org</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chadwick-Washington-Moriarty-Elmore--Bunn</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8151</link>
<guid>debe236f3c30658190a8fe363a2b5cc0</guid>
<pubDate>Thu, 01 Jun 2023 22:53:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Chadwick-Washington-Moriarty-Elmore--Bunn</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5316b10b421c725b7a18eb8a7b8a8f81be23849863ad1e62e5a47a1acdabde00</i><br /><br />Threat actor <b>description</b>: <i>Chadwick Washington's attorneys work with community managers to help establish and promote efficient working relationships with association boards.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>TY-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8154</link>
<guid>d627f44819e0cdb235a1ba10dc32df2e</guid>
<pubDate>Thu, 01 Jun 2023 22:53:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>TY-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ef476fdf39bb29033ee970d980c0fb95a05e5c70b62d900ebecc1e6cda81fa2c</i><br /><br />Threat actor <b>description</b>: <i>Ty Inc is a manufacturer and seller of stuffed animal toys. The company is headquartered in Oak Brook.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Middlesex-County-Public-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8142</link>
<guid>4b5b81483048c8942ed00caaa17b9535</guid>
<pubDate>Thu, 01 Jun 2023 16:51:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Middlesex-County-Public-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8e0a438bdd45471df04ce4493f3476fc5f38d6bf9c5837f7015f90ce72b8133</i><br /><br />Threat actor <b>description</b>: <i>MCPS has been identified as a “School Division of Innovation” fordesigning and implementing alternatives to traditional instructional practices and school structures that improve student learning and promote college and career readiness, and good citizenship.Unfortunately, the School have no worries about lost 543 GB of students and teachers personal information, school projects, financial info and so on and so forth. All of this will be available for download soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pacific-Union-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8141</link>
<guid>f1de5100906f31712aaa5166689bfdf4</guid>
<pubDate>Thu, 01 Jun 2023 14:36:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trigona</b> claims attack for <b>Pacific-Union-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34ffbb84b0151c80b3253cfdf29fb4698243d9c3fcbe0f4104712e1855e2bb73</i><br /><br />Threat actor <b>description</b>: <i>Pacific Union College (PUC) is a private, Seventh-day Adventist college located in Angwin, California. It was established in 1882 and is accredited by the WASC Senior College and University Commission.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>trigona</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mission-Community-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8139</link>
<guid>e025b6279c1b88d3ec0eca6fcb6e6280</guid>
<pubDate>Thu, 01 Jun 2023 01:36:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Mission-Community-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2eab682100b734b74475ee40d61dddf943419d597836aaed6b1913a7ebea3731</i><br /><br />Threat actor <b>description</b>: <i>Mission Community Hospital (MCH) is a two-campus acute care hospital located in the San Fernando Valley. Licensed for 85 medical/surgical beds and 60 acute psychiatric beds, we provide a full range of medical, surgical, psychiatric and emergency care. MISSION COMMUNITY HOSPITAL IS PROUDLY JOINT COMMISSION ACCREDITED AND EARNS FIVE STARS FROM CMS.</i><br />Target victim <b>website</b>: <i>https://www.mchonline.org/</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>buckprop.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8136</link>
<guid>426ea2897becd89515f19117a51c49f1</guid>
<pubDate>Wed, 31 May 2023 14:35:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>buckprop.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e534ef812727ac66dbce3552f5a0d9284abb3e843e910bee877b911581f7dbab</i><br /><br />Threat actor <b>description</b>: <i>Buckingham Properties is a real estate developer and property management company located in Rochester, New York. Our diverse portfolio includes office, industrial, retail, and residential properties totaling ten million square feet, as well as 200+ a...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sur-La-Table</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8135</link>
<guid>518fc66deea9d064d0a92eb73e4ea61b</guid>
<pubDate>Wed, 31 May 2023 12:47:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Sur-La-Table</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0376cc767a0dbb831c1c3cf2a0df2049e2c9c86ab47ac538bd7768fb18738452</i><br /><br />Threat actor <b>description</b>: <i>Sur La Table Department Stores, Shopping Centers & Superstores · Washington, United States · 1,426 EmployeesHeadquarters 6100 4th Ave S 500, Seattle, Washington, 98108, United StatesPhone Number (317) 559-2041Website www.surlatable.comRevenue $674.6MSur La Table was founded in 1972 at Pike Place Market in Seattle. The company specializes in culinary tools from around the world and offers a range of cooking classes. They offer a variety of cookware, bakeware, knives, small appliances, serving ware, and other.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>nycollege.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8133</link>
<guid>7aa7b77461bd44a3f9da9984da1346fb</guid>
<pubDate>Wed, 31 May 2023 01:29:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>nycollege.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5a726e72bc4eacdedab5ed56d99c454c23706c286c041aaf78884c658e7fff5</i><br /><br />Threat actor <b>description</b>: <i>New York College of Health Professions was founded by a group of dedicated holistic health care providers more than 40 years ago and is proud of its status today as a leading institution of holistic health education and care.Through the professio...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>columbuscitizens.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8129</link>
<guid>c404a5adbf90e09631678b13b05d9d7a</guid>
<pubDate>Tue, 30 May 2023 16:44:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>columbuscitizens.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>477c6e4ec99aac3f3804e87f600bd2ae1bd008bffc16693772761c6467c242a5</i><br /><br />Threat actor <b>description</b>: <i>Columbus Citizens Foundation is a non-profit organization in New York City committed to fostering an appreciation of Italian-American heritage and achievement.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-National-Association-of-Home-Builders</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8144</link>
<guid>edf0320adc8658b25ca26be5351b6c4a</guid>
<pubDate>Tue, 30 May 2023 16:39:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-National-Association-of-Home-Builders</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>647614359bcf500e2dd6736a067f6e317f7123109fb4f89ae2a565bd0fa97bfd</i><br /><br />Threat actor <b>description</b>: <i>The National Association of Home Builders represents the largest network of craftsmen, innovators and problem solvers dedicated tobuilding and enriching communities. "Building Homes, Enriching Communities, Changing Lives" is the motto of the company. They really change lives because of a neglecting attitude to their own security, so you will be able to do whatever you want with their clients, employees and others info soon. Stay tuned.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>SK-Life-Science</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8145</link>
<guid>0c0cfd9478c6551fbfe74a7acb6fc037</guid>
<pubDate>Tue, 30 May 2023 16:39:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>SK-Life-Science</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7abba1654cd9e07531ca223542e68ac6f490c9a2227f01279beaea612475b21b</i><br /><br />Threat actor <b>description</b>: <i>SK Life Science is a subsidiary of SK Biopharmaceuticals, Co., Ltd., and a part of SK Group—a large conglomerate global corporation. SK Life Science is a CNS-focused pharmaceutical company. You will see their corporate data soon. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>McCarthy-Fingar</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8132</link>
<guid>8677065f187e98d8beacdc700e49f6ef</guid>
<pubDate>Tue, 30 May 2023 14:14:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>McCarthy-Fingar</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c5c2724d393b03da88bcb7f57378fcf21cace8af9cbbf40292f460fad13819f</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1946, McCarthy Fingar, with offices in White Plains, New York, serves the legal needs of a diverse group of clients throughout New York, Connecticut, Florida, and beyond. Founded by Robert J. McCarthy and Elmer Lee Fingar (both now deceased), McCarthy Fingar has been a leader in the legal and business communities for over 70 years. Our attorneys come to us from a divergent group of law schools, from other law firms, from the government, and from the judiciary. Our lawyers demonstrate a special blend of skills and know-how which helps our clients succeed in their business and personal planning, in transactional matters and in litigation.SITE: www.mccarthyfingar.com Address 711 Westchester AvenueSuite 405White Plains, NY 10604</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lewis-Young-Robertson--Burningham</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8146</link>
<guid>202ed3792e2cfa7318b12ead83763c37</guid>
<pubDate>Tue, 30 May 2023 12:52:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Lewis-Young-Robertson--Burningham</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f8b2faa7bb25cae4012b2cacfc50a9c67a97ececff4966c94ecaf7a6a665fcf5</i><br /><br />Threat actor <b>description</b>: <i>Lewis Young Robertson & Burningham is an independent, fully registered municipal financial advisor. As this firm played an active role as financial advisor and consultant to local governments in Utah, Wyoming, Idaho, Oregon, Washington, and American Samoa, youwill be able to take a look at the details of their cooperation and other corporate data of the Lewis Young firm here in our blog.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>casepoint.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8126</link>
<guid>4fc66104f8ada6257fa55f29a2a567c7</guid>
<pubDate>Tue, 30 May 2023 10:43:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>casepoint.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>61617fe223a1a5b270f1f929347f92513afe69607851d10ec792dd7f67d91055</i><br /><br />Threat actor <b>description</b>: <i>We have over 2TB of your data, your attorney files, and many other things that you have tried so hard to keep.  We encourage you to get in touch or we'll start posting your data on our blog soon.  We mailed you the login link.</i><br />Target victim <b>website</b>: <i>https://www.casepoint.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>BCATTORNEY</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8123</link>
<guid>15c71b874531f45bba372bfc35e9b8cf</guid>
<pubDate>Mon, 29 May 2023 20:40:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>BCATTORNEY</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ea7f79c70d8a7846bec4174e41eb7c285202f1cea105029fa96c9f0bbff50eb5</i><br /><br />Threat actor <b>description</b>: <i>A Premier Phoenix Law Firm Since 1970 Founders Frank Haze Burch and Dan Cracchiolo were known for being hometown heroes for business law in Phoenix when they joined forces to open Burch &amp; Cracchiolo 52 years ago. Since then, they have expanded the practice to a team of 50+ esteemed law professionals, who all carry on the traditional values our firm was founded on, while embracing innovation and looking forward to the future.  Headquartered in Phoenix, Arizona, B&amp;C serves corporate, governmental and individual clients throughout the Southwest and across the country. Over the course of 52 years in business, our team has developed a deep knowledge of law in Arizona and a respected reputation for being problem solvers at heart.  Now with offices for business law in Phoenix, Las Vegas, and Orange County, B&amp;C has expanded our footprint to serve the entire Southwest region. Our firm is also a member of Primerus, an international law firm alliance, which allows us to provide our clients with leading-edge service, technology and resources.</i><br />Target victim <b>website</b>: <i>www.bcattorneys.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>aquidneckclub.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8122</link>
<guid>e9507053dd36cb9217816ffb566c8720</guid>
<pubDate>Mon, 29 May 2023 18:43:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>aquidneckclub.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36bb27329fb51eeea5b8eb6a6f81da40de525941174046500ba656620b20799e</i><br /><br />Threat actor <b>description</b>: <i>The Aquidneck Club combines first class amenities with a casual, family-friendly culture and personalized service. This luxurious private club features an 18-Hole Championship Golf Course, Waterfront Dining, Tennis Courts, Fitness Center, Wellness Sp...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Earlens-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8105</link>
<guid>247d87b085efdb305fa6583ccf1a9f54</guid>
<pubDate>Mon, 29 May 2023 15:04:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Earlens-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ae663a3f44810cd8d6d8833e4925ea20e7bc44fa8b2ca95537745de1a9242c4</i><br /><br />Threat actor <b>description</b>: <i>USA medical technology company that develops hearing solutions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Neutronic-Stamping</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8106</link>
<guid>1b742ae215adf18b75449c6e272fd92d</guid>
<pubDate>Mon, 29 May 2023 15:04:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Neutronic-Stamping</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a5a8d5078b545960732ee28f8f121c587c439f1d9772e8f8904eefbc888ef462</i><br /><br />Threat actor <b>description</b>: <i>Neutronic Stamping and Plating manufactures high quality electronic contacts, pins, and lead-frames in our two plants located in Fountain Valley, CA.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fersten-Worldwide</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8101</link>
<guid>c035226640b6b89ffaf333f54e523c10</guid>
<pubDate>Mon, 29 May 2023 13:26:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Fersten-Worldwide</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b2784eceeabb1bda2ace054e6101f57acb24c1f1dd8a8142769949b5f801cc8b</i><br /><br />Threat actor <b>description</b>: <i>Fersten Worldwide is a company that provides decorating services.We are interested how a company that claims "we develop revolutionary products and services going above and beyond the industry’sexpectations" cannot afford neither proper cybersecurity nor payto preserve corporate and customer information. Employees, competitors and anyone interested will soon be able to download Fersten's data here.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Roadies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8100</link>
<guid>9cea886b9f44a3c2df1163730ab64994</guid>
<pubDate>Mon, 29 May 2023 10:35:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>Roadies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f459c9783562ef37a0e75a2e41a075b67b40a5ee6fb8b714f8a63254e90356dc</i><br /><br />Threat actor <b>description</b>: <i>Roadies, a fast-growing and innovative logistics company that provides comprehensive and outstanding transportation services. Since our inception, we have been providing cutting-edge services, so whatever your truckload need may be, we have got you...</i><br />Target victim <b>website</b>: <i>https://www.roadiesinc.com/</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Good-Oil-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8097</link>
<guid>5a2afca61e35f45a7dd44ca46e0225f4</guid>
<pubDate>Sun, 28 May 2023 16:42:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Good-Oil-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a51f13278ba0b3fda04cd1eb4aec4c9f713248b1bf3081ec46b0f78c68196fc9</i><br /><br />Threat actor <b>description</b>: <i>https://goodoilcompany.com/contactGood Oil Company was founded by Don O. Good Sr. in 1941. When Don Sr. retired, his two sons, Don and Dean, assumed operation of the company. Based out of Monterey, Indiana, the company was involved mainly in the sale and delivery of petroleum products to farm and home heat customers. Don became a Standard Oil/Amoco jobber and continued to grow his business until his retirement in 1978. In 1980, they relocated the business to its current office in Winamac.(574) 946-4863+1 805-279-8265+1 574-225-1543</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sysco-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8108</link>
<guid>25b07af81d8c74341f00dc139652fdb0</guid>
<pubDate>Sat, 27 May 2023 17:52:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dunghill_leak</b> claims attack for <b>Sysco-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b64707b87fb69c33685db03edade8e857ea0b87958c420045fa11d5d460c5cb9</i><br /><br />Threat actor <b>description</b>: <i>Sysco Corporation is an American multinational corporation involved in marketing and distributing food products, smallwares, kitchen equipment and tabletop items to restaurants, healthcare and educational facilities, hospitality businesses like hotels and inns, and wholesale to other companies that provide foodservice. Sysco is the world's largest broadline food distributor; it has more than 600,000 clients in a wide array of fields. Management consulting is also an integral part of their services. The company operates approximately 330 distribution facilities worldwide; providing service to over 90 countries.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dunghill_leak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gentex-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8109</link>
<guid>d30d0f522a86b3665d8e3a9a91472e28</guid>
<pubDate>Sat, 27 May 2023 17:51:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dunghill_leak</b> claims attack for <b>Gentex-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>28abc58b7850b435014de9fa885cdb9a36d0545c790c72188a8c3095ce894d5c</i><br /><br />Threat actor <b>description</b>: <i>Gentex Corporation is an American electronics and technology company that develops, designs and manufactures automatic-dimming rear-view mirrors, camera-based driver assistance systems, and other equipment for the global automotive industry. They produce dimmable aircraft windows for the commercial, business and general aviation markets. In addition, the company produces photoelectric smoke detectors, signaling devices, and the HomeLink Wireless Control System for the North American fire protection market. The company's customers are GM, Ford, BMW, Mercedes, Tesla, Airbus, Audi, Toyota, Mazda, Nissan, Honda, Porshe, Bentley and so on.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dunghill_leak</category>
</item>
<item xmlns:dc='ns:1'>
<title>arnoldoilco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8085</link>
<guid>5011bf6d8a37692913fce3a15a51f070</guid>
<pubDate>Fri, 26 May 2023 15:11:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>arnoldoilco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3821cb1914a91ccd8f790f76d56468b6f979d76e8ffe42cd711049ebb42e4e38</i><br /><br />Threat actor <b>description</b>: <i>Arnold Oil Company has been serving customers in South Texas since 1939. What began as an oil warehouse in the early years eventually turned into the largest distributor of automotive parts and lubricants in South Texas.Arnold Oil Company successfu...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>watersaversinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8086</link>
<guid>8722c8f495dcee23f39d5519735e1f71</guid>
<pubDate>Fri, 26 May 2023 15:10:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>watersaversinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c4155b2b3c7eebe580d952690c408a3cefa170dc21239879680ef3b69d5cd2d7</i><br /><br />Threat actor <b>description</b>: <i>For over 30 years, Watersavers Irrigation has been committed to providing high quality irrigation supplies and services. We carry smart irrigation products, landscape supplies and tools, outdoor lighting, drainage, fertilizers, sod, and artificial tu...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>floodlaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8087</link>
<guid>9af08cda54faea9adf40a201794183cf</guid>
<pubDate>Fri, 26 May 2023 15:10:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>floodlaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1cddbe0cf4d952b393073227cdc71a915a2ee6a5d9a050c932cbaf83f8927eb2</i><br /><br />Threat actor <b>description</b>: <i>In 2002 we started a law firm, a unique assembly of former prosecutors dedicated to leveraging our knowledge and experience against the forces inherent in the criminal justice system. Today, Flood Law has grown to include tenacious litigators bred to...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>aimtron.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8083</link>
<guid>20ef119e812e178ecb44efa448b57ebc</guid>
<pubDate>Fri, 26 May 2023 14:39:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>aimtron.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96411482716d538d9029cc8574dd38a71f9127b6c21e7c77879c27bf99d8a4f6</i><br /><br />Threat actor <b>description</b>: <i>Aimtron Corporation - "Aimtron electronic manufacturing Assembly, foundation, pinball machine design and Strategic infrastructure has been established for full design and research projects. we are expertise includes medical, military, automotive, con...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>BM-Precision</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8077</link>
<guid>b943325cc7b7422d2871b345bf9b067f</guid>
<pubDate>Fri, 26 May 2023 13:28:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>BM-Precision</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>964bcd9cdd95090b1dd4a42b19c74b2b982e9e05c52aaa527e85c6d6f3a1ffd2</i><br /><br />Threat actor <b>description</b>: <i>B & M Precision, Inc. is capable of producing any part made from stainless steel or similar metals with an emphasis on medical devices. With over 40 years of experience in the machining industry and 275 employees, we have the proven track record to get the job done on time and on budget.Total downloaded data - 26gb</i><br />Target victim <b>website</b>: <i>http://www.bmprecision.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>DirectViz-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8078</link>
<guid>564127c03caab942e503ee6f810f54fd</guid>
<pubDate>Fri, 26 May 2023 13:28:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>DirectViz-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2eae46aa2066372f329cb33fa4f5db7a87725707feec46af6cc8a708ebc48fdf</i><br /><br />Threat actor <b>description</b>: <i>Directviz Solutions (DVS) provides the information technology and services IRM needs to successfully carry out its foreign policy mission. DVS provides state of the art Information Technology End-user Support Services (ITESS).Total downloaded data - 246gb</i><br />Target victim <b>website</b>: <i>http://www.directviz.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>AFG-Holdings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8081</link>
<guid>4afe044911ed2c247005912512ace23b</guid>
<pubDate>Fri, 26 May 2023 13:27:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>AFG-Holdings</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53a115ceffbd2fde2e43a5bf3246ed32c8b57c5e0f1253f44741427f8741bae5</i><br /><br />Threat actor <b>description</b>: <i>AFG Holdings, Inc. is a fully integrated OEM providing differentiated technology, products, and services. The Company maintains a market-leading position in many of its businesses, including aerospace, general industrial, oil and gas, and power generation.Total downloaded data - 319gb</i><br />Target victim <b>website</b>: <i>http://www.afgholdings.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Volt</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8082</link>
<guid>b9e4093f970251d5bcf888b76944a4bc</guid>
<pubDate>Fri, 26 May 2023 13:26:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Volt</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f43134c41301a4b7dd8a30b4f38c47db748af86e6bf9a71ea00e156de141cb63</i><br /><br />Threat actor <b>description</b>: <i>Volt Information Sciences, Inc. provides staffing and information technology (IT) infrastructure services in the United States and internationally.Total downloaded data  -  249gb</i><br />Target victim <b>website</b>: <i>http://www.volt.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Colrich</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8071</link>
<guid>82138b11a724b94d18df2e083d8b7b55</guid>
<pubDate>Fri, 26 May 2023 11:22:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Colrich</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>51e323827c2f36e2c834c3c5bdf1ce3342f5ba0d7e5b59b432d1534b77adc4ad</i><br /><br />Threat actor <b>description</b>: <i>From South Africa to Southern California, the ColRich story is a decades-long journey of growth, continuous reinvention and a culture of caring.Through generations of family ownership, the ColRich brand has evolved, but the company’s foundation remains the same today as in the beginning – build lasting communities through a culture centered around innovation, humility, perseverance, and a commitment to helping others.In 1977, business colleagues and friends Richard Gabriel, Barry Galgut and Colin Seid moved from Johannesburg to San Diego, leaving the unrest of apartheid-era South Africa for a more stable environment to raise their families. The trio quickly formed a San Diego-based partnership to pursue development and investment opportunities in Southern California. The business achieved notable success over more than two decades – largely due to continual reinvention and the team’s ability to leverage the peaks and troughs of the cyclical real estate industry.Gabriel’s sons, Graeme and Danny, took the helm in 2003 to build the next iteration of ColRich, creating a diverse residential platform that leverages a unique homebuilding background, renovation expertise, sophisticated in-house construction and design teams brought together in private capital partnerships. Today, ColRich is recognized as an industry leader for integrating design and value into both for-sale and multifamily rental properties.Total downloaded data  -  560gb</i><br />Target victim <b>website</b>: <i>http://www.colrich.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Procurri</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8070</link>
<guid>d5c8e1ab6fc0bfeb5f29aafa999cdb29</guid>
<pubDate>Fri, 26 May 2023 10:43:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Procurri</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2da681a4ac46ded33c49494793f11e6db723d8a799dd90241a12157360045384</i><br /><br />Threat actor <b>description</b>: <i>Procurri is the only 100% channel focused company in our space that focuses exclusively on partnering with the channel to deliver lifecycle solutions not typically available from the traditional IT channel. Head offices Asia, Europe, USA, Canada.</i><br />Target victim <b>website</b>: <i>https://www.procurri.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>wiannoclub.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8069</link>
<guid>7cc5a75432e9a547200e3668c3761ae7</guid>
<pubDate>Fri, 26 May 2023 09:11:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>wiannoclub.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ccffd2b60d1909b26673d460e7ddf7fe427d0646d89a4ee0b3c585d20febf17f</i><br /><br />Threat actor <b>description</b>: <i>The Wianno Club is a private seasonal club located on 156 acres in Osterville, Massachusetts. Since 1916, the Club has been dedicated to providing its members and their families with a wide range of social and athletic activities.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>kyocera-avx.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8067</link>
<guid>53253027fef2ab5162a602f2acfed431</guid>
<pubDate>Fri, 26 May 2023 02:43:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>kyocera-avx.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>09e222e83fd2977a845efdf42798bf45c0b4a252df2158b3c8217682c05f4b86</i><br /><br />Threat actor <b>description</b>: <i>AVX is an international manufacturer and supplier of a vast portfolio of advanced electronic components, USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>fams.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8068</link>
<guid>a7d9277053b8355e69db079f52d274e9</guid>
<pubDate>Fri, 26 May 2023 02:43:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>fams.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e080be9ed0a92467fd9ac69653a1427aa36f0cb4ec06e21a714c6939a27dc8b7</i><br /><br />Threat actor <b>description</b>: <i>FAMS Recovery Solutions, headquartered in Woodstock, Georgia, and established in 1993, is a debt collection agency. Their services include first-party collections, third-party collections, and skip-tracing & USA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Augusta</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8066</link>
<guid>8b519f198dd26772e3e82874826b04aa</guid>
<pubDate>Thu, 25 May 2023 20:42:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>City-of-Augusta</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ee784f42c17e87af5583294702197bbd299b99011cf8da58e520ab59960ece8</i><br /><br />Threat actor <b>description</b>: <i>The City of Augusta, GA, headquartered in Augusta, and established in 1736, is a consolidated city-county located on the central-eastern border of the state of Georgia within the Fall Line section. The city lies across the Savannah River from South Carolina</i><br />Target victim <b>website</b>: <i>https://www.augustaga.gov/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>Norton-Healthcare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8065</link>
<guid>320e4df890a1a620573db8170f39a093</guid>
<pubDate>Thu, 25 May 2023 16:41:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Norton-Healthcare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1840badb6ce75d15b25ae9fceacbb96f2d28cbb87c52294239f029b7b2e8eea2</i><br /><br />Threat actor <b>description</b>: <i>Norton Healthcare is a Kentucky health care system with more than 40 clinics and hospitals in and around Louisville, Kentucky. The hospital and health care system is the Louisville area's third largest private employer, located at more than 140 locations throughout Greater Louisville and Southern Indiana. The Louisville-based system includes six hospitals (one being in Madison, Indiana) with 1,993 licensed beds, eight outpatient centers, 18 Norton Immediate Care Centers, over 1,700 employees, over 1,500 employed medical providers, and approximately 2,000 total physicians on its medical staff.   According to Business First of Louisville, Norton Healthcare is the Louisville area's third largest employer, with more than 17,000 employees. Norton Healthcare employs some 4,000 nurses and has nearly 2,000 affiliated physicians. Additionally, Norton Healthcare has programs in place to support nursing students attending both public and private universities in Kentucky and Indiana.  Revenue : 2.6B USD</i><br />Target victim <b>website</b>: <i>https://nortonhealthcare.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>sfponline.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8063</link>
<guid>8d1f1aac0dd8a76b49e8bbdda0c7c98c</guid>
<pubDate>Thu, 25 May 2023 13:26:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>sfponline.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f231600520160ec259158d155152afe9f0ab6718a1ea3f570f2409e2e0e96062</i><br /><br />Threat actor <b>description</b>: <i>St Francis Preparatory School is a company that operates in the Education industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>affinityhealthservices.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8062</link>
<guid>ee492a6c8f567fb3100b7dc9d3600cbe</guid>
<pubDate>Thu, 25 May 2023 12:45:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>affinityhealthservices.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d468f52e0294477bf5c24f140a13b7d0215273ee7437226787d800a37dd4dcc7</i><br /><br />Threat actor <b>description</b>: <i>1 part : 110gb</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Leidos</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8061</link>
<guid>8f4d94fa779cb6b74225a9e26c700a39</guid>
<pubDate>Thu, 25 May 2023 10:36:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trigona</b> claims attack for <b>Leidos</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f35283d0b417ebb982246ad65a6812753326ddfcfb225a16f3c84c5c82618652</i><br /><br />Threat actor <b>description</b>: <i>Leidos Holdings, Inc. is an American defense, aviation, information technology, biomedical research, and engineering company.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>trigona</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Middleton-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8059</link>
<guid>e382f91e2c82c3853aeb0d3948275232</guid>
<pubDate>Wed, 24 May 2023 22:35:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>The-Middleton-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c3d1745f5f5a42cfa26157d366a6f4e7e027e269b14672f29cdb761a1c6584c</i><br /><br />Threat actor <b>description</b>: <i>The Middleton Group is the company tasked with delivering Memco, Inc. and MandM Poultry Equipment, Inc. to the industrial marketplace. Set up in the early 2000™s, its function was to market the synergies of Memco, Inc. and MandM. </i><br />Target victim <b>website</b>: <i>https://www.themiddletongroup.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>interstateplastics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8054</link>
<guid>47e51e9d11cf800ff08674dbb68a48ab</guid>
<pubDate>Wed, 24 May 2023 11:15:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>interstateplastics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>99d3b7fc6fa8446b63720712d6194121c0b20dae79efd97469f20bd742f60b14</i><br /><br />Threat actor <b>description</b>: <i>Interstate Plastics is a multi-branch nation-wide industrial plastics distributor offering a large selection of plastic sheet, plastic rod, plastic tube, and custom plastic profiles.Our manufacturing facilities can provide simple cut-to-size or c...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Voxx-Electronics---company-which-has-a-huge-number-of-vulnerabilities-was-hacked.-A-large</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8053</link>
<guid>dfccdb8b1cc7e4dab6d33db0fef12b88</guid>
<pubDate>Wed, 24 May 2023 10:41:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Voxx-Electronics---company-which-has-a-huge-number-of-vulnerabilities-was-hacked.-A-large</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30708255c5a69e74ec018f62972e1d86bb286407038e07dd1475cc7c7ceb2423</i><br /><br />Threat actor <b>description</b>: <i>Who Voxx Electronics  Audiovox is a leading, global supplier of mobile and consumer electronics products and holds the #1 market share in RSE.  Headquarters: 150 Marcus Blvd, Hauppauge, New York, 11788, United States Phone Number: (631) 231-7750 Website: www.voxxelectronics.com</i><br />Target victim <b>website</b>: <i>www.voxxelectronics.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>P1-Technical-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7962</link>
<guid>ebb87faa733d9a04ebb40f422b135fb0</guid>
<pubDate>Tue, 23 May 2023 19:47:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>P1-Technical-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56e1d5d38524597ae15b953fc211bab8852373bf990f04974058fcd3c418bca0</i><br /><br />Threat actor <b>description</b>: <i>http://p1-tech.com/P1 Technical Services has been serving the commercial industry by providing expert design, installation, support and maintenance of low voltage infrastructures since 1984.P1 creates cost effective, single-source hardware and service solutions to meet our customer’s individual needs by applying our expertise in Network Design, Routing and Switching, Wireless, Local and Wide Area Networks, VOIP, Structured Cabling, Access Control, Sound Masking and Paging, Video Conferencing, IP Camera Systems, RFID Tracking, Audio Visual Systems, Patient Monitoring, Intercom and Telephone Entry Systems.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>MTS-Office</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7965</link>
<guid>a440a3d316c5614c7a9310e902f4a43e</guid>
<pubDate>Tue, 23 May 2023 19:47:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>MTS-Office</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5dbd3368e422a51128885e1f8e4ccdca6c6b8cedab184bfd15e23a0b25ad19f5</i><br /><br />Threat actor <b>description</b>: <i>MTS Office is the authorized Toshiba and Lexmark provider of Upstate SC. Founded in 1982, MTS leverages outstanding hardware and software products to provide our clients with customized solutions to fit their business. We provide expertise in discovering your needs and aligning them with the proper products. https://mtsoffice.com/support@mtsoffice.com864.224.9474</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Butler-and-Gatz-CPAs-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7970</link>
<guid>ec1093fe1626f25b1845d04dd6f55dd2</guid>
<pubDate>Tue, 23 May 2023 19:47:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Butler-and-Gatz-CPAs-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4adf849f6bb6b876c762c2e3cb4faf32d3b5540f706b5fff1fdb17cf7b9d2139</i><br /><br />Threat actor <b>description</b>: <i>Butler & Gatz CPAs, LLC, formerly known as John L. Gatz CPA, is a local CPA firm that has been serving the community for over 40 years. Our firm, led by Vincent Butler CPA, has over 90 years of combined experience working with the IRS. We guarantee the fast & discrete handling of all of your personal or business taskshttps://www.garlandcpa.com/ info@garlandcpa.com gatzcpa@gmail.com john@gatzcpa.com shc@gmail.com bookkeeping@garlandcpa.com Phone: (972) 271-5696 Fax: (972) 278-6262 Email: info@garlandcpa.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Innormax-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7973</link>
<guid>e334fd9dac68f13fa1a57796148cf812</guid>
<pubDate>Tue, 23 May 2023 19:47:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Innormax-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57836a6e5afcc319b42a07346cd1b1e5ee298b2a6d887bcb2dc686c0857909cc</i><br /><br />Threat actor <b>description</b>: <i>SAP Business ByDesign is a cloud-based business management platform that removes the burdensome effect of departmental silos and builds powerful, future-proof, multifunctional organizations.https://innormax.com/#Tel: 619-241-4100</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Intermountain</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7977</link>
<guid>82dbce7b4ff9f093aa7ff9c43ae70d8a</guid>
<pubDate>Tue, 23 May 2023 19:47:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Intermountain</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5de2f3ca93df7b0514855d361aba668bdc2326633b564674fe8544bcfde807fb</i><br /><br />Threat actor <b>description</b>: <i>Intermountain Centers for Human Development, Inc., is an Arizona-based nonprofit healthcare system made up of a statewide family of subsidiary organizations that includes Behavioral Consultation Services Inc., Community Partners, Inc., Intermountain Academy, LLC, Intermountain Foster Care, LLC, Intermountain Health Center, Inc, Mental Health Resources, Inc and Pinal Hispanic Council Inc. The Intermountain family of organizations is known as Intermountain Centers.Intermountain Centers is recognized as a leader in the provision of integrated behavioral health and intensive welfare programs for children and adults. The organization’s wide spectrum of programs, each grounded in Applied Behavior Analysis (ABA) and Trauma Informed Behavioral Therapies, builds on individual and family strengths.https://www.intermountaincenters.org/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lerch-Bates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7984</link>
<guid>7070baed1f0e21d1234a4b00082a1bea</guid>
<pubDate>Tue, 23 May 2023 19:47:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Lerch-Bates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9edcce066e8acd941d93cc69c05148c84a7919750efab7b2b039c30c7cc0b1ba</i><br /><br />Threat actor <b>description</b>: <i>Lerch Bates reduces time, money and risk at any point in a building’s lifecycle as a trusted technical advisor. As a firm of employee-owners, expect responsibility, service and performance in everything we do.https://www.lerchbates.com/877-711-1565</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bronzino-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7989</link>
<guid>48c34cb86aa86816e112a44ef2bf4c30</guid>
<pubDate>Tue, 23 May 2023 19:47:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Bronzino-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd71155630bd9dc97efdc61f206dd791303327ebf6c6aef4e1f9f9b07f56478f</i><br /><br />Threat actor <b>description</b>: <i>Since 2003, Bronzino Engineering, P.C. has been providing the following services to developers and contractors:Foundation UnderpinningShoringGeotechnical ServicesStructuralDemolitionSpecial InspectionsExpert Testimonyhttp://bronzinoengineering.com/100-3 South Jersey Avenue, East Setauket, N.Y. 11733Contact us at: 631.751.8299Fax: 631.751.8599Email: admin@bronzinoengineering.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Taylor-Made-Hose</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7991</link>
<guid>ef7be8c57773f2ab48d013434d3ad4f7</guid>
<pubDate>Tue, 23 May 2023 19:47:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Taylor-Made-Hose</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b483d539ad7be3c9730c0ecc9a3c3190952d500a1d56e5776e9531fd11ca0ae0</i><br /><br />Threat actor <b>description</b>: <i>With 35 years of experience in hose distribution, resale, and custom makes for all sorts of needs, we can prove our quality in our products.We have supplied products for the US Military (Air Force), Local construction, and pretty much anyone that uses a hose for vehicles, machinery, and power washing equipment.We are your one stop shop for anything ‘Taylor Made” for your needs. Come on by and enjoy our friendly atmosphere, you will be amazed at the courtesy of our staff, even before we make that pot of coffee in the morning.https://taylormadehose.com/PH: (210) 520-4673FAX: (210) 681-8946</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Redwood-Lab-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7994</link>
<guid>a0b45d1bb84fe1bedbb8449764c4d5d5</guid>
<pubDate>Tue, 23 May 2023 19:47:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Redwood-Lab-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b1b8afcbccf43108f3f555bb512b71d16b033d509769d985144d246dced9a0e</i><br /><br />Threat actor <b>description</b>: <i>Redwood Lab Services is a patient driven, patient oriented, alternative neighborhood lab. We are committed to providing quality, affordable laboratory services to our customers and physicians using state of the art technology. While Redwood Lab Services is large enough to introduce new technology and advancement of laboratory testing, it is still small enough to provide the boutique level of service that our clients deserve. And with our accredited and professional staff, consider us an addition to your team.PHONE/FAX: 281-378-2116</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>ER-of-Dallas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7995</link>
<guid>2d44e06a7038f2dd98f0f54c4be35e22</guid>
<pubDate>Tue, 23 May 2023 19:47:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>ER-of-Dallas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7e89240c9b0949e80c5143f005763bb936cd79488b7e2749a25aaad5a4bec756</i><br /><br />Threat actor <b>description</b>: <i>The ER of Dallas is a state-of-the-art medical facility that is able to handle most medical emergencies that are handled in a hospital ER. Our full-service ER is available 24/7 for emergency treatment without waiting in line. We are conveniently located on Frankford Road just off the Dallas North Freeway.(214) 613-6694    info@erofdallastx.com    (214) 613-6723https://erofdallastx.com/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>SMYRNAPEDIATRICS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7996</link>
<guid>2d5c4ea4c4aaf3aea8ac8dee1df8fbe8</guid>
<pubDate>Tue, 23 May 2023 19:47:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>SMYRNAPEDIATRICS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>82522d093b0b0bc5951e81208d6d101de4f99a17065b094babe8bff675bfdc11</i><br /><br />Threat actor <b>description</b>: <i>At Smyrna Pediatrics, we strive to help parents raise healthy, active, happy, and confident children. We answer each question thoughtfully, always focused on providing the best medical care possible. Whether your child is experiencing a runny nose, ear pain, persistent cough, or other symptoms, we offer treatmenthttps://www.smyrnapediatrics.com/741 President Pl # 210, Smyrna, TN 37167(615) 625-7780info@smyrnapediatrics.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ayers-Mechanical-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7999</link>
<guid>fa183ba81b8f82c988245d8d4e701366</guid>
<pubDate>Tue, 23 May 2023 19:47:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Ayers-Mechanical-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2cdaa0d5b0d0876b46d9b90fead1e060456548c82a637e2847dc9a072eb5f669</i><br /><br />Threat actor <b>description</b>: <i>Ayers Mechanical Group has been providing fast, dependable heating, air conditioning and plumbing service for commercial, industrial and residential customers in Van Wert, Ohio since 1984. You’ll receive attentive service from a professional, knowledgeable staff. We have a full fleet of experienced technicians and are here for you 24 hours day/7 days a week.222 N. Market StreetVan Wert, OH  45891Phone: 419-238-5480 https://www.ayersmechanical.com/contact/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Conklin-Benham</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8001</link>
<guid>bc3c4a6331a8a9950945a1aa8c95ab8a</guid>
<pubDate>Tue, 23 May 2023 19:47:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Conklin-Benham</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa715a8cb7e12ace67ea8affd36bff074be1b6b3e64c4f81283e86df4df1ad49</i><br /><br />Threat actor <b>description</b>: <i>For well over a half-century, Conklin Benham has maintained a sterling reputation in defense litigation. Areas of representation include negligence, workers' compensation, employment law, commercial litigation, appellate law and others. https://conklinbenham.com/ wnoeske@conklinbenham.com walter.noeske@gmail.comd labadie@conklinbenham.com labadie@conklinbenham.com rdanforth@hanover.com mikebrenton@brentonlaw.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Neighborhood-Progress-Fund</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8004</link>
<guid>e5abba84b1901e99f9c45845f488843e</guid>
<pubDate>Tue, 23 May 2023 19:47:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Neighborhood-Progress-Fund</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b80e072f14e1aabd19c3525371884ed631cdf3b7bd7a6f39a00313284a22248f</i><br /><br />Threat actor <b>description</b>: <i>Neighborhood Progress Fund is a nonprofit group that offers small business loans and business development services to entrepreneurs and businesses in distressed communities. We’ve served the Greater Philadelphia Area for twenty years to help stimulate economic growth throughout the region.https://npfp.org/Liberty Square, West Tower1300 W. Lehigh Ave, Suite 100Philadelphia, PA 19132215-232-0516 (office) 215-232-0519 (fax)contact@npfp.org</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Richard-W.-Fuller-CPA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8006</link>
<guid>00482b9bed15a272730fcb590ffebddd</guid>
<pubDate>Tue, 23 May 2023 19:47:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Richard-W.-Fuller-CPA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>060e7ebbd23e0962ba8c36552d28ab3eaaff849a5670d3bc840c526165aa56fc</i><br /><br />Threat actor <b>description</b>: <i>At Richard W. Fuller CPA we work with clients throughout the Capital District and the North Country to help them achieve their goals by listening to their concerns and simplifying the complexities of taxation and finances. We strive to provide our clients personalized, friendly and timely service in the hometown tradition.https://rickfullercpa.com/79 Warren StreetSuite 1CGlens Falls, NY 12801 PHONE(518) 636-5166 FAX(518) 636-5585</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>MRO-SUPPORT-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8007</link>
<guid>4f00921114932db3f8662a41b44ee68f</guid>
<pubDate>Tue, 23 May 2023 19:47:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>MRO-SUPPORT-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>40fcd3f8e29286786bdfcf071b82221856203248a0faac7aca0768fdc2ed1929</i><br /><br />Threat actor <b>description</b>: <i>MRO SUPPORT, INC. is your top source for aviation parts such as Aircraft Engines, Engine Stands, GSE etc.wayneq@mrosupport.netjohnw@mrosupport.netjackw@mrosupport.netlukew@mrosupport.net✆ 5617057339</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Thayer-Academy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8013</link>
<guid>40f4da34bbe180214c23b9e55da4f772</guid>
<pubDate>Tue, 23 May 2023 19:47:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Thayer-Academy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>75950e28f38041b54310ee6e5e9243a3e7c808aeb4f143e37b71034e65fd613e</i><br /><br />Threat actor <b>description</b>: <i>Thayer Academy embraces community as a core value and sees diversity, equity, and inclusion as essential to the Academy’s mission. From student organizations and activities to faculty development to our academic curriculum, Thayer seeks an affirming and supportive culture which promotes diversity in all its forms.https://www.thayer.org/admissions/why-thayer745 Washington Street, Braintree, MA 02184781.843.3580</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lake-Cable</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8015</link>
<guid>1f7aa6705d5b742085538c627f6f9c2b</guid>
<pubDate>Tue, 23 May 2023 19:47:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Lake-Cable</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9425da1feac35d513749936d42f5ce544b7c5b7f3b0a99ccd9ba50c40ccf05c1</i><br /><br />Threat actor <b>description</b>: <i>We’re an industry leader because we put our customers first, manufacturing reliable, highly-engineered cable solutions to your exact specifications and requirements. That includes Industrial, Utility, Custom OEM and Broadcast quality cable, all proudly made in the USA.We also focus on innovation, making our cable using cell manufacturing, grouping the entire insulating, cabling, jacketing and packaging process together. This breakthrough, flexible approach unites people, equipment and process in one location, improving quality and efficiency. Whatever your need, our team of Design Engineers and Material Specialists are here to help.https://www.lakecable.com/888.518.8086</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zenex</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8016</link>
<guid>bf40d1cbb2ba9fdad19821fc140fa50c</guid>
<pubDate>Tue, 23 May 2023 19:47:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Zenex</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89268a3722cfef2af96ecef6c2fd002448889cfe282953d055b38f2bc1c45cbd</i><br /><br />Threat actor <b>description</b>: <i>We are a national manufacturer of liquid chemicals, aerosols, hand soaps, wipes, and custom formulations. We supply distributors around the world with quality products, value, and a commitment to customer service. Take a look at our latest catalog and see just the surface of our capibilities.https://www.zenexint.com/https://chemsafeint.com/Chemsafe International1 Zenex CircleCleveland, OH 44146Fax: +1(440) 786-7233+1 (440) 786-7000</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Asbestos-Inspections-Solution-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8024</link>
<guid>859555c74e9afd45ab771c615c1e49a6</guid>
<pubDate>Tue, 23 May 2023 19:47:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Asbestos-Inspections-Solution-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1704f6fdb08a48380a6f91c3279ae1c29179a94fd5763d01ef0224f08f38d65</i><br /><br />Threat actor <b>description</b>: <i>EMS are qualified and experienced asbestos consultants, able to undertake asbestos reinspection surveys and manage portfolios on behalf of clients.https://www.a-i-s-m.net/</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Malkasian-Accountancy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8026</link>
<guid>e6872f5bbe75073f8c7cfb93de7f6f3a</guid>
<pubDate>Tue, 23 May 2023 19:47:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>Malkasian-Accountancy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b761af7566d4ce740b40fa57773a10b640900551ee116321c5b1d6750c751215</i><br /><br />Threat actor <b>description</b>: <i>Malkasian Accountancy is a local, family-owned company specializing in tax preparation and bookkeeping services for Sacramento small businesses.As Sacramento's largest independent accounting and bookkeeping firm, Malkasian Accountancy is dedicated to providing local small business-owners with the expert financial support and advice to grow their companies.https://malkasian.com/ 916.971.9315 / 1-800-598-964</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Modesto</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8030</link>
<guid>b4d22bb574aed5fdd900a274930252f6</guid>
<pubDate>Tue, 23 May 2023 19:47:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>City-of-Modesto</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53556eee1be6cfe5a596fa4f93a4c73c8a269d3cd5fdce38b575c7c14297e09f</i><br /><br />Threat actor <b>description</b>: <i>Modesto is the county seat and largest city of Stanislaus County, California, United States. With a population of 218,464 at the 2020 census, it is the 19th largest city in the state of California and forms part of the Sacramento-Stockton-Modesto Combined Statistical Area.The city is surrounded by...</i><br />Target victim <b>website</b>: <i>https://modestogov.com/</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Guardian-Fine-Art-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8033</link>
<guid>fc5b3186f1cf0daece964f78259b7ba0</guid>
<pubDate>Tue, 23 May 2023 19:47:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>Guardian-Fine-Art-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a03c4cd936da70c01931d30f878411845b33ea42b78dbce6f2bbe4646e8c2c58</i><br /><br />Threat actor <b>description</b>: <i>GUARDIAN is the premier fine art storage facility in the Chicago-Milwaukee metropolitan region dedicated to the care and storage of fine and decorative art, jewelry, musical instruments, furniture and antiques, firearms, and other tangible assets. GUARDIAN offers a range of wrap-around services...</i><br />Target victim <b>website</b>: <i>https://www.guardianfineart.com/</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Accurate-Auto-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8034</link>
<guid>cc4af25fa9d2d5c953496579b75f6f6c</guid>
<pubDate>Tue, 23 May 2023 19:47:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>Accurate-Auto-Insurance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f7112caa2f954edfdd392dddd152d1a5e4da7ad39ed30e1689bcd2c4bac202ad</i><br /><br />Threat actor <b>description</b>: <i>Accurate Auto Insurance was founded in 1992 in Chicago, Illinois. We have a simple approach to doing business with our auto insurance customers. Accurate provides its customers the most affordable car insurance quotes and the finest customer service. Forming lasting bonds with our...</i><br />Target victim <b>website</b>: <i>https://www.accurateautoins.com</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wyoming-County-Community-Health-System</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8039</link>
<guid>0919b5c38396c3f0c41f1112d538e42c</guid>
<pubDate>Tue, 23 May 2023 19:47:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>Wyoming-County-Community-Health-System</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53ea9fb83fb08ac01e0a17ce4b709db99e8268c1d396ed2e5c32bbf971d88fbf</i><br /><br />Threat actor <b>description</b>: <i>Wyoming County Community Health System has been serving Wyoming County and the surrounding area for over 110 years and continues its commitment of providing outstanding healthcare services for our rural community.WCCHS, a full service, County-owned health system comprised of a 62-bed...</i><br />Target victim <b>website</b>: <i>https://www.wcchs.net/</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>ePerformax</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8040</link>
<guid>544defa9fddff50c53b71c43e0da72be</guid>
<pubDate>Tue, 23 May 2023 19:47:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>ePerformax</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2512b8f7b6185fb92d073c59135729245a7ee8738124db4a0d226211e9282a21</i><br /><br />Threat actor <b>description</b>: <i>In 1988 the Performance Consulting Group was founded by Teresa Hartsaw in Memphis, TN as a marketing, training, customer contact and customer engagement company focused on providing end-to-end customer contact solutions for clients on an outsourced basis. The company's goal was simple - to maximize...</i><br />Target victim <b>website</b>: <i>www.eperformax.com</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hyundai-Motors-Etats-Unis</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8041</link>
<guid>1a07bcc79f21590b3ed2622d5807bdd0</guid>
<pubDate>Tue, 23 May 2023 19:47:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>Hyundai-Motors-Etats-Unis</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>910a50b3a038b42e501b37bafd84c598a48baf88b9260c6e009db25e8be77889</i><br /><br />Threat actor <b>description</b>: <i>Hyundai%20Motors%20Etats-Unis%20is%20a%20company%20that%20operates%20in%20the%20Automotive%20industry.%20It%20employs%20251-500%20people%20and%20has%20%2425M-%2450M%20of%20revenue.%20The%20company%20is%20headquartered%20in%20Casablanca%2C%20Grand%20Casablanca%2C%20Morocco.</i><br />Target victim <b>website</b>: <i>www.hyundai.ma</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chattanooga-State-Community</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8042</link>
<guid>6ebb69ffbebe9fd95d160ffc29e0fe5d</guid>
<pubDate>Tue, 23 May 2023 19:47:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>Chattanooga-State-Community</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1243cde1e1b1efa1e18630b221e3fb546cbf25583f6c158375a1064a9fe56f75</i><br /><br />Threat actor <b>description</b>: <i>Chattanooga State Community College is a public community college in Chattanooga, Tennessee. The college is a member of the Tennessee Board of Regents System and is accredited by the Southern Association of Colleges and Schools (SACS).Chattanooga State offers a variety of programs...</i><br />Target victim <b>website</b>: <i>https://chattanoogastate.edu/</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Miami-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8043</link>
<guid>5bd529d5b07b647a8863cf71e98d651a</guid>
<pubDate>Tue, 23 May 2023 19:47:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>Miami-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>887276fb912309e1463bb06d1d5d3e93d5c4a9e08d30fb1f90b063bb65e1e7e3</i><br /><br />Threat actor <b>description</b>: <i>Established in 1809, Miami University is consistently ranked among the top 50 national public universities by the U.S. News & World Report for providing students with an Ivy League-quality education at a public-school price. Located in quintessential college town Oxford, Ohio-with...</i><br />Target victim <b>website</b>: <i>www.miamioh.edu</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Medical-University-of-the-Americas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8044</link>
<guid>5588902a8054f6e22ed3484c140ffc62</guid>
<pubDate>Tue, 23 May 2023 19:47:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>Medical-University-of-the-Americas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fefa70eb79ea787a07263e17174afec3e8bca6178b9e2658b3703a8ddbef8a28</i><br /><br />Threat actor <b>description</b>: <i>Medical University of the Americas (MUA) is a private for-profit offshore medical school in Charlestown, Nevis. It is owned by R3 Education, Inc. which also owns St. Matthew's University and the Saba University School of Medicine Students at MUA are primarily from the US and Canada and return to...</i><br />Target victim <b>website</b>: <i>www.mua.edu</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Liveaction-inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8046</link>
<guid>68a64c1e5639454c3185e7ea2db9fc48</guid>
<pubDate>Tue, 23 May 2023 19:47:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>Liveaction-inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a04e9cb0d9dc7bc05fd0d09da0013a16b498a870c01a2b0e4516ade653ee32ab</i><br /><br />Threat actor <b>description</b>: <i>LiveAction’s Network Intelligence platform transforms complex data into actionable insights, providing organizations with a comprehensive view of their network, from network and application performance to security. Enterprise teams can rapidly take action to resolve network issues at scale...</i><br />Target victim <b>website</b>: <i>https://www.liveaction.com/</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ingersoll-Rand</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8048</link>
<guid>48dfb0e62ef53dc160c26788433c2d1a</guid>
<pubDate>Tue, 23 May 2023 19:47:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>Ingersoll-Rand</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6e6bc296f97683f39a3b891612999a20f11ba35d367d9846b4874c6c461ad4ef</i><br /><br />Threat actor <b>description</b>: <i>ngersoll Rand is a global market leader with a broad range of innovative and mission-critical air, fluid, energy and medical technologies, providing services and solutions to increase industrial productivity and efficiency. Since merging with Gardner Denver in early 2020, we have more than 300 years of combined experience and innovative expertise</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arrowall</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8049</link>
<guid>a9b94e2e91ee1dae4106f72c3e48880e</guid>
<pubDate>Tue, 23 May 2023 19:47:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>Arrowall</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9d36ed6a58b754a0d68a553c7a37b63f3b30447cf7cad15f8b92dfbfd895267</i><br /><br />Threat actor <b>description</b>: <i>Arrowall Co. is curtainwall designer, manufacturer, and installer with over 30 yearsâ€™ experience in the central Texas market. The company is selective about the amount and type of work it pursues and focuses on â€œGetting It Rightâ€ in every step of the process from estimating to installation in as safe of a manner as possible</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>MSX-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8111</link>
<guid>30410be149e6771f60881182342452d5</guid>
<pubDate>Tue, 23 May 2023 16:08:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>MSX-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>159d19dc0f40a1dec623acfb74e43586462b156a1e7ac4a311ba9718a3744087</i><br /><br />Threat actor <b>description</b>: <i>For more than 25 years, MSX International has been a dedicated partner to leading automotive brands around the world. They support them in transforming their businesses and in managing their operations across the areas of Customer Experience, Repair Optimization, Learning and...</i><br />Target victim <b>website</b>: <i>https://www.msxi.com/en/</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gaston-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8112</link>
<guid>45d6637b718d0f24a237069fe41b0db4</guid>
<pubDate>Tue, 23 May 2023 16:08:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>Gaston-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ae1d2a1fdbd977ed3b31686867a086c327071e87c114790c4e14782ad246b059</i><br /><br />Threat actor <b>description</b>: <i>Gaston College is a public community college in Dallas, North Carolina. Serving Gaston County and Lincoln County, Gaston College enrolls over 5,000 students each term in curriculum programs and about 16,000 students in continuing education programs. It is part of the North Carolina...</i><br />Target victim <b>website</b>: <i>https://www.gaston.edu/</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pueblo-Mechanical--Controls</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8113</link>
<guid>b6417f112bd27848533e54885b66c288</guid>
<pubDate>Tue, 23 May 2023 16:07:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>Pueblo-Mechanical--Controls</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f249f2f41922f89ea4dfd2426ee38a0d04ce6f1957d0647ebe5f013b04bc84cc</i><br /><br />Threat actor <b>description</b>: <i>Pueblo Mechanical & Controls is a leading provider of commercial HVAC and plumbing repair, replacement, and retrofit services across the Sun Belt and Rocky Mountain regions of the US. Founded in 2001, the company primarily focuses on servicing customers in commercial, industrial, education...</i><br />Target victim <b>website</b>: <i>https://pueblo-mechanical.com/</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Canopy-Childrens-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8117</link>
<guid>03492e99e42e7ea8480cdfb4899604f5</guid>
<pubDate>Tue, 23 May 2023 16:03:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nokoyawa</b> claims attack for <b>Canopy-Childrens-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>844978f3af2845f13296702959a2fa743b2851a3f638ac9ec1a57dea31d58665</i><br /><br />Threat actor <b>description</b>: <i>Canopy Children’s Solutions (Canopy), formerly Mississippi Children’s Home Services, is Mississippi’s most comprehensive nonprofit provider of children’s behavioral health, educational, and social service solutions. Founded in 1912 as an adoption agency, Canopy has served the children...</i><br />Target victim <b>website</b>: <i>www.mycanopy.org</i>]]></description>
<category>nokoyawa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Coos-Bay</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7952</link>
<guid>f316e3fe33f1f754851712c760ab9d48</guid>
<pubDate>Tue, 23 May 2023 15:15:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Coos-Bay</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>192608ba603102e97e50723d24e62eade0cbb56bd543136510c7ad170c0c6f64</i><br /><br />Threat actor <b>description</b>: <i>Coos Bay is a city located in Coos County, Oregon, where the Coos River enters Coos Bay on the Pacific Ocean. 248GB of confidential documents, contracts, workers salaries, medical information, forensic examinations, insurance and tax information and much more. Everything flew away from this city government to our blog. Soon you will be able to catch something!</i><br />Target victim <b>website</b>: <i>http://www.co.coos.or.us</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dotcom-Distribution</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7948</link>
<guid>596059d266f32a63144d67628a53db89</guid>
<pubDate>Tue, 23 May 2023 13:34:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Dotcom-Distribution</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a47150bf1e9f23a23f7a8f1f2a0a38f66433ac2c8b4199574b00ab9251d73809</i><br /><br />Threat actor <b>description</b>: <i>Dotcom Distribution is a fulfillment and logistics services provider for emerging and established B2C and B2B eCommerce brands.Total downloaded data - 40gb</i><br />Target victim <b>website</b>: <i>http://www.dotcomdist.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>surfsidefoods.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7950</link>
<guid>08808cfb5939be387af3c159b83c6b98</guid>
<pubDate>Tue, 23 May 2023 13:29:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>surfsidefoods.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>794576c54adc2776a925d0a739313c12738071e13882edd5b66431912583d37d</i><br /><br />Threat actor <b>description</b>: <i>Based in Port Norris, N.J., Surfside Foods is now the leader in harvesting and processing sustainable clams.  Our exclusive focus on supplying Ocean Quahog (Arctica islandica) and Atlantic Surf (Spisula solida) clams and clam juice ingredients at ind...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chattanooga-Heart-Institute</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7951</link>
<guid>416e5cf0acb7e553a880b7647903da6e</guid>
<pubDate>Tue, 23 May 2023 13:28:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>Chattanooga-Heart-Institute</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c2d6de55a03faaaf64a86f8e33cbcce27d661edaa6b838443d326310436f209d</i><br /><br />Threat actor <b>description</b>: <i>The Chattanooga Heart Institute at Memorial offers a comprehensive multidisciplinary approach to cardiac care. Another medical facility doesn't storage personal information safely. Employees and patients' private data will soon be here available for everyone. Medical records, tests results, diagnoses, social security numbers, passports, addresses, phone numbers, financial data and other documents are going to be uploaded.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>M-Metzler--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=8120</link>
<guid>1becf26e9f32353e30870060538746e7</guid>
<pubDate>Tue, 23 May 2023 11:09:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>8base</b> claims attack for <b>M-Metzler--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18c4c42db7cdebb0659c5fa95e6bf29bd2d1f003354b2756878f2ee81e165480</i><br /><br />Threat actor <b>description</b>: <i>M Metzler & Associates is a Accountant located at 11080 Artesia Blvd E, Cerritos, California  90703, US.The business is listed under accountant category.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>8base</category>
</item>
<item xmlns:dc='ns:1'>
<title>Inquirer</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7946</link>
<guid>5d188b044333b4c62676e0d4f53dade7</guid>
<pubDate>Tue, 23 May 2023 08:44:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cuba</b> claims attack for <b>Inquirer</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e91b15892a74473818291dfc1673aba98ce3bc3b3bc182a03a077cd24b695478</i><br /><br />Threat actor <b>description</b>: <i>About The Philadelphia Inquirer, PBCSince 1829, The Philadelphia Inquirer has been “asking on behalf of the people” of Philadelphia and the region by providing essential journalism. Locally owned and headquartered in...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>cuba</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chattanooga-State-Community-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7934</link>
<guid>6c90885b28e58d1f44856d787da2078f</guid>
<pubDate>Mon, 22 May 2023 23:12:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Chattanooga-State-Community-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b594043cd37f92bbbcb75bcfa896900b889fefff2bcd11cbad53e340613454e8</i><br /><br />Threat actor <b>description</b>: <i>Chattanooga State is a special place designed to give you an inviting setting to learn and gather with friends. Our beautiful campus is located on the Tennessee River, just 10 minutes northeast of downtown and serves as the center of the ChattState community. It features</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Poly</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7937</link>
<guid>ca3a856a28df7d77d948949206ff9fdf</guid>
<pubDate>Mon, 22 May 2023 23:12:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Poly</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a930fa3667693448ce8f1f9e453a5a0bdf5c00361207c0dfcf6a6be337d199ae</i><br /><br />Threat actor <b>description</b>: <i>California, United States</i><br />Target victim <b>website</b>: <i>www.poly.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Optimus-Steel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7943</link>
<guid>0163cceb20f5ca7b313419c068abd9dc</guid>
<pubDate>Mon, 22 May 2023 23:12:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Optimus-Steel</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6b9983002b29da4366818d90e69b2b05bb80969f5e4cba3e01c9d6ef16c2403</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.optimus-steelusa.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aria-Online</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7945</link>
<guid>bef3c6e0d3b86a587cca64bc4f01d4e2</guid>
<pubDate>Mon, 22 May 2023 23:12:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Aria-Online</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f5320369a6e69eaf39137d9b75a9574ea650bd0b3d753ca9be1f248d1829e31b</i><br /><br />Threat actor <b>description</b>: <i>Louisiana, United States</i><br />Target victim <b>website</b>: <i>www.ariaonline.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alconex-Specialty-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7930</link>
<guid>2b52541089a553056a5558611365cc6a</guid>
<pubDate>Mon, 22 May 2023 19:14:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Alconex-Specialty-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e3634f5b7333b1d4cb26ab67c0af93587fbe761f0706ad2f001a7e166b3d682</i><br /><br />Threat actor <b>description</b>: <i>The company that produces and supplies magnet wire for manufacturers globally.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zoni-Language-Centers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7932</link>
<guid>7fc346397dc202259f27edc7d2adec88</guid>
<pubDate>Mon, 22 May 2023 19:13:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Zoni-Language-Centers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2e3ac5e8b3b6dcccf5e8a63ca11239fa63887b6544bb35ad2f7760d7aaa20488</i><br /><br />Threat actor <b>description</b>: <i>Zoni is one of the leaders in international language and College placement education.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Westside</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7928</link>
<guid>7a22c0c0a4515485e31f95fd372050c9</guid>
<pubDate>Mon, 22 May 2023 17:20:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Westside</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a66600d5b9fca8d8c5da239ce901ce2f264a50cb1e0dd6002c4cb34e4eb4b98</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://westside-health.org</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>TA-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7925</link>
<guid>de5eeca522e12fd5c9ff9077408dcf17</guid>
<pubDate>Mon, 22 May 2023 13:32:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>TA-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>87f3fe600d5b59f87e6aace8fe0bdfb04d1394be35fefb613e6be5499393f569</i><br /><br />Threat actor <b>description</b>: <i>T&A Supply Company, Inc. distributes various flooring products in the United States. It offers commercial and residential flooring products, such as carpets and carpet cushions, ceramic and porcelain tiles, wood flooring products, and laminate flooring productsTotal downloaded data - 1tb</i><br />Target victim <b>website</b>: <i>http://www.tasupply.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Technology-and-Telecommunications-Consultants-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7916</link>
<guid>e0854e3c03ec877be65d351b90680d46</guid>
<pubDate>Mon, 22 May 2023 11:20:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trigona</b> claims attack for <b>Technology-and-Telecommunications-Consultants-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>23e9ae58faa43e2e6a78fc0718be1062450b2490c4148841d92335aa19afae03</i><br /><br />Threat actor <b>description</b>: <i>Technology and Telecommunications Consultants Inc (TTC) is a US-based consulting firm that specializes in providing technology and telecommunications solutions to businesses across different industries.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>trigona</category>
</item>
<item xmlns:dc='ns:1'>
<title>Utah-Yamas-Controls</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7917</link>
<guid>1bd2caf96a17d892c2c7e9959549cfc7</guid>
<pubDate>Mon, 22 May 2023 11:20:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Utah-Yamas-Controls</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a491e270694bedb55df5409ccb59414285f500b951a5d0045c4160bcbb6da4e</i><br /><br />Threat actor <b>description</b>: <i>Reports \ Drawings \ Users Folders</i><br />Target victim <b>website</b>: <i>http://www.utahyamas.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Atlas-Commodities</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7918</link>
<guid>bc3744cb38c6cf6b17e8814a9c2688a3</guid>
<pubDate>Mon, 22 May 2023 11:20:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Atlas-Commodities</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2d7b54a05174e76edde85770c7fbf9928921cf1c30fe4a45b4b048f8ab82b0e8</i><br /><br />Threat actor <b>description</b>: <i>HR \ Accounting \ Banking</i><br />Target victim <b>website</b>: <i>http://www.atlascommodities.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Morris-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7919</link>
<guid>d800149d2f947ad4d64f34668f8b20f6</guid>
<pubDate>Mon, 22 May 2023 11:19:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Morris-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>82a15c2c28bf212cb7dc3d9141322b60e0dec4ee52db29a36cd70f737a48c0b5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://morrishospital.org</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>rapidmoldsolutions.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7915</link>
<guid>20568692db622456cc42a2e853ca21f8</guid>
<pubDate>Mon, 22 May 2023 05:09:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>rapidmoldsolutions.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ddaf2dc2074f65b63383c0e5a45ced6786f6cbca71e0b661aba54167cee9389</i><br /><br />Threat actor <b>description</b>: <i>Rapid Mold Solutions, Inc. is an innovative, technologically sophisticated, full-service tool & die manufacturer and high-speed, precision, machine shop with global headquarters located in Erie, Pennsylvania; founded in 1999 by Damian Kuzmin and Scot...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>FRESCA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7908</link>
<guid>42d0c639a21482dcd8e1c447efe87e89</guid>
<pubDate>Mon, 22 May 2023 02:41:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>FRESCA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b300d0c5e8c118e1f1f16cf9e854ab8fad26d4b102bf5e2e6c898da3b5472005</i><br /><br />Threat actor <b>description</b>: <i>Fresca is a grapefruit-flavored citrus soft drink created by The Coca-Cola Company.Borrowing the word Fresca (meaning "fresh") from Italian, Spanish and Portuguese, it was introduced in the United States in 1966. Originally a bottled sugar-free diet soda, sugar sweetened versions were introduced in some markets.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>MSSNY</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7909</link>
<guid>6b5617315c9ac918215fc7514bef514b</guid>
<pubDate>Mon, 22 May 2023 02:41:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>MSSNY</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>08823a30f6882053da2b57f3916798c62a1a3d0a97b414d12fc9c904c7c22731</i><br /><br />Threat actor <b>description</b>: <i>The Medical Society of the State of New York (MSSNY) is an organization of approximately 30,000 licensed physicians, medical residents, and medical students in New York State. Members participate in both the state society and in their local county medical societies.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>LiveAction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7910</link>
<guid>49e863b146f3b5470ee222ee84669b1c</guid>
<pubDate>Mon, 22 May 2023 02:40:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>LiveAction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d345b562aac3cfbc170a0d3061c5e2e13a39bcf875a05cef7545aec5ef44eb5c</i><br /><br />Threat actor <b>description</b>: <i>LiveAction’s Network Intelligence platform transforms complex data into actionable insights, providing organizations with a comprehensive view of their network, from network and application performance to security. Enterprise teams can rapidly take action to resolve network issues at scale, accelerate threat response, increase employee productivity, and</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>diasporacs.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7904</link>
<guid>b5d62aa6024ab6a65a12c78c4c2d4efc</guid>
<pubDate>Sun, 21 May 2023 22:35:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>diasporacs.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe29e840ce59111c0e3a4e4f6271b2311b40dbfcfa0c7073fdc730e829f786fa</i><br /><br />Threat actor <b>description</b>: <i>Diaspora Community Services is a social support service agency that empowers families and individuals to maximize their abilities to succeed through culturally sensitive health promotion, family support services and advocacy.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Reach-Cooling-Group-was-hacked.-A-company-whose-cooperation-is-dangerous-to-your-business-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7901</link>
<guid>3e883840fee4384dd3d2afea5e822517</guid>
<pubDate>Sun, 21 May 2023 12:49:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Reach-Cooling-Group-was-hacked.-A-company-whose-cooperation-is-dangerous-to-your-business-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a563e992bd2652b001ab1c0e83722a1c47eb383c1e35a0628a9f469c02567c74</i><br /><br />Threat actor <b>description</b>: <i> Who is Reach Cooling Group  Reach is a privately held international organization with branches located in various countries around the world. The corporate headquarters is located in Miami, Florida, USA and the manufacturing facilities are located in Shanghai, China.   Headquarters: 625 E 10th Ave, Hialeah, Florida, 33010, United States Phone Number: (305) 863-6360 Website: www.reachcooling.com Linkedin: http://www.linkedin.com/company/reach-cooling-group Facebook: http://www.facebook.com/reachcooling Twitter: http://www.twitter.com/reachcooling</i><br />Target victim <b>website</b>: <i>www.reachcooling.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>ebdlab.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7900</link>
<guid>400c3241004b5db7ca7f5abfef2794f2</guid>
<pubDate>Sun, 21 May 2023 06:40:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ebdlab.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4e6f7a6aaf146aed7b30c1ea2c9d93f63593c9e87c73f4428588e81347c5edcb</i><br /><br />Threat actor <b>description</b>: <i>We welcome all your cases – from single units and simple cases, to full-mouth restorations which may be esthetically or functionally complex. We believe in supporting dentists and dental technicians who strive to be at the top of their profession. It...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advantage-Resourcing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7872</link>
<guid>b543376b5721da011b230ba7ae9dd619</guid>
<pubDate>Fri, 19 May 2023 17:16:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Advantage-Resourcing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f688301665ffb40a596212272e7839689910a405b752452e117b6a429eb580b1</i><br /><br />Threat actor <b>description</b>: <i>Advantage Resourcing specializing in multiple human capital management services including contingent staffing, direct & permanent hire, on-site staffing management services, and others. This company lost its advantage as we obtained some of its resources and are ready to upload it here. Their contingent couldn't manage their network properly and lost 916gb including databases.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>csagh.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7869</link>
<guid>398024cb5e21d749d728926a28b19d00</guid>
<pubDate>Fri, 19 May 2023 14:35:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>csagh.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8a10f3513a8c365d3bfd380192f68bc3bbf42045ba47bf157a5f823128775f38</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2017, The Christian School Association of Greater Harrisburg is a district of Christian schools that teach children ages K-12. Their main office is based in Harrisburg, Pennsylvania.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Dallas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7867</link>
<guid>10fb6cfa4c990d2bad5ddef4f70e8ba2</guid>
<pubDate>Fri, 19 May 2023 13:32:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>City-of-Dallas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>73437479fb2e6ccaa3b5326e8e25e081bb17dcb669653af4d2fe9eb7cf4c4780</i><br /><br />Threat actor <b>description</b>: <i>“There is still no indication that data from residents, vendors or employees has been leaked,” Dallas said Monday in a statement. So, we are going to indicate that the data will be leaked soon. We will share here in our blog tons of personal information of employees (phones, addresses, credit cards, SSNs, passports), detailed court cases, prisoners, medical information, clients' information and thousands and thousands of governmental documents.</i><br />Target victim <b>website</b>: <i>http://www.dallascityhall.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>It-Works-Global</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7866</link>
<guid>1963bd5135521d623f6c29e6b1174975</guid>
<pubDate>Fri, 19 May 2023 10:39:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>It-Works-Global</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f5fb54de552694e00a1275796a748b1533a5fd838f3feb551926a947b82e0a7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>shoreregional.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7862</link>
<guid>a6b964c0bb675116a15ef1325b01ff45</guid>
<pubDate>Thu, 18 May 2023 17:14:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>shoreregional.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91217269d5cee66986be70a4bfb6461ac6e0d554f2411eec698987322649b599</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>enovationcontrols.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7861</link>
<guid>aa78c3db4fc4a1a343183d6113ec46ba</guid>
<pubDate>Thu, 18 May 2023 16:35:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>enovationcontrols.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f49e53248ca18d31f388ccec25290ff0a6946fbee864d9409a08de8a184cd38</i><br /><br />Threat actor <b>description</b>: <i>first part of dataEnovation Controls operates today as a stand-alone subsidiary of Helios Technologies [NASDAQ: HLIO] (formerly Sun Hydraulics Corp.). With an internationally diverse team of over 300 employees, we serve customers around the world...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>NASHUA-SCHOOL-DISTRICT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7859</link>
<guid>97d0e0329055e6ddaaaf2335a2509231</guid>
<pubDate>Thu, 18 May 2023 13:28:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>NASHUA-SCHOOL-DISTRICT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>136e7824c6db30a84046d45d15708be9bcf2c0209b17ef27540bc37369953563</i><br /><br />Threat actor <b>description</b>: <i>The Nashua, New Hampshire School District is a city of 88,000 residents with much to offer. Most notably, the City has a long tradition of supporting public education, both with resources and volunteers. The School District doesn't need it's 728GB of data containing SSNs, passports, forms with personal data both of employees and students. Confidential document and a crazy amount of databases will be uploaded here as well. Stay in touch. </i><br />Target victim <b>website</b>: <i>http://www.nashua.edu</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>TaslyUS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7854</link>
<guid>a0046ad4c1bafc4ef04e41e755f28368</guid>
<pubDate>Thu, 18 May 2023 06:41:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>TaslyUS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc6d25104b992c0c570c1dadb20318830b4c27b5aea31c51346de4b1b69be81f</i><br /><br />Threat actor <b>description</b>: <i>Tasly Pharmaceuticals, Inc. (Tasly U.S.) is “Dedicated to a Healthier World.”  And our vision is that the world will change the way it takes and understands medicine.    Founded in 2006, and following years of research and development, Tasly U.S., based in Rockville, Maryland, is positioned to become a world-renowned innovator in pharmaceuticals, biologics, and nutraceuticals.  Among our key accomplishments to date:  T89 (Dantonic) has become the first herbal medicine-derived compound to complete an FDA Phase III global trial, yielding promising data.  Results indicate that T89’s pharmacological functionalities express clinically significant benefits, including improving blood circulation, boosting energy metabolism level, and reducing blood viscosity.  Tasly U.S. believes our initial success with T89 will pave the way for the broader use of herbal medication as an effective and safe alternative to synthesized chemical and biological treatments.</i><br />Target victim <b>website</b>: <i>https://www.taslyus.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Magic-Aire</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7849</link>
<guid>ae3f4c649fb55c2ee3ef4d1abdb79ce5</guid>
<pubDate>Wed, 17 May 2023 13:29:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Magic-Aire</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5986edb4a1faab29560af536405b2a5fe79cc07eb105b7165c369e05296bc357</i><br /><br />Threat actor <b>description</b>: <i>Magic Aire is an independent Manufacturer of Heating, Ventilation and Air Conditioning (HVAC) components, fan coils, air handlers and unit ventilators. Our Company sets the industry benchmarks for on-time delivery, ease of doing business and lowest warranty rates.</i><br />Target victim <b>website</b>: <i>https://www.magicaire.com/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>PM-Medical-Billing-was-hacking.-A-company-with-multiple-vulnerabilities-in-its-network-all</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7847</link>
<guid>d55cbf210f175f4a37916eafe6c04f0d</guid>
<pubDate>Wed, 17 May 2023 08:39:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>PM-Medical-Billing-was-hacking.-A-company-with-multiple-vulnerabilities-in-its-network-all</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>88a49f90c8c252d172138274b3afda73ee6f13d000825e9368a46576f706ad3b</i><br /><br />Threat actor <b>description</b>: <i>Who is PM Medical Billing  For over 20 years, P.M. Medical Billing Corp of Oyster Bay, New York has been the nation's leader in medical billing and practice management exclusively to all sub-specialties of ophthalmology and optometry.  Headquarters: 111 South St Ste 6, Oyster Bay, New York, 11771, United States Phone Number: (516) 922-9571 Website: www.pmbiller.com Facebook: http://www.facebook.com/pm-medical-billing-corp-160923807266011</i><br />Target victim <b>website</b>: <i>www.pmbiller.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Electrostim-Medical-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7846</link>
<guid>808e22af6c33eea22608f30cef458844</guid>
<pubDate>Wed, 17 May 2023 06:41:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Electrostim-Medical-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b9a522f68dcac773c2a6f24d832862a7e13fd569777d8a8b37e59098fd0c169</i><br /><br />Threat actor <b>description</b>: <i>EMSI is a privately held company located in Tampa, Florida. We are a medical device company specializing in home electrical stimulation devices, bracing, and accessories for pain management and physical rehabilitation.​</i><br />Target victim <b>website</b>: <i>https://wecontrolpain.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Feit-Electric</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7840</link>
<guid>dc9fa5f217a1e57b8a6adeb065560b38</guid>
<pubDate>Tue, 16 May 2023 13:29:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trigona</b> claims attack for <b>Feit-Electric</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2da5dbce2d043f57c9f5c57a0ea2634f008feb1de9056f3ec8b87181974cc483</i><br /><br />Threat actor <b>description</b>: <i>Feit Electric is a leading lighting manufacturer and distributor in California, United States known for its energy-efficient and high-quality LED lighting solutions.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>trigona</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.l3harris.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7836</link>
<guid>6354461b879d3b121b0c33d5e7e5da4f</guid>
<pubDate>Mon, 15 May 2023 21:05:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>www.l3harris.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f834b675fa34b4066477a95e4eff7e0bd85e2aec9acb81cccef77dcdd0877f1</i><br /><br />Threat actor <b>description</b>: <i>17 VM from wsots.net (Wideband Satellite Communications Operations and Technical Support)</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>BAMSI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7834</link>
<guid>c44bebb973e14fe539676e0e9155b121</guid>
<pubDate>Mon, 15 May 2023 19:17:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>BAMSI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8324563b09e4630837ea64451229509c45dd5c73a2d6d09ca749818e90b58bff</i><br /><br />Threat actor <b>description</b>: <i>BAMSI is a private, non-profit social services organization that provides behavioral health and public health services to adults and children with developmental disabilities and mental illnesses. BAMSI was founded in 1975 and is headquartered in Brockton, Massachusetts, with 50,000 patients served annually.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>wsots.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7835</link>
<guid>62ce4772adc0fbeae29391fc0e22509c</guid>
<pubDate>Mon, 15 May 2023 19:15:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>wsots.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9030ad3ca365ec934576818f05f4b079623b9ff853fcaa17ddd1de94de505632</i><br /><br />Threat actor <b>description</b>: <i>17 VM from wsots.net (Wideband Satellite Communications Operations and Technical Support)</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>PCS-Wireless</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7833</link>
<guid>4747f5ca63b8e8bd670b26e4b1573961</guid>
<pubDate>Mon, 15 May 2023 18:43:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>PCS-Wireless</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d244c42f7cea2b2dde570a09a22ce8234fd8aee94002a7ef1105ab7ec2f3fbe8</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2001, PCS has grown from a wireless device reseller on Madison Avenue in New York, to the global leader in the secondary mobile device industry. That’s due to our founders, Ben and Praveen, whose vision for refurbished mobile devices has led them to expand into new countries and develop new products and services that have grown the market over time. As the secondary mobile market grew, so did we.</i><br />Target victim <b>website</b>: <i>https://www.pcsww.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Parker-Drilling</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7831</link>
<guid>ef48e3ef07e359006f7869b04fa07f5e</guid>
<pubDate>Mon, 15 May 2023 17:15:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Parker-Drilling</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>116631bb88f57950beb8e6b2ea11d36537be9b9e325da979180480f8339c1a13</i><br /><br />Threat actor <b>description</b>: <i>Parker Drilling is a drilling solutions company that provides support services to the oil and gas industries. We have spent some time in Parker's network and obtained 675GB of their interesting papers. Their accounting and human resources work well. So detailed data. Almost full set of personal documents of employees, numerous contracts and projects. You will be able to download everything soon as always.Enjoy!</i><br />Target victim <b>website</b>: <i>http://www.parkerdrilling.comwww.parkerwellbore.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>norcorp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7832</link>
<guid>ed0e6f99c817e0b50d01e7254971e560</guid>
<pubDate>Mon, 15 May 2023 17:10:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>norcorp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e1426b472973d90b0f506f146efe79ca7c6ea389d60ac70d69c3c744b0217290</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1908, Northern Engraving Corporation is a leading supplier of nameplates and decorative trim to a variety of markets. Value-added services include in-house Design, Engineering, Program Management.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>York-County-School-of-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7828</link>
<guid>9f564fef13bb8a7f9faa5f9071e4e045</guid>
<pubDate>Mon, 15 May 2023 13:27:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>York-County-School-of-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be3ae67399748b342926f48dd37208f104cb05f2c76fffc5a72b5e2278e54072</i><br /><br />Threat actor <b>description</b>: <i>York County School of Technology offers educational opportunities where every student is guided and encouraged to reach his or her full potential. Nearly 368GB of their data will be shared this week. Students' IDs, State Secure IDs, SSNs, addresses, same employee's information, incidents reports, correspondence with government, accounting documents and many other. Stay in touch!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>Academy-Mortgage-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7823</link>
<guid>14ad095ecc1c3e1b87f3c522836e9158</guid>
<pubDate>Mon, 15 May 2023 08:41:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Academy-Mortgage-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22dd40285263665cf11690be6df4d6766dd977bac01ac26c730cb092feb35039</i><br /><br />Threat actor <b>description</b>: <i>Academy Mortgage is a family-owned mortgage company based in Draper, Utah, which was founded in 1988. Academy is a direct lender, meaning it handles all of its underwriting and funding in house. It offers both new purchase mortgages and refinance loans, originating more than $15.65 billion in loans in 2021.  Duane is the principal owner and founder of Academy Mortgage Corporation, a national mortgage banking firm with its headquarters in Draper, Utah. Duane started Academy Mortgage in 1988. Academy has over 350 branch offices across the country; and is licensed to originate loans in 49 states and the District of Columbia.</i><br />Target victim <b>website</b>: <i>https://academymortgage.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>pikenursery.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7820</link>
<guid>9c4e6233c6d5ff637e7984152a3531d5</guid>
<pubDate>Sun, 14 May 2023 22:36:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>pikenursery.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>65d86ff3b29d6ea62f887cd68b91f9dcfff4b58fccdf7af35084ea0e5cbf6000</i><br /><br />Threat actor <b>description</b>: <i>We strive to take the guesswork out of gardening by providing our communities with the best horticultural knowledge, the best assortment of quality plants and garden related products that thrive in our climate, and thoughtful customer service. We are...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wallick-Communities</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7814</link>
<guid>1ba922ac006a8e5f2b123684c2f4d65f</guid>
<pubDate>Fri, 12 May 2023 23:13:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Wallick-Communities</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>95dd3b4aa11c3e4ce61cd754a8bf02a1f8031e609c7bc023c41895e3b770ea88</i><br /><br />Threat actor <b>description</b>: <i>Wallick Communities provides property management, development, construction, and asset management for affordable housing and senior living communities. The company was founded in 1966 and is headquartered in New Albany, Ohio</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aspen-Dental-Management-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7880</link>
<guid>46ba59a6994802347d659680875fb173</guid>
<pubDate>Fri, 12 May 2023 22:35:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>moneymessage</b> claims attack for <b>Aspen-Dental-Management-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5390c8985788ad27a267839bd6b918599d3898a9ada8e04e226f89451a9bd8e4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>moneymessage</category>
</item>
<item xmlns:dc='ns:1'>
<title>Peachtree-Orthopedics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7812</link>
<guid>eefc7bfe8fd6e2c8c01aa6ca7b1aab1a</guid>
<pubDate>Fri, 12 May 2023 17:14:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>Peachtree-Orthopedics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>632e231002adf3b58b5f9a46c6e671389c276aa14b8bac21b1ee144249d7b025</i><br /><br />Threat actor <b>description</b>: <i>Since 1953, Peachtree Orthopedics has been serving the orthopedic needs of the greater Atlanta community. We have from the 194GB of data that includes many lines with SSNs, almost 1000 of credit cards, other detailed personal information, medical records and tons of corporate data. We'll share it soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>prolinerrescue.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7808</link>
<guid>f04b8b59e703ac3889bf1ce4ca52db81</guid>
<pubDate>Fri, 12 May 2023 10:38:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>prolinerrescue.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c98622a0d3362d3e830c512bf3dbc70101018442cd15c438007053a4a153b6b</i><br /><br />Threat actor <b>description</b>: <i>Proliner is an independently owned and operated family business. Our staff is comprised of highly experienced, knowledgeable certified technicians. We take the time to know our customers needs. When you deal with us, you're not just a number, you're...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>pwlawfirm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7806</link>
<guid>d0997de7af2f5d411d6b9c5ac64f53a0</guid>
<pubDate>Fri, 12 May 2023 07:08:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>pwlawfirm.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>953445216603f7db883f91d58e63d032166a72fc01e9b2f2b82d09dfccde8444</i><br /><br />Threat actor <b>description</b>: <i>Piasecki & Whitelaw, LLC 385G uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>ResultsCX--The-result-of-many-unknown-breaches</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7803</link>
<guid>12e35d9186dd72fe62fd039385890b9c</guid>
<pubDate>Thu, 11 May 2023 22:37:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>ResultsCX--The-result-of-many-unknown-breaches</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cf90ca917fcf974291380c9adcd63f9d92f96f1bf7efccd2bef4272937d11c4e</i><br /><br />Threat actor <b>description</b>: <i>This company claims to offer "AI-Empowered Customer Experience Solutions," but perhaps they actually provide automated systems operated by individuals lacking critical thinking abilities.</i><br />Target victim <b>website</b>: <i>https://results-cx.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vascular-Center-of-Intervention</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7796</link>
<guid>94841421fb5e84a4d83e303949e6b211</guid>
<pubDate>Thu, 11 May 2023 21:08:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Vascular-Center-of-Intervention</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>11372eb917c10ef30096c25d5966316d87ce6452a994e868dc28c4445089be81</i><br /><br />Threat actor <b>description</b>: <i>Vascular Center of Intervention is a company that operates in the Hospital & Health Care industry. It employs 6-10 people and has $0M-$1M of revenue. The company is headquartered in Fresno, California.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Albany-ENT--Allergy-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7798</link>
<guid>71e9c6620d381d60196ebe694840aaaa</guid>
<pubDate>Thu, 11 May 2023 21:07:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Albany-ENT--Allergy-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b15022b89caace7e6f0de8ddb2e6f59e2719315f5fb5cc129d19edeab95c167</i><br /><br />Threat actor <b>description</b>: <i>Albany ENT & Allergy Services is a comprehensive practice devoted to the care of adults and children with disorders of the ear, nose, throat, head and neck. Clinic has a particular interest in allergy diagnosis and immunotherapy as well as sleep disorders, etc..</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>DA-Alexander-Company-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7800</link>
<guid>6822951732be44edf818dc5a97d32ca6</guid>
<pubDate>Thu, 11 May 2023 21:07:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>DA-Alexander-Company-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ec587037cc484ff43dee354ff146eebf49c1961a50860a62bde85289c5d05f7f</i><br /><br />Threat actor <b>description</b>: <i>The company provides high quality landscape design, installation and maintenance services for residential, commercial and industrial properties.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>North-Shore-Medical-Labs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7802</link>
<guid>ad551fd8c04785df87b7ae269a20c243</guid>
<pubDate>Thu, 11 May 2023 21:06:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>North-Shore-Medical-Labs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8355e4e6a4ad2ffbc451ad222498f6564e24079a3e123859bc78a31099de1054</i><br /><br />Threat actor <b>description</b>: <i>North Shore Medical Labs (NSML) is a full-service clinical reference laboratory, dedicated to serve the individual needs of the healthcare provider through a committed staff, client focused and service oriented organization. NSML is fully accredited and licensed by the College of American Pathologists (CAP), New York State Department of Health, the Center for Medicare and Medicaid Services (CLIA).</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bluefield-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7805</link>
<guid>c39b9a47811f1eaf3244a63ae8c22734</guid>
<pubDate>Thu, 11 May 2023 17:33:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>Bluefield-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>95ddbddb3b326f5148439986a7dfcd4b26e66fefafb4a409f9e8a79677611776</i><br /><br />Threat actor <b>description</b>: <i>1.2 TB data from a college with cyber insurance policy that doesn't care about protecting students. Management is a circus attempting to identify breach (good luck) and lying to students and media about the severity. We'll continue attacking for wasting our time.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gregory-Poole-Equipment-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7792</link>
<guid>33866f3a2397f4b156ed5a31f5ba7964</guid>
<pubDate>Thu, 11 May 2023 15:08:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Gregory-Poole-Equipment-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f515cecea8bf87882d866891e30245e1c5ea22b0f15eb759ca88b416500c910c</i><br /><br />Threat actor <b>description</b>: <i>Gregory Poole Company was simple. This company as the executive CAT construction equipment dealer offers you access to it's data full of contracts, payment details, clients' information and projects of a variety of big names in the business. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Axiom-Professional-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7784</link>
<guid>9ed017d7372360c256add7a8fe35a0a6</guid>
<pubDate>Thu, 11 May 2023 09:14:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trigona</b> claims attack for <b>Axiom-Professional-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ae6ccae36d4d900b9abd49ea4018e5bd34093969988728745624aec26827cbf8</i><br /><br />Threat actor <b>description</b>: <i>Axiom Professional Solutions providing comprehensive recruiting, placement and staffing services for a variety of positions within the automotive industry and light industrial sectors.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>trigona</category>
</item>
<item xmlns:dc='ns:1'>
<title>JP-Maguire--Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7782</link>
<guid>ac5c482277858d6fe45065d0a3f92b0c</guid>
<pubDate>Wed, 10 May 2023 23:12:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>JP-Maguire--Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>afd7ab9c9c236328e4c51d5d22e63bca1018ae016e7755d9494d6db4dad98786</i><br /><br />Threat actor <b>description</b>: <i>Connecticut, United States</i><br />Target victim <b>website</b>: <i>www.jpmaguire.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sun-Windows</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7778</link>
<guid>24389bfe4fe2eba8bf9aa9203a44cdad</guid>
<pubDate>Wed, 10 May 2023 19:17:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Sun-Windows</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8f0e03700f9ebb431dbfb3ced1c5891266627cb3a051abfcd05c0dcdf0e7527e</i><br /><br />Threat actor <b>description</b>: <i>Sun Windows is a manufacturer of windows and doors for the residential housing and light-commercial building industry. We've opened the doors of this company and had a fascinating trip through their network. We could share the details of the trip with everyoneinterested or help to arrange one.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Columbia-Distributing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7780</link>
<guid>604616e4d592b744e14ec3ff33204dec</guid>
<pubDate>Wed, 10 May 2023 19:17:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Columbia-Distributing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8555db49db7a0dad20b50b4c7f66f51fb1c7c03dd1dc40b6d72b4e7057d0350b</i><br /><br />Threat actor <b>description</b>: <i>Started in 1935 Columbia Distributing has distributed some of thebest-known brands in the beverage business. There won't be a joke about corporate data distribution. We want to inform you all only that such a giant will disclose his secrets here for you (withour assistance surely). He has a lot for you to dig in and you will be able to do it soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Houser-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7774</link>
<guid>c1619d2ad66f7629c12c87fe21d32a58</guid>
<pubDate>Wed, 10 May 2023 18:51:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Houser-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4db7414a38326e2cf0d556cc2dcc3833215035e8979f71ee56c20690ca8ed558</i><br /><br />Threat actor <b>description</b>: <i>Houser LLP was formed with the goal of providing the client with exceptional service and big firm results, but not at big firm prices. The Firm’s attorneys are licensed to practice in states across the country. We specialize in business, commercial, real estate litigation and transactions. From the start, we have provided our clients with excellent strategy in their most difficult and complex matters.</i><br />Target victim <b>website</b>: <i>https://houser-law.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>gocontec.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7771</link>
<guid>cd81cfd0a3397761fac44ddbe5ec3349</guid>
<pubDate>Wed, 10 May 2023 08:39:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>gocontec.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7e66d456e60325a233187af39d638d7dc89bc3c0a9ac02442be34704f85900dc</i><br /><br />Threat actor <b>description</b>: <i>first part of data.Contec Holdings provides repair services to satellite, cable & IP based system operators, B2B, B2C, and E-commerce order fulfillment and logistics services, and in or out of warranty repair services for OEMs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Logisuite</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7769</link>
<guid>3c0cd9bcd0686e8bc0a9047eae120cc5</guid>
<pubDate>Wed, 10 May 2023 04:37:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Logisuite</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aeab9628f48a3ae1285320b1c0f2553dfc985f36e002c5f890b52ce351a81f94</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mercy-Home</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7766</link>
<guid>4b7f871c66be5ac7630c27bb5e21fe7f</guid>
<pubDate>Wed, 10 May 2023 01:17:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Mercy-Home</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>44f7f5b6cb1eea3faf99e7467cd5be58ce1957a5030d008ab534f298aa94e36d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Synergy-Hematology-Oncology-Medical-Associates-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7765</link>
<guid>991d912445bd396599bbb31f697005bc</guid>
<pubDate>Tue, 09 May 2023 22:39:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Synergy-Hematology-Oncology-Medical-Associates-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ae33f6cec0e6e6fab2beeae03ae1ccc1903c8868814199e91dabc0d276e02dd</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mercer-University-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7763</link>
<guid>36ad8b5f42db492827016448975cc22d</guid>
<pubDate>Tue, 09 May 2023 19:17:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Mercer-University-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3ae56a295fa7fc1a79e57d38e89986877b65dc57a5fae7dc14336f150b97733</i><br /><br />Threat actor <b>description</b>: <i>Their mission - to teach, to learn, to create, to discover, to inspire, to empower and to serve. We would add - to disclose. Recently they have fulfilled a data disclosure mission. A 'best value'of national universities doesn't value it's students and teachers personal information and it will be available for downloading in our blog soon. Our offer with a relatively affordable price forsaving their internal data was denied.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>mbwswim.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7752</link>
<guid>804741413d7fe0e515b19a7ffc7b3027</guid>
<pubDate>Tue, 09 May 2023 17:31:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>mbwswim.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be688459ee033f246bc90bfa68b7fa70617542b61ae4cde2bffe8bb3dae0c75d</i><br /><br />Threat actor <b>description</b>: <i>LEADING GLOBAL SWIMWEAR, RESORTWEAR AND LOUNGEWEAR DESIGN AND MANUFACTURING COMPANYManhattan Beachwear’s design headquarters is based in Orange County, California.  We proudly design beautiful swimwear and resortwear. Our brands include: La Blanca,...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Altstadt-Hoffman-Plumbing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7753</link>
<guid>70c767c26cb3143bad5e660504fd6a76</guid>
<pubDate>Tue, 09 May 2023 17:30:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Altstadt-Hoffman-Plumbing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1c97645933903bee28c2156f6c6cf1976a4b79acb5d5ee97cf21f2200668ea5</i><br /><br />Threat actor <b>description</b>: <i>Altstadt Hoffman Plumbing’s highly trained licensed Evansville tri-state plumbers offer a variety of fast, reliable plumbing services for your home or business. Altstadt Hoffman Plumbing offers quality service and specialize in new construction, commercial, industrial, residential, remodeling, and emergency repairs.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Commerce-Pundit</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7756</link>
<guid>517da335fd0ec2f4a25ea139d5494163</guid>
<pubDate>Tue, 09 May 2023 17:29:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Commerce-Pundit</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>855fb01dceb9aabe3b56d7f24a570eea9341a14a4da30394db6c58328ff65695</i><br /><br />Threat actor <b>description</b>: <i>Internet Service Providers, Website Hosting & Internet-related Services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Deer-Lakes-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7757</link>
<guid>8ede06ecd4c633266fdced4089d42ddd</guid>
<pubDate>Tue, 09 May 2023 17:29:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Deer-Lakes-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>20c68a74166da7f6df2c67dcffa833f991b7e230b3b78056b17c16fc8f5df41c</i><br /><br />Threat actor <b>description</b>: <i>The Deer Lakes School District is a small, suburban, K-12 public school district near Pittsburgh which covers East Deer, Frazer, and West Deer townships in Allegheny County, Pennsylvania. Deer Lakes School District encompasses approximately 41 square miles.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>IDEM-Safety-Switches</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7762</link>
<guid>02709600f60cc5f733fd879be89f4b3b</guid>
<pubDate>Tue, 09 May 2023 17:26:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>IDEM-Safety-Switches</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8530cd6ccd62de3394a434b534eb1f9c8be82facf91c2eb64aa8c10962bed084</i><br /><br />Threat actor <b>description</b>: <i>The company offers a diverse range of products covering all aspects of the human-machine interface.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>KLC-Network-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7747</link>
<guid>aaf2979785deb27864047e0ea40ef1b7</guid>
<pubDate>Tue, 09 May 2023 02:54:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>KLC-Network-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f9047ca943f2a2c7280bddca40e4d0cda6afd8024fc8ab45fa62a1f2e757457</i><br /><br />Threat actor <b>description</b>: <i>Virginia, United States</i><br />Target victim <b>website</b>: <i>www.klcnetworks.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>brett-robinson.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7743</link>
<guid>e9f586fda2075a00e9c19361abf115ef</guid>
<pubDate>Mon, 08 May 2023 15:10:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>brett-robinson.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd7b4000304b25451da21337d396b6e2515e2be46eb7eb11a1eb6f9b9239d3e7</i><br /><br />Threat actor <b>description</b>: <i>Brett-Robinson, 393Gb database backups and data from production servers</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>avidxchange.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7744</link>
<guid>320755112b6d9e248ce1c26e1fcf534b</guid>
<pubDate>Mon, 08 May 2023 15:10:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>avidxchange.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3ac316026d1067a3735e89b249e8c2dfa69b0a90bfa9ca1fc630e9bdd818569</i><br /><br />Threat actor <b>description</b>: <i>AvidXchange, Inc All database backups from production servers</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>lssny.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7740</link>
<guid>38ed4039c0b33e2ec51cc4579405d03e</guid>
<pubDate>Mon, 08 May 2023 11:11:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>lssny.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b3b774ca69c8c4cdda3e8de7728459fb625b61408fa4b03212a73d5ba78049f</i><br /><br />Threat actor <b>description</b>: <i>Today, Lutheran Social Services of New York provides a myriad of social services, including helping seniors live independently, finding loving families for children, providing safe and affordable supportive housing, teaching students with special nee...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>unity.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7741</link>
<guid>0defd533d51ed0a10c5c9dbf93ee78a5</guid>
<pubDate>Mon, 08 May 2023 11:10:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>unity.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac1481b418a11987a33981c31830eb3f9556ef0e0106e13e03ee3cda68180efd</i><br /><br />Threat actor <b>description</b>: <i>Unity College is a private college based in New Gloucester, Maine with an additional campus in Unity and facilities in Moose River and Thorndike. It offers undergraduate and graduate education based on sustainability science that emphasizes study of...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>astate.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7739</link>
<guid>7a685d9edd95508471a9d3d6fcace432</guid>
<pubDate>Mon, 08 May 2023 10:36:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>astate.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a2c00f6b1d3af121eb142f618d7ff1d2c60b7985f34958118f12a9331617fd6</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1909, A-State meets the challenges of continuing as a destination university for more than 14,000 students through the combination of world-class research with a long tradition of student-friendly instruction.  The second largest universit...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>First-Community-Credit-Union</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7738</link>
<guid>588fdfa645b7f3c260188494bcafa149</guid>
<pubDate>Mon, 08 May 2023 08:36:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>First-Community-Credit-Union</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f619ce89d51d2f6d620df7e729bb0dc4347b16fbc2fedac4723513ee45b51965</i><br /><br />Threat actor <b>description</b>: <i>ALL DATA AVAILABLE FOR DOWNLOADING!!!</i><br />Target victim <b>website</b>: <i>https://fccu.org/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eagle-Eye-Produce</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7735</link>
<guid>9914464f0e6bdfa960015601578bcf2c</guid>
<pubDate>Sun, 07 May 2023 03:26:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Eagle-Eye-Produce</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df1cf97861daa57c0868797c2770401c70bbaf6ae68055d241320294bcb0098c</i><br /><br />Threat actor <b>description</b>: <i>For over 20 years Eagle Eye Produce has been setting itself apart as an industry leader. Our team is committed to providing our valued customers with high-quality fresh produce, an unmatched customer service experience, at the fairest price. I want to personally thank you for your business and the opportunity for us to service your fresh produce needs.</i><br />Target victim <b>website</b>: <i>https://www.eagleeyeproduce.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Insurance-Providers-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7699</link>
<guid>2048d4501a8ee60d3d586159d163dbeb</guid>
<pubDate>Sat, 06 May 2023 12:51:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ragroup</b> claims attack for <b>Insurance-Providers-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>071320644ca02aa3e68cf7b66e1da3ac9543ccad5612e75b6abd546dc7bf6ee4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ragroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wealth-Enhancement-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7700</link>
<guid>601ac804ce8eac52499a1cde96bae911</guid>
<pubDate>Sat, 06 May 2023 12:51:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ragroup</b> claims attack for <b>Wealth-Enhancement-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5dfa7f3858d07584feb02a54f411f1f8cb8de795abf5893a84b05ada6626e250</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ragroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bisco-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7701</link>
<guid>350a7f5ee27d22dbe36698b10930ff96</guid>
<pubDate>Sat, 06 May 2023 12:51:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ragroup</b> claims attack for <b>Bisco-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>794e00352b59715e245dabab3e254fb450612709a2c065051bd986411e9c4dc7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ragroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>EyeGene</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7702</link>
<guid>8fc4bc380e6185d2f37a64f0c8f34a93</guid>
<pubDate>Sat, 06 May 2023 12:51:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ragroup</b> claims attack for <b>EyeGene</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33cc4c006960fa0dd009e510de19a94748508223fcb54a7495f53124bd5857b4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ragroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Axure-Software-Solutions---a-company-with-an-extremely-low-level-of-protection-was-hacked.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7696</link>
<guid>ac6b3cce8c74b2e23688c3e45532e2a7</guid>
<pubDate>Fri, 05 May 2023 20:37:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Axure-Software-Solutions---a-company-with-an-extremely-low-level-of-protection-was-hacked.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6aa16e9c2646ccf94fd67b557ef8339983ce1bc860d137bc931b35803af1d3e</i><br /><br />Threat actor <b>description</b>: <i>Who is Axure Software Solutions  The Most Secure (NO!) UX Platform. Don't let security hold you back. Host, share, and gather feedback on your UX design projects and Axure RP files using our secure hosting platform, Axure Cloud for Business.  We implement security practices and tools to protect your information and data, from the system architecture to how we operate. Start building Axure UX prototypes today with a free 30-Day trial of Axure RP &amp; host on our secure platform, Axure Cloud for Business.   Headquarters: 707 Broadway Ste 1600, San Diego, California, 92101, United States Phone Number: (619) 272-4489 Website: www.axure.com</i><br />Target victim <b>website</b>: <i>www.axure.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Perry-Law-Firm-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7703</link>
<guid>c1b8bf9e071c0dabb899e7a27f353762</guid>
<pubDate>Fri, 05 May 2023 14:48:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-Perry-Law-Firm-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2bba45c9ddcf65d2bae6e1c1b720da9277e2bdc044244e9c6c86d58084821734</i><br /><br />Threat actor <b>description</b>: <i>The Perry Law Firm provides comprehensive legal representation topublic and private clients in state and federal courts, administrative agencies and alternative dispute forums. Many of the abovementioned clients and Perry's employees will be able to see and even download their own documents here soon. We welcome everyone to look for something interesting too as a lot of personal documents will be released. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>TrueLogic-truelogiccompany.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7705</link>
<guid>76d4110e944e83212bafa4b11ebf2b7e</guid>
<pubDate>Fri, 05 May 2023 11:20:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rancoz</b> claims attack for <b>TrueLogic-truelogiccompany.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1c98b1065ca4722653c19807f1295816934e5759d4793d2ac77febccf17b821</i><br /><br />Threat actor <b>description</b>: <i>Software and services company</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rancoz</category>
</item>
<item xmlns:dc='ns:1'>
<title>Contempo-Card</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7708</link>
<guid>84253ffce9853bdf2518c53ddf3bce65</guid>
<pubDate>Fri, 05 May 2023 11:20:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Contempo-Card</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26adf65ddc078e65b07d404f6e2ef1b62f6f9f17a9622d3ad0af682261a826b4</i><br /><br />Threat actor <b>description</b>: <i>Vark Sr worked with his father in the jewelry manufacturing business in Rhode Island. In the 80’s, Providence, RI was the jewelry capital of the world, and everyone wanted a piece of the jewelry pie. Vark Sr noticed something odd: while the            ...</i><br />Target victim <b>website</b>: <i>contempocard.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Lab-Consulting-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7712</link>
<guid>c5eee1896752e5ac19a3a0bb34fbab4b</guid>
<pubDate>Fri, 05 May 2023 11:16:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-Lab-Consulting-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a8edc8a17a61d2724306b35d41d7856986ca09cc8ceb184083719758ca48f54</i><br /><br />Threat actor <b>description</b>: <i>The Lab Consulting is a management consulting firm focusing on non-technology improvements that was established in 1993. Such companies like this one sometimes forget to be consulted too and as aresult they become the providers of someone's sensitive information. The Lab Consulting data containing tons of their clients information of various directions and their own employees information will soon be uploaded here.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Meade-Tractor</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7685</link>
<guid>1b9a80606d74d3da6db2f1274557e644</guid>
<pubDate>Fri, 05 May 2023 02:21:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Meade-Tractor</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>31bff29826f476f02814c4b60e075b756d11a6ded20d4f33ca379749515b9fac</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://meadetractor.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Essen-Medical-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7684</link>
<guid>af1c25e88a9e818f809f6b5d18ca02e2</guid>
<pubDate>Fri, 05 May 2023 01:21:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Essen-Medical-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c8286a94a03b38108e3a0d07deea9c85a9e1832414e0b4de8dcbe8fc4c0e9545</i><br /><br />Threat actor <b>description</b>: <i>Essen Medical Associates PC is a company that operates in the Hospital & Health Care industry. It employs 101-250 people and has $5M-$10M of revenue.</i><br />Target victim <b>website</b>: <i>https://essenhealthcare.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>joysonsafety.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7682</link>
<guid>1592104031ceaa405b8a103c399e2633</guid>
<pubDate>Thu, 04 May 2023 18:36:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>joysonsafety.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>86cb8d79a6f17716ddacc3e90866b368b58f79cd4cc79fe3d9a2af4c13c05575</i><br /><br />Threat actor <b>description</b>: <i>We took 20TB of data from the company and are publishing the name to encourage them to connect and discuss before we post all the data and cause irrepairable damage to the company. Write in tox https://tox.chat/download.html please 3085B89A0C515D2FB1...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>New-World-Travel-Inc.-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7713</link>
<guid>b55c86af1c55672a8792354910cd548d</guid>
<pubDate>Thu, 04 May 2023 14:48:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>New-World-Travel-Inc.-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0147b35a4f8e9ae7fe3ae3620f72d83c1e36bd0615a3204c194e2327960c2885</i><br /><br />Threat actor <b>description</b>: <i>New World Travel, Inc. is a comprehensive receptive services provider for destinations throughout the USA and Canada. We have something in common with this organization. We've provided receptive services for New World Travel internal documentation that includes, as you understand, great amount of personal information of both their clients and employees. We'll share soon! P.S. Look for a travel agency carefully.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Willamette-Falls</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7680</link>
<guid>73f124c77df247a60e1963b8ab5940da</guid>
<pubDate>Thu, 04 May 2023 14:36:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Willamette-Falls</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>71d71ca84e76e032d4d36fc7b58d6634aabb63001d0790c7eb384cf6e93fa3ca</i><br /><br />Threat actor <b>description</b>: <i>- company's sensitive data (audit, payments, budgets. contacts, vendors, etc)  - employees sensitive data (contracts, contacts, address, payrolls, taxes, etc)  - plant data (blueprints, schemes. floorplans, mill data, etc) </i><br />Target victim <b>website</b>: <i>https://www.wfpaperco.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Garcia-Hamilton--Associates-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7715</link>
<guid>958c530554f78bcd8e97125b70e6973d</guid>
<pubDate>Thu, 04 May 2023 12:51:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Garcia-Hamilton--Associates-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0d55c1bc4f0fdcab015d36dbc770590d56cd3a070d479456e9e9cdd48c989741</i><br /><br />Threat actor <b>description</b>: <i>Garcia Hamilton & Associates is a firm of 29 employees that managers $11 billion. They work with high quality equity, fixed incomeand balanced assets for institutional and high net worth clients. Sound massive for 29 guys. And it is not surprisingly, when they lose over 150GB of their customers' financial information and their own corporate and personal data.  Everything is going to be uploaded soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>layherna.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7679</link>
<guid>333943ff8a14617d66ea94ec176fc787</guid>
<pubDate>Thu, 04 May 2023 12:43:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>layherna.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63e45660d0ff4f8bf2d1a39d9f5247990d8309124c3c1d070cae23d360c31e9c</i><br /><br />Threat actor <b>description</b>: <i>Layher North America is a company that operates in the Construction industry.It employs 251-500 people and has $50M-$100M of revenue. The company is headquartered in Houston, Texas.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Forest-Ridge</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7678</link>
<guid>77b917da760ab9aeca583fd0bb0e1c67</guid>
<pubDate>Thu, 04 May 2023 10:38:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Forest-Ridge</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>10b50c55c8f8d1e3b67eb7579148f3a02126df117e6b010efa2eb8c0b0e728f8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gihealthcare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7677</link>
<guid>6b3c49bdba5be0d322334e30c459f8bd</guid>
<pubDate>Thu, 04 May 2023 08:37:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cuba</b> claims attack for <b>Gihealthcare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>919bd2fa5ac45e543febf532ac3d309cb6ad5981fd7e615f6240b0c7def112fc</i><br /><br />Threat actor <b>description</b>: <i>Your health is our top priority. We specialize in digestive system care and will guide you through every step – whether it’s a routine colon screening, major liver or pancreas issue, or a weight loss journey. With three...</i><br />Target victim <b>website</b>: <i>https://gihealthcare.com/</i>]]></description>
<category>cuba</category>
</item>
<item xmlns:dc='ns:1'>
<title>Midwest-Truck</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7674</link>
<guid>04b001a2057812f735cbcab76fd44e11</guid>
<pubDate>Thu, 04 May 2023 02:26:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Midwest-Truck</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>855e120489a8c6d19efdf5a81be7fad202368a1db98255ff927976fbd5ee98f8</i><br /><br />Threat actor <b>description</b>: <i>Midwest Truck and Auto Parts, Inc. sources and supplies various components to the heavy duty, light duty, and hi-performance aftermarkets worldwide. Someone thinks that if a business is small, that means that it needs nothing to do with clients and employees data to secure them. Same happened to Midwest Truck. Lack of cyber protection has led to upcoming uploading their corporate data with all the personal (drivers licenses, addresses, phones, passports, SSNs) and business (financial docs, bank statements, incident, contract) information  to our blog. Stay in touch.</i><br />Target victim <b>website</b>: <i>http://www.midwesttruck.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>IDTECHPRODUCTS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7676</link>
<guid>cfe8504bda37b575c70ee1a8276f3486</guid>
<pubDate>Thu, 04 May 2023 02:22:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>IDTECHPRODUCTS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>59341d1e2045b43159585f3f8bf88a2430e02a290135045c58f20beb6e9f1ad2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.IDTECHPRODUCTS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gropper--Nejat-PLLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7667</link>
<guid>09853c7fb1d3f8ee67a61b6bf4a7f8e6</guid>
<pubDate>Wed, 03 May 2023 23:09:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Gropper--Nejat-PLLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce28f845943182b569a3981d23ae492e58a161851f8a91161025a3029673e41d</i><br /><br />Threat actor <b>description</b>: <i>Another company that decided it was a good idea to ignore our team. We will now post their customer data in pieces. Pass for archive: moR~?HHJ%IqTymMH7XHv$o7fi</i><br />Target victim <b>website</b>: <i>https://www.groppernejat.com/</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Lowell</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7670</link>
<guid>933596b8ed665b3c5c6ed32079b2d20e</guid>
<pubDate>Wed, 03 May 2023 23:09:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>City-of-Lowell</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c831824cafc9d089682319882caba70d45fba2286a883dfb037ba3b1d74c1a59</i><br /><br />Threat actor <b>description</b>: <i>Lowell, Massachusetts, United States</i><br />Target victim <b>website</b>: <i>www.lowellma.gov</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Negma-Business-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7663</link>
<guid>19d47109e3c9e2c1423eac228aff27d1</guid>
<pubDate>Wed, 03 May 2023 21:13:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Negma-Business-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>120b57b8c73a955cc6ea6bbc1976343dec5cc7e41169b9dd4f7b0d832d407248</i><br /><br />Threat actor <b>description</b>: <i>Texas, United Statesi - Founded in 1996, Negma Business Solutions, Inc. has been leading the way, providing businesses with expertly designed, secured, and dedicated infrastructures to house company networking and cloud equipment in a state-of-the-art, secured, multi-carrier facility.</i><br />Target victim <b>website</b>: <i>www.negma.net</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southern-West-Virginia-Community-and-Technical-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7634</link>
<guid>77bb14f6132ea06dea456584b7d5581e</guid>
<pubDate>Wed, 03 May 2023 15:10:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Southern-West-Virginia-Community-and-Technical-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7465b6d6dacf97c1338c45db8575deb21f86f11867ef217ec8122a998301988</i><br /><br />Threat actor <b>description</b>: <i>Southern West Virginia Community and Technical College is a public community college with its main campus in Mount Gay, West Virginia. There are many sweets inside their 14,5GB data we have: personal information of students and personnel (hundreds of SSNs, medical information and etc.), confidential documents, NDAs and many other. We will soon share it with you here in our blog.</i><br />Target victim <b>website</b>: <i>http://www.southernwv.edu</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-McGregor-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7718</link>
<guid>34f98c7c5d7063181da890ea8d25265a</guid>
<pubDate>Wed, 03 May 2023 11:49:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>The-McGregor-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af0b786563b691f51fd0814bb284492ea17d8dbf231f48432aaa889c399121cd</i><br /><br />Threat actor <b>description</b>: <i>The McGregor company specializes in supplying products, equipment, and consultation to ensure crops are protected for growers. This McGregor was unable to withstand an attack and lost 362GB of data. The content the company has supplied us will be available here soon. Every McGregor falls sometimes.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lawrence-Family-Development-Charter-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7628</link>
<guid>7bb16972da003e87724f048d76b7e0e1</guid>
<pubDate>Tue, 02 May 2023 23:10:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Lawrence-Family-Development-Charter-School</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>31ec4713d77a9b1899df7f42e7ace1cd253261a52481180be895f67d6359b3ea</i><br /><br />Threat actor <b>description</b>: <i>The history of Lawrence Family Development, Inc. (LFD, Inc.) begins with the founding of the Lawrence Youth Commission (LYC). In 1988 the electorate of the City of Lawrence passed an ordinance creating the LYC under the City’s Charter. This new organization was charged with the</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>AvidXchange</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7625</link>
<guid>6cb5da3513bd26085ee3fad631ebb37a</guid>
<pubDate>Tue, 02 May 2023 21:12:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>AvidXchange</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1376796ab5f8743463c1c3c210ecb05fe493e953ea1f9f28fcb6dd11d3ccf879</i><br /><br />Threat actor <b>description</b>: <i>We’re the ones who believe there’s a faster, more efficient way for middle-market businesses to process invoices and make payments; and who, as your ally, want to liberate your AP from all that paperwork that’s slowing down your business and costing you money.</i><br />Target victim <b>website</b>: <i>https://www.avidxchange.com/</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>baycrestpartners.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7626</link>
<guid>0f0d67e214f9fef69b278e3d08114da9</guid>
<pubDate>Tue, 02 May 2023 21:08:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>baycrestpartners.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e42b491b8270bfd3b17a750428bcb1620323a89ca14fadbda40400e86f3e9726</i><br /><br />Threat actor <b>description</b>: <i>#NationalHazardAgencyWe stole 18 gigabytes of data and documents, including SQL databases and mail backups. You have two choices: pay us or leak 18 gigabytes of documentation.Contact us</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>cloud51.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7624</link>
<guid>4ab50afd6dcc95fcba76d0fe04295632</guid>
<pubDate>Tue, 02 May 2023 20:34:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>cloud51.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4930a8c5773def442fbfde91f850dfcc90f5ebfde340eb077a38e7bdab205ab6</i><br /><br />Threat actor <b>description</b>: <i>Cloud 51 Data Solutions focuses on delivering proactive and preventative IT support and service solutions to small businesses locally and nationwide.It now serves more than 60 companies that have all been hacked. Each company had all their confiden...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Foam--Packaging</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7623</link>
<guid>477bdb55b231264bb53a7942fd84254d</guid>
<pubDate>Tue, 02 May 2023 18:40:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>American-Foam--Packaging</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2892a16cb881c37b767947e6137ff932e10a1d4d123d34f7474c2c60f533ac1f</i><br /><br />Threat actor <b>description</b>: <i>About Us  American Foam & Packaging is a custom foam fabricator specializing in Polyethylene, Polyurethane (Ethers and Esters) and Expandable Polystyrene (EPS) foams. We have a dedicated team of designers, sales reps, customer service and production personnel ready to help meet your customer’s foam packaging needs. From concept to finished product, our designers can help you create new packaging for your customer’s products, reduce the size of their existing packaging or substitute their current packaging to a more environmentally friendly material.     We pride ourselves on servicing distributors and brokers exclusively since 1993. Our Sales Team will work with your buyers and sales reps on new quotes or with your end-users to create new packaging.  We will work with you in the way that is most convenient to your business needs. We consider ourselves a part of your team to help provide a cost effective and sustainable product that fits your customer’s entire packaging needs.   We have automated equipment that can quickly and economically fabricate your orders. We can cut, die cut and glue your orders on our automated equipment. Our investment in equipment will not only give you a competitive price, but also allows us to meet your customers rush order needs. We have built scalable production systems that will deliver your large orders in a timely manner.     American Foam & Packaging’s versatility of design allows us to design packaging for all major industries, including electronics, computers, tools, circuit boards, furniture, medical equipment, aerospace, cosmetics, telecommunications and all other industries utilizing foam packaging. </i><br />Target victim <b>website</b>: <i>http://amfoaminc.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lincoln-Wood-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7622</link>
<guid>2175f8c5cd9604f6b1e576b252d4c86e</guid>
<pubDate>Tue, 02 May 2023 12:48:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Lincoln-Wood-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5dc83cfe038ce346d5d4ccaa478e29ef298bbb9c77f3790249a5be6481c636e8</i><br /><br />Threat actor <b>description</b>: <i>Building Materials · Wisconsin, United States · 168 EmployeesEstablished in 1947. Lincoln Wood Products, Inc. has been manufacturing high quality wood windows and patio doors for new construction, remodeling and light commercial projects for well over half a century. Based in Merrill, Wisconsin, the privately owned company.Website www.lincolnwindows.comRevenue $34.8M</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Great-Falls-College-of-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7615</link>
<guid>5a0c828364dbf6dd406139dab7b25398</guid>
<pubDate>Tue, 02 May 2023 02:30:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Great-Falls-College-of-Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6fa792ca7c35f64b8aa5faadcc66c1621775148f64fef4454239bc0779489d4</i><br /><br />Threat actor <b>description</b>: <i>Great Falls College Montana State University is a public community college in Great Falls, Montana. It is affiliated with the Montana State University System. Internal information of this college is interested as a detailed description of inner operations with lost of students and management's data and as a part of a bigger institution with obvious greater quantity of information. Not much but sweet!</i><br />Target victim <b>website</b>: <i>http://www.gfcmsu.edu</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Montana-State-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7616</link>
<guid>479f499df3bbc0deda265b92316d362f</guid>
<pubDate>Tue, 02 May 2023 02:29:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Montana-State-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e4fbb2205c7c4eacadf7cd670586d9e4638cb7709da0f710bdcf5dcc04bccfc</i><br /><br />Threat actor <b>description</b>: <i>Montana State University, located in the city of Bozeman, is an educational institution that offers a variety of academic programs and activities for students as well as a variety of personal document of the same student for everyone interested. They failed to storage personal data in a right way and lost 105GB. You can find there money flow of a big University as it represented in numerous financial and administrative documents. Students' personal and medical information is also available like in our previous post about their affiliated college. We will share it soon.</i><br />Target victim <b>website</b>: <i>http://www.montana.edu</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>MEADE-TRACTOR</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7630</link>
<guid>fbaafc6ec0f0e70f1472122178b4a1a1</guid>
<pubDate>Tue, 02 May 2023 02:14:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>MEADE-TRACTOR</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b8160bb86c23f3eeddbb393a68f1df172ff8795b19acfe55c9f207709c2b530</i><br /><br />Threat actor <b>description</b>: <i>We are family-owned and operated, with over 60 years of combined industry experience. Providing exceptional customer service and product support is our goal. We’re proud to serve our customers across Virginia, Tennessee, North Carolina, West Virginia & Kentucky. We value honest business and strive to find the right solution for your needs. Meade Tractor will never up-sell or let you walk out the door feeling like you didn’t get the best deal. Whether you need a mower for your home, a tractor for your farm, construction equipment, replacement parts or a tune-up, we’ve got you covered.SITE: https://www.meadetractor.com Address 4233 Russellville RdBowling Green, KY 42101Phone: 270-842-3400</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tony-Clark-Consulting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7614</link>
<guid>b8b6674d4052e35e4553ac6788eb30b5</guid>
<pubDate>Tue, 02 May 2023 01:16:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Tony-Clark-Consulting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2a2d904596163d6f94747cad37d93293dde497c80e1cb8813fb582491955b8cf</i><br /><br />Threat actor <b>description</b>: <i>Our proactive approach to information technology (IT) solutions and services gives our clients the freedom to focus on their business instead of worrying about fixing, maintaining or monitoring their network. TC Consulting'ss engineers have the advanced expertise to become our client’s trusted advisor, partner, and IT solutions provider, far beyond standard tech support. We’re qualified to assist with all phases of IT management, including procurement services and complex projects.</i><br />Target victim <b>website</b>: <i>https://www.tclarkconsulting.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>EdisonLearning</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7611</link>
<guid>f12a6a7477077af66212ef0813bcf332</guid>
<pubDate>Mon, 01 May 2023 13:25:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>EdisonLearning</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f9dac504cbfa93f4b5432f153a684fd5bf003b9efb8ffe3e6d87e5a5e4f600d</i><br /><br />Threat actor <b>description</b>: <i>EdisonLearning provides education management solutions, alternative education, personal learning plans, and turnaround services for underperforming schools. 20GB of their organization data including personal information of employees and students will be uploaded here early next week. Looks like knowledge providers missed some lessons of cyber security. Recently we gave one to EdisonLearning and they have failed.</i><br />Target victim <b>website</b>: <i>http://www.edisonlearning.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>100X-and-ALL-Clients</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7610</link>
<guid>dea184826614d3f4c608731389ed0c74</guid>
<pubDate>Mon, 01 May 2023 01:19:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>100X-and-ALL-Clients</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d8432a4b49b23d1f7f59cbc29680bb1199826918a5063c19a19b85d1aa499cbe</i><br /><br />Threat actor <b>description</b>: <i>Established in 2009, 100X is a Miami headquartered, full-service Information Technology Consulting and Software Development Firm, specializing in “Anytime/Everywhere” Cloud Workspace and the Aviation Industry. While we are located in South Florida, we have clients all over the world in various industries. We genuinely care about our customers and take our service and performance very seriously. We are looking for long-term relationships where both parties are investing in and benefiting from the outcome. At 100X, it’s all about the growth and success of our clients, our friends.</i><br />Target victim <b>website</b>: <i>https://www.100x.com/</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gates-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7609</link>
<guid>01b36d0eae3771391455661b45834805</guid>
<pubDate>Sun, 30 Apr 2023 20:04:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Gates-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>695730df2e26facd0c9d457e61259fa928be7815c731bb4af034a84c98cfd466</i><br /><br />Threat actor <b>description</b>: <i>Gates Corporation is a leading manufacturer of application-specific fluid power and power transmission solutions. At Gates, we are driven to push the boundaries of materials science to engineer products that continually exceed expectations.We don’t rest on our rich heritage of innovation. We leverage it to inspire solutions that will power the next hundred years. We invest continually in R&D and technology, so our products not only outperform industry standards; they exceed our customers’ demanding expectations. We invest in our people, bringing real-world experience that enables us to solve our customers’ diverse challenges of today and anticipate those of tomorrow. And we are constantly expanding our product catalog and value-added service offerings to support every facet of our customers’ operations. In the most extreme environments and those more familiar, Gates is there with the right product, in the right place at the right time. Whether building original equipment or maintaining products in the aftermarket, we enable companies in every industry to be more efficient, productive, and profitable. We are Gates.SITE: www.gates.com Address 1144 15th St, Denver,Colorado, 80202, United StatesTel: (303) 744-1911</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Franklin-Mutual-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7606</link>
<guid>a8acc28734d4fe90ea24353d901ae678</guid>
<pubDate>Sun, 30 Apr 2023 20:04:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Franklin-Mutual-Insurance</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8944b822783492494aa9fd3c18090590ebd8ddad73e4f3290423803ad7d4cc04</i><br /><br />Threat actor <b>description</b>: <i>Franklin Mutual Insurance
 is one of the most established and respected insurance companies in New
 Jersey. In business since 1879, FMI offers superior coverages to New 
Jersey residents and business owners, sold exclusively through 
professional independent agents. Rated A (Excellent) by A.M. Best, we 
have the financial strength and stability to protect our insureds and 
continue to grow our business.
At Franklin Mutual Insurance, we want you to know that being a 
mutual company means we’re in this together. We are not owned by a big 
corporation and we have no stockholders. Our primary responsibility and 
loyalty is to you, our policyholders.SITE: www.fmiweb.comADDRESS
5 Broad St, Branchville
New Jersey, 07826
United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>WSVN</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7607</link>
<guid>4efc9e02abdab6b6166251918570a307</guid>
<pubDate>Sun, 30 Apr 2023 20:04:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>WSVN</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c956349bb52b7e9d630359c22b071ab428d86fc209b13524672c29becfd185b</i><br /><br />Threat actor <b>description</b>: <i>WSVN
 (channel 7) is a television station in Miami, Florida, United States, 
affiliated with the Fox network. It is the flagship station of locally 
based Sunbeam Television. WSVN’s studios are located on 79th Street 
Causeway (SR 934) in North Bay Village (though with a Miami postal 
address), and its transmitter is located in Miami Gardens, Florida.SITE: www.wsvn.comADDRESS
1401 79th Street Causeway
Miami, FL 33141
Switchboard: (305) 751-6692
Newsroom: (305) 795-2777</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>David-S.-Brown-Enterprises</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7608</link>
<guid>3133f88cbe33bcd01a6ba439d75ae996</guid>
<pubDate>Sun, 30 Apr 2023 20:04:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>David-S.-Brown-Enterprises</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fcaaa06fd986dd7c0fdf1034d1b54767618aa09e102105c1abc2415855347c3a</i><br /><br />Threat actor <b>description</b>: <i>David S. Brown Enterprises, Ltd. is a full-service real estate company offering development, ownership, and property management of multifamily apartments in Baltimore County and Baltimore City. For three generations, we have been dedicated to delivering complete customer satisfaction. We are here to help you, whether you are taking a tour, or have been living in one of our communities for years. We’re committed to providing you with quality, personalized service and attention to detail throughout every aspect of your living experience. With a range of properties offering 1-bedroom, 2-bedroom, and 3-bedroom apartments for rent throughout Baltimore and its suburbs, we have apartments that fit any lifestyle.SITE: https://davidsbrown.com Address 100 Painters Mill Rd Ste 900Owings Mills, Maryland, 21117United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Spooner-Risk-Control</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7603</link>
<guid>1bcef5d8bd566084523bf65b7e1a245d</guid>
<pubDate>Sun, 30 Apr 2023 20:04:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>The-Spooner-Risk-Control</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9685df707caba02f5f504d359d6a906de71a267be322e3733237991913d1ecb8</i><br /><br />Threat actor <b>description</b>: <i>The Spooner Risk Control family of companies was established in 1975, when Tom Spooner uprooted his youngest son from his bedroom so it could be turned into an office. What started as a labor relations and HR consulting firm has grown to offer solutions for many of the challenges that employers face today.Spooner’s journey into workers’ compensation started in 1981, when a client asked Tom to attend an Industrial Commission hearing on behalf of their company. The client felt they’d paid more than enough for this particular workers’ comp claim, but the Hearing Officer didn’t consider that a valid argument. However, the Hearing Officer suggested that Tom read the Ohio Revised Code Workers’ Compensation book, since it was clear he truly wanted to protect and help the businesses he works with.  Nearly 50 years later, that remains the goal of every company under the Spooner umbrella. In 2017, Tom’s grandson Joe Spooner stepped into the role of president to ensure the company’s values continue to align with those ideals.SITE: https://spoonerinc.com Address 28605 Ranney ParkwayWestlake, Ohio 44145Phone: 440-249-5260 ext. 153</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>KLINE-SPECTER</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7604</link>
<guid>6caf88727c2cacf39df54ecc2f53de65</guid>
<pubDate>Sun, 30 Apr 2023 20:04:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>KLINE-SPECTER</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce0818e26a36ae0d5d52c7aac90b1f3f056b148454c1e7a15534662a7db7fc94</i><br /><br />Threat actor <b>description</b>: <i>Kline & Specter,
 PC occupies 12 floors of the same building at 1525 Locust St. with more
 than 50 attorneys, five of whom are also medical doctors, the most of 
any firm in the United States. Victories have followed, including 
hundreds of multi-million-dollar verdicts and settlements, some of them 
record-setting, and even one in the billions — the $8 billion verdict 
against Johnson & Johnson in 2019 involving the anti-psychotic drug 
Risperdal.
Accolades and honors abound. The firm has been cited as “one of the 
country’s leading personal injury firms” by The Philadelphia Inquirer, 
referred to as “a powerhouse law firm” by The New York Times and called 
“the most powerful plaintiffs firm in the city” by the Philadelphia 
Business Journal.SITE: www.klinespecter.comADDRESS
1525 Locust St.
Philadelphia, PA 19102
215-772-1000
215-772-1359
215-772-1000 (Toll Free)</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>AUTOCAM-MEDICAL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7600</link>
<guid>d397c2b2be2178fe6247bd50fc97cff2</guid>
<pubDate>Sun, 30 Apr 2023 19:57:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>AUTOCAM-MEDICAL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c95f1c2e3c0e4024bba77030021c23fc23407a340627e4f5a75436ed9ec9c956</i><br /><br />Threat actor <b>description</b>: <i>Autocam Medical is a privately held contract manufacturer of precision-machined surgical drill bits, drivers, screws, plates, cutting tools and other complex, highly engineered surgical implants, instruments, and handpieces, as well as other device components. Our clients are involved with instruments and devices used in the following anatomical areas: spine, foot and ankle, hand and wrist, hip and knee, shoulder and elbow, and craniomaxillofacial procedures.We offer a value-added approach to high-precision manufacturing, with specialties in CNC milling, turning and cutter grinding. State-of-the-art equipment and design for manufacturing engineering add value to the entire manufacturing process. ISO13485, FDA Registered, VISA (Brazil).SITE: www.autocam-medical.com Address 3607 Broadmoor Avenue SEKentwood, MI 49512, U.S.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>restorationmanagement</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7598</link>
<guid>ba7e36c43aff315c00ec2b8625e3b719</guid>
<pubDate>Sun, 30 Apr 2023 19:57:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>restorationmanagement</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4180911b04997c79194347be249e8e09b271742ded3c83924df88b344e4f3704</i><br /><br />Threat actor <b>description</b>: <i>Restoration Management CompanyCommercial & Residential Construction · California, United States · 500 EmployeesHeadquarters 4142 Point Eden Way, Hayward, California, 94545, United StatesPhone Number (510) 315-5400Website www.rmc.comRevenue $318.3MRestoration Management Company (RMC), founded in 1985 and headquartered in Hayward, California, is a full-service restoration, remediation, and cleaning service.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>CMC-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7585</link>
<guid>7eb5ac36014a76629c40069e46136a61</guid>
<pubDate>Sun, 30 Apr 2023 10:43:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>vicesociety</b> claims attack for <b>CMC-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>018cecef77c8f564888e606b4ed74cb31de6bb940dbbb15e56c6e863cc2eb2a7</i><br /><br />Threat actor <b>description</b>: <i>Located in Bowling Green, Ohio, Century Label (a CMC Group company) has over 40 years of experience printing custom labels and packaging. </i><br />Target victim <b>website</b>: <i>http://www.centurylabel.com/</i>]]></description>
<category>vicesociety</category>
</item>
<item xmlns:dc='ns:1'>
<title>Roseman-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7588</link>
<guid>7576182d0a84b1ba2207f8f061d48bc9</guid>
<pubDate>Sun, 30 Apr 2023 08:02:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>Roseman-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7e589159b8a2580d78246a1cd2d64ab495221cc75de731a61fd842fd04862353</i><br /><br />Threat actor <b>description</b>: <i>Student admissions data ready to leak. When you decide to pay us, email "avos@onionmail.org" from "roseman.edu" domain to receive your client ID</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pembina-County-Memorial-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7590</link>
<guid>9d27fdf2477ffbff837d73ef7ae23db9</guid>
<pubDate>Sun, 30 Apr 2023 08:02:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>Pembina-County-Memorial-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f69973a3ea5b518e160f764d554efd62db9ac965980e69c1da6e74e619af68d</i><br /><br />Threat actor <b>description</b>: <i>A data breach occurred at Pembina County Memorial Hospital!
The sensitive data was downloaded from its network.

Some examples of data types:
* NDA's
* Database dump containing information about each patient and employer (previous and current) (MSSQL: Angus, 
Conversion_Centriq).
* HR
* Board
* Policies</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sherman-Consulting-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7583</link>
<guid>9ddc70b3617c3e65c03fa63c230a1705</guid>
<pubDate>Sat, 29 Apr 2023 22:36:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Sherman-Consulting-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>221d59e3be43cef71475d8d1de1a93c0d8076bd27062cdf4b67ff123176a5438</i><br /><br />Threat actor <b>description</b>: <i>Sherman Consulting Services is very passionate about what we do. We carefully evaluate each client’s unique business operation and technology used to determine ways to help them achieve smoother operation and better technology results. We manage every aspect of technology from life cycles to planned upgrades. Cloud computing is utilized to provide better functionality and seamless operation. We respond to your changing business needs—today and tomorrow.</i><br />Target victim <b>website</b>: <i>https://www.scs.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>ourrelentlesschurch.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7581</link>
<guid>0b794a03744a03800313ca0f2e291294</guid>
<pubDate>Sat, 29 Apr 2023 19:13:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ourrelentlesschurch.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>653b7e92779a9a3e7ff4cfb9185e6d5953400bc02b6319388c1f8f2ae3131653</i><br /><br />Threat actor <b>description</b>: <i>Relentless Church exists to share the news of Jesus Christ, disciple people, and build the whole person: mind, body & soul.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>conver-pack.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7579</link>
<guid>376c6b9ff3bedbbea56751a84fffc10c</guid>
<pubDate>Sat, 29 Apr 2023 18:36:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>conver-pack.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>03da8177371d217d2d5d453b99dc5adcb0e0794733d11b1a58de70c447adc4d5</i><br /><br />Threat actor <b>description</b>: <i>ConverPack is a leading global manufacturer of  single-use hot and cold paper cups and accessories. Since 2010, we have provided our customers with the highest quality and most cost-effective wholesale paper products made in the United States. Locate...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Our-Sunday-Visitor</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7578</link>
<guid>5e2b66750529d8ae895ad2591118466f</guid>
<pubDate>Sat, 29 Apr 2023 16:40:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>Our-Sunday-Visitor</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5407accd8eeac7a46202a48355aba4e89487c57a8125f34adeaf7815549c423f</i><br /><br />Threat actor <b>description</b>: <i>Our Sunday Visitor is a Catholic publisher serving millions of Catholics globally through its publishing, offertory, and communication services. They've lost 130GB of their data that includes full accounting documentation, many HR docs with personal data of employees, financial contracts and invoices, their marketing information and many other document as well. Coming soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>McDermott-International-Ltd</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7577</link>
<guid>c57daa0bc9c4d8e35a21e9a2801aecb2</guid>
<pubDate>Sat, 29 Apr 2023 06:36:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>McDermott-International-Ltd</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1371c49c9b924488d7e9b34332cb68e25df349c7cbebbcc0c5a2565566fe3655</i><br /><br />Threat actor <b>description</b>: <i>McDermott International, Ltd is a global provider of engineering and construction solutions to the energy industry. Operating in over 54 countries, McDermott's locally-focused and globally-integrated resources include more than 40,000 employees, a diversified fleet of specialty marine construction vessels and fabrication facilities around the world. Incorporated in Bermuda, it is headquartered in the Energy Corridor area of Houston, Texas.  </i><br />Target victim <b>website</b>: <i>https://mcdermott.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Albany-ENT--Allergy-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7576</link>
<guid>f18ee45840e18329939acf1095cdc5a9</guid>
<pubDate>Sat, 29 Apr 2023 01:21:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Albany-ENT--Allergy-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>773d794253494b05a2b4dbbf54947d17ab81f1cc9bd022b93ffdb3388915b805</i><br /><br />Threat actor <b>description</b>: <i>At Albany ENT & Allergy Services, our mission is to provide the highest quality care rooted in compassion and state-of-the-art treatment for our adult and pediatric patients in the Capital Region. Our team of clinical experts collaborate across multiple areas of expertise, allowing us to serve our patients comprehensively and seamlessly. Through trust and collaboration, we ensure that our patients are active participants in their healthcare decisions. At Albany ENT & Allergy Services, we are proud members of our community, fully invested in your health.</i><br />Target victim <b>website</b>: <i>https://www.albanyentandallergy.com/</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>TAMMAC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7574</link>
<guid>c2ae5cb2426d96ed19a50b0b7d7c8e11</guid>
<pubDate>Fri, 28 Apr 2023 20:38:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>TAMMAC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f83fdbad41f1438a95a3f30462980ab72f983b23113379298bae2d204efcb28</i><br /><br />Threat actor <b>description</b>: <i>Tammac provides friendly, personal support every step of the way in your home loan application. Our goal is to find ways to get you approved and provide the financing options you need. Whether you are buying your home with land, using the land you own as a down payment, or need a loan on a manufactured home only, we have the program for you. Our application process will get you the answers you need – faster. We take your application personally and stay in touch with you. We want to help you buy a home of your own.SITE: www.tammac.com Address 613 Baltimore Dr Ste 1Wilkes Barre, Pennsylvania18702, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>GC-EMPLOYMENT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7566</link>
<guid>b937384a573b94c4d7cc6004c496f919</guid>
<pubDate>Fri, 28 Apr 2023 08:38:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GC-EMPLOYMENT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>870923bb25e8672954aedfd745063550e45ee72f4c0758cbace0ed48eeb88f46</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.GC-EMPLOYMENT.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Family-Day-Care-Services-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7722</link>
<guid>be26abe76fb5c8a4921cf9d3e865b454</guid>
<pubDate>Thu, 27 Apr 2023 14:51:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Family-Day-Care-Services-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3741531c9222b2faf83434ca4ca524c4074c6b2037046e33694fb4e269f10daf</i><br /><br />Threat actor <b>description</b>: <i>Family Day Care Services is a licensed home child care in Toronto. They use evidence-based approaches in all of our services to ensure we offer quality programs based on sound knowledge. If you see Family Day Care data post here, it means that not all servicesthis company provides are of great quality. Family Day Care's IT"professionals" did nothing to keep their customer's data in safety and, as a result, you will see personal documents of pupils' parents here in our blog soon. What is important to underline - there was no negative impact on children educated in this organization when their IT systems crashed. By the way, financial data turned out to be very interested as well. Please wait for the release.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>4LEAF-Inc-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7723</link>
<guid>da3fde159d754a2555eaa198d2d105b2</guid>
<pubDate>Thu, 27 Apr 2023 14:51:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>4LEAF-Inc-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b3574fae9547671153616e47e01ebfa4c9f96f141c250248d3e2a36d72efc7ae</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2001, 4LEAF, Inc. is a multi-discipline engineering firm providing services throughout the Western United States. They say they have enviable track record of completing complex projects and staffing assignments with both public and private clients. Those clients can thank 4LEAF for making their private information public. Soon you will see those records in detail in our blog and 4LEAF will face a new complex project to complete. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pak-Rite-Ltd.-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7724</link>
<guid>454cecc4829279e64d624cd8a8c9ddf1</guid>
<pubDate>Thu, 27 Apr 2023 14:51:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Pak-Rite-Ltd.-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>355ecb41c48b46a66743d9bb054bebbc7b6e82b6e9a7a2a444578271c7e9d4b0</i><br /><br />Threat actor <b>description</b>: <i>Pak-Rite, Ltd. designs and fabricates custom foam, plastic, and corrugated components. They can provide these components individually or integrate them into our creative package designs. We'd like to announce that Pak-Rite company is going to provide their owncorporate and personal information to everyone who is interestedin it. We will share it here in a few days.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>La-Red-Health-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7563</link>
<guid>0ce98f53e3aa229aa2f31b16e5dcbb4b</guid>
<pubDate>Thu, 27 Apr 2023 13:22:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>La-Red-Health-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>99a4910ac556e22ccb271ba6b589fe43458f6294ed3f1dc8c4c9eecb1886bd3e</i><br /><br />Threat actor <b>description</b>: <i>La Red Health Center provides an outreach programs help reach undeserved populations and enhance access to quality health care. We have 79GB from them: lots of financial documents, medical records with diagnosis, their employee and students personal information.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>MasterCorp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7562</link>
<guid>eb46c61f91aab8c2b002b288485fc118</guid>
<pubDate>Thu, 27 Apr 2023 12:44:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>MasterCorp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b6a0f2ec1ad40a2c42ba018f8009683e9ec6c30f09d7b9742f118c6956c9c7c8</i><br /><br />Threat actor <b>description</b>: <i>MasterCorpBusiness Services · Tennessee, United States · 1,000 EmployeesHeadquarters 3505 N Main St, Crossville, Tennessee, 38555, United StatesPhone Number (931) 484-1752Website www.mastercorp.comRevenue $217.8MA leader in cleanliness since 1981, today MasterCorp is considered the most trusted name in hospitality services. We partner with premier resorts and developers nationwide and lead the industry, not only in size, but in innovation, performance, and customer satisfaction.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>CoachComm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7561</link>
<guid>17256f049f1e3fede17c7a313f7657f4</guid>
<pubDate>Thu, 27 Apr 2023 10:33:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>CoachComm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>adb8975be8816671a882560d687dc4da263152435d36a408fe10ef099fc122a6</i><br /><br />Threat actor <b>description</b>: <i>CoachCommConsumer Electronics & Computers Retail · Alabama, United States · 111 EmployeesHeadquarters 205 Technology Pkwy, Auburn, Alabama, 36830, United StatesPhone Number (334) 321-2300Website www.coachcomm.comRevenue $22.6MCoachComm is a provider of coaching and football headsets, practice systems and sound management solutions. It offers communications equipment and coaching tools. The company was founded in 1991 and is headquartered in Auburn, Alabama.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>accesscontrolsecurity.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7557</link>
<guid>977f6f5f8bd5054b7ec5f72374d5e68d</guid>
<pubDate>Wed, 26 Apr 2023 21:09:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>accesscontrolsecurity.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0701cc59bec11e3f39c9d7e4f583ca9ed798bf31557a3bf559a21259be32f301</i><br /><br />Threat actor <b>description</b>: <i>Access Control Security has maintained a quarter century of commitment to assessing individual client needs and providing highly trained security guard and patrol services.  Our state-of-the-art accountability technology ensures exceptional reliability, enhanced performance and quality customer satisfaction.</i><br />Target victim <b>website</b>: <i>https://accesscontrolsecurity.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>e-Hazard-or-ArcWear-press-release</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7556</link>
<guid>116ce3668c6d5c744252b9a1cb67b8d4</guid>
<pubDate>Wed, 26 Apr 2023 20:35:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>e-Hazard-or-ArcWear-press-release</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5542a52a4b2392b2da6d207c0a0227f6abfd212a1fd417f22163f1e81284cb0c</i><br /><br />Threat actor <b>description</b>: <i>e-Hazard is a leading global provider of services related to electrical safety systems. The company offers training and consulting services in the field of electrical safety, as well as certification services.</i><br />Target victim <b>website</b>: <i>https://e-hazard.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tranztec-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7552</link>
<guid>626fbe83f8c7f2670b90a773b6dbf17c</guid>
<pubDate>Wed, 26 Apr 2023 19:23:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Tranztec-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6bead1164e7abc0ddbf2c842ec767d1d1ba40b0617151ca493dea447d9d0c5aa</i><br /><br />Threat actor <b>description</b>: <i>The Tranztec Platform uses best in class technology to Connect valuable data assets across the supply chain to drive efficiency in your business. The Tranztec Platform is the only standard platform connecting TMS, telematics and transportation services with prebuilt integrations. Featuring a comprehensive set of prebuilt integrations that as well as a robust set of load dispatch functionality that Extends legacy TMS applications and can provide a single cloud-based view of your enterprise.</i><br />Target victim <b>website</b>: <i>https://www.tranztec.com/</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>cdcbmestihl.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7554</link>
<guid>0e16366727185813f59d4a9467878901</guid>
<pubDate>Wed, 26 Apr 2023 19:19:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>cdcbmestihl.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ecbdc980809b044841770e6bdfb08c613e67157fa8806d0bd123af58d4a9886</i><br /><br />Threat actor <b>description</b>: <i>CDC BME STIHL Distributor is a distributor of STIHL outdoor power equipment. Marble Hill, Missouri, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Settlement-Music-School-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7727</link>
<guid>2156795824e042092b04e970977114cd</guid>
<pubDate>Wed, 26 Apr 2023 09:51:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Settlement-Music-School-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eaec70007c49e865b8a66996e1bbdf4d7f160212cfa7566d0688aaab74738eda</i><br /><br />Threat actor <b>description</b>: <i>Settlement Music School was founded in 1908 as a part of The College Settlement in Philadelphia. This community doesn't seem to notice that many things relating cyber security have changed since 1908. We've found many documents with personal information in their net: students, teachers, parents, employees. Financial reportsand other numerous internal documents are also going to be posted in this blog soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Schottenstein-Property-Group-Inc-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7728</link>
<guid>94351bc971eb5aab6a0cdc84227a6af3</guid>
<pubDate>Wed, 26 Apr 2023 09:51:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Schottenstein-Property-Group-Inc-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eb6be0b7f7dc9feaa82e7748f599f25e7bb8bbed6d8025a25fa41acf43a5b870</i><br /><br />Threat actor <b>description</b>: <i>Schottenstein Property Group Inc is a company that operates in the Real Estate industry. The company owns interest in 80 retail properties in 23 states and confidential  corporate information of it's customers and partners that is now in our possession. Some of them are really big and well-known. Personal information is also presented in this case. Schottenstein doesn't care much about this data so you will be able to see it soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rockbridge-Capital-</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7730</link>
<guid>fe60c129a74980578dc8fb0f8fe39b39</guid>
<pubDate>Wed, 26 Apr 2023 09:51:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Rockbridge-Capital-</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7026090f0103ca13322eb883c0e80cab37a4f144ec98e95a9ed146fc68622804</i><br /><br />Threat actor <b>description</b>: <i>Rockbridge Capital is an investment adviser registered with the SEC and is headquartered in Columbus, Ohio. Unfortunately, no one advised Rockbridge to invest in cyber security. This painful factcaused Rockbridge to lose much of business information: numerousnon-disclosures, contracts, projects, business contacts, detailed accounting and personal employees information, confidential docs and so on and so forth. Almost 40 GB coming soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Transformative-Healthcare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7543</link>
<guid>a62178a8e59f8331e1cb4f057cbf0a55</guid>
<pubDate>Tue, 25 Apr 2023 23:11:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Transformative-Healthcare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>814b4f1965ad660a78da4f272e122c6f30448adbd12153cb928f83b2ddde2585</i><br /><br />Threat actor <b>description</b>: <i>Transformative Healthcare is an innovator in providing Mobile Integrated Healthcare solutions. </i><br />Target victim <b>website</b>: <i>transformativehc.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>atlanticeye.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7536</link>
<guid>a4b4a777d704346280fc18fc9ca1d6b1</guid>
<pubDate>Tue, 25 Apr 2023 17:14:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>atlanticeye.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>997659b74692a99c2b775997678503f9e72d96d62dda4c6de9d55ad85b8a2a8e</i><br /><br />Threat actor <b>description</b>: <i>Atlantic Eye Center Optical is a full service optical dispensary in Cape May Court House, NJ.We exfiltrated the full database of the medical records for all patients + data exfiltrated from their file server.Failure to negotiate with us will...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>peachtree-medical.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7537</link>
<guid>256bf8e6923a52fda8ddf7dc050a1148</guid>
<pubDate>Tue, 25 Apr 2023 17:13:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>peachtree-medical.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c3336f96378652f862a2e08e66834711d540ad6e1c1ec7b2dc6064aa7edd8e9</i><br /><br />Threat actor <b>description</b>: <i>Peachtree Medical Center is a medical practice located in Peachtree City and Newnan, Georgia.We exfiltrated the full database of the medical records for all patients + data exfiltrated from their file server.Failure to negotiate with us will...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>ptow.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7538</link>
<guid>b8dd669b1ae9049e3101e504cfa86911</guid>
<pubDate>Tue, 25 Apr 2023 17:13:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ptow.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c25d66d5006f63f19e315b0e2724627667d5ea8815855dfdc5cf011b3286a228</i><br /><br />Threat actor <b>description</b>: <i>Physicians to Women is an OB GYN clinic in Roanoke, VA.We exfiltrated the full database of the medical records for all patients + data exfiltrated from their file server.Failure to negotiate with us will result in FULL data publication or auc...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>sunnydesigns.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7539</link>
<guid>4aadd661908b181d059a117f02fbc9ec</guid>
<pubDate>Tue, 25 Apr 2023 17:13:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>sunnydesigns.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6da02b6897875b42d2615a0d6e78d88b51007ba3489b82a8fa2eb8f5eb5aa1a2</i><br /><br />Threat actor <b>description</b>: <i>Sunny Designs is a manufacturer and wholesale distributor of furniture and accessory items. We exfiltrated the sales database for all customers  + data from their file server.Failure to negotiate with us will result in FULL data publication o...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dacotah-Paper</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7532</link>
<guid>aeecc5a9c646444f00978ed43e747a96</guid>
<pubDate>Tue, 25 Apr 2023 16:41:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Dacotah-Paper</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a905a9ac3936f33fc37be4116f86f01f692e4f43cfe8d1dc0fd52f25453971d1</i><br /><br />Threat actor <b>description</b>: <i>Dacotah Paper Co., doing business as Range Paper Bemidji Paper & Janitorial Supply, operates as a wholesale distributor of foodservice disposables, glassware products, janitorial/sanitary maintenance products, lighting/electrical products, office supplies.</i><br />Target victim <b>website</b>: <i>https://www.dacotahpaper.com/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>keystonesmiles.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7527</link>
<guid>11958dfee29b6709f48a9ba0387a2431</guid>
<pubDate>Tue, 25 Apr 2023 12:48:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>keystonesmiles.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>220646d9a0bb4b074e26c9c397880f9b20ee48c6289d057efe448c42233ad403</i><br /><br />Threat actor <b>description</b>: <i>Keystone Smiles Community Learning Center, Inc. is a locally based daycare center that offers full-time child care and early education programs designed for young children. Located at 420 Main Street, the company serves families living in the Knox, P...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Falcon-Express-Transportation-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7523</link>
<guid>ea9bf866d98db73eb0909fa9c1cc1b11</guid>
<pubDate>Tue, 25 Apr 2023 11:08:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Falcon-Express-Transportation-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9d1b223142345b1906e0d13370f3d658517d57174879bf05e03293db98ae48ab</i><br /><br />Threat actor <b>description</b>: <i>Falcon is a full-service courier, delivery, transportation, and logistics company headquartered in Beltsville, Maryland.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>General-Plug--Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7524</link>
<guid>58ec998e5f04921d22afdd67759db6e4</guid>
<pubDate>Tue, 25 Apr 2023 11:08:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>General-Plug--Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ebf73d25211a0156048d49c4cc6f31feded30b78862ac29c34847a3c37d421d2</i><br /><br />Threat actor <b>description</b>: <i>General Plug and Manufacturing is a primary manufacturer of pipe plugs, reducer bushings, and special screw machine parts supplied to leading manufacturers and distributors in the automotive, pipe/valve/fitting, electrical, and fastener industries.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>XPress-Cargo</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7526</link>
<guid>f8417d04a0a2d5e1fb5c5253a365643c</guid>
<pubDate>Tue, 25 Apr 2023 11:07:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>XPress-Cargo</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4b86e9b5d18637aa2b57e2419cd4092d03980ca28cdb67d45ebbc59dcec156e1</i><br /><br />Threat actor <b>description</b>: <i>Freight Moving Solutions by XPress Cargo, Inc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Magnolia-Care-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7519</link>
<guid>4493f5351e66c44bc87515f72d07aec2</guid>
<pubDate>Tue, 25 Apr 2023 07:12:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Magnolia-Care-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fdf07ca8492feb78f0e9f58957d78d1748b75a2630bc2e56ce77a64c2ec579ee</i><br /><br />Threat actor <b>description</b>: <i>Magnolia Care Center ~ A Veteran's Home~ is a Residential Veterans Personal Care Facility and Adult Day Care Center. Located at 16950 Florida Blvd, Baton Rouge, Louisiana, 70819, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>ultimateimageprinting.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7518</link>
<guid>cf98f1617165bf975b4dd57ab90269cf</guid>
<pubDate>Tue, 25 Apr 2023 06:36:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ultimateimageprinting.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f492d6cbd32665fb9a70d55f185fe8062933b090f506cc4aab135fcde660a17</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1980, Ultimate Image Printing is a full service commercial printing company located in Orange County, California. Since our inception, we have always believed that a print is not just ink on paper… it’s love, excitement, power… it’s commun...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Encompass-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7517</link>
<guid>a45a1d12ee0fb7f1f872ab91da18f899</guid>
<pubDate>Tue, 25 Apr 2023 02:27:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Encompass-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d4337a8d2dc154080b8555254e7326f34cb1af0a8e3d495cdaa85ee299194dae</i><br /><br />Threat actor <b>description</b>: <i>Encompass was founded in 1999 and headquartered in McDonough, Georgia, a company that manufacturers and marketers of reusable textiles, professional apparel, and disposable and single-use medical products. The 47 GBs we obtained from this company encompasses valuable information such as employee passports, social security numbers, good number of NDAs, contract and confidential agreements. Surely, there is a great amount of other interesting docs to explore.We will share it soon.</i><br />Target victim <b>website</b>: <i>http://www.encompassgroup.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>TransMedics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7510</link>
<guid>b7c13b0a474277d7f6c6d6ba8a0ed678</guid>
<pubDate>Mon, 24 Apr 2023 13:26:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>TransMedics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e0f3883e0afb1b5dd63c1f2c4f7494b34e2d56aaac0bea7336545f7434cb5b00</i><br /><br />Threat actor <b>description</b>: <i>TransMedics, Inc., a medical device company, develops and provides portable warm blood perfusion system that allows for living organ transplant. 85 GB of this company data will leak online soon opening all the financial and accounting information to the public. You will find their business contracts, correspondence with BIG executives, detailed employee personal information and other confidential papers uploaded here this week. Seems like we are going to witness another stock fall.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>Winona-Powder-Coating</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7511</link>
<guid>1e44fdf9c44d7328fecc02d677ed704d</guid>
<pubDate>Mon, 24 Apr 2023 13:26:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>Winona-Powder-Coating</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f50fcd56d8787bae2865be5af0cdbbaabab0e777b1afc77a190fc114b904df9c</i><br /><br />Threat actor <b>description</b>: <i>Winona Powder Coating is the largest provider of finishing services in the Northern Indiana/Southern Michigan region. We specialize in E-Coat and Powder Coat finishes. This is another example of a business that doesn't care about ts employees' personal information. Almost a full set of information for each worker: SSN, DOB, address, phone ... Besides that we have Winona's ongoing project details with contacts and contracts. As well as their financial and accounting documentations. Much to see. You are welcome to check that.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lifeline-Vascular-Access</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7512</link>
<guid>161c5c5ad51fcc884157890511b3c8b0</guid>
<pubDate>Mon, 24 Apr 2023 13:26:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>Lifeline-Vascular-Access</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>236168b30756c651aa55c45e0c756be91244312075bcf8d0ea2819b50aa1e5e4</i><br /><br />Threat actor <b>description</b>: <i>Lifeline Vascular Access provides management services that streamline the delivery of patient care, bringing together all the pieces essential to the operation of an outpatient vascular center. Keeping a patient's personal information in secret is not very popular today. Lifeline thinks the same and has provided us with hundreds of their patients' medical records. Detailed information about the patients, their health, finance state and other info can be published soon and be accessible for everyone. Employees' data is not an exception. Doctors and other staff have lost their personal information thanks to Lifeline Vascular management. Be in touch!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lake-Dallas-Independent-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7497</link>
<guid>e9de722f5fee30a9bb44216eaa70ae09</guid>
<pubDate>Mon, 24 Apr 2023 02:31:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Lake-Dallas-Independent-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a4374fbbb942ff32a471638abf86d3ab5fc0502bbadf81892c41f70819db8c24</i><br /><br />Threat actor <b>description</b>: <i>Lake Dallas Independent School District has a vibrant, growing student population, an excellent array of programs, a strong curriculum, and a progressive, innovative atmosphere. Seems like everything is on the best level but its not. Gygabytes of students' and their staff personal information is not a thing to worry about. A few hundreds of SSNs and array of passport information will be available here on Monday. This is the result of being non-progressive in cybersecurity.Enjoy!</i><br />Target victim <b>website</b>: <i>http://www.ldisd.net</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>MW-Components</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7498</link>
<guid>a3c788c57e423fa9c177544a4d5d1239</guid>
<pubDate>Mon, 24 Apr 2023 02:31:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>MW-Components</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9671bd7efd5f64ff91e91a844d6119a05b4e86fa942b9b3f87fa3e1786055b83</i><br /><br />Threat actor <b>description</b>: <i>MW Components is focused on accelerating the entire process of delivering custom, stock, and standard parts to virtually any volume and against demanding deadlines. This time MW Components hasn't coped with deadlines and soon you will be able to download their data and see how they accelerate their their processes in their documents. Files of 274GB size that we obtained contain SSNs, passport data, detailed accounting and finance documents. Stay online!</i><br />Target victim <b>website</b>: <i>http://www.mwcomponents.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clarke-County-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7499</link>
<guid>7a2b33c672ce223b2aa5789171ddde2f</guid>
<pubDate>Mon, 24 Apr 2023 02:30:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Clarke-County-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9adcc7cbd0e4b8f66c215702e00f9aad3182db4109b39eb139439df3c27b6ba1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://clarkehosp.org</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>ECCI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7495</link>
<guid>5905aa3361a00b7d9356fa6cf222396d</guid>
<pubDate>Sun, 23 Apr 2023 19:10:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>ECCI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4dc20c44154a3376940f5c3dfa3218333fe884ba336b27b83fed83e3d7b05e24</i><br /><br />Threat actor <b>description</b>: <i> Headquarters  13000 Cantrell Rd, Little Rock, Arkansas, 72223, United States  Phone Number (501) 975-8100  www.ecci.com undefined Revenue Revenue $5.9M  </i><br />Target victim <b>website</b>: <i>https://www.ecci.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>qcssinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7732</link>
<guid>9b07f50145902e945a1cc629f729c213</guid>
<pubDate>Sun, 23 Apr 2023 17:48:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>qcssinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6bd6322406bcb17bb486b6419aa01a0ebe5903d17d17b813ce6208d35eb9f180</i><br /><br />Threat actor <b>description</b>: <i>phonenumber: 888.229.7046 sales@qcssinc.com https://www.facebook.com/qcssincmonona/ Illinois -Deer Park  Corporate Headquarters  21925 W. Field Parkway  Suite 210  Deer Park, IL 60030  Local: 847.229.7046  Toll-Free: 888.229.7046  Minnesota-St. Cloud  Minnesota-St. Cloud  Aria Communications  (A QCSS Company)  717 West St. Germain  St. Cloud, MN 56301  Phone: 888.229.7046  Minnesota-Waite Park  Handwritten Mail  Fulfillment Facility  208 3rd Street N.  Waite Park, MN 56387  Phone: 888.229.7046     qcss-green-ariacorp is all one! Here you will see: 1. Financial documents 2. General information on corporations  3. And many other things) Enjoy</i><br />Target victim <b>website</b>: <i>https://qcssinc.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Easy-Automation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7489</link>
<guid>c2f8e6f7f5a740e5b753357c9bb2c664</guid>
<pubDate>Sat, 22 Apr 2023 20:39:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Easy-Automation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c65fbb95b1dc6c1c361f09772b549ccfa0a6d2ea88d7c3e6f2bc2d0e261c6cc3</i><br /><br />Threat actor <b>description</b>: <i>Easy Automation Inc. (EAI) based in Welcome, Minnesota, specializes in serving the feed automation needs of commercial and farm customers. EAI designs, manufactures, and markets computerized mill automation systems, feed manufacturing equipment.</i><br />Target victim <b>website</b>: <i>https://www.easy-automation.com/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>Global-Polymers-was-haked.-A-massive-amount-of-confidential-information-was-stolen.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7324</link>
<guid>7240b65810859cbf2a8d9f76a638c0a3</guid>
<pubDate>Fri, 21 Apr 2023 19:13:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Global-Polymers-was-haked.-A-massive-amount-of-confidential-information-was-stolen.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be577d95acd0d8c5362bcea676980365e9af2bba7524fb1c792665610e0872ed</i><br /><br />Threat actor <b>description</b>: <i>Who is Global Polymers  With 27 years of experience in plastics recycling, Global Polymers has the knowledge and expertise to help your company meet its goals in the area of social and environmental responsibility, carbon footprint reduction, and closed loop recycling.  Headquarters; 2101 Plantside Dr, Louisville, Kentucky, 40299, United States Phone Number: (502) 425-1133 Website: www.globalpolymerscorp.com Linkeidn: http://www.linkedin.com/company/global-polymers-llc Facebook: http://www.facebook.com/global-polymers-166225546883916</i><br />Target victim <b>website</b>: <i>www.globalpolymerscorp.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Slade-Shipping---The-most-insecure-shipping-company-in-the-U.S.-has-leaked-a-huge-amount-o</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7327</link>
<guid>cd7c230fc5deb01ff5f7b1be1acef9cf</guid>
<pubDate>Fri, 21 Apr 2023 19:12:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Slade-Shipping---The-most-insecure-shipping-company-in-the-U.S.-has-leaked-a-huge-amount-o</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad5f04a1f93841c9a86ea191df420617d897ee048681a3fc20da7c5c88965dcd</i><br /><br />Threat actor <b>description</b>: <i>Who is Slade Shipping  Slade Shipping specializes in project cargo shipments to all worldwide destinations. Our experience and expertise include the handling of oversized cargo, time-pressing shipments and door delivery to unusual destinations.   Headquarters: 601 Penhorn Ave Unit#2, Secaucus, New Jersey, 07094, United States Phone Number: (201) 944-0303 Website: www.sladeglobal.com Revenue: $19.5M CEO at Slade Shipping: Glyn Vince Linkedin: http://www.linkedin.com/company/slade-shipping Facebook: http://www.facebook.com/sladeshippinginc</i><br />Target victim <b>website</b>: <i>www.sladeglobal.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wynn-Reeth</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7313</link>
<guid>3a0f19df72fef0495c54ced664735a7d</guid>
<pubDate>Fri, 21 Apr 2023 15:04:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>Wynn-Reeth</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91de0d952d94d359e509e394479e960d49923cee43a60f4a6b6100019c597eb7</i><br /><br />Threat actor <b>description</b>: <i>Wynn-Reeth provides services to the client which will help the individual meet daily living needs. They claim they can even help people manage their Social Security benefits and in the same time they helped their clients lose personal documents including passports and SSNs (and seem not to be  worried much about that). We have about 30GBs of their corporate information and, as you understand, their clients personal and medical information. You will be able to check it soon by yourselves. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>JK-Residential-Services-was-hacked.-A-lot-of-personal-data-was-stolen.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7310</link>
<guid>e5a90182cc81e12ab5e72d66e0b46fe3</guid>
<pubDate>Fri, 21 Apr 2023 13:19:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>JK-Residential-Services-was-hacked.-A-lot-of-personal-data-was-stolen.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>990dfbf0b734b72b89a473d655379efb64de7395c79fa142cb2d9ed6c4f0686b</i><br /><br />Threat actor <b>description</b>: <i>Who is JK Residential Services  J.K. Residential Services, Inc. (JKRSI) currently manages over 50 assets consisting of about 2,000 units throughout Southern California with a primary concentration in Los Angeles, San Fernando Valley, and the South Bay. The company creates and executes a definite business plan for each individual asset that it manages identifying key operational elements of the property that need improvement. Each asset generally has some economic or operational advantage over the competition in its specific sub-market.  JKRSI is backed by a team of skilled real estate professionals with a high degree of experience gained from their individual involvement in real estate. The professionals working within the organization have the vast and cumulative experience, knowledge, and skills to successfully determine what is required to transform an under-performing asset into a profitable piece of real estate. JKRSI has a very knowledgeable and experienced support staff that carried the company to where it is now and will continue to work towards the next level of success.   Headquarters: 2016 Riverside Dr, Los Angeles, California, 90039, United States Phone Number: (323) 669-9090 Website: www.jkrsi.com Linkedin: http://www.linkedin.com/company/j.k.-residential-services-inc.</i><br />Target victim <b>website</b>: <i>www.jkrsi.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Export-Hub</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7150</link>
<guid>c20bb2d9a50d5ac1f713f8b34d9aac5a</guid>
<pubDate>Thu, 20 Apr 2023 11:18:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cryptnet</b> claims attack for <b>Export-Hub</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8bf29a4c91479e5d37697efa66327ba6f6b1dff8fcf4ce1c3fc1f74f81efcb2</i><br /><br />Threat actor <b>description</b>: <i>ExportHub Ltd. is committed to safeguarding its users' privacy. We request all our users to read the following 'privacy policy' to understand how their personal & business information will be treated, as they make full use of our services to their benefit. This policy is applicable only to the entire network of marketplaces operated by EH and not by any other company. ExportHub's primary goal in collecting personal or public information is to provide the user with a customized experience on our network of sites. This includes personalized services, interactive communication and other services, most of which are completely free and remaining are paid. Business information is used to display the user's business listing or product offerings across our network to fetch maximum business opportunities for the user.... </i><br />Target victim <b>website</b>: <i>https://www.exporthub.com</i>]]></description>
<category>cryptnet</category>
</item>
<item xmlns:dc='ns:1'>
<title>Urban-Import</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7151</link>
<guid>fc394e9935fbd62c8aedc372464e1965</guid>
<pubDate>Thu, 20 Apr 2023 11:18:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>cryptnet</b> claims attack for <b>Urban-Import</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0636e6dadb62b974afb5befc13350765bdb0076585cf1f097cf1285cbe3f9108</i><br /><br />Threat actor <b>description</b>: <i>Urban Import was established in 2001 by fellow automotive enthusiasts to provide customers with an unrivaled selection of top quality aftermarket automotive parts. After cementing our presence as an eBay Power Seller, we launched our first online retail site carrying some of the top performance brands of the time. As the aftermarket performance industry began to boom, Urban Import focused on expanding its lineup by securing exclusive distributorship of the D2 Racing brand in North America.... </i><br />Target victim <b>website</b>: <i>https://www.urbanimport.com</i>]]></description>
<category>cryptnet</category>
</item>
<item xmlns:dc='ns:1'>
<title>Insurance-Agency-Marketing-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7135</link>
<guid>604f2c31e67034642b288d76a8df11d5</guid>
<pubDate>Wed, 19 Apr 2023 18:42:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Insurance-Agency-Marketing-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee6b56aa41f48ca4b42c46d7463d1c91ee45d2eb41d3936db3494b9fba12af1c</i><br /><br />Threat actor <b>description</b>: <i>Insurance Agency Marketing Services, Inc. was founded in 1986 with service to producers as the centerpiece.</i><br />Target victim <b>website</b>: <i>https://www.iamsinc.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>jaco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7119</link>
<guid>2adee8815dd939548ee6b2772524b6f2</guid>
<pubDate>Wed, 19 Apr 2023 13:29:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>jaco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a6f0322103e3298a3e26330d1bfe94240df9be8899577b49c47c5db50ece2d1</i><br /><br />Threat actor <b>description</b>: <i>Jaco Oil Company established since 1967; has grown into a diverse operation over the years. The Company is privately owned and focuses on the management of Brooke Utilities, Fastrip Financial, Fastrip Food Stores, Instant Storage, and Wholesale Fuels...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>sbhc.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7115</link>
<guid>5301c4d888f5204274439e6dcf5fdb54</guid>
<pubDate>Wed, 19 Apr 2023 10:38:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>sbhc.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>41659029bda63d3ee886542a9ed45cd2aa9929b10b894061a52840f6fe5b9fec</i><br /><br />Threat actor <b>description</b>: <i>Southwest Behavioral Health Center (SBHC), created in 1986, is a public provider of comprehensive, integrated mental health and addiction services, offering outpatient, residential, school-based, and community-based programs and services to individua...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>7G-Distributing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7114</link>
<guid>20d039f53b4a6786c21ee0dbcd2d2c5d</guid>
<pubDate>Tue, 18 Apr 2023 20:36:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>7G-Distributing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b890ade102a16cdf87d7284ba331033ebca39faa2130ac597bc6db52e9a692c</i><br /><br />Threat actor <b>description</b>: <i>Formed in 2010, 7G Distributing is the result of a merger between Kirchoff Distributing and Dale Lee distributing companies. They represent and serve 317 different brands and 28 different suppliers over 14 countries. In 2014</i><br />Target victim <b>website</b>: <i>https://www.7gdistributing.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Treadwell-Tamplin--Company-Certified-Public-Accountants-Madison-GA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7315</link>
<guid>f2c5b1f06bfe59954cb2a56858c2ed98</guid>
<pubDate>Tue, 18 Apr 2023 18:01:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trigona</b> claims attack for <b>Treadwell-Tamplin--Company-Certified-Public-Accountants-Madison-GA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f2905da720c6038965feb9f818ef39b9265c940059e0bbf319322ab06970225</i><br /><br />Threat actor <b>description</b>: <i>Treadwell Tamplin is an accounting firm that provides a range of financial services to individuals and businesses in the San Francisco Bay area. The company's team of accounting and tax professionals has extensive knowledge in their respective fields and is committed to delivering personalized services to their clients.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>trigona</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mainstream-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7068</link>
<guid>abc99d6b9938aa86d1f30f8ee0fd169f</guid>
<pubDate>Tue, 18 Apr 2023 15:17:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Mainstream-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>699176021a7889222bb6aa9422df272a6620cd24d77b9b74ea7710c5acfb9a86</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://mainstream-engr.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Ballwin</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7069</link>
<guid>83187550749e6b8024a097630f9d4722</guid>
<pubDate>Tue, 18 Apr 2023 15:17:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>City-of-Ballwin</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c167b508cdaed4fcf9deaf78996858a635546270fae8ca637547db3eb5a9ee27</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>http://ballwin.mo.us</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ozarks-Community-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7067</link>
<guid>1109f8734e117143a570a8bf9f8c47b2</guid>
<pubDate>Tue, 18 Apr 2023 12:40:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>Ozarks-Community-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5c65377946e24e0f0792b0a087dfa378bf8bd0e720af9390a036e70e3a0c17d</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1930 the Ozarks Community Hospital (OCH) of Gravette, AR is located in what was previously known as the Gravette Medical Center Hospital Building. They do not care much about their personnel and patients personal information.  We have about 40GB of their internal information including detailed medical data (medical records, tests, diagnosis), employees personal information and accounting/finance documents that are very interesting to explore. They even lost their partners' employee information (ssns, addresses and so on).Coming soon!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>Winter-Park-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7080</link>
<guid>1cb524b5a3f3f82be4a7d954063c07e2</guid>
<pubDate>Tue, 18 Apr 2023 09:58:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trigona</b> claims attack for <b>Winter-Park-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a39472d85874f21613d15a903cdaa15701adedd9c4219a2b29c3d5076d37968a</i><br /><br />Threat actor <b>description</b>: <i>Winter Park Construction (WPC) is a well-established company that has been providing general contractor, pre-construction, construction management and renovation services to Central Florida and the southeast United States since 1974. With over $200M in projects set for completion in 2020 and employment for 140+ full-time employees, WPC has established itself as a leader in the construction industry. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>trigona</category>
</item>
<item xmlns:dc='ns:1'>
<title>Albany-Clinic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7082</link>
<guid>3bf29f38421bc1764e6f1d1545479f93</guid>
<pubDate>Tue, 18 Apr 2023 09:58:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trigona</b> claims attack for <b>Albany-Clinic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>150b6db2841071facedab13018a4abb8100857865cb2ab60558455603a20d281</i><br /><br />Threat actor <b>description</b>: <i>Albany Clinic is a medical center that provides family doctors, specialists, speciality services, diagnostic services and walk-in clinic in Australia. It offers a range of services such as general practice, skin cancer checks, travel medicine, immunisations and more. It has been serving the community for 30 years and prides itself on providing medical care with experience, empathy, understanding and consistency.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>trigona</category>
</item>
<item xmlns:dc='ns:1'>
<title>McKinney-Trailers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7083</link>
<guid>413894b7e2c6dfc6e8a0e9f18287e3c4</guid>
<pubDate>Tue, 18 Apr 2023 09:58:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trigona</b> claims attack for <b>McKinney-Trailers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9cc9dd80f929d2266523f6cd4d0775d938754ee59b04f0a601216a44642d8a05</i><br /><br />Threat actor <b>description</b>: <i>McKinney Trailers is a leading transportation equipment and trailer manufacturer in the United States. The company operates several manufacturing plants and retail locations across the United States, providing customers with easy access to their products and services. Their diverse range of products includes dry and refrigerated trailers, flatbed and drop-deck trailers, intermodal chassis, and specialty trailers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>trigona</category>
</item>
<item xmlns:dc='ns:1'>
<title>pandol.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7066</link>
<guid>57e5cb96e22546001f1d6520ff11d9ba</guid>
<pubDate>Tue, 18 Apr 2023 09:09:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>pandol.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d0b7edad539bdb0559673525356c527b01130b1f5c218819748eea1b42e373e7</i><br /><br />Threat actor <b>description</b>: <i>Pandol Bros., Inc 389Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lakeland-Community-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7065</link>
<guid>88340338e0a0cdc54350c05cf056dca8</guid>
<pubDate>Tue, 18 Apr 2023 07:14:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>vicesociety</b> claims attack for <b>Lakeland-Community-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d6f18f12474b1eb406730c81c1f26f116b5c923382074c9967d46d4d73168560</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1967, Lakeland Community College was the first college in Ohio created by a vote of the people. True to our mission, Lakeland provides quality learning opportunities to meet the social and economic needs of the community.</i><br />Target victim <b>website</b>: <i>http://www.lakelandcc.edu/</i>]]></description>
<category>vicesociety</category>
</item>
<item xmlns:dc='ns:1'>
<title>Western-Intelligence-or-Western-Digital-The-Fine-Line-Between-Selling-Drives-and-Espionag</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7063</link>
<guid>68a15b5278e4f7c4c056df9d5f1d3b1f</guid>
<pubDate>Tue, 18 Apr 2023 01:13:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Western-Intelligence-or-Western-Digital-The-Fine-Line-Between-Selling-Drives-and-Espionag</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b67ee76b67db1b7c4a95dd1850ce0ae83101f28c04f78ba1e6fa59d39a254916</i><br /><br />Threat actor <b>description</b>: <i>Western Digital Corporation is an American computer drive manufacturer and data storage company, headquartered in San Jose, California. It designs, manufactures and sells data technology products, including data storage devices, data center systems and cloud storage services.</i><br />Target victim <b>website</b>: <i>https://westerndigital.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Unique-Imaging</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7316</link>
<guid>5cdf0f9533d6b4c0984fc5ae00913459</guid>
<pubDate>Mon, 17 Apr 2023 19:17:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>trigona</b> claims attack for <b>Unique-Imaging</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7271a4e893eec942fc7c34fa3eac9a0633d0510df87d37174bf9606526bf51f4</i><br /><br />Threat actor <b>description</b>: <i>Unique Technology, Unique Care. We are proud to offer the latest and greatest in innovative medical imaging services, delivering the fastest and most convenient imaging results, unmatched in South Florida, Latin America and the Caribbean. Our new medical diagnostic imaging equipment can detect pathology and track the effectiveness of treatment that your physician has prescribed. When looking for the right medical imaging or radiology services, look no further than Unique Imaging. 2 Medical imaging centers in Miami conveniently located in Aventura and Miami Beach. Unique Imaging focuses on advance radiology including MRI, CT, US, PET/CT, MRA, CTA, & Echo. Our advanced medical imaging equipment and talented team make us the preferred center for referring physicians. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>trigona</category>
</item>
<item xmlns:dc='ns:1'>
<title>pinelandschool.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7060</link>
<guid>ab4c389364232588a6680ad92ec170c7</guid>
<pubDate>Mon, 17 Apr 2023 15:09:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>pinelandschool.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b2cd65b5a512a326be129815dd8793a9c0059fbcc64056fa7ac03db07ef19d07</i><br /><br />Threat actor <b>description</b>: <i>64gb</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pharm-Pacc-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7062</link>
<guid>6cf75a28ed72a43ef7ca1b66ff345859</guid>
<pubDate>Mon, 17 Apr 2023 15:08:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>Pharm-Pacc-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ef63280901f01eaa337d046e52541977c7fd29800bc5233c3c0974b341a2d97</i><br /><br />Threat actor <b>description</b>: <i>Pharm-Pacc Corporation is a provider of Managed Recovery Services to hundreds of hospitals throughout the United States. As it usually turns out, the services are not managed enough and personal information of US citizens can soon be on public. 40GB of corporate and clients/patients' data will be free to download soon. You can find there patients' passport information, med tests results, prescriptions, diagnosis and other pretty detailed information. Accounting, finance, insurance docs of a great quantity present too. Stay in touch!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>SPARTAN-Light-Metal-Products-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7058</link>
<guid>696186d1596721cb6e79013d4655c5d9</guid>
<pubDate>Mon, 17 Apr 2023 13:27:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>unsafe</b> claims attack for <b>SPARTAN-Light-Metal-Products-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fef538844f0fa792ec492e20a553126492c00b55039abe697877e56054a401d6</i><br /><br />Threat actor <b>description</b>: <i> country: US - revenue: 311.00M</i><br />Target victim <b>website</b>: <i>https://spartanlmp.com</i>]]></description>
<category>unsafe</category>
</item>
<item xmlns:dc='ns:1'>
<title>alpine4u.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7056</link>
<guid>ced92d38d8fec10f1da779dfa44f8bbe</guid>
<pubDate>Mon, 17 Apr 2023 06:44:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>alpine4u.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b7a078d2ffb4242027f4615f0d35195dadc861b04fc911a4a92e82a8dac9f76c</i><br /><br />Threat actor <b>description</b>: <i>Alpine Corporation is one of America's leading designers, importers, and distributors of superior quality home and garden decor products. It offers one of the broadest assortments of decorative garden products available in the industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Uniondale-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7055</link>
<guid>e143c01e314f7b950daca31188cb5d0f</guid>
<pubDate>Mon, 17 Apr 2023 05:10:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Uniondale-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>77ea38954ab5b7c74d10d75abab09ed1bad3dbab027767ea6bbe278af799016f</i><br /><br />Threat actor <b>description</b>: <i>Uniondale School District is a district located in Uniondale, NY. They are comprised of 9 different schools around the area: California Avenue School, Grand Avenue School, Northern Parkway School, Smith Street School, Walnut Street School, Lawrence Road Middle School, Turtle Hook Middle School, Uniondale High School and Cornelius Court School. As of the 2023 school year , 6523 students are enrolled in Uniondale School District.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Swanson-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7054</link>
<guid>812469e49663025b39e8d25fdaad81a7</guid>
<pubDate>Mon, 17 Apr 2023 02:26:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Swanson-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0cf4d592bad69ad319685f36ef3b2fd04a14e32dfeb776a8a68db53bb94f6920</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1951, Swanson Group sells and manufactures wood products and other building products from timber logs, such as plywood panels, concrete forming panels, studs, veneers, residual products, sign making panels, and safety data sheets. At this moment Swanson's corporate data is not in safety anymore and will be soon posted and free to download. You can find there their financial and accounting information, employees personal information and interesting docs, projects detailed info and some confidential data.Upload soon. </i><br />Target victim <b>website</b>: <i>http://www.swansongroup.biz</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Moon-Capital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7053</link>
<guid>dfc69ee4c48a622e2bcda2c3d2a219d0</guid>
<pubDate>Mon, 17 Apr 2023 01:17:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Moon-Capital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd472aa373ce096b4af478cca903e6227e136e62f23f8cb5412ff0116b276953</i><br /><br />Threat actor <b>description</b>: <i>Moon Capital Management is a company that specializes in global investment management solutions. While searching for a global solution they forgot to invest in their own cybersecurity. As a result we have almost 2TBs of their corporate and personal data: confidential finance and accounting data, reports etc. Employee information, medical insurance and other docs (even tests), passports, drivers licenses, interesting violations, salaries, securities and many other data.We are ready to share it with you! Stay in touch.</i><br />Target victim <b>website</b>: <i>http://www.mooncapital.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>bsw-architects.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7052</link>
<guid>0428be7495f8f382d0943cdd4738ffbb</guid>
<pubDate>Sun, 16 Apr 2023 20:33:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>bsw-architects.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f200d17a45ae4c75baac42f71a6d9500cb0ae74cc4971d548a78936c8c29e74</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dataram</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7050</link>
<guid>0f7b2bb5d0c7e6209ecff113108f64cf</guid>
<pubDate>Sun, 16 Apr 2023 01:16:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Dataram</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2710ec62d711bdfb5c778e90c897e046da09c172e58aa1f3596cbbf2df53ab98</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1967 and backed by more than 50 years of technology leadership and innovation, Dataram provides technology solutions that help customers simplify, consolidate, automate and scale their enterprise computing and data center environments. But data security issues are not very easy for them. As always employees personal infos, NDAs, clients' contacts and correspondence are almost freely accessible. There are also different marketing researches, projects information, financial and accounting data (tax, sales and other docs).Find it uploaded soon!</i><br />Target victim <b>website</b>: <i>http://dataram.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>CommScope</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7049</link>
<guid>169806bb68ccbf5e6f96ddc60c40a044</guid>
<pubDate>Sat, 15 Apr 2023 19:12:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>vicesociety</b> claims attack for <b>CommScope</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6b99ec1ac07cf031cd223ede06f4ed6925740e0b9ef3b0c3532e0994df44fa8</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1976, CommScope Holding provides infrastructure solutions for communications networks worldwide. We design, manufacture, install and support the hardware infrastructure and software intelligence that enable our digital society to interact and thrive.</i><br />Target victim <b>website</b>: <i>http://www.commscope.com/</i>]]></description>
<category>vicesociety</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aloha-Enteprise-NCR</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7043</link>
<guid>f44ec26e2ac3f1ab8c2472d4b1c2ea86</guid>
<pubDate>Sat, 15 Apr 2023 08:40:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Aloha-Enteprise-NCR</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>559103adf705f2804560326edc530783e269e1ab6a995aa7b9350f5d6aba27ea</i><br /><br />Threat actor <b>description</b>: <i>During four days of silence and removal of any mention of ransomware on reddit, NCR representatives went into a chat room to find out what data had been stolen. After receiving information that NCR data had not been stolen, but accessed their customers' networks, they decided to make a press release. We are forced to take action regarding NCR customers. If you become our victim you know who to thank.</i><br />Target victim <b>website</b>: <i>https://ncr.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>ktbs.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7037</link>
<guid>7c39a5f991bef4a1e34187677a65871d</guid>
<pubDate>Fri, 14 Apr 2023 07:08:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ktbs.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d2788b3bb66dfa6655f57bde88dc686dec5bf02e00d0e4071fdd533e2213ddcb</i><br /><br />Threat actor <b>description</b>: <i>KTBS-TV (Channel 3) is a television station in Shreveport, Louisiana, United States, affiliated with ABC. The station is owned by local KTBS, LLC (owned by Wray Properties Trust, which is operated by Betty Ray Anderson, John D. Ray and Edwin N. Ray J...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>homeandhearthealth.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7035</link>
<guid>80177fe965b78111f4dfee80cfdc3689</guid>
<pubDate>Thu, 13 Apr 2023 22:40:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>homeandhearthealth.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee5ff224ed0242c8ebc6928a7482dd7847580fbd5555a0f1ae8e1d5598aa207f</i><br /><br />Threat actor <b>description</b>: <i>I apologize for attacking your medical facility and issue a free decryptor, the partner who attacked you is blocked.http://lockbitfile2tcudkcqqt2ve6btssyvqwlizbpv5vz337lslmhff2uad.onion/r/jVSadFeWyJ#qH8hVa3hIF/nzdKjgwoY4i9j4OSZM/tfYjEdgrkpT8I=</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>SAFHOLLAND</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7029</link>
<guid>955d864a62659945cc9434898e275deb</guid>
<pubDate>Thu, 13 Apr 2023 14:36:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>SAFHOLLAND</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc422e522c4df17fd29b4017d93ec8603e0dcb42d27a4b92d627985ce7d6df1e</i><br /><br />Threat actor <b>description</b>: <i>SAF-HOLLAND is one of the world's largest manufacturers of high-quality axles, suspension systems, fifth wheel couplings, landing legs and kingpins. SAF-HOLLAND products are known for their superior quality, reliability, long service life and cost efficiency.</i><br />Target victim <b>website</b>: <i>https://safholland.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Invenergy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7028</link>
<guid>36e425d506a15b14cec0d71abfb2ac44</guid>
<pubDate>Thu, 13 Apr 2023 13:26:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>unsafe</b> claims attack for <b>Invenergy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fec59d77d72700a3170ff8e8422c0e5ec45608de42fe6b7887591de93cc63956</i><br /><br />Threat actor <b>description</b>: <i> country: US - revenue: 10</i><br />Target victim <b>website</b>: <i>https://invenergy.com</i>]]></description>
<category>unsafe</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aerowind</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7020</link>
<guid>35a12c43227f217207d4e06ffefe39d3</guid>
<pubDate>Thu, 13 Apr 2023 11:11:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Aerowind</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e7a49ac61d78fd9a5f8db3835338976eda2d31fcbd919ee90daa0caae514dc28</i><br /><br />Threat actor <b>description</b>: <i>Aerowind Corp is a company that operates in the Airlines/Aviation industry. It employs 21-50 people and has $5M-$10M of revenue. The company is headquartered in El Cajon, California.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Capstan-Atlantic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7021</link>
<guid>cf866614b6b18cda13fe699a3a65661b</guid>
<pubDate>Thu, 13 Apr 2023 11:10:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Capstan-Atlantic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe709b248849114557faad7496ceb07392b868cafa304bef5ecfc8e727b8df46</i><br /><br />Threat actor <b>description</b>: <i>Capstan Atlantic is a leading producer of precision Powdered Metal Gears, Sprockets and complex Structural Components.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Faps</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7022</link>
<guid>1f33d7cf6693dc6dcc7029b97cc29487</guid>
<pubDate>Thu, 13 Apr 2023 11:10:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Faps</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca9c2c8587242432d25eab741886ada88b17d85998902b6c70e82416c96f8a13</i><br /><br />Threat actor <b>description</b>: <i>FAPS, Inc., originally known as Foreign Automotive Preparation Service, is a third generation company established in Port Newark, NJ in 1956 by John A. LoBue. The pre-delivery company has been providing the Automotive Industry Import/Export preparation services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Southeastern-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7023</link>
<guid>b47767f992ce8624345aca182b76b202</guid>
<pubDate>Thu, 13 Apr 2023 11:09:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Southeastern-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4dce158d140904e69b042b66b2ca67782727b5e85a2d9a5557a059b1adebe6f7</i><br /><br />Threat actor <b>description</b>: <i>Southeastern Louisiana University. The state's third-largest public university, boasting nearly 15,000 students and more than 150 programs of study.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tennessee-State-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7024</link>
<guid>006c64491cb8acf2092ce0e0341797fe</guid>
<pubDate>Thu, 13 Apr 2023 11:09:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Tennessee-State-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7fec73ca9902b091dcb8b53c355e056fe093a83d29fbd50c539364b3514ec724</i><br /><br />Threat actor <b>description</b>: <i>Tennessee State University (Tennessee State, Tenn State, or TSU) is a public historically black land-grant university in Nashville, Tennessee.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Encompass-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7025</link>
<guid>cf0d02ec99e61a64137b8a2c3b03e030</guid>
<pubDate>Thu, 13 Apr 2023 11:08:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Encompass-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3b76d24fa8a78aa062557b5f4baa6fcbec2283f0e863771edfcefd267a626c0</i><br /><br />Threat actor <b>description</b>: <i>Cloud-native ERP, CRM, eCommerce, & data-driven insights for the beverage industry. At Encompass, we’re revolutionizing the beverage supply chain as no other provider has before. By digitally connecting producers, distributors, and retailers, our ERP SaaS and technology solutions streamline operations, simplify decision-making, and equip businesses for success in a fast-changing market.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>IDEXX</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7026</link>
<guid>5dca4c6b9e244d24a30b4c45601d9720</guid>
<pubDate>Thu, 13 Apr 2023 11:08:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>IDEXX</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>72f9426a43a8abffd656352c49806042b688c73211a342ef167a3d1a084eae71</i><br /><br />Threat actor <b>description</b>: <i>IDEXX Laboratories, Inc. is an American multinational corporation engaged in the development, manufacture, and distribution of products and services for the companion animal veterinary, livestock and poultry, water testing, and dairy markets.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Retina-and-Vitreous-of-Texas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7027</link>
<guid>313f422ac583444ba6045cd122653b0e</guid>
<pubDate>Thu, 13 Apr 2023 11:08:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Retina-and-Vitreous-of-Texas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5595972d00c98cd85b54e9813ba86478e79e42540d56b170dfdc503fac35980d</i><br /><br />Threat actor <b>description</b>: <i>Retina Vitreous Associates is a specialty ophthalmology practice devoted to diseases and surgery of the retina and vitreous. Our primary office is located in the Texas Medical Center adjacent to Park Plaza Hospital.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Petaluma-Health-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7010</link>
<guid>281715cafa675bf359ebaa42cb44fa17</guid>
<pubDate>Wed, 12 Apr 2023 17:12:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>Petaluma-Health-Center</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b80bb5d045f7ba8808329e7ec6d5cc3a35640840fd3dd29966577acef8d7c3a</i><br /><br />Threat actor <b>description</b>: <i>The Petaluma Health Center is a Federally Qualified Health Center that strives to care for the "whole" individual by providing excellent care for all patients, regardless of one's ability to pay for services. We do not know whether their patients personal and medical information was stored unsafely because of their disability to pay but we have almost 490GB of this Health Center on our servers. Along with that we've obtained a good amount of financial information (numerous declarations, payment docs, tax forms ...) and personal employees information (SSNs, passports, phone numbers, addresses etc).That is going to be interesting.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>Medicalodges-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7008</link>
<guid>decc2e06a44e61f12a030bc4951563eb</guid>
<pubDate>Wed, 12 Apr 2023 13:21:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>Medicalodges-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e9ba6d4afbe67b44eed777213a0efe6c1d30d291a7d810f24e7bc0be0d685a98</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1961, Medicalodges is a provider of healthcare services. Medicalodges goals is to serve, enhance and care for people. The company shared with us about 170 GB of their data. You can find there lots of personal information (typical for healthcare providers): SSNs, passports, addresses, salaries and much more. Financial and accounting information is also very rich and detailed: balances, budget, tax declarations, client deposits etc. Speaking about their clients, we have NDAs, DBs of their clients addresses, documents, diagnosis and other confidential information.Be ready to check this soon.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zeller</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7006</link>
<guid>c1f75cc0f7fe269dd0fd9bd5e24f9586</guid>
<pubDate>Tue, 11 Apr 2023 19:55:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>Zeller</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>239b18a1a72d9dbcc50ba05d3fc15a2a3f91bd4061a93e51622da46ebcaf12b8</i><br /><br />Threat actor <b>description</b>: <i>Headquarters: 101 E Kennedy Blvd Ste 1700, Tampa, Florida, 33602, United States
Phone Number: (813) 221-1366
They have been breached, and all data will be published if no negotiations take place.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tip-Top-Poultry</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7005</link>
<guid>f514cec81cb148559cf475e7426eed5e</guid>
<pubDate>Tue, 11 Apr 2023 19:55:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>Tip-Top-Poultry</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>233c8711d616b90a874836f06275035acd583236a00e9f92fb41df7667ca63c4</i><br /><br />Threat actor <b>description</b>: <i>Headquarters: 327 Wallace Rd, Marietta, Georgia, 30062, United States
Phone Number: (770) 973-8070</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>uhloans.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6997</link>
<guid>c9049d2a46feb0ae2de6b0636f32ea0d</guid>
<pubDate>Tue, 11 Apr 2023 17:16:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>uhloans.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3fe9d29c6aeffa64dcfc67806488a01987be97d8ca82941b06f6b10d2722ee33</i><br /><br />Threat actor <b>description</b>: <i>Our knowledge of the local market, ability to offer custom solutions, and commitment to personal service are just a few reasons why our clients choose United Home Loans. We continue to grow by exceeding expectations every day.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>servex-us.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7002</link>
<guid>14b85b0752eddc5f25217386e3c6bf22</guid>
<pubDate>Tue, 11 Apr 2023 17:12:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>servex-us.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d266d3002529671158c70f5aac79e32f180b9a22029b5961b53f491c955902a2</i><br /><br />Threat actor <b>description</b>: <i>servex-us.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Smith-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6994</link>
<guid>70d31b87bd021441e5e6bf23eb84a306</guid>
<pubDate>Tue, 11 Apr 2023 15:06:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Smith-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9214893237b17700f2df34bd72ba224a3df6f06695abae806d9b04ce330e3d19</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>arcc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6991</link>
<guid>0394ea68951e3299bcdfa75a097d7c11</guid>
<pubDate>Tue, 11 Apr 2023 09:11:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>arcc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>23642e9c70fc66d2cb3a259355727f9a7003229f697335eee42932fd7ecd286a</i><br /><br />Threat actor <b>description</b>: <i>The mission of ARCC is to provide services, deliver training, and promote innovation to support our regions school districts.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>valleywomenshealth</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6990</link>
<guid>d7f426ccbc6db7e235c57958c21c5dfa</guid>
<pubDate>Tue, 11 Apr 2023 08:36:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>valleywomenshealth</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97a360e8d2244c30edaeccd74faff54e20f98f0b82d0a00aacead787a08b1abf</i><br /><br />Threat actor <b>description</b>: <i>ALL DATA IS PUBLISHED AND AVAILABLE FOR DOWNLOADING!!!</i><br />Target victim <b>website</b>: <i>https://valleywomenshealth.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>bsw-architects.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7318</link>
<guid>02c27682b80b462437ba4efc71267562</guid>
<pubDate>Tue, 11 Apr 2023 01:50:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusalocker</b> claims attack for <b>bsw-architects.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9323bcf0b8bc5f1af143540513a1ae2a2cc7d1d1fc4f9242de95c80c34d8e0cd</i><br /><br />Threat actor <b>description</b>: <i>DescriptionClient Case – agreement – email(.msg)- contracts – and other documents PRICE-$80000 There are many projects, agreements and contracts that can be sold separately</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusalocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Incredible-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7090</link>
<guid>7cc980b0f894bd0cf05c37c246f215f3</guid>
<pubDate>Mon, 10 Apr 2023 22:28:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dunghill_leak</b> claims attack for <b>Incredible-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e237578af48630297309b1d48aa67d1a250dc626bd5a678fe37fb44e2d68d6d5</i><br /><br />Threat actor <b>description</b>: <i>Incredible Technologies is an American developer and manufacturer of coin-operated video games and Class III casino games based in Vernon Hills, Illinois. The company's most common product is the Golden Tee Golf series. IT, Inc. products and gaming software are used in more than 50 counties around the world.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dunghill_leak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nature-Path-Foods</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6987</link>
<guid>1a37546d1929c0ff3ca32d2ddacc41a9</guid>
<pubDate>Mon, 10 Apr 2023 21:07:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Nature-Path-Foods</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c300f072e68d766570e77f76ba2084f0eabd5d61f9766801db67e8722d7abdcd</i><br /><br />Threat actor <b>description</b>: <i>Nature's Path Foods was founded in 1985 in Richmond, Canada. It is a family-run, fiercely independent, sustainably-driven, and delightfully nutritious organic breakfast and snack food company. Among almost 40GB of accounting and financial data we've found interesting employees' docs such as work permissions, resumes with addresses, emails, phones ect. There are also lots of agreements, contracts, invoices and other documents that worth to see.Feel free checking the data.</i><br />Target victim <b>website</b>: <i>http://www.naturespath.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stanley-Electric-U.S.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6988</link>
<guid>251bd0442dfcc53b5a761e050f8022b8</guid>
<pubDate>Mon, 10 Apr 2023 21:06:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Stanley-Electric-U.S.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>23637117b0c88fdbc2c6cafd4e01172878d546876628e843d4233eec8fa60f63</i><br /><br />Threat actor <b>description</b>: <i>Stanley Electric US is a manufacturer of motorcycle and automotive lighting equipment for Honda and Nissan. This real big fish is going to lose it's internal data of a great size - more than 2TBs. We have not only interesting details about their cooperation with big business names like JP Morgan, Nissan, Honda and others, but also their employees' personal information: thousands of SSNs, passports, medical information, vaccination information. And there are more: incidents, violations, confidential info, tons of contracts and so on and so forth.Priceless data for you soon.</i><br />Target victim <b>website</b>: <i>http://www.stanleyelectricus.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alvaria</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6979</link>
<guid>b6a8cdd64382383f29fac327a8292096</guid>
<pubDate>Mon, 10 Apr 2023 15:09:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Alvaria</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9d1b7e3279bfd87ddd6062d5faff3717a8787219de0db4c2235c3e0db75dd287</i><br /><br />Threat actor <b>description</b>: <i>Business Intelligence (BI) SoftwareAlvaria was founded through the merger of Aspect Software and Noble Systems, technology leaders in Customer Experience (CX) and Workforce Engagement solutions. Our name is derived from Latin for "hives" - nature's perfect form for millions of yearsHeadquarters5 Technology Park Dr Ste 9, Westford, Massachusetts, 01886, United StatesPhone Number(877) 258-0268</i><br />Target victim <b>website</b>: <i>http://www.alvaria.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Big-Ass-Fans</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6980</link>
<guid>4edb2dc80889b1aec708ec4730f22387</guid>
<pubDate>Mon, 10 Apr 2023 15:08:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Big-Ass-Fans</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f0b3cd93971f00b1ecd3c5d538cb6dd8ffc527b7081fc96cf462f4c2520e5f43</i><br /><br />Threat actor <b>description</b>: <i>Big Ass Fans is a fans, light and controls manufacturer for different business directions. These guys have nothing against holding their employees personal information almost open-sourced. They've lost 246 gygabytes of data interested for its details. Tons of accounting and finance information, projects, contracts, payment docs, employees' salaries, passports, medical insurance policies, phones, emails - everything you want.</i><br />Target victim <b>website</b>: <i>http://www.bigassfans.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tom-Duffy-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6977</link>
<guid>312f1ba2a72318edaaa995a67835fad5</guid>
<pubDate>Mon, 10 Apr 2023 13:22:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Tom-Duffy-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b69844140848f5106552c98518bd4049fb63953848b7bcc6c600349f4711f773</i><br /><br />Threat actor <b>description</b>: <i>Commercial & Residential ConstructionFounded in 1956, Tom Duffy Company specializes in floor covering and supplies offering flooring installation, Ceramic Tile & Stone Setting, and floor heating systems. Tom Duffy Company is located in CaliforniaHeadquarters400 E Ball Rd, Anaheim, California, 92805, United StatesPhone Number(562) 404-7900</i><br />Target victim <b>website</b>: <i>http://www.tomduffy.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Scantibodies-Laboratory-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6975</link>
<guid>6084e82a08cb979cf75ae28aed37ecd4</guid>
<pubDate>Mon, 10 Apr 2023 02:18:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Scantibodies-Laboratory-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf9e60daf50be414e0bc45963b03ebcd36350fff83143c96ffee04b56b340132</i><br /><br />Threat actor <b>description</b>: <i>Scantibodies Laboratory, Inc. (SLI) founded in 1976 and headquartered in Santee, California, develops and manufactures medical diagnostic products. The company offers products such as antigens, antibodies, blockers, calibrators, plasma and diagnostic kits. SLI sells its products worldwide.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crown-Grinding--Machining</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6971</link>
<guid>1c280e54c157ef973dad67751c0a525d</guid>
<pubDate>Sun, 09 Apr 2023 19:07:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Crown-Grinding--Machining</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aad81c80f48ce2cb9fe3f18e933eb814a76c1b7df5932a4fab2d8e2893877ad8</i><br /><br />Threat actor <b>description</b>: <i>Crown Grinding and Machining has been providing quality material and service since 1999. Our modern facility and experienced operators are capable of meeting your custom steel needs. We specialize in surface grinding and milling as well as steel supply.</i><br />Target victim <b>website</b>: <i>https://www.crowngrinding.com/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Collegedale</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6973</link>
<guid>faa98789cfb692431ffb52e13497443a</guid>
<pubDate>Sun, 09 Apr 2023 19:07:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>City-of-Collegedale</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b830ac78dd0dd1ddd36c80978a560e4b76a3f3be7e6f2131bf0ca4ca1aacc119</i><br /><br />Threat actor <b>description</b>: <i>With a 2020 population of over 11,000 Collegedale is situated in eastern Hamilton County 15 minutes east of downtown Chattanooga, along the Interstate 75 corridor. Located adjacent to the Enterprise South Industrial mega site, the city lies at the center of a larger five-mile trade area that encompasses nearly 30,000 households. Between 2000 and 2010, the city’s population grew 27%, making Collegedale the fastest growing municipality in Hamilton County.</i><br />Target victim <b>website</b>: <i>https://www.collegedaletn.gov/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>RepcoLite</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9474</link>
<guid>7eab47bf3a57db8e440e5a788467c37f</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>RepcoLite</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a5755f70c2180c15150a9184fcf241436ae556657410a9e4afc3a467207e706</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>ConnectTo</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9484</link>
<guid>ca91873a9667a6bd98115829f350b5a4</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>ConnectTo</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12b2915ccd61b3951868617c755fc4ddd3efcccf6a19fb1bbec0b7b902413be3</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>LunarWeb</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9487</link>
<guid>2287c6b8641dd2d21ab050eb9ff795f3</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>LunarWeb</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3040630053cc914fad3e1082d5f284ce818a10cb7a11be97498265ec4b0941a2</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>Custom-Manufacturing--Engineering-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9491</link>
<guid>003dd617c12d444ff9c80f717c3fa982</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>Custom-Manufacturing--Engineering-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f6d855f06f76b037f2967fbf4b0c5a20b4b53c96dd8ece1e694093530b271c4</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>MHWEB</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9499</link>
<guid>6f16f5fc2cf3c8c09e020596e15da2e9</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>MHWEB</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5105d4cbbd07cc1c658465625424081921bf8fe57e2bc2c94c4cb878f9f138a2</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>Angle-Metal-Mfg.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9508</link>
<guid>61c66a2f4e6e10dc9c16ddf9d19745d6</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>Angle-Metal-Mfg.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fcbfb1d3a3381077c71a685cde3417734161a057a19042ddb0f06c641a8022a8</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Sound-Organisation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9509</link>
<guid>2bdfb48c5fa7d2344b71ef45c8a7d31c</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>The-Sound-Organisation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f8f3a4e9e5767b39bd7684a9c078d72b56f1bb383f6478bee3a51b20229b218</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>ISG-Software-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9350</link>
<guid>52ff52aa56d10a1287274ecf02dccb5f</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>ISG-Software-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5680c74e3b1dfaa530d08560d4a1ad31aae5c24a431b2131bde273e43d83cac2</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mangum-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9360</link>
<guid>8c5b18cbdfd35320a10729d3aaf1343b</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>Mangum-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d116786d3e0ca28a1ad3f1c1d99d693c4e577e52890b86ceb420cb51e0344e68</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>Orcutt-Winslow</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9361</link>
<guid>0bc10d8a74dbafbf242e30433e83aa56</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>Orcutt-Winslow</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3996fbcdc2d67f4699029b39293cf9ffd95ff6aa1fadc91cd78d3cbff2f32226</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>Etanova</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9370</link>
<guid>f2617d00a4f462b47ee02e168ae3273b</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>Etanova</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7aa6dee5b5f9bda17eb7184e8fd06ced3ea7be7441bf9a31d9ecf451d3251581</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>TBIT-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9378</link>
<guid>4513c30b7d281d3bd5b6f91ddb1f61b9</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>TBIT-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8c9c0496ed889af2f9bc4546ed73efc34bd5c34c42440cf16964e6ead5bb7a1d</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>International-Cargo-Equipment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9382</link>
<guid>d9a5cf487c8317dba2cc8fafcf8a18a8</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>International-Cargo-Equipment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5fd3900994031cece44a2d6c573261543b98c279a8f7463693978b46cebdf339</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>Evology-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9389</link>
<guid>2747e3c644b9a085cd4d3a7718b16024</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>Evology-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>192219494e8197e7318f5ff3425d7d713dd8626fd343524bfdcd70e13cd50cf6</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>Qball-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9393</link>
<guid>1415fe9fea0fa1e45dddcff5682239a0</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>Qball-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aec609bc9e79d8be2b2b989f4472b28b99521be56353b0e03ff6af622738e7ba</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>TitanPower</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9394</link>
<guid>9f4b4f2f258308200b389ca0523f92f8</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>TitanPower</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2d4d641baa83998a90106cc63cbf37c9c5a82ff1c5a42cfd9b708eddb8571355</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>Answerpro</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9406</link>
<guid>6948bd44c91acd2b54ecdd1b132f10fb</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>Answerpro</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d014e4f6ea402e2a367e8424406c917a4f697804fbb32708595fe9d503425ec3</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>Iris-Key-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9410</link>
<guid>210b7ec74fc9cec6fb8388dbbdaf23f7</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>Iris-Key-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aaa4f6da46d6e2bddfc24fce27ef6a184898c1e9a1ba7e47d86838068be04758</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>Totality-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9423</link>
<guid>6ba0bf4c0fe33816952cd589611c4dbc</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>Totality-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>616afc4865ae4c2c030afb373d522d3b58e05bde0ab54184a01156f21bab1925</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>AVM-Software--Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9426</link>
<guid>e32084632d369461572832e6582aac36</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>AVM-Software--Technology</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0f2f830847f2a66c1a2298c96a09e2a94f17ebac143153688f29f2b3d7d8a9d</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gallagher--Co-Consultants</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9437</link>
<guid>eff7451f28530f1defbd5e78bb67a742</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>Gallagher--Co-Consultants</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ff95cacf71bd86cdad90691e0640097664128c0637be37665f7c739840df156</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zite-Media</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9451</link>
<guid>bd5b4f9a59e6d9f66f569802e55301b5</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>Zite-Media</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>426dc22a4f458cb22a03bae3a1263a1f3b1af9cd4e2333bd87d94697ce9fb987</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>Johnston-Technical-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9454</link>
<guid>840b37847dbecfa4be4cf70cfade8d1d</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>Johnston-Technical-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>505d97e4aa5f955592391dc4a29deb6a675bb7a6b83fcd774a3d6f315a8dc9fe</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>InfinCE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9461</link>
<guid>b6f76d7dbb84020faf70b18a13d73a27</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>InfinCE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b2e88ee1902a888266c2d9d2f50093f217eef3b57496f2c5150a9955b5b9e848</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hardmans</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9465</link>
<guid>651468b37f95f5f421cccbf8fb7ee376</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>Hardmans</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46a1ae1409e32f4fec33e918106dd7bb5fb2c03209ec1a94dd794504c3bb7cca</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>KriaaNet-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9466</link>
<guid>d117dca133c64bf78a4b7696dd007189</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>KriaaNet-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d7154bc464df5496450954bcb6183a9a64a9f74c8f701d1cee0d1f19b0a0f422</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>cashbackAPP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9468</link>
<guid>cd506ab1234b234645dcf279691347f5</guid>
<pubDate>Sun, 09 Apr 2023 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>malas</b> claims attack for <b>cashbackAPP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>90100444800fc3e6570afc3fc340919099f38cb5c7ca01d3524364f49d022778</i><br /><br />Threat actor <b>description</b>: <i>using Zimbra vulnerability</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>malas</category>
</item>
<item xmlns:dc='ns:1'>
<title>baysideinteriors.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6965</link>
<guid>93189dd27c5c3221f5687b74bcba0ab6</guid>
<pubDate>Sun, 09 Apr 2023 08:06:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>baysideinteriors.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34c6eca91fdaa47877e51d072df12e1b90adb82c162c1bcb03c9727f5412b6b5</i><br /><br />Threat actor <b>description</b>: <i>Bayside started in 1984 as a Northern California family owned and operated business, offering services in Southern California since 2006. Nearly 40 years later, we have proudly grown to serve customers across the nation and around the globe. Headquar...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Palo-Alto-County-Sheriff</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6966</link>
<guid>dba4c1a117472f6aca95211285d0587e</guid>
<pubDate>Sun, 09 Apr 2023 08:04:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Palo-Alto-County-Sheriff</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>710cd4ae21a73e98393f1d88ddb83684466bc71aeeb79b106aa093258f4fa540</i><br /><br />Threat actor <b>description</b>: <i>Iowa, United States</i><br />Target victim <b>website</b>: <i>www.paloaltosheriff.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Legion-Aero</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6968</link>
<guid>29c0605a3bab4229e46723f89cf59d83</guid>
<pubDate>Sun, 09 Apr 2023 08:04:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Legion-Aero</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>847c0b2460623f9e470d4c65f3e80a3e0cbe4b217b22fb42f2f5880239efa2ff</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.legionaero.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Raymond-Storage-Concepts</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6956</link>
<guid>2377f9eb902f3c5855aca19197689b14</guid>
<pubDate>Sat, 08 Apr 2023 17:05:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Raymond-Storage-Concepts</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8232a32f345f6e53bc48cd4a84c1b82a744c0f9c9294036eee62e152196d4ab9</i><br /><br />Threat actor <b>description</b>: <i>For over 45 years Raymond Storage Concepts, Inc. has been the official dealer of Raymond Forklifts in Ohio, Kentucky, Southeast Indiana and West Virginia. As our business has grown and evolved, we have recognized there are 3 critical, yet simple, elements to our success: our customers, our suppliers and our associates.We have an obligation to our customers to help them reach their business objectives. With a focus on honesty and integrity we strive to provide our customers with the best products and services our industry has to offer.We are partnered with a team of world class providers of material handling technology. They are carefully selected to give our customers the long term solutions required for success.SITE: https://www.raymondsci.com Address 5480 Creek RoadCincinnati, Ohio 45242Phone: 513-891-7290Fax: 513-891-7299</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>DCI-ENGINEERS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6957</link>
<guid>6fd86e0ad726b778e37cf270fa0247d7</guid>
<pubDate>Sat, 08 Apr 2023 17:05:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>DCI-ENGINEERS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>70d2a1fb31adb4a3cd91356e50332027cecd9d73b93738def6fe0241b4eef091</i><br /><br />Threat actor <b>description</b>: <i>Since 1988, DCI Engineers has been providing engineering design solutions for our clients. We are a 22-office, nationwide firm providing civil, structural, right-of-way, industrial & bridge services. DCI is licensed and building in all 50 States, providing our clients regional expertise backed by national experience. We’re passionate about providing engineering solutions for our industry partners, no matter the project size, scope or materials – from the tallest concrete residential building west of the Mississippi to a single-family home in the Montana foothills, we do it all.SITE: https://www.dci-engineers.com Address 818 Stewart Street, Suite 1000Seattle, WA 98101(206) 332-1900 Phone(206) 332-1600 Fax</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>HEICO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6958</link>
<guid>27e9661e033a73a6ad8cefcde965c54d</guid>
<pubDate>Sat, 08 Apr 2023 17:05:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>HEICO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>472d692a67d1e858b815bf8acdbf0da56e6a8686f407822e8464ea737010da32</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1957 and headquartered in Hollywood, Florida, HEICO is a company that designs, produces, services and distributes products and services to segments of the aviation, defense, space, medical, telecommunications and electronics industries.SITE: www.heico.com Address 3000 Taft St, HollywoodFlorida, 33021, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Zalkin-Law-Firm-P.C.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6953</link>
<guid>5e34a2b4c23f4de585fb09a7f546f527</guid>
<pubDate>Sat, 08 Apr 2023 11:05:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>The-Zalkin-Law-Firm-P.C.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53e5340eae74516880a49db4f3e073c906dc2cd109c3dc26ed8c00bcaf17cb96</i><br /><br />Threat actor <b>description</b>: <i>The Zalkin Law Firm is one of the country’s premier sexual abuse and personal injury firms. Backed by a team of award-winning trial lawyers, we have achieved groundbreaking settlements and verdicts in high-profile sexual abuse and personal injury cases against some of the largest corporations and institutions in the nation.  Each attorney at The Zalkin Law Firm has devoted their career to upholding the rights of victims across the country. You have legal rights in cases where you have been harmed or damaged by another’s misconduct, and our attorneys have the experience and resources to help you navigate this difficult legal and personal journey.</i><br />Target victim <b>website</b>: <i>https://www.zalkin.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pharmerica.com--BrightSpring-Health-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6951</link>
<guid>f5cfbc876972bd0d031c8abc37344c28</guid>
<pubDate>Sat, 08 Apr 2023 09:11:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>moneymessage</b> claims attack for <b>Pharmerica.com--BrightSpring-Health-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34e0660c361396804c95e31c91768e04a221676d671fc859d12d13e50e6c1268</i><br /><br />Threat actor <b>description</b>: <i>Headquartered in Louisville, Kentucky, PharMerica is one of the largest and fastest-growing institutional pharmacy companies in the United States. Our premier pharmacy services, with more than 180 long-term care pharmacies in almost every state, have a national scope but a local approach.Revenue: $3BBrightSpring Health Services is the leading provider of complementary home- and community-based health services for complex populations in need of specialized and/or chronic care. We focus on providing quality outcomes, through best-in-class service and technology capabilities.Revenue: $5.4B</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>moneymessage</category>
</item>
<item xmlns:dc='ns:1'>
<title>baughmanco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6938</link>
<guid>33cf42b38bbcf1dd6ba6b0f0cd005328</guid>
<pubDate>Fri, 07 Apr 2023 17:10:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>baughmanco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>987bcc41f053f9c4b37892023d3fd018ea66eeca399ba1a2a56ba2e15c084ae9</i><br /><br />Threat actor <b>description</b>: <i>In 1930, Clyde Baughman founded Baughman (pronounced BOFF-man) with the goal of creating an honest, reliable company that would make a difference. When Clyde planted the company’s roots in Wichita, he had bigger ambitions than to simply become succes...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>bh-pattern.inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6934</link>
<guid>10ffbba2ec9025b945acc154f3403aec</guid>
<pubDate>Fri, 07 Apr 2023 13:23:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>bh-pattern.inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b0e7a3db93e094d5af9540d1e70e4a3228443b3c694d9ae13639db64f881c7b</i><br /><br />Threat actor <b>description</b>: <i>Established in Appleton, Wisconsin in 1972, B&amp;H Pattern Inc. is a producer of patterns and molds for the foundry industry. From day one, our goal has been simple: To honor the promise to our clients that we will meet their required lead times and exceed their expectations for service and quality.</i><br />Target victim <b>website</b>: <i>http://bh-pattern.com/services/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Atlantic-International-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6929</link>
<guid>e0308d73972d8dd5e2dd27853106386e</guid>
<pubDate>Fri, 07 Apr 2023 05:10:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Atlantic-International-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c33d45cdf3a5b2592c6f33b8b29ea12a7f42846769d1098adfb96853aa97c4b</i><br /><br />Threat actor <b>description</b>: <i>Atlantic International University, V. ("AIA") is a private commercial distance learning university based in Honolulu, Hawaii, was founded in December 1998 as Atlantic University. Despite the fact that the AIA is located in Hawaii, it is not accredited by a recognized accreditation agency of the United States, and therefore was prosecuted for providing false information to its clients about the accreditation of an educational institution.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Beghelli-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6925</link>
<guid>7ef2f13f0e9d3478d7c36f6483d38a86</guid>
<pubDate>Fri, 07 Apr 2023 03:41:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Beghelli-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9825322859eaf62b0e8ae89d68baf267cc96c9592f8a17ca50ec82f6456d5c8b</i><br /><br />Threat actor <b>description</b>: <i>Beghelli USA is a provider of emergency lighting products. We have worked with them a little and we are going to light some of their data. This pack includes accounting and finance data, personal information of their employees (passports and others), results of medical analysis, inner confidential data etc. Enjoy!</i><br />Target victim <b>website</b>: <i>http://www.beghelliusa.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kretek-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6926</link>
<guid>9b8b50fb590c590ffbf1295ce92258dc</guid>
<pubDate>Fri, 07 Apr 2023 03:40:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Kretek-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9cf88ad4abadce85938ed90c1ce1266279cb20871098bbcf42573f7e969dd313</i><br /><br />Threat actor <b>description</b>: <i>Kretek International, Inc is a number one importer, marketer, and distributor of specialty tobacco products to convenience, mass, and national retailers in the US. We are going to distribute the data of 70GB size we got from them. We have accounting, finance data, payment information, contracts, personal information (employees' info, addresses etc.), information about their projects and so on.Release coming soon.</i><br />Target victim <b>website</b>: <i>http://www.kretek.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>bhrcorp.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6918</link>
<guid>009c434cab57de48a31f6b669e7ba266</guid>
<pubDate>Thu, 06 Apr 2023 17:11:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>bhrcorp.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad91f0cc585f853f9ac03ee1eb8036eb4288a1f3b3f5e882cabc7a2e2177bace</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1999 by President and Chief Executive Officer Neisha Becton, M.A., Becton Healthcare Resources, Inc. has built an impressive record of achievement and performance. BHR has steadily grown from a startup company into now over a decade of...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Officeworks-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6910</link>
<guid>a569398d13eb87b14276380d2921ddbc</guid>
<pubDate>Thu, 06 Apr 2023 11:13:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>Officeworks-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4865d90382b2ca58ca8320b15f2f543c520e00d8f66c2019aebdcd01055d421a</i><br /><br />Threat actor <b>description</b>: <i>Officeworks Inc, has shared with us some of their employees with addresses, birth certificates, drivers licenses and others. Also we have a pretty detailed accounting, finance information, tax and insurance data. Project and property information along with their internal incidents, penalties and other HR stuff are a bonus.Much to check. You are welcome!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>Quad-County-Ready-Mix</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6912</link>
<guid>15756c350dae3457b2718a29dc0018cb</guid>
<pubDate>Thu, 06 Apr 2023 11:12:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Quad-County-Ready-Mix</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a94ba217f5bb905ccca80b1605f043e22667a3d1d696b1ea6836dbf6f13e552c</i><br /><br />Threat actor <b>description</b>: <i>Concrete manufacturer, Fourth Generation Family-Owned Business. QCRM has always welcomed the chance at new challenges and if given the opportunity, QCRM would supply any project with the highest quality and service standards in the industry, while maintaining a strong dedication to safety.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>HIGHLANDHOMES</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6908</link>
<guid>ab9ebd57177b5106ad7879f0896685d4</guid>
<pubDate>Thu, 06 Apr 2023 09:09:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>HIGHLANDHOMES</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c29f76380617ea07a205b690690d7d41133628ee5541f53ea222ad03c59995c</i><br /><br />Threat actor <b>description</b>: <i>ALL 2.06 TB DOWNLOADED DATA IS PUBLISHED AND AVAILABLE FOR DOWNLOADING!!!</i><br />Target victim <b>website</b>: <i>https://www.highlandhomes.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>quiltsinc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6902</link>
<guid>e2459ae2cf7921589685a6835ec08a7c</guid>
<pubDate>Thu, 06 Apr 2023 02:19:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>quiltsinc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5fc7a1b073125e6251b55368ba0ac561a3ee2347d38af9a60d5ab5b6bc9b5dd6</i><br /><br />Threat actor <b>description</b>: <i>https://www.quilts.com/</i><br />Target victim <b>website</b>: <i>https://www.quilts.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>nautic.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6900</link>
<guid>9c805dcddc7db4e825949f20601fc73b</guid>
<pubDate>Wed, 05 Apr 2023 21:12:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>nautic.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f2a0c086286855d4f10f0a160154b445fecc0dabbb8132dc4099ac62e246f025</i><br /><br />Threat actor <b>description</b>: <i>Nautic’s mission is to support the long-term value creation of our portfolio companies while preserving the strong culture that makes us attractive to our management teams, employees, and other business relationships. To accomplish this, our investme...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>turncommerce.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6893</link>
<guid>05d0abb9a864ae4981e933685b8b915c</guid>
<pubDate>Wed, 05 Apr 2023 17:20:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>turncommerce.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>522fae9bf2f4052c428c1d7c1203e994346c19d5e94803bd56ee9041f1610a13</i><br /><br />Threat actor <b>description</b>: <i>TurnCommerce is the parent company of a wide variety of Web properties. We primarily focus on the domain space. With deep technical expertise, powerful infrastructure, and strong support we provide complete solutions for domainers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>nestseekers.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6894</link>
<guid>69ec5030f78a9b735402d133317bf5f6</guid>
<pubDate>Wed, 05 Apr 2023 17:20:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>nestseekers.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>85d4efe6918e0cbe7948d91ea3f38048c57e28f39c9a4054c5576bed175a154a</i><br /><br />Threat actor <b>description</b>: <i>Revenue: 1.3BNest Seekers International is a game-changing firm in the rapidly expanding global real estate marketplace. The firm's hybrid tech & brand enabled model has inspired a new wave of thinking in the industry, and its approach to daring...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hull-Property-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6895</link>
<guid>7bcd91571fc1119e87d81e1054255e73</guid>
<pubDate>Wed, 05 Apr 2023 17:19:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Hull-Property-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b9da31be6b918f5014bb46d17a82141d31f683143a84b2156845589d90b4d18e</i><br /><br />Threat actor <b>description</b>: <i> Our History     Hull Property Group is a full service retail real estate company headquartered in Augusta, Georgia. Founded in 1977 by James M. Hull, the company has grown to be one of the largest privately owned retail real estate companies in the United States with an owned portfolio in excess of 16 million square feet. Hull Property Group strives to facilitate a transformational improvement to the enclosed mall and surrounding retail node in communities across the United States. All company employees across departments and locations work to fulfill this mission. </i><br />Target victim <b>website</b>: <i>https://hullpg.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>UnitedLex</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6896</link>
<guid>58f1e2bfc0c0c182f1afdab7cae02402</guid>
<pubDate>Wed, 05 Apr 2023 17:19:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>UnitedLex</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>567cd5b13cccff362a0effd5aaf08dc5ab561fa057df63c366d5381b3f5dff50</i><br /><br />Threat actor <b>description</b>: <i>"UnitedLex delivers unparalleled transformation for legal and business in the Digital Age. We are committed to excellence in every aspect of our client, employee, and community relationships."</i><br />Target victim <b>website</b>: <i>https://unitedlex.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Noteboom---The-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6897</link>
<guid>e32cc80bf07915058ce90722ee17bb71</guid>
<pubDate>Wed, 05 Apr 2023 17:18:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Noteboom---The-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>44f14d87235113d79876a2436dc2598573eb51609e02a9b663646f342cc7e368</i><br /><br />Threat actor <b>description</b>: <i>Noteboom—The Law Firm can provide you with an experienced Fort Worth personal injury attorney that is wholly dedicated to ensuring you get the right outcome for your personal injury claim. We have a lead private investigator who is on-staff, rather than contract. We have relationships with various experts, along with the ability to front expert fees and court costs.  When you add in our highly experienced legal team, it becomes clear why you should never leave your future to chance—or to a less experienced law firm. When you become a client, you will benefit from our extensive resources, and this can make the difference between a positive outcome and a less positive outcome. Contact Noteboom—The Law Firm today for a comprehensive consultation.</i><br />Target victim <b>website</b>: <i>https://www.noteboom.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tarolli-Sundheim-Covell--Tummino-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6885</link>
<guid>d9e74f47610385b11e295eec4c58d473</guid>
<pubDate>Wed, 05 Apr 2023 13:41:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lorenz</b> claims attack for <b>Tarolli-Sundheim-Covell--Tummino-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db840e5430af1eef68184029e2b054769e78b192b77e9248923fb4f6392a9a5f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lorenz</category>
</item>
<item xmlns:dc='ns:1'>
<title>Joy-Cone-Co-Joy-Baking-group-BoDeans-Baking-Altesa</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6886</link>
<guid>5bd844f11fa520d54fa5edec06ea2507</guid>
<pubDate>Wed, 05 Apr 2023 13:41:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lorenz</b> claims attack for <b>Joy-Cone-Co-Joy-Baking-group-BoDeans-Baking-Altesa</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f5887dde98c172ce7962ed2c8d579a7ec6a958ce78514cb51b9c63680b43b1bf</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lorenz</category>
</item>
<item xmlns:dc='ns:1'>
<title>Moore-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6889</link>
<guid>0a552abf945aad2831a917bd58bbdc70</guid>
<pubDate>Wed, 05 Apr 2023 13:41:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lorenz</b> claims attack for <b>Moore-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f5de0ac2261d0ca60bfcff0d85577deb0e0aad749ee38327cae0cfe89f466bb6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lorenz</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Sage-Next</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6892</link>
<guid>f2f446980d8e971ef3da97af089481c3</guid>
<pubDate>Wed, 05 Apr 2023 13:37:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>The-Sage-Next</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbfb47413a0d049c339b835282e7465aeb0da626e49130c55e215e22e17970d3</i><br /><br />Threat actor <b>description</b>: <i> Authorized QuickBooks Solution Provider doesn't know how to secure tax data and trying to play with Kitty. If we don't see you soon we will upload clients backups with full QB/SAGE databases. </i><br />Target victim <b>website</b>: <i>https://thesagenext.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>olympia.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6883</link>
<guid>a577dad7e00eaad256c112c836f55b11</guid>
<pubDate>Wed, 05 Apr 2023 11:17:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>olympia.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>310756cc80c65df60a74509dfe45fb5c91b7344bd856c58fdb8dc92a939d73ca</i><br /><br />Threat actor <b>description</b>: <i>Olympia Community Unified School District 16 contains 5 schools and 1,722 students. The district’s minority enrollment is 10%.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Corporate-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6870</link>
<guid>e474e8520850a6f3d13f268666736f33</guid>
<pubDate>Tue, 04 Apr 2023 22:17:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Corporate-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>40819599cfde7ff3b30c80532e06698be21352af726340b4073bec04dbbee4c5</i><br /><br />Threat actor <b>description</b>: <i>Corporate Technologies never puts IT first, it always puts people first, both internally and externally. Many companies try to claim this yet, they fall extremely short of being able to prove it. Clearly, that aspect of the Corporate Technologies brand personality is exemplified through actions.Corporate Technologies is all about relationships and it is one of the clearly defendable aspects of the organization’s brand personality. Corporate Technologies defines solutions through conversations, leading to relationships that untimely define people-focused technology-driven solutions. Solutions, that once implemented, translate technology into performance defined and measured from the customer’s perspective.SITE: www.gocorptech.com Address 6210 Bury Dr, Eden PrairieMinnesota, 55346, United StatesTel: (952) 715-3600</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Precision-Fabrics-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6871</link>
<guid>7ea25c95b0792ca4ce01ea18bbda2d44</guid>
<pubDate>Tue, 04 Apr 2023 22:16:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Precision-Fabrics-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9100ebc80148303bf20708897944c9f2163b4886d2640efeaaf9870c867628a1</i><br /><br />Threat actor <b>description</b>: <i>Precision Fabrics Group was created in 1988 in a leveraged buyout from Burlington Industries, and continues today as a privately-held company.  The Company has evolved from a traditional textile manufacturer into an engineered materials business, focused on highly technical, high-quality woven and nonwoven materials.Today, PFG employs approximately 600 associates and operates plants in North Carolina, Virginia and Tennessee. Corporate headquarters are located in Greensboro, NC.   Our Vinton, VA plant specializes in weaving some of the most technically challenging continuous-filament fabrics in the world. Our Greensboro and Madison, TN facilities are world-class in the range of nonwoven products produced.Precision Fabrics was the first ISO-qualified textile supplier in the USA. ISO continues to provide the discipline and framework for effective and efficient product development, customer service, and manufacturing.  Precision Fabrics has been ISO-registered to 9001 since 1993.  We were certified to 9001:2015 as of October 2018.SITE: www.precisionfabrics.com Address 301 N Elm St Ste 600Greensboro, North Carolina27401, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Shively-Bros</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6872</link>
<guid>83715fd4755b33f9c3958e1a9ee221e1</guid>
<pubDate>Tue, 04 Apr 2023 22:16:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>The-Shively-Bros</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ef74a18b8d689224538be1ea1f9f84a055f97fced1724270f0d968e200dd5ab</i><br /><br />Threat actor <b>description</b>: <i>The Shively Bros team is on a mission to retain current valued customers and earn new business by providing exceptional value through effective products, outstanding services, and the introduction of new technologies.Shively Bros is dedicated to being a diverse and inclusive company that assists its employees in building wealth and assets equitably. We attribute much of our success to the fact that each of our employee-owners are empowered and driven to provide the best service to our customers. The combination of Shively’s essential elements describe who we are, where we are going, and how we plan to get there.SITE: www.shivelybros.com Address 2919 S Grand Traverse, FlintMichigan, 48507United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dalumi-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6867</link>
<guid>9cd78264cf2cd821ba651485c111a29a</guid>
<pubDate>Tue, 04 Apr 2023 17:19:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Dalumi-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3af3a40000acc8fd9efa96f062092256f1e92330efad175c8b9230e8922752e4</i><br /><br />Threat actor <b>description</b>: <i>Buy Directly from the Source Every diamond is a story in itself, full of history and fascination and love. The source and heritage of Dalumi diamonds are the ingredients of its inspiration. Heritage as knowledge Just as our diamonds can be traced back to their source, Dalumi’s legacy is inspired by family integrity. Beauty is in the eyes of the beholder But in diamonds, there is more than meets the eye  Since 1993, Dalumi has been a proud Sightholder of the world’s leading diamond company De Beers, attaining the opportunity to purchase their rough diamonds.  </i><br />Target victim <b>website</b>: <i>https://www.dalumi.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>garrottbros.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6865</link>
<guid>f1b8b7b3ceb65c188dcdc0851634cadf</guid>
<pubDate>Tue, 04 Apr 2023 11:06:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>garrottbros.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>716c1670d2e3c240511a542b560ae244dba7eca6051ddb75cff4e3e6a037121f</i><br /><br />Threat actor <b>description</b>: <i>Since 1950 the Garrott family has owned and operated the ready mix business in middle TN. Starting from just 2 mixers, Garrott Bros Ready Mix has grown into a multi plant and mixer operation.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>midamericanglass.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6860</link>
<guid>31a6b5568bbb9c350c1b296d9086acf0</guid>
<pubDate>Mon, 03 Apr 2023 23:10:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>moneymessage</b> claims attack for <b>midamericanglass.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>944beb6f11fb0f4483076b6fefac3e8b37fbec953ecc21ec92d149903d6d304e</i><br /><br />Threat actor <b>description</b>: <i>Mid-American Glass is a regional distributor / fabricator of flat glass, insulating glass, and architectural metal. While flat glass distribution remains the strength of our company, our fabrication of insulating glass and architectural metal continues to drive our growth.Website www.midamericanglass.comRevenue $11.4M</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>moneymessage</category>
</item>
<item xmlns:dc='ns:1'>
<title>thened.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6861</link>
<guid>a957aa96221d0b7cb99ab072eaed7bf9</guid>
<pubDate>Mon, 03 Apr 2023 23:08:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>thened.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>010e00fd0f52f737e1ef38edaecb065023388830647ac8020a6ea0e26bfd5cf1</i><br /><br />Threat actor <b>description</b>: <i>Situated in the heart of the City, in the former Midland Bank headquarters, The Ned houses Ned’s Club, a private members’ space, gym and rooftop, alongside a public spa, ten restaurants & bars and 250 hotel bedrooms.Located in The Johnston Building...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>TWHOUSE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6849</link>
<guid>ecb9fe2fbb99c31f567e9823e884dbec</guid>
<pubDate>Mon, 03 Apr 2023 19:11:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>TWHOUSE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>11c03b99e941c2dc7a6b2ded0a1b1c739283e0bab5da7b4ded456dcc6f32b57a</i><br /><br />Threat actor <b>description</b>: <i>The Wholesale House is a company founded in 1978 by Steven and Mary Hite. Starting from humble beginnings with two people working from their home to multiple warehouses today, one thing has never changed: their commitment to exceeding customer expectations. Through a combination of hard work and dedication, the company has become one of the largest distributors of consumer products in the United States, specializing in the mobile audio and video market </i><br />Target victim <b>website</b>: <i>https://www.twhouse.com</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>CAMERONMCH</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6856</link>
<guid>34ad9bc83e3c72c62281cb2c744ac966</guid>
<pubDate>Mon, 03 Apr 2023 19:11:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>CAMERONMCH</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>644c3d19e48e841afc7d217641299788972febad12d35b8a7aa778173e5a2d8e</i><br /><br />Threat actor <b>description</b>: <i>Cameron Memorial Community Hospital is a 40-bed, critical-access hospital located in Angola, Indiana.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>revvaviation.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6844</link>
<guid>0496604c1d80f66fbeb963c12e570a26</guid>
<pubDate>Mon, 03 Apr 2023 12:43:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>revvaviation.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24857f1f4d5034c7885df13961e9711ba9c5b55e37f8ec4dee9bee5d16d0a115</i><br /><br />Threat actor <b>description</b>: <i>first part of data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>GOCORPTECH</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7103</link>
<guid>62b98e188905060143a433b1363b3266</guid>
<pubDate>Mon, 03 Apr 2023 08:33:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>GOCORPTECH</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ff868aa379bf620103e7c2258c14e59e4cc50c9fc4dd26928a4d21fa9e67c5a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>PFGUSA2</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7104</link>
<guid>2be8328f41144106f7144802f2367487</guid>
<pubDate>Mon, 03 Apr 2023 08:33:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>PFGUSA2</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d491f453a9ed4d20f2271f46282466b98360b172ab2a0646a4d823b1e54996aa</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Corizon-Healthcare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6835</link>
<guid>a992995ef4f0439b258f2360dbb85511</guid>
<pubDate>Mon, 03 Apr 2023 05:14:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Corizon-Healthcare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>370b747c98a627409117701d321ebaa93a84577b61223c31ff7d9b98bd8894b6</i><br /><br />Threat actor <b>description</b>: <i>Corizon Health (CMS and PHS in the past) is a private prison healthcare provider with a very interesting history. The data we took from them is not less interesting. Tons of law docs and other stuff about prisoners' health and their treatment in the institution.You are welcome!</i><br />Target victim <b>website</b>: <i>http://corizonhealth.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sunstar-Americas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6836</link>
<guid>9b89bedda1fc8a2d88c448e361194f02</guid>
<pubDate>Mon, 03 Apr 2023 05:14:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Sunstar-Americas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f0427e0449475e1552b8d948aeffa69275e7adcdef152af028510f152c487a34</i><br /><br />Threat actor <b>description</b>: <i>Sunstar Americas is a part of the Sunstar Corporation is famous for its dental products. They lost about 118GB of their data including their customers' personal information and other internal corporate data.Soon you will be able to take a look by your self.</i><br />Target victim <b>website</b>: <i>http://sunstar.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>5Design</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6837</link>
<guid>176bf6219855a6eb1f3a30903e34b6fb</guid>
<pubDate>Mon, 03 Apr 2023 05:14:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>5Design</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c0d9ea4e3e38ab46a53d209655585c417776f2fe331d72be521d8ad539c5e62b</i><br /><br />Threat actor <b>description</b>: <i>5Desing is a Californian design company that lost to our side lots of personal and corporate financial information, personal docs, many contracts, NDAs and similar documentation.We suppose you can find much interesting inside. Check it out!</i><br />Target victim <b>website</b>: <i>http://5design.net</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Toho-Tenax-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6838</link>
<guid>9fa83fec3cf3810e5680ed45f7124dce</guid>
<pubDate>Mon, 03 Apr 2023 05:13:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Toho-Tenax-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>461fbf4bed88588b1e2b5e459692c4cac73aa930ce02c2d021891a841a8ff309</i><br /><br />Threat actor <b>description</b>: <i>Toho Tenax America is a US branch of Japanese technology giant Teijin. They are a carbon manufacturer with facilities around the world. So, Teijin's American partners have lost their data and we obtained lots of corporate, financial, accounting information, employee information including photos.Much interesting is open to check!</i><br />Target victim <b>website</b>: <i>http://www.teijincarbon.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Steve-Silver-furniture</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6839</link>
<guid>7edcfb2d8f6a659ef4cd1e6c9b6d7079</guid>
<pubDate>Mon, 03 Apr 2023 05:13:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Steve-Silver-furniture</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3cb36eea01f7ce2284550a56e1172ab25e7feee39cddbaf36c0d7139dacecb91</i><br /><br />Threat actor <b>description</b>: <i>Steve Silver furniture company provides its costumers with different kinds of residential furniture for more than 30 years. Recently they provided us with the information about their customers, their contact data, contracts and payment information and so on. In total we have 17GB of Steve Silver's internal data interesting to look at.You are welcome to see it in details.</i><br />Target victim <b>website</b>: <i>http://stevesilver.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aero-Engine-Solution-INC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6832</link>
<guid>349f36aa789af083b8e26839bd498af9</guid>
<pubDate>Mon, 03 Apr 2023 03:49:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Aero-Engine-Solution-INC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9d862b01dd55420d1f3af36698aeab8c4a0c069ba983adea35c2e14a19e4c836</i><br /><br />Threat actor <b>description</b>: <i>POur experience includes Aeronautical Engineering, Engine and Airframe Heavy Maintenance, Whole Asset Leasing, Aircraft Trading, Surplus Parts Distribution, Warehouse and Inventory Management, Portfolio Management, and Finance</i><br />Target victim <b>website</b>: <i>https://www.aeroenginesolutions.com</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Goldenbear.com--mjhallandcompany.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6825</link>
<guid>bf1b2f4b901c21a1d8645018ea9aeb05</guid>
<pubDate>Sun, 02 Apr 2023 21:22:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>moneymessage</b> claims attack for <b>Goldenbear.com--mjhallandcompany.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>252593d388aecdba5c76aae47c5e623378a5750feee1c5296c4d518231ca9f91</i><br /><br />Threat actor <b>description</b>: <i>GOLDENBEAR.COMGolden Bear is a leading provider of commercial property and casualty, professional liability, and residential earthquake insurance.Revenue: 20.8M$Eployees: 82Website: www.goldenbear.commjhallandcompany.comSince 1973, M.J. Hall and Company has earned a name for dependable Business Insurance, as well as one of California's most experienced general agents.Revenue: 11.1M$Eployees: 55Website:www.mjhallandcompany.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>moneymessage</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gaston-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6827</link>
<guid>4a1c2f4dcf2bf76b6b278ae40875d536</guid>
<pubDate>Sun, 02 Apr 2023 21:11:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Gaston-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c4890d1edec3f0520425dc3512c3f343692a4202062e9fd2820c93e028e0080f</i><br /><br />Threat actor <b>description</b>: <i>Beginning with just two buildings in 1964, by the end of the 1970s a total of 10 buildings graced the Dallas, or main, Campus. Throughout the 1980s and 1990s, 11 more buildings were added. It was during the mid-1990s that the College’s Lincoln Campus was</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arandell-Corp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6818</link>
<guid>a3842ed7b3d0fe3ac263bcabd2999790</guid>
<pubDate>Sun, 02 Apr 2023 07:10:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Arandell-Corp</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>936be10e06b6234e11c94656d7ad51a92ffbfbf58a9ffdecb0c256725fa64fc1</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1922, Arandell provides premedia, catalog printing, mailing, distribution, list management, database marketing, mobile solutions, logistics and consulting services to its partners in the retail and direct mail catalog markets.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ruekert--Mielke</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6814</link>
<guid>937936029af671cf479fa893db91cbdd</guid>
<pubDate>Sun, 02 Apr 2023 02:27:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Ruekert--Mielke</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3dba3c4afcfe5dd44db49002e9b2c16dc77e9b1a0df85b1d67c4ba03fc4b860e</i><br /><br />Threat actor <b>description</b>: <i>Ruekert & Mielke, Inc. (R/M) is a 100% employee-owned civil engineering firm with more than 75 years of service to local communities and organizations. Our engineers, environmental specialists, agricultural experts, and technology consultants empower our clients to thrive by solving infrastructure challenges.  </i><br />Target victim <b>website</b>: <i>https://ruekertmielke.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>p-and-r.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6810</link>
<guid>4f1927fff6e092185d6a6f4c8466e421</guid>
<pubDate>Sat, 01 Apr 2023 20:38:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>p-and-r.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91a0c4cdfce5c901679aad3645437e7f898c82b81772bf9877a725297dd01e4e</i><br /><br />Threat actor <b>description</b>: <i>P&R Enterprises, Inc. was founded in 1968 and is headquartered just outside Washington, D.C. in Falls Church, Virginia. P&R is a Mid-Atlantic based building services contractor. In addition, P&R continues to be a pioneer in the implementation of Gree...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>TRUSSWAY</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6809</link>
<guid>5c3a3b139a11689e0bc55abd95e20e39</guid>
<pubDate>Sat, 01 Apr 2023 08:38:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>TRUSSWAY</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>261c086a25f9d23b645a6d16de16ab6f731e0f1c9f15a0f23177696383e41813</i><br /><br />Threat actor <b>description</b>: <i>Trussway is the leading U.S. manufacturer of floor trusses, roof trusses, and pre-assembled door and window openings. We sell, design and manufacture the best pre-fabricated wood framing components in the building industry. We leverage half a century of expertise, from project conception to completion, to help ensure your builds are accurate, on time, and of high quality.  Together, WE deliver living spaces that are quiet, long lasting, safe and comfortable.</i><br />Target victim <b>website</b>: <i>https://trussway.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vending-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6806</link>
<guid>da87cbc1b5b8501acf3b49eec1cc52c3</guid>
<pubDate>Sat, 01 Apr 2023 05:11:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Vending-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ddeae8a68895f1cfb23a974d6628e13bc13841cb392ac506ad17e080853cdd1</i><br /><br />Threat actor <b>description</b>: <i>Vending Group company provides vending services (obviously). They are partnering with big names in beverage business so there are a bunch of interesting docs in the pack. We have from them 61GB of internal data concerning accounting, financial, employee information. And they seem to be not very interested in protection of it.Please take a look!</i><br />Target victim <b>website</b>: <i>http://www.vendinggroup.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Benning-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6807</link>
<guid>b0ba5c44aaf65f6ca34cf116e6d82ebf</guid>
<pubDate>Sat, 01 Apr 2023 05:11:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Benning-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f5c027cfe5580628e0be616933581e12410267295ab88d485005cedf22922b3d</i><br /><br />Threat actor <b>description</b>: <i>Benning Construction Company is a construction manager and contractor operating in cinema and grocery markets. The information we've taken from them is of 71GB and it contains such as accounting, medical insurance, credit cards, projects information and many other interesting things.Do not hesitate to check it!</i><br />Target victim <b>website</b>: <i>http://www.benningnet.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>OptionMetrics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6799</link>
<guid>aba54c23d97bf1321a4275e21d615112</guid>
<pubDate>Fri, 31 Mar 2023 15:05:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>OptionMetrics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d7aa5be57657196ebc411da4eff3d77cbc683521febc96f03105e24b85201c6</i><br /><br />Threat actor <b>description</b>: <i>OptionMetrics provides its customers with databases of various business directions. They have shared some databases with us also. Here is what we got: great amount of financial and accounting data,  business contacts, signed contracts, employees information and that DBs as well, of course. In total you can check 450 GB of sweet data.Have fun!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>etkinllc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6798</link>
<guid>3f78fa1cdb0e2fda88c2a935950ffdf1</guid>
<pubDate>Fri, 31 Mar 2023 14:36:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>etkinllc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dad9ceed0e2d5a513b412a7b4b79fd148f030e5ce278fdb4d1c015932c487cef</i><br /><br />Threat actor <b>description</b>: <i>Etkin has played a prominent role in southeast Michigan real estate development for over 30 years. The privately owned company was formed in 1982 and is led today by principal Douglas Etkin and Chief Executive Officer Curtis Burstein.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lewis--Clark-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6795</link>
<guid>e074a2975740cdf3948cfc063892260e</guid>
<pubDate>Fri, 31 Mar 2023 07:14:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>vicesociety</b> claims attack for <b>Lewis--Clark-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>774bc6def4fc7cd0a34c7a5b9eb37d8a549e92095ebbdb5b6bebf62cd16820c5</i><br /><br />Threat actor <b>description</b>: <i>Lewis & Clark is a private institution with a public conscience, a residential campus with global reach. Students and faculty throughout all three of Lewis & Clark's schools - the undergraduate College of Arts and Sciences, the Graduate School of Education and Counseling, and the School of Law - pursue new ways of knowing by combining classic liberal learning with pioneering collaboration.</i><br />Target victim <b>website</b>: <i>http://www.lclark.edu/</i>]]></description>
<category>vicesociety</category>
</item>
<item xmlns:dc='ns:1'>
<title>MULTIPLAN.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6786</link>
<guid>af4f00ca48321fb026865c5a1772dafd</guid>
<pubDate>Thu, 30 Mar 2023 19:12:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MULTIPLAN.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6d9ecb23c57b162cdc41237a3ddecbf4a0836d2ef3bc3d5c920ec465400d34dd</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.MULTIPLAN.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>tharworx.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6782</link>
<guid>128ac9c427302b7a64314fc4593430b2</guid>
<pubDate>Thu, 30 Mar 2023 07:13:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>tharworx.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8c8e46e679c8a3343d91cb2b6598bed15178fd77c7676f516e204e9a896eaeb</i><br /><br />Threat actor <b>description</b>: <i>in three days we will lay out 3 GB, if representatives of tharworx.com company do not contact us, we will lay out another 20 GB</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>7x7oralsurgery.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6783</link>
<guid>967c2ae04b169f07e7fa8fdfd110551e</guid>
<pubDate>Thu, 30 Mar 2023 07:12:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>7x7oralsurgery.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0100a2e0d17647b25384f42e474e17e5124e6023ed52f804b785d9f3d2d710fa</i><br /><br />Threat actor <b>description</b>: <i>7x7 Dental Implant & Oral Surgery 114Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hit-Promotional-Products-US</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6779</link>
<guid>42299f06ee419aa5d9d07798b56779e2</guid>
<pubDate>Wed, 29 Mar 2023 21:06:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>daixin</b> claims attack for <b>Hit-Promotional-Products-US</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f24a7b5ca82f6cf02311dc803021c725c26eac6cbecdc345ba6a0857c05c2252</i><br /><br />Threat actor <b>description</b>: <i>Hit Promotional Products has been a leader in the promotional product industry. As a family-owned business with a long history, Hit Promotional want to build real relationships.</i><br />Target victim <b>website</b>: <i>https://www.hitpromo.net</i>]]></description>
<category>daixin</category>
</item>
<item xmlns:dc='ns:1'>
<title>psenergy.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6773</link>
<guid>acaa23f71f963e96c8847585e71352d6</guid>
<pubDate>Wed, 29 Mar 2023 15:43:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>psenergy.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7ad7dacc4e8e3db5139025d2fcc2f323c5c02ae10f7536509f99e9af7073d9e6</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1985, PS Energy Group, Inc. is a privately-owned, Atlanta-based corporation and one of the nation’s top diversity and woman-owned businesses.  We are an energy expert and a premier partner to Fortune 500 companies and governments — strateg...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hawaii-self-storage</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6776</link>
<guid>e5ba7c3bbe8402a49a10fed2162dac54</guid>
<pubDate>Wed, 29 Mar 2023 15:43:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>moneymessage</b> claims attack for <b>Hawaii-self-storage</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>05b42bfabc5cbe43d74c2144ba4d3808541a5cb64200c6b546bf3eea9ccd876a</i><br /><br />Threat actor <b>description</b>: <i>Hawaii Self Storage is a locally owned company, committed to service the people & businesses in Hawaii with exceptional storage services. Data 32GB:</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>moneymessage</category>
</item>
<item xmlns:dc='ns:1'>
<title>hammondlumber.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6774</link>
<guid>3946bb00df4eebe135aa471d36e6ef68</guid>
<pubDate>Wed, 29 Mar 2023 15:43:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hammondlumber.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>668991d1941db8853f169be32b0b291a8ad26a1c9b4a82a00dae37d1a67bd68d</i><br /><br />Threat actor <b>description</b>: <i>Downloaded files > 230gb: Central 93gb, DownEast 67gb, EmpBackup01 24gb, HlcProfile2 15gb(Personal folders), Northern 12gb.Central, DownEast, Northern - city offices by direction, in cities Personal folders. Hammond Lumber Company was founded i...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Savanna-Technical-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6762</link>
<guid>01ded4259d101feb739b06c399e9cd9c</guid>
<pubDate>Wed, 29 Mar 2023 02:36:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Savanna-Technical-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e87a40902957b128e58e4bd0cd9fb1f093d01f82fb6579fd04d296e298bb3b6e</i><br /><br />Threat actor <b>description</b>: <i>Savannah Technical College provides dynamic education and variable services to its students in many locations. They've lost almost 100GB of their internal information. We are ready to share it with you.You can find there tons of personal data of their employees, financial documents, auto park information, insurance, passports, and even a note from sheriff.You are welcome!</i><br />Target victim <b>website</b>: <i>http://savannahtech.edu</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Ultra-met</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6763</link>
<guid>6f683b372cc7eacb980ec61b736cac74</guid>
<pubDate>Wed, 29 Mar 2023 02:35:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>The-Ultra-met</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc24617226073c498a1c1c441dc5de4059881eca8d601c624819b8d5395ea3ed</i><br /><br />Threat actor <b>description</b>: <i>The Ultra-met Carbide Technologies is a premium-quality blanks supplier for fabrications. We have stolen 128GB from their network.Here you will find the following: credit card information, passports, stocks, employee information (including salaries), financial balance and the info of defects while manufacturing.Take a look at the catch!</i><br />Target victim <b>website</b>: <i>http://www.ultra-met.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>MERS-Missouri-Goodwill-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6764</link>
<guid>cb463625fc9dde2d82207e15bde1b674</guid>
<pubDate>Wed, 29 Mar 2023 02:35:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>MERS-Missouri-Goodwill-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8367f0f0de7d758893cc51ed5b1431aaec4dd1a1bef38c64514eafa584e360c4</i><br /><br />Threat actor <b>description</b>: <i>MERS Industries are known for their will to help people. We suppose they need to improve their consumers data security if they really work to help people. If you are interested to take a closer look at their business, we are ready to share some info with you.You can find much interesting in the files!</i><br />Target victim <b>website</b>: <i>http://mersgooldwill.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>PCCARX2</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6759</link>
<guid>4cf0ed8641cfcbbf46784e620a0316fb</guid>
<pubDate>Wed, 29 Mar 2023 01:31:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>PCCARX2</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc4fff6af2dd3429169062d54503a2e524ddbef42cc923a70dc1f3b0e5230fdf</i><br /><br />Threat actor <b>description</b>: <i>PCCA is the world leader in pharmacy compounding supply, education, and advocacy. We are the complete resource for the independent compounding pharmacist.Our vision is to improve patient lives by bringing innovative approaches to solving health challenges. we’re proud of our mission — Support the creation of personalized medicine and innovative products that make a difference in patients’ lives. We’re committed to helping you and your business shine through our culture of innovation and quality, of success and celebration, of caring and sharing. We’ve made it our business to support compounding pharmacists at every step.SITE: www.pccarx.com Address 9901 S Wilcrest Dr, HoustonTexas, 77099, United StatesTel: (281) 933-6948</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Skyway-Endodontics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6755</link>
<guid>07168af6cb0ef9f78dae15739dd73255</guid>
<pubDate>Tue, 28 Mar 2023 22:39:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Skyway-Endodontics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3dbc0f23d6b895b38a074990873dcf299e97770e6806875b155ab492211ce787</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>AV-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6754</link>
<guid>c25e9a36b62f62f58f847fa83c70dc91</guid>
<pubDate>Tue, 28 Mar 2023 20:40:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>AV-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>adb7da82e25ca6782854fd20d92a547d72078aef7130e1bd7b93964a60c4a493</i><br /><br />Threat actor <b>description</b>: <i>PAV Industries is dedicated to providing premium equipment and services to the airline industry. Whether your objective is to reduce maintenance downtimes, or obtain technical support, seasoned and skilled professionals stand ready to assist you.</i><br />Target victim <b>website</b>: <i>https://www.avindustriesinc.com/</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Victoria-Park</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6752</link>
<guid>751f6b6b02bf39c41025f3bcfd9948ad</guid>
<pubDate>Tue, 28 Mar 2023 15:05:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Victoria-Park</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>74320cef24f86259577ee4be5aee3904c9ac298c9a4bca2f93509c460021ea09</i><br /><br />Threat actor <b>description</b>: <i>Victoria Park AB (publ) is a listed property company, which, through long-term management and social responsibility for more attractive living, creates value in an expanding property portfolio in growth districts in Sweden.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>swiftatlanta.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6747</link>
<guid>ef452c63f81d0105dd4486f775adec81</guid>
<pubDate>Tue, 28 Mar 2023 06:39:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>swiftatlanta.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0475b0a98cac37af556938aeaf2250b3116ddb6775c7c6abddbc02ffcc222667</i><br /><br />Threat actor <b>description</b>: <i>Swift Atlanta was founded in Suwanee, Georgia in 1982. The business began as a manufacturer of high quality custom sheet metal components and assemblies serving the electronic and communications industries.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>County-Materials-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6746</link>
<guid>f1a94cef23357f68031e958c443c0dfe</guid>
<pubDate>Mon, 27 Mar 2023 23:02:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>County-Materials-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df4b1a17498bb727e8c10da4c3fc637889836d2c020a6e73fb5dfdd5e4c16c1f</i><br /><br />Threat actor <b>description</b>: <i>County Materials Corporation is recognized as a leading manufacturer and trusted industry resource for concrete construction and landscape products. Together, we’re building a company that hardworking people are proud to work for, live near, and do business with since 1946.
Our concrete products are trusted by construction professionals to help build the growing communities where Americans live, work and play. We supply projects of all sizes for infrastructure, transportation, commercial, agricultural, municipal, and residential construction applications. Since 1946, our organization has grown to become a national leader in the construction industry. Our team includes nearly 2,000 dedicated and talented people who work in more than 40 locations throughout six states.SITE: www.countymaterials.comADDRESS
205 North St, Marathon
Wisconsin, 54448
United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>DUKANE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=7139</link>
<guid>581b41df0cd50ace849e061ef74827fc</guid>
<pubDate>Mon, 27 Mar 2023 23:02:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>DUKANE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1eb44cfcf0488e4d569d625d3102c70adef94ef6e3b2abafa5ff110af8e11de9</i><br /><br />Threat actor <b>description</b>: <i>Dukane
In the complex environment of plastic welding, we are the technology leader focused on a customer-centered approach. We develop solutions that meet the unique requirements of each customer’s application. For customers who know their exact needs, we listen, understand, and deliver a quality product that meets their exact specifications. For customers looking to start from a beginning concept, we foster a consulting relationship, pulling upon our five decades of experience to develop cutting-edge answers to the most challenging welding needs. Established in 1922 as Operadio, we have served several industries and provided time tested technological breakthroughs. We take on distinct challenges, accepting each project as an opportunity to enhance our eye for innovation. We put customer relationships at the forefront of everything we do.SITE: www.dukane.comADDRESS
2900 Dukane Dr, Saint Charles
Illinois, 60174
United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Modesto-CA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6741</link>
<guid>c9e37c28ce5852218032aae6f5632b13</guid>
<pubDate>Mon, 27 Mar 2023 22:33:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>City-of-Modesto-CA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9924da220341cd21feadaa12b259ef1683541740f7d4c11ab918b6b18ed675ce</i><br /><br />Threat actor <b>description</b>: <i>Proudly serving, protecting and partnering with our community for a safer Modesto.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>IRCO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6736</link>
<guid>b3f445b0ff5a783ec652cdf8e669a9bf</guid>
<pubDate>Mon, 27 Mar 2023 17:17:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>IRCO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f92f9a71d39d693f844be31752c37582ce993aa4e1993e9ba57f48e2acdec88a</i><br /><br />Threat actor <b>description</b>: <i>Ingersoll Rand is a global market leader with a broad range of innovative and mission-critical air, fluid, energy and medical technologies, providing services and solutions to increase industrial productivity and efficiency. Since merging with Gardner Denver in early 2020, we have more than 300 years of combined experience and innovative expertise </i><br />Target victim <b>website</b>: <i>https://www.irco.com/</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>OKSGROUP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6738</link>
<guid>ddd993b2fef3fdff101872bb03cfded8</guid>
<pubDate>Mon, 27 Mar 2023 17:17:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>OKSGROUP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>917dbd9b1ad4e4b36a416f39b09de9c80078d14ead6475b738ee07baa2fa9580</i><br /><br />Threat actor <b>description</b>: <i>Delivering business and legal process outsourcing solutions to some of the worlds largest and most demanding organizations </i><br />Target victim <b>website</b>: <i>https://www.oksgroup.com/</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>bienvilleortho.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6731</link>
<guid>0e915db6326b6fb6a3c56546980a8c93</guid>
<pubDate>Mon, 27 Mar 2023 09:09:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>bienvilleortho.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eef78b0e3790807cf58851cbf4695444b4ebc8f3ce1aa9f3978f191de6efadb9</i><br /><br />Threat actor <b>description</b>: <i>bienvilleortho.com  147Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>mcna.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6727</link>
<guid>ad5ab36761669d6eadbaee691c4a1d22</guid>
<pubDate>Mon, 27 Mar 2023 04:35:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>mcna.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12f2cc92e4aa41eaedd4e82ff5167ca1bb33691bf2bf7075b9e2b2ddd2e48fb1</i><br /><br />Threat actor <b>description</b>: <i>MCNA Dental (MCNA Insurance Company and Managed Care of North America, Inc.) is a leading dental benefits manager committed to providing high quality services to state agencies and managed care organizations for their Medicaid, Children's Health Insu...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lightcast</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6719</link>
<guid>f8b7aa3a0d349d9562b424160ad18612</guid>
<pubDate>Sun, 26 Mar 2023 23:07:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Lightcast</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aa8342cc4cee2145f5d4e059306cacc155558117af225531ea8aa97401230ebf</i><br /><br />Threat actor <b>description</b>: <i>USA</i><br />Target victim <b>website</b>: <i>www.lightcast.io</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Optica</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6720</link>
<guid>41f860e3b7f548abc1f8b812059137bf</guid>
<pubDate>Sun, 26 Mar 2023 23:07:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Optica</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>07d20cb6669e63992289a924cecd5522dcec89158fd4bb881693061dac421f25</i><br /><br />Threat actor <b>description</b>: <i>District of Columbia, United States</i><br />Target victim <b>website</b>: <i>www.optica.org</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>James-McElroy-and-Diehl</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6721</link>
<guid>a0d3973ad100ad83a64c304bb58677dd</guid>
<pubDate>Sun, 26 Mar 2023 23:07:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>James-McElroy-and-Diehl</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>782d7ea8c83047cacdf01e8b991f52018dc03f4d0628f34b45aa3021c6cf6c47</i><br /><br />Threat actor <b>description</b>: <i>North Carolina, United States</i><br />Target victim <b>website</b>: <i>www.jmdlaw.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Picou-Builders-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6725</link>
<guid>609e9d4bcc8157c00808993f612f1acd</guid>
<pubDate>Sun, 26 Mar 2023 23:07:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Picou-Builders-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>58b24130b1c6eb0e572e82d169c3d560df4b35b68a6daba66f438a511b01fa51</i><br /><br />Threat actor <b>description</b>: <i>Louisiana, United States</i><br />Target victim <b>website</b>: <i>www.picoulumber.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kk-Mehta-Cpa-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6726</link>
<guid>d7e77c835af3d2a803c1cf28d60575bc</guid>
<pubDate>Sun, 26 Mar 2023 23:07:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Kk-Mehta-Cpa-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c71ab82c26596ffdb167e084a6aef97ad1b0b0d8f0d7b6f7f1599a2a10d36225</i><br /><br />Threat actor <b>description</b>: <i>New York, United States</i><br />Target victim <b>website</b>: <i>www.kkmehtacpa.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rob-Levine--Associates-Lawyers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6716</link>
<guid>9fc64354454711c97058db6110b3a369</guid>
<pubDate>Sun, 26 Mar 2023 16:39:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Rob-Levine--Associates-Lawyers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12bb6ccbe6631499a093a4ec0f01a4650fe97c42cf6b4a5b2bf7d909849add2c</i><br /><br />Threat actor <b>description</b>: <i>Rob Levine and Associates arepersonal injury attorneys helping individuals who have been hurt in an accidentor who are disabled. The firm practices law and services Rhode Island, Massachusetts, and Connecticut on injury cases.</i><br />Target victim <b>website</b>: <i>https://roblevine.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>NOVELIS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6707</link>
<guid>602443a3d6907117d8b4a308844e963e</guid>
<pubDate>Sat, 25 Mar 2023 21:14:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>NOVELIS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a6929fb58163cd6caa2665109960e30ebd664b34bb6e0541501c8ced7801012c</i><br /><br />Threat actor <b>description</b>: <i>Novelis is an aluminum company created by Alcan's spin-off Alcan in 2005. It was acquired by Hindalco in 2007. In 2007, Hindalco announced through Novelis its intention to acquire Aleris, an American aluminum company for $2.6 billion</i><br />Target victim <b>website</b>: <i>https://www.novelis.com/</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>slipstreaminc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6702</link>
<guid>9823c9091899dc6f227f9133ba2dfd30</guid>
<pubDate>Sat, 25 Mar 2023 15:01:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>slipstreaminc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5378a2f23a6e72ff06ee517526798c4543d9c7bb6a6fcd532f538fe1d3cb4b30</i><br /><br />Threat actor <b>description</b>: <i>Slipstream creates, tests, delivers and scales the next generation of energy efficiency and renewable energy programs that move us farther, faster toward a clean energy economy.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>BISSELL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6686</link>
<guid>1458c6647dbf7cca56dff7bfe0576ebb</guid>
<pubDate>Fri, 24 Mar 2023 21:36:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BISSELL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>daf626799d46c10ed8240c5d0dbeb4ebafc0d238c3f2c0d5772526a350adef1c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.BISSELL.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>EMERALDX.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6687</link>
<guid>cdf28f8b7d14ab02d12a2329d71e4079</guid>
<pubDate>Fri, 24 Mar 2023 21:36:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>EMERALDX.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1fbd9129bbe1e42e8930960199f08c38e14286513445ccc8d718f50857b55e15</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.EMERALDX.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>INVESTORCOM.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6694</link>
<guid>4ddb5b8d603f88e9de689f3230234b47</guid>
<pubDate>Fri, 24 Mar 2023 21:33:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>INVESTORCOM.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b9ac080fd4c2d1607f429851cd13d4ef59463a76c80dba4e7571d722f72a1b5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.INVESTORCOM.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>lclattorneys.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6683</link>
<guid>4670c07872d5314c6ad6ffa633d4a059</guid>
<pubDate>Fri, 24 Mar 2023 19:08:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>lclattorneys.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8bbe76cbe057e07096ba2f484e657cb775e307b799deb6b9c828c0e2b1db9412</i><br /><br />Threat actor <b>description</b>: <i>Lake City Law Group provides the Inland Northwest with a full array of transactional and litigation solutions for individual and business clients.</i><br />Target victim <b>website</b>: <i>https://www.lclattorneys.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>wbactc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6684</link>
<guid>55479c55ebd1efd3ff125f1337100388</guid>
<pubDate>Fri, 24 Mar 2023 19:08:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>wbactc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96c9d34a8868e7baf37d53d5541ec50e8190e1c86b1578f99c8ae71d258ee4e8</i><br /><br />Threat actor <b>description</b>: <i>The Wilkes Barre Area Career and Technical Center does not discriminate on the basis of race, color, national origin, sex, disability or age in its program or activities and provides equal access to all Groups.  For information on services, activities and/or accessibility, contact: Dr. Anthony Guariglia, Title IX Coordinator, at (570)822-4131, Wilkes Barre Area Career and Technical Center, 350 Jumper Road, Wilkes-Barre, Pa. 18705-0699.</i><br />Target victim <b>website</b>: <i>www.wbactc.org</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>IMAGINE360.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6681</link>
<guid>65586803f1435736f42a541d3a924595</guid>
<pubDate>Fri, 24 Mar 2023 15:07:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>IMAGINE360.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a062c2aec69c3240015c64b3b498063e7db5ee71da31705e94d3a41c967559b0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.IMAGINE360.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>VLS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6671</link>
<guid>a1e865a9b1065392ed6035d8ccd072d9</guid>
<pubDate>Fri, 24 Mar 2023 13:24:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>VLS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0f9c08ebff82e16d66fb9e60625bd068e15e98b8d8baff272653f504a7444f3f</i><br /><br />Threat actor <b>description</b>: <i>Vincent Lighting SystemsHeadquarters: 6161 Cochran Rd Ste D, Solon, Ohio, 44139, United StatesPhone Number: (216) 475-7600Website: www.vls.comRevenue: $17.7MVLS provides reliable entertainment and architectural lighting and rigging products that are inspected, maintained and tested for compliance with industry standards prior to delivery. Our reputation for reliability is backed with a commitment to providing on-time delivery, a personal equipment operation guarantee and after-hours project, rental and production support.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>ALTO.US</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6676</link>
<guid>28bda53c86d37e275a3ebfdc113b1f59</guid>
<pubDate>Fri, 24 Mar 2023 13:21:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ALTO.US</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b00beefb21555fdd666fe08c57f6f431eeaa1224a6845f42a15a3f70d9365c8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.ALTO.US</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TGW.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6663</link>
<guid>0ef41260a5b096182ee7e45b942cd46d</guid>
<pubDate>Fri, 24 Mar 2023 11:09:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TGW.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e0779485ad0bb3a9dace87c55ab0cdbe8a550c2fae494e26cf28533b5d5b4fbe</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.TGW.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TLG.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6670</link>
<guid>e7ac288b0f2d41445904d071ba37aaff</guid>
<pubDate>Fri, 24 Mar 2023 11:05:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TLG.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eb36fab0dc2c6265eebb15d9b13336845a8a9dcb08326dc9d1fbc26220a16921</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.TLG.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Weickert-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6651</link>
<guid>06ccc6fac98a777fce43a972eaca83df</guid>
<pubDate>Thu, 23 Mar 2023 20:37:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Weickert-Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b0d06800c22a55eefccd030d128fb546ee90f9a50d30878bc61605afe70673a9</i><br /><br />Threat actor <b>description</b>: <i>www.weickert.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>PHOENIX.TECH</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6647</link>
<guid>8ce8b102d40392a688f8c04b3cd6cae0</guid>
<pubDate>Thu, 23 Mar 2023 13:35:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PHOENIX.TECH</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e45db346a1548b041a4283561bef2a1f78785812a38ee3f0d8858d173ed3948</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.PHOENIX.TECH</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>NATIONSBENEFITS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6649</link>
<guid>0baf163c24ed14b515aaf57a9de5501c</guid>
<pubDate>Thu, 23 Mar 2023 13:30:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NATIONSBENEFITS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8ea22bfcc20ff75514c16271ddb72e19299e41111402f51e7cc57a31033e8b2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.NATIONSBENEFITS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SHOLASTIC.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6650</link>
<guid>126c2da128e5b044dc53405c25b4d8de</guid>
<pubDate>Thu, 23 Mar 2023 13:26:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SHOLASTIC.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ff4dd79e6130b9c8e382240229639c619b5497e56986d5b34253b9e2390fc30</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.SHOLASTIC.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CLOUDMED.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6638</link>
<guid>829083d7452626f6e64b96ec0b734811</guid>
<pubDate>Thu, 23 Mar 2023 13:19:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CLOUDMED.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52380e782ed16bfc1d777c8b8eab4fa6ef5ee4be8470b156c7319bc6b4bc0a47</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.CLOUDMED.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>VIRGIN.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6641</link>
<guid>fcf55a303b71b84d326fb1d06e332a26</guid>
<pubDate>Thu, 23 Mar 2023 13:16:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>VIRGIN.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>74d80bae0810013179619a786aa414f1581ed8d653ec13ff789e12c6d17b2a2f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.VIRGIN.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GRAY.TV</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6644</link>
<guid>16bda725ae44af3bb9316f416bd13b1b</guid>
<pubDate>Thu, 23 Mar 2023 13:15:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GRAY.TV</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8069eba403f7aa53f7c995656ea83e66076df3071338e17676876d4440e09f42</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.GRAY.TV</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ORCAAUDIT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6645</link>
<guid>b8fd7211e5247891e4d4f0562418868a</guid>
<pubDate>Thu, 23 Mar 2023 13:14:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ORCAAUDIT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8382d10f3fd592c6d3168769727d6046e7559d19126030007084b4e5530bb552</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.ORCAAUDIT.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Troutman-Pepper</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6631</link>
<guid>524f141e189d2a00968c3d48cadd4159</guid>
<pubDate>Thu, 23 Mar 2023 13:00:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Troutman-Pepper</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1600bad94dbc5cdf3b89f6dd1ed4b42eef59fb2f932f4a26799f5050a51a3bf3</i><br /><br />Threat actor <b>description</b>: <i>Troutman Pepper guides clients from startups to multinationals in their most critical legal and business matters. Our attorneys and other professionals provide comprehensive and practical advice that advances our clients’ business objectives, anticipates hurdles, and positions each client to succeed in rapidly evolving markets and regulatory environments.Our platform of 23 offices across the U.S. allows us to meet our clients where they are – and wherever they need us to be. We have deep, unique experience in the industry sectors that will power the national and global economy in the years ahead, including energy, financial services, health sciences, insurance, and private equity. Our service offerings span transactional, regulatory, and litigation practices, covering everything from advertising to zoning.SITE: www.troutman.com Address 600 Peachtree St NE Ste 5200Atlanta, Georgia, 30308United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advance-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6632</link>
<guid>44e65d3e9bc2f88b2b3d566de51a5381</guid>
<pubDate>Thu, 23 Mar 2023 13:00:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Advance-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>05319829b8e54f40dde2e84d9669c0f9eed4c562de98854946127ccb2c07ca83</i><br /><br />Threat actor <b>description</b>: <i>Since 1997, Advance America has provided short-term financial services to millions of customers across the United States. Our Company has grown to become one of the nations largest consumer lending companies, with more than 2,400 locations.At Advance America, we believe in better. We believe that setbacks are just opportunities for epic comebacks and we want to help make those comebacks happen.That’s why for the past 25+ years, Advance America has worked to become one of the nation’s leading providers of consumer financial services, with online lending and over 900 locations nationwide.At Advance America, we believe that our customers are more than a transaction, and we know that with a little bit of help, they can keep going today and look forward to tomorrow.SITE: www.advanceamerica.net Address 135 N Church St, SpartanburgSouth Carolina, 29306United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>SUPPLYCORE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6633</link>
<guid>27934a1f19d678a1377c257b9a780e80</guid>
<pubDate>Thu, 23 Mar 2023 13:00:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>SUPPLYCORE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a570596c6b6a1fe39fe750fd8ef2ffacbd530f0bca49f8b59e1d26dc61d2b47</i><br /><br />Threat actor <b>description</b>: <i>SupplyCoreA supply chain and technology integrator and small business federal defense contractor, we have provided key support to the U.S. military and its allies since 1987.Our metric-driven execution of requirements is always transparent. We consistently exceed customer expectations and instill confidence with our performance and ability to achieve mission critical goals worldwide.We are proud to support our nation’s warfighters and are driven by our mission to sustain and enhance the physical and human capital of our nation and its allies in times of peace and crisis.Worldwide Supplies. Worldwide Support.SITE: www.supplycore.com Address 303 N Main St Ste 800, RockfordIllinois, 61101United StatesTel: (815) 964-7940</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dayton-Superior</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6634</link>
<guid>5f635ccf7bd8ab4ef0ed892e5af22890</guid>
<pubDate>Thu, 23 Mar 2023 13:00:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Dayton-Superior</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>10fbbc05d2301199f9a7a1a766a850ab3f5c55a216f7cde3ec9c50bc39bd0f67</i><br /><br />Threat actor <b>description</b>: <i>Dayton Superior, a supplier of concrete and other materials for projects ranging from the Panama Canal to the Trump Ocean Club, is using a data-driven approach to price optimization to help it align prices with all the various markets in which it operates. Headquartered in Miamisburg, Ohio, the 115-year-old global nonresidential concrete construction company has supplied the concrete and other materials for bridges, canals, buildings and stadiums around the world, including the Panama Canal, new World Trade Center Towers and Trump Ocean Club.SITE: www.daytonsuperior.com Address 1125 Byers Rd, MiamisburgOhio, 45342, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>VERRAMOBILITY.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6617</link>
<guid>95f2b84de5660ddf45c8a34933a2e66f</guid>
<pubDate>Thu, 23 Mar 2023 12:38:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>VERRAMOBILITY.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3948fcb50fe8f868179f59cf021a0c4b768fe4987dd2de2ecb23abe226044ec4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.VERRAMOBILITY.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HORMELFOODS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6621</link>
<guid>d4df7b6239c425d8cc897411ef11abe7</guid>
<pubDate>Thu, 23 Mar 2023 12:37:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HORMELFOODS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46ef26fc7850b6d5d2b0133713addc5289f91987f5f1e44d822ebfd3dfc52148</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.HORMELFOODS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>THECROSBYGROUP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6622</link>
<guid>4d0505284ac5049b4167eb7ebfe0791b</guid>
<pubDate>Thu, 23 Mar 2023 12:36:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>THECROSBYGROUP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>21f7eebb916bfb715034d42efea94b94a252f6ba7c57a97f1c4688a4af5ba603</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.THECROSBYGROUP.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ACCUZIP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6626</link>
<guid>3483e5ec0489e5c394b028ec4e81f3e1</guid>
<pubDate>Thu, 23 Mar 2023 12:35:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ACCUZIP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b3fb7ba967a552c987878d9aab1f8a7628e7ae96c230145f05f09f7fa140985</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.ACCUZIP.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SEPIRE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6627</link>
<guid>0224cd598e48c5041c7947fd5cb20d53</guid>
<pubDate>Thu, 23 Mar 2023 12:34:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SEPIRE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04ff1db49990eb2b7767984027fa789cb57c01f5eff78b985f3f2c83fb12697d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.SEPIRE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TTBH.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6629</link>
<guid>488e4104520c6aab692863cc1dba45af</guid>
<pubDate>Thu, 23 Mar 2023 12:33:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TTBH.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c6dbe6ea1cbb33836fd11934f778c2707e813909da55353e2ba749f177b5ef2f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.TTBH.ORG</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HUMANGOOD.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6607</link>
<guid>7caf5e22ea3eb8175ab518429c8589a4</guid>
<pubDate>Thu, 23 Mar 2023 11:13:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HUMANGOOD.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bb5cc9105a59f81bf9d45541734c0c2b904f4bd393d8ac96c94ec62e85fa3193</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.HUMANGOOD.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>KANNACT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6608</link>
<guid>a667f4e7b0c8a3babe331569d3eac6bd</guid>
<pubDate>Thu, 23 Mar 2023 11:12:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>KANNACT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6c3ece2dbcfaaff3fa2a3bb34f40edbd84d15aebe8a17ad455d2b57f6ad832f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.KANNACT.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>AMERIJET.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6610</link>
<guid>94739e5a5164b4d2396e253a11d57044</guid>
<pubDate>Thu, 23 Mar 2023 11:11:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>AMERIJET.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>963f94692189191c3ce2f5f861a9332e1b61901135425599712bfb97a24b6e67</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.AMERIJET.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GDI.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6611</link>
<guid>11704817e347269b7254e744b5e22dac</guid>
<pubDate>Thu, 23 Mar 2023 11:11:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GDI.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0016599bb8d21e4b3d49daf32c64e66ba24d46063c21bf76f6d8ba2b3e57d74c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.GDI.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ZOSKINHEALTH.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6612</link>
<guid>d37eb50d868361ea729bb4147eb3c1d8</guid>
<pubDate>Thu, 23 Mar 2023 11:10:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ZOSKINHEALTH.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4a7b8bf4753fc15fd5e5b6fa2c91696ab260db005385f4300efb8ed4767296e3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.ZOSKINHEALTH.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HRTRANSIT.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6613</link>
<guid>310366dd6f1a67639b870efe6ca3613d</guid>
<pubDate>Thu, 23 Mar 2023 11:10:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HRTRANSIT.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5642d0de0feb5fc138f7d134338de22f91b13af8c10a7d1f23cf8381f3675885</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.HRTRANSIT.ORG</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>PLURALSIGHT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6614</link>
<guid>25caef3a545a1fff2ff4055484f0e758</guid>
<pubDate>Thu, 23 Mar 2023 11:10:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PLURALSIGHT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a1b39cb814cde9078a65842443754131d9981c65e4d8c34a37980754135e45c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.PLURALSIGHT.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>bluebirdnetwork</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6606</link>
<guid>b14573b9273c38ba0f89bb63abc87973</guid>
<pubDate>Thu, 23 Mar 2023 08:36:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>bluebirdnetwork</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4dec2e416d825f1f04e2444f8ec5913698b4a1d243579bc27733ce2c44a32088</i><br /><br />Threat actor <b>description</b>: <i>We’ve Been Networking For More Than 20 Years Bluebird Network provides world-class fiber internet and data transport to Carriers and Enterprises in Missouri, Illinois and the Midwest. We’ve been experts in communications infrastructure since 1999. </i><br />Target victim <b>website</b>: <i>https://bluebirdnetwork.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Graceworks-Lutheran-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6605</link>
<guid>b7f91ee1b94f1ed3dbb2959607f4b784</guid>
<pubDate>Thu, 23 Mar 2023 04:35:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Graceworks-Lutheran-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dadcea07ab8e16be56c6bb2f3f7c4a6c210f9ad409939b9190fbd18f68a18036</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1929, Graceworks Lutheran Services is a lutheran social services organization that operates assisted living facilities. Do not be surprised that the company is engaged in charity - it's just a front. Maybe they are involved in money laundering - who knows...We have at our disposal the contents of all email addresses of the top management, full financial audits from 1995 to the present, 45GB or 486,880 Files of personal patients information (clinical) and even documents related to President Biden - very entertaining. Beside this, we have finance, employee documents, accounting, HR and much more others.Enjoy!</i><br />Target victim <b>website</b>: <i>http://www.graceworks.org</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>PG.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6603</link>
<guid>68331ff0427b551b68e911eebe35233b</guid>
<pubDate>Wed, 22 Mar 2023 23:02:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>PG.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2b80196a70de0c61a667735e030bfce8a3c1e30cd336d7f4ea98b6cdc3794fc8</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.PG.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CROSSVILLEINC.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6604</link>
<guid>3dea6b598a16b334a53145e78701fa87</guid>
<pubDate>Wed, 22 Mar 2023 23:02:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CROSSVILLEINC.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dc4d54c3d0ecef0cc0bfebb71afaff2cd18f33a0751800b7d9c594467a0af2a4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.CROSSVILLEINC.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>LESLIESPOOL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6601</link>
<guid>7a576629fef88f3e636afd33b09e8289</guid>
<pubDate>Wed, 22 Mar 2023 19:08:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>LESLIESPOOL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e901085189156d6f3f51225e7d39473eae4ba51a2f428f4396e2b5fe49b1bc4c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.LESLIESPOOL.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>US-District-Court</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6600</link>
<guid>136c2f0599b3a0175c544b72e4861b9f</guid>
<pubDate>Wed, 22 Mar 2023 15:05:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>US-District-Court</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>161cdb683195f5422f989ce465f17006e2d48a23c3a67c679b4e02e21847017a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Design-CATAPULT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6597</link>
<guid>95688ba636a4720a85b3634acfec8cdd</guid>
<pubDate>Wed, 22 Mar 2023 02:26:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Design-CATAPULT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0607dc53f63066b1749067047bfb16c2746782bd856455f46f35ac8c394bce2e</i><br /><br />Threat actor <b>description</b>: <i>Design CATAPULT offers a unique approach to obtaining quality design  services. We have streamlined the design process to provide the maximum  return on your investment. Our development team consists of highly  skilled Industrial  Designers, Mechanical Engineers, Electrical  Engineers, and Manufacturing  Technicians. The DC team concentrates on  what matters: innovating great design  & engineering solutions while  providing you with the best results at an  affordable price.</i><br />Target victim <b>website</b>: <i>https://www.designcatapult.com/</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Yaskawa-Motoman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6593</link>
<guid>0765933456f074d2c75bbbad63af95e6</guid>
<pubDate>Tue, 21 Mar 2023 19:11:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Yaskawa-Motoman</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8a636da680ffdaab068ffc0deaf6faf3815e4273f17af0252337d4126bf50c8</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1989, Yaskawa Motoman is the Robotics Division of Yaskawa America, Inc. It provides automation products and solutions for virtually every industry and robotic application; including arc welding, assembly, coating, dispensing, material handling and so on.You will see their projects, finance, agreements, employee's information and so on and so on.Feel free to check!Archive password: 8gD2$2!^qSs@</i><br />Target victim <b>website</b>: <i>http://www.motoman.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>mangiainc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6594</link>
<guid>cf708fc1decf0337aded484f8f4519ae</guid>
<pubDate>Tue, 21 Mar 2023 19:08:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>mangiainc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d0d8eafec80728c5b6eddb9536b40f2d647b37d9c3e04260bc015c9083215905</i><br /><br />Threat actor <b>description</b>: <i>Mangia, Inc.™ is an Italian producer and exporter of Italian tomatoes and beans produced in Italy and sold through food service & retail distributors.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Atlas-Security</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6580</link>
<guid>1ef03ed0cd5863c550128836b28ec3e9</guid>
<pubDate>Tue, 21 Mar 2023 11:11:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Atlas-Security</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f35165c19db0f4fa1ad22691d3f25e157606c2be2219a7ab88e51351f498e67e</i><br /><br />Threat actor <b>description</b>: <i>Atlas Security is the leading armed response company in Nelson Mandela Bay and Alexandria . The company has more than 150 qualified armed response officers, the largest fleet of armed response vehicles. Atlas Security's client base includes more than 30,000 controlled secure premises in the Eastern Cape Province, including large corporate clients.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>oaklandca.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6581</link>
<guid>7aee5d5dfa97b2516e5f639672c7e199</guid>
<pubDate>Tue, 21 Mar 2023 11:09:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>oaklandca.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a717ddafb4293bfac61a3c48b6b72a015c15d132f87734ed67b579b6feb6d111</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1852, Oakland, located in the U.S. state of California, is a West Coast port city. Oakland is the county seat of Alameda County.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>cityofallenpark.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6582</link>
<guid>a14185bf0c82b3369f86efb3cac5ad28</guid>
<pubDate>Tue, 21 Mar 2023 11:09:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>cityofallenpark.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>54a8f0af5997e4addd9ca5c54ab3a04e062fcc1ce3b4630be1423772f42097c7</i><br /><br />Threat actor <b>description</b>: <i>first part of data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>bakermech.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6589</link>
<guid>a1b9f8050fb246fbec454302f6c14e22</guid>
<pubDate>Tue, 21 Mar 2023 11:09:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>bakermech.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3620b315f69d1b187b29ccc3b4b0982006c5e34f2f4e60184aacd7dde23595bd</i><br /><br />Threat actor <b>description</b>: <i>Baker Mechanical Inc. is a family-oriented company that prides itself on ensuring unsurpassed customer satisfaction.Centrally located in eastern North Carolina, BMI can handle any size mechanical project in the region. BMI is dedicated to preserving...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>co.ottawa.oh.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6579</link>
<guid>9e9a30b74c49d07d8150c8c83b1ccf07</guid>
<pubDate>Tue, 21 Mar 2023 10:31:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>co.ottawa.oh.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89a1b2261a2d3afbfb86dfe7d9879d4e64ab305ccc6161a18c85cb6102ab0bda</i><br /><br />Threat actor <b>description</b>: <i>Regional Government in Port Clinton, Ohio</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>hosemanufacturing.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6574</link>
<guid>4eb0194ddf4d6c7a72dca4fd3149e92e</guid>
<pubDate>Tue, 21 Mar 2023 09:55:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>hosemanufacturing.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>86e77ceb51d929c00495c4918ce0d733d38b80be2bd2d8c8613d018468a6078d</i><br /><br />Threat actor <b>description</b>: <i>Ratermann Manufacturing 113Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>igadiltd.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6575</link>
<guid>400e5e6a7ce0c754f281525fae75a873</guid>
<pubDate>Tue, 21 Mar 2023 09:55:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>igadiltd.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29ddbc6fa06252000825d88acff614973d7c8cfdf7ee99b990a72c793ddc5249</i><br /><br />Threat actor <b>description</b>: <i>IgadI  84Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>jones-hamilton.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6576</link>
<guid>412758d043dd247bddea07c7ec558c31</guid>
<pubDate>Tue, 21 Mar 2023 09:55:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>jones-hamilton.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7ed517f396b98ed79bed2165d9f12f32b7a0693dea79d52b04d47b145464d6d</i><br /><br />Threat actor <b>description</b>: <i>Jones-Hamilton Co. 230Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>stonehillcontracting.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6577</link>
<guid>b613e70fd9f59310cf0a8d33de3f2800</guid>
<pubDate>Tue, 21 Mar 2023 09:55:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>stonehillcontracting.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd4188c7a0b56cf7429b4d3fb558e2c3efde6b653e321319d2cbd02328777949</i><br /><br />Threat actor <b>description</b>: <i>Stone Hill Contracting, Inc. 176Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>siebold.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6578</link>
<guid>a2915ad0d57ca8c644f99f9c3f20a918</guid>
<pubDate>Tue, 21 Mar 2023 09:55:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>siebold.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5de0b8c822e4c01f3ea36bdd6718cf428ed2387112239f44222de0b0cc4d1210</i><br /><br />Threat actor <b>description</b>: <i>The Siebold Company, Inc. 700Gb uncompressed data</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>SAKSFIFTHAVENUE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6565</link>
<guid>e615c82aba461681ade82da2da38004a</guid>
<pubDate>Mon, 20 Mar 2023 17:14:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SAKSFIFTHAVENUE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8db690c868fffa26d45a40d29d9cee634f91558137013bd78b3dd8da0adf1694</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.SAKSFIFTHAVENUE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Entigrity-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6570</link>
<guid>4996dcc43b5be197b5887a4e60817b1c</guid>
<pubDate>Mon, 20 Mar 2023 13:31:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>Entigrity-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbea9e5eccf550bdb7c4cf221bd51eeb4123952730aeaf62535d054447d495ac</i><br /><br />Threat actor <b>description</b>: <i>Entigrity is an offshore staffing company based out of Sugar Land, Texas. They work with small and mid-size accounting firms, CPA, EA, and Tax Professionals. 

We have access to more than 500 Gigabytes of corporate documents. It's just a matter of time until every piece of data is made public.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Title-Cash-Now</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6571</link>
<guid>ad0f7a25211abc3889cb0f420c85e671</guid>
<pubDate>Mon, 20 Mar 2023 13:31:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>Title-Cash-Now</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fcad9ecabe981f72e7f79704c4c2130158b8410e8e2104442450799b137b7ffb</i><br /><br />Threat actor <b>description</b>: <i>TITLECASH NOW.COM offers affordable title loans and title pawns. We also specialize in loans using boats, real estate and motorcycle titles as collateral. Since 1994, we have helped thousands of satisfied customers and are the industry leader when it comes to getting the MOST cash at the LOWEST RATE fast. The process is quick and easy. Simply fill out the application for instant approval. Within 30 minutes**, one of our expert staff will call you to complete the process.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Open-MRI-Bala</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6572</link>
<guid>44a6a9fee78f2bb58e758a209df95f1a</guid>
<pubDate>Mon, 20 Mar 2023 13:31:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>Open-MRI-Bala</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d958112a5f5133f08dd19fe7e4a43797c1f07d9d39a40e7962fafe372b635870</i><br /><br />Threat actor <b>description</b>: <i>Open MRI of Bala Cynwyd is the premier, patient friendly Open MRI center located in Bala Cynwyd, just outside of Philadelphia, PA. Our new, state of the art, modern facility, offers our patients the newest, fastest MRI/MRA technology. Our Toshiba TitanTM ultra-short, 16 Channel, open-bore 1.5T MRI system offers our patients excellent image quality and the fast, comfortable exams you deserve. Our professional, friendly staff, combined has over 150 years of experience in healthcare and the MRI industry. We offer shorter scan times depending on the body part. Our board-certified radiologists and certified technologists represent various diagnostic imaging subspecialties, including neuroradiology, musculoskeletal and MR angiography. All patients will be provided with a free CD of their MRI study.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Desman-Design-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6568</link>
<guid>1b89a2e980724cb8997459fadb907712</guid>
<pubDate>Mon, 20 Mar 2023 13:31:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>Desman-Design-Management</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24d93bd291444fad8b29f85d77b94d8e64b01733dc6535fa2e6fd054501aa7d7</i><br /><br />Threat actor <b>description</b>: <i>We gladly welcome Desman.com, yet another loser, to our blog.

DESMAN is one of the leading national parking specialist providing architecture, structural and restoration engineering, planning, transportation and green parking consulting to commercial, municipal and institutional clients nationwide. 

We'll update this post.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>National-Board-of-Osteopathic-Medical-Examiners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6562</link>
<guid>22f7e834551fbb0f6ea55b04889e8eb1</guid>
<pubDate>Mon, 20 Mar 2023 11:07:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>National-Board-of-Osteopathic-Medical-Examiners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e495ad1aa66d295c7fedbc49e96ed38e8c0af4397bf2654b766ca45e115cd65</i><br /><br />Threat actor <b>description</b>: <i>The National Board of Osteopathic Medical Examiners (NBOME) is an independent, nongovernmental, not-for-profit organization. Since their founding in 1934, they have been recognized for excellence in the national and international arenas of osteopathic physician testing and evaluation. NBOME produces a number of osteopathically distinct assessments and partner with other organizations on their assessment programs. </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>American-Institute-for-Healthcare-Quality</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6550</link>
<guid>034e2db715b4e796a5e72861ce06963a</guid>
<pubDate>Sun, 19 Mar 2023 13:09:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>American-Institute-for-Healthcare-Quality</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>80e388b72cb25f48f2aadad9d128f773cef5c7d0c13623fdc0979325fe82f481</i><br /><br />Threat actor <b>description</b>: <i>https://www.zoominfo.com/c/american-institute-for-healthcare-quality/359823076</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nor-Cal-Beverage</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6547</link>
<guid>8c620c2faaafd489b4c45b448acac3a0</guid>
<pubDate>Sun, 19 Mar 2023 12:34:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Nor-Cal-Beverage</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>150011576d371babbd8cc05b43ee0517276b7b51cf8cd21d76efa789754c2055</i><br /><br />Threat actor <b>description</b>: <i>Nor-Cal BeverageOur Mission: The Right Product, at the Right Cost, at The Right Time.That sounds simple enough, until you consider that our business breaks down into two distinct and demanding divisions:Co-Packing: We’re the largest independent co-packer of teas, ades, chilled juices, waters, and energy drinks west of the Mississippi.Equipment Solutions: Our veteran Equipment Solution’s team serves customers who range from convenience stores to biotech labs. We help our customers select the right equipment; then we install, service and maintain it.Keeping true to our mission in such a challenging business environment starts with who we are. We are a family business, owned and operated by the Deary family. Started by Roy Deary in 1937, we were managed by Grant and Don Deary until Grant’s death in 1999 and run by Don Deary until he “retired” to the position of board chairman in 2010. Our President and CEO Shannon Deary-Bell represents the third generation of Nor-Cal Beverage Dearys. Our fourth generation is emerging into the business, allowing our legacy to continue. Nor-Cal Beverage is proudly a certified Women Owned Business.SITE: https://www.ncbev.com Address 2286 Stone BlvdWest Sacramento, California95691, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tri-Counties-Bank</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6548</link>
<guid>eef6f4457ee96f8bae1893f5b234d238</guid>
<pubDate>Sun, 19 Mar 2023 12:34:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Tri-Counties-Bank</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33a7507f2a66e7df949c5d209721c79866718db37e1dcc2387ea07e7689144bf</i><br /><br />Threat actor <b>description</b>: <i>Tri Counties Bank provides a unique brand of Service With Solutions® offering a breadth of personal, small business and commercial banking services to communities throughout California.Established in 1975 and with assets of $10 billion, Tri Counties Bank is a wholly-owned subsidiary of TriCo Bancshares (NASDAQ:TCBK) headquartered in Chico, California.In addition to an extensive California branch network, Tri Counties Bank provides convenient access to its products and services with locations throughout California, advanced online and mobile banking, and a nationwide network of over 37,000 surcharge-free ATMs.SITE: www.tcbk.com Address 63 Constitution Dr, ChicoCalifornia, 95973United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sutton-and-Jacobs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6543</link>
<guid>12bcd658ef0a540cabc36cdf2b1046fd</guid>
<pubDate>Sat, 18 Mar 2023 15:04:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Sutton-and-Jacobs</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f403fd0b25d688629fb6a530b825a9042c52a94d6d5dec4aeee97fd4f1516a16</i><br /><br />Threat actor <b>description</b>: <i>Sutton & Jacobs, LLP is located at the corner of College and Park streets in downtown Beaumont, Texas. Originally a cluster of several buildings that, through the years, included a warehouse, auto parts supply house, blacksmith shop and from the days of cobblestone.</i><br />Target victim <b>website</b>: <i>https://www.sutton-jacobs.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Collins-Electrical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6542</link>
<guid>f56d8183992b6c54c92c16a8519a6e2b</guid>
<pubDate>Sat, 18 Mar 2023 07:07:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Collins-Electrical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9adc7a9c0fed77b935c0d838a3623ba1f93bb45e14e22fd8f440856da6ffa94</i><br /><br />Threat actor <b>description</b>: <i>Collins was established in St. Paul, Minnesota in 1948 to help meet the electrical construction demands of postwar America. Through the years, we’ve built customer relationships on a foundation of integrity and trust—a philosophy that has been the cornerstone of our company since its inception. Today, Collins has grown into a multimillion-dollar, full-service electrical and technology contracting company.</i><br />Target victim <b>website</b>: <i>https://collinsmn.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>James-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6541</link>
<guid>751f915c24612ce66dba400a86a0909b</guid>
<pubDate>Sat, 18 Mar 2023 06:35:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>James-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3be31fb41fe5d1187afe6eb77ebddb39770dbf30e0e1be1481ed63104a26e1c6</i><br /><br />Threat actor <b>description</b>: <i>As a leading global provider of logistics, supply chain management and e-Commerce services, the James Group continues the quest to provide the most innovative and forward thinking solutions available anywhere in the world.  The James Group family of companies consists of businesses that provide high performing supply chain management and logistic solutions, real estate and support technology investments.</i><br />Target victim <b>website</b>: <i>https://www.jamesgroupintl.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>UnitedLex</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6537</link>
<guid>34e157766f31db3d2099831d348a7933</guid>
<pubDate>Fri, 17 Mar 2023 19:21:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>UnitedLex</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>392c9830ff856c8c1e003114a7e22a96129ce5abf8bc99930d9f45dfda8dedb2</i><br /><br />Threat actor <b>description</b>: <i>www.unitedlex.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stanley-Steemer</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6529</link>
<guid>ac10ec1ace51b2d973cd87973a98d3ab</guid>
<pubDate>Fri, 17 Mar 2023 17:31:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Stanley-Steemer</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bda9f8d2c92d576d7c11f53396a1d8ba8998f6d82694758596eeaefb8acf379b</i><br /><br />Threat actor <b>description</b>: <i>Ohio, United States</i><br />Target victim <b>website</b>: <i>www.stanleysteemer.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pine-Tree-Commercial-Realty</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6532</link>
<guid>b9a25e422ba96f7572089a00b838c3f8</guid>
<pubDate>Fri, 17 Mar 2023 17:28:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Pine-Tree-Commercial-Realty</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be78e196fbc253ebb5a8a758d9005d155e6e3d2a236a4c6827449d5619b91ef3</i><br /><br />Threat actor <b>description</b>: <i>Illinois, United States</i><br />Target victim <b>website</b>: <i>www.pinetree.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Norman-Shutters</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6533</link>
<guid>90fd26a243f6d14c4b3df082cdc8da66</guid>
<pubDate>Fri, 17 Mar 2023 17:27:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Norman-Shutters</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>72506e0f63e9dbbadf66e8e44fb9d66e06409d9be3a0c40970dedd1f10d151ce</i><br /><br />Threat actor <b>description</b>: <i>Texas, United States</i><br />Target victim <b>website</b>: <i>www.normanusa.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>draftPros</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6535</link>
<guid>7f8dfc182100b72f5e7cb91f63f9c8db</guid>
<pubDate>Fri, 17 Mar 2023 17:25:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>draftPros</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f8e39ce8e9256912dd602147c9a9b03a36de12c6b9ae6856bc972746cb95e80</i><br /><br />Threat actor <b>description</b>: <i>Florida, United States</i><br />Target victim <b>website</b>: <i>www.draftpros.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>AAA-Energy-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6526</link>
<guid>40afd3a37cca05efe623b7509855c73a</guid>
<pubDate>Fri, 17 Mar 2023 13:37:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>AAA-Energy-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f56f326899e5ed3d5d4fe64a7153ea3299c682431d15c600a9e038328282b8d9</i><br /><br />Threat actor <b>description</b>: <i>AAA Energy Service Co. provides services in a multitude of market sectors to a wide variety of clients, small and large. When it comes to its experience, AAA Energy Service Co. has a diverse resume. We have developed, designed, constructed, and serviced HVAC systems throughout the commercial, industrial, and institutional marketplaces. To be successful, it takes a dedicated staff of professionals that perform at a high level of customer service and have the expertise to design and build various types of systems.</i><br />Target victim <b>website</b>: <i>https://www.aaaenergy.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>WALSHALBERT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6524</link>
<guid>534488729ab74ff059356cb58c9907ef</guid>
<pubDate>Fri, 17 Mar 2023 08:35:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>WALSHALBERT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eb7b73053e23242999f9a68b25c80f980d00ced2fea598f03ccbd3de0fb0c055</i><br /><br />Threat actor <b>description</b>: <i>The Walsh & Albert Company was founded in 1982 by Pete Walsh, who holds both Mechanical Engineering and MBA degrees from the University of Texas.</i><br />Target victim <b>website</b>: <i>https://www.walshalbert.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>gdz.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6523</link>
<guid>4d19b37a2c399deace9082d464930022</guid>
<pubDate>Fri, 17 Mar 2023 07:08:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>gdz.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bf22311149ac52011b7e4272f531be040612f4b7bdbc1cd57f9ccf95a1f523dc</i><br /><br />Threat actor <b>description</b>: <i>Fully integrated shipping line software. Provides a complete platform for managing the commercial and operational aspects of ocean carriers and agents.As a result of the attack on the this company, we also attacked its customers. In addition to the...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>npauctions.com-copart.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6522</link>
<guid>c900fe92840c527a0c54f28640c2f254</guid>
<pubDate>Fri, 17 Mar 2023 04:38:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>npauctions.com-copart.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c9e70a89117a5d593aad04460659903b9c07a0b6e03f1d90b3c95ba2f1d22ce9</i><br /><br />Threat actor <b>description</b>: <i>We exfiltrated all the sensitive data from 3 file servers and even the source code of all your developments from git repos.</i><br />Target victim <b>website</b>: <i>https://npauctions.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>VORNADO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6513</link>
<guid>3bff829dde3583558708865f6de7be37</guid>
<pubDate>Fri, 17 Mar 2023 00:17:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>VORNADO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>265271a00c8b8cda540e51a6441955cafe41111f3616c31100f8873b69e2cf18</i><br /><br />Threat actor <b>description</b>: <i>was founded on the premise that comfort should be constant, bucking the trends of oscillation and utilitarian design. That still holds true today with a broad range of products that enhance efficiency and keep everyone comfortable all year long. Vornado maintains its worldwide reputation for forward-thinking products and above-and-beyond customer service from its headquarters in Andover, Kansas.SITE: https://www.vornado.com Address 415 E 13th St, AndoverKansas, 67002United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Norman-S.-Wright-Climatec</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6515</link>
<guid>2327fdecafc97928d5ba62af00a05704</guid>
<pubDate>Fri, 17 Mar 2023 00:15:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Norman-S.-Wright-Climatec</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89c28eab3211cf202eed16c913bad17343f96f396da207f9b460c8651b901e45</i><br /><br />Threat actor <b>description</b>: <i>Norman S. Wright Climatec has rapidly grown in recent years to become one of the of premier suppliers of HVAC products and services in the Southern California market. The company’s roots began in 1996 as Airelink Products focusing mainly on air distribution products. Norman S. Wright Mechanical partnered up with Airelink to form Norman S. Wright Airelink and in the process expanded the breath of product lines with a focus on engineering and applied equipment. In 2012 the company evolved to Norman S. Wright of Southern California and continued to increase its engineering and market presence while experiencing rapid growth. With the merging with Climatec Equipment in 2014, Norman S. Wright Climatec was formed, establishing uniform coverage across all of Southern California with one of the most comprehensive offerings of HVAC products in the market.SITE: https://www.nswcla.com Address 3325 East La Palma AvenueAnaheim, CaliforniaUnited States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rudman-Winchell</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6517</link>
<guid>c646a3b8b24cb64c1314c03292fff0fd</guid>
<pubDate>Fri, 17 Mar 2023 00:14:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Rudman-Winchell</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>20d4c7910a4631161b398d33390cca2100d8cd2d8bf1b455d6f665673ab98f23</i><br /><br />Threat actor <b>description</b>: <i>Rudman Winchell has the resources, personnel, and legal expertise to settle your case effectively and affordably. Our 30 plus attorneys specialize in over 40 areas of law which means that there is always a legal expert available to answer your questions, saving you time and money.*Our firm is composed of attorneys that are among the most respected in the state. Newer associates are mentored daily by a team of skilled and experienced partners. Together our attorneys expertly practice in a wide variety of law giving you the confidence that we can counsel you on the complicated or the straightforward. Rudman Winchell has the specialization your matter deserves.SITE: www.rudmanwinchell.com Address 84 Harlow St Ste 4, BangorMaine, 04401, United StatesTel: (207) 947-4501</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kittles</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6518</link>
<guid>ae581798565c3b1c587905bff731b86a</guid>
<pubDate>Fri, 17 Mar 2023 00:13:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Kittles</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8656bea6c6a9cfe1dfb7b8fa6316d4f495e63f924ae7757edc40f4839a291797</i><br /><br />Threat actor <b>description</b>: <i>Kittle’s offers the most and newest styles, for every budget, providing more furniture choices for your Living Room, Bedroom, Dining Room and Home Office, plus the largest selection of Mattresses from all the major brands. Over 70% of the items we sell are made or assembled here in the USA, some right here in Indiana. So whether you want something as-shown from our enormous inventory, or custom design your own creation and have exactly what you want in about 30 days, Kittle’s gives you the best value and the most personal service before, during and after the sale.More than just another furniture store - our commitment to quality and service is unmatched. Kittle’s has been recognized as a Top Workplace, awarded National Furniture Retailer of the year by Furniture Today Magazine, and consistently rated above 4-Stars! You can buy online here, but we recommend seeing furniture and especially trying out a mattress before you buy- so you’re always welcome to come browse in our showrooms - and we hope to see you soon!SITE: kittles.com Address 8600 Allisonville RdIndianapolis, IN 46250Unite State</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>waldogeneral.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6485</link>
<guid>263fc48aae39f219b4c71d9d4bb4aed2</guid>
<pubDate>Thu, 16 Mar 2023 23:57:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>waldogeneral.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e0d7fc22834e02ad50bd1e9055a3ac526655cc7c628e97eb5d6ffa47090c1347</i><br /><br />Threat actor <b>description</b>: <i>Waldo General, Inc. is a management company specializing in the management of Associated Business Units; most of which operate in the financial services industry. Waldo General, Inc.'s portfolio of businesses that it manages include storefront consum...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>WORLDMARKET.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6490</link>
<guid>3d387d2612f9027154ed3b99a7427da1</guid>
<pubDate>Thu, 16 Mar 2023 23:32:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>WORLDMARKET.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa1a8389279d915e0618f1157142ae965cd07a6235082afa35153efc70fe42f1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.WORLDMARKET.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>WILDFIRE-DEFENSE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6491</link>
<guid>cd17d3ce3b64f227987cd92cd701cc58</guid>
<pubDate>Thu, 16 Mar 2023 23:32:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>WILDFIRE-DEFENSE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6ed13399b85f1c08efd3444db6e632c3bd7e8766f5e8047fc80ecfeca777817</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.WILDFIRE-DEFENSE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>SWEEPINGCORP.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6492</link>
<guid>aa8fdbb7d8159b3048daca36fe5c06d2</guid>
<pubDate>Thu, 16 Mar 2023 23:31:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>SWEEPINGCORP.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ae8484344620d608398d23053325d5fdf495836b889b54e609a8d00e03d8123</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.SWEEPINGCORP.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>TUEBORA.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6493</link>
<guid>def130d0b67eb38b7a8f4e7121ed432c</guid>
<pubDate>Thu, 16 Mar 2023 23:31:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>TUEBORA.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3edad84273a96886b751f8cc5f479bb6b668b2a541a59113f032db82b3fda010</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.TUEBORA.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>RATELINX.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6494</link>
<guid>aef546f29283b6ccef3c61f58fb8e79b</guid>
<pubDate>Thu, 16 Mar 2023 23:30:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>RATELINX.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c093c742f41c6bbd1c9d79037bd85697a16317be70364de14cbc8c14a3b50ee0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.RATELINX.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>FERGUSON.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6495</link>
<guid>49ef08ad6e7f26d7f200e1b2b9e6e4ac</guid>
<pubDate>Thu, 16 Mar 2023 23:30:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>FERGUSON.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f33c866a22cbddad4702f5cefe8f052e5c47a32d1302f45fa6bd9da5ee53699b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.FERGUSON.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ACENURSING.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6496</link>
<guid>4d7a968bb636e25818ff2a3941db08c1</guid>
<pubDate>Thu, 16 Mar 2023 23:29:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ACENURSING.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3445b0e2407c54544d3749fffd1149dbe6ece70c568ef44222eee99ed2e39992</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.ACENURSING.ORG</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>WELLBE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6497</link>
<guid>c4127b9194fe8562c64dc0f5bf2c93bc</guid>
<pubDate>Thu, 16 Mar 2023 23:29:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>WELLBE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>522fd6a1b4d22291d055f65a8790c8c1c85afd9905417c7b40a44d2fceb0b310</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.WELLBE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HELLOBRIGHTLINE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6498</link>
<guid>45a766fa266ea2ebeb6680fa139d2a3d</guid>
<pubDate>Thu, 16 Mar 2023 23:28:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HELLOBRIGHTLINE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>896703f2601cf4cdefd56fa7c94b0ef01056d68d2967acf55a8a9462f57f6d28</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.HELLOBRIGHTLINE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>AVIDXCHANGE.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6501</link>
<guid>692baebec3bb4b53d7ebc3b9fabac31b</guid>
<pubDate>Thu, 16 Mar 2023 23:27:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>AVIDXCHANGE.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e2a2782e2446faa4bbf73008ab9b6f3ba2fae673ecacfc5c85bd9319a13e5b9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.AVIDXCHANGE.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MEDEXHCO.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6504</link>
<guid>865bf46435bd84fa5d89f64cf3ba7347</guid>
<pubDate>Thu, 16 Mar 2023 23:25:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MEDEXHCO.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>76e0cd8b342655f1fe907dcd3cb1f970474321dc049fb20a926dbf8ddcac8c1a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.MEDEXHCO.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ITXCOMPANIES.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6507</link>
<guid>f3adde26e4fd2dcbfbc56c48396a6d23</guid>
<pubDate>Thu, 16 Mar 2023 23:23:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ITXCOMPANIES.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c9b652facb0891ace7c6ad3bb03a1549ab75fdf2cade4edf3616d6c072940817</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.ITXCOMPANIES.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HOMEWOODHEALTH.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6508</link>
<guid>58d2d622ed4026cae2e56dffc5818a11</guid>
<pubDate>Thu, 16 Mar 2023 23:23:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HOMEWOODHEALTH.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>47917cdf3f20e817e0aaad2b67cebf0441c438155552cea8cbc407069370b58d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.HOMEWOODHEALTH.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ALLIEDBENEFIT.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6510</link>
<guid>a3fc981af450752046be179185ebc8b5</guid>
<pubDate>Thu, 16 Mar 2023 23:22:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ALLIEDBENEFIT.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a9647608b70b31a23c9d8edc8e18511215d68bd01bf8ba955628fc53ea75819</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.ALLIEDBENEFIT.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>USWELLNESS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6511</link>
<guid>fc2e6a440b94f64831840137698021e1</guid>
<pubDate>Thu, 16 Mar 2023 23:21:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>USWELLNESS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e56816eae594289e01f3c937969a5fb42ee4eccbbe3709b291a04d7b5a07a0f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.USWELLNESS.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>regaltax.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6476</link>
<guid>ab49ef78e2877bfd2c2bfa738e459bf0</guid>
<pubDate>Thu, 16 Mar 2023 08:44:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>regaltax.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b5a434daf03c0a72c73df57e5af1433ac019835cec548a051d1c68751e38c233</i><br /><br />Threat actor <b>description</b>: <i>Regal Tax Advisory Group has been in business for more than 14 years. We are proud to say that we have delivered satisfaction and excellence, not just in Doral, FL and Miramar, FL, but also throughout the United States. The services we provide are al...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Etex-Communications</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6475</link>
<guid>c0db17c6772e2a26cb133ad3ba389cce</guid>
<pubDate>Thu, 16 Mar 2023 02:27:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Etex-Communications</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4c1184f25426870054a9b7577697750b501e2701bf2674a74e4c1bc8b6c80227</i><br /><br />Threat actor <b>description</b>: <i>The Company’s rich heritage and continued desire to bring the very best communications services and technology to subscribers is evidenced by the evolutions of the network from open wire strung along fence posts and outhouses to the digital fiber optic network in place today.Etex Telephone Cooperative boasts a service territory of 710 square miles of rural East Texas. Customers within this service area are given the opportunity to purchase local, long distance, digital TV and internet (dial-up and DSL) services at rates comparable to those found in urban areas around the state. Deployment of fiber in the loop further enhances our ability to offer other broadband services.</i><br />Target victim <b>website</b>: <i>https://www.etex.net/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>Liberty-Lines</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6474</link>
<guid>f4e369c0a468d3aeeda0593ba90b5e55</guid>
<pubDate>Wed, 15 Mar 2023 18:48:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Liberty-Lines</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9cddb6dd99d5c2895a1a89f45de2e5542b4ffb0c34df99bc883f9e664db112ee</i><br /><br />Threat actor <b>description</b>: <i>For over 60 years Liberty Lines has been privileged to develop and operate one of the most effective and efficient Transit systems in the country. Today Liberty operates over 300 vehicles on 60 routes and carries almost 30 million passenger over 10 million miles annually. We believe our 700 union and non-union employees are the best transit workers in America. Our employees are our greatest asset and earn excellent wages, health and pension benefits. The Liberty workforce is foundational to the local economy.﻿Since its meager beginnings in 1953 as a 4 vehicle operation, Liberty Lines has grown through merger and acquisition to become one of the largest privately owned transportation companies in New York State. Today, the company, which is headquarted in Yonkers, operates out of 2 state of the art facilities, employing approximately 610 union and 140 non-union employees and operating a fleet of 350 vehicles from 25 foot passenger vans, to 60 foot articulated and hybrid buses.</i><br />Target victim <b>website</b>: <i>http://www.libertylines.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cambridge-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6473</link>
<guid>8a0cd50ecce34cfd150d3d512ccf42cf</guid>
<pubDate>Wed, 15 Mar 2023 10:46:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Cambridge-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>54bc3bdf701f617a1bcbeb44954c9fcf0d0bdb8cfe8d58e441a7ad02ad22a8fb</i><br /><br />Threat actor <b>description</b>: <i>boston.cambridgecollege.edu</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>NRG-Innovations-DataBase-Leak</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6472</link>
<guid>832353270aacb6e3322f493a66aaf5b9</guid>
<pubDate>Wed, 15 Mar 2023 01:20:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>NRG-Innovations-DataBase-Leak</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a60e48d363cc67094406f0d10449a518633949281e6594b997f1213a45f9ba2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>essendant.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6471</link>
<guid>a274315e1abede44d63005826249d1df</guid>
<pubDate>Tue, 14 Mar 2023 22:37:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>essendant.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04f82732287f3d372140e40867f015629d98055bced2ee4e0036d4af1483265c</i><br /><br />Threat actor <b>description</b>: <i>Essendant, formerly known as United Stationers, is a national wholesale distributor of office supplies, with consolidated net sales of $5.3 billion. Essendant stocks over 160,000 items including traditional office products, office furniture, janitori...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>dmos.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6468</link>
<guid>7695ea769f021803c508817dd374bb27</guid>
<pubDate>Tue, 14 Mar 2023 16:47:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>dmos.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be72e7b31aa83fb58e26e6d1dd1921c25fee76f5f1a69024cff02df7ec9689a7</i><br /><br />Threat actor <b>description</b>: <i>Data Volume: 278.69 GBContents: scans, purchasing information, marketing information, contracts, insurance documents, and moreSince 1955 DMOS Orthopaedic Centers has been leading the way, providing innovative quality care to patients of Central...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>RUBRIK.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6466</link>
<guid>219c507b38ddfc07899fc1f01ff40c44</guid>
<pubDate>Tue, 14 Mar 2023 11:14:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>RUBRIK.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>318f8c2383e14f98adab60e29ce85a9fb49cabd15e4663c115dc3969e2c7041d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.RUBRIK.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Manning-Building-Supplies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6465</link>
<guid>d2849eee3432ef804bfccac1a9cb24f0</guid>
<pubDate>Tue, 14 Mar 2023 09:16:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lorenz</b> claims attack for <b>Manning-Building-Supplies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8683998a7e454922de7ea2ebf4b5dce8ada1d2bfb3322a88e21fe9db4ca418db</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lorenz</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ring-Security-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6458</link>
<guid>9d63484abb477c97640154d40595a3bb</guid>
<pubDate>Tue, 14 Mar 2023 04:40:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Ring-Security-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e591f2a8af0aef734a8508c471cdf9d013504a218c24778eb63d23e32a28febc</i><br /><br />Threat actor <b>description</b>: <i>Ring: Security Systems, Cameras, Alarms, and Smart Home Automation | Ring New Battery Doorbell Plus Get the low down on down low. See it all-from people to packages in Head-to-Toe HD+ Video with Battery Doorbell Plus. Pre-Order New Video Doorbells See who's there from anywhere.</i><br />Target victim <b>website</b>: <i>https://ring.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>workplace.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6457</link>
<guid>d465f14a648b3d0a1faa6f447e526c60</guid>
<pubDate>Tue, 14 Mar 2023 02:17:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>workplace.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ccb64ec6a6daffa7b4b951b045db96d38cf6aaca3ba024d02bfddc325506c299</i><br /><br />Threat actor <b>description</b>: <i>The WorkPlace was originally incorporated as the Private Industry Council of Southern Connecticut on August 11, 1983.  Today, we conduct comprehensive planning, and coordinate regional and state-wide workforce development programs to prepare people f...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>maximumind.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6454</link>
<guid>595373f017b659cb7743291e920a8857</guid>
<pubDate>Mon, 13 Mar 2023 21:17:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>maximumind.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>069431f257aebb30bb32772c9a3bc5b3776d903cff7e68483a7cff7bbac4ecd4</i><br /><br />Threat actor <b>description</b>: <i>I would say we were lucky if SPACE-X contractors were more talkative.But I think this material will find its buyer as soon as possible.Elon Musk we will help you sell your drawings to other manufacturers - build the ship faster and fly away....</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>hendrickcorp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6453</link>
<guid>a160a01c5ced2a79bc07e2b2ef1a2ada</guid>
<pubDate>Mon, 13 Mar 2023 20:41:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hendrickcorp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3645a6106f1d121f43fc06340a148665ebe10d6d16301310dd4085b9f9051b8c</i><br /><br />Threat actor <b>description</b>: <i>Hendrick's customer service, engineering capabilities and manufacturing expertise are second to none. Our commitment to lean manufacturing methods is a testament to our dedication to providing our customers the best product. With 145+ years of manufa...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>plasticproductsco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6451</link>
<guid>022e0ee5162c13d9a7bb3bd00fb032ce</guid>
<pubDate>Mon, 13 Mar 2023 18:41:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>plasticproductsco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>edfb81461a468450b699b715c956449a23733dbf9126bc0840ea90a40e8af1e6</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1962, Plastic Products is a company that specializes in providing plastic, metal, and ceramic injection molding services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mason-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6450</link>
<guid>67ed94744426295f96268f4ac1881b46</guid>
<pubDate>Mon, 13 Mar 2023 14:38:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Mason-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f133f0cd3c094fe06373e4d3d898205894144037558ad8fbffdf39eca9c24455</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Data-Pro-Accounting-Software-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6449</link>
<guid>007ff380ee5ac49ffc34442f5c2a2b86</guid>
<pubDate>Mon, 13 Mar 2023 12:49:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Data-Pro-Accounting-Software-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>670ad9d7de5c5d0244fa6261f3e0f690a7ea7a8121543aab1ca218455490c27e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>mdclone.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6434</link>
<guid>f4492508850c58446d4784339470a8f6</guid>
<pubDate>Sat, 11 Mar 2023 13:56:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>darkpower</b> claims attack for <b>mdclone.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b31e7fb6e549566a56572317aeeb0c98cfb665f41dc773a6b2e7de836b6e949</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>darkpower</category>
</item>
<item xmlns:dc='ns:1'>
<title>northgatesd.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6436</link>
<guid>3a2ee1496acdeeece4124055b3799c33</guid>
<pubDate>Sat, 11 Mar 2023 13:55:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>darkpower</b> claims attack for <b>northgatesd.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d86dc49af0828eca9faca0706e668f75d6d56ab138e92219b1aa3eb88139701c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>darkpower</category>
</item>
<item xmlns:dc='ns:1'>
<title>favoritefoods.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6437</link>
<guid>498f2c21688f6451d9f5fd09d53edda7</guid>
<pubDate>Sat, 11 Mar 2023 13:21:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>favoritefoods.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9aa15e100023004902c84726ad41914325cd432791a6cdb596bde329e6eacfeb</i><br /><br />Threat actor <b>description</b>: <i>The Mission of Favorite Foods is to provide quality products, superior service and innovative solutions to a select group of customers, and to make a significant contribution to their success. We strive to create mutually profitable long term relatio...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>cktc.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6438</link>
<guid>1371bccec2447b5aa6d96d2a540fb401</guid>
<pubDate>Sat, 11 Mar 2023 13:21:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>cktc.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a64095f06855df4265a09f914e18ed7d99ff59562874794644067c17bba1875</i><br /><br />Threat actor <b>description</b>: <i>CKTC was one of the first technology centers in the state. Contractors completed construction on building 100 in September 1968, and Caddo Kiowa Technology Center opened its doors to the public for the first time that year. CKTC offered 11 programs t...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>inphenix.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6440</link>
<guid>a860a7886d7c7e2a8d3eaac96f76dc0d</guid>
<pubDate>Sat, 11 Mar 2023 13:21:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>inphenix.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>02f27787691a2c22a9d9f847fd05fd4b84c23d4fb09190dc3edf84b75e5a1081</i><br /><br />Threat actor <b>description</b>: <i>Inphenix designs and manufactures lasers and light sources that are critical in state of the art applications in the medical, telecom, sensing and measurement industries.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>meinet.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6442</link>
<guid>cebd648f9146a6345d604ab093b02c73</guid>
<pubDate>Sat, 11 Mar 2023 13:20:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>meinet.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ad454d48790b8a55de78e674eb9bce526d912a1b66369b08ab2ecf277eb87e3</i><br /><br />Threat actor <b>description</b>: <i>ManagementExcellence, Inc. (MEI) has a solid track record in providing management services to membership organizations, bringing a unique set of skills and expertise to the table. We work in conjunction with several strategic partners who have specif...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>wyckoffcomfort.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6445</link>
<guid>59139a91a16c9b09a388091bdfe639de</guid>
<pubDate>Sat, 11 Mar 2023 13:19:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>wyckoffcomfort.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>585f0e14890de705621ad202e51d12c67d2e925b258a3d88af7c1d16679f8fa3</i><br /><br />Threat actor <b>description</b>: <i>Wyckoff Heating & Cooling is always growing.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>brandywine-homes.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6425</link>
<guid>93963474edfd08f1f1e7244f663b4708</guid>
<pubDate>Sat, 11 Mar 2023 10:34:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>brandywine-homes.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8efda1aaf9a72890dbd82445ba6efae049a64c9e66097c2f28dbe79df1c724df</i><br /><br />Threat actor <b>description</b>: <i>Brandywine Homes is the builder of choice throughout Southern California, creating extraordinary homes built to last today and for generations to come.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Berkeley-County-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6424</link>
<guid>80e888e0e8706954e2b97ebc980a172e</guid>
<pubDate>Sat, 11 Mar 2023 06:36:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>vicesociety</b> claims attack for <b>Berkeley-County-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dda34f6ef72a3c6c8004fa38a29468c598a477d2d2dfc7259e42cd2f8cee30db</i><br /><br />Threat actor <b>description</b>: <i>Berkeley County Public Schools oversees all operations of the public schools in the county of Berkeley, West Virginia. They serve over 19 722 students at 29 elementary, intermediate, middle and high schools.</i><br />Target victim <b>website</b>: <i>http://www.berkeleycountyschools.org/</i>]]></description>
<category>vicesociety</category>
</item>
<item xmlns:dc='ns:1'>
<title>Delaware-Life-Insurance-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6423</link>
<guid>972ededf6c4d7c1405ef53f27d961eda</guid>
<pubDate>Sat, 11 Mar 2023 01:12:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Delaware-Life-Insurance-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c6aac02490691702997c2805a3bb1e13daa0b7e5060b4a334685d52a6318a4cf</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2013, Delaware Life Insurance Company is a subsidiary of Group 1001 Insurance Holdings,LLC (Group 1001) a dynamic network of businesses making insurance more useful, logical, and accessible for everyone. As of June 30, 2022, the company had assets of $41.8 billion and liabilities of $39.7 billion (does not include Delaware Life Insurance Company of New York) with more than 320,000  active annuity and life insurance policies.</i><br />Target victim <b>website</b>: <i>https://www.delawarelife.com/</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Real-Pro</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6418</link>
<guid>0f0ee3310223fe38a989b2c818709393</guid>
<pubDate>Fri, 10 Mar 2023 23:12:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Real-Pro</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be750826effc11ed9c0c75f77db2002302a5ba812870d63ca3a3a918fa7e964b</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.realpro.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Leemock</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6419</link>
<guid>288cd2567953f06e460a33951f55daaf</guid>
<pubDate>Fri, 10 Mar 2023 23:12:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Leemock</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ac9eebb4f5e787311196572663ba267b7c1c4ebbbaadef53cbc1129342eb1a1</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.leemock.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-M.-K.-Morse</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6420</link>
<guid>49562478de4c54fafd4ec46fdb297de5</guid>
<pubDate>Fri, 10 Mar 2023 23:11:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>The-M.-K.-Morse</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d76578a3684b83c7f0e64cc25d8641f6f5dd1fce66e4e86304022a95dd55b77</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.mkmorse.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Secure-Wrap</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6421</link>
<guid>ebbdfea212e3a756a1fded7b35578525</guid>
<pubDate>Fri, 10 Mar 2023 23:10:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Secure-Wrap</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1e6185b10e8c4f7fde74645b37afa8d5eb128992c0ad09bdd0b07d10f35fb70</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.securewrap.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>schauenburg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6411</link>
<guid>8091588a3968da46e3e43a76bf3b3a98</guid>
<pubDate>Fri, 10 Mar 2023 18:34:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>schauenburg.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42f3150d593d33ad450b0231afe1b7abf02ed13297e40b4de4ee4a0de8477d66</i><br /><br />Threat actor <b>description</b>: <i>Schauenburg Industries Ltd. of North Bay, Ontario, Canada, is a Schauenburg Group company. Founded in 1969 in the heart of Canada's mining district, the company continues to supply products to the mining, tunneling, forestry and other industries.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>heidelbergbread.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6412</link>
<guid>cdf66a6a7a04d87d865335701790c3e3</guid>
<pubDate>Fri, 10 Mar 2023 18:00:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>heidelbergbread.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>553c96dfabadd118e1f5e0648db9734f2e7d12eed7acab0d2244cb648fdcd17d</i><br /><br />Threat actor <b>description</b>: <i>At Heidelberg Bread Company we promise to provide health conscious consumers with fresh, all natural, artisan breads made from sustainably sourced ingredients baked under Orthodox Union kosher standards that have an old world taste, and sold at an af...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>southamericantours.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6413</link>
<guid>a543c921889f9dcddaff0ce4ca955293</guid>
<pubDate>Fri, 10 Mar 2023 17:32:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>southamericantours.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>510b0e0129215feb401c39b86258c0ed78d889d5473eae5227479e24802d3dd2</i><br /><br />Threat actor <b>description</b>: <i>outh American Tours - SAT is South America's leading DMC, operating since 1973.Our product is tailor-made tours and travel arrangements for groups or solo travellers, be it round trips, packages, incentives or cruises. In addition to tailor-made pr...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Highway-Equipment</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6398</link>
<guid>d5438e589313fc0036bbc291299c6fd4</guid>
<pubDate>Fri, 10 Mar 2023 11:13:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Highway-Equipment</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60077140e543e6aa38d5d320ab9719df9a4f1b55a4f86ea6e7880e1b09df71e5</i><br /><br />Threat actor <b>description</b>: <i>Highway Equipment is a rental and leasing company of construction equipment and related parts. The company was founded in 1933 and is headquartered in Pennsylvania.</i><br />Target victim <b>website</b>: <i>https://www.highway-equipment.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>MEDMINDER.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6401</link>
<guid>012d9fe15b2493f21902cd55603382ec</guid>
<pubDate>Fri, 10 Mar 2023 11:10:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MEDMINDER.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ccc69ce07d8ade1dd71e010ea1ccba6cc6857179e781b44643c3b5d0c581747</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.MEDMINDER.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>HOUSELOAN.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6403</link>
<guid>eae15aabaa768ae4a5993a8a4f4fa6e4</guid>
<pubDate>Fri, 10 Mar 2023 11:09:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HOUSELOAN.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>afa0c971420f1dde73643269d0183c9f4bab97ce9cc28e40229b5714d72e6270</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.HOUSELOAN.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>ALIVIAHEALTH.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6404</link>
<guid>d994e3728ba5e28defb88a3289cd7ee8</guid>
<pubDate>Fri, 10 Mar 2023 11:09:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ALIVIAHEALTH.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>375a7a62ac1a001f87eb1a3fe402bc3a36aabb520d1eb226eeb1938b30eaa59c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.ALIVIAHEALTH.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jackson-Dean-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6393</link>
<guid>55b782d9f1c1765aac3cb3d51aae2430</guid>
<pubDate>Fri, 10 Mar 2023 09:15:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Jackson-Dean-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a2dde1c5332dd2a808899570ef9aa87796598c751724943b2d59af845f1683c</i><br /><br />Threat actor <b>description</b>: <i>Jackson Dean Construction offers a challenging and rewarding work experience to college students and graduates in order to build a foundation for your future career path in construction management. </i><br />Target victim <b>website</b>: <i>https://www.jacksondean.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hard-Manufacturing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6394</link>
<guid>d28d76b4592325c3bafc1840d4bb2957</guid>
<pubDate>Fri, 10 Mar 2023 09:14:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Hard-Manufacturing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>abdf3de1bbd591504bec29cc553745619c8c2241f2b3b22ff7a9a9b1d408b0aa</i><br /><br />Threat actor <b>description</b>: <i>HARD Manufacturing, headquartered in Buffalo, NY, designs, manufactures and sells the broadest range of pediatric beds and cribs for hospitals, other healthcare facilities, home care and day care use.</i><br />Target victim <b>website</b>: <i>https://www.hardmfg.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Materialogic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6395</link>
<guid>e8de67aac98d923eb372575f30568a89</guid>
<pubDate>Fri, 10 Mar 2023 09:12:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Materialogic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5be5182238bc66d8dc75a2602d4e06a657290b93cee4a2514d699580c06e22ec</i><br /><br />Threat actor <b>description</b>: <i>Materialogic offers services in eCommerce fulfillment, marketing logistics, warehousing and distribution, technology, and client and support services.</i><br />Target victim <b>website</b>: <i>https://www.materialogic.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Little-Mountain-Residential-Care-and-Housing-Society</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6396</link>
<guid>05a624166c8eb8273b8464e8d9cb5bd9</guid>
<pubDate>Fri, 10 Mar 2023 09:11:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Little-Mountain-Residential-Care-and-Housing-Society</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>291dd9160c3c291539ff71086368a78aa131a972cf9ff8ee636518c977123a4e</i><br /><br />Threat actor <b>description</b>: <i>Little Mountain Residential Care and Housing Society (the Society) is a non-profit society created in July 1983. The Society operates 3 sites. Adanac Park Lodge (APL) and Little Mountain Place (LMP) are residential care homes for adults requiring 24-hour.</i><br />Target victim <b>website</b>: <i>https://www.littlemountaincare.org</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>National-Business-Furniture</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6387</link>
<guid>ad7ed5d47b9baceb12045a929e7e2f66</guid>
<pubDate>Thu, 09 Mar 2023 23:21:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>National-Business-Furniture</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4c60b4736191682b5b749d94ea743ceb88444f12d9305fe21f7baec741f3dba2</i><br /><br />Threat actor <b>description</b>: <i>National Business Furniture (NBF), founded in 1975, is an office furniture manufacturer headquartered in Milwaukee, Wisconsin. The company has additional offices in New York, Chicago, Los Angeles, Atlanta, Dallas, Phoenix and Seattle. In 2006, NBF was acquired by TAKKT AG, a leading direct marketing specialist for B2B business equipment in Europe and North America.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wellington-Power-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6385</link>
<guid>2107931de60c5a7c5d526bd1d6a8a34d</guid>
<pubDate>Thu, 09 Mar 2023 19:12:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Wellington-Power-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36d567b299fd00b08c456785700253c218042cd3a816421abcb42c81fb59d45d</i><br /><br />Threat actor <b>description</b>: <i>At Wellington Power, success is based upon diversified excellence in electrical construction, automated metering infrastructure, telecommunications, and general construction services for utility, industrial, and public sector clients. The company has been developed to handle projects ranging from simple service calls to multimillion dollar installations.</i><br />Target victim <b>website</b>: <i>https://www.wellingtonpower.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Falcon-Holdings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6384</link>
<guid>9a1335ef5ffebb0de9d089c4182e4868</guid>
<pubDate>Thu, 09 Mar 2023 17:17:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Falcon-Holdings</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7084d3358be67baab8f37af6a39ea09acaa4a8bdb39a36998a65dc193ed7662</i><br /><br />Threat actor <b>description</b>: <i>Falcon created the management company of professionals to provide operational expertise and administrative services to a wide range of companies. It serves clients with a level of commitment that is first class in the industry. Implementation of many programs in the company are designed to promote a diverse work force and helping employees excel. Khan is a true example of someone who has taken advantage of the opportunities available and created value to the clients, employees and investors.</i><br />Target victim <b>website</b>: <i>https://www.falconholdings.com/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>Walker-SCM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6383</link>
<guid>800de15c79c8d840f4e78d3af937d4d4</guid>
<pubDate>Thu, 09 Mar 2023 16:40:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Walker-SCM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b3aff1bc7fa48c06ee7550e478ade38ccfbef09a01352c02d2e7f049cbb6108</i><br /><br />Threat actor <b>description</b>: <i>Walker SCM, LLC provides Global Supply Chain Services ranging from Transportation (Air and Ocean Freight Forwarding) to Warehousing Solutions that also include specialized value added services. We have stolen from their network 20GB in total, including: HR;Work files;Finance;Clients and others.Feel free to check!Archive password: 4+"JdvDyH[a4:o@9D,b$wy!'~W]~jrk/z_"yiz<r</i><br />Target victim <b>website</b>: <i>http://www.walkerscm.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Thomaston-Mills</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6381</link>
<guid>bd430257087f92e5322919c84dc99f32</guid>
<pubDate>Thu, 09 Mar 2023 08:37:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Thomaston-Mills</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>99ac68ed12f8f69871b74fca9ff501838481ec256eaae491cb341db298e64832</i><br /><br />Threat actor <b>description</b>: <i>Thomaston Mills was founded in 1899 by R.E. Hightower and is the oldest domestic sheet mill in the USA. We were owned by the Hightower family until 2001, and have been owned by the Zaslow family since that time. Combined the two families have over 200 years of textile experience. Thomaston Mills continues to operate as a family business that puts the customer first.We currently specialize in manufacturing and distribution of the highest quality bed and bath linens to the hospitality, healthcare and institutional markets. We finish millions of yards of fabric each year at our bleachery in Easley, South Carolina and cut and sew this fabric in our 250,000 square foot manufacturing and warehousing facility located in Thomaston, GA.</i><br />Target victim <b>website</b>: <i>https://thomastonmills.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-WorkPlace</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6379</link>
<guid>92c3b916311a5517d9290576e3ea37ad</guid>
<pubDate>Wed, 08 Mar 2023 19:14:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>The-WorkPlace</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>685d8fa4eca9a9439306b4b6baa48df5c4197c18b5ba5fda6b9f29aec907fbb2</i><br /><br />Threat actor <b>description</b>: <i>The WorkPlace was originally incorporated as the Private Industry Council of Southern Connecticut on August 11, 1983. Today, we conduct comprehensive planning, and coordinate regional and state-wide workforce development programs to prepare people for careers while strengthening the workforce for employers.We do this chiefly by administering workforce development funds and coordinating providers of job training and education programs. But our role is actually much larger. We believe in the power of ideas to affect great change – so we act as convener, catalyst, collaborator and advocate for workforce development throughout the region, state and nation.</i><br />Target victim <b>website</b>: <i>http://www.workplace.org</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>SMLAW</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6355</link>
<guid>d20f6cbf98b2efd688d5e33c2920b586</guid>
<pubDate>Wed, 08 Mar 2023 07:45:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>SMLAW</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97147262ba1c937a39de0a6201c837eaaf467b78ee9a919158e4c3aca7abe0a1</i><br /><br />Threat actor <b>description</b>: <i>SMT is people-focused and we try to meet the needs of our clients and staff and contribute to a better world. The attorneys and staff at SMT are dedicated to improving our community and supporting the organizations that enrich our lives and help those in need.Our law firm has grown to 24 attorneys plus support staff dedicated to providing personalized and responsive client service. From start to finish, we believe in being people-focused and making sure that each client feels listened to and valued. We want our clients to have confidence that any problem given to us will be handled with efficiency and the utmost consideration.It’s very important to us to support and give back to the community. As a firm and as individuals, we serve on boards, volunteer our time, contribute our money, and share our knowledge. We have the ability to help, and this support comes back in the form of an enhanced community. SMT attorneys and staff are involved with many different organizations that touch the community in many ways. Click on the tabs to the right to see lists of some of the organizations we are involved in. Our staff members receive one day off each year to volunteer for a nonprofit organization.SITE: https://www.smlaw.com Address 90 South E Street, Suite 200Santa Rosa, CA 95404</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>WOODHAVEN</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6357</link>
<guid>df3aebc649f9e3b674eeb790a4da224e</guid>
<pubDate>Wed, 08 Mar 2023 07:43:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>WOODHAVEN</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f8d6407bbb6f289114ad3343c2eed475ee02aed4ab17bb29da939a9e48b98695</i><br /><br />Threat actor <b>description</b>: <i>Woodhaven has been dedicated to helping families make their dream homes come true. From the finest lumber to windows and doors to cabinetry and design, Woodhaven has everything a builder or homeowner needs to bring your vision to life.James T. Robinson founded Woodhaven with the goal of offering a comprehensive selection of lumber, millwork and building supplies at competitive prices, along with the friendly, knowledgeable, go-the-extra-mile service that only a family-run business can provide. Over the years, James Robinson and his sons, Alan and David, expanded Woodhaven’s offerings to include cabinetry design, flooring, and millwork and truss manufacturing to serve the growing needs of our customers. Today, Alan and David Robinson continue to lead Woodhaven with the same beliefs and integrity handed down from their father.Woodhaven’s expert staff is ready to listen to your needs and supply the best products for your project. Your home is one of the biggest investments you will ever make. It’s important to choose a building materials supplier you can rely on. We look forward to continuing to meet the needs of our customers and show you that when it comes to building materials, kitchen, flooring, and more, the name more people trust is Woodhaven.SITE: https://woodhavenlumber.com Address 200 James St, LakewoodNew Jersey, 08701United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ennis-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6358</link>
<guid>a822554e5403b1d370db84cfbc530503</guid>
<pubDate>Wed, 08 Mar 2023 07:42:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Ennis-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>235e27babd623e18abbf3de9734c85864ca87a18bf9680fcf3c07938c3cca075</i><br /><br />Threat actor <b>description</b>: <i>Ennis, Inc., together with its subsidiaries, engages in the production and sale of business forms and other business products in North America.The Print segment designs, manufactures, and sells business forms and printed business products including snap sets, continuous forms, laser cut sheets, tags, labels, envelopes, integrated products, jumbo rolls, and pressure sensitive products. As one of the largest providers of financial and security documents, presentation and document folders, promotional products, and advertising concept products are also produced in over 50 locations. Many facilities also provide warehousing, kitting and fulfillment. The Print segment also offers point of purchase advertising for large franchise and fast food chains. Ennis sells its products through independent dealers, including business forms distributors, stationers, printers, computer software developers, and advertising agencies in the United States.SITE: https://www.ennis.com Address 2441 Presidential PkwyMidlothian, Texas76065, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sound-Publishing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6359</link>
<guid>51db672ac302a163017367f46d48f602</guid>
<pubDate>Wed, 08 Mar 2023 07:40:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Sound-Publishing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c9e4cd9e616ac72901157bfe1e8ac4a4930b103d66e09f793141cbcada864c47</i><br /><br />Threat actor <b>description</b>: <i>Sound Publishing is the leading journalistic voice in the communities that we serve. Our 43 award-winning publications in Washington and Alaska provide vetted news and information to over 3.5-million digital viewers and 144K email subscribers each month. Each week, we distribute over 392K newspapers to our readers. Our news outlets are where the intellectually curious delve into ideas and conversations to inform their daily decisions. Whenever, and however, they choose to consume our content.SITE: https://www.soundpublishing.com Address PO Box 930Everett, WA98206-0930</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Potandon-Foundation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6360</link>
<guid>7fd29ee0cb4b910d96d0ef86f16c8854</guid>
<pubDate>Wed, 08 Mar 2023 07:40:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Potandon-Foundation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>64301fcc0a283c7c9efc39eca7f513dab83bdd2a34e82740c2da477ac2353438</i><br /><br />Threat actor <b>description</b>: <i>Potandon’s senior leadership team had envisioned a day when the company could give back to the state and communities in which we live that have provided so much. Potandon Produce is surrounded by community organizations and members who make our area such a great place to live, work and raise a family. In March of 2012, those visions of giving back came to fruition with the establishment of the Potandon Foundation. Housed through the Idaho Community Foundation, the Potandon Foundation contributes to organizations throughout our area that regularly and selflessly give back to those in need. The primary focus of the Potandon Foundation is to support programs, organizations and not for profits serving children and families in crisis. Since its launch, the foundation has donated over $75,000 to local organizations who exemplify serving the community members of Idaho.SITE: https://www.potandon.com Address 1210 Pier View DriveIdaho FallsID 83402</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sandals-Resorts-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6361</link>
<guid>38eb982ee635354d3febf457beeee736</guid>
<pubDate>Wed, 08 Mar 2023 07:39:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Sandals-Resorts-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5af93ed60b9e4e8bd902ea2f43137981efd84b0ac8acb0af1a6804da1adbb9b4</i><br /><br />Threat actor <b>description</b>: <i>Since 1981, Sandals Resorts International has been leading the Caribbean all-inclusive industry by offering guests more amenities, more luxury, more innovations, and more choices than any other beach resort. Our properties are located on some of the most sought-after stretches of sand in the world, including Jamaica, the Bahamas, Saint Lucia, Grenada, Barbados, Antigua, Curacao, and Turks & Caicos. From the most romantic couples-only getaways to fun-filled vacations for the whole family, our family of all-inclusive resorts share the same vision – an unwavering commitment to excellence and a promise to exceed expectations.SITE: https://www.sandals.com Address Kent Ave, Montego BaySaint James, Jamaica</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Michael--Son</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6362</link>
<guid>7f687767ccf20fcea1c9dc4a5adc2326</guid>
<pubDate>Wed, 08 Mar 2023 07:39:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Michael--Son</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e26025374aa72d7817da615a9fd791ee011cf5f413d7dad52fce2fd558e9547f</i><br /><br />Threat actor <b>description</b>: <i>Since 2010, the Michael & Son CARES project has been giving back to the same communities that have embraced our family-owned company from the beginning. Moreover, Michael & Son has donated over $500,000 worth of complimentary work in the last 12 years. Ultimately, the goal of the Michael & Son Cares Project is to restore comfort back to families when they need it most.Michael & Son’s commitment to the fantastic community that has embraced us from the beginning is not only a choice but a duty. With success comes responsibility and Michael & Son Cares wholeheartedly embraces the task at hand.I’ve experienced my fair share of financial struggles throughout my life, but through hard work and determination I now run one of the largest Plumbing, Electrical, and HVAC companies in the nation.Every day my technicians come across some incredible people with heartbreaking stories. When they find they have nowhere else to turn, that’s when we come in to lend a helping hand to provide comfort for a community member in need.SITE: https://michaelandson.com Address 5740 General WashingtonDr Alexandria, VA 22312</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>ATCDT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6363</link>
<guid>075b051ec3d22dac7b33f788da631fd4</guid>
<pubDate>Wed, 08 Mar 2023 07:39:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>ATCDT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a11740d00a43eab667e6e08a08a9fd0c9c1715add7749f70b0ad5738bc9f2c94</i><br /><br />Threat actor <b>description</b>: <i>ATC DrivetrainHeadquarters: 9901 W Reno Ave, Oklahoma City, Oklahoma, 73127, United StatesPhone Number: (405) 577-9901Website: www.atcdrivetrain.comRevenue: $296MATC Drivetrain is the remanufacturer of choice for an international “who’s who” of blue-chip automakers. We are the largest independent Original Equipment Supplier (OES) transmission remanufacturer in the world with an ever-growing capacity of over 1 million square feet of factory and warehouse floor space.We utilize a unique combination of progressive engineering and state of the art equipment to produce “like new” products such as transmissions and engines. Our efforts reduce both the amount of waste material and the expense of warranty fulfillment, resulting in elevated environmental standards, higher profits for our customers, and lower cost for consumers.Today, under the leadership of President and CEO, Greg Heald, the company is as active as it has ever been in the areas of growth, quality, technological advancements, and environmental considerations.In August 2021, ATC acquired the UK’s leading heavy commercial drivetrain remanufacturer, HL Smith Transmissions.With the acquisition of HL Smith, ATC is now able to provide remanufacturing services for the broadest applications in the industry, from the smallest passenger vehicles up to heavy commercial and military vehicles.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>PFC-Brakes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6364</link>
<guid>84c578f202616448a2f80e6f56d5f16d</guid>
<pubDate>Wed, 08 Mar 2023 07:38:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>PFC-Brakes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>617526b4696d35cd4f845802cd0446a3c1a882992be98f71a1f77482efb9a367</i><br /><br />Threat actor <b>description</b>: <i>When it boils down to it, the products we use are a reflection of who we are. You can tell a lot about a person from the products they use. Their character. Their values. Their objectives.At PFC Brakes we have used our mission to build a culture. We have built our company based on a defiant philosophy: NO COMPROMISES™ It’s a mindset, an attitude, a commitment.Set Standards. Outperform. Outlast. Surpass. Pursue Challenges. Exceed Expectations. Break Records. PFC Brakes isn’t just a product, it’s a mentality.Our passion is in our product. We strive to deliver innovative products to the market that outperform the competitors’ and all preceding products. At PFC Brakes we do not strive to meet industry standards, but to surpass them. We strive to continually drive the industry through improvement and innovation.We have built the company with people who believe in, relate to, and adopt this philosophy. A philosophy that we believe our customers share. And we respect our customers, because they don’t just adopt our company philosophy, they live it. We are all too familiar with their character, their values, their objectives, because they are ones without compromise.SITE: https://pfcbrakes.com Address 83 Carbon Metallic HighwayClover, SC 29710United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bayou-Title</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6365</link>
<guid>85ea6fd7a2ca3960d0cf5201933ac998</guid>
<pubDate>Wed, 08 Mar 2023 07:38:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Bayou-Title</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>05f4a1b49a9e1c427b8fd0f7e09935e64d021297af99bb348cf53d774592e284</i><br /><br />Threat actor <b>description</b>: <i>Bayou Title, Inc. was founded in 1999, by Brent and Kathleen (Kathy) Laliberte. Since then, Bayou Title has grown into the largest title insurance company in the state of Louisiana. With 20 locations statewide, we have many experienced attorneys, notaries and other professionals to service all of your real estate and legal needs. In addition, several of Bayou Title’s employees hold a Mississippi title agent license, allowing us to handle your Mississippi property closing needs. Bayou Title, Inc. has handled in excess of 70,000 real estate closings, as well as examining over 90,000 titles.Bayou Title staff also perform hundreds of hours of CE instruction to real estate agents and brokers each year. Bayou Title is an approved continuing education vendor, recognized by the Louisiana Real Estate Commission (LREC) - LIC#9065. Bayou Title also teaches a wide variety of first time homebuyer seminars for various non-profit organizations around the Greater New Orleans Metropolitan area.SITE: https://www.bayoutitle.com Address 1700 Belle Chasse Hwy.Ste. A200Gretna, LA 70056</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Echelon-Fitness</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6366</link>
<guid>f8580959e35cb0934479bb007fb241c2</guid>
<pubDate>Wed, 08 Mar 2023 07:37:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Echelon-Fitness</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>59135c18cf59e9d05ce6c1910552a2cc9ba7501cc6653ab2f58eb0e163d257b0</i><br /><br />Threat actor <b>description</b>: <i>Echelon Fitness has been revolutionizing at-home connected fitness since debuting its first Connect Bike in 2017. What began as a mission to make healthy living attainable and accessible to all evolved into a line of innovative fitness solutions—as well as a thriving community. Ranging from sophisticated indoor cycling bikes, to touch-screen fitness mirrors and more, every product boasts thoughtful design and state-of-the-art technology, enabling people to exercise how they want, when they want and with who they want. By leveraging The Echelon Fit App and United Membership, members gain access to a variety of live and on-demand classes led by down-to-earth fitness instructors. Members can also use the app to track their performance against Echelon’s live leaderboard and overall progress, all while enjoying some healthy competition.SITE: https://www.echelonfit.com Address 605 Chestnut St Ste 700Chattanooga, Tennessee37450, United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>clair</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6371</link>
<guid>15825aee15eb335cc13f9b559f166ee8</guid>
<pubDate>Wed, 08 Mar 2023 07:33:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>clair</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f8cad7c70b817903ab6bccc239143f8be7fc11c1a37f8ebd1bcc9f71341d2247</i><br /><br />Threat actor <b>description</b>: <i>Clair Global, or simply Clair, is a professional sound reinforcement and live touring production support company. It was founded by brothers Roy and Gene Clair, who went into business in 1966 after they were asked to bring their sound system on tour with Frankie Valli and the Four Seasons. It is believed they were the first professional sound company to tour with a band. The company formally incorporated in 1970 as Clair Bros. Audio Enterprises, Inc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Macomb-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6372</link>
<guid>5ef78f63ba22e7dfb2fa44613311b932</guid>
<pubDate>Wed, 08 Mar 2023 07:33:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Macomb-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5fa12f7261567c5ca91a97113012d482f509fdabe38804aa8cb0425d5a4e2f0e</i><br /><br />Threat actor <b>description</b>: <i>Welcome to The Macomb Group! We’re proud to be a leading wholesale distributor of pipe, valves and fittings for the Midwest region and beyond.Founded in 1977 and acquired by the current owners in 1991, The Macomb Group has differentiated itself from competitors by continually expanding our operations to provide unbeatable specialty services, a huge inventory, energy-efficient solutions, and exceptional customer service.We pride ourselves on being a family and friend oriented business which started long before 1991. Our CEO Bill McGivern and Executive Vice President Keith Schatko first met while playing little league together. Years later, as fate would have it, both Schatko and McGivern were working at what was then known as Macomb Pipe & Supply to help pay for college tuition. Although they knew they wanted to become business owners, they also knew how important warehouse operations were to the success of a company so they learned all they could. They started by sweeping floors, packing orders, familiarizing themselves with the products and working the sales counter. When the time came, McGivern and Schatko, together with then-partner Doug Howe purchased the company.SITE: https://www.macombgroup.com Address 6600 East 15 Mile RoadSterling Heights, MI 48312Phone: (586) 274-4100Fax: (586) 274-4125</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>KWS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6373</link>
<guid>e0f19f64f086e393ceb0cf4a8c561b51</guid>
<pubDate>Wed, 08 Mar 2023 07:33:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>KWS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4893740438326173825372782d4f50879bc82526fbe08eb28d24c14cdf8d7c0e</i><br /><br />Threat actor <b>description</b>: <i>Kanawha ScalesManufacturing · West Virginia, United States · 182 EmployeesHeadquarters:111 Jacobson Dr, Poca, West Virginia, 25159, United StatesPhone Number: (304) 755-8321Website: www.kanawhascales.comRevenue: $66.3MFounded in 1954 and Headquartered in Poca, West Virginia. Kanawha Scales & Systems is a provider of various sized scales for the automotive, chemical, metals, scrap, and energy industries.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hall-Booth-Smith</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6375</link>
<guid>f29a179746902e331572c483c45e5086</guid>
<pubDate>Wed, 08 Mar 2023 07:32:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Hall-Booth-Smith</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>916a350ff69682b8961879351b26abbb89116ec340186340afc9e8e436df0c16</i><br /><br />Threat actor <b>description</b>: <i>Hall Booth SmithEstablished in 1989, Hall Booth Smith, P.C. (HBS) is a full-service law firm with six regional offices strategically located throughout Georgia, as well as offices in Birmingham, Alabama; Charleston, South Carolina; Asheville, Charlotte, and Raleigh, North Carolina; Jacksonville, Miami, Tallahassee, Tampa, St. Petersburg and West Palm Beach, Florida; Nashville and Memphis, Tennessee; Little Rock and Rogers, Arkansas; Missoula, Montana; Denver, Colorado; Oklahoma City, Oklahoma; Paramus, Red Bank and Saddle Brook, New Jersey; White Plains and New York, New York. Experienced across a wide range of legal disciplines, HBS attorneys pride themselves on providing knowledgeable, proactive, client-specific counsel to individuals, domestic and international corporations, state and federal agencies, and nonprofit organizations.At HBS, we possess the legal knowledge, skill and experience to meet our clients’ needs wherever they do business. HBS maintains the highest commitment to ethically and professionally serve our clients by providing the highest quality legal representation.SITE: https://hallboothsmith.com Address 191 Peachtree St NE Ste 2900Atlanta, Georgia, 30303United States</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>fflawoffice</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6377</link>
<guid>2ea279ca696946aceb4337fb1ba9b23a</guid>
<pubDate>Wed, 08 Mar 2023 07:31:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>fflawoffice</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b278532a90fb576a9c619ceb1630f88091122a24e7a0878986531f7bcba63b61</i><br /><br />Threat actor <b>description</b>: <i>Friedman & FeigerLaw Firms & Legal Services · Texas, United StatesHeadquarters: 5301 Spring Valley Rd Ste 200, Dallas, Texas, 75254, United StatesPhone Number:(972) 788-1400Website: www.fflawoffice.comRevenue: $6.4MFriedman & Feiger is a results-oriented law firm in Dallas, Texas, representing clients in all types of litigation matters and commercial transactions.We are hardworking attorneys with an unyielding commitment to superior legal representation. We care for our clients and aggressively pursue their rights. We approach every legal matter as a part of a relationship that will continue and grow for many years. We build our relationships with our clients on quality representation and trust.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kanawha-Scales</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6549</link>
<guid>6828f61cee49c7a4da0f9c1d3e03b857</guid>
<pubDate>Wed, 08 Mar 2023 07:30:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Kanawha-Scales</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>478e943b707736d6d7ca396bc731e60d21532eafb7fdde49bf43aa6cf44cdc56</i><br /><br />Threat actor <b>description</b>: <i>Kanawha ScalesManufacturing · West Virginia, United States · 182 EmployeesHeadquarters:111 Jacobson Dr, Poca, West Virginia, 25159, United StatesPhone Number: (304) 755-8321Website: www.kanawhascales.comRevenue: $66.3MFounded in 1954 and Headquartered in Poca, West Virginia. Kanawha Scales & Systems is a provider of various sized scales for the automotive, chemical, metals, scrap, and energy industries.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wagner-CAT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6351</link>
<guid>c6862d63b17d713ee14f3a405d9fde77</guid>
<pubDate>Wed, 08 Mar 2023 02:39:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Wagner-CAT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c959ef0980baba2da28be5c1cb0028c20d25c631fda730bc16626673d0c00964</i><br /><br />Threat actor <b>description</b>: <i>Since 1976, Wagner has been selling and renting quality Cat machines used in heavy construction, building construction, mining, waste handling, paving, municipal and governmental applications, forestry and more.</i><br />Target victim <b>website</b>: <i>https://wagnerequipment.com/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>Law-Foundation-of-Silicon-Valley</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6350</link>
<guid>3c69ccff8acc065aa5618b36b74703de</guid>
<pubDate>Tue, 07 Mar 2023 23:57:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Law-Foundation-of-Silicon-Valley</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4fcf2288d1a917224eb2d796624c3b3d0ac181ed272db402049e3995e9aa4263</i><br /><br />Threat actor <b>description</b>: <i>The Law Foundation of Silicon Valley uses innovative legal advocacy as a tool for social change. We work tirelessly to ensure that every person in our thriving region is granted the same rights and legal access. Every day, our attorneys, social workers and advocates craft inventive solutions to the life-changing legal issues facing low-income people in Silicon Valley.  Our mission is to advance the rights of under-represented individuals and families in our diverse community through legal services, strategic advocacy, and educational outreach.</i><br />Target victim <b>website</b>: <i>https://lawfoundation.org</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Regional-Transportation-Authority</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6348</link>
<guid>1fe46a07a9ba5f05129cab882582d907</guid>
<pubDate>Tue, 07 Mar 2023 18:40:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>monti</b> claims attack for <b>Regional-Transportation-Authority</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ac40d4cb9365c44345cada5fcbc2152708c6719b608dfd43c4bf1109151f292</i><br /><br />Threat actor <b>description</b>: <i>A government agency created by the State of Illinois to coordinate the Chicago region’s transit system https://rtachicago.org</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>monti</category>
</item>
<item xmlns:dc='ns:1'>
<title>Minneapolis-Public-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6347</link>
<guid>bc1ad6e8f86c42a371aff945535baebb</guid>
<pubDate>Tue, 07 Mar 2023 09:25:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Minneapolis-Public-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eb3469d008ce109db120baf04e627528d9553b0a07b7041d894c25d0c37f3cbd</i><br /><br />Threat actor <b>description</b>: <i>Minneapolis Public Schools (MPS) or Special School District Number 1 is a public school district serving students in pre-kindergarten through twelfth grade from Minneapolis, Minnesota. Minneapolis Public Schools enrolls 36,370 students in public primary and secondary schools. The district administers about one hundred public schools including forty-five elementary schools, seven middle schools, seven high schools, eight special education schools, eight alternative schools, nineteen contract alternative schools, and five charter schools. With authority granted by the state legislature, the school board makes policy, selects the superintendent, and oversees the district's budget, curriculum, personnel, and facilities. Students speak ninety different languages at home and most school communications are printed in English, Hmong, Spanish, and Somali.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Krinos-Foods</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6251</link>
<guid>9ac1382fd8fc4b631594aa135d16ad75</guid>
<pubDate>Mon, 06 Mar 2023 15:15:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Krinos-Foods</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe66dabd5b021cd96d85faec95fd89b2570b7b21e634893be4eff994365ac586</i><br /><br />Threat actor <b>description</b>: <i>Krinos Foods LLC is one of the largest importers and manufacturers of specialty foods in North America. Krinos imports over 3,000 frozen, refrigerated and dry food products from over 25 countries. These products include cheeses, olives, olive oils, pasta and etc.</i><br />Target victim <b>website</b>: <i>https://www.krinos.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Circa-Jewels</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6249</link>
<guid>bcb7c13ff9746a60fa8c3e748acd054d</guid>
<pubDate>Mon, 06 Mar 2023 13:31:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>mallox</b> claims attack for <b>Circa-Jewels</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>366fb113a713cda769a0ee1a83fddecfb538726b65632cc651e992201594f9b7</i><br /><br />Threat actor <b>description</b>: <i>Circa Jewels is the leading international buyer of pre-owned fine jewelry, diamonds and watches. If Circa Jewels fail to take responsibility for their security weakness, all of their and their clients' confidential will be published.  File Tree - https://anonfiles.com/N52cufc5z0/filetree_txt Last date - 20th March 2023 Contact ( https://tox.chat ) - AE3750EE1BE48D86104E6FB1DADC32469A31242EFC205A3EC47EF7689E3F103472A4DBFFF399 </i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>mallox</category>
</item>
<item xmlns:dc='ns:1'>
<title>HATCHBANK.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6248</link>
<guid>e6a4f65e7355bb8b7671c3a18003b146</guid>
<pubDate>Mon, 06 Mar 2023 11:29:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>HATCHBANK.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a32aa60f0538a49e3a887617f8b7d7c277df5972af03060c7069562d25ae1d7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>https://www.HATCHBANK.COM</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Los-Altos-Foods</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6244</link>
<guid>21f4c3b5591da245af90a2fd52fa1a55</guid>
<pubDate>Mon, 06 Mar 2023 02:49:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Los-Altos-Foods</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6b5562210e49f0b7f5dfffa82f162b034a12794af733dc295f604d1afb30c9cb</i><br /><br />Threat actor <b>description</b>: <i>Full dump disclosured. Customers export in meta folder.</i><br />Target victim <b>website</b>: <i>https://losaltosfoods.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lehigh-Valley-Health-Network</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6239</link>
<guid>4a5cfa9281924139db466a8a19291aff</guid>
<pubDate>Sun, 05 Mar 2023 15:55:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Lehigh-Valley-Health-Network</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ea48ef3d9b3562cf95aa53b2f35205e0bf54bf996ce53e7dd1cbb57ae485ef5</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1899, Lehigh Valley Health Network is a healthcare network based in Allentown, Pennsylvania. The healthcare network serves Pennsylvania and its flagship hospital is Lehigh Valley Hospital.</i><br />Target victim <b>website</b>: <i>https://www.lvhn.org</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Waynesboro</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6230</link>
<guid>a7c9585703d275249f30a088cebba0ad</guid>
<pubDate>Sat, 04 Mar 2023 14:51:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Waynesboro</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>172cb4bd9a32736e260dedcff3dcd8c1ad83d1f9255dbd1fbfeda7d873f99d93</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>SkyFiber-Networks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6227</link>
<guid>56f0b515214a7ec9f08a4bbf9a56f7ba</guid>
<pubDate>Sat, 04 Mar 2023 11:23:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>SkyFiber-Networks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3927c391dea67142df42aa499fb72db7e95ffaf68d21a588fdd911a5a900f41</i><br /><br />Threat actor <b>description</b>: <i>  SkyFiber Internet is leading the way in hybrid fiber and fixed wireless internet service by giving our customers the most reliable, fastest Internet connection out there.  We look forward to providing you with the best Internet available. No one loves building networks more than we do.  </i><br />Target victim <b>website</b>: <i>https://skyfiberinternet.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>CMMG-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6228</link>
<guid>f4e3ce3e7b581ff32e40968298ba013d</guid>
<pubDate>Sat, 04 Mar 2023 11:23:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>CMMG-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>05874635ce2d9a4379cc65f79b906a296ec9db79d22c0593d5a2970df6840141</i><br /><br />Threat actor <b>description</b>: <i>MMG ® was established in 2002, when John, Jeff, Gretchen, and Stephanie Overstreet made the decision to create a quality AR rifle that can be afforded by everyone. Since that time, things have continued to get better and better. Although the nature of our business continues to evolve, one thing does not—our commitment to meet each and every morning to pray for God’s wisdom in managing the enormous responsibility that comes with this business. By His grace, we have grown every year! CMMG is constantly looking for new ways to improve our products, processes and company at large. Both our customer service and product lineup continue to be second to none, and all of our rifles and firearms parts are made in the United States from the best materials available. CMMG guarantees its products against defects in material or workmanship for the life of the product. CMMG Inc. will repair, replace or substitute any product(s) if a defect in material or workmanship is found. </i><br />Target victim <b>website</b>: <i>https://cmmg.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Welty-Building-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6226</link>
<guid>adfe565bb7839b83ea8812e860d73c79</guid>
<pubDate>Sat, 04 Mar 2023 10:52:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Welty-Building-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12c44faa7f4779c34f2d8e48e9de9d40d04e50028aceb8d8b0ac9d4bc3a629b2</i><br /><br />Threat actor <b>description</b>: <i>1.5TB including full clients info, confidential building drawings, engineering information "Build to Last" now public. </i><br />Target victim <b>website</b>: <i>https://thinkwelty.com/about/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arizona-Reproductive-Medicine-Specialists</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6224</link>
<guid>69783ee76a92567d446143b811519068</guid>
<pubDate>Sat, 04 Mar 2023 07:03:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Arizona-Reproductive-Medicine-Specialists</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>190cf62210ac77e519b1623b711576313d7eab0b1b245be2826b890afb331ed2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Surtronics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6223</link>
<guid>0e1418311a013ebb344e7fcf8d199cc3</guid>
<pubDate>Sat, 04 Mar 2023 03:30:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Surtronics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df5974ab59bf067ed01f486fd2e4b4704648df19c367d3bbe6c4845c5fdd8a8a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>ACCSC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6218</link>
<guid>02f063c236c7eef66324b432b748d15d</guid>
<pubDate>Fri, 03 Mar 2023 17:25:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>ACCSC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57350018b2c9107a5d42c3b66da03229d943600ac103a0a00ad5a6e92c87b710</i><br /><br />Threat actor <b>description</b>: <i>Accrediting Commission Of Career Schools Colleges. ACCSC’s scope of recognition with the U.S. Department of Education includes the accreditation of postsecondary, non-degree-granting institutions and degree-granting institutions that are predominantly organized to educate students for occupational, trade and technical careers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zerbe-Retirement-Community</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6219</link>
<guid>852c296dfa59522f563aef29d8d0adf6</guid>
<pubDate>Fri, 03 Mar 2023 17:25:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Zerbe-Retirement-Community</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>526c8b79f9d3deba266ff3bf130868843db20d1b74d04801331749fccbc7790a</i><br /><br />Threat actor <b>description</b>: <i>Zerbe Retirement Community is part of the Hospitals & Physicians Clinics industry.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Oakland</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6214</link>
<guid>05e97c207235d63ceb1db43c60db7bbb</guid>
<pubDate>Fri, 03 Mar 2023 04:25:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Oakland</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8fc0d92ffd9257e45972691eee6b65c5505f36163d6299aa340e28e96d3c8077</i><br /><br />Threat actor <b>description</b>: <i>United States</i><br />Target victim <b>website</b>: <i>www.oaklandca.gov</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Metropolitan-Opera</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6207</link>
<guid>62db9e3397c76207a687c360e0243317</guid>
<pubDate>Wed, 01 Mar 2023 22:49:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>The-Metropolitan-Opera</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>776db47489c10841b5d6cb13fba3c66db7af3ee7a9cb63164894c1eb5418326e</i><br /><br />Threat actor <b>description</b>: <i>The Metropolitan Opera is a vibrant home for the most creative and talented singers, conductors, composers, musicians, stage directors, designers, visual artists, choreographers, and dancers from around the world.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Audio-Video</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6206</link>
<guid>1b84c4cee2b8b3d823b30e2d604b1878</guid>
<pubDate>Wed, 01 Mar 2023 17:27:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Audio-Video</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc33e0e3ee2f69411b6d8969a3514c91455a1e60cd6d357f57a879e5dfff9803</i><br /><br />Threat actor <b>description</b>: <i>Established in 1946 by WWII Veteran Milton A. Klarsfeld, Audio-Video Corporation was initially named The Albany Television Headquarters and was located on Hudson Avenue in Albany, NY. In 1954 the company changed its name to Audio-Video Corporation to better identify with current technology and services. Audio-Video Corporation headquarters is located in Albany, NY with a full service branch office in Syracuse, NY. Additionally, there are three satellite offices spread across NY and New England. Locations include Syracuse NY, Rochester NY, and Burlington VT.</i><br />Target victim <b>website</b>: <i>https://www.audiovideocorp.com/</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Traffic-Ticket-Office</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6203</link>
<guid>d4b0a4ece86c42fe7c34d6eaa9aef588</guid>
<pubDate>Wed, 01 Mar 2023 13:15:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Traffic-Ticket-Office</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da94cd18278fdf148068eb9fb174ecacf2a306661ad82e7084ae970b2730cdd1</i><br /><br />Threat actor <b>description</b>: <i>Since 1993, the Traffic Ticket Office, has successfully been serving clients in Miami and South Florida with their civil and criminal traffic violations. Hundreds of thousands of cases have been handled by our experienced and reputable attorneys. We are able to offer our clients the benefits of saving time and money, preserving their driving rights and preventing the accumulation of points on their records. Most often, we have managed to do this without requiring a personal court appearance by the client.</i><br />Target victim <b>website</b>: <i>https://www.trafficticketoffice.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kimko-Realty</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6198</link>
<guid>b77375f945f272a2084c0119c871c13c</guid>
<pubDate>Wed, 01 Mar 2023 08:36:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Kimko-Realty</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e0c658383883fa35c1d5038fe220374c06e2e50c7b9c6bdb69fd5c22ab5b534</i><br /><br />Threat actor <b>description</b>: <i>Kimco Realty® (NYSE:KIM) is a real estate investment trust (REIT) headquartered in Jericho, N.Y. that is North America’s largest publicly traded owner and operator of open-air, grocery-anchored shopping centers, and a growing portfolio of mixed-use assets. The company’s portfolio is primarily concentrated in the first-ring suburbs of the top major metropolitan markets, including those in high-barrier-to-entry coastal markets and rapidly expanding Sun Belt cities, with a tenant mix focused on essential, necessity-based goods and services that drive multiple shopping trips per week.</i><br />Target victim <b>website</b>: <i>https://kimcorealty.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>hafele.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6194</link>
<guid>af5baf594e9197b43c9f26f17b205e5b</guid>
<pubDate>Tue, 28 Feb 2023 21:27:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hafele.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1453d1898511abd9b20bdd1b823e2eca011df7bd211bf466490f214e7a37691</i><br /><br />Threat actor <b>description</b>: <i>Furniture fittings, architectural hardware, electronic locking systems - Häfele. The hafele.com website is currently being reactivated. On the night of February 2, 2023, there was a ransomware attack on the IT systems of the Häfele Worldwide Group fr...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>globalcommunities.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6186</link>
<guid>fb3deea8bff8902a6a092a4b532b4a68</guid>
<pubDate>Tue, 28 Feb 2023 13:25:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>globalcommunities.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>090b7fe30e91763952299b34e3c5c62a2cacaddb47c8248c6380c8f9ac0f6cc6</i><br /><br />Threat actor <b>description</b>: <i>Global Communities is a global development organization that has grown to reach over 35 countries per year. The non-profit organization was founded in 1952 as the Cooperative Housing Foundation and provided affordable housing for low-income families...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>wmich.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6188</link>
<guid>30893a5eb454815e3bf4a3406b1b80c0</guid>
<pubDate>Tue, 28 Feb 2023 13:25:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>wmich.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be7694db07f58655ea3123dfe02b71bcf05d8c207a216f1bfe0930ff340f8daf</i><br /><br />Threat actor <b>description</b>: <i>Western Michigan University is a public research university in Kalamazoo, Michigan. It was initially established as Western State Normal School in 1903 by Governor Aaron T. Bliss for the training of teachers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>MSX-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6181</link>
<guid>7873b66ca1d39eb8603c467fa05cfe86</guid>
<pubDate>Mon, 27 Feb 2023 21:08:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>MSX-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9fc84f41b0fa5a603c7f0b73a942b750439478d985f4e40ba9a67140c7785b8</i><br /><br />Threat actor <b>description</b>: <i>For more than 25 years, we’ve been a dedicated partner to leading automotive brands around the world. We support them in transforming their businesses and in managing their operations across the areas of Customer Experience, Repair Optimization, Learning and Insights.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>wcso.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6175</link>
<guid>c80d9ba4852b67046bee487bcd9802c0</guid>
<pubDate>Mon, 27 Feb 2023 11:32:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>wcso.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f28d8d2c507d656e0a1a6281973322fba6d6f1839b2c22ad2a168260bb3ebefb</i><br /><br />Threat actor <b>description</b>: <i>Washington County Sheriff’s Office official mobile app.We are committed to not only protecting, but also serving the citizens of Washington County with professionalism, integrity, and transparency. A part of that commitment is to provide you with the...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>carveraero.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6177</link>
<guid>d98c1545b7619bd99b817cb3169cdfde</guid>
<pubDate>Mon, 27 Feb 2023 11:18:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>carveraero.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b96ae4722cd01ad4016e329d6c05a525849a56df2d445ffed1d9310e8b8ad8fb</i><br /><br />Threat actor <b>description</b>: <i>Owned by CL Enterprises, Carver Aero(www.carveraero.com)has fixed-base operations in Muscatine and Davenport, Iowa. Carver Aero provides corporate and general aviation services in Iowa, including charter flights, corporate pilot services, airplane ma...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>ispace.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6157</link>
<guid>26d4b4313a7e5828856bc0791fca39a2</guid>
<pubDate>Fri, 24 Feb 2023 21:13:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ispace.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e56a364ec16d414559c2bc8ec56a75a74d51aa95523ab961fb59d6dec4a4fe12</i><br /><br />Threat actor <b>description</b>: <i>iSpace is a leading technology and business process services company serving the healthcare, automotive, entertainment and financial services industries. Founded in 2000, our more than 600 professionals worldwide serve more than 25 Fortune 500 compan...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>delawarelife.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6154</link>
<guid>3bf07985bf8a5a37fcf65989269e8edc</guid>
<pubDate>Fri, 24 Feb 2023 13:41:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>delawarelife.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6cbdfec020e8bf7fc16c0c85fdd0a1500f1b7fe3e70a0cfc64928f3f43bb3350</i><br /><br />Threat actor <b>description</b>: <i>Delaware Life Insurance Company is a leading provider of annuity and life insurance products in the United States. The company was established in connection with the purchase by Delaware Life Holdings, LLC of the domestic U.S. annuity business and ce...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>California-Northstate-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6346</link>
<guid>c16882e007c5c7a773acd7c5e8869ab7</guid>
<pubDate>Thu, 23 Feb 2023 17:18:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>California-Northstate-University</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c9aa5e4cf541b3a88a6e906aff0b0d23f038140aead53ad8990263122f1e6f2</i><br /><br />Threat actor <b>description</b>: <i>We have Student admissions data include Name, Social Security Number, Date Of Birth, Address, Email, Telephone. All College employees W-2 include in the sample, "2022_CNU_W2_Report_.PDF"

Why purchase the cyber-insurance with ransomware coverage policy if you don't protect your students and staff? Ignoring will not make a problem go away ;-)</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>PRESTIGE-MAINTENANCE-USA-WAS-HACKED</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6150</link>
<guid>598a90004bace6540f0e2230bdc47c09</guid>
<pubDate>Thu, 23 Feb 2023 02:46:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>PRESTIGE-MAINTENANCE-USA-WAS-HACKED</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8b627fcdfa9250df2c1339dc4632182912a8e33e9e6bb7919d99841382ab83c3</i><br /><br />Threat actor <b>description</b>: <i>Who is Prestige Maintenance USA  Prestige Maintenance USA, established in 1976 and headquartered in Plano, Texas, provides janitorial services that offer contract and project cleaning, general maintenance, window washing, carpet care, sanitation, and recycling services  Headquarters: 1808 10th St Ste 300, Plano, Texas, 75074, United States Phone Number: (972) 578-9801 Revenue: $472.4M Linkedin: http://www.linkedin.com/company/prestige-maintenance-usa Facebook: http://www.facebook.com/pmusa76 Twitter: http://www.twitter.com/prestige_m_usa</i><br />Target victim <b>website</b>: <i>www.prestigeusa.net</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kendall-Hunt-Publishing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6145</link>
<guid>d785bf9067f8af9e078b93cf26de2b54</guid>
<pubDate>Wed, 22 Feb 2023 23:07:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Kendall-Hunt-Publishing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f119f69d285ae3992f530dfed77a12ae04042ab9baab3d512445b0b7544af0c</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1944, Kendall Hunt Publishing is a publisher of hands-on, inquiry-based science, mathematics, and gifted curricula for grades PreK-12. Their research and standards-based programs are available in both print and digital components that encompass students</i><br />Target victim <b>website</b>: <i>https://kendallhunt.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Moose-Martin-Haynes--Lundy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6144</link>
<guid>197f76fe309657064dbec74d9eea4be4</guid>
<pubDate>Wed, 22 Feb 2023 21:17:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Moose-Martin-Haynes--Lundy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>301ebf69533679f2fa6d50d050ae83048f507c1379b4b8da6017f0f750c9ecac</i><br /><br />Threat actor <b>description</b>: <i>For years, Moose, Martin, Haynes & Lundy, P.A. has been providing quality, personalized financial guidance to local individuals and businesses. Our expertise ranges from basic tax management and accounting services to more in-depth services such as audits, financia</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>skylinetrisource.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6137</link>
<guid>b8c8c63d4b8856c7872b225e53a6656c</guid>
<pubDate>Wed, 22 Feb 2023 13:48:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>skylinetrisource.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbd09d49e20eced0a95a3b822c8e4a924b52d4f08294119bbf824d1aacd7926c</i><br /><br />Threat actor <b>description</b>: <i>Find the right fit for your brand with Skyline Trisource Exhibits and Environments in Cleveland. We create custom exhibits, without the custom price tag. Our high-impact graphics, modular structures and comprehensive services make great exhibit desig...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>fosterfarms.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6138</link>
<guid>b2ead76dfdc4ae56a2abd1896ec46291</guid>
<pubDate>Wed, 22 Feb 2023 13:36:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>fosterfarms.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a0d147aff6fae2ae8dcd5d25ad6d1df3b1c9f99caa7e027ac4dda3a12485c2cd</i><br /><br />Threat actor <b>description</b>: <i>Change the negotiator.He's obstructing the deal and denying the facts and the obvious obvious. And doesn't want to use valid insurance!Here are scans of insurance documents from the network of companies:http://lockbitfile2tcudkcqqt2ve6btssyvqwl...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Summit-Brands</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6134</link>
<guid>1ca5c750a30312d1919ae6a4d636dcc4</guid>
<pubDate>Wed, 22 Feb 2023 11:22:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Summit-Brands</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>58e8d6f2453f84270df34b0f0b83b6e8ede685297f6490bc36d0f1211e9d382c</i><br /><br />Threat actor <b>description</b>: <i>Summit Brands is a family-owned business started in 1958 and offers highly effective, sustainable, and innovative household cleaning products</i><br />Target victim <b>website</b>: <i>https://summitbrands.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>City-of-Lakewood</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6136</link>
<guid>c1285fcadc52c0d3dc8813fc2c2e2b2a</guid>
<pubDate>Wed, 22 Feb 2023 11:22:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>City-of-Lakewood</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a86c28f89f52cc7ef1bcea28282fcb399f36670a2fabc392cf22dd6628ea91d</i><br /><br />Threat actor <b>description</b>: <i>Lakewood is a city in Pierce County, Washington, United States. The population was 63,612 at the 2020 census.</i><br />Target victim <b>website</b>: <i>https://cityoflakewood.us/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>EncinoEnergy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6131</link>
<guid>392526094bcba21af9fd4102ce5ed092</guid>
<pubDate>Wed, 22 Feb 2023 11:06:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>EncinoEnergy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>20833572bd844ab143113be3dec7d6a7ec92791136afbd56a7f95438dc50cfb4</i><br /><br />Threat actor <b>description</b>: <i>  Encino Energy is one of the largest private natural gas and oil producers in the U.S. and a top 25 North American natural gas producer. While headquartered in Houston, our operations in the prolific Northern Utica Shale make us the largest oil producer in Ohio and the second-largest natural gas producer in the state.  But beyond our day-to-day operations, we are a company dedicated to our values of results, transparency, innovation, ownership, and sustainability. These foundational values guide our employees and make us who we are. Encino Energy’s proven management team is deeply committed to our people, and we are fully invested in the communities we call home.  Encino Energy is committed to doing the right things for the right reasons while never losing sight of safety and sustainability. We focus on the long-term, which means sustainable, safe, and environmentally conscious operations, and carefully managed risks.</i><br />Target victim <b>website</b>: <i>https://www.encinoenergy.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>kboattorneys.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6129</link>
<guid>acc21473c4525b922286130ffbfe00b5</guid>
<pubDate>Tue, 21 Feb 2023 23:31:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>kboattorneys.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5a42e8445c495beec7ea24f59df10af18ebfd8d4b0b8c46bb551077666ebbf4e</i><br /><br />Threat actor <b>description</b>: <i>Organizations, groups of attorneys, and others across the country have recognized KBA’s attorneys in many different ways. Our attorneys are published and are invited to speak at conferences where thousands of attorneys from across America come to lea...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>vuu.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6130</link>
<guid>7b99efbc101a6013d2c710028bca5cbf</guid>
<pubDate>Tue, 21 Feb 2023 23:15:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>vuu.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e354ab04ed04ad13e81fcd028d4a52e0370e5835d43c3cff31f9235c62420bef</i><br /><br />Threat actor <b>description</b>: <i>Virginia Union UniversityVirginia Union University is a private historically black Baptist university in Richmond, Virginia. It is affiliated with the American Baptist Churches USA.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>beacontech.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6128</link>
<guid>b72a5a099433a2099fc3d92f6ad3accf</guid>
<pubDate>Tue, 21 Feb 2023 22:59:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>beacontech.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56a12588c21cea20f3239f42c0106777fe6a6cc2d5dfe64bf43a22b69c2af609</i><br /><br />Threat actor <b>description</b>: <i>Since 1999 Beacon Technologies has been a leading partner in the transformation of the Nashville landscape through an integrated process of delivering Telecom, Audio Visual and Life and Safety expertise to the design and development of leading edge c...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>lyonhealy.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6126</link>
<guid>421740375847b6249d9383615831c23b</guid>
<pubDate>Tue, 21 Feb 2023 21:06:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>lyonhealy.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bcf3f52257f2dc61de3e3a54af103b5a7269fee159ba65dbdd96a3b4c1d6bd5f</i><br /><br />Threat actor <b>description</b>: <i>From the hallowed halls of the New York Philharmonic to the Bolshoi Ballet, Lyon & Healy Harps is acclaimed throughout the world for its remarkable depth and clarity of sound, breathtaking designs, and rich heritage of quality craftsmanship. With 130...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>UNIS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6119</link>
<guid>7bb7a62681a8a0f94ab424b06d172ca3</guid>
<pubDate>Mon, 20 Feb 2023 15:16:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>UNIS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>691a2c7b1cba76f77235ebd639d191a969963ee7895ec08daa96af7005bb40f8</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1989, Unis LLC has grown into a majority, nationally recognized Third-Party Logistics Provider (3PL). From humble beginnings with just a few trucks operating in Southern California, Unis has expanded into all major US markets, impacting the successful flow of commerce with superior technology, smarter supply chains, and faster execution.We credit our growth to an agile, customer-driven mindset, and strategic investments in technologies that give our clients the visibility and operational insights they require in today’s dynamic supply chain environment</i><br />Target victim <b>website</b>: <i>https://www.unisco.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>DALLAS-SCHOOL-DISTRICT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6117</link>
<guid>84e2d85ac232c681a641da1ec663888c</guid>
<pubDate>Mon, 20 Feb 2023 13:38:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>DALLAS-SCHOOL-DISTRICT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9cfef2f442697e7f9fe130ac24d8980f3b7c92345709a4eb255da3b7ca421f2</i><br /><br />Threat actor <b>description</b>: <i>Dallas School District is centered on students, powered by collaboration, built on equity and driven by excellence.Headquarters: 111 SW Ash St, Dallas, Oregon, 97338, United StatesPhone: (503) 623-5594</i><br />Target victim <b>website</b>: <i>http://www.dallas.k12.or.us</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>International-Center-of-Photography</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6113</link>
<guid>0af854284f4ab0cfea8fcfd889cbb41a</guid>
<pubDate>Sun, 19 Feb 2023 21:17:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>International-Center-of-Photography</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4de743ef09d707c881e9f30328a139bdfcd3929756ceb97d935196833848243c</i><br /><br />Threat actor <b>description</b>: <i>New York,  374 Employees. The International Center of Photography is the world's leading institution dedicated to photography and visual culture. Cornell Capa founded ICP in 1974 to champion "concerned photography"-socially and politically minded images that can educate and change the world</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>jetboxcargo.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6108</link>
<guid>c09b1eadea0efc7914f73ac698494b5e</guid>
<pubDate>Sun, 19 Feb 2023 17:51:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>jetboxcargo.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cda26c5019459e959b9e899d3ec12b12d9dd71ea1f6dacfa7c076491b5a56072</i><br /><br />Threat actor <b>description</b>: <i>El Corporativo JetBox como especialista en el servicio de logística internacional, posee una amplia trayectoria en transporte aéreo y marítimo,con origen en Estados Unidos para Costa Rica. Cuenta con su propia Agencia Aduanal y ofrece los servicios...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>elliotthomes.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6111</link>
<guid>721e049e9903c3a740c4902878c99923</guid>
<pubDate>Sun, 19 Feb 2023 17:44:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>elliotthomes.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d4f58f9eb4c752935be2b88b3032dc91fbfa00f94fb21b3b626a5485a61755af</i><br /><br />Threat actor <b>description</b>: <i>Find your new construction home by Elliott Homes, home builder in Sacramento CA, Phoenix AZ and Yuma AZ. Explore our new home communities today!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>SINGLESOURCE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6105</link>
<guid>c1d53b7a97707b5cd1815c8d228d8ef1</guid>
<pubDate>Sat, 18 Feb 2023 19:25:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>SINGLESOURCE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a154058a520e268e9668e632d54f0f7faaf9fbd03fa032d9e6d356f54586292</i><br /><br />Threat actor <b>description</b>: <i>Single Source is a custom foodservice distribution company providing exceptional logistics management services to our customers, nationwide thru our network of ten distribution centers.</i><br />Target victim <b>website</b>: <i>https://singlesource.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>championfp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6103</link>
<guid>56880339cfb8fe04c2d17c6160d0512f</guid>
<pubDate>Sat, 18 Feb 2023 17:20:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>championfp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9b3663f02cb326e641f3c3ddbb8df672fcd1f4553cc4aa2f56be0a287eaba727</i><br /><br />Threat actor <b>description</b>: <i>Founded in Savannah in 1983, Champion Fire Protection has been a market leader in design, fabrication, and installation of fire sprinkler systems.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>sandycove.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6096</link>
<guid>e7dfca01f394755c11f853602cb2608a</guid>
<pubDate>Sat, 18 Feb 2023 11:36:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>sandycove.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>65fb17484a333085c98fe541a9c5411f9ee1b86e727ad607204ce20003313af1</i><br /><br />Threat actor <b>description</b>: <i>Sandy Cove's mission is to help you connect with God and each other in order to be transformed into the image of Christ, through His Word</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>piercetransit.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6094</link>
<guid>ce5193a069bea027a60e06c57a106eb6</guid>
<pubDate>Sat, 18 Feb 2023 05:37:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>piercetransit.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e78cdf7c4f44c6f70ce5534f3f1dcbf0e9004e1fecf92598981b504623a3f1c</i><br /><br />Threat actor <b>description</b>: <i>Pierce Transit is proud to serve our community as Pierce County’s local public transportation service. In 2019 we provided more than 9 million rides to people headed to work, medical appointments, entertainment, grocery shopping, visits with friends...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>innophaseinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6093</link>
<guid>1438ecb8cb1f6fadfee2190700789d7b</guid>
<pubDate>Sat, 18 Feb 2023 02:46:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>innophaseinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>89834f415ad749a91a537dfc7e46aa29709702aee6d47b5cac56f101a8f0df94</i><br /><br />Threat actor <b>description</b>: <i>InnoPhase is a fabless semiconductor company that develops innovative and efficient RF architectures using CMOS technology. Building on our previous experience with WLAN IoT products, we have now turned our attention to building energy efficient radi...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>hotdesk.me</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6092</link>
<guid>265c2b6a26807154013753637b68d01d</guid>
<pubDate>Sat, 18 Feb 2023 01:45:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hotdesk.me</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04f8e6fd7ac9bf8878ae9640c9d949dfe975dd5d638302fece94fe1748326734</i><br /><br />Threat actor <b>description</b>: <i>Hotdesk.me and their customers such as Barrington James (barringtonjames.com), Sarnac Partners (sarnacpartnertners.com), Hardman & Watson (hardmanandwatson.co.uk), Penspen (penspen.com), Perkins & Will (perkinswill.com), etc.We can't confirm if any...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>alliedtools.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6091</link>
<guid>a4e858c15255e55d5e1e221bd151154f</guid>
<pubDate>Fri, 17 Feb 2023 17:13:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>alliedtools.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>40c84eeeb0e23312bc7a36996b647b79a59be3025592f5f87c537943ce8877c7</i><br /><br />Threat actor <b>description</b>: <i>Allied International was founded in 1962 as an import distributor of hardware products. Over the years, with our unwavering commitment to innovation, quality, value and service, we have earned the reputation as the recognized market leader in our cor...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>fikes.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6087</link>
<guid>5a2a330b175fe588c2551b78d18d3207</guid>
<pubDate>Fri, 17 Feb 2023 15:27:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>fikes.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dde7b06182c1bf44a414662219a1285c92896d40cca340d15abb8d4d78b58a59</i><br /><br />Threat actor <b>description</b>: <i>https://www.fikes.com/COMMERCIAL CLEANING & FACILITY MAINTENANCE SERVICESThere are many moving parts to make sure a business runs successfully, and cleanliness is the most important one. When you are looking for facility maintenance services, you...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>NESG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6088</link>
<guid>c4bca428211c2b48b81fd3b12afd2aa1</guid>
<pubDate>Fri, 17 Feb 2023 15:26:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>NESG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19610a4c5710c081865440dd9281e7117a9d4d9a86fa47d17d3298df2d7f8c1f</i><br /><br />Threat actor <b>description</b>: <i>Group of Osteopathic Physicians who provide surgical health care at its highest level of expertise.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fibertec</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6089</link>
<guid>3bd318565e4adbe5f4b6abf2ffebf3a0</guid>
<pubDate>Fri, 17 Feb 2023 15:26:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Fibertec</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5de9b9f6cba79bc4fab37c2d8871c5071983b5bfd0f6adb0b1c3c56500c34d21</i><br /><br />Threat actor <b>description</b>: <i>Fibertec Environmental Services is a full-service environmental analytical laboratory, specializing in subsurface investigations, industrial hygiene, and natural gas analysis.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Suburban-Laboratories</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6090</link>
<guid>0fcee95cc7b4f2067da8ba1e330de18e</guid>
<pubDate>Fri, 17 Feb 2023 15:26:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Suburban-Laboratories</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4b03eded4a0642500eae36a37c30fbb47fdbf41893ba5690521ec100c2c0cc81</i><br /><br />Threat actor <b>description</b>: <i>Suburban Laboratories was founded in 1936. The original lab was located in Cicero, Illinois where it remained for over 30 years. In 1970 the lab was purchased by three professional engineers; Dr. Fred Gurnham, Robert Konvalinka and Earl Rosenberg.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>cordfinancial.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6086</link>
<guid>95e1533eb1b20a97777749fb94fdb944</guid>
<pubDate>Fri, 17 Feb 2023 15:02:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>cordfinancial.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9332203ef9f80ff8906453610cd5c3796331f37185dce7236d7faddc10489bc9</i><br /><br />Threat actor <b>description</b>: <i>Our Story – ATM ServicesNationwide Provider of Innovative Solutions: ATM Services & ProductsIn 2001, CORD Financial Services was founded by The FIKES Companies. With a small staff and hard work, CORD quickly gained success in central Texas. Throu...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>newbridge.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6083</link>
<guid>add5efc3f8de35d6208dc6fc154b59d3</guid>
<pubDate>Fri, 17 Feb 2023 10:58:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>newbridge.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed657505caed9ffdd13a9fe40e7306853828bc517583f2d305b37210ba76bab5</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1963, NewBridge Services is a non-profit organization that provides mental healthcare services to individuals of all ages.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cansew</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6084</link>
<guid>0d770c496aa3da6d2c3f2bd19e7b9d6b</guid>
<pubDate>Fri, 17 Feb 2023 10:56:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Cansew</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5692870aaed784b13bae990459fcfe5214808cfb8b6bd9c7ba7c1a35d4f4e775</i><br /><br />Threat actor <b>description</b>: <i>Cansew has been part of the fabric of life since 1924. When it comes time to place your orders, you will find that our more than 80 years of experience and our position as a leading supplier of threads and trim to the needletrade industry will serve your needs exce</i><br />Target victim <b>website</b>: <i>https://cansew.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wawasee-Community-School-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6085</link>
<guid>3413ce14d52b87557e87e2c1518c2cbe</guid>
<pubDate>Fri, 17 Feb 2023 10:54:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Wawasee-Community-School-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eda4205c3782be8bbab9b16e5a93ed8a708b6d8265c3547da466058d691ee7c0</i><br /><br />Threat actor <b>description</b>: <i>The Wawasee Community School Corporation works to create an academic, social, and physical environment that facilitates growth in each student. They are headquartered in Syracuse, Indiana</i><br />Target victim <b>website</b>: <i>https://www.wawasee.k12.in.us</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>AP-Emissions-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6082</link>
<guid>a6e38981ecdd65fe9dcdfcd8d1f58f05</guid>
<pubDate>Fri, 17 Feb 2023 07:23:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>AP-Emissions-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2769bce1ff60e4ab1b47c118cea2ba2fecc3003d18d2d7d62d0f31543a831fe7</i><br /><br />Threat actor <b>description</b>: <i>Automotive Parts · North Carolina, United States AP® Emissions Technologies is one of the leading manufacturers and suppliers of automotive, light truck, and heavy-duty exhaust and emissions products under the AP®, DuraFit®, Eastern Catalytic®, CATCO ®, ANSA®, Cherry Bomb®, DieselTech™, DuraFit™, Maremont®, XLERA and much more.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>myerspower.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6080</link>
<guid>940392f5f32a7ade1cc201767cf83e31</guid>
<pubDate>Thu, 16 Feb 2023 23:23:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>myerspower.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12a3aa9d45a5566ca9a233874f5274e2002049854016210276e85527987fd41f</i><br /><br />Threat actor <b>description</b>: <i>myerspower.comlabriegroup.commielectric.comaeti.comthese four companies were in the same domain! all their networks were encryptedroot:gear$N0stra*aeti\admin:_NYt7~St]ye'root:$a53ty!myersamerica\tadmin:$a53ty!myerspower:Xiw6zvbp37gx...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>ziapueblo.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6079</link>
<guid>b1b20d09041289e6c3fbb81850c5da54</guid>
<pubDate>Thu, 16 Feb 2023 21:43:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>ziapueblo.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e10ce0aba4de2019f4ddbefbc993c0100e25395423b805431e4d9f128aaf121</i><br /><br />Threat actor <b>description</b>: <i>The Pueblo of Zia has operated a contemporary court since 2007. It is a court of general jurisdiction and oversees criminal and civil hearings. Currently the Court staff consists of a Chief Judge (part-time), a court clerk and a part time probation o...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Evans-Consoles</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6075</link>
<guid>4a3fd911279cd8bc597fa13222ef83be</guid>
<pubDate>Thu, 16 Feb 2023 13:56:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Evans-Consoles</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>13ea8470fa41f5357b33b2607bc620dbb8f3eb3bf3b33014a06f7cac275943ba</i><br /><br />Threat actor <b>description</b>: <i>For over four decades, Evans has been the global leader in providing innovative solutions for mission-critical operations. We serve a diverse client base, including public safety, aviation, process control, utilities, and technology, as well as numerous government agencies. With the industry’s largest portfolio of projects worldwide, serving 15 industries, it’s our proven methodology, strict quality standards, and experience that make the difference for our customers. Looking for current openings? Jump on over to our careers page.Our executive team is the most experienced in the industry and provides the thought leadership that positions Evans as the Global Leader in mission-critical operations, console design and manufacturing.</i><br />Target victim <b>website</b>: <i>http://www.evansonline.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>coreautomation.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6076</link>
<guid>beb22abb9ec56c0cf7ec7d811dd91a56</guid>
<pubDate>Thu, 16 Feb 2023 13:44:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>coreautomation.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>757b792decab4467aff8a780c5bac8322601d7ea6f57f9f91899e463c245fa6b</i><br /><br />Threat actor <b>description</b>: <i>500 mb private info</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Foamtec-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6068</link>
<guid>b5ecbbf5782cc7fe9e453f3a2f26f24b</guid>
<pubDate>Wed, 15 Feb 2023 21:23:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Foamtec-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8cfaa3dac714a276cf982c2858166b6b545931369521511cc9cd234df422fd9</i><br /><br />Threat actor <b>description</b>: <i>The best of East and West - that is the strength of Foamtec International. Combining Western cutting edge technology with Eastern traditions of dedicated customer service, Foamex Asia was established in 1997 as a joint venture between Foamex International Inc.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>semsinc.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6066</link>
<guid>2be5f9c2e3620eb73c2972d7552b6cb5</guid>
<pubDate>Wed, 15 Feb 2023 13:58:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>semsinc.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7c6116b9eb4090c999aa5e4505d17733ba94c875eb62e544d2dd051381934c4</i><br /><br />Threat actor <b>description</b>: <i>SEMS is a regional environmental management firm with a national reach. Our decades of experience have positioned us to help you navigate complex projects in highly regulated industries. Our team has the training, experience, and expertise to deliver...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>vipar.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6067</link>
<guid>024d2d699e6c1a82c9ba986386f4d824</guid>
<pubDate>Wed, 15 Feb 2023 13:46:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>vipar.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f965d4bbd079ade77222194188c0e7bc3c407b906a0e9d5b96601c5abe30da07</i><br /><br />Threat actor <b>description</b>: <i>VIPAR Heavy Duty is North America’s leading network of independent aftermarket truck parts distributors. VIPAR Heavy Duty distributors serve the needs of their customers from over 560 locations across the United States, Canada, Puerto Rico, and Mexic...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>richardsind.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6063</link>
<guid>ae2a2db40a12ec0131d48acc1218d2ef</guid>
<pubDate>Wed, 15 Feb 2023 11:39:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>richardsind.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4bf63ede2d860fd32650a1fb7475201c19954c33e3f6d4ab7cab283275ca4a60</i><br /><br />Threat actor <b>description</b>: <i>Richards Industrials is an industrial valve manufacturer located in Cincinnati, Ohio</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alexandercity</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6055</link>
<guid>5cd7edbe7a1a668fdc63c138002cc43a</guid>
<pubDate>Tue, 14 Feb 2023 19:33:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Alexandercity</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>643f7ad121bd733b6fb0d85345f5f836716c157f12412500d7ef91bffcd5a34f</i><br /><br />Threat actor <b>description</b>: <i>Your travel and local community guide to Alex City, Alabama. Explore the Alexander City AL directory for hotels, restaurants, shopping, real estate, churches, government, schools, attractions and recreation.City department data.Data of contractors and subcontractors</i><br />Target victim <b>website</b>: <i>http://www.alexandercityal.gov</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Delallo</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6056</link>
<guid>ee1abc6b5f7c6acb34ad076b05d40815</guid>
<pubDate>Tue, 14 Feb 2023 19:32:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Delallo</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f13ecd5a265e19e0fbb0450b13f67660264e78223d15d8cc9a9d067bf7e3fc7a</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1950, Delallo is a Company that offers Italian food products such as pasta and grains, sauces, tomatoes, olives, oils, vinegar, cured meats, and pickled vegetables.Headquarters: 1 Delallo Way, Mount Pleasant, Pennsylvania, 15666, United States</i><br />Target victim <b>website</b>: <i>https://www.delallo.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>cefcostores.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6054</link>
<guid>417fbbf2e9d5a28a855a11894b2e795a</guid>
<pubDate>Tue, 14 Feb 2023 13:41:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>cefcostores.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a509ed9ca8f0eb565919ea0ce7ae15836b97fb695429d2cd0050ee3e187b33e2</i><br /><br />Threat actor <b>description</b>: <i>WE ARE COMMITTED TO PROVIDING THE BEST CUSTOMER EXPERIENCE.At CEFCO Convenience Stores, we are committed to provide the best customer experience to every customer, every day, at every CEFCO Convenience Stores location. Whether you’re making a quick...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mitchell-Lewis-Staver</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6339</link>
<guid>9b1c93a6864c39e48417ee486b83c387</guid>
<pubDate>Tue, 14 Feb 2023 09:20:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>Mitchell-Lewis-Staver</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>91620028d6c82818003c686774125c4342e5ee9a36e20bee7fbf2dfbeaa981a4</i><br /><br />Threat actor <b>description</b>: <i>Mitchell Lewis & Staver Is A Proud Distributor Of Over 75 Brands.
9939 SW Commerce Circle Wilsonville, OR 97070 
833-MLS-PUMP
productinfo@mitchellewis.com</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eureka-Casino-Resort</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6048</link>
<guid>6646b06b90bd13dabc11ddba01270d23</guid>
<pubDate>Mon, 13 Feb 2023 19:31:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Eureka-Casino-Resort</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4a5fdcb59bb0017173ec833aaf01fbfaa5c50e53789e60f7dba7f259b818c75</i><br /><br />Threat actor <b>description</b>: <i>Eureka Casinos was founded by the Lee family in Las Vegas, NV. It operates a wide-ranging number of businesses, including Eureka Casino Resort in Mesquite, NV. The Lee Family sold it to the employees in 2015 making it Nevada's first 100% employee owned casino</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>PFA-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6040</link>
<guid>4c9d1fbce4890fc2731b6a61262313b1</guid>
<pubDate>Mon, 13 Feb 2023 15:05:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>PFA-Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>efebe097e9b82b7f56441b379a210aefa352dbe8ba0cbda7441dd56abceebd87</i><br /><br />Threat actor <b>description</b>: <i>PFA SYSTEMS, Inc. was started over thirty years ago with a single vision in mind, to provide reliable and safety conscientious service to our Suppliers and Drivers.This vision continues to carry on from day one when we were a single operator company, to our current fleet. We currently serve 14 states regionally and continuously work to establish trust between our clients and drivers.We specialize in Hazardous Bulk Liquid transport, but we are not limited to a single product. We integrate cutting edge safety practice and equipment to deliver the peace of mind our customers have come to rely upon and expect.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>EnCom</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6041</link>
<guid>58ee2794cc87707943624dc8db2ff5a0</guid>
<pubDate>Mon, 13 Feb 2023 15:05:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>EnCom</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>70e55dd5e4e7eb691c1c2dc549a14ccf9a3297941c8f577f1f3e83335a58ca2e</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2001, EnCom Inc is a specialty producer of custom compounded high-performance polymers serving the automotive, transportation, electronic, consumer goods, lawn and garden equipment, medical, material handling, and industrial industries.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grace-Church-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6044</link>
<guid>6b39183e7053a0106e4376f4e9c5c74d</guid>
<pubDate>Mon, 13 Feb 2023 15:05:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Grace-Church-International</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>104b9402573d77f03466b4ffda430dbe7b2187537e29fee250b283a5d61ceba1</i><br /><br />Threat actor <b>description</b>: <i>We Believe the Bible is God's supreme authority of the church and that prayer builds a relationship with God. We believe that faith empowers one to believe the impossible. That family is the foundation of the church and each person has a uniquely designed purpose</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Integerity-Tax</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6045</link>
<guid>f449d27f42a9b2a25b247ac15989090f</guid>
<pubDate>Mon, 13 Feb 2023 15:05:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Integerity-Tax</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>431c159c49332088bc3710c4b858225b2d0d32f14c2e9418580259bc1bc940ee</i><br /><br />Threat actor <b>description</b>: <i>Small business accounting, tax preparation, bookkeeping, payroll, individual taxes</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>dana-group.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6031</link>
<guid>b56ea7b6aa77f6f9008bc9362fab3597</guid>
<pubDate>Mon, 13 Feb 2023 13:53:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>dana-group.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4cb8c63f1a15ad6e7d5550e6778f5b567fadb6d27ad2da2a23fb9ce640c82cf7</i><br /><br />Threat actor <b>description</b>: <i>We’re a multi-disciplinary behavioral health organization committed to helping our patients grow personally, socially, and professionally. We’ve been helping people from all walks of life for over 30 years.Our committed team of providers includes...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>vanderkaay.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6027</link>
<guid>30f48cd3c7e73511070b95ee0a884c23</guid>
<pubDate>Mon, 13 Feb 2023 11:31:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>vanderkaay.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79a1b7049e8fcb6dbac0c53f9ab2f0e029969e8f200a9ce4bad1227e2456c67f</i><br /><br />Threat actor <b>description</b>: <i>We’re Passionate About Connecting Investors and Business OwnersVander Kaay is a middle-market M&A intermediary specializing in buy-side deal origination for premier private equity, strategic and family office investors. We source, qualify and intro...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>hidalgocounty.us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6028</link>
<guid>2c60e40b399dc55d8b755ec6b5d09f8a</guid>
<pubDate>Mon, 13 Feb 2023 11:31:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hidalgocounty.us</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>762383eb0350a997d9a9424a30b861892c9b81aeb887e1d21c8b6c9b54bb25a6</i><br /><br />Threat actor <b>description</b>: <i>The Hidalgo County Community Supervision and Corrections Department is a public agency dedicated to the protection of the community and committed to the belief that facilitating positive change in probationers results in responsible and productive be...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>tucsoneyecare.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6029</link>
<guid>7f3ad9c65beb20ccbd34a05041b4420b</guid>
<pubDate>Mon, 13 Feb 2023 11:31:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>tucsoneyecare.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b0cfd5d5729683a99d2ae1a3134eabef7579d6d61ffda336b774ed7f832b34ae</i><br /><br />Threat actor <b>description</b>: <i>Tucson Eye Care is committed to integrating the latest technology into our practice to provide compassionate, state-of-the-art eye care to our patients.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>mdstrucking.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6025</link>
<guid>5eed6c6e569d984796ebca9c1169451e</guid>
<pubDate>Mon, 13 Feb 2023 09:48:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>mdstrucking.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0bcb8f13d810adee1df4d4a0cf9b81f6dd85cfc9464c4fd638e5c788b7bcbf91</i><br /><br />Threat actor <b>description</b>: <i>MDS Logistics is a full-service, third-party Logistics Provider specializing in all phases of transportation management for our customers. MDS Logistics' primary focus is to reduce the customer's total transportation expense, resulting in improvement...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>greekpeak.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6024</link>
<guid>3bd8fdb090f1f5eb66a00c84dbc5ad51</guid>
<pubDate>Mon, 13 Feb 2023 07:26:40 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>greekpeak.net</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24fb14c36cf416eaf7d34658593dfa0d18f5e43cedf64bdc13bd22dd773a74d5</i><br /><br />Threat actor <b>description</b>: <i>WELCOME TO GREEK PEAK Greek Peak Mountain Resort, central New York's largest ski resort was founded in 1958 and has remained at the leading edge of the ski industry with fifty-six trails, six chair lifts, two surface lifts, beginners' slope, and terr...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>olsenlawgroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6019</link>
<guid>5218f316b3f85b751c613a06aa18010d</guid>
<pubDate>Sun, 12 Feb 2023 23:11:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>olsenlawgroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26b7b41ff2c8c3b38a540d471a6586c93ff9cdcee64056a22afe8afa79121103</i><br /><br />Threat actor <b>description</b>: <i>At Olsen Law Group, we believe that life’s too short to be weighed down by legal issues. We’re here to help.They don't keep your documents safe at all</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Inland-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6012</link>
<guid>4c4c937b67cc8d785cea1e42ccea185c</guid>
<pubDate>Sun, 12 Feb 2023 19:20:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Inland-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>faa1d7feba3f6185383d8498fe70288aa70cfc38251e5a83306241411f68c022</i><br /><br />Threat actor <b>description</b>: <i>The Inland Group of Companies is a multi-national collective of premier aviation services providers. Each company is highly specialized in their field of expertise with proven track records of providing safe, efficient, and cost-effective aviation services.Integrated Deicing Services (IDS)Aircraft Deicing and Anti-icing Services.Inland Technologies International/Canada (Inland)Aviation Environmental Services.Quantem Aviation Services (QAS)Ground Handling and Terminal Services.</i><br />Target victim <b>website</b>: <i>https://inlandgroup.aero/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>mrkpc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6005</link>
<guid>50c1f44e426560f3f2cdcb3e19e39903</guid>
<pubDate>Sun, 12 Feb 2023 16:39:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>mrkpc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1aa02bebd65400de090166fdc7bed6d6bb504aad706c1e0f2db5e8f0db9e7abf</i><br /><br />Threat actor <b>description</b>: <i>Mullin, P.C. is a Dallas-based full-service commercial law firm representing clients in Texas, the U.S., and internationally. Our firm brings together an exceptionally talented group of attorneys with focused experience and knowledge in franchising,...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>covermeinsurance.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6006</link>
<guid>91ba4a4478a66bee9812b0804b6f9d1b</guid>
<pubDate>Sun, 12 Feb 2023 16:29:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>covermeinsurance.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8cf8d42987ef9027fd1e21740de625c87b3adf4f34cf9b3f0d1932d445ca4fc8</i><br /><br />Threat actor <b>description</b>: <i>Michael J Poller founded Cover Me Insurance Agency in 1999 and primarily operates in the commercial auto Insurance industry within the Insurance Agents, Brokers and Service sector. Michael has over 45 year experience in the commercial insurance indus...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Danielski-Farms-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6008</link>
<guid>569ff987c643b4bedf504efda8f786c2</guid>
<pubDate>Sun, 12 Feb 2023 13:17:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Danielski-Farms-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa8eac67e69cf89faed1b0d11111c7c77cdfe685f01c0fff6812a9d6cd3b289a</i><br /><br />Threat actor <b>description</b>: <i>Danielski Farms Inc. strives to perform the highest quality and efficient harvest of our customers’ crops. Being farmers ourselves, we know the painstaking efforts required to see a crop through from planting to harvest.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>maysecc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6009</link>
<guid>37d7902cb2d3de686e497e31624d82e0</guid>
<pubDate>Sun, 12 Feb 2023 11:56:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>maysecc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4dfdc6c62324d72dd7fc3d64421d3233cfc2694be393074ba77e352031857c74</i><br /><br />Threat actor <b>description</b>: <i>Mayse Construction is a Construction company located in 8011 Hixson Pike, Hixson, Tennessee, United States. Since 1985 the company has been providing Sewer Line Construction.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aviacode-GeBBS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6010</link>
<guid>c4c455df3c54f292ae22f6791fd2553e</guid>
<pubDate>Sun, 12 Feb 2023 02:46:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>0mega</b> claims attack for <b>Aviacode-GeBBS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7720dc8b61fc6ecf043becfd74236b4c0ed21192f547bcdb989ad94fd73a5593</i><br /><br />Threat actor <b>description</b>: <i>Medical coding, outsourced coding, auditing & consulting</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>0mega</category>
</item>
<item xmlns:dc='ns:1'>
<title>BG-Foods-CA-US</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6011</link>
<guid>e3b80d30a727c738f3cff0941f6bc55a</guid>
<pubDate>Sat, 11 Feb 2023 23:14:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>daixin</b> claims attack for <b>BG-Foods-CA-US</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a729422c22930656c9dfb4442e0b81c56a02219ed5a537cf99dba91c603e4f6</i><br /><br />Threat actor <b>description</b>: <i>B&G Foods, Inc. manufactures, sells, and distributes a portfolio of shelf-stable and frozen foods, and household products in the United States, Canada, and Puerto Rico.</i><br />Target victim <b>website</b>: <i>https://bgfoods.com/</i>]]></description>
<category>daixin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advance2000</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5989</link>
<guid>1ae6464c6b5d51b363d7d96f97132c75</guid>
<pubDate>Sat, 11 Feb 2023 18:20:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Advance2000</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>32153359fcb0f30ef5d5e09eeddd3c8f932b69f69a7c8f6cce585eb78b21c46e</i><br /><br />Threat actor <b>description</b>: <i>Full-service managed IT service provider specializing in Private Cloud Computing.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Thompson-Safety</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5991</link>
<guid>c0356641f421b381e475776b602a5da8</guid>
<pubDate>Sat, 11 Feb 2023 18:20:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Thompson-Safety</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>92e908ad480c2fa5b1565b3919cdd640e02f51de5ec6949a97d03c9a64684fbc</i><br /><br />Threat actor <b>description</b>: <i>Thompson Safety is a company that operates in the Information Technology and Services industry. The company is headquartered in Houston, Texas.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Buckeye-Packaging</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5994</link>
<guid>edb446b67d69adbfe9a21068982000c2</guid>
<pubDate>Sat, 11 Feb 2023 15:54:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>Buckeye-Packaging</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12d08363c3d798546c31da0774b47f2cd80deabb63f3d5dd7ab084df24128293</i><br /><br />Threat actor <b>description</b>: <i>Buckeye Packaging offers high-quality custom packaging solutions in a variety of substrates, delivered with outstanding customer service and terrible network security. 50 GB customer data will be released</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wesco-Turf</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5995</link>
<guid>fcd4c889d516a54d5371f00e3fdd70dc</guid>
<pubDate>Sat, 11 Feb 2023 15:54:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>Wesco-Turf</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>14ac7a6c9fbb6ba506305ba54084007593c2e14f3c58f86b05093514f3fb0bd9</i><br /><br />Threat actor <b>description</b>: <i>Finance, HR, Corporate files present in data leak          We are an exclusive provider for Toro, Club Car, Bernhard, Salsco, Harper, Ventrac, and MCI-Flowtronex and Watertronics Pump Stations in Florida and Southern Georgia. Since 1987 Wesco Turf has been the golf, grounds, and irrigation market leader. We are a worldwide provider of the highest quality used golf course equipment. Wesco has been honored multiple times as Toro’s North American Distributor of Excellence.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>CannonDesign</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5996</link>
<guid>8d3215ae97598264ad6529613774a038</guid>
<pubDate>Sat, 11 Feb 2023 15:54:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>CannonDesign</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b2d28c516bbf628a7e525bb2939d62744db887fb4f30aea3b749a6d9fcc9ec0</i><br /><br />Threat actor <b>description</b>: <i>Employees: 1,100 | Revenue: $279.8M | Site: www.cannondesign.com     Exfiltrated: 5.7 TB     Wasting our time will result in your data being leaked. Over 5 TB corporate and client files will be released          CEO:           "Entity": "US",           "SSN - US": "367725265",           "Last Name": "Lukanic",           "First Name": "Bradley",           "Nickname": "Brad",           "Street Address": "6619 Braeburn Pkwy",           "City": "Bethesda",           "State/Prov": "MD",           "Zip Code": "20817",           "Birth Date": "02/15/1971",          CFO:           "Entity": "US",           "SSN - US": "078564382",           "Last Name": "Carlino",           "First Name": "David",           "Nickname": "Dave",           "Street Address": "5411 Via Del Sole",           "City": "Williamsville",           "State/Prov": "NY",           "Zip Code": "14221",           "Birth Date": "07/29/1961",          VP:           "Entity": "US",           "SSN - US": "121683252",           "Last Name": "Schopp",           "First Name": "Carolyn",           "Nickname": "Carolyn",           "Street Address": "3621 W River Road",           "City": "Grand Island",           "State/Prov": "NY",           "Zip Code": "14072",           "Birth Date": "10/09/1975",</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Memtech-Acoustical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6021</link>
<guid>b075703bbe07a50ddcccfaac424bb6d9</guid>
<pubDate>Sat, 11 Feb 2023 15:54:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>Memtech-Acoustical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e57b8de63c4a8fff7b6494365c60ab28f7e74018fbe975f31e75a8856df2cac9</i><br /><br />Threat actor <b>description</b>: <i>Memtech Acoustical is your 'one-stop' source for acoustic services, noise control and acoustic material installation. There is no need to coordinate consultants, order materials and arrange for installation. Memtech does it all. Memtech Acoustical Industrial, Commercial, and Acoustic Noise Control Solutions</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ultralife-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5998</link>
<guid>b98a3773ecf715751d3cf0fb6dcba424</guid>
<pubDate>Sat, 11 Feb 2023 15:54:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>Ultralife-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1ffc6215f3b5ce01dbb561711ff4934cf9781bb197405ad6241dc251b9e746bb</i><br /><br />Threat actor <b>description</b>: <i>Publicly traded stock as ULBI. Client information, design, manufacture, financial, accounting, HR and more.     Address: 2000 Technology Pkwy, Newark, NY 14513, United States     Phone: +1 315 332 7100</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hamilton-Parker</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5999</link>
<guid>cca289d2a4acd14c1cd9a84ffb41dd29</guid>
<pubDate>Sat, 11 Feb 2023 15:53:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>Hamilton-Parker</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3215b010d2805a204cbd3a350a17b19dd186dbe530bfe7ef16a89af03d4ba8b</i><br /><br />Threat actor <b>description</b>: <i>1865 LEONARD AVENUE     COLUMBUS, OH 43219     614-358-7800</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tucson-Unified-School-District</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5987</link>
<guid>7f9d88fe83d3e7fce3136e510b0a9a38</guid>
<pubDate>Fri, 10 Feb 2023 13:36:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Tucson-Unified-School-District</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d2e5adbc559c5cb8d398c7def7c0c4c947a00a571fe7bce8106b40a2784f80bf</i><br /><br />Threat actor <b>description</b>: <i>Education · Arizona, United States · 6,208 EmployeesFounded in 1867, the Tucson Unified School District is headquartered in Tucson, Arizona.</i><br />Target victim <b>website</b>: <i>http://www.tusd1.org</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jeffries-Morris</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5988</link>
<guid>dfbfa7ddcfffeb581f50edcf9a0204bb</guid>
<pubDate>Thu, 09 Feb 2023 23:19:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Jeffries-Morris</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>376097eabe7276330c766f0024c7170442471cc2d7fb2898f1006945904deaac</i><br /><br />Threat actor <b>description</b>: <i>Jeffries Morris, Inc. provides acquisition, advisory and asset management services for real estate companies with investments in Metropolitan New York.</i><br />Target victim <b>website</b>: <i>https://www.thejeffriescompanies.com/jeffries-morris</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>arcessex.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5985</link>
<guid>fccc64972a9468a11f125cadb090e89e</guid>
<pubDate>Thu, 09 Feb 2023 11:02:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>arcessex.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b99c863f35a647d28a7463187e308a62a3c189f5cda22042ab558caf930d561</i><br /><br />Threat actor <b>description</b>: <i>The service provider of choice for individuals with IDD, their families and community, we welcome the opportunity to show you that when it comes to your provider you should expect more. Everyone deserves the best, and we deliver on that expectation e...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mount-Saint-Mary-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5982</link>
<guid>c23497bd62a8f8a0981fdc9cbd3c30d9</guid>
<pubDate>Thu, 09 Feb 2023 02:44:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>vicesociety</b> claims attack for <b>Mount-Saint-Mary-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>babd55fc0521c49be3aa2d83aa29bb354ff4408ea369b096d279b4e4d0ebf832</i><br /><br />Threat actor <b>description</b>: <i>Mount Saint Mary College is a private Catholic college in Newburgh, New York. It was founded in 1959 by the Dominican Sisters. The campus overlooks the Hudson River, halfway between New York City and Albany. More than 2,700 men and women are enrolled in over 50 undergraduate programs and three graduate degree programs.</i><br />Target victim <b>website</b>: <i>http://www.msmc.edu/</i>]]></description>
<category>vicesociety</category>
</item>
<item xmlns:dc='ns:1'>
<title>JReynolds</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5981</link>
<guid>abb9d15b3293a96a3ea116867b2b16d5</guid>
<pubDate>Wed, 08 Feb 2023 23:18:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>JReynolds</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e25b0629717d7b9dbfb5b2792bf3615e5fd9ddcbf8485e799fa40ca5733c6e67</i><br /><br />Threat actor <b>description</b>: <i>J Reynolds & Co., Inc. headquarters is located in Saginaw, Texas. In its early years, the company provided high quality roofing services to local commercial properties. With experience and company growth, J Reynolds & Co., Inc., now specializes in commercial roofing and waterproofing—on a national level. We can provide high quality installations, repairs, and inspections on any building throughout the United States. At J Reynolds & Co., Inc., we offer these traditional commercial roofing solutions. But, we also offer sustainable solutions including solar panels and green roofs. We have installed green roofs in cities across the United States and can help you in the process of transitioning to a green roof.  With more than 100 years of combined experience, our staff is prepared for any climate, any repair, and any project you may have. Excellence is our standard—we finish our projects in a timely manner, remain within budget, and are committed to safety.  Having worked in this industry for many years, J Reynolds & Co., Inc., understands the need for advances in technology. Building envelope practices, materials, and applications have transformed over the last several decades. We pride ourselves on our continual training to provide you with the latest innovations in the roofing and waterproofing industry.</i><br />Target victim <b>website</b>: <i>https://jreynolds.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kerber-Eck--Braeckel-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5977</link>
<guid>7eb532aef980c36170c0b4426f082b87</guid>
<pubDate>Wed, 08 Feb 2023 23:00:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Kerber-Eck--Braeckel-LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e9f5c69893368a5422a9bf5e43f9303de851293ff2a7c2d4448add46d2f90277</i><br /><br />Threat actor <b>description</b>: <i>ALL DATA IS AVAILABLE FOR DOWNLOADING!!!</i><br />Target victim <b>website</b>: <i>https://kebcpa.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trendsetter-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5976</link>
<guid>e10534dd65cf727692c0f9c44ba613f8</guid>
<pubDate>Wed, 08 Feb 2023 17:09:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Trendsetter-Engineering</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5fd20aa246394e203bb977d48f0a81d1583a78fc90ed74d8dfc9d69825be56c</i><br /><br />Threat actor <b>description</b>: <i>Trendsetter is a premier provider of specialized subsea solutions for oil and gas companies across the globe. We have stolen from their network 1TB in total, including: 1) personal data, HR, Finance, Projects etc.;2) CEO's and Top Management Mailboxes - 340 GB3) SQL Databases - 150 GBEmployee/client/dealers DB (Name, address, phone number, mail address etc.)Feel free to check!Archive password: Aknn234)@$9skod_09@#$FS@2D</i><br />Target victim <b>website</b>: <i>http://www.trendsetterengineering.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Penn-Power-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5975</link>
<guid>32cfdce9631d8c7906e8e9d6e68b514b</guid>
<pubDate>Tue, 07 Feb 2023 23:12:48 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Penn-Power-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d6ee1ca3f0e210484643743d295ba8cc0a80fca03fab4f1682bdf20199117fb3</i><br /><br />Threat actor <b>description</b>: <i>Our ServicesLeveraging our OEM expertise and 50+ years of experience, we provide comprehensive fleet services at our 13 service centers and 100 mobile vehicles that come to you.  From traditional shop services and maintenance management to mobile fleet services and emergency roadside assistance, we handle it all.</i><br />Target victim <b>website</b>: <i>https://pennpowergroup.com/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>prlabs.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5972</link>
<guid>d8a3a3c3234392b0add43c5f9c05a246</guid>
<pubDate>Tue, 07 Feb 2023 05:38:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>prlabs.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ae3530f8874beb0135191951ef9e971f5cb2ed9fe8502872ba41f7423c50eb4</i><br /><br />Threat actor <b>description</b>: <i>For many years, Premier Research Labs has had a sterling reputation as the world's leader in cellular resonant nutrition technology. We have strived to become the industry leader in excipient-free, preservative-free, premier quality nutritional produ...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>AmerisourceBergenCensora---MWI-Animal-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5962</link>
<guid>baeabb8ff01160eec0b5db7da2805f57</guid>
<pubDate>Mon, 06 Feb 2023 17:38:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lorenz</b> claims attack for <b>AmerisourceBergenCensora---MWI-Animal-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fafcd01998380b1ba85434ffeb3334ff6575f50111b47a73dee31aa435f1a997</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lorenz</category>
</item>
<item xmlns:dc='ns:1'>
<title>teleapps.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5963</link>
<guid>680390c55bbd9ce416d1d69a9ab4760d</guid>
<pubDate>Mon, 06 Feb 2023 17:27:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>teleapps.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c021ed6083b634b6ea2b4a78e5c66ec7e73ffd360ba5159dc4d370fba70205e5</i><br /><br />Threat actor <b>description</b>: <i>TeleApps is a leading service and solutions provider that helps define and deliver a consistently wow experience along the entire width of the customer experience journey. Its products and services aim to resolve issues, monitor performance with oper...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Woodmeister-Master-Builders-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5964</link>
<guid>c67ba7c4c5c0cd4cc3e3a7146fe5c015</guid>
<pubDate>Mon, 06 Feb 2023 17:26:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Woodmeister-Master-Builders-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f750d4ce3aeae29d301246e8bbb61822d79f6a211bffea55d0dbc5841075e9fe</i><br /><br />Threat actor <b>description</b>: <i>Woodmeister provides residential construction, custom cabinetry and interiors, lifestyle management, green building, and design.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>INNOVATION-COLLABORATION-SYNERGY</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5959</link>
<guid>010e406df2463597c58286a93f8b3160</guid>
<pubDate>Mon, 06 Feb 2023 15:29:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>INNOVATION-COLLABORATION-SYNERGY</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8a12487fac2e03933a9e733029761277fa650b63d89d8a7d8fa8071c45b45a6b</i><br /><br />Threat actor <b>description</b>: <i>ICS Nett delivers innovative solutions to critical challenges facing the nation and the world. As a premier provider of integrated services and solutions for the U. S. Government, it supports the Department of Defense, Cyber & Intelligence community.Pass archive: UwxKnTbZ5LsrPSxqSPKNsTjVKWWU9jRzgTS</i><br />Target victim <b>website</b>: <i>https://www.ics-nett.com/</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>wcinet.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5956</link>
<guid>0a4bbceda17a6253386bc9eb45240e25</guid>
<pubDate>Mon, 06 Feb 2023 14:04:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>wcinet.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cdd53f1f6df72349cc4016e80dbe523a6dbed04d5524aef5eadf79f7b81733e6</i><br /><br />Threat actor <b>description</b>: <i>Employees who own Woodward Communications, Inc. are honored to provide news, entertainment, shopping, marketing communications and business media to the wonderful people who live and work in the communities we serve. We are also committed to providin...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>crispinvalve.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5957</link>
<guid>d5eca8dc3820cad9fe56a3bafda65ca1</guid>
<pubDate>Mon, 06 Feb 2023 13:59:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>crispinvalve.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1b81f53d8b078c9669211aa1d3fd5dce260186727865297890004baafac3af6</i><br /><br />Threat actor <b>description</b>: <i>Crispin Valve began in 1905 with an Air Valve designed by company founder, Clarence Crispin. Moving back to Berwick, Pennsylvania and out ofEngineering School at Cornell University, Clarence wanted increase output at the family-owned Berwick Water...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>etbrick.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5958</link>
<guid>8fdd149fcaa7058caccc9c4ad5b0d89a</guid>
<pubDate>Mon, 06 Feb 2023 13:44:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>etbrick.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eec2c594a88e3c9ad2b4a694fd7f6e7b84124dd6b81f0adfc2a6628dba321c7a</i><br /><br />Threat actor <b>description</b>: <i>We are a family-owned business based in Tyler, Texas. Since 1987 we have supplied quality products to East Texas and parts of the contiguous states. Primarily a brick distributorship representing in excess of twenty, quality brick manufacturers, we h...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>nicklaus.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5954</link>
<guid>2f0928c25ff3f884e8d2fa38835bd328</guid>
<pubDate>Mon, 06 Feb 2023 13:27:11 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>nicklaus.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81e715a2481700b200b6bb0d0c21c87a5c9291513df782fd184a6ffa788c3ac4</i><br /><br />Threat actor <b>description</b>: <i>Partner Spotlight: Nicklaus Companies extends landmark agreement with Japan's Kosugi, Inc. To reach 50 years. The Nicklaus Companies and its largest worldwide licensee, Kosugi Inc., today announced a historic long-term contract extension to manufactu...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Five-Guys-Enterprises-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5948</link>
<guid>cd0b43eac0392accf3624b7372dec36e</guid>
<pubDate>Sat, 04 Feb 2023 23:00:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Five-Guys-Enterprises-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ebd2d0e68bcc85e1d4d7103e14517606c10f0698f89686920a1d75aee85ae7e1</i><br /><br />Threat actor <b>description</b>: <i>Five Guys Enterprises, LLC is a food-chain</i><br />Target victim <b>website</b>: <i>https://fiveguys.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>redfordpd.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5940</link>
<guid>c17028c9b6e0c5deaad29665d582284a</guid>
<pubDate>Fri, 03 Feb 2023 23:09:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>redfordpd.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cf0a481b084a32d350ff28b4f415b0fcbe0775a55be70169f87e2dd2922719e0</i><br /><br />Threat actor <b>description</b>: <i>We hacked into a network where there were two companies:redfordpd.com and cityofallenpark.orgThey stole 165gb of data from these companies.Among them: finances, scans of documents, victims' data, photos of crime scenes, department reports, pass...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Point-Dedicated-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5939</link>
<guid>8a88d5f412f2ad376f8597d28cbd3720</guid>
<pubDate>Fri, 03 Feb 2023 19:18:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Point-Dedicated-Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24eada458073a37c844a7c8827e8d610c6f2d45bd379754cd87a6a8120b939d4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>jjdentistry.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5938</link>
<guid>62e0973455fd26eb03e91d5741a4a3bb</guid>
<pubDate>Fri, 03 Feb 2023 13:31:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>jjdentistry.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36f1ccf35b78075357d3de1912b217d52f3a403f388569360c685eebb459dbdd</i><br /><br />Threat actor <b>description</b>: <i>We are a dental practice devoted to restoring, preserving and enhancing the natural beauty of smiles using conservative, state-of-the-art procedures that will result in beautiful, long lasting smiles!</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>crystalcreamery.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5935</link>
<guid>234dd9e577ac5892481bc60663ffa405</guid>
<pubDate>Fri, 03 Feb 2023 04:03:44 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>crystalcreamery.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ae56aa3a5fd0bd37a21bd4f95dfdbab4ce27e0d0d9daf3c0c5d5a21e9bf850d</i><br /><br />Threat actor <b>description</b>: <i>Crystal Creamery (formerly known as Foster Farms Dairy) was founded in 1901 by Max and Verda Foster in Modesto, California, after they founded Foster Farms in 1939. The company claims to be "the largest private dairy farm in California."</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>guardiananalytics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5937</link>
<guid>15a50c8ba6a0002a2fa7e5d8c0a40bd9</guid>
<pubDate>Fri, 03 Feb 2023 03:46:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>guardiananalytics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>07a04dcbebcd1edef883cedc53358cd829777efc1fd2c19e3f72bb5cf2056928</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2005, Guardian Analytics is the pioneer and leading provider of behavioral analytics and machine learning solutions for preventing banking fraud and anti-money laundering. We are the first fraud prevention solution to use behavior-based an...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>bethrivkah.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5932</link>
<guid>3d191ef6e236bd1b9bdb9ff4743c47fe</guid>
<pubDate>Fri, 03 Feb 2023 03:40:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>bethrivkah.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4c4670bfa803f9a96e56a974b51b4efbf57273bf78f1ec40fd8ccdd3cedfebab</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1941 by the previous Lubavitcher Rebbe, Rabbi Yosef I. Schneerson, and led by Rebbe Menachem Mendel Schneerson, Bet Rivka was the world's first Hasidic school for girls. Today, Beth Rivkah has over 2,000 students enrolled in our preschool...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>fabricatedpipe.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5924</link>
<guid>d5fcc35c94879a4afad61cacca56192c</guid>
<pubDate>Thu, 02 Feb 2023 23:32:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>fabricatedpipe.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>76f63c0eec3bbaee8747f0bfe63eb65c5dde71b7974e6dbf7387ae85a2f9bef8</i><br /><br />Threat actor <b>description</b>: <i>Fabricated Pipe inc. is dedicated to providing superior value to our clients, stockholders, vendors, employees and community through the production and sale of quality pipe fabrication services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>kostika.co.il</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5925</link>
<guid>979a3f14bae523dc5101c52120c535e9</guid>
<pubDate>Thu, 02 Feb 2023 23:32:25 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>kostika.co.il</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7e36744afed5b76c61674090ce8a844d4138cb0b01625127bca92e5d29f10d7</i><br /><br />Threat actor <b>description</b>: <i>Stolen 250gbDecades of years in the industry, combined with unique abilities,Give the Kostica group the opportunity to translate the language of architectsFor practical construction solutions that fulfill any plan, at any height, in any shape...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>nlsmichigan.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5927</link>
<guid>c8afe805c097dab1f1e5bdd57f8d2931</guid>
<pubDate>Thu, 02 Feb 2023 23:31:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>nlsmichigan.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>10db1b77033654e4b405f55142a7ddbcecaa16e4cb57ff9de5b8f20bdcdd069d</i><br /><br />Threat actor <b>description</b>: <i>Neighborhood Legal Services Michigan (NLSM) offers one-of-a-kind services to promote health safety and self-sufficiency. We are a regional business and non-profit collaborative coordinating Southeastern Michigan community outreach and pro-bono partne...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>plasmasurgical.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5928</link>
<guid>8ae1da0fe37c98412768453f82490da2</guid>
<pubDate>Thu, 02 Feb 2023 23:31:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>plasmasurgical.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52d89d6dce2de37baab14c78824044da5dbd7d77484a9c5508af8b7c625b9637</i><br /><br />Threat actor <b>description</b>: <i>PlasmaJet – the first device to use entirely Pure-Plasma for surgery – is privately held by Plasma Surgical based in Atlanta (GA), USA.We are experts in plasma energy with pioneering research in medical plasma technology and a robust patent portfol...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>seelllc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5930</link>
<guid>3b199f42a9909061516b6ce6d334af6d</guid>
<pubDate>Thu, 02 Feb 2023 23:23:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>seelllc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19fc3390292f53d3acdb8f015b535455dbc12df19127e8b04de7b1b9cebe67cc</i><br /><br />Threat actor <b>description</b>: <i>Stolen 230gbSEEL, LLC is one of the largest minority-owned, disabled veteran-owned energy efficiency program management firms in the nation.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>biosonicsinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5931</link>
<guid>aa1b6b26d690368d6f74a35a7daa0916</guid>
<pubDate>Thu, 02 Feb 2023 23:13:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>biosonicsinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c19006f9f3307cbd7e7dee054fe9d66bc380643f386f75fa1969f146d09dc65a</i><br /><br />Threat actor <b>description</b>: <i>Stolne 228gbBioSonics has been developing and manufacturing ground-breaking aquatic ecosystem monitoring systems since 1978. Our aquatic monitoring systems provide critical data and insights needed for making informed, environmentally responsible...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>MESSER-CUTTING-SYSTEMS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5922</link>
<guid>d76d8deea9c19cc9aaf2237d2bf2f785</guid>
<pubDate>Thu, 02 Feb 2023 17:33:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>MESSER-CUTTING-SYSTEMS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81ab07ffedd1d1a150f46361c7dd4a70413853d1b2b87e717858d6c99eee32bc</i><br /><br />Threat actor <b>description</b>: <i>Messer Cutting Systems is a global supplier of cutting solutions for the metal-working industry. We have stolen from their network 600 GB in total, including:1) personal data, HR, Finance, Projects etc.;2) Mailboxes - 37 GBMary Svitak - AccountingDebbie Richter - Accounting Manager / ControllerLinda Sierszynski - HR ManagerJulie Wolf - AccountingMark Ringgenberg - Director Global Product PortfolioBeth Rouse - Accounting;3) SQL Databases - 10 GBEmployee/client/dealers DB (Name, address, phone number, mail address etc.)Feel free to check!Archive password: gEs1S!g#hH</i><br />Target victim <b>website</b>: <i>https://us.messer-cutting.com/</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>thermal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5913</link>
<guid>941c377c73c0efed759c993f1b859526</guid>
<pubDate>Wed, 01 Feb 2023 02:04:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>thermal.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>007bea6d2c73044892fc9c130cbe2787119bafb04ddbc3d95926b787900ab8d0</i><br /><br />Threat actor <b>description</b>: <i>Personal thermal imaging for every riding position Learn more What they're saying about the technology Implementing high-end thermal technology has never been this simple and affordable. Learn More Smallest and Lightest Shutterless Thermal Camera Ava...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>kvie.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5910</link>
<guid>79385312dbee4c9e7270b26e4b3e1459</guid>
<pubDate>Tue, 31 Jan 2023 09:07:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>kvie.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8d812b7d54201c850f3d133603e306da6030e7a0fca941dae7fbba0631ed690</i><br /><br />Threat actor <b>description</b>: <i>KVIE is a PBS member television station in Sacramento, California, United States. The station is owned by KVIE, Inc., a community-based non-profit organization. KVIE's studios are located on West El Camino Avenue in the Natomas district of Sacramento...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>parkavedoors.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5906</link>
<guid>6d96718a701f5bfba283bbdc71dfa5c4</guid>
<pubDate>Tue, 31 Jan 2023 03:04:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>parkavedoors.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>abcd64366514420a448da4ecaba0800e06d564e4cfe970c26fd64beb1e31192b</i><br /><br />Threat actor <b>description</b>: <i>PARK AVENUE DOOR AND HARDWARE, INC. (PADH) is a leading manufacturer in the Tri-State area of New York, New Jersey, Connecticut, and surronding places for the past 15 years with a large inventory of hollow metal doors & frames; architectural and pref...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>bulldoggroupinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5901</link>
<guid>f4661398cb1a3abd3ffe58600bf11322</guid>
<pubDate>Mon, 30 Jan 2023 07:19:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>bulldoggroupinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30170306b8c4ba23dd9dab83f140cc8b419196e7c95ca959603b9fdce8319c85</i><br /><br />Threat actor <b>description</b>: <i>The Bulldog Group is a group of independently operated companies with common ownership and common goals that are able to share extensive resources to successfully meet all of our customers' needs. Collectively, we are licensed to work in over 10 stat...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>juvaskin.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5894</link>
<guid>8973ba741e7bd6450d8023552f43728e</guid>
<pubDate>Mon, 30 Jan 2023 05:36:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>juvaskin.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6af146866d36b937c574ff3f7d3cfd88e648b0ff1dee86f2b9ef81a6e6c1c285</i><br /><br />Threat actor <b>description</b>: <i>Located in the heart of New York City and serving nearby locations like Queens, JUVA Skin & Laser Center stands apart from other dermatology and cosmetic surgery practices with the quality of our physicians, our advanced technology, and our warm, car...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>azliver.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5889</link>
<guid>a3bf6e4db673b6449c2f7d13ee6ec9c0</guid>
<pubDate>Sun, 29 Jan 2023 13:19:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>azliver.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>442e6eaf08252f9726bf405a39f8ba2be3705aad42b195009517be307e78f082</i><br /><br />Threat actor <b>description</b>: <i>Our MissionOur mission is to provide state-of-the-art, innovative, and compassionate care to patients affected by liver diseases.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Portnoff-Law-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5881</link>
<guid>6d378765f17a856b7ba8bf1541cafb69</guid>
<pubDate>Sat, 28 Jan 2023 17:25:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Portnoff-Law-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7fb30e28e2f71a375252f624316f0a2fde7438a387dc9eea09433ae7bb16f612</i><br /><br />Threat actor <b>description</b>: <i>Portnoff Law Associates, Ltd. is a law firm. Its practice includes collection of delinquent real estate taxes and municipal fees for Pennsylvania municipal governments, including municipalities, school districts and authorities. The firm was established in 1989 </i><br />Target victim <b>website</b>: <i>https://portnoffonline.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Westmont-Hospitality-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5879</link>
<guid>927e838a450e2fe6225edfc3d12e2463</guid>
<pubDate>Sat, 28 Jan 2023 01:44:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Westmont-Hospitality-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1a52b4e8b4a6208c171b2599d36a2c30fe96f89332fd630124c3df26fc4b619</i><br /><br />Threat actor <b>description</b>: <i>Westmont Hospitality Group was founded in 1975. This company provides aspects of hotel management, and other facility services.</i><br />Target victim <b>website</b>: <i>https://www.whg.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bristol-Community-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5833</link>
<guid>f5f3b8d720f34ebebceb7765e447268b</guid>
<pubDate>Fri, 27 Jan 2023 01:53:18 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>vicesociety</b> claims attack for <b>Bristol-Community-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b43631dd4e8472fcca0790dfc024f259794eb304af72198d0712c0c03e62cd1c</i><br /><br />Threat actor <b>description</b>: <i>Bristol Community College is a comprehensive, public community college offering more than 130 career and transfer programs of study that lead to an associate degree in science, arts, applied sciences, and certificates of accomplishment or achievement. </i><br />Target victim <b>website</b>: <i>http://www.bristolcc.edu/</i>]]></description>
<category>vicesociety</category>
</item>
<item xmlns:dc='ns:1'>
<title>CHARLES-P-VONDERHAAR-CPA-WAS-HACKED.-MORE-TNAH-50GB-SENSETIVE-DATA-LEAKED.CHARLES-P-VONDER</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5832</link>
<guid>677fa4059ee76333f9bb9a7920aef719</guid>
<pubDate>Thu, 26 Jan 2023 23:06:17 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>CHARLES-P-VONDERHAAR-CPA-WAS-HACKED.-MORE-TNAH-50GB-SENSETIVE-DATA-LEAKED.CHARLES-P-VONDER</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6e908e414ee569f30981b8ea3e64fad713ee1e19c708ebde221189fd4c20b783</i><br /><br />Threat actor <b>description</b>: <i>Who is Charles P Vonderhaar Cpa  Headquarters 10001 Alliance Rd Ste 2, Cincinnati, Ohio, 45242, United States Phone Number (513) 563-0598 Fax: (513) 563-1605 Email: chuck@cpvcpa.com</i><br />Target victim <b>website</b>: <i>www.cpvcpa.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>IOC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5829</link>
<guid>d9909824688daaad46d441eefd81eb38</guid>
<pubDate>Thu, 26 Jan 2023 17:12:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>IOC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d289cbc07d90cc20b2421ba4e62c7f7669b89783959fbeec6b481d7a74e28006</i><br /><br />Threat actor <b>description</b>: <i>IOC Company, LLC is a full service heavy civil contractor. Our primary market is the highway and road industryFounded in 2005, IOC Company, L.L.C. is a heavy civil contractor with a history of top performance in various markets. We are best known for transportation infrastructure projects. We have built our reputation on our core values: integrity, honesty, and dedication to providing superior quality to our clients. IOC Company, L.L.C. has successfully completed projects ranging from small site developments to multimillion dollar road infrastructure projects. IOC Company, L.L.C. develops and perfects each project's individual critical path in order to carefully manage every aspect of the project and avoid potential conflicts. Using the latest technology in the industry has led IOC Company, L.L.C. to produce high quality projects in an efficient manner. IOC Company, L.L.C. also produces sand, gravel, flex base (caliche) and other construction materials.</i><br />Target victim <b>website</b>: <i>http://www.ioccompany.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Travis-County-Sheriffs-Officers-Association</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5828</link>
<guid>48000647b315f6f00f913caa757a70b3</guid>
<pubDate>Thu, 26 Jan 2023 15:14:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Travis-County-Sheriffs-Officers-Association</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2709c9ebd307210d63e0cfbd2c049caebae602ea187cef39633beea9b1a7e7dd</i><br /><br />Threat actor <b>description</b>: <i>Travis County Sheriff's Officers Association is a company that operates in the Government industry.</i><br />Target victim <b>website</b>: <i>https://www.traviscountytx.gov</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>ServiceMaster</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5827</link>
<guid>1c208ee88299e7d6d6eff86e6879384e</guid>
<pubDate>Thu, 26 Jan 2023 13:20:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>ServiceMaster</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4534df8d639d31f90a1d898c5064b8eaaf686f2090a54856a0bc898cebc068d8</i><br /><br />Threat actor <b>description</b>: <i>ServiceMaster is a national company that has been a leader in the cleaning industry for more than 50 years. The local franchise in Minneapolis were founded in 1993 by people in the community who wanted to provide the best possible cleaning services to their neighbors. Since then, ServiceMaster of Minneapolis has grown to employee more than 70 people, and has encouraged a culture where your satisfaction comes first.The excellent service we are committed to providing has helped us continue to be leaders in the field of cleaning and disaster restoration for residential and commercial properties.When we come into your home or business, you can rest assured your possessions will be treated with the best care and the cleaning your property receives will be of the highest quality. We can help you get the job done – no matter how big or small, we do it all!</i><br />Target victim <b>website</b>: <i>https://www.servicemasterclr.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crescent-Crown-Distributing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5825</link>
<guid>c5a0ac0e2f48af1a4e619e7036fe5977</guid>
<pubDate>Thu, 26 Jan 2023 09:07:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Crescent-Crown-Distributing</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e56114a49715e30a32b76942e27ecc0e2494dbdce5a1907c18fc211216b99acc</i><br /><br />Threat actor <b>description</b>: <i>Crescent Crown sells and delivers more than 30 million cases annually throughout its distribution territories in Arizona and Louisiana. Crescent Crown Distributing is one of the largest distributors in the United States.</i><br />Target victim <b>website</b>: <i>https://www.crescentcrown.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Copper-Mountain</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5824</link>
<guid>b7f520a55897b35e6eb462bbf80915c6</guid>
<pubDate>Thu, 26 Jan 2023 07:05:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Copper-Mountain</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9dd65a8521d3d218feca736346fca400a0d634c097edb8f7c153d4cbbd8961d9</i><br /><br />Threat actor <b>description</b>: <i>Copper Mountain Mining Corporation is a TSX/ASX listed copper producer, developer and explorer. Copper Mountain’s flagship asset is the 75% owned Copper Mountain mine located in southern British Columbia near the town of Princeton. The Copper Mountain mine currently produces approximately 100 million pounds of copper equivalent per year with a planned expansion to increase production to approximately 140 million pounds of copper equivalent per year.  Copper Mountain trades on the Toronto Stock Exchange under the symbol “CMMC” and Australian Stock Exchange under the symbol “C6C”</i><br />Target victim <b>website</b>: <i>https://cumtn.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>xlntinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5818</link>
<guid>ed23fbf18c2cd35f8c7f8de44f85c08d</guid>
<pubDate>Tue, 24 Jan 2023 15:03:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>xlntinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>62e2f07daa4dd59b22afe924f4fe13f4dc952657cd239dd475d529b504f4069f</i><br /><br />Threat actor <b>description</b>: <i>XLNT Software Solutions offers a variety of services to end-users of our Enterprise Application Software and developers.Located in Lancaster, Pennsylvania, United States.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cadmet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5805</link>
<guid>d81f29a9985d0eb4adc0279e79a9ec75</guid>
<pubDate>Sat, 21 Jan 2023 03:45:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Cadmet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18495afa8bfd4e46235106c19b2706697ed64beda4fa1f00fe495fad1991eaa0</i><br /><br />Threat actor <b>description</b>: <i>At Cadmet, when we look at our customers, we don’t see job titles. We see the people behind the titles. Our business is built on human connections and strong relationships. Building them. Growing them. Sustaining them. Never taking a single relationship for granted. Ever.We are pleased to say that our approach to business – and people – has paid off. 2017 marked our 30th Anniversary as one of the first Sony Medical Dealers in the nation. Today we are one of Sony Medical’s largest nationwide dealers, with a reputation for excellent service and fair prices. And we enjoy great recognition in the medical community through our decade-long participation at regional and national trade shows that support the following industry groups:AORN – Association of periOperative Registered NursesASCA – Ambulatory Surgery Center AssociationSGNA – Society of Gastroenterology Nurses and AssociatesBiomedical Engineering Societies</i><br />Target victim <b>website</b>: <i>https://cadmet.com/</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Guardian-Analytics-US</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5801</link>
<guid>1ce4fe042832e6bd7d06697a43055373</guid>
<pubDate>Fri, 20 Jan 2023 17:13:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>daixin</b> claims attack for <b>Guardian-Analytics-US</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d6f20a208bd5436baa560adc6f4209938baa843ac8040272e82fea9582fc013e</i><br /><br />Threat actor <b>description</b>: <i>Guardian Analytics is now a part of NICE Actimize, a business of NICE (Nasdaq:NICE). Consistently ranked as number one in the space, NICE Actimize is the largest and broadest provider of financial crime, risk and compliance solutions for regional and global financial institutions, as well as government regulators. With Guardian Analytics, financial institutions build trust, increase competitiveness, improve their customer experience, and scale operations.</i><br />Target victim <b>website</b>: <i>https://guardiananalytics.com</i>]]></description>
<category>daixin</category>
</item>
<item xmlns:dc='ns:1'>
<title>flatironssolutions.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5800</link>
<guid>1dacb10f0623c67cb7dbb37587d8b38a</guid>
<pubDate>Fri, 20 Jan 2023 15:06:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>flatironssolutions.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4944756689a32fb7b9e0d0c987baa0b4f295fe8410a787c4de8c3d67576411ba</i><br /><br />Threat actor <b>description</b>: <i>Flatirons Solutions provides a technical content management platform that transforms complex data into actionable information, driving measurably higher productivity, asset utilization, and compliance levels. We provide solutions and expertise that o...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Monmouth-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5799</link>
<guid>de01d76e793fec3fba32f4401a45fb20</guid>
<pubDate>Fri, 20 Jan 2023 01:53:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>vicesociety</b> claims attack for <b>Monmouth-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c43797f2ea76d16471f2fcf12b305243874785fe6f0460adae67ec36e46aca9</i><br /><br />Threat actor <b>description</b>: <i>Monmouth College is a private Presbyterian liberal arts college in Monmouth, Illinois. Monmouth enrolls approximately 900 students from 21 countries who choose courses from 40 major programs, 43 minors, and 17 pre-professional programs in a core curriculum.</i><br />Target victim <b>website</b>: <i>https://www.monmouthcollege.edu/</i>]]></description>
<category>vicesociety</category>
</item>
<item xmlns:dc='ns:1'>
<title>NextGen</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5798</link>
<guid>ba4002d88b8860b6a684ade8357aba56</guid>
<pubDate>Thu, 19 Jan 2023 11:00:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>NextGen</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2cbd9844ae9b8f1a8d78164edb5dac919fcaf03bf4afce18bc20807871668a05</i><br /><br />Threat actor <b>description</b>: <i>NextGen Healthcare provides customized solutions to fit the exact needs of ambulatory practices. Our solutions empower patients to take control of their health and enable clinicians to be more productive and engaged.</i><br />Target victim <b>website</b>: <i>https://www.nextgen.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fresh-Del-Monte</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5797</link>
<guid>034260c0426cf36118803ce0df4457fd</guid>
<pubDate>Thu, 19 Jan 2023 09:04:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Fresh-Del-Monte</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c7330faafc16cc5a72ad186e5b1c733e6186b5c9099c7152ce6425a4b552190</i><br /><br />Threat actor <b>description</b>: <i>Fresh Del Monte Produce Incorporated is one of the world’s leading vertically integrated producers, distributors, and marketers of fresh and fresh-cut fruits and vegetables. Their products include prepared fruit and vegetables, juices, beverages, snacks, and desserts, and are sold in more than 90 countries around the world.</i><br />Target victim <b>website</b>: <i>https://freshdelmonte.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pharmacare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5796</link>
<guid>49856ed476ad01fcff881d57e161d73f</guid>
<pubDate>Thu, 19 Jan 2023 07:04:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Pharmacare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8a339f49d70230454e0cb33f5ad82f36d967c1bdb1da81bba0ff6c422f64dbe</i><br /><br />Threat actor <b>description</b>: <i>At Pharmacare Services, we focus on solving problems, rather than working around them. Our core values of team-based leadership, solid relationships, and deep commitment to quality and service are why hospitals rely on PharmaCare Services. Our goal is to take your pharmacy beyond functional and work towards a well-managed and well-staffed</i><br />Target victim <b>website</b>: <i>http://www.pharmacareservices.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>K-Azarosian-Costello</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5792</link>
<guid>89b9c689a57b82e59074c6ba09aa394d</guid>
<pubDate>Wed, 18 Jan 2023 09:00:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>K-Azarosian-Costello</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52abcb2c25f83f59cc61497f90ee53c558d5b4b31c4d222e13b9ab8902e2734d</i><br /><br />Threat actor <b>description</b>: <i>At KAZAROSIAN COSTELLO,we combine experience, knowledge and a record of success that is hard to find in other firms. In addition to our vast legal experience, the attorneys in our firm are committed to leadership at state and county bar associations. Boasting current and past presidents of bar associations including the Massachusetts Bar Association, Massachusetts Academy of Trial Attorneys, the Essex County Bar Association, and the Haverhill Bar Association, the firm has developed strong relationships in the legal community with both bench and bar.Licensed to practice in Massachusetts, New Hampshire, Maine, and California, our team provides the skilled, individualized representation our clients deserve.</i><br />Target victim <b>website</b>: <i>https://www.kazcolaw.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Livingston</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5791</link>
<guid>05b0afd266cc205432b8dad3f3413c28</guid>
<pubDate>Wed, 18 Jan 2023 01:53:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Livingston</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f3c190c963b347ae1e8447892c195aea4261ada4cdd4753370fc3de8ce64f47e</i><br /><br />Threat actor <b>description</b>: <i>PROOFPACK - Employee documents \ Finance \  Network structure</i><br />Target victim <b>website</b>: <i>http://www.livingstonintl.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>ARC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5784</link>
<guid>6157966f9b9e2f35d2266675bad8b7f8</guid>
<pubDate>Mon, 16 Jan 2023 23:10:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>ARC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3dd546d8f2913472987ba2505d43474571814a19f454fe67a1b0cfa411aaad05</i><br /><br />Threat actor <b>description</b>: <i>ARC is committed to delighting its customers with document imaging and graphic production services that help visual communication professionals do what they do best.We provide world-class service to more than 90,000 customers, including some of the biggest brands in the world. Our people work side-by-side with professionals from the most renowned companies in Hollywood, prestigious and demanding retail outlets, as well as facility managers of some of the biggest school districts in the country who use visual communication to educate their students and staff on health and safety in public areas.No matter where you look, you’ll find us striving for excellence in design and construction, education, healthcare, marketing, manufacturing, technology, sports, and hospitality.</i><br />Target victim <b>website</b>: <i>https://www.e-arc.com/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>R-C-Stevens-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5783</link>
<guid>634841a6831464b64c072c8510c7f35c</guid>
<pubDate>Mon, 16 Jan 2023 21:08:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hiveleak</b> claims attack for <b>R-C-Stevens-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>369b00bc01d55f060ffe7a58c19f1ad7c8c75d74cdc878fd7fc7a3cde7010609</i><br /><br />Threat actor <b>description</b>: <i>As commercial construction specialists in Orlando, we provide new construction and renovation services with an emphasis on design/build. R. C. Stevens is qualified to design and construct any type of commercial construction project in Orlando. We offer all of the necessary resources to meet each client’s specific project needs&nbsp;for design and construction services related to manufacturing/industrial,&nbsp;commercial,&nbsp;healthcare,&nbsp;financial,&nbsp;religious, and&nbsp;renovations.  At. R. C. Stevens, the spirit of innovation can be found in each and every Orlando commercial construction project we do.  Every team member at R.C. Stevens strives daily to uphold the founding principles of quality and integrity as having long been a company tradition since 1926.</i><br />Target victim <b>website</b>: <i>https://rcstevens.com/ </i>]]></description>
<category>hiveleak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Samuels-and-Son-Seafood</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5770</link>
<guid>4b7a55505729b7f664e7222960e9c2d5</guid>
<pubDate>Sat, 14 Jan 2023 19:04:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Samuels-and-Son-Seafood</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b61df77da1862c8430c072fc804ca2d22134611f0ecc16d25dec5723c3229600</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1989 and headquartered in Philadelphia, Pennsylvania, Samuels and Son Seafood produces seafood based on sustainability.</i><br />Target victim <b>website</b>: <i>https://www.samuelsseafood.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Central-Texas-College</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5769</link>
<guid>bbc12a3a98d8487f58a87d3a3070516e</guid>
<pubDate>Sat, 14 Jan 2023 17:04:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>vicesociety</b> claims attack for <b>Central-Texas-College</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a52a99f41f4c4c754251963dbcb40cebc6d265f2224ffb4dc814c55b5af2d79</i><br /><br />Threat actor <b>description</b>: <i>We offer a comprehensive array of associate degrees, career and technical training, and adult continuing education in delivery formats that address virtually every need. Our tuition rate is among the lowest in the country.</i><br />Target victim <b>website</b>: <i>https://www.ctcd.edu/</i>]]></description>
<category>vicesociety</category>
</item>
<item xmlns:dc='ns:1'>
<title>K2-Sports</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5768</link>
<guid>4feb2371a1843d099b28dd419dbab1ef</guid>
<pubDate>Sat, 14 Jan 2023 13:06:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>K2-Sports</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9e418fce7d6b25181c2847713b123a31ac15bdb70029c0c81ffefec96877c510</i><br /><br />Threat actor <b>description</b>: <i>About K2 Sports: Our mission is to create the most innovative tools for our consumers to provide the best experiences, push the sports, and strengthen the culture. K2 was born in 1962 as America’s ski company on Vashon Island in Washington State’s Puget Sound. Renamed in 2003 as K2 Sports and now based in Seattle, the company today is an international portfolio of world-renowned brands recognized as leaders in the innovation, marketing, and quality of our products and services. Driven by a passion for our sports and enthusiasts, we make alpine skis, snowboards, snowshoes, in-line skates, and Nordic ski equipment, apparel, and accessories.</i><br />Target victim <b>website</b>: <i>https://k2sports.com/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>NYCBAR.ORG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5838</link>
<guid>a91bc76c2a6302e573badedcbf57bf7a</guid>
<pubDate>Fri, 13 Jan 2023 15:17:04 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NYCBAR.ORG</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>824b002cd975f6e7cea33057e61f2401c0d82cd04564ce22a010d5db9f298ab0</i><br /><br />Threat actor <b>description</b>: <i>New York City Bar Association</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chinery-and-Douglas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5763</link>
<guid>1819020b02e926785cf3be594d957696</guid>
<pubDate>Fri, 13 Jan 2023 11:09:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Chinery-and-Douglas</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a981f3ec68bf211ff85eefd9ff52ff2ef89010d3c917b9b8944b691924132c88</i><br /><br />Threat actor <b>description</b>: <i>PROOFPACK - working documents</i><br />Target victim <b>website</b>: <i>http://www.lvcdlaw.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Air-Comm-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5757</link>
<guid>a13e00b0854808128933f99f4955f338</guid>
<pubDate>Thu, 12 Jan 2023 22:56:10 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Air-Comm-Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38ff4782006e56566cf72219da8bb2041acac07ded659d224bbe4a941fb7b6cf</i><br /><br />Threat actor <b>description</b>: <i>Air Comm Corporation (ACC) was founded in 1987 to meet the needs of helicopter operators seeking solutions to problems commonly found in factory-installed environmental control systems. Today, ACC is the industry leader in the development and manufacture of state-of-the-art bleed air heaters and vapor-cycle air conditioners for turbine helicopters.      ACC products and technical support set the industry standard; leading edge design, operating efficiency and factory service optimize environmental control and minimize maintenance expense.     Proven performance worldwide     Comprehensive, user-friendly installation guides     ACC installation technicians available for training & support worldwide</i><br />Target victim <b>website</b>: <i>https://aircommcorp.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>lidestrifoodanddrink.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5751</link>
<guid>a4c42bfd5f5130ddf96e34a036c75e0a</guid>
<pubDate>Thu, 12 Jan 2023 10:52:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>lidestrifoodanddrink.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b252e0a2fa33aa7b62374083ae74d9315f68b3575f0149d6331beb73ca8fe1eb</i><br /><br />Threat actor <b>description</b>: <i>OUR INNOVATION CENTERFor most consumer product R&D companies – whether working on a soup, sauce, salsa, or spirit – manufacturing happens on two scales: small-batch and full-scale production. That approach is limited, since what works in a test kit...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Physician-Partners-of-America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5750</link>
<guid>e347c51419ffb23ca3fd5050202f9c3d</guid>
<pubDate>Thu, 12 Jan 2023 04:53:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Physician-Partners-of-America</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7bd33c305e03e2a585d7daf3f3ad68c8fd843305b5bff850c0a44230f84c4d2c</i><br /><br />Threat actor <b>description</b>: <i>Founded in 2013 by a physician-turned-entrepreneur, Physician Partners of America aims to offer patients a safe, seamless healthcare experience and doctors who can totally focus on patients. Physician Partners of America offers pain management, orthopedics, minimally invasive laser spine surgery, mental health counseling. We are</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>G.W.-Becker</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5746</link>
<guid>63a99723ebb3af94d52b474c3b21dbe1</guid>
<pubDate>Wed, 11 Jan 2023 20:55:26 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hiveleak</b> claims attack for <b>G.W.-Becker</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b338170af0adae8632dcb7cf6a4a7577460be3f2e612a7a366e6b9e18d74c8f</i><br /><br />Threat actor <b>description</b>: <i>***** DATA IS COMING SOON ****  G.W. Becker, Inc. is a full service, single source, provider of choice for quality overhead crane products and solutions. Family owned since 1980, we have grown from a local overhead crane parts supplier to a recognized industry leader offering a full spectrum of overhead crane related products and services throughout North America.  Proud to be an Executive Member of the Crane Manufacturer’s Association of America, we design and manufacture custom overhead cranes, hoists and components to CMAA Specifications (Class “A” through “F”) or AIST Technical Report #6. We utilize our knowledgeable in-house team of mechanical, structural and electrical engineers to offer application assistance, custom design engineering and manufacturing of overhead crane products with our customers’ needs first and foremost.  Empowered with highly trained and qualified technicians, G.W. Becker, Inc. provides self-performing installations, inspections and field service repairs for all makes and models of overhead cranes; providing compliance with local regulations and ensuring a safe and productive material handling operation.  Staying true to our mission and values, we strive to understand our customers’ needs and deliver specialized expertise and long-term planning solutions for the unique challenges of purchasing and maintaining overhead crane and hoist equipment. </i><br />Target victim <b>website</b>: <i>https://gwbcrane.com</i>]]></description>
<category>hiveleak</category>
</item>
<item xmlns:dc='ns:1'>
<title>circlevillecourt.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5744</link>
<guid>78631a4bb5303be54fa1cfdcb958c00a</guid>
<pubDate>Wed, 11 Jan 2023 10:55:41 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>circlevillecourt.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>645646db30d467b0b98cf7e2a3cd39ab65caf70ab352e92c5e74f495cc017e54</i><br /><br />Threat actor <b>description</b>: <i>Welcome to The Circleville Municipal Court website. The court serves all of Pickaway County with countywide jurisdiction.We downloaded more than 500 gigabytes of different dates. Customer data. Nanny criminals. Case information. And much more. In...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>datair.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5742</link>
<guid>c7be03f5d811ed29c328526ca8ab0d61</guid>
<pubDate>Tue, 10 Jan 2023 20:51:22 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>datair.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>65dccbb4a201d1b50dd5c98f07894d534d3511f1876335744e4c587501de4df3</i><br /><br />Threat actor <b>description</b>: <i>Your negotiator obviously already got the operating money to solve this situation, but since now there is a slight upward trend in BTC - apparently he wants to make a little more money on this growth. No need to play with us. You have a deadline of J...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Thor-Specialties-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5741</link>
<guid>edea298442a67de045e88dfb6e5ea4a2</guid>
<pubDate>Tue, 10 Jan 2023 19:07:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lorenz</b> claims attack for <b>Thor-Specialties-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3b152ad33a76cbbe0047dfb7c474395ff1f1555b06a716080eef85b2ba1491eb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lorenz</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shelco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5740</link>
<guid>9be681ea06f52111e4c1ef99d3763770</guid>
<pubDate>Tue, 10 Jan 2023 16:58:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lorenz</b> claims attack for <b>Shelco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce69dd3106e008d0c4cd4a09fe25ea963ec8bbdefe1ed1ea1bcffa25720a589c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lorenz</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chestertons-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5739</link>
<guid>167ccbe15cc1664c9a63c20ac4c6a55a</guid>
<pubDate>Tue, 10 Jan 2023 14:55:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lorenz</b> claims attack for <b>Chestertons-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b0ce484d8e39feea41cd6969b115173f223b85522a3a8b3fb38cfaf4648e8bc7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lorenz</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arizona-Labor-Force</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6338</link>
<guid>5648d7fb4f1ea9a69fd10fccacd7d007</guid>
<pubDate>Mon, 09 Jan 2023 15:11:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>Arizona-Labor-Force</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>09fcf8f534be7dbc7444ae4d3de9a83b2245028e11bc17f7e4dcd67634a87907</i><br /><br />Threat actor <b>description</b>: <i>Hiring Arete Advisors to waste our time will lead to your data being leaked.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>River-City-Science-Academy</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5736</link>
<guid>105e822401e5551873cc80584f19c649</guid>
<pubDate>Mon, 09 Jan 2023 14:53:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>River-City-Science-Academy</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4b3991232f57cbfb247c898f1468cdf4f2c02af697fb68b3fca48fe28b5158f1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>millennia.pro</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5730</link>
<guid>3ce257b311e5acf849992f5a675188e8</guid>
<pubDate>Sun, 08 Jan 2023 11:04:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>millennia.pro</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9fb9fe4b8392fbb5f687ea9e9fccf8563b5f0e8b09b115c5922bd318ce67dfe6</i><br /><br />Threat actor <b>description</b>: <i>ENGINEERING  CONSULTING SERVICES 22.44 GB DATA</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Corporate-Interiors-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5840</link>
<guid>61d009da208a34ae155420e55f97abc7</guid>
<pubDate>Sat, 07 Jan 2023 12:30:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>Corporate-Interiors-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>139c7e8dd26d98b52b3767dd8cd0a8e50aed837a9f00cc633b89d756afef3c97</i><br /><br />Threat actor <b>description</b>: <i>Corporate Interiors - Steelcase office furniture - Delaware and Philadelphia Contact Us 1-800-690-9101</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Buffco-Production-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5722</link>
<guid>c94a589bdd47870b1d74b258d1ce3b33</guid>
<pubDate>Sat, 07 Jan 2023 06:53:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Buffco-Production-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1073a862a0fd551d867469972662c848253b9829b653b5197b903b8c0eade0d1</i><br /><br />Threat actor <b>description</b>: <i>Buffco Production, Inc. is a native East Texas exploration and production company with more than 35 years of experience in the oil and natural gas industry. Buffco strives to drill and produce oil and gas efficiently and keep its owners informed while maintaining industry standards. Buffco understands the continuously evolving practices and technologies in the oil and gas industry, and has significant expertise with combatting shifting commodities markets. Buffco can navigate current producing properties, while methodically evaluating new prospects and strategically choosing those that fit current climates. Buffco’s adaptability and expansive knowledge base of conventional and unconventional oil and gas development are the reasons why it has had scalable growth over decades past.</i><br />Target victim <b>website</b>: <i>https://www.buffcoproduction.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bay-Area-Rapid-Transit</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5718</link>
<guid>25daeb9b3072e9c53f66a2196a92a011</guid>
<pubDate>Fri, 06 Jan 2023 23:00:54 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>vicesociety</b> claims attack for <b>Bay-Area-Rapid-Transit</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f46cc1c16896537e7e7416d64f6ca2f8273b4a36efcbdd23d3e647e3b0c33543</i><br /><br />Threat actor <b>description</b>: <i>The San Francisco Bay Area Rapid Transit District is a heavy-rail public transit system that connects the San Francisco Peninsula with communities in the East Bay and South Bay. BART operates in five counties with 131 miles of track and 50 stations, carrying approximately 405,000 trips on an average weekday.</i><br />Target victim <b>website</b>: <i>https://www.bart.gov/</i>]]></description>
<category>vicesociety</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bevolution-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5717</link>
<guid>dae3312c4c6c7000a37ecfb7b0aeb0e4</guid>
<pubDate>Fri, 06 Jan 2023 21:13:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Bevolution-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9dbea6dd4ac74c0ff0aaa11f13c2385123dbb83aa7e3cf50c2dca08963ae4123</i><br /><br />Threat actor <b>description</b>: <i>Food & Beverage · Illinois, United States﻿Bevolution Group produces shelf-stable and frozen beverage products, and cocktail mixes.</i><br />Target victim <b>website</b>: <i>http://bevolutiongroup.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sub-drill-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5715</link>
<guid>6e4243f5511fd6ef0f03e9f386d54403</guid>
<pubDate>Fri, 06 Jan 2023 17:11:16 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>vicesociety</b> claims attack for <b>Sub-drill-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3a8314f3b84e8ffe9634a672e370b26aad3901a80516d0e661cd6f4c04e38e2</i><br /><br />Threat actor <b>description</b>: <i>Sub-drill was incorporated in 1992 and is a proven and trusted manufacturer and supplier of Subsea Tools and Drilling Equipment to the Global Energy Industry.</i><br />Target victim <b>website</b>: <i>https://www.sub-drill.com/</i>]]></description>
<category>vicesociety</category>
</item>
<item xmlns:dc='ns:1'>
<title>PROQUINAL-Spradling-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5714</link>
<guid>0fe6a94848e5c68a54010b61b3e94b0e</guid>
<pubDate>Fri, 06 Jan 2023 14:54:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>vicesociety</b> claims attack for <b>PROQUINAL-Spradling-Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a8e4bcdcf6e21335ce4c815a5d20c76ccbb915b242f2723126f12180c58511a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>vicesociety</category>
</item>
<item xmlns:dc='ns:1'>
<title>Consulate-Health-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5712</link>
<guid>a6b8deb7798e7532ade2a8934477d3ce</guid>
<pubDate>Fri, 06 Jan 2023 11:01:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hiveleak</b> claims attack for <b>Consulate-Health-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6fda87f7963977dcff70d137fed30bad3f49bb900e57d5c4b1b9c3b6f91fda08</i><br /><br />Threat actor <b>description</b>: <i>Consulate Health Care is a leading provider of senior healthcare services, specializing in post-acute care. We offer services ranging from comprehensive short-term rehabilitation and transitional care to Alzheimer’s and dementia care. Consulate Health Care began as a small provider in Cheswick, PA with a strong focus on patient needs. We haven’t waivered from that focus, which has strengthened our family and allows us to sustain jobs in many communities, create rigorous systems of care and deploy technology that makes it easier to understand patient needs. Even as we’ve grown to provide services across 5 states, it’s the little things we do while fulfilling our mission statement of "Providing Service with Our Hearts and Hands" that really makes the difference. From visiting with our patients while they eat, to pulling up the sheets to just the right height, our employees care for patients like family, not because it’s their job, but because it’s their calling.  </i><br />Target victim <b>website</b>: <i>https://consulatehc.com/</i>]]></description>
<category>hiveleak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ellison-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5711</link>
<guid>c10f48884c9c7fdbd9a7959c59eebea8</guid>
<pubDate>Thu, 05 Jan 2023 20:58:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Ellison-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a5eb1eb2a43f25f11475f55cab72dc68fb4d5a941f17506fa87ffddedd901f9d</i><br /><br />Threat actor <b>description</b>: <i>Ellison Technologies is a provider of advanced machining solutions to North American metal-cutting manufacturers and their global affiliates.As a family of companies we are committed to the survival and growth of the American manufacturing industry.  Independent offices provide us a local market focus and the flexibility to advocate the needs of each of our valued customers.Our priority is to introduce technologies that strengthen our customers’ ability to compete in the markets they serve.  Whether the solution involves a stand alone machine, multi-process equipment, or an integrated manufacturing system with robotic automation, our goal remains the same; to optimize throughput and quality at the lowest per-part manufacturing cost.</i><br />Target victim <b>website</b>: <i>https://www.ellisontechnologies.com/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hayward</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5710</link>
<guid>810462d01f318bd13e628a77fc3f92c0</guid>
<pubDate>Thu, 05 Jan 2023 19:07:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Hayward</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>19309cf87ff44c6954063bb0b7488a9affbc9bf9046eaeebb6285c027ba3d164</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kansas-City-Homes</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5709</link>
<guid>63c3ddcc7b23daa1e42dc41f9a44a873</guid>
<pubDate>Thu, 05 Jan 2023 17:02:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Kansas-City-Homes</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>66d7070ef32bb43a341cc58fe25842769411d01ce101a725919814857fe9133b</i><br /><br />Threat actor <b>description</b>: <i>From our earliest days in Kansas City, we have remained brokerage leaders in the real estate industry by developing relationships with our clients and our communities. The Better Homes and Gardens® Real Estate brand was built upon a passion for the home. Sellers benefit from this well-known brand through the exposure generated by millions of home searches online and the inherent trust of the iconic brand.</i><br />Target victim <b>website</b>: <i>https://kansascityhomes.com/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>CGMLLC.NET</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5842</link>
<guid>fb3ea77a2b3f8e7cb0e4e6699568d43d</guid>
<pubDate>Thu, 05 Jan 2023 02:35:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>CGMLLC.NET</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4eab2140470bc9d43bf32136ac479f92813f83f42da7bae925115c7480e1bf28</i><br /><br />Threat actor <b>description</b>: <i>CGM, LLC</i><br />Target victim <b>website</b>: <i>https://www.CGMLLC.NET</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>CAPMC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5707</link>
<guid>18903e4430783a191b0cfab439daaef8</guid>
<pubDate>Wed, 04 Jan 2023 17:07:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>CAPMC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c9c0e9cc9618f7a8e560afabe57f977287d337d0ec19081b99a87ca09f0430a4</i><br /><br />Threat actor <b>description</b>: <i>Community Action Partnership of Madera County (CAPMC). Since it was incorporated in 1965, CAPMC has been making a positive difference in our county. CAPMC is committed to improving the social well-being and economic capacity of low to moderate-income individuals and families, as well as providing opportunities to achieve economic independence.</i><br />Target victim <b>website</b>: <i>https://maderacap.org/</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>SUNY-Polytechnic-Institute</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5703</link>
<guid>f7dd39d47c6f28f7877155ccffad0192</guid>
<pubDate>Tue, 03 Jan 2023 16:58:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>SUNY-Polytechnic-Institute</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bec74afc18bed22de8458911a8f2cd28a5105bd64fe2b59439177f751fb23a20</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stratacache</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5700</link>
<guid>84f5ddd735176becc72c3b1ff424149e</guid>
<pubDate>Mon, 02 Jan 2023 13:05:55 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Stratacache</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>40453af424e1cb18b576480abd699d5638f964be23d8fb6679833552f197a995</i><br /><br />Threat actor <b>description</b>: <i>Dayton, Ohio, United States</i><br />Target victim <b>website</b>: <i>https://www.stratacache.com</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>CDER</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5648</link>
<guid>84f2798f05d595273de40e3046329309</guid>
<pubDate>Sun, 01 Jan 2023 18:55:20 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>CDER</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>addfde661d0758ec4d8ef060a1aa09b8b92195d883d232d16a5b25fc87e5ae52</i><br /><br />Threat actor <b>description</b>: <i>Fere-Champenoise, France</i><br />Target victim <b>website</b>: <i>https://www.cder.fr</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>hacla.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5652</link>
<guid>b4f1ec9f4b5c8207f8fc29522efe783d</guid>
<pubDate>Sat, 31 Dec 2022 18:52:31 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>hacla.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4803aa5b4871095ac11902daebf39ece9bb089a406371bca9162cfb9aa7859c5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>MARK-TAYLOR</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5654</link>
<guid>297018ebde10e3024ac70a8120a2c82c</guid>
<pubDate>Sat, 31 Dec 2022 13:03:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>MARK-TAYLOR</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7946023d1defd9b6260b07d4f28fd447f6c8e960e7cadb35a8a298c7a66d8c4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vincent-Fister</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5655</link>
<guid>2d13dd919b0ec4519c4a0967c4c7cd47</guid>
<pubDate>Sat, 31 Dec 2022 10:49:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Vincent-Fister</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8559d23d6cfd0d707459f3d8c79d845b72a62947b207a1d5560c3a49aa3a6e09</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zehnders-of-Frankenmuth</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5658</link>
<guid>8c96a3d5e1a41ee7925daa5a4dc0c25a</guid>
<pubDate>Sat, 31 Dec 2022 04:55:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Zehnders-of-Frankenmuth</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3274f81ac7dce022febf4dbc7eab36e6d4cd6108ef7ad06c071ad9853b7bf075</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>presco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5664</link>
<guid>b24d21019de5e59da180f1661904f49a</guid>
<pubDate>Fri, 30 Dec 2022 16:58:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>presco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4379fe5a9d0cb0dd50807f2932cda3c2b9308762c57b6a9e75b77a4df030c6ec</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1942, Presco is a company that manufactures safety marking products and engineered films such as barricade tapes, marking flags, marking whiskers, and roll flagging. They are based in Sherman, Texas.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Robinson-Pharma</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5665</link>
<guid>f900afc719d7d86bd7d17b9d3be0aafe</guid>
<pubDate>Fri, 30 Dec 2022 14:58:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Robinson-Pharma</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7ed1d90a32116d1f1f9d8f88cbd1a3b33d897997a19a6f678cd175b833404e1d</i><br /><br />Threat actor <b>description</b>: <i>Robinson Pharma, Inc. is a full-service contract manufacturer of softgels, tablets, capsules, powders, and liquids for the dietary supplements and personal health care industries. Currently, we have the largest softgel capacity in the United States. We are a leading vitamin manufacturer with multiple third-party certifications for GMP Compliance. We search the globe for the best raw materials and guarantee that all your products will be manufactured in the USA. Robinson Pharma, Inc. also guarantees one of the shortest order lead times in the industry, as well as packaging services.</i><br />Target victim <b>website</b>: <i>https://www.robinsonpharma.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fantasy-Springs-Resort-Casino</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5667</link>
<guid>c34a7191f6e9948068b83e7179ea3da8</guid>
<pubDate>Fri, 30 Dec 2022 11:13:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Fantasy-Springs-Resort-Casino</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e04019c5fc25aabf8ec232590fd20eced62e3b302477a06ec456bd4b041a1bbf</i><br /><br />Threat actor <b>description</b>: <i>Walk through the doors of Fantasy Springs Resort Casino and you’re immediately transported to a world of elegance, exciting ambience and good luck. This award-winning casino in the Palm Springs area is home to 1,800 of the hottest slots and video poker, 40 table games, the action-packed casino-floor Springs bar, friendly hosts and dealers, and the Fantasy Rewards Club – offering guests the best perks and rewards of any desert casino. Fantasy Springs offers world-class gaming at a desert oasis setting, close to anywhere in southern California. Here you’ll find the newest and hottest games, low table minimums and best odds in the Valley.These are just a few of the things that make Fantasy Springs Resort Casino a premier gaming destination in Southern California. Must be 21 or over to gamble in the casino.</i><br />Target victim <b>website</b>: <i>https://www.fantasyspringsresort.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Iowa-Public-Television</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5669</link>
<guid>8a7129b8f3edd95b7d969dfc2c8e9d9d</guid>
<pubDate>Fri, 30 Dec 2022 06:55:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>Iowa-Public-Television</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cfb2b03c2d765513603f25efa0a1fd3dd42d0255f65122d7ce4f742b3365287e</i><br /><br />Threat actor <b>description</b>: <i>Iowa PBS is Iowa’s statewide public broadcasting network. Iowa PBS provides quality, innovative media and services that educate, inform, enrich and inspire Iowans.Our noncommercial, public-service mission enables us to bring you locally produced programs of lasting value regardless of where you live or what you can afford. Our educational media and resources help prepare Iowa’s children for success in school and opens up the world to them in age-appropriate ways. Nearly half the households in our viewing area tune to Iowa PBS each month for programming that reflects a range of interests for Iowans in all demographic categories.</i><br />Target victim <b>website</b>: <i>http://www.iowapbs.org</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>St.-Rose-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5672</link>
<guid>e7c573c14a09b84f6b7782ce3965f335</guid>
<pubDate>Fri, 30 Dec 2022 01:48:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>St.-Rose-Hospital</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d49afceeee6f2c4665e840a714ddfe879b82fd635853806d33a880760e572a2b</i><br /><br />Threat actor <b>description</b>: <i>St. Rose Hospital is an hospital located in Hayward, California. It is a designated cardiac arrest receiving center in the Alameda County emergency medical services system, and provides basic emergency medical services.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>INTRADO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5681</link>
<guid>b476828992f393a09339cf6270d30aa8</guid>
<pubDate>Thu, 29 Dec 2022 07:16:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>INTRADO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af41a58e9ee628127b0e97dd2e2abd3217bb9fec7f9a71bb90dea3d026700a28</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.buildersmutual.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5683</link>
<guid>14db62200d8bf46551aa214accafe1df</guid>
<pubDate>Thu, 29 Dec 2022 03:06:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>www.buildersmutual.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>61ffe0d89fd12c53c3bbf3373654c41725015640aea94145590e5e8b227ef755</i><br /><br />Threat actor <b>description</b>: <i>pBCz04K51g,0+t2:Umg57Kc|wq222 - pass</i><br />Target victim <b>website</b>: <i>http://www.buildersmutual.com</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>JAKKS-Pacific-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5626</link>
<guid>344ef5151be171062f42f03e69663ecf</guid>
<pubDate>Wed, 28 Dec 2022 22:44:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>JAKKS-Pacific-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7117f60823267c3c2b13fb173aa7e7c215cf1b4195f441827e02ed83c9a606a8</i><br /><br />Threat actor <b>description</b>: <i>Corporate Overview JAKKS Pacific, Inc. is a multi-brand company that, since 1995, has been designing, developing, producing and marketing toys, leisure products and writing instruments for children and adults around the world.</i><br />Target victim <b>website</b>: <i>https://jakks.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>SUMITOMO-BAKELITE-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5627</link>
<guid>5898d8095428ee310bf7fa3da1864ff7</guid>
<pubDate>Wed, 28 Dec 2022 22:44:02 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>SUMITOMO-BAKELITE-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2fa96ce994296b76d06177253e01700acc96763ca8091d326cd7f1b3fce1d675</i><br /><br />Threat actor <b>description</b>: <i>Sumitomo Bakelite Company Limited, together with its subsidiaries, engages in the research and development, manufacture and sale of semiconductor materials</i><br />Target victim <b>website</b>: <i>sumibe.co.jp</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>ET-GLOBAL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5619</link>
<guid>1a4ab15f37a1d2341d947a9996ddfbf7</guid>
<pubDate>Wed, 28 Dec 2022 00:58:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>ET-GLOBAL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd930aac389100cdc3413060f86195dc9df925bbc3fc7f6e936a90c1471b5836</i><br /><br />Threat actor <b>description</b>: <i>We showcase your brands worldwide – with precision and great attention to detail. Therefore, you will find us in major cities around the world.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>TCL-Chinese-Theatres</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5621</link>
<guid>249338e601902b14d0f529fe5e6ae417</guid>
<pubDate>Wed, 28 Dec 2022 00:58:14 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>TCL-Chinese-Theatres</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b15dd4232bd984717c7bfb9956f3b4545180e27e56e38caecad16dc78920a424</i><br /><br />Threat actor <b>description</b>: <i>The TCL Chinese Theatre is the most iconic movie palace in the world. With over 50 events a year, including movie premieres, imprint ceremonies, and film festivals, the theatre continues to make Hollywood history every day.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trubee-Collins-amp-Co</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5622</link>
<guid>b4681a619cf018eed690452faeb0e94f</guid>
<pubDate>Wed, 28 Dec 2022 00:58:13 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>Trubee-Collins-amp-Co</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d69dc971475c20212dce1ef9cc6ae33dd753e7ed45cbcd18dc76b78dac38b7e5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>FARMS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5608</link>
<guid>487129304eca93e3646dd0c7dd441bf5</guid>
<pubDate>Tue, 27 Dec 2022 03:03:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>FARMS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fed33b645178d2970d9391fd3a68eda2e2a4d38a9ef317cd2fad15f3fd677e08</i><br /><br />Threat actor <b>description</b>: <i>Farming has always been about managing information and effectively using technology for success. At Farms.com, we’re excited by the power and potential of new technology; we recognize that it is a significant enabler in the evolution of farming and agribusiness. Our goal is to strive to use technology to enable our customers to manage information to their advantage. We are continuously researching, developing and introducing technology innovations to enhance farming management efficiency and effectiveness.</i><br />Target victim <b>website</b>: <i>https://www.farms.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>CRR</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5609</link>
<guid>828c3938b662961ed8f775ed638b97f2</guid>
<pubDate>Tue, 27 Dec 2022 03:03:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>CRR</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a862968b048d52588bb12d59a524c20a9e4bd455f244463ead6845f6fbfbe03f</i><br /><br />Threat actor <b>description</b>: <i>CR&R Incorporated will not share any personal financial information you provide (such as credit card information) with other companies. From time to time, this website may provide links to other websites. You should carefully review the privacy policies on those sites, they may differ from the CR&R Incorporated Privacy Policy.</i><br />Target victim <b>website</b>: <i>https://crrwasteservices.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>SSI-Schfer-Shop</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5611</link>
<guid>01846ae470651e97d2f73fce979406a9</guid>
<pubDate>Tue, 27 Dec 2022 03:03:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>SSI-Schfer-Shop</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fe3dc5c063642345ff0ab2cd268bb4ed87aeaf66f0b21db6cf0240e1daf9dd76</i><br /><br />Threat actor <b>description</b>: <i>Since 1937, SSI SCHAEFER has been leading the way in storage and shelving solutions. Today, SSI SCHAEFER offers a complete line of automated material handling applications—including ASRS systems and warehouse management software. With automated storage and retrieval systems</i><br />Target victim <b>website</b>: <i>https://www.ssi-schaefer.com/en-us</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>McKenzie-Health-System</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5865</link>
<guid>4669d6db6d5b6739b9194e999d907924</guid>
<pubDate>Mon, 26 Dec 2022 16:12:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>McKenzie-Health-System</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6d174b8488b087408aa04f8e0a00c4926cb5fa0bacafb352ff7219d59abaf65b</i><br /><br />Threat actor <b>description</b>: <i>McKenzie Health System (MHS) is a not-for-profit medical and surgical hospital in Sandusky, Mich., with nine clinics in the surrounding region.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Avamere-Family-of-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5866</link>
<guid>a7471fdc77b3435276507cc8f2dc2569</guid>
<pubDate>Mon, 26 Dec 2022 16:12:37 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>Avamere-Family-of-Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ae6fe8f93e03ce4efce663f8f15fc3247cc30e181da7049cd646a54f356fbf08</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1995 and headquartered in Wilsonville, Oregon, Avamere Family of Companies is a group of healthcare organizations and systems.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>LPA-Design</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5869</link>
<guid>4c26774d852f62440fc746ea4cdd57f6</guid>
<pubDate>Mon, 26 Dec 2022 16:12:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>LPA-Design</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>61844b49fb02a9a7df1a7d397624e9de42c7c1e38711f0ad56ee64d17b9880d9</i><br /><br />Threat actor <b>description</b>: <i>LPA Design is an electronics R&D consulting company with engineering expertise in printed circuit board design, RF communications and antenna optimization, and remote sensors. LPA Desing developed the PocketWizard™ line of photography products.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Public-Employees-Credit-Union</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5870</link>
<guid>1f74a54f39b3123ad272ca0a06e7463f</guid>
<pubDate>Mon, 26 Dec 2022 16:12:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>Public-Employees-Credit-Union</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>66a274761be60b6ef9523822c63a84e2a2f89fedb6d8e3bd43ce7fd387708a2a</i><br /><br />Threat actor <b>description</b>: <i>We have confidential files belonging to all 29000 members including Name, Address, SSN, Telephone, Email, Credit Cards, Loan Applications, IRS Documents. Include small sample.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>CHRISTUS-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5871</link>
<guid>07bba581a2dd8d098a3be0f683560643</guid>
<pubDate>Mon, 26 Dec 2022 16:12:34 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>CHRISTUS-Health</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>81e427b0341cb3fb45f3c0f0451da2268eb9cf8b0446b8fa5d0eaef9a81e5574</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1999, CHRISTUS Health an international Catholic, faith-based, not-for-profit health system, is headquartered in the Dallas area.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>CPA-Mutual-Insurance-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5873</link>
<guid>7ee6f2b3b68a212d3b7a4f6557eb8cc7</guid>
<pubDate>Mon, 26 Dec 2022 16:12:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>CPA-Mutual-Insurance-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ae10d61a81d83ac01f44da4c6b7d946376cee7e6773dcfaed97e14decb41224c</i><br /><br />Threat actor <b>description</b>: <i>Cyber Insurance policy leaked in sample.           At CPA Mutual, our mission is to provide a quality and lasting solution to the professional liability needs of accountants. We bring added value to our member firms by continually striving to exceed their expectations and helping them manage and prevent risks.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Livingston</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5874</link>
<guid>85d6e9c8255c0364fb67b5ac8a25eea3</guid>
<pubDate>Mon, 26 Dec 2022 16:12:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>Livingston</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>857d34d5b761467b96bc0170187dc46ef87a344d99a108e0b44151bc9083231b</i><br /><br />Threat actor <b>description</b>: <i>Livingston is a quality source for rental of all Test Equipment and Equipment Management Services with local offices in all major countries.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>G.R.-Sponaugle</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5597</link>
<guid>90248d0a98105fa534cf2b0696ddd12f</guid>
<pubDate>Mon, 26 Dec 2022 08:52:47 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>unsafeleak</b> claims attack for <b>G.R.-Sponaugle</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb67e4ebe2cd6d56ff885b496c6e5c74bb4652dd0fe94e6f55e582366251dc7f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>unsafeleak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wings-Etc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5598</link>
<guid>773fc3013fec43c958724a25b7dcb360</guid>
<pubDate>Mon, 26 Dec 2022 08:52:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>unsafeleak</b> claims attack for <b>Wings-Etc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>85a9626fbab2f81eac4b7b18368186036a05e808ce8016862cc950df8ffc88de</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>unsafeleak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dooly-County-School-System</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5599</link>
<guid>8a4488c177d9dc8c3da7c745c89ca214</guid>
<pubDate>Mon, 26 Dec 2022 08:52:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>unsafeleak</b> claims attack for <b>Dooly-County-School-System</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>623bf266ebed09e7adaac15a8434e43115113bd8d5d66267475a861f6a301642</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>unsafeleak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Whatcom-County-Library-System</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5600</link>
<guid>7ea4e7fcdc6aff2777bd594a3754e02a</guid>
<pubDate>Mon, 26 Dec 2022 08:52:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>unsafeleak</b> claims attack for <b>Whatcom-County-Library-System</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>68a741a54693660b627cf4cdb73c28f0078284ed41f881e7ea8230bc4be0a40e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>unsafeleak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ucar</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5603</link>
<guid>2b0aa0d9e30ea3a55fc271ced8364536</guid>
<pubDate>Mon, 26 Dec 2022 08:52:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>unsafeleak</b> claims attack for <b>Ucar</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4c306f5901fe1ee948bd770b84323d809a208278aab05cf5837b52c39af89006</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>unsafeleak</category>
</item>
<item xmlns:dc='ns:1'>
<title>STRESSER-ASSOCIATES-CPA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5596</link>
<guid>ab81265d898ef7f38a3e95fc98c2a669</guid>
<pubDate>Mon, 26 Dec 2022 07:02:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>STRESSER-ASSOCIATES-CPA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>eb6b779f7ab742d73de0ffeeb4dd0342921bcd0d82283fd57383cfa5d4630b79</i><br /><br />Threat actor <b>description</b>: <i>Want some tax returns from Georgia residents?  Want some passports or driver licenses?  Come grab them, its free!  We created a clearnet site with the stolen data.   http://streserecpa.com/  https://anonfiles.com/j5md32Oay1/clientsdata1_zip</i><br />Target victim <b>website</b>: <i>https://www.stressercpa.com/home</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>excentiahumanservices.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5587</link>
<guid>492114f6915a69aa3dd005aa4233ef51</guid>
<pubDate>Fri, 23 Dec 2022 10:51:32 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>excentiahumanservices.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d29d0c42f1ab2ff49a6d228961312ec641d1ac5ea96ce0c393fe225e47da8887</i><br /><br />Threat actor <b>description</b>: <i>Revenue 14kkExcentia Human Services is a nonprofit organization in Lancaster County that provides services for people with developmental needs and autism throughout the lifespan. These services can begin at birth with therapeutic and educati...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>thedonovancompany.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5584</link>
<guid>033daef61ea8721921fbbeebb6f87313</guid>
<pubDate>Thu, 22 Dec 2022 22:43:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>thedonovancompany.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d7d4f7f59ff204ac4f5dabc9944013b68a0d6f8ee955cb30d4f6ff019d65556</i><br /><br />Threat actor <b>description</b>: <i>A small boutique CPA firm located in Irvine California. We provide tax and accounting services to individuals and their businesses. Hands on assistance with tax planning, tax compliance and various other matters. We believe getting to know our client...</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Strem-Chemicals</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5583</link>
<guid>43c656628a4a479e108ed86f7a28a010</guid>
<pubDate>Thu, 22 Dec 2022 22:43:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Strem-Chemicals</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8044fce7aa4398a396af1e35c150125726fbcb963e5364a0309502afdd02f058</i><br /><br />Threat actor <b>description</b>: <i>Strem established in 1964, is a company that manufactures and markets specialty chemicals of high purity. Strem was acquired by Ascensus Specialties in 2021. Its clients include academic, industrial and government research and development laboratories as well as commercial scale businesses in the pharmaceutical, microelectronic and chemical / petrochemical industries. Strem also provides custom synthesis (including high pressure synthesis) and cGMP manufacturing services.</i><br />Target victim <b>website</b>: <i>https://www.strem.com/</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bregman-Berbert-Schwartz--Gilday</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5582</link>
<guid>c2368d3d45705a56e51ec5940e187f8d</guid>
<pubDate>Thu, 22 Dec 2022 22:43:46 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Bregman-Berbert-Schwartz--Gilday</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>572f110800c94f14870b5e901d19ed3fdff3fe0c7ec5b448f06a740691ca2922</i><br /><br />Threat actor <b>description</b>: <i>All data available for downloading now!!!</i><br />Target victim <b>website</b>: <i>https://www.bregmanlaw.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Gucciardo-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5572</link>
<guid>30ba105754346aaf47509089d2287f2a</guid>
<pubDate>Wed, 21 Dec 2022 22:56:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>The-Gucciardo-Law-Firm</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7052908f7b02465dc7b114f773cc387ed7efa72db04e922cd8b3d09331cadd61</i><br /><br />Threat actor <b>description</b>: <i>We are relentlessly committed to our clients as if they were members of our own family. You can turn to us for guidance and honest answers.</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Goodwill-industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5566</link>
<guid>b0c7ae2316c7e8214fd659e4bc8a0dea</guid>
<pubDate>Wed, 21 Dec 2022 14:53:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>Goodwill-industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd64e8020a6408cb0e7b9f3e968a8f998dae6058fbd5c2a627d8d86fc0f35b53</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>Interface</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5565</link>
<guid>d2a452edff079ca6980edcf54cc49945</guid>
<pubDate>Wed, 21 Dec 2022 01:04:33 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hiveleak</b> claims attack for <b>Interface</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>685c578060f3b025e16b01c8a430028831f02ab6856a401a7a5b2be7f426733b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>hiveleak</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpswww.leohamel.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5517</link>
<guid>6c7cd904122e623ce625613d6af337c4</guid>
<pubDate>Thu, 15 Dec 2022 21:17:39 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>httpswww.leohamel.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d28f74163ac272d53dbfffe1985300624ee0b72a0959f50764cc55c5a20e8cff</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eureka-Casino-Resort</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5515</link>
<guid>00c17237d011cca999f55a43db2ce040</guid>
<pubDate>Thu, 15 Dec 2022 21:17:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Eureka-Casino-Resort</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>82b3dfc2271a58b3ea2b75ec8183cf673ba64dd49547fb76b496f2ad5bf106a7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bailey-Cavalieri-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5507</link>
<guid>23e582ad8087f2c03a5a31c125123f9a</guid>
<pubDate>Thu, 15 Dec 2022 03:09:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Bailey-Cavalieri-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>843764eae5fc719ac5a102582e960248b9ac2d89ce2a114afbba2cca243a078a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>TEIJIN-AUTOMOTIVE-TECHNOLOGIES</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5504</link>
<guid>fdaa09fc5ed18d3226b3a1a00f1bc48c</guid>
<pubDate>Wed, 14 Dec 2022 03:19:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>TEIJIN-AUTOMOTIVE-TECHNOLOGIES</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c7a3e1dc26265f57c6119237ef5ca9fb765ede950ccd4ccf6d76632c80fc6ec</i><br /><br />Threat actor <b>description</b>: <i>We respect and/or protect:      fair trade     accurate records, reports and documentation     timely, appropriate, and fair disclosure     intellectual property     personal data, and confidential information     whistle-blowing     security export control   We do not allow for:      anticompetitive behaviors, such as cartels     corruptions such as bribery     insider trading and market manipulation     money laundering and terrorism financing     dealing with antisocial forces </i><br />Target victim <b>website</b>: <i>https://www.teijin.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Batesville-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5499</link>
<guid>d149231f39b05ae135fa763edb358064</guid>
<pubDate>Tue, 13 Dec 2022 20:51:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>karakurt</b> claims attack for <b>Batesville-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e48badd7596d42dbbec24fdca31c0a861026e87c261070f99a2840c8e8b1c2cc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>karakurt</category>
</item>
<item xmlns:dc='ns:1'>
<title>BRYCON-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5489</link>
<guid>d902c3ce47124c66ce615d5ad9ba304f</guid>
<pubDate>Mon, 12 Dec 2022 13:13:15 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>BRYCON-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a250a3acf25ba5df5e6e3c1fedfd299f1c7d8355e18a2fe4681b913ae994978d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>dof.ca.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5479</link>
<guid>ac2460b56866901d732f996b82b69d31</guid>
<pubDate>Mon, 12 Dec 2022 11:21:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>dof.ca.gov</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8dce28f9ab7ceaee03b06e6d324e0d4e8f39ed0e7acbb13d522bb130e4445237</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>AIRCOMECHANICAL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5392</link>
<guid>2a10665525774fa2501c2c8c4985ce61</guid>
<pubDate>Fri, 09 Dec 2022 11:18:38 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>AIRCOMECHANICAL</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7dd2aed31885163f02f771957cb105dd5a6613648b2620a7c30147ae2c725c25</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>BRYCON-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5367</link>
<guid>c1a3d34711ab5d85335331ca0e57f067</guid>
<pubDate>Mon, 05 Dec 2022 23:51:57 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>BRYCON-Construction</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2f8906a1ee444406642e5b0b28d16b0716fba98db07c1d8d2cd19e8fb82cb108</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grupo-NGN</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5348</link>
<guid>b32e8760418e68f23c811a1cfd6bda78</guid>
<pubDate>Sun, 04 Dec 2022 11:53:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Grupo-NGN</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d105829c7343c60a7fbdc5331067a568944750e576eaf8881fe4ec5f538ed1d</i><br /><br />Threat actor <b>description</b>: <i>Grupo NGN has refused to protect their customers' data and access to their networks. This link (TOR) contains Grupo NGN's random files:  http://qojfcbvlumvzmiu4tyixawquk6bjiwv74aeaubxwtq7rmw4qq7sv2jad.onion/GRUPGN/  Auction ends Dec. 8 for all sensetive data of Grupo NGN and their customers, including - Access to multiple networks of Grupo NGN clients (with their networks secured, password changes will not help defend against an attack) - NDA documents and records of Grupo NGN customers' conversations - Personal data about employees and customers of Grupo NGN - Financial information of Grupo NGN and their clients that can be used for criminal purposes  To participate in an auction to purchase Grupo NGN and their customer data, you can email:  grupongndatasale@proton.me  GRUPONGN.COM HACKED. MORE THAN 200GB OF SENSITIVE DATA STOLEN.</i><br />Target victim <b>website</b>: <i>https://grupongn.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Holler-Classic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5325</link>
<guid>beb04c41b45927cf7e9f8fd4bb519e86</guid>
<pubDate>Thu, 01 Dec 2022 13:40:30 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lorenz</b> claims attack for <b>Holler-Classic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42a9db54ff6a1fee426a9dc9c0223e0bd03157c7ef42ba42606baa46056fe2d1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lorenz</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stibbs--Co</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5320</link>
<guid>3a2a9aef4cbed81244820a091667c0bd</guid>
<pubDate>Tue, 29 Nov 2022 11:21:27 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Stibbs--Co</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9da400c6bfe2486d681a00e8e5c871e1acfed33796b1ace61c9e029e399c794c</i><br /><br />Threat actor <b>description</b>: <i>All data available for downloading now!!!</i><br />Target victim <b>website</b>: <i>https://www.stibbsco.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>STGi</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5309</link>
<guid>55acf8539596d25624059980986aaa78</guid>
<pubDate>Sun, 27 Nov 2022 21:42:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>STGi</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af1d3ce9aac01ed941991edc9c07c0446b20bb1220b132d201f1fe0291837bf6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ta-Chen-Stainless-Pipe-Co.-Ltd</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5289</link>
<guid>f2925f97bc13ad2852a7a551802feea0</guid>
<pubDate>Thu, 24 Nov 2022 21:08:49 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Ta-Chen-Stainless-Pipe-Co.-Ltd</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b9e80aec731754fbbefb622239bf5bde20a5eb86c41779a3c598231c3dbdbeaa</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>KlamoyaCasino</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5244</link>
<guid>0da474fc8e382f9c6d6d774bb433339a</guid>
<pubDate>Fri, 18 Nov 2022 04:28:01 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>KlamoyaCasino</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f18e3f715b65c0c750138e6535cee7e7499c3a1a7c01be8aac3a0c24f6ff779f</i><br /><br />Threat actor <b>description</b>: <i>Full pack of documents will be attached soon. SQL export contains players info with SSN. DL scans for KYC is attached. </i><br />Target victim <b>website</b>: <i>https://klamoyacasino.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Giambalvo-Stalzer--Co.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5241</link>
<guid>d14fe370bdf1664c34b258d65f8d3507</guid>
<pubDate>Thu, 17 Nov 2022 15:34:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Giambalvo-Stalzer--Co.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9fda3aba56245c2e7076881f33444b7f34d856d895a4902c0759b56cbabfe59c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Comresearch</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9877</link>
<guid>7608de7a475c0c878f60960d72a92654</guid>
<pubDate>Wed, 16 Nov 2022 16:31:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Comresearch</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>78852f1efef0ac3c98b554cfb29e561b37548557f2737371cab55d8c87097479</i><br /><br />Threat actor <b>description</b>: <i>  Community Research Foundation (CRF) is a 501(c)(3) not-for-profit corporation.  The organization has two primary purposes:      To design and operate programs focused on the treatment, education, and rehabilitation of individuals with mental health problems who may also have co-occurring substance use problems in a way that is culturally sensitive, and will promote recovery and decrease the stigma of mental illness and co-occurring substance use problems.                                                                                                                                                                                                      To conduct scientific research which is designed to assess the quality and appropriateness of services, and continue to discover and implement innovative ways of working toward the ultimate goal of recovery from mental illness and co-occurring substance use problems. </i><br />Target victim <b>website</b>: <i>http://comresearch.org/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpwww.lamtec.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5234</link>
<guid>5d78d182fd5f5510588695863d22ac27</guid>
<pubDate>Tue, 15 Nov 2022 17:23:06 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>httpwww.lamtec.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6c04d1ac36f0c9d16fedef044b1b270dd6948b203b05848c0c7c31811f52a911</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>gulfcoastwindows.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5229</link>
<guid>080acdcce72c06873a773c4311c2e464</guid>
<pubDate>Tue, 15 Nov 2022 13:18:56 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>gulfcoastwindows.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>63cc7f513367442143bdef3e94cfdc7a0f885f2ec3da174f7979c1de90ab3be7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>scottindustrialsystems.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5225</link>
<guid>169582a799e5b6c46fdfd432379f60d8</guid>
<pubDate>Mon, 14 Nov 2022 21:31:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>scottindustrialsystems.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1999ad75b8b3942a9bf3071b30d2fd0ec520909903c2e692fcaf916dbcf9c41e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nissan-of-Las-Cruces</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5201</link>
<guid>f50c7035e532c49a0f6993d988e2e843</guid>
<pubDate>Mon, 14 Nov 2022 09:35:43 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lorenz</b> claims attack for <b>Nissan-of-Las-Cruces</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af21e6f2e91591970f12e35324ad05764f963da4e6f9bd336138f6fb4cb9f3e6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lorenz</category>
</item>
<item xmlns:dc='ns:1'>
<title>Midland-Cogeneration-Venture</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5196</link>
<guid>22508552d3fc22f867e33e6c56b30b16</guid>
<pubDate>Sun, 13 Nov 2022 19:40:23 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>quantum</b> claims attack for <b>Midland-Cogeneration-Venture</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1d6ac59c1b7cd6aac62deecd6396887eda1d108622943999f2e711635099e7fb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>quantum</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bosselman-Energy-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5144</link>
<guid>c9319967c038f9b923068dabdf60cfe3</guid>
<pubDate>Mon, 07 Nov 2022 16:57:59 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Bosselman-Energy-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2dfbb437b1d733617d6860e054d011c854bd2a40767ef727d1c0206166058989</i><br /><br />Threat actor <b>description</b>: <i>More than 900 gigabytes of  sensitive data on your network were DOWNLOADED.  Data includes: - Employees personal data, CVs, DL, SSN. - Complete network map including credentials for local and remote services. - Private financial information including: client's data, bills, budgets, annual reports, bank statements. - Manufacturing documents including: datagrams, schemas, drawings in solid works format - And more...</i><br />Target victim <b>website</b>: <i>https://www.bosselmanenergy.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpswww.zoominfo.comcmaynards-industries-ltd24117794</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5136</link>
<guid>0e79548081b4bd0df3c77c5ba2c23289</guid>
<pubDate>Sat, 05 Nov 2022 16:59:24 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>httpswww.zoominfo.comcmaynards-industries-ltd24117794</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb56a2be41ee05e0b43fe936933581754c0dd606c7fee08240ee5a59288b7214</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpswww.benbrooklibrary.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5121</link>
<guid>70f250e2d762fbde8a2e70eabf6eb953</guid>
<pubDate>Fri, 04 Nov 2022 10:20:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>httpswww.benbrooklibrary.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8140488b3ca7937fc44142665268a4ef7e6fc32b2fba8b52f8f447b28049359b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpswww.caminorealkitchens.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5122</link>
<guid>5516adb142fcb18a017c72602abbdb6d</guid>
<pubDate>Fri, 04 Nov 2022 10:20:08 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>httpswww.caminorealkitchens.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>27069bad7edb755d6603339db5291b53352c77b94fdddf1c1ea18e28de5b2398</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpswww.infocision.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5115</link>
<guid>d324a0cc02881779dcda44a675fdcaaa</guid>
<pubDate>Fri, 04 Nov 2022 10:20:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>httpswww.infocision.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e969017f26bc238331e6af50695bee13f726787a15f92b873ad7d420c18d2121</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpswww.mmemed.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5116</link>
<guid>878a0658e652765c4979dba411787e43</guid>
<pubDate>Fri, 04 Nov 2022 10:20:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>royal</b> claims attack for <b>httpswww.mmemed.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>75281af1efc6dd1c07397b1779f3ace1e3658ba973f5cd2f5eeae8016185e85b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>royal</category>
</item>
<item xmlns:dc='ns:1'>
<title>YMCA-of-Metropolitan-Washington</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5045</link>
<guid>56bd37d3a2fda0f2f41925019c81011d</guid>
<pubDate>Tue, 01 Nov 2022 20:43:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>vicesociety</b> claims attack for <b>YMCA-of-Metropolitan-Washington</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6059746a076e329e269bb85ea91e3b7d0d3bd0f150e24a00227fcfdc2ca65ff3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>vicesociety</category>
</item>
<item xmlns:dc='ns:1'>
<title>Genesys-Aerosystems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5036</link>
<guid>c731077c04035ac9e92a3706288db18f</guid>
<pubDate>Mon, 31 Oct 2022 20:43:52 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Genesys-Aerosystems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f45f592df040a78c8e4a39e04681f7350455bebeeb5722b742e719cf7bacd74b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>AT038T</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=5000</link>
<guid>a35fe7f7fe8217b4369a0af4244d1fca</guid>
<pubDate>Fri, 28 Oct 2022 09:50:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>AT038T</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9998857391de57a4d505eadac67dc97131b63fcc79585b1c2de77f9e871639b0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>bankruptcypa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4884</link>
<guid>c133fb1bb634af68c5088f3438848bfd</guid>
<pubDate>Fri, 14 Oct 2022 15:48:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>bankruptcypa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5b6296b5c334f776d4757512afad0a678878a434c4e0096d179ba0d173b19dd9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>SMART-Mechanical-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4876</link>
<guid>77bdfcff53815626ecab7f6a1454f007</guid>
<pubDate>Wed, 12 Oct 2022 07:14:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>SMART-Mechanical-Solutions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f517f23e82ec17dda75668360ff0032d34315091dc03a6043c7328a7e100d6a2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advanced-Micro-Devices-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4869</link>
<guid>20cf775fa6b5dfe621ade096f5d85d52</guid>
<pubDate>Wed, 12 Oct 2022 01:43:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Advanced-Micro-Devices-Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a61afcc14a94c9baffa7bdd26993754a0fd573d9d5eec4fd1d31a62883c1f414</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Home-Dynamix</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4844</link>
<guid>e6cc48e3a8db9b618592a86a57960164</guid>
<pubDate>Sat, 08 Oct 2022 15:34:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Home-Dynamix</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>42e779c2e89adc512d6707b4e07e780af59fffe93d4f9727a61140ed523b1879</i><br /><br />Threat actor <b>description</b>: <i>Home Dynamix's core philosophy is centered on designing and manufacturing high quality home textile products including area rugs, scatter rugs, kitchen and bath rugs, bedding and more. With three plus decades in the floor covering business, Home Dynamix has distinguished itself as a trendsetter with the keen ability to tap into what the consumer is looking for.</i><br />Target victim <b>website</b>: <i>http://www.homedynamix.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>contempocard.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4838</link>
<guid>bdeeecd97342dada47213d06bbd67c2c</guid>
<pubDate>Sat, 08 Oct 2022 05:43:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>contempocard.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>473178bc131be189da252abd45346f7b5636fa6f27ceb5e47e4584134bbcffc6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rundle-Eye-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4827</link>
<guid>5857d68cd9280bc98d079fa912fd6740</guid>
<pubDate>Thu, 06 Oct 2022 13:28:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Rundle-Eye-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>491d0a2800f3802f4249e690389f74725db4cb3476871852e20a993f814723bb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Avalon-luxury-transport-company---Leaked</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4820</link>
<guid>79cc30c73507cfc25d20fe7f7bcfd91b</guid>
<pubDate>Wed, 05 Oct 2022 15:59:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ragnarlocker</b> claims attack for <b>Avalon-luxury-transport-company---Leaked</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9bb98691de0d92b747f32a5aa47214d13d8cbe92b2f5d4b5ef2304b672a0900</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ragnarlocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Midwest-Petroleum</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4798</link>
<guid>d6317f80523fdf2a7375da19c9a006b8</guid>
<pubDate>Sun, 02 Oct 2022 23:27:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Midwest-Petroleum</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6622ab85b0e518385e75278ff010442b40cbaa2fda0f480558a6a2dfe871c308</i><br /><br />Threat actor <b>description</b>: <i>Founded in 1946 and headquartered in Manchester, Missouri. Midwest Petroleum operates corporate-run gasoline and convenience food stores</i><br />Target victim <b>website</b>: <i>https://www.midwestpetro.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.bbadmin.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4739</link>
<guid>f3507289cfdc8c9ae93f4098111a13f9</guid>
<pubDate>Wed, 21 Sep 2022 23:14:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>redalert</b> claims attack for <b>www.bbadmin.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c65830b55ae75bc5b9a58be234fdca6e8245e61c2724f014e08098db3fc2e8d7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>redalert</category>
</item>
<item xmlns:dc='ns:1'>
<title>Circles-of-Care</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9886</link>
<guid>bb576d1513ba8ee93a97fa79d9b941e5</guid>
<pubDate>Tue, 20 Sep 2022 16:50:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Circles-of-Care</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ecaa11a6af0a495d37adc7d56d50313c0f207b4b96855f7643b6b2d23138c2a6</i><br /><br />Threat actor <b>description</b>: <i>Caring For Your Health. We are proud to provide the most comprehensive, highest quality behavioral healthcare services.</i><br />Target victim <b>website</b>: <i>http://circlesofcare.org/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>scottobrothers.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4709</link>
<guid>bc9c8c705927bf419147ab7491c54896</guid>
<pubDate>Fri, 16 Sep 2022 03:46:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>scottobrothers.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7a990ef80ec6d4fe0fd9b2069b937b06156573f062fa28c849cdd93446d8f01</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>midlandplastics.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4699</link>
<guid>4772c1b987f1f6d8c9d4ef0f3b764f7a</guid>
<pubDate>Thu, 15 Sep 2022 12:59:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>midlandplastics.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d33180b4ee5ebdb0b3d89094c6f7002d78c6bbf4d12cdca7d4cfed7e8b3153d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>OakBend-Medical-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4633</link>
<guid>96c974552b3f2839fcc751e7f12679ce</guid>
<pubDate>Tue, 13 Sep 2022 01:04:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>daixin</b> claims attack for <b>OakBend-Medical-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ec913cd0a13f704f882f5ade7e1ea2d3b661c49a0c11a23a274fe9d362e13e0</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>daixin</category>
</item>
<item xmlns:dc='ns:1'>
<title>lafondasantafe.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4605</link>
<guid>971eb27c6345932b82b70414028d7183</guid>
<pubDate>Tue, 06 Sep 2022 08:07:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>lafondasantafe.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9994745f3d963fa4d9742e1f5b377d5c0dd097a87bcfa4a345780e0bf7dd740c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>augustacoop</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4599</link>
<guid>f0f800c92d191d736c4411f3b3f8ef4a</guid>
<pubDate>Mon, 05 Sep 2022 17:04:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>augustacoop</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e824e255246e802ecc8d5e4daba8dd4955fa59e056c57b3c70d809f10ed125bd</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wheat-Ridge-County</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16961</link>
<guid>b8d889c4e9b34bc7dc7a93a2a9a91070</guid>
<pubDate>Mon, 29 Aug 2022 00:00:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Wheat-Ridge-County</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b5a26d3bc65fe4a92de814981a78f41979ea856da86e798b717205afde2e0f38</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>goodwillnm.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4535</link>
<guid>aee1bc7fa5da061b752d0efddbd16495</guid>
<pubDate>Sun, 28 Aug 2022 03:40:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>goodwillnm.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>053c10affdb463adae7a3a6f28d5c919c51b1a3a4de85c715bd04666ba7fbb39</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Baton-Rouge-General</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4512</link>
<guid>63c4b1baf3b4460fa9936b1a20919bec</guid>
<pubDate>Wed, 24 Aug 2022 20:59:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hiveleak</b> claims attack for <b>Baton-Rouge-General</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>67b5534f6c45e236aa0a607a2c640e6849bf28c22976c441792aea897c85c44c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>hiveleak</category>
</item>
<item xmlns:dc='ns:1'>
<title>wabteccorp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4460</link>
<guid>61bdf049525b7d4c2cf79257ec7c2c56</guid>
<pubDate>Thu, 18 Aug 2022 20:56:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>wabteccorp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>31a9c42344361efb12aabb5e47cf6a6b51be350e00f91c1653a4c88363c8b387</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>ORBITELECTRIC.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9165</link>
<guid>a6640ad0aca7033809ffa7165c3040f9</guid>
<pubDate>Thu, 18 Aug 2022 16:26:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>ORBITELECTRIC.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da03791c3a3e9c3727da510682643d7008d18986d9dffb03e4c4ecc5019d611e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>GENESISNET.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9130</link>
<guid>6ef07f927172f6d48f2e72d606a03713</guid>
<pubDate>Thu, 18 Aug 2022 16:26:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>GENESISNET.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7baa0b06e89c090ed6c05e3d94a88b3fe42fdce5da0fb4dc92c679a2840e54db</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>BLUEBONNETNUTRITION.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9133</link>
<guid>5eb2a86c4e7f9ba6dfe6f786e90c26d7</guid>
<pubDate>Thu, 18 Aug 2022 16:26:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>BLUEBONNETNUTRITION.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>29ddc7febb71ba7ef0c724b91128a152690067e58e45b4ffe7cc83aee409f38a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>UNIVERSITYOFCALIFORNIA.EDU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9089</link>
<guid>28b805f5645425ce44eaf6bcba79a40c</guid>
<pubDate>Thu, 18 Aug 2022 16:25:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>UNIVERSITYOFCALIFORNIA.EDU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1032c5db68fb12bcc488e5c9ec85eddeacfec9820bec39e25467c9aa3a26726</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DANAHER.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9103</link>
<guid>496bd33584d955e3913f1a3e82bb2f2d</guid>
<pubDate>Thu, 18 Aug 2022 16:25:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>DANAHER.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>75d304e2d7b65e78f91baae9f4c8b1f7626e83ccb846513c4517335f31bf5ae5</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>MIAMI.EDU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9108</link>
<guid>c22ad2b09a726d564cd5666c93e080ac</guid>
<pubDate>Thu, 18 Aug 2022 16:25:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>MIAMI.EDU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1887460293987c321558358fcac9e2a7c6eae82e018b4deb647d573e2b063f63</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>STANFORD.EDU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9109</link>
<guid>3c09bb10e2189124fdd8f467cc8b55a7</guid>
<pubDate>Thu, 18 Aug 2022 16:25:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>STANFORD.EDU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7402e80798dbc3cc20de1dc27e93887b1313dc48a50fccc125dfaf7157250b91</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>NOVABIOMEDICAL.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9069</link>
<guid>8a47481ae534860850adf59f145e6b40</guid>
<pubDate>Thu, 18 Aug 2022 16:25:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>NOVABIOMEDICAL.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8cc2c59c2f5e9fe009d8d60975832930cfa7d2b6d8ff1005e2b6867f4546b073</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fremont-County</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16960</link>
<guid>e3c87529e817b9f8468c02ee8c81ed89</guid>
<pubDate>Wed, 17 Aug 2022 00:00:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Fremont-County</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e966b7c416531d39a875a2155d212e5c063bf28959d245dc447fa532e182e519</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hot-news-straight-from-Cisco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4424</link>
<guid>83451e7ef8755c2a8f464093c808f529</guid>
<pubDate>Wed, 10 Aug 2022 16:48:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>yanluowang</b> claims attack for <b>Hot-news-straight-from-Cisco</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c6ce4e668ae69b3ea41be207432abe75644c007ddfab0bb479ef5842d2d24106</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>yanluowang</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fitzgibbon-Hospital-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4372</link>
<guid>1e51e0f3b6b60070219ccb91bb619a6b</guid>
<pubDate>Wed, 03 Aug 2022 03:26:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>daixin</b> claims attack for <b>Fitzgibbon-Hospital-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24e27b2c7922e255119bff95c029b48324569bab1f000abc054ffef52c7b4da3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>daixin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trib-Total-Media-USA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4371</link>
<guid>1377e22fd81057b3e65aefd5fc634b64</guid>
<pubDate>Wed, 03 Aug 2022 03:26:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>daixin</b> claims attack for <b>Trib-Total-Media-USA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a16f8e0137cfb1beb7c43ccea8481b1e241c2228839719a69cc0224c8c9c0a92</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>daixin</category>
</item>
<item xmlns:dc='ns:1'>
<title>legacy-hospitality.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4312</link>
<guid>27d8d40b22f812a1ba6c26f8ef7df480</guid>
<pubDate>Mon, 25 Jul 2022 10:48:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>legacy-hospitality.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d6edbf2ceb51ef3902975077cf01c9f83cc695e4c38e175c781da8371203e880</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>mec.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4280</link>
<guid>55603a5f239e435c642244be3e891b85</guid>
<pubDate>Wed, 20 Jul 2022 21:54:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>mec.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cacdb0c7c7054b48e5e3b6825a84e3d91a839cc582cce7c2b869bb2ef67d34f6</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>OGLETREE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9895</link>
<guid>b296ba28f4800015d8018ad62dee859d</guid>
<pubDate>Wed, 20 Jul 2022 17:05:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>OGLETREE</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4fca657d27826bee73737683b68fa87bfc08509e4f426729588ed845a97328c8</i><br /><br />Threat actor <b>description</b>: <i>For over 60 years Ogletree's, Inc has specialized in metal and equipment fabrication spanning a multitude of industries. Our diversity and experience is a testament to our quality, service and ability to take on any project that you might have. Ogletree's provides superior quality and workmanship with the ability to work with carbon steel, stainless steel, aluminum and bronze. Our commitment to our clients is to form a partnership on every project, regardless of the size. Innovation, teamwork and customer service are qualities that are synonymous with the Ogletree's name.</i><br />Target victim <b>website</b>: <i>http://ogletreecorp.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>GENSCO-Inc.---allows-Leak</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4267</link>
<guid>fb8e51c5c713f2aaf71f62e03c5298db</guid>
<pubDate>Tue, 19 Jul 2022 18:32:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ragnarlocker</b> claims attack for <b>GENSCO-Inc.---allows-Leak</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9192720212d81228ab39353c0b702b428278bb57a8b3b20a91b5fbe22cc99c58</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ragnarlocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rain-the-Growth-Agency</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4231</link>
<guid>dd1016d687d5960a8f279198a94d0cc5</guid>
<pubDate>Thu, 14 Jul 2022 22:31:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bianlian</b> claims attack for <b>Rain-the-Growth-Agency</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f44b8f25ce2fdab5604fcb73a5316403131cf0b2aafafe25f23ba86551dd8ec2</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>bianlian</category>
</item>
<item xmlns:dc='ns:1'>
<title>genusplc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4223</link>
<guid>f42a37d114a480b6b57b60ea9a14a9d2</guid>
<pubDate>Thu, 14 Jul 2022 14:36:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit3</b> claims attack for <b>genusplc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2642e822a7a680e64c9a96beda60d814cce152da7548fe0a53e70fa5909659d7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit3</category>
</item>
<item xmlns:dc='ns:1'>
<title>Exela-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4206</link>
<guid>769ac34a4012ab69c069de0bab7d9e81</guid>
<pubDate>Wed, 13 Jul 2022 18:25:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hiveleak</b> claims attack for <b>Exela-Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>58a1163d9d4cd450c74b0737bc7639313256b46ee259da9799df1bc3dffdac72</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>hiveleak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chen-Moore-and-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9891</link>
<guid>ed1d136ff42ccec596038ba1c11c8a46</guid>
<pubDate>Sat, 09 Jul 2022 17:09:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Chen-Moore-and-Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a365f7c5732a533271c51b3e7bdbd969c55de910bc12c29d59415712a2600bf6</i><br /><br />Threat actor <b>description</b>: <i>At CMA, we best describe ourselves, our approach, and our priorities with these five words: Leadership, Excellence, Philanthropy, Community and Culture. CMA embraces the history and legacy of the firm set by Dr. Ben Chen, P.E., BCEE and is empowered by the vision set by its leadership team, led by President Peter M. Moore, P.E., F.ASCE, FACEC. The firm continues to grow by striving for excellence in design, innovation, project management, and quality.</i><br />Target victim <b>website</b>: <i>https://www.chenmoore.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Holland-CPA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4148</link>
<guid>810dfbbebb17302018ae903e9cb7a483</guid>
<pubDate>Mon, 04 Jul 2022 10:38:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Holland-CPA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9d74bd1fdd830bc02869236079539c7d70e7440f1972863bd0ff920e5dee5ffc</i><br /><br />Threat actor <b>description</b>: <i>ALL DATA AVAILABLE FOR DOWNLOADING!!!</i><br />Target victim <b>website</b>: <i>https://www.hollandcpa.cc/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mechanical-Systems-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4064</link>
<guid>8430b32b5bac908e765df8813d4405c5</guid>
<pubDate>Tue, 21 Jun 2022 21:36:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Mechanical-Systems-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a74863785fc4a5417b162726e1a68eaf6f72a3b1d6c1f3852c6b973bd4a1f8cb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>emprint.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4049</link>
<guid>89a4779d3836ea432f7ea074e522a17e</guid>
<pubDate>Mon, 20 Jun 2022 05:02:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit2</b> claims attack for <b>emprint.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d4e15d61237918ce739dc42c0b20843d46faf350c1016484ef3f16935dc6c98f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit2</category>
</item>
<item xmlns:dc='ns:1'>
<title>genusplc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=4018</link>
<guid>455cb2657aaa59e32fad80cb0b65b9dc</guid>
<pubDate>Tue, 14 Jun 2022 23:30:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit2</b> claims attack for <b>genusplc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>67b77256077326e553e8d05c82e280ffb2ad1d2cfa69904dfef7f0973207c1ff</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit2</category>
</item>
<item xmlns:dc='ns:1'>
<title>vanderpols</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9902</link>
<guid>a729d76292a6a72fc99598bbc1e33ae6</guid>
<pubDate>Sat, 11 Jun 2022 17:15:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>vanderpols</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ed028b31899ad091518606d583396ccb63dbd70ce900c416105462188a70517</i><br /><br />Threat actor <b>description</b>: <i>EggSolutions Vanderpol's is a family owned and operated egg processor dedicated to the development and delivery of innovative, functional egg solutions.</i><br />Target victim <b>website</b>: <i>https://www.vanderpolseggs.com/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>English-Construction-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=3969</link>
<guid>f81dee42585b3814de199b2e88757f5c</guid>
<pubDate>Wed, 08 Jun 2022 14:41:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>English-Construction-Company</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a4ae2da87e01036dc64ece20de9a557f40a2d4a64e78b48139440aec42be50fb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Channel-Navigator-business-intelligence-IT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=3714</link>
<guid>e36286b94d3c219f414e0427e5f73aa5</guid>
<pubDate>Fri, 13 May 2022 12:32:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>kelvinsecurity</b> claims attack for <b>Channel-Navigator-business-intelligence-IT</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>69b5b32a1523a3a8e469a3001d6764ca13682e4bb782b094bc73fa22c1a609a9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>kelvinsecurity</category>
</item>
<item xmlns:dc='ns:1'>
<title>YCUA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9905</link>
<guid>36ae77db7915835abc105f631f0391f8</guid>
<pubDate>Thu, 12 May 2022 17:22:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>YCUA</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>da50e17c4ec24aeed0d421cb6cd96860b4eca97e74bba03bfaddab5006800e2c</i><br /><br />Threat actor <b>description</b>: <i>The Ypsilanti Community Utilities Authority (YCUA) provides water and wastewater services to the Ypsilanti area. Water and/or wastewater services are provided to the City of Ypsilanti, Charter Township of Ypsilanti, Pittsfield Township, Augusta Township, Sumpter Township and Superior Township. YCUA contracts with the Western Townships Utilities Authority (WTUA) to provide wastewater treatment services for the Townships of Canton, Northville, and Plymouth.</i><br />Target victim <b>website</b>: <i>https://www.ycua.org/</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>acorentacar</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=3640</link>
<guid>4f11b55f57612f06fe9638b99f6c66e6</guid>
<pubDate>Thu, 05 May 2022 13:42:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>mindware</b> claims attack for <b>acorentacar</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>668c7a3afa48b3589c6b035fdb60e00719dafd7921008101a95ecac9432c77b9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>mindware</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jameco-Electronics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=3621</link>
<guid>c5b270a763686e776039618cc709f3a6</guid>
<pubDate>Mon, 02 May 2022 21:23:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbasta</b> claims attack for <b>Jameco-Electronics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>032f3e076af57840e3a5f6935c9bf70d91f41d71e7b2cad61e1a5364e067fb83</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbasta</category>
</item>
<item xmlns:dc='ns:1'>
<title>Regina-Public-Schools</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=16958</link>
<guid>7f6d50e3bd910613453258dbfa30521d</guid>
<pubDate>Sun, 01 May 2022 00:00:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Regina-Public-Schools</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>125edf36df26d76b6d35d8fe2ca5e35c14a7bc176df7f590f5561fc96c7c044a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Monterey-Mechanical-Co.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=3585</link>
<guid>2668a7105966cae6e23901495176b8f9</guid>
<pubDate>Fri, 29 Apr 2022 13:40:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hiveleak</b> claims attack for <b>Monterey-Mechanical-Co.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>71d65cd6efbd159df4f27665369b9d03f8b92665afba83edaee7eed6d8ef66af</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>hiveleak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Richardson--Pullen-PC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=9908</link>
<guid>515b9d40500ef7d05007b5668991fc7c</guid>
<pubDate>Tue, 26 Apr 2022 17:27:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Richardson--Pullen-PC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f75b8c61ac4629f51025de0cb4ae2c36c0e501573c3c3c214da09f5443d1c9b6</i><br /><br />Threat actor <b>description</b>: <i>90 GB data has been downloaded from company file servers, including:  Internal Company Data (Employees personal data, CV's, DL's, ID's, SSN's, Financial reports, Accounting data, Loans data, Agreements and much more); Clients documentation (DL's, ID's, SSN's, Financial data, Credit cardsinformation, Loans data, Agreements and much more); Complete network map including credentials for local and remote services; And more…</i><br />Target victim <b>website</b>: <i>https://www.richardsonandpullen.com</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Danaher</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=3517</link>
<guid>b5b0db7f3a77ca4fcf9eca57aa7181ca</guid>
<pubDate>Mon, 25 Apr 2022 21:27:31 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>Danaher</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a34d0eefc82afa8026b6f4334b1277a0a0dcf169871571ee6cc07ff1d891780b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>huntongroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=3465</link>
<guid>797134c3e42371bb4979a462eb2f042a</guid>
<pubDate>Fri, 22 Apr 2022 03:57:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit2</b> claims attack for <b>huntongroup.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ad13c7b3bd41faaff3ddd224d6bcb5c10ed3d7635bacde01f7fcbb3678a05bc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit2</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.cassinobuil...</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=3347</link>
<guid>1a04f965818a8533f5613003c7db243d</guid>
<pubDate>Thu, 14 Apr 2022 01:49:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit2</b> claims attack for <b>www.cassinobuil...</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ab7b7dcebd31bf4692a44c5dfd3f00d41c0f645dddfa4093fbd2a30fb132e494</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit2</category>
</item>
<item xmlns:dc='ns:1'>
<title>Epic-Games-Data-Breach</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=3327</link>
<guid>20b02dc95171540bc52912baf3aa709d</guid>
<pubDate>Tue, 12 Apr 2022 12:16:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>Epic-Games-Data-Breach</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>515fdc64a9d86c7c88d790a9394c3e0c3de1ac62b2022bed134c2be6f6bcdf3a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>North-Carolina-AT-State-University-www.ncat.edu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=3332</link>
<guid>b0ab42fcb7133122b38521d13da7120b</guid>
<pubDate>Tue, 12 Apr 2022 08:21:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>North-Carolina-AT-State-University-www.ncat.edu</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7ec71467033e9b86e5231cd331bb77280dfc9f676abceccb6cd7c428d70e3723</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Scott-Manufacturing-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=3176</link>
<guid>59dfa2df42d9e3d41f5b02bfc32229dd</guid>
<pubDate>Wed, 30 Mar 2022 21:23:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>conti</b> claims attack for <b>Scott-Manufacturing-LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>34d9fd76ab2b5013acbbe63523c231ef3672c6507a5d7d929b361c712f790f9f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>conti</category>
</item>
<item xmlns:dc='ns:1'>
<title>Oklahoma-City-Indian-Clinic</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=3104</link>
<guid>75b9b6dc7fe44437c6e0a69fd863dbab</guid>
<pubDate>Mon, 28 Mar 2022 02:53:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>suncrypt</b> claims attack for <b>Oklahoma-City-Indian-Clinic</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>141a9f2f9a84bac8bec52eb1478bb955574fe87076edefa3774e2ae736a69da3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>suncrypt</category>
</item>
<item xmlns:dc='ns:1'>
<title>centralaccident...</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=2974</link>
<guid>6788076842014c83cedadbe6b0ba0314</guid>
<pubDate>Fri, 18 Mar 2022 15:23:09 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit2</b> claims attack for <b>centralaccident...</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c32b9f5e8d17629e4817d0333110965cd3080e7c1c03d6c8673e2e197054584</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit2</category>
</item>
<item xmlns:dc='ns:1'>
<title>thionvillenola....</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=2962</link>
<guid>3b2d8f129ae2f408f2153cd9ce663043</guid>
<pubDate>Fri, 18 Mar 2022 01:58:21 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit2</b> claims attack for <b>thionvillenola....</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c56190e1e43ea6898aa376bfa8df6bb3d9081200a688bef9c74472c131d07285</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit2</category>
</item>
<item xmlns:dc='ns:1'>
<title>bridgestoneamer...</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=2894</link>
<guid>5b4130c9e891d39891289001cc97d86b</guid>
<pubDate>Wed, 09 Mar 2022 23:20:58 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit2</b> claims attack for <b>bridgestoneamer...</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2be66c97fff052b72c92d74a79ee0025c0ddf7a2ef839ca24c8a140dc180e164</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit2</category>
</item>
<item xmlns:dc='ns:1'>
<title>McDonald039s</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=2797</link>
<guid>74378afe5e8b20910cf1f939e57f0480</guid>
<pubDate>Fri, 25 Feb 2022 18:24:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>snatch</b> claims attack for <b>McDonald039s</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4eb7c4487abe1cfa62ab9ba62d72fd3823b078b91b45e167790cbdf09835435e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>snatch</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tudi-Mechanical-Systems-TMS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=2751</link>
<guid>030e65da2b1c944090548d36b244b28d</guid>
<pubDate>Wed, 23 Feb 2022 00:23:28 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>conti</b> claims attack for <b>Tudi-Mechanical-Systems-TMS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1dda556f922844219f2d50301f26e09506036ee4e961a37510047db56288fa6c</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>conti</category>
</item>
<item xmlns:dc='ns:1'>
<title>San-Francisco-49ers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=2646</link>
<guid>f2e43fa3400d826df4195a9ac70dca62</guid>
<pubDate>Sat, 12 Feb 2022 18:22:03 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>San-Francisco-49ers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e138fbd1c99dd373f7fda698a378b61aac1166f12422982c4a30381110e975bb</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>Albany-Bank-and-Trust-Company---albanybank.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=2583</link>
<guid>eaa52f3366768bca401dca9ea5b181dd</guid>
<pubDate>Sat, 05 Feb 2022 09:22:50 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Albany-Bank-and-Trust-Company---albanybank.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79376d289ed0395537a6d5d9dac10a9e78eabda523779206ea25f6b2e1b24f1e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vermeer-Southeast</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=2491</link>
<guid>01a0683665f38d8e5e567b3b15ca98bf</guid>
<pubDate>Tue, 25 Jan 2022 15:22:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>hiveleak</b> claims attack for <b>Vermeer-Southeast</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4f6d4d4990372e82285d1b9e41933ab5d713959837096ae3245fc41102c003fc</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>hiveleak</category>
</item>
<item xmlns:dc='ns:1'>
<title>Blue-Harbor-Resort</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=6286</link>
<guid>caa145542f7333f6ebf99a72b87bdeba</guid>
<pubDate>Tue, 25 Jan 2022 10:46:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avoslocker</b> claims attack for <b>Blue-Harbor-Resort</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9d039b5035597f2735a27fa6ce1bae43cf0a39e0539b27b07725d2a8ef54f690</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avoslocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>harrisshelton.c...</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=2426</link>
<guid>c65d7bd70fe3e5e3a2f3de681edc193d</guid>
<pubDate>Wed, 19 Jan 2022 08:28:19 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit2</b> claims attack for <b>harrisshelton.c...</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2e1700ddb42f0d1bee049cf5f569f8fc3ea58fcb26a5dd36c57aa0fa2ec07c9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit2</category>
</item>
<item xmlns:dc='ns:1'>
<title>amerplumb.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=2367</link>
<guid>300891a62162b960cf02ce3827bb363c</guid>
<pubDate>Mon, 10 Jan 2022 18:19:53 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit2</b> claims attack for <b>amerplumb.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33f24fc4e77f185a9b1cc2eaa8318279e2e96240e5fc9efa83c4ced12845ef2b</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit2</category>
</item>
<item xmlns:dc='ns:1'>
<title>Detroit-Stoker</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=2358</link>
<guid>d20be76a86c0d71c75035fced631f874</guid>
<pubDate>Sun, 09 Jan 2022 22:22:00 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Detroit-Stoker</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e3d2439d6bafde20886999270956fa678cf37a81dea7127f7f7e6c760283eb05</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Centaris.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=2260</link>
<guid>4cb811134b9d39fc3104bd06ce75abad</guid>
<pubDate>Thu, 30 Dec 2021 20:22:12 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Centaris.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa4ed09980d5f105082f5e18d3f78f0839f6d8297957aa48fd4d0a2bbe595b6d</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Douglas-Shaw--Associates--douglasshaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=2244</link>
<guid>3147da8ab4a0437c15ef51a5cc7f2dc4</guid>
<pubDate>Thu, 30 Dec 2021 10:43:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Douglas-Shaw--Associates--douglasshaw.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d5ae3d64d96334fefa51e1e6decfa1d226837e85305d0dda403cc4dd89d9fa99</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Buffers-USA--buffersusa.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=2246</link>
<guid>758a06618c69880a6cee5314ee42d52f</guid>
<pubDate>Thu, 30 Dec 2021 10:43:05 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Buffers-USA--buffersusa.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3c3e18bffb2e57bd371deae0fcda201de2706d8cdf1a8f61b31f0d797a01f7b3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Unified-Technologies--unified-team.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=2237</link>
<guid>b166b57d195370cd41f80dd29ed523d9</guid>
<pubDate>Thu, 30 Dec 2021 10:08:36 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Unified-Technologies--unified-team.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f2f7e50f611722b84ebb194053c21569a8ec1ef37e63ec04d81e7b9342078a37</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>CASINO-WINNAVEGAS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=2144</link>
<guid>7dc1c7653ac42a05642a667959c12239</guid>
<pubDate>Mon, 20 Dec 2021 23:17:42 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>conti</b> claims attack for <b>CASINO-WINNAVEGAS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4508d5e25ff8470fd7cfb8e771304e0e741d70d4b4f4f56bd1a7d99923e503aa</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>conti</category>
</item>
<item xmlns:dc='ns:1'>
<title>Strataworldwide.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=2124</link>
<guid>ef41d488755367316f04fc0e0e9dc9fc</guid>
<pubDate>Sat, 18 Dec 2021 16:06:45 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>alphv</b> claims attack for <b>Strataworldwide.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>13ef88c1b094e04b0d5dade423fd470c41ec9c8ce155e8be009f8f9b30706dd1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>alphv</category>
</item>
<item xmlns:dc='ns:1'>
<title>scotttesting.com----MORE-THEN-2.5TB-DATA-LEAKED</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=1827</link>
<guid>fface8385abbf94b4593a0ed53a0c70f</guid>
<pubDate>Tue, 23 Nov 2021 19:55:51 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lv</b> claims attack for <b>scotttesting.com----MORE-THEN-2.5TB-DATA-LEAKED</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c620852b97cdc2446fa0fafbfde356548bbde29c9bbb495107e7301053f7f51</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lv</category>
</item>
<item xmlns:dc='ns:1'>
<title>Goodwill-of-Central-and-Coastal-Virginia-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=1825</link>
<guid>ed519dacc89b2bead3f453b0b05a4a8b</guid>
<pubDate>Tue, 23 Nov 2021 13:05:29 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>blackbyte</b> claims attack for <b>Goodwill-of-Central-and-Coastal-Virginia-Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ae1483d908877874810a1e1551c6f475cacfbfc61a6acdab2da60365c4e1ab3</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>blackbyte</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gulfport-MS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=1693</link>
<guid>b59a51a3c0bf9c5228fde841714f523a</guid>
<pubDate>Mon, 08 Nov 2021 18:46:35 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pysa</b> claims attack for <b>Gulfport-MS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>116b3faf66def3b05ae6991b3ef177ed6eac6d0d832cb00018f1e27fc4f72eec</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>pysa</category>
</item>
<item xmlns:dc='ns:1'>
<title>trueblueenviron...</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=1609</link>
<guid>a2cc63e065705fe938a4dda49092966f</guid>
<pubDate>Sat, 06 Nov 2021 07:33:07 CET</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit2</b> claims attack for <b>trueblueenviron...</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>def02abab7b4d1e569530719a663afb6750829e3891e534a70d3d31b34275bb9</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit2</category>
</item>
<item xmlns:dc='ns:1'>
<title>Los-Gatos-Tomato-Products</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=1562</link>
<guid>92af93f73faf3cefc129b6bc55a748a9</guid>
<pubDate>Fri, 29 Oct 2021 21:25:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>conti</b> claims attack for <b>Los-Gatos-Tomato-Products</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a3915d632dbd49a852a039a7a4e1a4029337f0e1a55d44954b3f5ca440d52ed1</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>conti</category>
</item>
<item xmlns:dc='ns:1'>
<title>Galloway-Research-Service</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=1406</link>
<guid>b7087c1f4f89e63af8d46f3b20271153</guid>
<pubDate>Sun, 17 Oct 2021 21:42:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>conti</b> claims attack for <b>Galloway-Research-Service</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4ca829f61d133ffa80ca058b5da226ffdffa97462ebd724928aaa4efb6d61d4</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>conti</category>
</item>
<item xmlns:dc='ns:1'>
<title>Atlas-Financial-Holdings-Inc.---Leaked</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=1315</link>
<guid>dfd7468ac613286cdbb40872c8ef3b06</guid>
<pubDate>Wed, 06 Oct 2021 19:41:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ragnarlocker</b> claims attack for <b>Atlas-Financial-Holdings-Inc.---Leaked</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0a08d62255757a8a25ffae82b3379bf68615116f7d26221a1a9e35507f7ea15e</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>ragnarlocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.myyp.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=1055</link>
<guid>53c04118df112c13a8c34b38343b9c10</guid>
<pubDate>Sat, 25 Sep 2021 23:14:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payloadbin</b> claims attack for <b>www.myyp.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1065cea0d5a58d1718b718d3f56c2ffda2d724b9da31596065575f758057e4f</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>payloadbin</category>
</item>
<item xmlns:dc='ns:1'>
<title>marriott.comho...</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=999</link>
<guid>b706835de79a2b4e80506f582af3676a</guid>
<pubDate>Mon, 20 Sep 2021 13:14:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit2</b> claims attack for <b>marriott.comho...</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d54c2b7b9012f59ca623cc6f098dd04ad34ddb5369e3232bc705d82b0a8a0693</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit2</category>
</item>
<item xmlns:dc='ns:1'>
<title>ymcadc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=912</link>
<guid>2a9d121cd9c3a1832bb6d2cc6bd7a8a7</guid>
<pubDate>Fri, 10 Sep 2021 00:40:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit2</b> claims attack for <b>ymcadc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>10b8bdd3c55a773d5f9ff35c79875386ac89dd3b24a6336414f0fe8dbc918b73</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit2</category>
</item>
<item xmlns:dc='ns:1'>
<title>ATT-Database-Leak</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=775</link>
<guid>c0f168ce8900fa56e57789e2a2f2c9d0</guid>
<pubDate>Thu, 09 Sep 2021 23:46:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>darkleakmarket</b> claims attack for <b>ATT-Database-Leak</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a31a44132fbb27ae86c53a2654606695a644e15495acfe538f27324f492c757</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>darkleakmarket</category>
</item>
<item xmlns:dc='ns:1'>
<title>Blueknight-Energy-Partners</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=585</link>
<guid>a9a1d5317a33ae8cef33961c34144f84</guid>
<pubDate>Thu, 09 Sep 2021 23:46:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pysa</b> claims attack for <b>Blueknight-Energy-Partners</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cf182986f57543dc7f82e30a582e0ed79e399ccd60b2c78882eaf5d7728b956a</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>pysa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vermont-Personal-Injury-Lawyers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=494</link>
<guid>1be3bc32e6564055d5ca3e5a354acbef</guid>
<pubDate>Thu, 09 Sep 2021 23:46:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pysa</b> claims attack for <b>Vermont-Personal-Injury-Lawyers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dcfb2c6bcfd7fcd144ebe2edc1985f1975f2f0145f91570d650a642ea322fa75</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>pysa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Upstate-HomeCare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=495</link>
<guid>35051070e572e47d2c26c241ab88307f</guid>
<pubDate>Thu, 09 Sep 2021 23:46:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>pysa</b> claims attack for <b>Upstate-HomeCare</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>acedac57dc52b1d47585ec8dc0415120ba126cbf8650a8d9466a0b35aa79a096</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>pysa</category>
</item>
<item xmlns:dc='ns:1'>
<title>Presque-Isle-Police-Department</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=115</link>
<guid>2b44928ae11fb9384c4cf38708677c48</guid>
<pubDate>Thu, 09 Sep 2021 23:46:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>avaddon</b> claims attack for <b>Presque-Isle-Police-Department</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dabb3b294aa540d5e30a74f92b41a9f946fba0ebd5702f6b60354ecf249738ce</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>avaddon</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gulfeagle-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=215</link>
<guid>3b8a614226a953a8cd9526fca6fe9ba5</guid>
<pubDate>Tue, 11 May 2021 00:00:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>xinglocker</b> claims attack for <b>Gulfeagle-Supply</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-USA" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d18c3089248414f2459d72c2e04ef213f3f19d3ae5f31dbd7b2c8947d84a9ad7</i><br /><br />Threat actor <b>description</b>: <i>N/D</i><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>xinglocker</category>
</item>
</channel>
</rss>
